ISC West, the largest converged security and public safety trade show in the Americas, concluded its 2019 event in Las Vegas this past Friday. ISC West, in collaboration with premier sponsor Security Industry Association (SIA), experienced overwhelming success with over 950 exhibitors and brands, including 200 new for 2019, plus over 30,000 industry professionals, 85+ SIA Education@ISC sessions, 20+ special events and networking opportunities and more. Reflecting the market trend and urgency fo...
Johnson Controls updates its popular Illustra Pro camera family with the Illustra Pro Mini-Dome, featuring new Smart Wide Dynamic Range that optimizes video quality while minimizing configuration time. Available in a complete range of image resolutions and lens options, the Pro Mini-Dome is ideal for a wide variety of deployments in both medium and large-sized facilities. Smart Wide Dynamic Range available in the Pro Gen3 Mini-Dome reduces configuration time while greatly improving the quality...
LILIN Americas, an entity of Taiwan based IP video manufacturer Merit LILIN, has further strengthened its line of IP cameras with the MR832 bullet camera. Designed to help security professionals easily deploy an outdoor surveillance system, the MR832 features a 4mm fixed lens with an IP66 environment rating, an operating range of -40° to 122°F, along with 30M IR LED illumination and Day/Night imaging. "As IP technology has evolved, so have the expectations of our customers," said Joe Co...
Johnson Controls announces that PowerG technology with all the benefits of wired security, but without the wires, achieves the top levels of Underwriters Laboratories of Canada (ULC) certification, making it one of the most reliable security solutions in Canada. PowerG wireless devices are the first to be certified with ULC levels 1, 2 and 3 Commercial Burglary Approval (ULC-S304-16) when installed with PowerSeries Neo or PowerSeries Pro security systems. Simple Installations From their long...
The Boring Lab announced that The Boring Toolbox, a set of performance and maintenance tools to help customers more efficiently manage Milestone Systems’ XProtect video surveillance networks, has added key features for enterprise and large-scale sites with 5,000+ cameras and 100,000+ devices. The Boring Toolbox V3 offers a smoother user experience and optimized performance features, both of which were necessary to support larger installations. The Boring Toolbox allows customers to mainta...
Nortek Security & Control LLC, a provider of wireless security, home automation, access control and health and wellness technology, introduced the 2GIG eSeries, the next generation of the 2GIG security and control ecosystem that includes two all-new GC2e and GC3e panels and a new line of encrypted sensors. The introduction was made at ISC West 2019 in Nortek Security & Control Booth #20015 in Las Vegas, Nevada. According to Nortek Security & Control Vice President of Products Quinto...
The 3rd edition of Intersec Saudi Arabia got underway with 111 exhibitors from 20 countries zooming in on the Middle East’s largest commercial security and fire safety market. Running for three days at the Jeddah Centre for Forum and Events, Saudi’s foremost security, safety, and fire protection trade show targets the Kingdom’s vast market which is estimated to grow at an annual compound growth rate of 7.7 percent over the next seven years. It was opened yesterday in a pre-show ceremony by Lt. Gen. Sulaiman Al-Amr, the director-general of Saudi Arabia’s General Directorate of Civil Defense. Economic Diversification Plans According to 6WResearch, homeland security and policing currently holds the lion’s share of Saudi’s market spend A report released on the side-lines of the show by consultancy firm 6WResearch said the total spend on Saudi’s commercial security, information security, homeland security and policing, physical and perimeter protection, and fire safety markets was worth US$8.5 billion in 2018, a five percent increase over the previous year. By 2025, the market will be worth US$14.4 billion, driven by a combination of increased investments in infrastructure in line with the Saudi Vision 2030, the stabilisation of oil prices, and the government’s ongoing economic diversification plans. According to 6WResearch, homeland security and policing currently holds the lion’s share of Saudi’s market spend, at US$4.6 billion in 2018. This is followed by information security (US$2.6 billion), commercial security (US$838 million), fire protection (US$273 million), and physical and perimeter protection (US$198 million). Integrated Platform The impressive opportunities are underlined by a long list of manufacturers and suppliers this week in the Red Sea port city, spearheaded by the show’s launch partners eager to boost business opportunities. Hikvision, the world’s largest video surveillance provider, is among these, and is putting the spotlight on its latest suite of technologies, much of which is powered by Artificial Intelligence and machine learning. Others include Al Alameya, Axis Communications, Bristol, Drager, Genetec, NAFFCO, Nedap, and ZMR. With 69 per cent international participation, more than 500 brands, and an enlightening three-day conference program, Intersec Saudi Arabia caters to growing demand for an integrated platform providing crucial access to one of the world’s most promising markets. Intersec Saudi Arabia is licenced by Messe Frankfurt Middle East, the organiser of Intersec in Dubai, the world’s largest trade fair for security, safety, and fire protection. Safety And Security Industries Intersec Saudi Arabia is a vital platform bringing together key stakeholders in the Kingdom’s security, safety, and fire protection industries" “Safety and Security is high on the agenda of Vision 2030 of the Kingdom of Saudi Arabia and there is a perennial requirement of safety and security products, fire protection and the accompanying innovations that are displayed at this event,” commented Zahoor Siddique, Vice President of Intersec Saudi Arabia’s organiser ACE Exhibitions. “Intersec Saudi Arabia, apart from targeting the five million population of the Western Region inclusive of the annual pilgrimage, round-the-year Umrah pilgrims, oil and gas installations, airports and seaports, the multitude of events taking place Kingdom wide, is the ideal meeting and networking showcase for safety and security industries.” Andreas Rex, Show Director of Intersec, added: “Intersec Saudi Arabia is a vital platform bringing together key stakeholders in the Kingdom’s security, safety, and fire protection industries. In its 3rd edition in 2019, it will once again be at the forefront of the latest technologies and solutions dedicated to meet the demand of the Middle East’s largest market.” Smart Patrol Solutions GET Group Holdings was among those launching new products in the Saudi market, including its latest Smart Patrol solution that assists law enforcement agencies by providing full 360 degrees surveillance, body-worn cameras, speed detection and violation as well as identification of wanted people and vehicles. GET also launched its AI-Powered process automation solutions to manage and optimize enterprise and government operations. Mrs. Maysoon Jamal, CEO of GET Group Holdings, said: “The Saudi security market is crucial to our business and our products especially for government and law enforcement agencies. We’re looking for great growth in three main categories: Secure card printing especially through our Heidi and GET/Toppan ID Card Printers, Smart Patrol Solutions, and Robotic Process Automation.” Promising Markets Intersec Saudi Arabia is held under the patronage of the Saudi Ministry of Interior, and supported by the Saudi Civil Defense Other exhibitors this week include Optex Europe Limited and Fiber Sensys, both of which recently joined forces to better serve Saudi Arabia and the regional market in deploying perimeter protection and intrusion detection systems. Intersec Saudi Arabia is held under the patronage of the Saudi Ministry of Interior, and supported by the Saudi Civil Defense. It features a three-day security and fire safety conference program operating under the wider theme of ‘Safety, Civil Security and Technology: Future Integrated Solutions’. Intersec Saudi Arabia 2019 covers the key product groups of Commercial Security, Information Security, Perimeter & Physical Security, Homeland Security & Policing, Fire & Rescue, and Safety & Health. The dedicated showcase caters to growing demand for an integrated platform providing crucial access to one of the world’s most promising markets.
Johnson Controls announces that its PowerSeries Pro is the first ever commercial grade security system to harness the long-range communication technology of PowerG and is designed to handle large-scale installations. The system offers the highest level of cyber protection features and encryption technology without the need for a wired communication path. PowerSeries Pro is developed for commercial use and can support up to 248 zones, making it an ideal solution for warehouses, office buildings, factories, and healthcare facilities. Intrusion Security Panel “In the past, we have had systems that support commercial applications, but PowerSeries Pro is our first commercial intrusion security panel that can handle large commercial installations while eliminating the need for wires on sensors or keypads,” said Jennifer Doctor, senior director of Product Management, Tyco Security Solutions. “We are excited to provide this new product to the commercial sector, and hope the increase in zones, coupled with secure encryption, will provide end users with the flexibility and reliability they need.” Tyco security solutions’ PowerSeries Pro includes built-in 128-bit AES encryption technology, supports multiple third-party integrations, including Building Management Software (BMS), as well as video and access control solutions to offer a versatile platform for holistic commercial security. Commercial Installations In addition, Frequency Hopping Spread Spectrum technology repeatedly switches frequencies to minimize interference of radio signals and prevent interception and obstruction during transmission. This is especially useful in commercial integrations, where transmissions take place over longer distances, and in turn require more planning to combat potential interferences security threats. Requiring no drills, wires or repeaters, both residential and commercial installations are hassle-free and provide all the power and security of a wired connection, without the wires.
Johnson Controls expands its PowerG technology portfolio to include the addition of several new detectors and sensors offering installers a greater variety of devices that harness the power of PowerG. Wireless Security Technology Enhancements to the PowerG portfolio include a 360-degree ceiling mount PIR detector, commercial magnetic contact, carbon monoxide detection and vanishing door / window magnetic contact, just to name a few. With the absence of wires, PowerG is able to securely perform many of the functions of a wired system, with new updates being made continuously. From long-range ceiling mount detection to smoke and heat detection, PowerG provides the power of wires without the wires. PowerG is the wireless security technology, designed with homes and businesses in mind. With the addition of new enhancements, PowerG is continuing to make end-users’ lives more secure and convenient while cutting installation time and saving money for installers. Unparalleled Cyber Protection “There once was a time where wired solutions were deemed the most secure and, in turn, were the ones chosen,” said Jennifer Doctor, senior director of Product Management, Tyco Security Solutions. “PowerG gives users the peace of mind that comes with an encrypted, wired solution, but eliminates the hassle of wires. With the added detectors and sensors, PowerG rivals that of traditional intrusion systems.” With ultra-reliable, two-way 128-bit AES encrypted communication and iron-clad protection that blocks interference, PowerG delivers unparalleled cyber protection features – ensuring reliable performance with minimum false alarms.
3xLOGIC, the provider of integrated and intelligent security solutions, has announced the availability of its pioneering VIGIL video management system (VMS) in Europe. Already enormously popular in the USA, 3xLOGIC aims to replicate this success and is targeting VIGIL at those who want all the power of integrated video and access control, without the stress and cost of a complex set-up. VIGIL’s enterprise grade VMS is the driving force behind the VIGIL range of network video recorders (NVRs) and power over Ethernet (PoE) cameras. Its easy set-up wizard guides installers and end users through the configuration process, helping to define network parameters, system identification information and camera profiles quickly and efficiently. VIGIL Central Management Software With 3xLOGIC’s VCM, it is possible to monitor server connectivity, camera status, storage details and server settingsEvents can be viewed via PC or mobile app, allowing users to respond to alarms and view live footage from any location, while SmartSearch functionality enables individuals to quickly identify and review events. With 3xLOGIC’s VIGIL Central Management software (VCM), it is also possible to monitor server connectivity, camera status, storage details and server settings; and 3xLOGIC’s RapidStream technology and SubStream motion detection functionality offers high resolution while substantially reducing bandwidth demands All VIGIL NVRs come pre-configured with VIGIL VMS software and 3xLOGIC PoE-enabled internet protocol (IP) dome, bullet, cube, 360°, thermal imaging, and pan tilt zoom (PTZ) cameras are designed to suit any application. The easy set-up wizard also provides plug and play capability for easy deployment, so no IP video experience is necessary to start recording or viewing video. Integrated With Infinias Access Control Solution Advanced reporting features including heat mapping, restricting and locking video are also possibleUsers can easily narrow down points of interest within larger playback clips by creating a SmartSearch mask over an area of an image, and surveillance data can also be routinely archived without the need to perform the task manually. Advanced reporting features including heat mapping, restricting and locking video are also possible. End users are increasingly demanding integrated VMS and access control. VIGIL can be seamlessly integrated with 3xLOGIC’s cutting edge infinias access control solution, which is designed to easily manage any size of project ranging from a single door to an enterprise-wide installation of hundreds of doors. With no wires from VIGIL to infinias, configuration is carried out through software with an automated, cloud-based programming tool. This offers a cost-effective way to create one intuitive solution where video is automatically linked with access control events and alarms. New Revenue Stream For Installers VIGIL opens up a new revenue stream for installers that work primarily with small to medium-sized enterprises Offering a level of functionality previously only available in solutions designed for larger projects, VIGIL removes the need for expensive technical labour. It therefore opens up a new revenue stream for installers that work primarily with small to medium-sized enterprises (SMEs), or who wish to start offering an integration based service. VIGIL is available through the existing PAC channel, with full access to its technical support, meaning that customers can rely on a tried and trusted supply chain that delivers products on time, every time. “The response to 3xLOGIC’s presence in Europe has been phenomenal,” commented David Hughes, the company’s global product manager. “The availability of VIGIL is the next step in our strategy to redefine the way in which security systems are designed, specified and configured across the continent. “Suitable for almost any budget, VIGIL is designed to be fully integrated to provide SMEs with comprehensive, cost effective and state-of-the-art video and access control infrastructures that are easy to manage, simple to install and can scale in line with changing needs.”
Johnson Controls will soon announce the availability of the LUX KONOzw Smart Hub thermostat through its DSC channel. This is the first KONO thermostat featuring Z-Wave technology. KONOzw allows users to seamlessly connect DSC security systems, including PowerSeries Neo, iotega and PowerSeries Pro, when combined with SecureNet or Alarm.com interactive services to the smart thermostat through the Z-Wave smart hub. Universal Compatibility KONOzw offers all the traditional modes of a smart thermostat, including heat & cool and works with forced air, gas, oil and electrical furnaces, giving end users the flexibility they need when choosing a thermostat. It also features universal compatibility with heat pump systems with or without Aux/Emergency heat and hydronic zone valves. KONOzw also provides flexible installation with battery (4 AA batteries included) or C-wire powering options. Its patent-pending interchangeable décor-snap covers enable users to personalize the device – adding individual flair to the thermostat. “The integration of KONOzw with Johnson Controls’ security systems illustrates the power of the smart home and our broad footprint for bringing innovative solutions to the market,” said Rob Munin, general manager of thermostats at Johnson Controls. Leveraging Smart Systems Capabilities “The Z-Wave technology opens doors for organizations who want to integrate more functionality into a smart hub to further leverage the capabilities of their smart systems. We believe the KONOzw is an attractive solution for commercial and residential markets.” The use of Z-Wave technology allows the thermostat to connect to other parts of a smart home through Alarm.com or SecureNet, while using minimal resources, in turn increasing battery life and reducing overall operating costs. With complete customisability available, users can reap all the benefits of a sleek, easy-to-use smart thermostat, while personalising it to their home decor.
Openpath, a pioneer in workplace technology and security, unveils at ISC West 2019 its new Elevator Board and Partner Portal to provide channel partners, property managers and tenants with even more comprehensive and convenient office security systems. Elevator Board enables Openpath to connect commercial spaces under a single, streamlined and secure mobile access system. And now, with Partner Portal, integrators can access best-in-class training and education online, enabling them to easily implement the best possible solutions for customers. Top-Notch Technology For System Integrators While many mobile access systems rely on only Wi-Fi, Bluetooth or LTE, Openpath’s proprietary Triple Unlock technology utilizes all three methodsAlex Kazerani, Openpath’s co-founder and CEO, said: “We are excited to provide our partners with the elevator solution they have been asking for. By bringing Openpath’s signature convenience and ease of use to the elevator, we ensure every single interaction tenants have with an Openpath-equipped building is frictionless, from the parking garage to their desk. “The tandem release of Elevator Board and Partner Portal highlights our continued dedication to providing system integrators with both the top-notch technology that their customers want and the resources they need to easily and efficiently install our solutions.” The market demand for highly reliable, convenient and secure access control solutions continues to expand as integrators and customers seek mobile access solutions that actually work. While many mobile access systems rely on only Wi-Fi, Bluetooth or LTE, Openpath’s proprietary Triple Unlock technology utilizes all three methods, exclusively guaranteeing the system remains online at all times and providing users with the most reliable, seamless experience every time they use the Openpath solution. Ability To Handle Mobile Credentials Openpath’s unique ability to handle smartphone-based credentials, and the Elevator Board’s offerings, are especially exciting"Tully Zipkin, President at Global Integrated Technologies, Inc. said: “We recently showed the Openpath system, including its Elevator Board, to one of our long-term clients. Prior to completing the demonstration, the client noted that Openpath’s offerings were ‘exactly what they’d been looking for,’ and decided they would purchase the solution.” Regarding Openpath’s solutions, Mr. Zipkin states, “Over the past 30 years working in the access control industry, I have witnessed the market evolve and customers’ needs change. The Openpath product provides exciting features which, in today’s IT-centric environment, are desirable. In particular, Openpath’s unique ability to handle smartphone-based credentials, and the Elevator Board’s offerings, are especially exciting. “Having now installed multiple systems, Global’s technician’s integrators and clients are very impressed with Openpath’s technical support, training, and overall willingness to assist to ensure a smooth delivery. The speed and ease with which both Global and our clients have been able to implement the Openpath solution is impressive.” Openpath Elevator Board Elevator Board’s features include touch access for fast and convenient, hands-free, keyless entryElevator Board brings Openpath’s award-winning mobile access technology to the elevator. With the addition of Elevator Board to the Openpath product lineup, a single credential - a smartphone - can be used to access an office’s parking garage, building entrance, elevator and office door. Elevator Board’s features include: Smaller form factor with and easier installation process resulting in less downtime Easy wiring with removable connector blocks USB ports for streamlined product updates Touch access for fast and convenient, hands-free, keyless entry More efficient performance with customisable user permissions and the ability to place elevators on a schedule Proprietary Triple Unlock Technology Support for up to 16 floors and two Openpath Smart Readers Partner Portal Learning Platform Partner Portal is an online learning platform that enables system integrators to complete technical and sales training, as well as earn, manage and maintain their Openpath Certified Integrator certifications virtually and at their own pace. Some of the valuable features system integrators can access via Partner Portal include: Lead distribution Co-branded digital sales collateral Exclusive online training and certification Resource library Certified Installer Assets Opportunity registration Openpath will be displaying its new Elevator Board at ISC West April 10 - 12 at the Sands Expo Center, booth #23051.
Across the country, law enforcement officers are finding it increasingly difficult to respond to the near overwhelming number of calls coming from security alarms. Police departments commonly define a false alarm as a call, which upon investigation, shows no evidence of criminal activity, such as broken windows, forced doors, items missing, or people injured. While false alarms bog down police, they can also negatively impact customers and integrators. End users can expect hefty fines for false alarm responses, and when these customers receive large bills from the city, many turn to installers, dealers, and even manufacturers expecting them to accept the responsibility and pay the check. What First Brought The Issue Of Alarm Verification To Your Attention? It is crucial to both see a situation and concurrently listen to any corresponding sounds to gain full insight I’ve been aware of the problem of false alarms for about 5 years. I believed audio capture, through microphone deployment, could be an active part of the solution when used as a second source for indicating ‘out of the norm’ activity and as an equal component with the video surveillance technology. In 2015, I found similarly minded security professionals when introduced to the Partnership for Priority Verified Alarm Response. After reading PPVAR’s paper on ‘Audio Verified Alarms Best Practices; [April 2015],’ I knew that the Partnership was on to something important. In our lives, two of the five senses we count on day-in and day-out are sight and sound. It is crucial to both see a situation and concurrently listen to any corresponding sounds to gain full insight. What Is The False Alarm Rate? In 2016, the International Association of Chiefs of Police reported that over 98 percent of all alarm calls in the United States were false. This number is obviously staggering, and something we need to work towards correcting. Why Did This Issue Resonate So Strongly With You? When I first investigated this issue, I was sure that the security industry would have already recognized this and was acting to ensure improved alarm verification, preferably through a combination of audio and video technologies. However, I quickly saw that this was not the case, or even close to the norm. I have questioned the rationale behind the lack of adoption and found the deployment of audio is often hindered by the concern of privacy. I’ve spearheaded many initiatives to explain the monitoring policies surrounding audio As CEO of Louroe Electronics, I’ve spearheaded many initiatives to explain the monitoring policies surrounding audio. I’ve had to reassure many security personnel and customers how the law supports the use of audio in public places as long as there is no expectation of privacy. By dispelling fears with facts around deploying and implementing audio sensors, customers can confidently include audio in their surveillance systems and gain a more effective security solution. Who Is Affected By This? Truth be told, everyone from the end user to the manufacturer is affected by this issue. Not to mention the strain this puts on law enforcement who are tired of ‘wasting time’ and effort out in the field on these nuisance alerts. When an end user receives a check for their false alarm, many of them will immediately blame the integrator and or the monitoring center for a faulty set up and management and expect the integrator to remedy the situation, including carry the burden of paying the fines. The integrator, on the other hand, will turn to the manufacturer, assuming faulty equipment and installation instructions; therefore, looking for reimbursement for the cost. What Is The Average False Alarm Fee? It depends on many factors, and especially your first responder assigned location for responseIt depends on many factors, and especially your first responder assigned location for response. According to the Urban Institute, fees generally range from $25-$100 for the first offense, rising as high as a few thousand dollars per false alarm if a location has a large number in a single year. What’s worse, in extreme cases, alarm systems may even be blacklisted by the police dispatch center if they have raised too many false alarms in the past. Why Do You Believe Audio Is The Ideal Technology For Secondary Source Verification? Video surveillance has been the main option for security monitoring and alarm validation for decades, however industry professionals are realising that video alone is not enough. Video only tells half of the story, by adding audio capture, the responsible party gains a turnkey solution with the ability to gather additional evidence to verify alerts and expand overall awareness. In reality, audio’s range is greater than the field of view for a camera. Sound pickup is 360 degrees, capturing voices, gunshots, breaking glass, sirens, or other important details that a fixed camera many not see. How Would A Secondary Source Verification System Work With Audio? Using a video monitoring solution equipped with audio, the microphone will pick up the sounds at the time a visual alert or alarm is triggered. If embedded with classification analytics, the microphone will send alerts for specific detected sounds. The captured audio, and any notifications are immediately sent to the monitoring station, where trained personnel can listen to the sound clip, along with live audio and video from their station. When law enforcement receives a validated alarm, they can better prioritise the response From here, an informed decision can then be made about the validity of the alarm, along with what the current threat is at the location. If the alarm is in fact valid, the information is then passed along to the law enforcement within minutes. When law enforcement receives a validated alarm, they can better prioritise the response. It also provides more information in a forensic evaluation. Are There Any Additional Resources You Would Suggest Looking Into? Yes, we would suggest looking into the following to see a few different perspectives on the matter: NSA Support For 2018 Model Ordinance For Alarm Management and False Alarm Reduction Partnership for Priority Verified Alarm Response Support for the Term “Verified Alarm” and Prioritising Verified Alarm Responses Urban Institute Opportunities for Police Cost Savings without Sacrificing Service Quality: Reducing False Alarms
The access control industry tends to be more conservative when it comes to the adoption of new technology and services for end users, but that doesn't mean that 2019 won't provide a significant amount of progress through emerging trends taking shape in the industry. In addition to the increased adoption and acceptance of the cloud, mobile credentials and biometrics are becoming more mainstream, and integrations between manufacturers will take centre stage. Here, we take a look at these and other trends helping to shape the coming year. Cloud-Based Products We're continuing to see a demand by end-user customers for customized responses to certain actions within an access control system For many access control manufacturers, the core of the business is in more traditional products, with a high percentage of installs continuing to be these kinds of projects. However, over the last couple of years, cloud-based products have emerged as a viable option for customers. We've seen more of a willingness for end-user customers to inquire whether this is an option for them, citing ease of use, remote management, cybersecurity and more as part of their foray into this branch of access control. The cloud has established its reputation as being quicker to install, more flexible for customers to access and manage both their access points as well as the video associated with these doors, and placing less pressure on internal (or in some cases, non-existent) IT teams to help set up and manage an access control system. Mobile Credentials Applications We're continuing to see a demand by end-user customers for customized responses to certain actions within an access control system. For example, if there's an alarm set off during the day along a perimeter, the ability to automatically execute a lockdown and simultaneous email or message to everyone within the building alerting them to the issue is critical. The desire for this kind of flexibility within a system is prompting manufacturers to build new simple to use graphical tools into their systems that allow customized action responses that are proportional to the level of alarm. There's a strong desire by many of today's companies to be able to use mobile phones for access control and as such, manufacturers are either developing their own mobile credentials applications or integrating their systems with these kinds of products. Over the last couple of years, cloud-based products have emerged as a viable option for customers Future Of Biometrics As companies start to ask about whether their facilities are safe enough, they're often more willing to consider access control that takes security to a new level, such as the implementation of biometric readers. Biometrics is getting more usage in professional security applications and many customers want to move away from using physical cards for access control. Manufacturers that don't currently have biometric hardware in place are starting to integrate with readers designed to offer this functionality in an effort to meet the demands of customers. The dramatic rise in facial recognition biometrics is something that will likely shape the future of biometrics as costs start to decrease. While the access control industry is highly fragmented, we're seeing a trend toward increased partnerships and open-platform technology that helps end users achieve the kind of comprehensive security that they desire. Video Management Platforms We're seeing a trend toward increased partnerships and open-platform technology that helps end users achieve the kind of comprehensive security that they desire For example, there are a number of access control providers that are providing paths toward full integration with lock manufacturers and vice versa in an effort to meet the needs of clients who may have purchased locks but a high powered access control system to properly manage them. There's also a large shift toward full integration with video management platforms and access control systems to fully integrate the two into a single, user-friendly experience and give end users more control over both. Additionally, manufacturers are looking to provide customers with a single system that meets the needs they have with regards to video, intrusion and access control. Right now, I don't think there's a system that can fully deliver on the promise of being exceptional at all three, so integrations and partnerships remain important to achieve that end goal. Access Control World An increasing number of end users are realising the holes in the current Wiegand protocols that have been in place since the 1980s, along with the large number of ‘off the shelf’ equipment that's now available to allow outsiders access through readers that operate under these protocols. As a result, in the last decade or so, OSDP has come onto the scene and is growing in popularity. One of the most important steps for access control manufacturers in 2019 will be to listen to customers who are concerned with this vulnerability and work toward fully supporting OSDP in an effort to protect these access control systems. It's an exciting time to be a part of the access control world, as we finally see results from all of the hype centred around the cloud, biometrics, mobile credentials, hacking protection and strong partnerships come to fruition. As 2019 begins, look for these trends to grow in popularity and for manufacturers to really listen to the end-user customer they serve and respond in kind.
The extensive analysis and discussion preceding any decision to implement a new physical security solution – whether it’s hardware, software or a combination of both – often focuses on technology, ROI and effectiveness. When it comes to deciding what type of security entrances to install at your facility, you will almost certainly also consider the aesthetics of the product, along with throughput and, if you’re smart, you’ll also look into service concerns. Each of these factors has its important place within the evaluation process, and none should be overlooked as they all have a significant effect on how well your entrances will perform once they are installed. Culture Influences Door Solution Decisions How significant will the change from current entrances to security entrances be for employees? Still, one additional factor actually trumps everything: if you have not considered your organization’s culture in choosing a security entrance, you may be missing the most important piece of the puzzle. Culture is a part of every other decision factor when selecting an entry solution. Before you make a decision about what type of entrance to deploy, you need to consider and understand the values, environment and personality of your organization and personnel. For example, how significant will the change from current entrances to security entrances be for employees? If people are accustomed to simply walking through a standard swinging door with no access control, this will be a culture change. Beyond this, whether you are considering a type of turnstile, a security revolving door or possibly a mantrap portal, simply walking through it will be a significant change as well. Training Employees On Door Security You’ll want to know whether employees have ever used security entrances before. If these types of entrances are in place in another part of the facility, or in a facility they’ve worked in at an earlier time, the adjustment will not be as great as if they’ve never used them at all. Consider, too, how your personnel typically react to changes like this in the organization or at your facility. They may be quite adaptable, in which case there will be less work to do in advance to prepare them. However, the opposite may also be true, which will require you to take meaningful steps in order to achieve buy-in and train employees to properly use the new entrances. With the increased importance of workplace security, discussing new entrances with workforces will help maintain a safer environment Communicate Through The Decision-Making Process All of this will need to be communicated to your staff, of course. There are a number of ways to disseminate information without it appearing to come down as a dictate. Your personnel are a community, so news about changes should be shared rather than simply decreed. As part of this process, you’ll need to give some thought to the level of involvement you want for your staff in the decision-making process. Finally, do not overlook the special needs among your personnel population. You undoubtedly have older individuals on staff, as well as disabled persons and others who bring service animals to the office. Entrances need to be accessible to all, and you never want to be in the position of having a gap in accessibility pointed out to you by the individual who has been adversely affected. New Security Entrance Installation By communicating early and often with your personnel, you can alleviate a great deal of the anxiety Once you have made the decision about which security entrances to install, training your personnel on how to use the new security entrances – both before and after the installation – will help to smooth the transition. Because workplace security is such a big issue right now, it makes sense to discuss the new entrances in the context of helping to maintain a safer environment. They will prevent violent individuals from entering, decrease theft, and most of all, promote greater peace of mind during the workday. If you can help them take control of their own safety in a responsible way, you have achieved much more than just a compliant workforce. By communicating early and often with your personnel, you can alleviate a great deal of the anxiety and concern that surrounds a significant change in the work environment. Schedule Group Meetings Consider your employees; what type of communications do they respond best to? A few suggestions to educate staff on the benefits of the new entrances include: Typically, you would communicate a general message 2-3 months in advance and then provide more specific information (for example, impacts to fire egress, using certain entrances during construction) in a follow up message closer to the installation date. Schedule group meetings to: announce the rationale for increased security, share statistics on crime, review the new security changes that are coming, show drawings/photos of the new doors/turnstiles, and show the orientation videos available from the manufacturer. These meetings are an excellent way to work through user questions and directly address any concerns. Once the installation of a new security system is complete, it is a good idea to have an "ambassador" on board to help employees use these new systems Ensure You Monitor Public Areas If you are implementing a lot of new changes, such as a new access control system, new guard service and security entrances, you might consider hosting a ‘security fair’ on a given day and have the selected vendors come for a day with tabletop displays to meet employees and answer questions during their lunch. This could be a great way to break the ice in a large organization. Make user orientation videos (provided by the manufacturer) available in several ways, for example: Intranet Site Monitors in public areas—lounges, cafeteria, hallways, etc. Send to all staff as email attachments Immediately after installation, once the doors or turnstiles are operational but before they are put into service, train ‘ambassadors’ on how to use the door/turnstile. Have these people monitor and assist employees during peak traffic times. What Is The Ultimate Success Of The Installation? By communicating clearly and openly with your population you can greatly facilitate adoption and satisfaction If you have thousands of employees, consider dividing them into groups and introduce the new entrance to one group at a time (Group A on Monday, Group B on Tuesday, etc.) to allow a little extra orientation time. Place user education ‘quick steps’ posters next to the door/turnstiles for a few weeks to help employees remember the basic steps and guidelines, e.g., ‘stand in front of the turnstile, swipe badge, wait for green light, proceed.’ Ask your manufacturer to provide these or artwork. While there are always going to be people who are resistant to change, by communicating clearly and openly with your population you can greatly facilitate adoption and satisfaction. Your responsiveness to any issues and complaints that arise during and after the implementation is equally fundamental to the ultimate success of the installation.
There are many new technologies at ISC West this year. There are also some tried-and-true solutions on display. More mature products have the benefit of being fully vetted and battle-tested, which may make them a more comfortable choice for security customers. I had a couple of discussions on Day 2 of the show about the advantages, and possible drawbacks, of new products. “To a security director, when you say ‘new,’ he translates that into ‘risk,’” says Bill Spence, VP of Sales, U.S., Canada and Western Europe for HID Global’s Lumidigm biometrics brand. “Anytime you say new, there is a probability of risk. The key is to educate. Education quantifies risk, and an educated customer can make an intelligent decision about risk versus reward.” “We have to take customers from where they are to help them understand new technologies,” says Spence. “We must give them a bridge to that understanding, and education is the bridge.” Lumidigm Biometrics Integrations An app provides graphics that take installers step-by-step through the installation process HID Global is incorporating Lumidigm biometrics into the new iClass SE RB25F fingerprint reader being highlighted at the show. Two-factor authentication can use either a card or mobile credential along with biometrics; there is no latency; and templates can be stored on a card. Another new offering at the HID Global booth is an augmented reality tool to simplify installation of newer systems that incorporate the more secure OSDP protocol. An app provides graphics that take installers step-by-step through the installation process. Also highlighted at the HID Global booth — and at the booths of turnstile manufacturers throughout the show — are embedded readers that provide tested and certified mobile access control for turnstiles. IClass SE technology is embedded in the iRox-T Turnstile Reader from Essex Electronics. Innovative Security Technologies There’s a delicate balance at any trade show between creating excitement about new products and educating customers to be comfortable with new technologies. There is some of both at ISC West 2019. In the future, hardware will be a delivery device, not the core of systems “We are on the cusp of change in the industry, and it’s closer than ever,” says Jennifer Doctor, Johnson Controls’ Senior Director, Project Management - Intrusion. “We will see the impact of promised technologies that will come from other industries, such as artificial intelligence. The very definition of security is changing. We are an industry that needs to be risk-averse, and we need to prove out the technology. There is innovation, but we just need to make sure technologies are what the market wants and expects.” “In the future, hardware will be a delivery device, not the core of systems, which will come from intelligence in the software and from services,” she adds. “The products we deliver will enable that.” Have 30 percent of service companies in the U.S. security market jumped into the cloud? PowerSeries Pro Intrusion Portfolio Johnson Controls is highlighting the commercial PowerSeries Pro intrusion portfolio, which features PowerG encrypted technology that enables wireless systems that are cyber-secure. The cloud is coming on strong, and one company finding success in cloud systems is Eagle Eye Networks, which has seen 93% compounded annual growth over the past three years. Economies of scale have enabled them to lower subscription prices by 35%, with an extra 10% decrease for customers that pay annually. Ken Francis, President of Eagle Eye Networks, says they are signing up 50 new dealers a month for the cloud video offering. Francis estimates that 30 percent of service companies in the U.S. security market have jumped into the cloud “It’s really heating up,” says Francis. “The general cloud is driving increases in the surveillance cloud.” Jumping To Cloud Embracing the cloud and recurring monthly revenue (RMR) requires that dealers transform their businesses to ensure success. Francis says dealers should dedicate sales resources to cloud offerings rather than expect everyone to sell the cloud, and there should be a base commission plan on RMR services in lieu of upfront project fees. March Networks is also showing integration of video with the Shopify cloud-based point-of-sale (POS) system “Talk to professionals about your cash flow and understand how to capitalize on financing partners to ensure cash flow while investing in the RMR stream,” he adds. “And look for ways to reduce your costs to serve the customer base as your RMR increases.” For example, use of remote site diagnostics, configuration and support can avoid the need for expensive “truck rolls” that can undermine profitability. Francis estimates that 30 percent of service companies in the U.S. security market have jumped into the cloud. Alarm companies, which are accustomed to the RMR model, are generally ahead of the curve, while traditional security integrators are lagging. “It’s a requirement to change or die,” he notes. Insight Hosted Managed Service Also, in the area of managed services, March Networks is highlighting its Insight hosted managed service that can provide instant information on video systems located at remote sites, including visibility into firmware versions, camera warranty information, and cybersecurity status of systems. The ability to dive deeply into system status empowers a new recurring revenue stream for integrators. Color-coded icons summarize system status and show pending issues and clicking on the icons provides detailed workflow information. The system can also be offered for smaller systems such as those at convenience stores and quick-serve restaurants. March Networks is also showing integration of video with the Shopify cloud-based point-of-sale (POS) system. The integration enables managers to evaluate POS information, especially anomalies, to determine possible employee theft and other shrinkage issues.
Attendance has been growing steadily year-over-year for ISC West, and the 2018 show exceeded 30,000 total industry visitors for the first time. So it’s safe to expect ISC West 2019, April 10-12 at the Sands Expo in Las Vegas, will be bigger than ever. Preregistration for the 2019 show is on track to bring even more visitors than last year. “This is a show for everyone, for converged security,” says Mary Beth Shaughnessy, Event Director for Reed Exhibitions. “We bring a lot of different verticals together with IT and network security, physical security and robots and drones. It’s one-stop shopping and the number one security show in North America.” Identifying Buying Influencers The event organisers of ISC West make a concerted effort to bring the industry’s top buyers to the show The event organisers of ISC West make a concerted effort to bring the industry’s top buyers to the show. The ISC West Executive’s Club is a ‘top buyer program’ created to welcome high-level buying influencers who have current projects in the pipeline. The program works throughout the year, networking, researching and identifying buying influencers among end users, integrators, dealers/installers and consultants who are working on current projects. Approximately 1,300 attendees are participating in the program this year. An Executive’s Club member might be an integrator working with several large projects or represent a school system that is building a new campus or retrofitting their systems. During the trade show, these guests get the VIP treatment with a variety of benefits, including a lounge, cocktail receptions, and continental breakfasts. Personalized Matchmaking Programs ISC West also provides personalized matchmaking programs to bring together these buyers with companies that can meet their needs. The Executive Club members are also led on guided exhibit hall tours, based on product interest, that highlight new and innovative solutions. The program also contributes to ISC West’s goal to grow its end user audience. In this case, it is a group of eager buyers with immediate needs. Another growing aspect of ISC West is its role shaping exhibiting companies’ technology roadmaps, in particular the timing of new product releases. Many new products and technologies are announced at ISC West, and attendees are conditioned to attend the show to see what’s new in the marketplace. “Vendors try and work to get whatever solutions they are promoting together in time for ISC West,” says Shaughnessy. “Vendors know that attendees have fresh budgets and new initiatives early in the year.” Network Security Products ISC West will partner with the Security Industry Association (SIA) to make educational sessions available April 9-11 ISC West showcases the latest products, services, and technology including access control, video surveillance, disaster recovery, IT security products, network security products, wireless security products, and thousands more helping ensure safety by giving attendees the right tools and defenses to protect against security risks. In addition to the exhibition, ISC West will partner with the Security Industry Association (SIA) to make educational sessions available April 9-11. SIA Education@ISC will kick off the day before the start of the exhibition. The comprehensive program includes 85+ accredited sessions covering a range of industry topics aimed at providing the critical knowledge attendees need to protect and defend against developing threats in today's security landscape.
Effective access control can be achieved without the use of cards using a new generation of secure facial authentication enabled by artificial intelligence and machine learning. Alcatraz AI is introducing a system that deploys a sensing device, about the size of a badge reader, with multiple color and infrared cameras that can detect facial features and confirm an identity. Real-time 3-D facial mapping avoids anyone using a photograph, video or mask to spoof the system and confirms there is a real person that matches the stored facial image. System Helps In Tailgating Mitigation Deep neural networks, powered by NVIDIA, enable the system to achieve new levels of frictionless access control, says Vince Gaydarzhiev, CEO of Alcatraz AI. Computer processing is achieved at the edge to ensure speedy and secure access control. We saw an opportunity to create a system that solves issues of tailgating and addresses the need for security without increasing friction"“We saw an opportunity to create a system that solves issues of tailgating and addresses the need for security without increasing friction,” says Gaydarzhiev. The accuracy of the system lessens the need for security guards, he says. The Silicon Valley startup, currently with 20 employees, was founded in early 2016 by a team from Apple, NVIDIA and Lily Robotics with a goal of targeting mid- to large-sized corporations that currently have deployed badging systems. The company has raised close to $6M from venture capital firms and individuals, and Johnson Controls/Tyco has invested in the startup. Alcatraz AI’s sensor device, mounted near a door, confirms a user’s identity and communicates the user’s badge number to the existing access control infrastructure. “The system improves the facial profile every time, using the neural network to be even more accurate in the future,” says Gaydarzhiev. He says it is the industry’s first “instant one-factor authentication for multi-person in-the-flow sensing.” The system is less expensive than previous facial authentication systems and does not require users to be very close to the reader Easy Enrollment And Deployment Enrollment in the system is easy. Companies can deploy a separate enrollment station, or any reader can be used for enrollment. After badging in a couple of times, the face matching system “enrols” the face with the associated badge number, thus allowing the user to dispense with the badge altogether. In the future, the frictionless system simply recognises the user and opens the door. A user company can quickly deploy the system at locations where thousands of employees have access, without requiring employees to go to HR for enrollment. Gaydarzhiev says accuracy of the system is no less than that of iris scanning, and the accuracy is configurable for specific needs. He says the system is less expensive than previous facial authentication systems and does not require users to be very close to the reader. Facial authentication is also more flexible than iris scanning or fingerprinting. Detecting Intent From Positioning Of Eyes The system detects intent from the positioning of the eyes and body to avoid opening a door unintentionallyIn contrast to near field communication (NFC) or Bluetooth systems, the technology does not require a compatible smart phone or have issues of communication range. There is no need for users to stop and perform an action or gesture to signal intent. The system detects intent from the positioning of the eyes and body to avoid opening a door unintentionally, says Gaydarzhiev. Alcatraz AI is targeting high-tech enterprises, including healthcare, government and eventually banks. Currently they have three pilot installations among large global software companies and are undergoing trials with some government agencies. Today, they sell direct to end users, but the intent is to develop a dealer channel that will account for most of the sales.
Deliveroo, one of the world’s fastest-growing tech businesses, has chosen AEOS access control by Nedap to protect its staff across the world. Nedap’s Uk Expert channel partner, Hunter Group, completed the installation at the first site, in Dubai, and an ambitious rollout will see Hunter install AEOS at around 50 more Deliveroo sites, plus new locations, over the next 12-18 months. Deliveroo was founded in the UK and is proud to export British-born technology around the world. Its ‘Frank’ algorithm is based on powerful predictive technology that evaluates the most efficient way of distributing orders based on the location of restaurants, riders and customers. Global Security Platform With 650% year-on-year growth, Deliveroo’s development has been explosive and the company now has at least 200 offices across 47 countries. Staff security is paramount for Deliveroo and it wanted a global security platform and technology partners capable of keeping up with its expansion. Naturally, Deliveroo is keen to embrace new technologies and innovations too, and wanted to move forward with companies like Nedap and Hunter that have the same future-facing mentality. AEOS will enable Deliveroo to centralize security and will be able to manage its global security system AEOS will enable Deliveroo to centralize security. It will be able to manage its global security system, and closely monitor staff safety at each location, from its London headquarters. Access control reporting will, for example, show that drivers have arrived safely and CCTV footage will enable offices to be viewed from across the world. Central Security Policy Some Deliveroo sites are in areas where staff need more robust protection. AEOS gives the flexibility to adapt security settings and solutions according to the site, while still adhering to a central security policy. Deliveroo can, for example, choose which identifiers its staff can use at each site, and can easily change this whenever it chooses to. AEOS also scales easily – both at individual sites and across new locations. So as Deliveroo continues to grow, its security system can too. Over the coming months, AEOS will be installed at Deliveroo sites in London, Paris, Amsterdam and Brussels, with sites in Madrid, Melbourne and Singapore following soon afterwards.
Sony’s ultra-sensitive SNC-VB770 4K network cameras are helping maintain the safety of bridge users – and the physical integrity of the structure itself – at river crossings between the neighbouring states of Pennsylvania and New Jersey. A total of twenty cameras have been installed by Delaware River Joint Toll Bridge Commission (DRJTBC), a Bi-State commission of Pennsylvania and New Jersey. This self-funded agency ensures safe, efficient and dependable journeys for road users and pedestrians. Potentially Dangerous Collisions A principal application for the cameras is the reliable 24/7 identification and monitoring of hazardous floating debris Several of the bridges controlled by DRJTBC are in areas, where homes are nearby, and local municipalities request not to use powerful artificial illumination at night to limit light pollution. This restriction made the SNC-VB770 an obvious choice for monitoring and surveillance, with its highly sensitive 35mm full-frame Exmor CMOS image sensor capturing crisp 4K color images in conditions of near total darkness. A principal application for the cameras is the reliable 24/7 identification and monitoring of hazardous floating debris. Objects like fallen trees or discarded gas tanks heading down river – especially in winter when water levels are high – pose the risk of impacting with the bridge supports, making early warning of potentially dangerous collisions essential for operational staff. Low-Light Performance In addition to monitoring for signs of loitering and other suspicious activity around the bridge supports, the cameras also help ensure the safety and security of pedestrians using walkways to cross the bridges, especially at night and in adverse conditions of rain and snow when visibility is poor. Supplied and installed by Schneider Electric, all cameras are mounted in weather-resistant housings and integrated with DRJTBC‘s Genetec Security Center network video management system platform. We subsequently put them through their paces in a live demo at two of our bridge locations" “We first previewed the Sony 4K cameras' capabilities at ISC West” explains Eric Freeman, Director of Public Safety & Bridge Security at Delaware River Joint Toll Bridge Commission. “We subsequently put them through their paces in a live demo at two of our bridge locations. Analyzing video from the SNC-VB770 and comparing it against our existing cameras, the difference was immediately clear in terms of Sony’s extra detail and low-light performance.” Video Surveillance Applications "4K is an increasingly popular solution in a wide range of video surveillance applications” says Allen Chan, Manager Application Design for Sony Video Security at Bosch. “Many other 4K cameras currently on the market trade extra resolution for decreased sensitivity, and that’s a big issue in environments where available light is limited. The SNC-VB770 side-steps this challenge with its unprecedented sensitivity of ISO 409600 – giving an impressively clear view at night and in situations where other 4K cameras aren’t viable without installing costly additional illumination”.
LOCKEN has been selected to modernise access management for half of all substations in Enedis’ national network. Following a test phase it has opted for the latest-generation intelligent key by Iseo, which uses contactless induction technology to guarantee instant access. The EDF subsidiary supplies electricity to consumer meters, through extremely high-voltage lines, located at its many substations. The solution is currently being introduced and full deployment across 1,100 substations will take place throughout 2019. Effective Solution The construction principles for this type of structure require wide open spaces to keep people and equipment safe Substations transform the power from very high-voltage lines (90,000 V or 225,000 V) to high-voltage (20,000 V most often) and through to private homes (230V). Some sites may be located in urban settings. In this case, the substations are installed in underground infrastructure, like in Paris and its inner suburbs. But most are found in rural or semi-urban areas, covering a half or full hectare. The construction principles for this type of structure require wide open spaces to keep people and equipment safe. With perimeter security accessible through an outside gate, substations comprise a technical room and a number of transformers, which may be outside or under shelter. These facilities have many access points which must be secured. Without an effective solution, key management is complex and operational efficiency is reduced. Centralized Management Software Substations are sensitive sites with strictly controlled access. Given the exposure to electrical risk, intrusions present potentially lethal consequences. This is where the LOCKEN solution comes in: a single key with associated rights allows employees to open any area they require (and are authorized to access) as part of their job. A lost key is easily disabled within the centralized management software. The solution is particularly appropriate given the number of maintenance officers required by substations. Users are not all Enedis employees, explains Maxime Leboeuf, Project Manager at Enedis. “Although site workers are mostly Enedis employees, the sites must also be accessible to subcontractors for extension and renewal work and a number of maintenance operations, by employees of RTE, the electricity transmission system operator responsible for the very high-voltage lines which end at substations.” Electronic Access Management “Electronic access management drastically reduces the risk of intrusion associated with mechanical keys. With the Locken system, we can now authorize subcontractor access for a specified period and location. In the Enedis setup, the access rights memorised by the electronic keys must be updated daily by the key's user using the dedicated devices.” Keys are deactivated almost immediately once the process is initiated in the Locken Smart Access (LSA) central management software" “Keys are deactivated almost immediately once the process is initiated in the Locken Smart Access (LSA) central management software. This also provides a reliable crisis management tool.” At Enedis, LOCKEN has fitted outdoor access points in often isolated, rural areas. The key supplies the energy to open the cylinder so no wires are needed for doors. Extending Electronic Key The cylinder is approved to resist extreme weather conditions, especially the effects of water. Contactless technology also shields it from dust and oxidation. Enedis is considering the possibility of extending electronic key use to the most sensitive parts of its technical rooms, especially access to control and command rooms, the nerve centres of the substations. Enedis also plans to replace all substation cylinders to minimize the risks associated with joint activity, meaning a number of operations carried out by different engineers can take place simultaneously at the same substation.
Amthal has worked closely with Garrard Windows to install smart CCTV systems for its showroom and factory site, to present ultimate protection for staff, customers and premium products in storage. Garrard Windows is one of the largest suppliers in England, presenting PVC-U and aluminum windows, bifold and patio doors, together with conservatories to the trade, with an objective to remain reliable, efficient and customer oriented. Manufacturing around 2,500 products a week, to ensure the security of products and supply on site, Gerrard Windows called upon Amthal to enhance its security and install CCTV systems throughout its factory and show room site. Smart CCTV Facilities Our aim is to supply the window trade with high quality products, always delivered on time and at competitive prices" Adam Webb, Director of Garrard Windows: “Our aim is to supply the window trade with high quality products, always delivered on time and at competitive prices. Many of our existing customers are fabricators themselves, relying on us for extra capacity in busy periods.” “To maintain this commitment and ability to respond quickly to customer requests, we have to ensure maximum security on site at all times. Amthal identified the subtle installation of smart CCTV facilities throughout our premises as added visual protection, to ensure we can view activity on a 24 / 7 / 365 basis, even when we are off site. Our staff are already feeling the benefits and peace of mind security.” Improved Technology David Williamson, Amthal Sales Account Manager: “Garrard Windows has a renowned reputation in the industry, not only as one of the largest suppliers, but also in responding quickly to client requests to a high-quality standard. It’s essential security on site is maintained to a maximum standard to sustain this level of efficiency and reliability.” The added visuality provides total peace of mind the right security is in place to protect against any risk" “Following an on-site inspection, Amthal made the recommendation of smart CCTV solutions to ensure Directors can feel the benefits of having new and improved technology helping to safeguard assets. The added visuality provides total peace of mind the right security is in place to protect against any risk, or possible disruption due to theft, to the smooth-running operation and delivery to our customers.” Satisfying End User Needs Independently owned, Amthal Fire & Security is dedicated to satisfying end user needs for security safety and convenience offering design, installation, service and remote monitoring of advanced electronic fire and security solutions, including intruder, Fire, Access and CCTV systems. Amthal Fire & Security is accredited by the Security Systems and Alarm Inspection Board (SSAIB) United Kingdom Accreditation Services (UKAS) and British Approvals for Fire Equipment (BAFE).
HID Global, a global provider of trusted identity solutions, announced that Tasmania’s Old Kempton Distillery (OKD) has deployed its Internet of Things (IoT) enablement platform, HID Trusted Tag Services, to combat counterfeiting of its world class whiskeys, gins and other liquor products. HID’s innovative IoT platform for brand protection, combined with the web application developed by local integrator AusNFC, enables Old Kempton Distillery to guard against gray market activities and allows customers to authenticate their product at the point of sale. It also strengthens the appellation registration for the Australian island state of Tasmania, which boasts some of the most pristine water and climate conditions for manufacturing premium, top-shelf liquor products. Taking Measures To Prevent Counterfeiting HID Trusted Tag Services is changing the game for authenticating brands and staying connected to buyers through a mobile experience"“Old Kempton Distillery makes one of the world’s finest whiskeys, and with counterfeiting in our industry becoming a global issue, we recognized the need to take proactive steps to protect our brand,” said Robbie Gilligan, Business Manager and Brand Ambassador for Old Kempton Distillery. “We were seeking the best brand protection technology available and a solution that would also allow us to securely engage with our customers, long after a sale. We believe that HID Trusted Tag Services and the support provided through AusNFC provide just that.” Beyond its anti-counterfeiting features, HID’s IoT offering opens a new and powerful avenue for Old Kempton Distillery to stay connected with customers via direct and hyper-personalized communications that helps the distillery build brand loyalty in a privacy-preserving, closed environment. “We find HID’s solutions to be applicable to many different industries,” said Larry Hower, CEO of AusNFC. “HID Trusted Tag Services is changing the game for authenticating brands and staying connected to buyers through a mobile experience.” Working Of The System The distillery’s solution incorporates HID Trusted Tag Services into the AusNFC web application that drive the front-end mobile experience on customers’ phones. A HID cryptographically secure Near Field Communication (NFC) tag is embedded into the label of every liquor bottle, which links to HID’s cloud authentication service. By tapping their iPhone or Android phone to the bottle, the customer activates a secure communications channel that authenticates the provenance of their premium product – down to the actual bottle number. Each tap generates a unique URL, preventing counterfeiters from copying, spoofing or manipulating the URL for false verification. Combining Cloud Authentication With NFC Tags The advanced cryptographic capabilities of the embedded tags make them virtually impossible to be cloned or copied“HID’s IoT technology is enabling mass adoption of brand protection by major brands worldwide that are seeking to address more sophisticated attempts by fraudsters focused on imitating their products,” said Mark Robinton, Director of Business Development and Strategic Innovation at HID Global. “Manufacturers and consumers alike can rest assured that their product can be authenticated at every stage of its lifecycle – from production to the shopping bag.” HID Trusted Tag Services combine HID’s cloud authentication services with its trusted NFC tags that come in many form factors for variety of product shapes and sizes requiring brand authentication. HID’s trusted NFC tags are embedded into each product during the manufacturing process, and are easily read using NFC-enabled smartphones (both Android and iOS v11 and newer). The advanced cryptographic capabilities of the embedded tags make them virtually impossible to be cloned or copied, and the extended security features in HID’s cloud authentication service provide privacy-preserving brand authentication and consumer engagement in a closed and trusted environment.
3xLOGIC, Inc., a provider of integrated, intelligent security solutions, and a three-time Deloitte Technology Fast 500 winner, announces that the Bradley Business Center, located in Chicago, has installed a 3xLOGIC infinias CLOUD access control system throughout the redevelopment project. HTML Global, an IT Managed Services Provider (MSP), oversaw system installation and continues to provide remote system management. Bradley Business Center (BBC) is the largest redevelopment project on Chicago’s north side, comprising over 500,000 square feet, spread over 22 acres. The BBC offers a unique shared office environment for entrepreneurs and professionals and boasts a wide array of features and amenities. Controlling Common Areas Both organizations do the day-to-day administration of the system, with HTML Global providing back-up and higher-level functions At present, the 3xLOGIC infinias system manages a total of 43 internal doors throughout the complex, split between BBC-managed doors and those for a tenant company, Compass Health Center. The two organizations manage their own access separately but use some of the same network and PoE switches. BBC doors managed are mainly those controlling common areas and shared amenities— parking, fitness facility, rooftop terrace, and others—but also data rooms and other sensitive areas within the office space. Both organizations do the day-to-day administration of the system, with HTML Global providing back-up and higher-level functions when requested. “When we started with BBC, they were looking to us for our knowledge base, and we installed a few doors at that time. Then, we built out the system as they added new offices and common areas to be managed,” explained William Hunt, Managing Director, HTML Global. Cloud-Based System “The distributed Ethernet network can easily handle all the doors and that simplified installation and on-going management. The BBC property management staff don’t want a server onsite, so a cloud solution nicely fits their needs. Another advantage for BBC is our RMR services and the fact that a cloud-based system is mainly operating expenses, not hardware capital expenses—that’s economically advantageous for a property management business.” “There are so many other advantages to a cloud-based system, especially our ability to add doors when any of the resident companies want to join the system, or to expand the number of doors for existing customers—we can add one door or hundreds of doors upon request,” said Hunt. “Compass likes the system functionality and ease-of-use so much, they recently expanded it to their Northbrook location, too. That way, when staff move between the two facilities, they only need one set of credentials.” Access Control System Such high-level control and ease of use is accomplished with minimal hardware on site BBC controls access by zone and/or amenity for each credential holder, administrators can add zones and close access to other zones with a few keystrokes. Door control is granular, making it easy to provide all-areas access to senior staff and highly-limited access, for example, for contractors and temporary workers. Such high-level control and ease of use is accomplished with minimal hardware on site. Many administrators were up and running on the infinias system with very little training, if any. With a cloud-based access control system, new tenants can join the system with ease, or a tenant can be removed from the system in a matter of minutes. Fix Things Remotely Hunt again, “As an MSP, we are overseeing a system that updates itself automatically, and because BBC management doesn’t have a full-time IT person, that’s where we come in.” The future looks bright for HTML Global with the Bradley Business Center. Current office space is nearing fully-leased status, and BBC management is looking to expand their property offerings into additional buildings located on the same parcel. Hunt is impressed with another feature of the cloud-based system, “The network is set up on PoE switches, so if a door isn’t acting properly, we can fix things remotely, we don’t need to roll a truck—that’s very cost-effective.”
Round table discussion
Our Expert Panel is an opinionated group on a wide variety of topics, and we are dedicated to providing a useful and flexible forum to share those opinions. This week, our panelists address a range of opinions about several self-selected topics, culled from the large number of Expert Panelist responses we have collected in the last year. In this Expert Panel Roundtable article, we will share these varied and insightful responses to ensure they are not lost to posterity!
The security industry is full of individuals who call themselves consultants. It’s a term that is thrown around rather loosely, and in some situations the term can be roughly translated as “between jobs.” But “real” consultants provide real value to their clients in a variety of subject matter specialties. We asked this week’s Expert Panel Roundtable: What role should consultants play in the security technology buying decision?
The new year 2019 is brimming with possibilities for the physical security industry, but will those possibilities prove to be good news or bad news for our market? Inevitably, it will be a combination of good and bad, but how much good and how bad? We wanted to check the temperature of the industry as it relates to expectations for the new year, so we asked this week’s Expert Panel Roundtable: How optimistic is your outlook for the physical security industry in 2019? Why?