Security access systems
UK CCTV camera manufacturer, 360 Vision Technology, announce that its Predator ‘all-in-one’ PTZ range is now an accredited Vision HS camera solution, certified to have completed the CAPSS approval process by the Center for the Protection of National Infrastructure (CPNI). Ensuring cybersecurity measures are capable of protecting against the very real threats faced by surveillance system operators, 360 Vision Technology’s team of software developers is constantly working to ens...
Boon Edam Inc., a global provider of security entrances and architectural revolving doors, is proud to announce that a revived office building in London, 40 Lime Street, has installed an all-glass Crystal TQ revolving door at the main entrance, in addition to two sets of Speedlane Slide optical turnstiles for increased lobby security. Environmental and Security Concerns 40 Lime Street is an investment and reinvestment company that has served the London market since 1985. It sits among some hig...
Managing keys and high value assets can now be used seamlessly within centralized management platforms, following the integration of Maxxess eFusion with Traka from ASSA ABLOY Global Solutions, globally renowned provider of intelligent management solutions for keys and equipment. Traka solutions “With Traka solutions globally deployed in many market sectors such as critical infrastructure, retail, logistics, hospitality and corporate environments - and increasingly integrated with access...
Maxxess Systems, a provider of event response management and collaboration systems, is pleased to announce the integration of OpenEye Web Services (OWS) with Maxxess eFusion security management software. eFusion is presently installed in thousands of facilities around the globe enabling security personnel to more precisely monitor and assess potential and emerging threats, and quickly respond to emergencies. This new integration enables the Maxxess monitoring software to retrieve video from Ope...
SureCloud, the provider of cloud-based, Integrated Risk Management solutions and Cybersecurity and Risk Advisory services, has appointed Paul Zeila as Vice-President of GRC Sales for EMEA. He will be instrumental in driving business growth and developing service lines, as well as having overall responsibility for SureCloud’s suite of GRC products. Paul brings nearly 20 years of experience working in the GRC space with global organizations such as IBM, ACL, SAP and most recently, Deloitte....
360 Vision Technology, globally renowned UK-based CCTV manufacturer, has announced that they will showcase their latest range of high-performance surveillance cameras on the Nukleas Integrated Security Solutions booth, Sheikh Saeed 2, G35, at Intersec 2020, 19-21 January, Dubai. ‘TX’ video transmission cameras For those looking for a reliable 3G/4G/LTE ‘wireless’ camera video solution, 360 Vision will be showing the ultimate performance Predator, Invictus and lightweigh...
News
ProdataKey (PDK), manufacturer of the cloud access control platform built for cellphone, announced that its revolutionary “touch io” Bluetooth reader is now shipping. When installed as part of a pdk io access control system, the new readers allow users who have installed a cellphone credential on their smart phone to enter a controlled door by simply touching their hand to the reader, making it the most convenient cellphone solution on the market. There’s no need to unlock the smartphone, or even remove it from a pocket or purse. For employees preferring not to use cellphone credentials, the readers are also compatible with traditional key cards and fobs. Unlike other Bluetooth offerings, the touch reader differentiates between the use of an electronic credential and encrypted Bluetooth authentication, providing a record of presented credential type to the pdk io system’s events log. Access control door readers Individual’s identity is validated through communication directly between his or her credentialed device and the reader This capability allows administrators to limit use of cellphone credentials to certain times of day, and can assist in actively identifying misuse or sharing of cards or fobs between employees. In addition to superior convenience, the touch io brings enhanced levels of security for the communication between smart phones and access control door readers. The individual’s identity is validated through communication directly between his or her credentialed device and the reader, via Bluetooth, bypassing the need for internet or cellular connectivity. A combination of machine-learning algorithms that learn door opening patterns, combined with directional antennae placed on each side of controlled doorways, ensure that credentials are not inadvertently validated when employees pass in proximity to the doors from the unlocked side. Smartphone credentialing solutions cellphone credentialing is available as part of the pdk io affordable system licensing plan, offering users an unlimited number of credentials for a low, per reader, annual subscription. System administrator can easily generate and assign these to employees with just a few clicks from within the pdk io software management interface. “The release of our touch io Bluetooth Readers provides PDK dealers with a tremendous competitive advantage in their ability to offer customers a cellphone credentialing option that redefines the product category,” said Cory Jackson, VP of Strategic Sales at ProdataKey. “Quite frankly, many earlier smartphone credentialing solutions have not delivered the convenience they were designed to deliver; employees ultimately found it easier to carry a fob than fumble with a phone. Touch io delivers on the promise of a truly seamless, effortless user experience.”
Integrated security systems manufacturer, TDSi will be joining its Vitaprotech Group partner, SORHEA on stand SA-N37 at Intersec 2020 in Dubai, from 19th-21st January 2020, where it will be unveiling and launching an exciting new GARDiS product. TDSi’s Managing Director, John Davies commented, “We are very excited to be launching a new product at Intersec 2020. Vitaprotech’s Acquisition of TDSi has enabled the acceleration of some product development projects in our pipeline. This product had been earmarked for a late 2020/early 2021 release but work on this has been accelerated thanks to additional resources from the Group and we will now be launching 12 months ahead of plan. The main focus of this development has been to ensure time and cost saving for our installer partners in order to enhance their profitability and deliver state of the art access control to their clients.” TDSi range of integrated security solutions The Dubai event in January 2020 will be TDSi’s first shared exhibition stand with a Vitaprotect Group Joining John on Stand SA-N37 in Dubai will be TDSi’s Business Development Manager, Mica Negrilic and TDSi's Senior Export Technical Support Engineer, Kevan Fry. John continued, “Mica, Kevan and I will be on hand to give products, sales and technical advice on the new product and the wider TDSi range of integrated security solutions. We are keen to speak to security installers, systems integrators and end users about their requirements and specific security needs.” The Dubai event in January 2020 will be TDSi’s first shared exhibition stand with a Vitaprotect Group partner since the company announced its acquisition by the Group in June 2019. John added, “We are excited to be appearing at Intersec with SORHEA, whose perimeter intrusion detection systems offer a perfect complementary solution to our integrated access control solutions. We are looking forward to meeting new and existing partners and customers at the event and to introducing the enhanced offering we now provide as Vitaprotech Group members.” Intersec 2020 Intersec is a globally renowned trade fair for security, safety & fire protection, with an influence that has spread not only across the Middle East, Africa and the Indian subcontinent but also attracts visitors and interest from well beyond. Last year’s event drew 34,800 visitors (20% up on the previous year) from 135 countries to meet with more than 1,200 exhibitors. John concluded, “Intersec is always an exciting introduction to a year ahead in security and Dubai is the perfect location for visitors to attend from across the Middle East and beyond. If you are visiting the event, why not come to Stand SA-N37 to meet our friendly team and get an exclusive look at our newest product.”
ExtraHop, globally renowned provider of cloud-native network detection and response solutions, has announced a new integration with Amazon Web Services (AWS) that automates the isolation of compromised Amazon Elastic Compute Cloud (EC2) instances and empowers security operations teams to create a wide range of customizable response automations, from quarantining and blocking to ticketing and tagging. ExtraHop Reveal(x) Cloud Alongside the new automation capability, ExtraHop Reveal(x) Cloud offers continuous packet capture in AWS Alongside the new automation capability, ExtraHop Reveal(x) Cloud now offers continuous packet capture in AWS. That reduces the amount of time, effort, and money required to perform packet-level analysis while providing security teams with the forensic detail they need to get to root cause or to fulfill chain-of-custody requirements. Response automation is considered the Holy Grail for many security operations, allowing teams to snuff out threats before they further infiltrate or damage the organization. But when done at a tool level instead of a system level, response automation too often results in devices being quarantined or systems being shut down based on unreliable data or incomplete information. ExtraHop integration with AWS Lengthy investigation time compounds the challenge, leaving critical systems idle until the threat can be remediated, and potentially resulting in business downtime and lost revenue. The latest ExtraHop integration with AWS brings precision to both response automation and investigation workflows in the cloud. The AWS quarantine integration combines high-fidelity detections from Reveal(x) Cloud with AWS security group policies to automatically quarantine compromised EC2 instances, enabling timely and targeted response. Streamline investigations in cloud and hybrid environments Security teams can also modify the trigger, or write a new trigger, to take different actions when detection violates policies. With right-sized continuous packet capture, Reveal(x) Cloud takes an analytics-first approach to investigation, allowing security operations teams to go from detection to associated packets in a matter of clicks, keeping investigations fast and focused. Reveal(x) Cloud also includes new features that streamline investigation in cloud and hybrid environments, enabling analysts to rapidly identify and respond to the highest priority threats. 1G, 5G, and 10G SaaS offerings with Continuous Packet Capture within AWS environments support streamlined and guided investigation for any incident. Customers can begin purchasing the Reveal(x) Cloud PCAP for AWS offering in early 2020. Related Detections reduce response time by automatically surfacing similar threats across architectures in a Reveal(x) Cloud investigation workflow. This provides SecOps teams with a unified view of attack patterns happening in the environment. Enhanced reporting capability provides executive-level overviews of security posture at the touch of a button. Reports zero in on critical threats while also delivering high-level insight into compliance across hybrid and cloud environments. Advanced visibility and detection “Though AWS supports strong controls, companies are responsible for securing their own workloads, which is a daunting task with the current cyber security skills shortage and nascent cloud security market,” said Jesse Rothstein, CTO and co-founder, ExtraHop. Jesse adds, “Our Reveal(x) solution provides SecOps teams with advanced visibility, detection, and response for hybrid environments. We are constantly working to expand our capabilities, and this integration with AWS is another step towards winning the arms race in enterprise security.”
MedixSafe, a pioneer in the access control cabinet market, announces that its Key Access Ready Enclosure (KARE) key control cabinets are now available with Bluetooth format card readers. This wireless technology enables users to access their KARE cabinets using their cellphone devices as their access credential, while still offering the high level of security synonymous with MedixSafe’s solutions. Polymer swing handle lock Each key tag easily snaps open so that names and/or numbers of keys can be inserted With the latest addition of this Bluetooth technology, KARE is now available in three different technologies to achieve access – HID, Multi-Class and Bluetooth format card readers – with a key override built right into the electronic lock. The KARE reader features a Wiegand output that can be connected to any access control panel. Much more than merely a place to store keys, it gives the user control over their keys by limiting access to authorized users only and knowledge of who has accessed keys and when. The KARE key cabinets come in three sizes: (48-56 Keys) 16"H x 13.5"W x 4.5"D, (12-24 Keys) 10"H x 10"W x 4.5"D, and (192-224 Keys) 36"H x 14"W x 9"D. Each enclosure has a polymer swing handle lock and allows users to use their existing cards or phone. Access to the KARE cabinet is then controlled by the user’s existing access control database. Bluetooth-enabled Cellphone readers Included are key tag holders that can hold multiple keys or a set of keys. Each key tag easily snaps open so that names and/or numbers of keys can be inserted. When a different key is placed on the tag, a new label can easily be printed and installed. An Excel template that allows fonts and sizes to be customized is included for printing labels. "MedixSafe is dedicated to providing the very best in key control," says Jim Turner, President, MedixSafe. "Our KARE cabinets with Bluetooth-enabled cellphone readers are an ideal choice for users who prefer to use their smartphones as their cellphone access credential.”
SureCloud, the provider of cloud-based, Integrated Risk Management solutions, has been placed on Gartner’s Magic Quadrant for IT Vendor Risk Management Tools for the first time after being recognized on Gartner’s Magic Quadrant for Integrated Risk Management Solutions back in July 2019. The quadrant names 16 key solution vendors identified by Gartner as offering vendor risk management (VRM) solutions. VRM solutions enable organizations to accurately ascertain the security and compliance risks associated with their IT third-parties, creating a centralized register of these parties and integrating this with wider risk management processes. Highly configurable software-As-A-Service We think it underlines our ability to offer a truly comprehensive third-party risk management solution" Richard Hibbert, CEO and Co-Founder at SureCloud, said: “We are delighted that SureCloud has been included in the Magic Quadrant for IT Vendor Risk Management Tools; we think it underlines our ability to offer a truly comprehensive third-party risk management solution.” “Our flexible, scalable and highly configurable software-as-a-service (SaaS) delivery model, combined with managed service options, is proving particularly attractive to organizations looking to build a robust, central view of their vendor assurance program.” Security and risk management Third-party risk management is a vital part of any organization’s cybersecurity posture, with many third parties having access to highly sensitive data and offering criminals a potential route into their organizations. Demonstrating a clear awareness of each third party’s approach to security and risk management is also an increasingly significant element of privacy regulations such as the GDPR. In response, SureCloud’s Vendor Risk Management solution is designed to offer a smooth and scalable means for organizations to assess and review all their IT third party vendors for potential risks. IT risk management processes The SureCloud Vendor Risk Management solution offers: A centralized register of all third-party IT vendors, giving a holistic view of risk A dynamically generated risk-assessment for each third party, ensuring they are only asked questions which apply to them Automated third party notifications and response reporting. Full integration with wider IT risk management processes and data privacy programs.
Meesons, UK’s entry control innovator, will be unveiling its innovative EasyGate Superb at this year’s International Security Expo (ISE19), Olympia London, 3-4 December, stand K40. At 99mm the EasyGate Superb cabinets are the slimmest of any Speed Gate on the market, accentuating the sleek, minimalistic aesthetics created by the glass wings. EasyGate Superb is an ultra-slim, fully customized Speed Gate that is an ideal solution for controlling access to offices, schools, universities or government buildings. The range includes unique and innovative features, including an optional integrated card collector and QR code/ barcode reader. EasyGate Superb can be specified in colors to match a customer’s corporate identity. Its ultra-slim design has already generated significant interest and Meesons is predicting that it will continue to be a major focal point for visitors to stand K40 at ISE19. Gain independent access The EasyGate Superb is the only Speed Gate on the market with such a slim design yet featuring the ability to integrate an optional card collector with a card return function. Where required, a third-party card reader can be built into the EasyGate Superb. The QR scanner, another optional feature, will help improve the efficiency of visitor management - it will be possible for an external visitor to receive a QR code on their cellphone phone, allowing unimpeded entry to the facility on arrival without having to verify credentials. The QR code reader can also be used by delivery partners where there isn’t a permanently staffed reception. Sending the QR code in advance will mean they are able to gain independent access to specific areas of the facility. Intuitive light guidance The sensors are smart enough to detect when a person is traversing in a wheelchair, wheeling luggage or pushing a baby carriage Both the QR scanner and card collectors are an integral part of the design, meaning they don’t need to increase the cabinet width or be a bolt on like other ranges. This helps maintain sightlines of the ultra-slim cabinets, which are supplied in brushed, polished or bronzed stainless steel, any RAL color or alternative surface finishes, along with tempered glass top lids. Other optional functionality of the EasyGate Superb range includes intuitive light guidance; colored LED illumination of the top lid allows smart settings of light navigation. In addition to standard navigation functions, various lighting effects such as arrow, dots, blending colors and much more can be set. The selection of colors is fully customizable. Safety and security Jonathan Bairam, Commercial Director at Meesons A.I. Ltd, said: “We will have our new EastGate Superb in sleek white on display at ISE19 on 3-4 December. Visitors will be able to view and try this unique new product for themselves. We are expecting a lot of interest especially as its ultra-slim design and minimalistic aesthetic will appeal to specifiers and their clients in a wide range of sectors.” Safety and security are built into EasyGate Superb with 24 pairs of IR sensors that prevent people tailgating their way into a facility without presenting the correct ID or security tag. The sensors are smart enough to detect when a person is traversing in a wheelchair, wheeling luggage or pushing a baby carriage. Optional high glass wings prevent climb-over attempts by would-be intruders.


Expert commentary
Insider threat programs started with counter-espionage cases in the government. Today, insider threat programs have become a more common practice in all industries, as companies understand the risks associated with not having one. To build a program, you must first understand what an insider threat is. An insider threat is an employee, contractor, visitor or other insider who have been granted physical or logical access to a company that can cause extensive damage. Damage ranges from emotional or physical injury, to personnel, financial and reputational loss to data loss/manipulation or destruction of assets. Financial and confidential information While malicious insiders only make up 22% of the threats, they have the most impact on an organization Most threats are derived from the accidental insider. For example, it’s the person who is working on a competitive sales pitch on an airplane and is plugging in financial and confidential information. They are working hard, yet their company’s information is exposed to everyone around them. Another type of insider, the compromised insider, is the person who accidentally downloaded malware when clicking on a fake, urgent email, exposing their information. Malicious insiders cause the greatest concerns. These are the rogue employees who may feel threatened. They may turn violent or take action to damage the company. Or you have the criminal actor employees who are truly malicious and have been hired or bribed by another company to gather intel. Their goal is to gather data and assets to cause damage for a specific purpose. While malicious insiders only make up 22% of the threats, they have the most impact on an organization. They can cause brand and financial damage, along with physical and mental damage. Insider threat program Once you determine you need an insider threat program, you need to build a business case and support it with requirements. Depending on your industry, you can start with regulatory requirements such as HIPAA, NERC CIP, PCI, etc. Talk to your regulator and get their input. Everyone needs to be onboard, understand the intricacies of enacting a program Next, get a top to bottom risk assessment to learn your organization’s risks. A risk assessment will help you prioritize your risks and provide recommendations about what you need to include in your program. Begin by meeting with senior leadership, including your CEO to discuss expectations. Creating an insider threat program will change the company culture, and the CEO must understand the gravity of his/her decision before moving forward. Everyone needs to be onboard, understand the intricacies of enacting a program and support it before its implemented. Determining the level of monitoring The size and complexity of your company will determine the type of program needed. One size does not fit all. It will determine what technologies are required and how much personnel is needed to execute the program. The company must determine what level of monitoring is needed to meet their goals. After the leadership team decides, form a steering committee that includes someone from legal, HR and IT. Other departments can join as necessary. This team sets up the structure, lays out the plan, determines the budget and what type of technologies are needed. For small companies, the best value is education. Educate your employees about the program, build the culture and promote awareness. Teach employees about the behaviors you are looking for and how to report them. Behavioral analysis software Every company is different and you need to determine what will gain employee support The steering committee will need to decide what is out of scope. Every company is different and you need to determine what will gain employee support. The tools put in place cannot monitor employee productivity (web surfing). That is out of scope and will disrupt the company culture. What technology does your organization need to detect insider threats? Organizations need software solutions that monitor, aggregate and analyze data to identify potential threats. Behavioral analysis software looks at patterns of behavior and identifies anomalies. Use business intelligence/data analytics solutions to solve this challenge. This solution learns the normal behavior of people and notifies security staff when behavior changes. This is done by setting a set risk score. Once the score crosses a determined threshold, an alert is triggered. Case and incident management tools Predictive analytics technology reviews behaviors and identifies sensitive areas of companies (pharmacies, server rooms) or files (HR, finance, development). If it sees anomalous behavior, it can predict behaviours. It can determine if someone is going to take data. It helps companies take steps to get ahead of bad behavior. If an employee sends hostile emails, they are picked up and an alert is triggered User sentiment detection software can work in real time. If an employee sends hostile emails, they are picked up and an alert is triggered. The SOC and HR are notified and security dispatched. Depending on how a company has this process set-up, it could potentially save lives. Now that your organization has all this data, how do you pull it together? Case and incident management tools can pool data points and create threat dashboards. Cyber detection system with access control An integrated security system is recommended to be successful. It will eliminate bubbles and share data to see real-time patterns. If HR, security and compliance departments are doing investigations, they can consolidate systems into the same tool to have better data aggregation. Companies can link their IT/cyber detection system with access control. Deploying a true, integrated, open system provides a better insider threat program. Big companies should invest in trained counterintelligence investigators to operate the program. They can help identify the sensitive areas, identify who the people are that have the most access to them, or are in a position to do the greatest amount of harm to the company and who to put mitigation plans around to protect them. They also run the investigations. Potential risky behavior Using the right technology along with thorough processes will result in a successful program You need to detect which individuals are interacting with information systems that pose the greatest potential risk. You need to rapidly and thoroughly understand the user’s potential risky behavior and the context around it. Context is important. You need to decide what to investigate and make it clear to employees. Otherwise you will create a negative culture at your company. Develop a security-aware culture. Involve the crowd. Get an app so if someone sees something they can say something. IT should not run the insider threat program. IT is the most privileged department in an organization. If something goes wrong with an IT person, they have the most ability to do harm and cover their tracks. They need to be an important partner, but don’t let them have ownership and don’t let their administrators have access. Educating your employees and creating a positive culture around an insider threat program takes time and patience. Using the right technology along with thorough processes will result in a successful program. It’s okay to start small and build.
The jury is in: traditional security is out — and it’s being replaced with service-based solutions. The bottom line is: if you’re not embracing it, you’ll soon be left behind. XaaS — the collective term referring to the delivery of anything as a service — includes all services made possible through the use of the cloud. Security-as-a-Service (SaaS), which encompasses any type of system from access control to video surveillance, has paved the way for users to gain significant functionality and scalability not previously experienced with more traditional methods. Complicated IT functions SaaS allows manufacturers to provide numerous benefits to their customers As such, there is a marked transition for manufacturers from simply designing and building products to providing a service rooted in a partner- and customer-centric focus. This change hasn’t come easily. Some are still holding out and waiting for the “fad” to pass. However, the potential advantages for all parties involved far outweigh the perceived negative points. First and foremost, SaaS allows manufacturers to provide numerous benefits to their customers. An “as-a-service” model shifts the burden of data maintenance and infrastructure spending to an integrator/dealer partner or service provider. This relieves the end user of the expertise necessary to implement complicated IT functions to keep networked and on-premise solutions up-to-date. Traditional security systems Additionally, end users demand solid customer service. For some end users, traditional security systems are so similar in features and functionality that the key differentiator is the ability of the integrator or manufacturer to provide exceptional customer service and training. This is made possible through the service-based model, where customers appreciate a strong relationship with their integrator or manufacturer that provides them with additional knowledge and assistance when necessary. The cloud has proven to be highly functional, flexible, and convenient for organizations Everyone also wants convenience. In the consumer market, we invest in things like meals that are pre-measured, prepped, and ready to be cooked, or companies that auto-ship dog food to our door each month. This ease-of-use translates over to the B2B market, where time is money and systems that save valuable resources are highly regarded. The Role of the Cloud The cloud has proven to be a highly functional, flexible, and convenient method for organizations to leverage as part of their strategies to protect and modernize their facilities. And the service-based nature lends itself well; forward-thinking integrators and dealers can diversify their product arsenal while still capitalizing on a recurring monthly revenue model (RMR). But then why has there been so much resistance to this change? Over the last 10 to 15 years, the cloud has gotten a bad rap for a myriad of reasons, including usability, management, and unreliability. However, that view of the cloud is changing for the positive as the technology becomes more advanced and innovators learn more about what it means to design a product or service with security at its core. "As-a-service” platform For example, one of the biggest misconceptions that plagues the cloud is the idea that it is not secure. However, the security of public cloud service providers is integral to their success because their business depends on it. Developing an ongoing and trustworthy relationship with customers can only be made possible through the assurance that their services are safe and the customer’s data is protected. As such, they’ve embraced the service-based model that is, at its core, the future of the business world as we know it. There isn’t a person, manufacturer, or integrator partner out there today who isn’t somehow touched or influenced by an “as-a-service” platform. And it’s about time the service-based model that leverages the public cloud reaches the masses.
Today, the world is connected like never before. Your watch is connected to your phone, which is connected to your tablet and so on. As we’ve begun to embrace this ‘smart’ lifestyle, what we’re really embracing is the integration of systems. Why do we connect our devices? The simplest answer is that it makes life easier. But, if that’s the case, why stop at our own personal devices? Connection, when applied to a business’ operations, is no different: it lowers effort and expedites decision making. Integrating security systems Systems integration takes the idea of connected devices and applies it to an enterprise Systems integration takes the idea of connected devices and applies it to an enterprise, bringing disparate subcomponents into a single ecosystem. This could mean adding a new, overarching system to pull and collect data from existing subsystems, or adapting an existing system to serve as a data collection hub. Regardless of the method, the purpose is to create a single, unified view. Ultimately, it’s about simplifying processes, gaining actionable insights into operations and facilitating efficient decision-making. Although integration is becoming the new norm in other areas of life, businesses often opt out of integrating security systems because of misconceptions about the time and resources required to successfully make the change. So, instead of a streamlined operation, the various security systems and devices are siloed, not communicating with each other and typically being run by different teams within an organization. Time-Intensive process When systems are not integrated, companies face a wide range of risks driven by a lack of transparency and information sharing, including actual loss of property or assets. For example, a team in charge of access control is alerted to a door being opened in the middle of the night but can’t see what exactly is taking place through video surveillance. Without integrated systems they have no way of knowing if it was a burglar, an equipment malfunction or a gust of wind. Without integration between systems and teams, the ability to quickly put the right pieces in front of decision makers is missing. Instead, the team would have to go back and manually look for footage that corresponds with the time a door was open to figure out which door it was, who opened it and what happened after, which can be a time-intensive process. Integrating access control and surveillance systems Theft and vandalism occur quickly, meaning systems and users must work faster in order to prevent it This slowed response time adds risk to the system. Theft and vandalism occur quickly, meaning systems and users must work faster in order to prevent it. Security systems can do more than communicate that theft or vandalism occurred. Properly integrated, these systems alert users of pre-incident indicators before an event happens or deter events altogether. This gives teams and decision makers more time to make effective decisions. Integrating access control and surveillance systems allows for a more proactive approach. If a door is opened when it’s not supposed to be, an integrated system enables users to quickly see what door was opened, who opened it and make a quick decision. Integrated solutions are more effective, more efficient and help drive cost-saving decisions. Ideally, companies should establish integrated solutions from the start of operations. This allows companies to anticipate problems and adjust accordingly instead of reacting after an incident has occurred. Security camera system Although starting from the beginning is the best way to ensure comprehensive security, many companies have existing security systems, requiring integration and implementation to bring them together. Typically, companies with established security systems worry about the impact to infrastructure requirements. Is additional infrastructure necessary? How and where should it be added? What financial or human resources are required? These concerns drive a mentality that the benefits gained from an integrated solution aren’t worth the costs of implementation. Thankfully, this is becoming less of a problem as security providers, like Twenty20™ Solutions, work to offer adaptable solutions. With flexible options, operators don’t worry about adding or replacing infrastructure to align with a provider’s model. This allows users to monitor camera footage and gate traffic from one system If a company has an existing security camera system, but identifies a need for access control, a modern integrated solution provider can supply the gates for access points and equip the gates and cameras with the technology to connect the two. This allows users to monitor camera footage and gate traffic from one system. This model also spares operators additional costs by using a sole vendor for supplemental needs. Overall management of security While a single, unified system is beneficial for cost saving, it can also help the overall management of security. The ability to view all operating systems in one dashboard allows security personnel to manage a site from any location, reducing the expense and effort required to manage a system. The mobile world today means security directors no longer need to be in a centralized operations center to see alerts and make decisions. This simplifies processes by allowing users to quickly see an alert, pull up a camera, delete a user or check an access log from a phone. Modern networks are secure and accessible to those with permissions, without requiring those users to be physically present. Consolidating security systems is the first step companies can take toward streamlining work, information and costs. The next step is integrating all sites, both remote and on-grid. Energy and communication technology The integration of sites and systems turns mountains of data and information into actionable intelligence Traditional methods demanded two systems: one for on-grid facilities and another for off-grid locations. With advancements in energy and communication technology, the need for multiple systems is gone. Data from remote sites can be safely and securely fed into an existing system. These remote locations may gather, distribute and manage data in a different manner than a connected system due to the cost of transmission via remote connections (i.e., cellular or satellite connection). The end result, however, is a consistent and holistic view of operations for the decision maker. The integration of sites and systems turns mountains of data and information into actionable intelligence. With connected devices monitoring occurrences at individual sites, as well as events across locations, the data tells a story that is unhindered by operational silos or physical space. Identifying patterns and trends Instead of providing 10 hours-worth of footage that may or may not be relevant, system analytics can provide users with the specific set of information they need. Incidents once discarded as ‘one-off’ events can now be analyzed and data-mapped to identify patterns and trends, directing future resources to the most critical areas first. Consumers are increasingly expecting everything they need to be right where they need it – and businesses are right behind them. The current generation of security professionals are increasingly expecting the simplicity of their everyday personal tasks to be mirrored in enterprise systems, which means giving them the ability to see what matters in one place. A unified system can provide just that, a single view to help simplify processes, promote cost saving and accelerate decision making.
Security beat
Gallagher Security, a division of Gallagher Group, a privately-owned New Zealand company, is a global presence in integrated access control, intruder alarm and perimeter security solutions. Gallagher entered the global security industry in the 1990s with the purchase of security access control business Cardax. In the last several decades, the company has leveraged its experience in electric fence technology to develop a variety of innovative solutions used to protect some of the world's most high-consequence assets and locations. Solving business problems Among Gallagher’s recent innovations is the Security Health Check, a software utility that enables customers to run an automated check on their Gallagher Command Centre security system. To get an update on the company, we interviewed Richard Huison, Gallagher’s Regional Manager for the U.K. and Europe, who says he has a passion for technology and solving business problems. Huison says working in the industry for more than 20 years has shown him you can never stop evolving and adapting. Q: What are Gallagher's points of differentiation versus competitors? Huison: Gallagher’s strengths are in solving business problems outside of the normal access control and intrusion detection solutions. Enforcing company policy through compliance and competency is what really matters to business continuity. Using Gallagher Command Centre to oversee the security, health and safety and compliance brings true business value to the client who benefits from reduced costs and risk to the success of their growth and strategy. Q: What is the biggest challenge for customers in the security market, and how does Gallagher help to meet that challenge? Huison: A great solution fit is key. Where most fail is choosing a solution that does not meet the needs of the client in 10 to even 20 years’ time. As businesses evolve and grow, so must the security solution. In a recent conversation, a client had to replace a 300-door access control system that was no longer supported. ‘Why Gallagher?’ they asked. The answer: ‘If you had chosen Gallagher 10 years ago, we would not be having this conversation.’ Ensuing the system you choose is legacy-compliant is king. Gallagher’s brand is well known for protecting Critical National Infrastructure Q: Please describe Gallagher's geographic presence in the UK and Europe. Huison: Gallagher’s brand is well known for protecting Critical National Infrastructure. They choose to adopt our solutions because we meet the highest levels of resilience against cyber-attacks. Our ability to modernize legacy systems ensures the maximum return on investment with minimal disruption to business continuity. Gallagher solutions cover a broad mix of verticals, with strengths in high security, education and large corporate entities. Our Channel Partner network is continually growing so more clients can benefit from the diverse and powerful Gallagher Command Centre software. Q: Describe how Gallagher is typically integrated into larger systems. Huison: Our systems offer the flexibility of being standalone or globally networked via our Multi-Server environment. Most integration happens logically where data is pushing into our Command Centre database. The single point of truth allows for minimal data errors and efficiencies around manual input. The total cost of ownership is greatly reduced in allowing the system to work for the client and not the other way round. Over and above this, Integration into other solutions brings that rich data back to one software front end. Q: What is Gallagher's biggest challenge and how will the company seek to meet that challenge? Huison: Our biggest and continual opportunity is being a relentless innovator. We are not short of ideas and how we are bucking the trends with our solutions. Broadcasting these messages is not always easy in the digital age. This is why Gallagher is investing heavily in more shows, publications and specific vertical conferences globally. Q: What is the market's biggest misconception about Gallagher? Huison: Our brand is known for perimeter solutions with our monitored Pulse Fence. What many forget is we have a very powerful access control and integrated intrusion detection solution that meets Government standards around the world. We are unique in that all three can be controlled via one software platform that is cyber-resilient and infinitely configurable to suit many verticals. Q: What is your message to the security market? Huison: Many see Gallagher as only suitable for large and complex sites. I openly challenge our audience, speak to us and you may find we can provide an Enterprise Level solution that is delivered on budget and provide an outstanding return on investment for the client. Our pedigree of 80 years shows we never stop innovating and building that trusted advisor status with many lifelong clients.
The success of smart homes began with professional security providers offering bundled packages, focused mostly on security monitoring. However, due to the cost of professional contracts, consumers began to embrace the do-it-yourself (DIY) approach. Despite the challenges and opportunities that come with professional and DIY approaches, the momentum of smart home growth depends on these two approaches working symbiotically. Smart home systems In 2017, there were about 122 million smart home devices shipped globally, according to IHS Markit. The retail channel represented about 62 percent of all device shipments in 2017 and will represent about 70 percent in 2021. Despite the increased demand for professional installation, the “do-it-for-me” approach, most the volume remains with ad-hoc purchases. This includes a consumer video camera or a smart thermostat purchase from a retailer. Data capture form to appear here! When a consumer wants to add devices to an existing professionally installed system, they often will buy products from retail. Flexible service offerings and pricing are already taking shape across smart home offerings. DIY installed smart home systems such as Scout Alarm already offer no contract monitoring. Professional monitoring companies are already offering no contract pricing, and providers such as Comcast are looking to pilot programs for just video monitoring, bundled with Internet for a low monthly fee. Home automation system Connected smart locks can actually act as an extension of a smart hub or controller Options for financing are also going to become commonplace. Smart home equipment is expensive, even when attempting to outfit a modest size home (2,500 square feet). Immediate access to services is becoming more critical. This means consumers should be able to access on-demand service options directly from a mobile device to activate or deactivate professional monitoring. Lastly, pricing still needs to come down for many smart home devices, but there is a threshold. For example, the sale of wireless, connected smart locks (viewed by some consumers as DIY) can lead to opportunities for further home automation product sales and professional installations. Connected smart locks can actually act as an extension of a smart hub or controller. They can be used to communicate wirelessly with and control all the devices that make up a home automation system, including lighting, entertainment, thermostats, air, alarms, shades and more. Residential security According to a 2018 Residential Security Market Report prepared by Parks Associates, “More than 60% of installing dealers now report that DIY systems are biting into demand for their services.” But the rise in DIY is not entirely bad news for security and home automation installers and dealers. There are a number of ways to view this glass as half-full. For example, with their lower cost and perceived ease of installation, DIY products have broken down barriers for additional purchases. There are reasons for dealers and installers to be cheerful about the rise of DIY. For one thing, according to that same Residential Security Market Report from Parks Associates, residential security dealers are doing quite well. The report states, “In 2017, revenues were up an average 7.72% for security dealers.” Full-time monitoring DIY products have broken down barriers for additional purchase and installation of professionally installed systems What about installations? The report goes on to say, “For 2017, the average number of installs per dealer was 22 per month, compared to 17 per month in 2016.” So, revenues are up for security dealers, and at least part of the reason can be attributed to the fact that DIY products can raise overall awareness of and spur interest in other home automation and security products. With their lower cost and perceived ease of installation, DIY products have actually broken down barriers for the additional purchase, and installation, of complete, professionally installed systems. Instead of paying for monthly monitoring, homeowners can install a web cam, access from a smartphone or tablet and essentially do their own security monitoring. The downside of this approach is readily apparent. Without full-time monitoring, homeowners can easily miss the break-in or the aged parent who falls and can’t get up. Near-field communication Until they log on and take a look, there’s no central station to send medical aid or call the police. Connecting door locks and other devices to the Internet can also open a door to hackers, if the infrastructure isn’t properly protected. The areas of consumer electronics and security are closely intertwined. For example, Apple recently expanded near-field communication (NFC) support to include the NDEF (NFC Data Exchange Format), which will likely accelerate the adoption of smartphones for access control credentialing. In another recent development, Amazon acquired Blink, a home security camera startup that offers wireless home security systems. The acquisition aligns with Amazon’s effort to offer more home devices. A common theme among professional monitoring providers is that a homeowner who is aware of events happening in the home does not necessarily have a secure and protected household Traditional security features For example, a Nest camera, a DIY product, notifies a consumer via smartphone about events in the home when it detects motion, but only when the notification is opened and identified will a consumer be able to act on the related event. Self-installable smart home devices may resonate with a segment of the market that want security but are unwilling to adopt professional monitoring; however, providers can leverage these devices to enhance traditional security features and communicate the value of professional monitoring. Missed part one of our smart home mini series? Read it here.
Qumulex is a new startup with a mission to provide physical security integrators a transition path to embrace the technology of the cloud and a subscription-based business model. Qumulex’s products seek to provide capabilities to embrace the cloud without an integrator having to turn their back completely on the ‘transactional revenue’ of installing new systems. As the transition happens, Qumulex offers a product line that supports any mix of systems from on-premises to the cloud. The flexible deployment model – enabling a cloud installation, an on-premise installation or any combination – is one of the ways Qumulex seeks to differentiate itself in the market. Installing fully on-Premise system The Qumulex cloud-based platform uses a gateway device located on-premises to which local cameras are connected The system is designed so that an integrator can install a fully on-premise system and then later ‘flip a switch’ and transition to a cloud model, says Tom Buckley, VP Sales and Marketing. The Qumulex initial 1.0 system launch is currently entering its final beta test. Full commercial availability is expected in the first quarter of 2020, which the company will highlight in a bigger 20x20 booth at ISC West next year. The Qumulex cloud-based platform uses a gateway device located on-premises to which local cameras are connected. Ensuring cybersecurity, the gateway provides a ‘firewall’ of sorts to avoid any cybersecurity threat from entering an enterprise through a vulnerable IP camera. The system is designed to be ‘cloud-agnostic’ and to work with any public or private cloud, using Docker software and ‘containers,’ a standard unit of software that packages code and all its dependencies so an application runs quickly and reliably from one computing environment to another. At launch, the Qumulex system will use the Google cloud. Greater situational awareness The open platform approach will enable users to assemble best-of-breed solutions Another point of differentiation for the new platform is a unified access control and video surveillance environment – both are part of the same program. Access control can drive video events and vice versa for greater situational awareness. A unified system avoids having to integrate separate systems. A big emphasis for Qumulex is ease of use. They have designed the user interface to be as simple and intuitive as possible, using consumer-oriented systems such as Nest and the Ring Doorbell as a model of simplicity. Finally, the open platform approach will enable users to assemble best-of-breed solutions. Keeping it simple, the system offers native integration with only the major camera manufacturers that represent most of the market: Axis, Hanwha, Arecont, Panasonic, Vivotek and Sony. Longer-Term storage Other cameras can be included using the ONVIF interface. On the access control side, the system will initially be compatible with Axis door controllers, Allegion wireless door locks and ASSA ABLOY Aperio wireless door locks. Future versions of the software will seek to integrate HID Edge and Vertx and eventually Mercury panels. The gateway device may incorporate only a solid-state drive (SSD) for buffering Qumulex is taking a ‘mobile-first’ approach. The software is designed as a ‘progressive web app,’ which means is it is adaptable to – and fully functioning in – any smart phone, mobile device, laptop, or on a desktop computer with multiple monitors. The gateway device may incorporate only a solid-state drive (SSD) for buffering, or as many hard drives as the customer wants for storage. Short-term storage is available in the cloud, but local hard drives may be used for longer-term storage which can get expensive given the monthly fees of cloud storage. Using third-Party server To manage the variety of scenarios, Qumulex will offer a line of gateways and recorders, or a customer can use a third-party server along with Qumulex, which is an open system. Qumulex will use a manufacturer’s representative sales model and has already signed up 11 rep firms covering the United States (the initial target of the launch). The company has been spreading the word among integrators, too, first at the ISC West show last spring, when 98 integrators saw demonstrations of the system at a suite in the Palazzo. Another 48 integrators saw the system at ESX in Indianapolis in June. At the recent GSX show in Chicago, Qumulex had a booth on the show floor, where they scanned 450 badges that yielded 176 unique integrators. Entering the physical security market Qumulex just closed a second round of funding, which does not include any ‘institutional’ money Buckley estimates there are around 10,000 total security integrators in the United States that sell products similar to theirs at their price point. They are working to build their database to reach out to those integrators. (Exacq had more than 4,500 dealer/integrators before it was sold to Tyco/Johnson Controls.) Qumulex is the third company to enter the physical security market by the same team that launched two other successful startups in the last 20 years: Exacq Technologies (sold to Tyco in 2013) and Integral Technologies (sold to Andover Controls in 2000). Both previous companies were built around a need to help the integrator community transition to newer technologies. Qumulex just closed a second round of funding, which does not include any ‘institutional’ money. The first round of investment involved only the founders, and the second round added some ‘angel’ investors to the mix. The funding allows more flexibility and control over the company’s timeline and the evolution of the product’s feature set, free of outside mandates, says Buckley.
Case studies
PINs protect, just ask your credit card company. How many rooms at your office shouldn’t offer an open access, free-for-all? Probably quite a few. But expecting everyone to keep them locked, and the key-carrying and-tracking that entails, is unrealistic. This is when you need Code Handle. Access control system This simple, secure, easy-to-fit handle works with your current door lock. There is no need for you to change the door lock mechanism; just replace the existing handle to add PIN security to an office door. With Code Handle, there is no wiring, no expensive access control system and no need for cumbersome physical keys. Two screws fit a Code Handle to almost any interior office, meeting room, archive or storage room door. The inbuilt electronic PIN pad does the security work for you. Press a 4-digit code on the handle’s integrated keypad and the door opens. Code Handle comes with a Master Code and 9 different user PINs, so you can restrict access to a select group of people — senior managers, the IT department or the office cleaners, for example. User-friendly security Code Handle keeps sensitive documents, meeting rooms and personal belongings safe at your workplace Code Handle also locks itself. Auto-locking ensures an office, storage room or staff toilet is always secure when you close the door. You know for sure nobody has seen the new org chart you left on your desk, nor entered the stationery cupboard without authorization. With Code Handle, user-friendly security comes with clean, elegant design. Forget about ugly push-button-and-twist mechanical PIN locks. The low-profile Code Handle is brushed in stainless steel and satin chrome zinc, in a sleek design to blend with any modern office décor. All the security you need is in the handle. Two standard batteries (CR2) slot inside, and typically last for 30,000 lock/unlock cycles before you need to replace them. An indicator tells you when it’s time to change them. Code Handle comes in left- and right-hand versions. fire tested It is fire tested and enables free exit from the inside of a room. Code Handle keeps sensitive documents, meeting rooms and personal belongings safe and secure at your workplace. You can’t lock every room, nor install CCTV everywhere. With Code Handle, you don’t need to.
Ciudad Ros Casares has become one of the most important business parks in Valencia, Spain. It is a unique commercial and residential construction, which responds to the new business and networking requirements. The intercommunication system chosen by the project managers is the MEET IP System from FERMAX, because of its high performance and integration features as well as the security offered by MEET. The system includes integrated access control in the standard panel: facial recognition (up to 6,000 users can be registered), numeric keypad and MIFARE proximity reader. The system includes integrated access control in the standard panel: facial recognition (up to 6,000 users can be registered), numeric keypad and MIFARE proximity reader Residential management software The project has a total of 245 apartments in 2 buildings, with two outdoor panels per building plus a concierge service managed with MEET's residential management software. The chosen outdoor entry panel is the MILO Digital Touch Panel and the 245 apartments are equipped with the MIO 7'' Monitor. The project is equipped with high technological features and qualities of different types, large leisure and green areas, general and specialized services and an excellent geo-strategic location. This commercial condominium includes offices, stores, a business center, spaces built to organizing events and apartments for rent. The installation of Fermax MEET system started in January 2019. Learn more about MEET by Fermax in this video:
Comelit has worked closely with its Gold Partner, MRFS Group at Inspired Living’s flagship Impact House development, to ensure residents in upgraded apartments can experience seamless smart home automation in one all-encompassing solution. Set in Croydon London, Impact House has undergone an extensive program of redevelopment from a largely vacant office building to create 197 contemporary one and two-bedroom micro-flats and 39 larger one, two and three-bedroom apartments, including four exclusive, larger duplex layouts. Comelit smart home automation solutions Comelit’s specialist SimpleHome system incorporates home automation, without compromising style Designed for modern, luxurious urban living, MRFS Group, who has worked closely with award winning Inspired Living on a number of projects from a security perspective, introduced Comelit’s specialist SimpleHome system to the top level apartments at Impact House to incorporate home automation, without compromising style. Adam Tokarski of Inspired Living, said “Impact House has been transformed into a light filled landmark setting for contemporary apartment living. Finished with high specifications throughout, we were keen to ensure the ground-breaking larger and duplex apartments offered the height of luxury.” Smart security Adam adds, “We turned to MRFS Group to advice on an integrated design to present new residents with smart security and home automation. On recommending Comelit’s SimpleHome we initially saw for ourselves its ability to control heating and lighting via the stylish door entry system and supporting app capability. Its flexible design allowed us to work with MRFS to create a bespoke solution for Impact House that was simple to use and finished in a sleek design.” Simplehome smart home automation system Simplehome is Comelit’s smart home automation system, which operates with door entry in one user-friendly integrated solution, providing homeowners with full control of their lighting, heating and ventilation. With an ability to program schedules for up to seven days, Simplehome can be operated remotely using Comelit’s dedicated app, available via smartphone or tablet and connecting to a home router. Ross Wilkins, MRFS Group Director of Projects and Integration added, “When it came to door entry and incorporation of home automation to the 39 top-end apartments, systems had to be considered in line with the change of purpose to the building and how to coordinate installation with minimal cabling requirements." Door entry monitor Using the door entry monitor as a master control unit for Simplehome reduces the wall clutter within each apartment" He adds, “Using the door entry monitor as a master control unit for Simplehome significantly reduced the wall clutter within each apartment. This combined with Simplehome’s control equipment being din rail mountable and very space efficient appealed to Inspired Living, as it allowed maximum footprint to each apartment.” Chris Carroll, Comelit Business Development Manager concluded “Technology continues to play a significant role in our daily life and increasingly driving the demand towards home automation. This is where inspirational developers such as Inspired Living, with the support of our Gold Partner, MRFS Group, are leading the way by integrating facilities such as SimpleHome in apartment offerings." Easy installation He adds, “The professional installation, especially in redevelopment programs such as Impact House, ensures homes can instantly benefit from the convenience and home control factors, without compromising on security or finishing design.”
Often spread over large premises, housing expensive equipment and with a high number of visitors accessing the site every day, care homes face numerous threats. Care home safety and security is a big issue, and ensuring the safety of patients, staff, visitors and assets is a top priority but also a challenge, so by installing access control systems workers are able to easily manage areas around a building. Access control systems can also carry out functions such as time and attendance, staffing level management and parking management. “Access control systems are increasingly being used to enhance safety and security in residential care homes by restricting and monitoring the movement of staff, residents and visitors without impacting on the residents’ everyday lives,” say access control specialists, Nortech. “Installing an effective access control system not only provides a flexible form of security but also one that is bespoke to each individual site.” Importance of access control systems Access control can be anything from hard copy visitor books through to identity cards for doors, gates and vehicle barriers Access control allows staff to manage, control, monitor and restrict the movement of people or vehicles in, out and around an individual site. Access control can be anything from hard copy visitor books through to identity cards for doors, gates and vehicle barriers. Access control systems can be easily installed to ensure that only authorized persons can access specific areas. In more sophisticated facilities, systems can also be used to restrict access to areas that need to be kept separate for the safety of other patients, such as isolation rooms. Access control solutions in care homes Care homes are known to be targets for criminals because they hold valuable goods such as computers and IT equipment and sensitive patient data as well as the personal possessions of staff, visitors and patients. To combat this and deter thieves, a growing number of premises are now installing access control systems to offer instant, flexible protection. One system Nortech can offer is a hands-free access control solution which is both secure and user-friendly. This Nortech system uses Nedap’s uPASS access readers which offer both convenience and security. UHF ID badges and uPASS access readers Each member of staff is issued with a long-range (UHF) electronic ID badge that they carry on a lanyard or clip. The UHF ID badges are automatically read by the uPASS readers at a distance of up to 2m allowing staff access though doors without the need to physically present their ID card to the reader. Two advantages of this hands-free system are that it allows staff to push trolleys or wheelchairs or to carry equipment easily around a care home whilst also avoiding the spread of germs or viruses through constant contact with door handles. Integrating access control system with security solutions Access control systems can work on a small scale for just one door or used as part of a wider security system The ease of integrating access control with other security measures is another reason why the system is so appealing, as access control software enables hospitals and care homes to provide even tougher protection for their sites. The systems are often effectively linked to the likes of CCTV, property marking, perimeter protection or intruder alarms. Access control systems can also work on a small scale for just one door, as well as being used as part of a wider security system. They provide users with a great deal of flexibility according to individual requirements. Enhancing security of hospitals, residential care homes By using access control as a method of security, different authorization levels can be easily set, thereby preventing people from accessing areas they do not have clearance for. New photo ID cards can also be created instantly for new staff or if a replacement is required. Electronic access control systems are increasingly being used to enhance safety and security in hospitals and residential care homes. In these environments, staff often needs to gain access through doors while escorting patients in wheelchairs or beds or when carrying sterile equipment, etc. so hands-free access is the ideal solution. Card-based access control systems Managers, trained staff, ancillary staff, residents and visitors can all be assigned a pass card that will allow them access around the building appropriate to their status. Nortech has supplied products and solutions to the security industry for over 25 years as an independent British company. The company uses extensive experience and expertise to create new security products to fit their clients’ needs and designs everything with the customer in mind.
The stakes are higher when it comes to hospital security. Patients expect and deserve privacy and safety. Yet a hospital building or complex must remain a welcoming and supportive space, around the clock. Mechanical lock and key technology may be too passive for this modern healthcare environment, but that does not mean users should abandon the familiarity of keys altogether, because not all keys are created equal. Programmable electronic key systems Programmable electronic key systems put sophisticated access control into the form of a traditional key Programmable electronic key systems put the advantages of sophisticated access control into the form of a traditional key. They reinvent the key for the 21st century, making it more flexible, more powerful and better equipped to handle the security demands of a busy place. Lost keys and departed employees are no longer a problem, because their key’s access rights can be canceled with a click. And at multiple secure points around the hospital, the familiarity of a key is welcome to a user group who are not experts — at least, not in access control technology. CLIQ locking system Keys can be as smart as any card-based credential. For example, CLIQ technology from ASSA ABLOY backs up the familiarity and ease of use of key-based locking with the flexible management and real-time security features of an intelligent electronic access system. A CLIQ locking system consists of battery-powered, programmable keys; cable-free padlocks and cylinders that are easy to retrofit to almost any standard opening; and management software that can be run locally or via a secure cloud. For users, CLIQ means carrying a single, programmable key pre-loaded to unlock all authorized openings — not just doors, but also gates, alarm boxes, cabinets and lifts. Say goodbye to huge key rings. Programmable key solution For hospital security managers, a programmable key solution enables users to create personalized access schedules — even for temporary contractors — and collect audit trails for doors or keyholders automatically. Staff travels into, out of and through the hospital based on set rules and programmed into their keys. Many hospitals find CLIQ invaluable in managing access to medicines and other controlled substances. Nursing staff using older mechanical key systems struggle to keep track of who has the right keys. Searching for that person to gain access to drugs wastes precious time. Unauthorized access to drug stores can, of course, bring serious financial and safety implications. Medicine management with key-based access control Lock electronics are powered by the battery inside every key, so the retrofit was cable-free At Queen Elizabeth Hospital, Birmingham, pharmacy managers sought a better solution adapted to nurse-accessed medicine stores. They chose a PROTEC2 CLIQ system which combines mechanical disc cylinders with battery powered, programmable CLIQ keys. Lock electronics are powered by the battery inside every key, so the retrofit was cable-free. CLIQ devices secure doors, cabinets and mobile drug trolleys within the same access system. Security and pharmacy managers can see who opened every lock whenever they want — making medicine audits and incident investigation much easier. “Programmable key solutions can really boost medicine safety in hospitals,” says Stephan Schulz, CLIQ Product Manager at ASSA ABLOY Opening Solutions EMEA. “Nurses at Queen Elizabeth, Birmingham, carry their own key with personalized access rights, so they don’t waste time finding out who has the key to every cupboard. Patients benefit. A similar system trialed at Scunthorpe Hospital found the total wasted time eliminated would equate to having an additional 24 nurses on duty across the Trust every day,” Stephan Schulz adds. Key-based access control solution Key-based access solutions are equally comfortable at scale. At University Hospital Frankfurt 1,100 eCLIQ cylinders secure doors in a new building. A fully electronic implementation of CLIQ technology, eCLIQ cylinders and keys are easy for staff to use and for hospital security managers to administer from web-based software. The CLIQ Web Manager makes it easy to program, reprogram and audit every CLIQ key, cylinder or padlock. Because the interface is accessible from anywhere with an internet connection users can manage a CLIQ system whenever and from wherever they choose. Its architecture supports multiple administrators or sites. CLIQ Web Manager The Web Manager also integrates easily with all kinds of business management software, helping users automate tedious operations and processes. They can also make the Web Manager one element within an existing access control system. The Web Manager can run in a self-hosted IT environment or completely free of local software installation with two different Software as a Service (SaaS) solutions, Shared SaaS or Dedicated SaaS with hosting just for users and maintenance schedules set by them. With either option, the security software is always up-to-date — a major benefit in healthcare, where confidentiality makes cyber-attack resistance critical.
Universities push traditional access control to its limits. The more one asks of it, the tougher it gets. If one wants to monitor access all over campus. To know who comes and goes to computer rooms and classrooms. One would like to filter access to conference and seminar rooms according to the time — lecturers all day, cleaners and contractors after hours. Meanwhile, one wants students to be safe 24/7, without compromising the sense of freedom they enjoy on campus. Traditional electronic door security Our Aperio wireless locks integrate seamlessly with more than 100 different security systems" Mechanical lock-and-key security cannot do this. Managing keys weighs facilities staff down. Students lose them all the time, and they’re expensive and laborious to replace. The traditional solution — wired doors with card readers — is costly to fit and run. There is an alternative. “Battery-powered electronic locks with inbuilt RFID readers are a cost-effective way to upgrade existing access control and bring it to more doors,” says Lars Angelin, Business Development Manager for Wireless Locks at ASSA ABLOY Opening Solutions EMEA. “Our Aperio wireless locks integrate seamlessly with more than 100 different security systems. You don’t even need to change your smart-cards. They fit all kinds of doors.” “And because they are battery-powered and wire-free, they’re much more cost-effective to install and run than traditional electronic door security.” It sounds great in theory. But what about the real world? These 5 universities have experienced an impact already. University of Liverpool, England A BREEAM sustainability rating of ‘Excellent’ was reward for innovative architecture that combines aesthetics with environmental awareness. Vine Court’s sustainable features include rainwater harvesting, solar water heating and battery-powered Aperio wireless electronic locks. Unlike wired access control, Aperio wireless locks use little electricity. Catherine Anderson at the University of Liverpool called Vice Court ‘a new and exciting benchmark for the Student Accommodation Sector.’ Lund University Faculty of Law, Sweden Convenience is king: with Aperio wireless locks, security managers block lost cards without traipsing to every door The Law Faculty wanted to replace their access system without asking 50,000 students and staff to return existing smart-cards for reprogramming. Aperio made the process almost invisible from a user perspective. They didn’t even need to revalidate at a reader. Convenience is king: with Aperio wireless locks, security managers block lost cards without traipsing to every door. A Pacom Unison security platform handles everything seamlessly. Facilities staff spends less time on admin and more on security. Aberdeen University, Scotland At Aberdeen’s refurbished Student Village, Aperio online cylinders and certified security locks cover doors requiring different grades of security. Cost efficiencies came at installation stage — no cabling to the doors means no expensive electrical contractors — and will continue through the locks’ operational life. Unlike standard wired access control that requires ‘always-on’ mains electricity, Aperio wireless locks are powered by batteries. These typically need replacing every couple of years — and that’s it for maintenance. HafenCity University Hamburg, Germany Aperio electronic cylinders filter access to the media centre, library, cafeteria and offices A partnership between SIEMENS and ASSA ABLOY provides intelligent, transparent electronic access control at a new docklands hub for the university. Aperio electronic cylinders filter access to the media centre, library, cafeteria, seminar rooms, staff rooms, laboratories and offices. Locking with these wireless RFID devices enables the university to remain an open, welcoming space without sacrificing staff and student safety. University of Birmingham, England Two new accommodation blocks at the university’s Vale Village complex needed locks to integrate seamlessly with a pre-existing campus security system, including Gallagher Command Centre software. Aperio locks now secure almost 1,800 doors with a low-cost solution that eases the key management workload for facilities staff. Everything is controlled from the Gallagher interface. And because Aperio is scalable, they can add new doors and buildings whenever they choose.


Products


Round table discussion
Public spaces provide soft targets and are often the sites of terrorist or active shooter attacks. Public spaces, by definition, require easy accessibility and unrestricted movement. Given that openness, what security technologies can provide real results? We asked this week’s Expert Panel Roundtable: How is technology innovation impacting the security of public spaces?
Securing large campus environments can be particularly demanding and requires a range of technology solutions. In effect, a campus may represent a dozen or more individual facilities to be secured, in addition to protecting the overall environment. Seeking more insight into the number and variety of needs of securing a campus, we asked this week’s Expert Panel Roundtable: What are the security challenges of protecting large campus environments?
Along with the integration of security and other systems in an enterprise environment comes a need to centralize monitoring and control of the unified network. A control room is at the center of managing integrated systems, providing the focal point to collect information from a variety of sensors, analyze the data, and then respond appropriately. The technologies that drive these functions are changing and evolving, thus increasing the efficiency and efficacy of systems. We asked this week’s Expert Panel Roundtable: What’s new in command-and-control systems, and what is the impact?
White papers

Nine Ways To Make Your Retail Security System Work Harder
Download
Is Your Access Control As Effective As You Think?
Download
Convergence Of Physical And Logical Access
Download
Is Access Control In The Cloud More Cost Effective?
Download
Effective Access Control For Museums And Public Spaces
Download
Is Your Access Control System as Secure as You Think?
Download
How To Keep Students Safe On Campus
Download
What Are The Security Technology Needs Of The Hotel Sector?
Download
Network Security Redefined: IP-Enabled Access Control
Download
Do You Know The Weakest Link Of Your Access Control System?
Download
How Do You Know Access Control In The Cloud Is Secure?
Download
Mobile Access - What You Need To Know
Download
The Evolution Of Cards And Credentials In Physical Access
Download
5 Ways Sharper, Smarter End-To-End Solutions Can Protect Organizations
Download
5 Reasons To Get Physical With Access Control
Download

Videos
Security access systems: Manufacturers & Suppliers
- HID Security access systems
- Vanderbilt Security access systems
- CyberLock Security access systems
- CEM Security access systems
- Parabit Security access systems
- TruPortal Security access systems
- TESA Security access systems
- Delta Scientific Security access systems
- AMAG Security access systems
- Nedap AEOS Security access systems
- TDSi Security access systems
- Gallagher Security access systems
- BQT Solutions Security access systems
- Alpro Security access systems
- Dahua Technology Security access systems
- DSX Security access systems
- Morse Watchmans Security access systems
- Anviz Security access systems
- LifeSafety Power Security access systems
- Linear Security access systems