Ping Identity, the pioneer in Identity Defined Security, announced a significant update to PingOne for Customers, the cloud-delivered Identity-as-a-Service (IDaaS) offering built for developers. The API-first solution can now deliver seamless and secure push notifications from custom mobile applications that can be used for passwordless and advanced multi-factor authentication. The cloud identity solution helps development teams speed time to launch their applications, while also taking securit...
ExtraHop announces ExtraHop® Reveal(x) Cloud™, a Software-as-a-Service (SaaS)-based network detection and response (NDR) solution for the cloud-first hybrid enterprise. Reveal(x) Cloud provides deep and continuous visibility, enabling Security Operations (SecOps) teams to analyze every transaction, detect threats, and respond to attacks to gain control over their hybrid attack surface and protect their investment in the cloud. While the cloud has proven to be a force multiplier for De...
The ability to treat patients in a secure environment is a base requirement of hospitals and other healthcare facilities. Whether facilities are large or small, security challenges abound, including perimeter security, access control of sensitive areas, video surveillance, and even a long list of cyber-risks. We asked this week’s Expert Panel Roundtable: What are the security challenges of hospitals and the healthcare industry?
Allied Universal, renowned security and facility services company in North America, has announced the acquisition of Cypress Private Security, LP - a San Francisco-based company offering comprehensive security services. Terms of the deal were not disclosed. Manned guarding and security personnel “Cypress Private Security is a company that we have long admired and always wanted to partner with,” said Steve Jones, CEO of Allied Universal. “This security company has built...
Security video wall and visual display solutions experts Ultimate Visual Solutions (UVS) works on projects in 15 countries around the world since its launch nine months ago. UVS changed its name from eyevis UK last September following the acquisition of eyevis GmbH by the Leyard group. Providing turnkey solutions The rebranding has allowed the company to offer an expanded range of products and services The rebranding has allowed the company to offer an expanded range of products and services...
Allied Universal®, a security and facility services company in North America, recently hires Morgan Price as senior vice president of recruitment and talent acquisition to lead the company’s recruiting efforts. He is based in the Santa Ana corporate office. With more than 20 years of talent development and human resources experience, Price is an expert in workforce planning, performance management, succession planning and leadership development in the global supply chain management in...
iluminar, a specialty security lighting manufacturer, is excited to announce its partnership with Professional Sales Representatives (PSR) to increase the company’s services and sales presence with customers across the western United States. PSR is an independent sales agency operating in the 13 western states and Guam. Their associates bring many years of field sales experience in the security marketplace as well as the audio/video, low voltage, fire and life safety industries. Since PSR’s founding in 2001, their fundamental principles are to represent quality products from quality manufacturers. Experienced representatives “Our partnership with PSR will allow us to bring the latest solutions in lighting technology to our customer base in the western U.S.,” said Eddie Reynolds, iluminar CEO. “A key part of iluminar’s growth is building a team of experienced representatives who know our products, our value and our industry.” "We are very proud to be a part of Eddie’s team,” said Scott Crown, PSR managing partner. “We have respected the accomplishments of this brand and have enjoyed our friendship with Eddie for years. We will do great things together.”
Security 101, one of the nation’s fastest growing security integrators, continues to expand nationally with the addition of a new office in the San Francisco Bay Area. The office will serve San Francisco and the surrounding metropolitan area, and will engineer, install, operate, monitor, manage and maintain integrated security solutions for local small, midmarket and enterprise business customers. Local tech companies Veteran entrepreneur Rob Chamberlin is the latest franchise owner to join the team at Security 101. Over the past 15 years Chamberlin has founded and operated two successful technology companies – starting True Wireless in 2004 and DataXoom in 2012. He helped build True Wireless into one of the nation’s largest value-added wireless resellers in the U.S. Chamberlin has also advised local tech companies on marketing, PR and business development The company appeared on the San Francisco Business Times ‘Top 100 Fastest Growing Private Companies’ list and the Inc. 5000. He continues to serve on the board of directors for DataXoom, a mobile virtual network operator. In addition to operating his businesses, Chamberlin has also advised local tech companies on marketing, PR and business development. Fast-Paced market “I believe we are off to an excellent start with a winning combination here in the Bay Area,” said Chamberlin. “I am very familiar with the ins and outs of the local business climate, and Security 101 corporate has shown us that they have the technology know-how and operational support to help make this office a huge success.” Security 101 has been interested in opening an office in the San Francisco Bay Area for some time now, according to Steve Crespo, Security 101 chief executive officer. “It’s undisputedly the tech capital of the world and our corporate skill set fits that fast-paced market perfectly,” he said. “We have been looking for the right person to lead our efforts in the Bay Area, and we believe we have found that person in Rob.”
Over a fifteen-month period, Sonitrol has opened new franchises and expanded current markets in eight states including Illinois, Indiana, Kentucky, Ohio, Connecticut, Massachusetts, California and Florida. The expansion of current markets where Sonitrol has a footprint assists in the growth of the Sonitrol brand and secure more businesses with the best in verified electronic security, keeping our communities safe and keeping more criminals off the streets. “Sonitrol is excited to continue to expand our footprint and bring best-of-class service and verification technology to every market in North America,” says Julie Beach, VP of Sonitrol Corporate. “The need for alarm verification and false alarm reduction is growing in every community. We pride ourselves in providing police with the very best information to improve their safety and increase police response time to our clients.” In addition to this exciting growth, Sonitrol is celebrating its 55th anniversary this year Celebrating 55th anniversary In addition to this exciting growth, Sonitrol is celebrating its 55th anniversary this year. Bryan Bates, VP of Sales of Sonitrol of Northeast Florida and Sonitrol of Lexington says, “I have always been impressed with the entrepreneurs of the Sonitrol family. My mother and father worked for Sonitrol of Dallas before taking the chance on purchasing their own Sonitrol dealership in Lexington, KY in 1984. “With our recent opening of Sonitrol of NE Florida in 2018 and continuing to grow the Sonitrol of Lexington business, my brother, Jeremy Bates, and I can continue the legacy and provide the best security technology in the industry.” Tested and verified security services Expansion for us to Columbus, Ohio is very exciting especially with Sonitrol’s tested and proven verified security services"Chip Shiver, President of Sonitrol of SW Ohio, also has found recent success in growing the Sonitrol presence from the SW Ohio area to expansion in Columbus, OH. Shiver says, “Expansion for us to Columbus, Ohio is very exciting especially with Sonitrol’s tested and proven verified security services. Sonitrol’s enhanced verified technology and our many years of operation in Cincinnati, Dayton, and Springfield brings huge opportunities for us in Columbus, Ohio.” Sonitrol of SW Ohio has been in business since 1971. Lastly, Sonitrol of Fort Lauderdale recently expanded the Sonitrol brand to the Miami-Dade market. John Ray, President & CEO, says, “Sonitrol’s unique verified intrusion technology has grown over the past 55 years to become part of a world-class integrated security solution, keeping us at the forefront of protecting people and assets. Here in South Florida, we’ve expanded our franchise area with the recent addition of the Miami market, paving the way to providing more businesses in Dade County with the best security technology available on the market.”
Sargent and Greenleaf (S&G), a manufacturer of high-quality mechanical and electronic locks, announces that it has been acquired by OpenGate Capital, a global private equity firm. News of S&G and OpenGate Capital entering into an agreement to acquire was initially announced in January and financial terms were not disclosed. “With the support from OpenGate Capital, we are working to develop and release advanced locking solutions for safes, vaults, ATMS and highly sensitive environments quicker to market while building even stronger customer relationships,” said Keith Deaton, COO at Sargent and Greenleaf. Multiple industry awardsOpenGate Capital is a global private equity firm that strives to acquire and optimize lower middle market businesses “S&G has won multiple industry awards over the past five years in recognition of product innovation in the many channels of businesses we serve, and working with OpenGate Capital, we are enthusiastic about the many exciting opportunities that lay ahead.” Established in 2005, OpenGate Capital is a global private equity firm that strives to acquire and optimize lower middle market businesses throughout North American and Europe. Leaders within both companies will collaborate to leverage resources to support S&G’s mission to drive innovation into the business through technological enhancements. S&G will transition into a stand-alone business under the ownership of OpenGate Capital. “Through our collaboration with the management team at S&G, we have already developed many new initiatives to accelerate the company’s growth and apply new technologies to its broad and deep product line,” said Paul Bridwell, Managing Director at OpenGate Capital, who is responsible for managing and supporting operations of the firm’s investments in North America. “This is a business with a deep and rich heritage and we’re incredibly proud to welcome S&G into our second fund’s portfolio.”
Vaion, a Ubon Partners company, is emerging from stealth mode to disrupt the physical security market by embedding the power of artificial intelligence (AI) into its complete video surveillance solution. Vaion's product line, which includes high-quality security cameras, a video management system and other intelligent solutions, premieres at IFSEC International, an event that takes place between June 18-June 20 in London, U.K. As a global company with offices in New York, London, and Oslo, Vaion is changing the traditional video security landscape with AI capabilities that make it easier for businesses and organizations to monitor their assets proactively. Detecting threats in earliest stages Vaion offers an end-to-end surveillance solution that will help companies detect threats in their earliest stagesWith embedded video and audio analytics powered by machine learning algorithms, focused interfaces, intuitive installation processes and a range of smart cameras, Vaion offers an end-to-end surveillance solution that will help companies detect threats in their earliest stages and perform fast, effective investigations with fewer resources. At the same time, Vaion vastly improves investigations by implementing the fastest, most accurate forensic searches using similarities and intelligent timelines. Initial product portfolio includes: Security cameras (Vaion vcam) with integrated directional audio analytics VMS (Vaion vcore) with embedded video analytics Security appliances (Vaion vserver) Hybrid cloud service (Vaion vcloud) Their first major premiering event will be IFSEC International, the leading security event for Europe and the U.K. There, Vaion representatives will provide an up-close look at how machine learning and integrated analytics offer a significant improvement on security deployments. Easy tracking of people and objects Businesses get instant alerts about suspicious activity and can easily track people and objects as they move through perimetersBusinesses get instant alerts about suspicious activity and can easily track people and objects as they move through perimeters. And exceptional video quality feeds from Vaion vcam Dome and Pano means that there's always a clear picture, no matter the lighting or environmental conditions. Analytics are performed pervasively, at scale and in real-time, from all the cameras in a deployment (even third-party cameras) and are embedded into the VMS (vcore). Vaion’s hybrid cloud approach makes possible the reality of remote configuration and access, instant firmware and software upgrades, and license pooling with great performance and network efficiencies. Sister company to cybersecurity innovator Jazz Networks, Vaion believes that a robust cybersecurity approach is necessary even in the physical security world. That is why its solution is secure by default with always-on encryption for recording and media transport. Vaion's products are designed in Norway, with software developed in the U.K. and cameras assembled in Taiwan. The portfolio will be available for customer trials and proofs of concept from July and generally available from Fall 2019. operational and business intelligence We deliver a solution that allows customers to react to threats before they escalate rather than just help document the damage""We believe that it’s time to move from a mainly reactive to a proactive security model, and we founded Vaion to help our customers achieve this goal. We believe that the next generation solutions will be based on smarter sensors, software, and services that, instead of record what they see, actually understand the environment they operate in to help businesses act on these insights on time. “We deliver a solution that allows our customers to react to threats before they escalate rather than just help them document the damage. It enables them to find what they are looking for in seconds instead of days and provides them with much better operational and business-relevant intelligence," said Tormod Ree, Vaion CEO. Learn more about Vaion's innovative new security products online and by visiting with Vaion representatives at IFSEC International. Interested security professionals will be able to see Vaion's game-changing security technology in action and find out why AI is the secret to better, more comprehensive protection.
IdentiSys Inc. has been named one of the Top 150 Workplaces in Minnesota by the Star Tribune and was published in the Star Tribune Top Workplaces special section on Sunday, June 16. Produced by the same team that compiles the 28-year-old Star Tribune 100 report of the best-performing public companies in Minnesota, Top Workplaces recognizes the most progressive companies in Minnesota based on employee opinions measuring engagement, organizational health and satisfaction. The analysis included responses from over 140,000 employees at Minnesota public, private and non-profit organizations. Employee engagement and retention The rankings in the Star Tribune Top 150 Workplaces are based on survey information collected by Energage, an independent company specializing in employee engagement and retention. IdentiSys was ranked 32 out of 70 on the small company list. Very few companies make this list ever and this is our sixth year in a row obtaining Top Workplace honours" “It is a huge honor to be among the best of the best in Minnesota. And, even more important is that our employees feel this way about the company and what we do” said Mike Shields II president and CEO of IdentiSys. “Very few companies make this list ever and this is our sixth year in a row obtaining Top Workplace honors. I am so proud to lead this organization and know that we have the best colleagues to support our business and the focus we place on customer satisfaction.” Best work environments “Our growth strategy for the past 20 years has always been dependent on the services our employees provide daily and we believe this is the key to our continued business success.” Star Tribune Publisher Michael J. Klingensmith said, “The companies in the Star Tribune Top 150 Workplaces deserve high praise for creating the very best work environments in the state of Minnesota. My congratulations to each of these exceptional companies.” To qualify for the Star Tribune Top Workplaces, a company must have more than 50 employees in Minnesota. Over 2,000 companies were invited to participate. Rankings were composite scores calculated purely on the basis of employee responses.
The industry faces numerous challenges in the coming year. Physical and cyber security threats continue to become more complex, and organizations are struggling to manage both physical and digital credentials as well as a rapidly growing number of connected endpoints in the Internet of Things (IoT). We are witnessing the collision of the enterprise with the IoT, and organizations now must establish trust and validate the identity of people as well as ‘things’ in an environment of increasingly stringent safety and data privacy regulations. Meanwhile, demand grows for smarter and more data-driven workplaces, a risk-based approach to threat protection, improved productivity and seamless, more convenient access to the enterprise and its physical and digital assets and services. Using Smartphone Apps To Open Doors Cloud technologies give people access through their mobile phones and other devices to many new, high-value experiencesEnterprise customers increasingly want to create trusted environments within which they can deliver valuable new user experiences. A major driver is growing demand for the ‘digital cohesion’ of being able to use smartphone apps to open doors, authenticate to enterprise data resources or access a building’s applications and services. Cloud technologies are a key piece of the solution. They give people access through their mobile phones and other devices to many new, high-value experiences. At the same time, they help fuel smarter, more data-driven workplace environments. With the arrival of today’s identity- and location-aware building systems that recognize people and use deep learning analytics to customize their office environment, the workplace is undergoing dramatic change. Improved Fingerprint Solutions Cloud-based platforms and application programming interfaces (APIs) will help bridge biometrics and access control in the enterprise, overcoming previous integration hurdles while providing a trusted platform that meets the concerns of accessibility and data protection in a connected environment. At the same time, the next generation of fingerprint solutions will deliver higher matching speed, better image capture quality and improved performance. The next generation of fingerprint solutions will deliver higher matching speed, better image capture quality and improved performance Liveness detection will ensure that captured data is from a living person. Biometrics authentication will also gain traction beyond access control in immigration and border control, law enforcement, military, defense and other public section use cases where higher security is needed. Flexible Subscription Models Access control solutions based on cloud platforms will also change how solutions are deployed. Siloed security and workplace optimization solutions will be replaced with mobile apps that can be downloaded anywhere across a global ecosystem of millions of compatible and connected physical access control system endpoints. These connections will also facilitate new, more flexible subscription models for access control services. As an example, users will be able to more easily replenish mobile IDs if their smartphones are lost or must be replaced. Generating Valuable Insights With Machine Learning Machine learning analytics will be used to generate valuable insights from today’s access control solutionsEducation, finance, healthcare, enterprise, and other niche markets such as commercial real-estate and enterprises focused on co-working spaces will benefit from a cloud-connected access control hardware foundation. There will be a faster path from design to deployment since developers will no longer have to create an entire vertically integrated solution. They will simply add an app experience to the existing access control infrastructure. New players will be drawn to the market resulting in a richer, more vibrant development community and accelerated innovation. Data analytics will be a rapidly growing area of interest. Machine learning analytics will be used to generate valuable insights from today’s access control solutions. Devices, access control systems, IoT applications, digital certificates and location services solutions, which are all connected to the cloud, will collectively deliver robust data with which to apply advanced analytics and risk-based intelligence. As organizations incorporate this type of analytics engine into their access control systems, they will improve security and personalize the user experience while driving better business decisions.
It’s not surprising that people are nervous about the security of newer technologies, many of which are part of the Internet of Things (IoT). While they offer greater efficiency and connectivity, some people still hesitate. After all, there seems to be a constant stream of news stories about multinational corporations being breached or hackers taking control of smart home devices. Both of these scenarios can feel personal. No one likes the idea of their data falling into criminal hands. And we especially don’t like the thought that someone can, even virtually, come into our private spaces. The reality, though, is that, when you choose the right technology and undertake the proper procedures, IoT devices are incredibly secure. That said, one of the spaces where we see continued confusion is around access control systems (ACS) that are deployed over networks, particularly in relation to mobile access, smartcards, and electronic locks. These technologies are often perceived as being less secure and therefore more vulnerable to attacks than older ACS systems or devices. In the interest of clearing up any confusion, it is important to provide good, reliable information. With this in mind, there are some myths out there about the security of ACS that need to be debunked. The fact that these devices communicate with an ACS via Bluetooth or Near Field Communication (NFC) leads to one of the main myths we encounter Myth #1: Mobile Credentials Are Not Secure The first myth we have to look at exists around mobile credentials. Mobile credentials allow cardholders to access secured doors and areas with their mobile devices. The fact that these devices communicate with an ACS via Bluetooth or Near Field Communication (NFC) leads to one of the main myths we encounter about the security of credentialed information. There is a persistent belief that Bluetooth is not secure. In particular, people seem to be concerned that using mobile credentials makes your organization more vulnerable to skimming attacks. While focusing on the medium of communication is an important consideration when an organization deploys a mobile credentialing system, the concerns about Bluetooth miss the mark. Bluetooth and NFC are simply channels over which information is transmitted. Believing that Bluetooth is not secure would be the same as suggesting that the internet is not secure. In both cases, the security of your communication depends on the technology, protocols, and safeguards we all have in place. So, instead of wondering about Bluetooth or NFC, users should be focused on the security of the devices themselves. Before deploying mobile credentials, ask your vendor (1) how the credential is generated, stored, and secured on the device, (2) how the device communicates with the reader, and (3) how the reader securely accesses the credential information. When you deploy smartcard technology as part of your ACS, you should choose the latest generation, such as MiFARE DesFIRE EV1 or EV2 and HID iCLASS SEOS Myth #2: All Smartcards Are Equally Secure The question “how secure are my smartcards?” is a serious one. And the answer can depend on the generation of the cards themselves. For example, while older smartcards like MiFARE CLASSIC and HID iCLASS Classic offer better encryption than proxy cards and magstripe credentials, they have been compromised. Using these older technologies can make your organization vulnerable. As a result, when you deploy smartcard technology as part of your ACS, you should choose the latest generation, such as MiFARE DesFIRE EV1 or EV2 and HID iCLASS SEOS. In this way, you will be protecting your system as well as your buildings or facilities. Some traditional readers and controllers can also pose a serious risk to your organization if they use the Wiegand protocol, which offers no security. While you can upgrade to a more secure protocol like OSDP version 2, electronic locks are a very secure alternative worth considering. It is also important to understand that not all smartcard readers are compatible with all smartcard types. When they are not compatible, the built-in security designed to keep your system safe will not match up and you will essentially forego security as your smartcard-reader will not read the credentials at all. Instead, it will simply read the non-secure portion—the Card Serial Number (CSN) —of the smartcard that is accessible to everyone. While some manufacturers suggest that this is an advantage because their readers can work with any smartcard, the truth is that they are not reading from the secure part of the card, which can put your system and premises at risk. Using electronic locks can help protect facilities and networks through various security protocols, including encryption and authentication Myth #3: Electronic Locks Are More Vulnerable These days, there are still many who believe that electronic locks, especially wireless locks, are more vulnerable to cybercriminal activity as compared to traditional readers and controllers. The concern here is that electronic locks can allow cybercriminals to both access your network to get data and intercept commands from the gateway or nodes over the air that would allow them access to your buildings or facilities. The reality is that using electronic locks can help protect facilities and networks through various security protocols, including encryption and authentication. Additionally, because many of these locks remain operational regardless of network status, they provide real-time door monitoring. This means that many electronic locks not only prevent unauthorized access but also keep operators informed about their status at all times, even if a network goes down. Outdated technology and old analogue systems are more vulnerable to attacks When it comes to deploying electronic locks, it is important to remember that, like any device on your network, they must have built-in security features that will allow you to keep your information, people, and facilities safe. Be Prepared To Unlock Future Benefits Ultimately, the information in your IP-based ACS is at no greater risk than any other information being transmitted over the network. We just have to be smart about how we connect, transmit, and store our data. In the end, maintaining the status quo and refusing to move away from old technology is not a viable option. Outdated technology and old analogue systems are more vulnerable to attacks. The reason it is so important to debunk myths around ACS and, at the same time, get people thinking about network security in the right way is that network-based systems can offer an ever-increasing number of benefits. When we deploy new technology using industry best practices and purchase devices from trusted vendors, we put ourselves and our networks in the best possible position to take full advantage of all that our increasingly connected world has to offer.
The oil and gas market is driven by a number of technology trends, political issues, waves of supply and demand, and regulations. At times, it seems like the market is in a constant state of ebb and flow, with business affected by traditional drivers, such as government mandates and operational efficiencies, and other non-traditional markers, like challenging weather conditions (consider the 2017 hurricane season as an example). Additionally, the global economy continues to grow, propelling increased energy demand. But like nearly every other market today, the oil and gas market is on the brink of a sea change. According to Deloitte’s 2018 outlook on oil and gas, “the digital revolution is here.” The sheer volume of information and data generated by digital devices, such as those associated with the Internet of Things, will allow producers to leverage rich data and combine it to deliver smart, efficient solutions. The rise of digital technologies is unleashing new ideas across the oil and gas industry and even though we are in the beginning stage of being able to harness the power of these types of technologies, innovative ideas are emerging — all designed to support the core business, reduce internal investments, deliver products faster, boost efficiencies, and enhance safety. Maximized Operations And Increased ROI This ongoing growth propels energy producers to embark on extensive exploration and production activities to meet increased demand This is welcome news because there are a number of challenges facing the oil and gas industry, from improving reserve replacement and ensuring workplace safety to reducing operating costs and limiting downtime. All of these objectives must be achieved while maximizing operations and increasing overall return on investment. Never has it been more crucial for critical infrastructure organizations to demonstrate a focus on safety, security, and collaboration. Here's why: Growth and demand According to the U.S. Energy Information Administration, world energy consumption will grow by 56 percent between 2010 and 2040. This ongoing growth propels energy producers to embark on extensive exploration and production activities to meet increased demand. As energy-centric organizations look to emerging markets or remote regions to source production, safety becomes even more mission-critical to their success. Compliance Continuous demand is only one challenge; compliance with industry and government regulations is another significant hurdle that must be maintained or there is risk of production shutdowns. For example, the Department of Homeland Security’s Chemical Facility Anti-Terrorism Standards (CFATS) impose comprehensive federal regulations for high-risk chemical facilities, requiring organizations to conduct vulnerability assessments. This is just one of many regulatory procedures sites must follow to conform to environmental protections, safety precautions, and safe handling of hazardous materials. As energy-centric organizations look to emerging markets or remote regions to source production, safety becomes even more mission-critical to their success Threat Protection, Mitigation, And Collaboration In addition to meeting the requirements of regulatory procedures, mitigating risk in this industry propels leaders to develop stringent strategies to ensure robust protection of people, property, and assets, effective and efficient response to incidents when they occur, and procedures and protocols to ensure business continuity in emergency situations. Energy providers require comprehensive safety planning and technology systems that can augment the capabilities of on-site and remote personnel. In recent years, video solutions have become the standard for monitoring facilities, assets, and employees, and now these organizations require enterprise-class solutions that can help gather intelligent data that allows for enhanced security and safety efforts but also focus on processes that enhance operational efficiencies. Cyber-attacks are becoming increasingly more complex and sophisticated in the oil and gas market IT security is also a concern. Cyber-attacks are becoming increasingly more complex and sophisticated in the oil and gas market. An IT breach can cause operational havoc, risk to the public, and damage to an organization’s brand. Adopting a continuous improvement approach to a security strategy safeguards and helps protect valuable company information and reduces the likelihood of an incident. Also, collaboration between IT and physical security leaders and the correlation of both departments' data makes it much easier to identify a potential breach before havoc ensues. The Digital Age With the rise of the digital revolution and the demand for data to improve insight, oil and gas producers and businesses need to find new ways to capture data, correlate it as needed, and then leverage it to make the most informed decisions. Software platforms are being used in a wide variety of applications to provide a single pane-of-glass view that allows operators to gain critical insight into operations. By collecting intelligence from digital sensors, such as video surveillance cameras, open-source Web intelligence, building systems, crowdsourcing, weather sensors, mobile devices, and more, operators can detect potential risks and manage and respond to situations more efficiently. Furthermore, information can be shared easily with multiple agencies, employees, citizens, and first responders — especially valuable in the event of a safety incident where rapid response is paramount. By creating a single enterprise-wide view across disparate systems and technologies, organizations experience improved response times, lowered operational costs, and increased employee safety. Cyber, traditional security, digital devices, and situational awareness technologies combine to deliver an integrated, automated, and adaptive architecture to efficiently mitigate advanced threats in real time or forensically Traditional Command Centers Intelligent solutions, such as those derived from the idea of artificial intelligence, help organizations make sense of vast amounts of data. These integrated applications, such as advanced video analytics and facial recognition, can automatically pinpoint potential breaches and significant events, and send alerts to the appropriate personnel, departments, and agencies. These solutions can be powerful in unifying disparate command center technologies within the oil and gas industry, fusing critical data input from emergency calls and responder activity to enhance situational awareness. With traditional command centers relying mostly on call and radio updates, visibility can be limited, but new digital platforms enable operators to oversee a situation and engage with and direct the response force. Overall, these types of automated functions deliver a simplified and modernized operating environment. The Future Is The Intelligent SOC Oil and gas facilities can implement a proactive approach to safety and better mitigate threats and protect assets All of these digital solutions are designed to take center stage within the Intelligent Security Operations Center (ISOC). To combat advanced, multi-stage threats, oil and gas facilities are transforming the traditional SOC into the next-generation unified ISOC with an integrated platform for detection, investigation, communication, and response. Cyber, traditional security, digital devices, and situational awareness technologies combine to deliver an integrated, automated, and adaptive architecture to efficiently mitigate advanced threats in real time or forensically. Energy providers operate in challenging, fast-moving environments in which opportunities, requirements, and regulations can vary widely, change quickly, and evolve significantly over time. As the idea of the digital age continues to transform this market, new technologies will be more widely used to improve business operations from exploration and extraction to transportation and distribution. With the right technology, strategic partnerships, and enhanced situational awareness, oil and gas facilities can implement a proactive approach to safety and better mitigate threats and protect assets, while continuing to focus on achieving business goals that will sustain supply and demand for years to come.
Facial recognition has seen huge breakthroughs since the U.S. National Institute of Standards and Technology (NIST) first began testing in 2010. Accuracy has seen massive gains, especially from 2013-2018. In the 2018 test, the most accurate algorithm was 20 times more accurate than the 2013 equivalent. Essentially, 95 percent of the matches that failed in 2013 now yield correct results. Compare that to 2010-2013, when the most accurate algorithm reduced its error rate by 30 percent. This reduction in error rates since 2013 is due to wholesale replacement of the old algorithms with new ones based on deep convolutional neural networks — completely revolutionizing the technology. Optimal recognition results SAFR says it delivers optimal recognition results with 99.86 percent accuracy in under 100 milliseconds One entrant in the newly energized market is RealNetworks, whose SAFR for Security is an AI-based facial recognition solution for live video that integrates video management system (VMS) solutions. With 24/7 monitoring, SAFR detects and matches millions of faces accurately in real time, enabling teams to manage a watchlist across any number of video feeds. SAFR says it delivers optimal recognition results with 99.86 percent accuracy in under 100 milliseconds, even in real-world conditions where faces are in motion, at different angles, under poor lighting, or partially obscured. SAFR builds on RealNetworks’ 23-year history in video technologies. Launched in July 2018, SAFR — secure, accurate facial recognition — is enabling new applications for security, convenience, and analytics. Create security responses “We seek to be the world’s most trusted facial recognition platform and are delighted to partner with customers in the security industry and elsewhere to shape a more secure, convenient future worldwide,” says Dan Grimm, Vice President of Computer Vision and General Manager of SAFR at RealNetworks. “Security professionals are asked to keep us safe 24/7, monitoring a burgeoning number of cameras, and we help make them more effective.” SAFR targets facial recognition for live video, identifying camera-unaware faces moving in real-world conditions. In the April 2019 NIST results, SAFR tested as the fastest and most compact solution among algorithms with less than 0.022 False Non-Match Rate — 62 percent faster than the average speed, according to the company. SAFR now provides capabilities such as live video overlays alerting security professionals to events in real time, automatic bookmarks with rich metadata for investigative work, and alerts that can be customized to create security responses. SAFR uses one-sixth the compute power of competing facial recognition solutions Facial recognition algorithms Five years ago, facial recognition algorithms would struggle to match forward-facing people from still images, let alone camera-unaware moving faces from live video with variations in rotation and tilt. SAFR says they have achieved a balance of accuracy and performance for live video. A contributor to this accuracy is consistency across a range of skin tones. The algorithm was trained on a highly diverse global set of over 10 million non-simulated real-world faces. SAFR was optimized for speed and can sample a face multiple times during the same period of time as other algorithms, subsequently increasing its accuracy. SAFR achieves the performance through edge processing. Distributed architecture enables efficient bandwidth consumption, reducing the roundtrip latency of facial recognition speed to under 100 milliseconds. The savings lower total cost of ownership (TCO): SAFR uses one-sixth the compute power of competing facial recognition solutions, equating to $500,000 or so in savings on a 250-camera deployment. Integrated experience SAFR also uses off-the-shelf hardware and is optimized to leverage inexpensive GPUs SAFR also uses off-the-shelf hardware and is optimized to leverage inexpensive GPUs. SAFR can be deployed on premises or in the cloud, and supports Windows, Linux, macOS, iOS, and Android. When SAFR is paired with a VMS, such as Milestone XProtect or Genetec Security Center, the integrated experience includes 24/7 monitoring to detect and match faces in real-time. Features include live video overlays within the VMS to identify strangers, threats, concerns, unrecognized persons, VIPs, employees, or other tagged individuals in live video. Real-time alerts can be customized for when persons of interest appear on a video camera feed. Additionally, automatic bookmarks with rich metadata make for easier investigative review of security footage. Facial recognition technology is increasingly in demand to improve safety across various industry verticals. Better customer experience Large enterprises with high-visitor flows and heightened security — such as transportation hubs, stadiums, universities, and hospitals — need to know in real time when persons of interest or those on watchlists appear on camera. Sports stadiums could apply facial recognition to deny entry to banned patrons, locate lost children, or recognize VIPs to deliver a better customer experience. Hospitals need access control to restricted areas and pharmaceutical storage closets Hospitals need access control to restricted areas and pharmaceutical storage closets. Airports and transit centers value traffic flows, demographic composition, and dwell times to help improve scheduling. SAFR for Security is available worldwide, and the company partners with VMS providers such as Milestone, Genetec, Digifort, and IPConfigure by Paliton Networks. They are actively working to support additional VMS solutions and have sales teams located in major metropolitan cities around the world. Security professionals “The job of the security professional is critical in today’s world,” says Grimm. “SAFR for Security helps mitigate the challenges of the important work security professionals do to keep us all safe.” In designing and developing SAFR, RealNetworks considered diversity and the uniqueness of each person; Grimm says their massive global training data set is a competitive advantage. SAFR is designed with privacy in mind. All facial images and signatures are AES-256 encrypted in transit or at rest. “SAFR is powerful enterprise-grade software that is continuously improving through innovation and many years of expertise,” says Grimm.
Managed services provided through the cloud offer multiple advantages for system integrators. These Include: Increased Recurring Monthly Revenue: Managed services are a new business model that generates more stable and predictable income streams for integrators. Stickier Customers: Managed services foster a more involved relationship between integrators and their customers, which can help boost customer retention. High Gross Profit Margins: Cloud managed services create an opportunity for a service and technology to be purchased together, helping to generate a higher gross profit margin from the beginning of the customer relationship. They Are Easier To Provide: The cloud enables integrators to serve more sites without hiring additional technicians. Problems Can Be Fixed Proactively: When a problem occurs on a site that is managed by a cloud-based system, the integrator can receive a real-time notification regarding the issue - possibly before the customer even notices a disruption in service. Increased Valuation Of Business: According to a study by Dell, companies that utilize cloud, mobility, and security technologies are experiencing as much as 53 percent higher revenue growth rates compared to those who do not such technologies. Importance Of Cloud-Based Solutions The cloud also challenges integrators to educate customers on the value of the new approach The cloud also challenges integrators to educate customers on the value of the new approach. For example, the cloud changes the expense model of security systems. It allows customers to shift from a capital expenditure (CapEx) model, where large capital funding is required to purchase equipment, to an operational expenditure (OpEx) model, where the costs of the solution become an operating expense. Since the cameras, installation, storage, and software are packaged into the service, you don’t need a large capital outlay up front - you simply pay a predictable expense every month. Leveraging this difference opens new sales opportunities for integrators. The benefits of cloud services on how physical security equipment and software services can be monitored and maintained through a connected service is a particular benefit to integrators. Data Monitoring And Security “By having data describing the health of the system shared on the cloud, system integrators can observe data on demand and create proactive maintenance plans in coordination with the end user,” says Stuart Rawling, Director of Business Development, Pelco by Schneider Electri, and one of our Expert Panelists. A daily challenge for end users is balancing human resources used in the operation of a system “Such plans should result in increased system reliability and less downtime. If system performance data is aggregated and anonymized, it could also be used by manufacturers to analyze and form conclusions about maintenance schedules and system lifespan.” A benefit is happier customers. “A daily challenge for end users is balancing human resources used in the operation of a system and daily maintenance, with maintenance having shared responsibility with the system integrator,” says Rawling. The Cloud Software As A Service The SaaS model gives companies the resources to improve the deep learning model" The cloud also can help to make cutting edge technologies more affordable. Economies of scale provided by the Cloud (Software as a Service, or SaaS) are making the sophisticated capabilities of deep learning affordable to a wider audience. Meanwhile, deep learning augments cloud systems with capabilities that may not be available (or affordable) in on-premise systems, thus accelerating the broader move to cloud systems. “Having a SaaS model gives companies the resources to improve the deep learning model,” says Shawn Guan, CEO and co-founder of Umbo Computer Vision, a provider of deep learning video analytics. “We can make more accurate systems that scale better and faster. SaaS enables vendors to do something great with deep learning. You don’t have to redo it for everybody. One customer benefit from another customer and all the knowledge is aggregated together.”
Video Surveillance as a Service (VSaaS), simply stated, is a cloud-based video surveillance solution that is packaged and delivered as a service over the internet. The price varies depending on the features of the plan (i.e. number of cameras, amount of storage, software features, etc.), and customers pay a monthly subscription price to use it. Internet Protocol (IP) cameras are installed at site locations, and the video is captured and streamed to a service provider’s data centre via an internet connection. The video management software (VMS) runs on backend infrastructure provided by the service provider’s cloud. All video processing is done in the cloud, and all that is required to view the footage is an internet-connected device and a web browser. Implementation Of AI And Deep Learning The cloud facilitates implementation of artificial intelligence and deep learning in the video surveillance marketThe cloud also facilitates implementation of artificial intelligence (AI) and deep learning in the video surveillance market. One of the major challenges with developing deep learning-based applications is access to real-word data and the ability to train the applications to work in any environment. Companies need access to relevant datasets that need to iterate their solutions quickly. Cloud-based solutions are of significant advantage in this case, as they allow for continuous updates and easy collection of vast amounts of data. “We will see the continued adoption of cloud-based intelligent video solutions that aggregate business data through video and artificial intelligence,” says Andreas Pettersson, CEO of Arcules, one of our Expert Panelists. Leveraging AI and IoT technologies with video data is becoming more common as organizations strive to optimize business operations while also boosting security across their facilities. Actionable Intelligence Gathering “The possibilities for this level of actionable intelligence gathering is endless, as markets such as hospitality, manufacturing, retail and SMEs that have multiple locations to manage, look to make sense of video in intuitive, streamlined ways,” says Pettersson. “The ability for technology to aggregate and analyze video surveillance and connected sensor data, identify trends in that data, and apply predictive analysis in businesses will have a huge impact in the coming year.” Cloud systems can solve more problems than ever using artificial intelligence and machine learning Cloud systems can solve more problems than ever using artificial intelligence and machine learning, and the capabilities expand way beyond video analytics to include analytics in general, crunching a variety of data provided by Internet of Things (IoT) sensors. Another area of interest related to video in the cloud is the development of ‘smart codecs’ that security camera manufacturers are developing and marketing as a solution that goes beyond H.264 and H.265. Maximizing Video Storage Customers are realizing that cloud implementations are more cost-effective, easier to deploy and maintainThe ongoing need to better manage network bandwidth usage and to maximize video storage is further turning the emphasis toward smart codecs, which lend themselves to cloud applications. Extremely high-resolution video can now be moved around in a fraction of the time and solves the issue of transporting many cameras over constrained WAN connections. With the elastic computing power available in the cloud, one can now envision a time where cloud computing costs could be low enough for the masses of video security solution use cases to be solved. Customers are realizing that cloud implementations are more cost-effective, easier to deploy and maintain, and in many cases, even more secure than traditional on-premise deployments. In partnership with the leading cloud providers, the security industry can carry this message to the customers and will gradually see a shift in the acceptance of cloud-based solutions in the traditional security markets.
The high-performance Predator Ultra HD PTZ video surveillance camera from UK CCTV manufacturer, 360 Vision Technology, has entered service at the National Coastwatch Institution’s (NCI) Felixstowe lookout station, to help protect lives along the coastline of the River Deben estuary. Felixstowe Coastwatch is a charity funded, volunteer-based organization with over 50 highly trained volunteers available to man lookout shifts. It’s also part of the NCI, a voluntary organization established in 1994 to restore a visual watch along UK shores, after many small Coastguard stations had been closed. Maritime navigation Felixstowe Coastwatch took over operations at the Lookout in April 1996 Under Felixstowe Coastwatch’s territory is the Deben estuary, whose treacherous shifting shingle banks and bar can present quite a challenge for maritime navigation, as Ian Clarke of Felixstowe Coastwatch explains: “Half of all call outs from the RNLI Harwich Lifeboat Station during 2016/17 were to attend incidents in this area, so it was clear that additional observation of the area would be beneficial and help to make it safer.” Felixstowe Coastwatch’s Lookout is built on top of Martello Tower ‘P’, one of the famous ‘Martello Towers’, built in the early 1800s as a defense against a possible invasion by Napoleon. The first lookout was originally built by HM Coastguard (replaced in 1979 by the current structure), who operated the Lookout until 1994. Felixstowe Coastwatch took over operations at the Lookout in April 1996. Experiencing CCTV cameras “Originally, the first idea to tackle the maritime issues at the River Deben estuary was to build an additional lookout tower,” says Ian. “That would have been a prohibitively costly exercise for a charity-based organization. However, after a visit to the NCI Station at Portland Bill, I was inspired by the use of CCTV there and interested to establish if video surveillance could be deployed to monitor the remote Deben estuary from our existing lookout station.” “The first task was to experience CCTV cameras in action, so we visited the Port of Felixstowe, the Felixstowe Town CCTV system and the Great Yarmouth Port Authority, where we saw the 360 Vision Predator in action. Impressed by the quality of its images, I contacted 360 Vision Technology for a demonstration, at which we were able to record video from the proposed location of the camera mast.” Comprehensive business case 360 Vision Technology had just launched their Predator equipped with a 40x optical zoom" “After the demonstration of the camera’s capability, I was able to prepare a detailed report to our trustees, setting out a comprehensive business case as to why a CCTV camera would offer the best solution to the issues we were facing at the mouth of the River Deben. I was able to use the recorded footage of the demonstration to produce a video highlighting the impressive capability of the imaging technology.” From Ian’s report, approval of the project was granted and the 360 Vision Predator Ultra HD was installed by STC Solutions Ltd, after funds were raised from council-allocated budget and fundraising events organized by Felixstowe Coastwatch volunteers. “When we placed the order, 360 Vision Technology had just launched their Predator equipped with a 40x optical zoom,” Ian continues. Wireless transmission solution “This was an important factor for us, as the entrance to the River Deben is expansive, and identifying vessels and individuals there would be greatly assisted by the optical zoom of the 360 Vision Predator camera.” With no line of sight from the camera to the lookout tower, an innovative wireless transmission solution was employed, using a belfry tower at a midway point in Felixstowe, where the signal is relayed to enable control and recording of the high definition images back at the lookout station. “Now operators can view superb live images of the River Deben, to confirm the identity, position and situation of vessels in the mouth of the river and if necessary, contact HM Coastguard if we observe any problems,” Ian explains. Seamless ONVIF integration Thanks to the broad integration capability of 360 Vision’s Predator Ultra HD, all surveillance video is archived for retrospective investigation, and controlled via a QVIS Viper NVR recorder. In addition, seamless ONVIF integration into Cambridge Pixel’s ‘RadarWatch’, a flexible client display application for radar display and target tracking, allows Felixstowe Coastwatch’s operators to set up virtual tripwire lines across dangerous areas of the river and shallow waters close to the main shipping channel. The trip alarms instantly alert operators and provide immediate verification of a vessel’s precise location Once crossed by a vessel, the trip alarms instantly alert operators and provide immediate verification of a vessel’s precise location, along with high-definition visual verification from the Predator camera. Also displayed as an overlay on screen, via the Predator Ultra camera and Cambridge Pixel technology integration, is Automatic Identification System (AIS) ship transponder information for each vessel, including a compass bearing supplied by the Predator camera’s head, which indicates which way the camera is pointing. Innovative installation “This means we can instantly identify and position any specific vessel we’re seeing with the camera,” says Ian. “We can also view the banks of the river and its beaches, to ensure that no members of the public are in danger.” Taking advantage of 360 Vision Technology’s any color and any finish design offer, the Predator Ultra camera was supplied in a Marine Grade white paint finish, and along with its powerful 40x zoom lens, is equipped with a ½” Ultra camera module to ensure maximum imaging performance, even in low-light conditions. This innovative installation has been so successful that Felixstowe Coastwatch are currently looking at other areas of the coastline where high-definition 360 Vision Predator Ultra HD cameras could assist with their daily operations, to protect the public and maritime traffic.
The first forensic science-based crime prevention system in New York State was installed at luxury Swiss watch manufacturer, Richard Mille. It is the fourth system to be deployed in the United States. The technology, the Intruder Spray System from SelectaDNA, utilizes forensic science to reduce burglary, robbery and high-value theft by a documented range of 40 to 86 percent. The cutting-edge technology was installed at the world-renowned watch brand’s architecturally stunning flagship boutique, located on ‘Billionaire’s Row’ on 57th Street in Manhattan. Irrefutably identify criminals The forensic technology is synthetically manufactured in an accredited ISO 17025 laboratory The system uses the power of forensic marking science to considerably deter crime and, if a crime is committed, enhances law enforcement ability to irrefutably identify criminals, then apprehend and prosecute them. The technology has been used for more than ten years in 46 countries on five continents. It is now available and beginning to be deployed in the United States. The forensic technology is synthetically manufactured in an accredited ISO 17025 laboratory. It is scientifically structured, and functions, the same as organic DNA – but is more durable. Each unit of the forensic solution contains a universally unique code (sequence), which is never replicated; thus; providing an exclusive identifying marker for each client. Each unique forensic code provides an uncontestable link between a criminal, or stolen item, to a specific crime scene and the rightful owners. Remote video monitoring The system – comprised of a control box, spray head and PIR – is easily integrated with other security systems such as burglary, access control, intrusion, video, and many others. Installations take approximately four hours. The system can also be installed as a standalone crime-fighting solution. There are various modalities of system activation, including but not limited to panic buttons, money clips, remote video monitoring via Milestone Systems, RFID and facial recognition technology. When the system is activated, the invisible, non-toxic and water-based forensic solution remains on marked criminals’ skin for four to six weeks, and clothing for two to three months. The solution is only visible via a special frequency UV light, leaving criminals exposed to identification and apprehension well after leaving the crime scene. Crime-fighting technology SelectaDNAs forensic marking technology is a well-documented tool to prevent and deter a large percentage of crime" “We’re pleased to provide Richard Mille with a proven crime-fighting technology to further enhance its already impressive security measures,” said Henrik Olsen, CEO of CSI Protect, the exclusive provider of SelectaDNA technology in the United States. “SelectaDNAs forensic marking technology is a well-documented tool to prevent and deter a large percentage of crime across the globe and now in the United States.” Many Fortune 500 and iconic, well-known companies have used SelectaDNA technology, including, Tag Heuer, LVMH, Chanel, Pandora, Watchfinder & Co., 7-Eleven, Circle K, G4S, Securitas, GlaxoSmithKline, Lloyds Bank, The Royal Bank of Scotland (RBS), Bank of New Zealand, McDonald’s, KFC, Balfour Beatty, Shell, Texaco, Raptis Rare Books and thousands of others. Offender marking solutions The co-founder of Milestone Systems, Henrik Friborg Jacobsen, is a major proponent of the technology and anticipates major growth of its use in the United States. Friborg Jacobsen is also an investor in, and chief advisor to, CSI Protect. SelectaDNA is a pioneer in forensic marking offering a full range of property, infrastructure and offender marking solutions, using a completely secure and unique forensic technology. SelectaDNA, which is water-based, non-toxic and non-flammable, is proven to reduce crime (especially robbery, burglary and high-value theft) by up to 86%. SelectaDNA not only reduces crime, but also enables law enforcement to link criminals to crime scenes and secure convictions.
CoreRFID supplies the UK's largest outsourcing company Serco with 100,000 RFID access cards for its Caledonian Sleeper railway service. The cards will provide passengers with access to rooms and will improve security on routes between London and Scotland. The cards are completely re-usable and replace paper-based RFID tickets, which were judged to not be as cost effective in the long-term. Specialist locks Serco had specialist locks provided by a Spanish company and needed cards which were compatible" Munzi Ali, technical director of CoreRFID comments: “Our knowledge and experience on similar work in the hotel industry helped us to meet the challenges of this project. Serco had specialist locks provided by a Spanish company and needed cards which were compatible. Consultancy is a big part of the larger projects we undertake and we were able to solve the issue with Serco.” The Caledonian Sleeper service, which is operated by Serco as a standalone franchise, can trace its origins back to 1873. It serves a number of destinations in Scotland - including Inverness, Aberdeen, Fort William, Glasgow and Edinburgh - on route to and from Euston Station. RFID solutions Graham Kelly, guest experience director at Serco Caledonian Sleeper, said: "Our new trains are designed to improve every aspect of the guest experience. We strive to deliver a hotel experience and a major part of that is having keycard entry for rooms. We've only been running our new trains for a few weeks but the feedback from guests on the keycard has been excellent, with CoreRFID's solution proving extremely effective." Ali added: “RFID solutions can provide real benefits in efficiency, costs and in this case significantly cutting down on waste.” CoreRFID's clients include ICL, London Underground and Thomas Cook.
ProdataKey (PDK), an innovator of cloud-based networked and wireless access control products and services, announced that Corning High School, in Corning, Arkansas, has increased its security and greatly enhanced its lockdown capabilities by installing the pdk io wireless access control system. Pdk io is a wireless, cloud-based solution that provides advantages such as around-the-clock accessibility, remote management, superior backup and redundancy, automated updates, and strong cyber security. The installation was undertaken by Blue Sky Technologies (Blue Sky) of Jonesboro, Arkansas. Wireless PDK solution The system is proving to be a useful tool for monitoring student traffic patterns and identifying problem behaviorsCorning High School comprises seven buildings connected by breezeways, designed in an open style common to campuses constructed in the 1960s. Integrator Blue Sky chose the wireless PDK solution because it was perfectly suited to the multi-building layout, with no need to run copper or fiber cable to all connected door locations. As a result, material and labor costs were greatly reduced – a major plus for the small and budget-conscious school district. The installation includes exterior doors for each of the classroom buildings and a few other key locations. As budgets permit, additional doors will be added throughout the high school as well as in other district buildings. The wireless connectivity makes the solution exceptionally scalable; new doors can be immediately brought online through connection with the system’s wireless mesh network without additional infrastructure. Enhancing campus security In addition to enhancing the security of the campus by automating the unlocking and locking of exterior doors to align with the high school’s bell schedule, the system is also proving to be a useful tool for monitoring student traffic patterns and identifying problem behaviors. Faculty and support staff find the pdk io system to be much more convenient than the traditional locks and keys Classrooms are each allocated with ‘student fobs’ for use by students who need to travel between buildings during class periods when doors are otherwise locked. Their use of the fobs enables administrators to track where the students go, making sure they head to the intended destination (i.e. the library or nurse’s office) rather than elsewhere. Suitable access control solution for schools Faculty and support staff find the pdk io system to be much more convenient than the traditional locks and keys that previously secured most doors. Permission groups, managed through the pdk io software, control different access levels for teachers, administrators and custodians. Programming of special door schedules, as well initiating lockdown conditions, can all be handled by the IT staff using the mobile interface. Brian Duckworth, sales consultant with Blue Sky, says, “Pdk io has become our go-to access control solution for K-12 installations because the wireless aspect leads to such major cost savings for the schools, which are always budget-challenged. In addition, the installation process causes very little disruption for the students and teachers.” Keeping students safe and secure Pdk io is ideal for K-12 applications, providing educators with a tool that’s powerful and easy to manage"School Superintendent Kellee Smith adds, “We strive to make our campus a place where our students enjoy the freedom to focus fully on learning because they’re not worrying about safety and security. This solution is making our goal so much easier to meet. It’s also making the teachers’ daily routines less stressful and they really like it.” “PDK is passionate about creating technology that delivers security and peace-of-mind, and what could be more important than keeping our children safe?” says ProdataKey’s President, Jeffery Perri. “Pdk io is ideal for K-12 applications, providing educators with a tool that’s powerful and easy to manage, affordable, scalable over time, and is sure to provide value for the long term.”
Ports of Jersey operate the island’s busy harbors and airports, providing high-quality services and facilities to enrich the experiences and journeys of their customers, with Jersey Marinas offering 1,000 berths across three award-winning locations close to the vibrant waterfront at St Helier. At very busy times of the year, such as the annual Jersey Regatta, the sheer volume of visitor traffic arriving from both land and sea can present serious problems. With particular challenges arising from managing car parking, and the issuance of port entry digital keys for boats harboring. Smart access control solution Ports of Jersey needed a smart access control solution capable of managing short-term parking at St Helier harbor Ports of Jersey needed a smart access control solution capable of managing short-term parking at St Helier harbor. The system needed to be intelligent enough to manage complex bookings for use by berth and mooring holders dropping off and loading gear onto boats, before parking elsewhere long-term. The existing solution was no longer cost effective, and was open to abuse by some users. In addition, Ports of Jersey also required an upgrade to the out of date Jersey Marinas security gate access control system. At peak times this system needed to be able to cope with rapid, high capacity issuance of smart cards to vessel owners and boat crews wishing to access the marina and marina hospitality faculties. Smart installation SALTO partner JMH Technology was asked to provide a new car park access control solution and resolve the looming problem of needing to issue 1,000 cards, at a cost of over £100,000. A replacement car park access control system was installed based on new technology smart cards and 2,000 cards issued. This project was highly cost-effective with installation and card issuance totaling less than just card issuance on the previous system. Future savings also assured thanks to a choice of more cost-effective cards. Abuse of short-term parking has been cut, and the experience for visitors is improved. JMH Technology is in the process of adding more reader-controlled doorsTo drive yet more efficiency and further reduce overheads the system has subsequently been updated at both St Helier and Albert Pier car park, with smart installation of the latest SALTO access control technology. The upgrade continues, and JMH Technology is in the process of adding more reader-controlled doors and smart handles across the facility. Security assessment A full security assessment was carried out at Jersey Marinas, and a decision taken to replace all of the expensive and temperamental mechanical code locks with a full online access control system. By engineering a bespoke solution that integrated a SALTO kiosk system with a touch screen unit interface, Jersey Marinas staff are now able to allocate more than 500 cards during the high-tide window. With extra capacity on tap when they need it to cope with high demand at peak times, and valuable cost savings made. The SALTO system provided is technically robust and cost-effective to expand. As a partitioned system Ports of Jersey now have a global overview, with each department able to see the section relevant to them. This enables micro management of cost savings across equipment and cards and allows staff to get permissioned access to all necessary parts of the Ports infrastructure without delay.
After a period of decline, the number of pupils being expelled from mainstream schools is increasing, placing more pressure on the need for Pupil Referral Units and the security at these premises, which is vital for managing student and staff safety. ASSA ABLOY High Security & Safety Group offers a range of locks and doors suited to the sensitive needs of Pupil Referral Units and pupils in care. Fire Resistance Integrity All doorsets in the Secure Education range are independently tested and certified The breadth of doorset solutions means the High Security & Safety Group can specify products for every area and need of a secure education environment. From classroom doors and personnel doors to circulation doors and high-performance doors. All doorsets in the Secure Education range are independently tested and certified to achieve 60minute fire resistance integrity and insulation to BS EN 1634 from both sides of the door. In addition, all doors within the offering are tested in line with the Department of Health’s environmental design guide attack test for secure services, as well as meeting with DD171 & BS EN 1192 severe duty performance and strength, and are tested to PAS 24 enhanced security performance requirements. Secure Educational Facilities This guaranteed and certified level of performance gives building owners and users the peace of mind that all doorsets are fit for purpose, as well as providing the added level of security and safety often needed in secure educational facilities. Mike Dunn, Commercial Director for ASSA ABLOY High Security & Safety Group, said: “A recent report by the think tank IPPR, found the total number of children being taught in ‘alternative provision’ for excluded children is far higher than the total number of reported exclusions. This will inevitably mean increasing pressure on facilities, such as Pupil Referral Units, and the safety of staff and pupils within those buildings.” Added Level Of Security Pupil Referral Units are first and foremost a place of education" “Pupil Referral Units are first and foremost a place of education and therefore doors and locks must allow for this, grant access, as well as restricting permissions. However, an added level of security and safety must be considered and handled sensitively within these premises.” “Our experience and wide product range means we can advise on and supply doors and locks for every aspect of a secure education environment, mitigating any risk and ensuring a smooth specification process.” Doors within the Secure Education range come in a variety of materials and finishes, giving specifiers improved design flexibility.
Round table discussion
Technology advancements often come with new terms and definitions. The language of our marketplace evolves to include new words that describe innovations in the industry. In the skilled hands of marketers, terms intended to be descriptive can also take a new element of ‘buzz,’ often presaging exciting developments that will drive the future. We asked this week’s Expert Panel Roundtable: What new buzzword have you heard, and what does it mean for the industry?
The new year 2019 is brimming with possibilities for the physical security industry, but will those possibilities prove to be good news or bad news for our market? Inevitably, it will be a combination of good and bad, but how much good and how bad? We wanted to check the temperature of the industry as it relates to expectations for the new year, so we asked this week’s Expert Panel Roundtable: How optimistic is your outlook for the physical security industry in 2019? Why?
Hospitality businesses work to provide a safe and pleasant customer experience for their guests. Hotels offer a “home away from home” for millions of guests every day around the world. These are businesses of many sizes and types, providing services ranging from luxury accommodations to simple lodging for business travelers to family vacation experiences. Hospitality businesses also include restaurants, bars, movie theaters and other venues. Security needs are varied and require technologies that span a wide spectrum. We asked this week’s Expert Panel Roundtable: What are the security challenges of the hospitality market?