The M73, MOBOTIX’s new high-performance camera based on Artificial Intelligence (AI), is the latest in MOBOTIX’s lineup to have received the SySS IT security certificate. After completing multiple tests, SySS GmbH now attests that the entire MOBOTIX IoT camera series has a particularly high level of cyber security. In addition to the M73, the M16, representing the entire Mx6 series, also has earned the SySS certificate. This is a continuation of the MOBOTIX Cactus Concept which stand...
Midlands-based firm, Ecl-ips, is using its expertise in providing monitoring, CCTV and access control, to offer organizations a range of back to work solutions to keep customers, visitors and staff safe as the company continue to mitigate the risks from COVID-19. Occupancy Management Solutions With more businesses opening up Ecl-ips can help occupancy counting to ensure social distancing is maintained. Ecl-ips can offer Avigilon’s occupancy counting feature, as part of its video manageme...
Patriot One Technologies Inc., is pleased to announce a development partnership with ecoMine Technologies Corporation (ecoMine) to advance ecoMine’s innovative, low-cost, on-the-spot pathogen screening technology, ecoScreen. ecoScreen screening technology ecoMine’s technology platform, ecoScreen has significant potential in this current pandemic, (especially when it comes to enabling the safe return to work across multiples sectors of the economy) as well as a broad range of other...
Renowned temperature monitoring expert, AMETEK Land, has launched a new human body temperature screening system to help prevent the spread of infectious diseases like COVID-19. Developed over 10 years by AMETEK Land experts, the VIRALERT 3 provides real-time infrared thermal imaging from a safe social distance, scanning for elevated temperatures that could indicate infection. The VIRALERT 3 is the first of its kind, providing a camera and a temperature-controlled reference source on a single mo...
Paxton Access Ltd. (Paxton) has announced new additions to their renowned Net2 access control product line, helping installers make their customers’ buildings more COVID-secure. The latest version of Net2 – v6.04 has been in rapid development since May 2020 and is now ready for installers to download. Net2 – v6.04 The latest version features Net2 Occupancy Management, which allows enterprises to limit the number of people in any given area, either barring access or sending an...
PSA, the consortium of professional systems integrators, announces the addition of the STEPS program to its network to assist in bringing people back to work during the COVID-19 Pandemic. STEPS, powered by bSMART® Entry Assessment, produces a straightforward plan that can be operationally effective in two to 30 days. Mitigating business liability “COVID-19 halted business as we know it earlier this year and many integrators are struggling to get their teams back to work as well as s...
The Radio Equipment Directive which is applicable for most wireless equipment also in the fire and security industry looks to be prepared for an update where cybersecurity requirements will become part of the directive and with that part of the CE-marking. While Euralarm supports the need for increased cybersecurity, the fire and security industry will preferably support a horizontal cybersecurity regulation. Nevertheless, if embedded in the RED, Euralarm wants to ensure that the technical aspects addressing cybersecurity are relevant for wireless fire safety and security equipment and can work for manufacturers and service providers. Horizontal Cyber regulation With incidents around privacy reported after updates from wireless equipment with official and unofficial software, the commission is urgently looking to enforce increased cybersecurity to protect consumers and to ensure that radio equipment manufacturers meet a level of cybersecurity before they release a product to the market. These developments will impact companies that manufacture or market wireless Fire and Security equipment Because Horizontal Cyber regulation is still under construction and can take some time before being completed, it looks like the EC plans to do this through an update of the RED. These developments will impact companies that manufacture or market wireless Fire and Security equipment. Industrial Internet of Things Following the Internet of Things (IoT) the industrial version of it, Industrial Internet of Things (IIoT) now also enters a phase of wider adaption and deployment around numerous industries. It is predicted that the worldwide IoT spending will surpass $ 1 trillion in 2022 (source: IDC). More and more products and industrial assets with electronics, software, sensors, and network connectivity enable us to collect and exchange data. By connecting numerous devices and pieces of equipment through the Internet, (I)IoT can help businesses operate more efficiently, make more informed decisions and unlock new revenue sources. However, the devices themselves also introduce serious risks for business and society with every device being a potential source for cyber criminals to unauthorized enter home, business or industrial networks. Radio Equipment Directive Radio Equipment Directive is being considered for inclusion of cyber security requirements This threat is caused by the radio communication function ‘on board’ these devices which enables them to communicate via wireless networks and by the possibility to wireless update software / firmware on these devices. Now that products are getting more and more connected, the European Commission is looking how to create a legislative framework to make these products better resistant against cyber attacks. This could be done by including cybersecurity requirements into directives and regulations of the New Legislative Framework (NLF). This framework sets mandatory product safety requirements that are necessary to put products on the EU market (CE marking). The Radio Equipment Directive (RED) is the first Directive that is being considered for inclusion of cybersecurity requirements. Low voltage equipment The idea is to include the cyber security requirements through a delegated act on Internet connected and wearable radio equipment. Such an act is a legally binding act that enables the Commission to supplement or amend non‑essential parts of EU legislative acts, for example, to define detailed measures. Euralarm supports an increased level of cybersecurity and a better protection for the consumers. And they are not alone. With the Cybersecurity Act in place the European Union Agency for Cybersecurity ENISA is now working on new certification schemes to cover a wider range of products, processes and services on all aspects of cybersecurity. Putting aside the EU Cybersecurity Act and pursuing the “RED path” would bring a clear risk of overlaps and inconsistencies across European legislations, not only for radio equipment, but also for instance for low voltage equipment (LVD), machines (MD) and medical devices (MDR). Wearable radio-equipment Meanwhile the European Commission initiated a public consultation on two essential requirements It could result in legal uncertainty and significant impact in case of concurrent mandatory requirements and certification schemes. This would threaten European companies’ ability to compete across the Digital Single Market as well as globally, forcing them to misallocate scarce resources. Fearing a future patchwork of different legislations, the industry suggested a horizontal legislation for products. Meanwhile the European Commission initiated a public consultation on two essential requirements. It concerns the safeguards to ensure that the personal data and privacy of the user and of the subscriber are protected as well as certain features ensuring protection from fraud. This consultation laid down several proposals for the application of those 2 requirements to internet-connected radio-equipment and wearable radio-equipment. Impact assessment study Based on the results of this consultation, the Commission mandated a consultancy firm to conduct an impact assessment study. In his report, the contractor highlights that delegated acts are already mentioned in the RED and that they therefore should be preferred above legislation on cybersecurity which might take more time to develop. It is therefore unlikely that a horizontal cybersecurity related legislation on products can still be developed in a short-term. The report adds that such a horizontal legislation could be considered at mid-term. Euralarm is presently supporting a proposal in this direction. The consultants also recommended that the European Standardisation Organizations should be mandated to pertain to the delegated acts. Both CEN-CENELEC and ETSI are now preparing themselves to get ready for this. Cybersecurity requirements Installing new software or firmware could have an impact on the compliance of the equipment Euralarm recommends companies involved in the production of security equipment to stay informed on the development to ensure that the relevant technical aspects for fire safety and security equipment are embedded into the cybersecurity requirements. Another RED related development that is taking place concerns the Reconfigurable Radio Systems, i.e. radio equipment that can be reconfigured by software (including firmware). Under some conditions, installing new software or firmware could have an impact on the compliance of the equipment. Reconfigurable Radio Systems The European Commission is therefore currently investigating this to ensure that the RED adequately addresses this issue and that reconfigurable radio systems for Europe's single market stay compliant with the Radio Equipment Directive after new or modified software is installed. The investigation is focused on the essential requirements of the RED itself: health and safety, EMC, efficient use of radio spectrum and requirements empowered by adopted delegated acts. Software implemented functions that have no influence on the compliance to these requirements are not technically impacted but the need for demonstration of no-impact will appear. That means for instance that manufacturers of Wi-Fi connected smoke alarm devices would have to demonstrate that software updates do not impact RED compliance. Euralarm has therefore advised manufacturers of wireless equipment falling under the RED to follow these developments. Euralarm will make sure that additional legislation that could result from the current investigation will be feasible for manufacturers.
Applied Motion Products Inc. (AMP), the USA based motion control innovator, has released a new application note for programmers using Python, the popular computer programming language. Available from Mclennan, AMP’s European distribution partner, the application note includes sample Python scripts and resource information for establishing RS-232/RS-485 or Ethernet communications, along with streaming commands and handling replies for single- and/or multi-axis drive set-ups using AMP’s ‘SCL Mode’ – which is one of many control options available across its comprehensive range of intelligent stepper and servomotor drives and integrated drives. Motion control command scripts The simple and intuitive text-based SCL command set includes motion related moves for absolute and relative position with velocity and acceleration as well as jog and homing routines. SCL also includes I/O control commands for sequencing other machine functions as well as drive status and alarm interrogation. Python programmers can simplify their automation and machine control projects by combining AMP’s SCL motion control command scripts to sequence one or more motor axes. AMP’s diverse range of stepper and servomotor based intelligent drives include panel mount and motor-integrated alternatives which are characterized by ease-of-use, dynamic performance and a highly flexible functionality that is easily adapted to a wide variety of applications. Intelligent drive indexer programming The sophisticated ‘Q’ programming language can be used to write complex sequences of multi-tasked motion AMP’s unique StepSERVO technology includes integrated one-component solutions that bring together a microstepping motor and drive with position feedback and a sophisticated controller in a single package for high-performance closed-loop control that offers exceptional throughput and precision for applications such as packaging and labeling, automated test, automated parts handling, life sciences, and linear/rotary positioning stages. In addition to the SCL streaming mode and various configuration, set-up and tuning tools, AMP’s control options include stand-alone intelligent drive indexer programming with a point-and-click graphical user interface option. For maximum flexibility, the sophisticated ‘Q’ programming language can be used to write complex sequences of multi-tasked motion, math functions and machine control code. Comprehensive technical support Furthermore, industrial network interfacing is available across the range including EtherCAT, Ethernet/IP, CANopen, Modbus RTU and TCP. The Python software application note is part of an extensive library of resource information covering a diverse range of installation and use related subjects associated with AMP’s broad range of motion components. Ranging from setup with third-party manufacturers’ motion controllers, fieldbus and HMI interfacing, drive configuration and general programming guides, the information is freely available along with comprehensive technical support from Mclennan.
Today’s market wants access control systems that are always available, scalable, and integrated with other security solutions like video and intrusion systems to ensure the highest security and safety levels. At the same time, these systems must be easy to configure and use. With the introduction of the Access Management System 3.0, Bosch meets all of these requirements. Always available for security Access Management System 3.0 is designed to be available at all times. Its resilient design includes a Master Access Controller (MAC) as an additional layer of defense between the server and the access controllers. If the server fails, the MAC takes over, ensuring continuous communication across controllers while sharing necessary information from the card readers. In addition, access control functionalities that involve multiple access readers, such as anti-passback and guard tour can continue to perform. The anti-passback functionality is an important feature to ensure a high level of security. It prevents a cardholder from passing a card to another person enabling an unauthorized entry. Guard tour is a safety functionality offered to security guards, which uses access readers as checkpoints along a defined route at specified times. Threat level management The different threat levels can make all doors open, or all doors blocked, or a mix of open and blocked Any deviation of sequence or timing causes an alarm in the Access Management System. Immediate notifications to colleagues or first responders increase the safety of security guards. In the rare event that both the Access Management System 3.0 server and the MAC fail, cardholders can still enter and leave areas with their badges because the database is stored directly on the Access Management Controllers (AMCs). Thanks to this offline capability, it is possible to save millions of events even during downtimes, ensuring the continuous availability of the system. Access Management System 3.0 offers up to 15 configurable threat levels such as lockdown, controlled lockdown, or evacuation, which means safety measures can be initiated quickly in critical situations such as fire or security breach. The threat level state is activated by one of three triggers: operator workstation, external contact such as an emergency button, or specially configured “emergency” cards that are presented to a reader. The different threat levels can make all doors open, or all doors blocked, or a mix of open and blocked. Scalable and future-proof Users can start small and add extra capacity whenever necessary. The Access Management System 3.0 software can be expanded up to 10,000 doors and 200,000 cardholders. The software is offered in three pre-configured software bundles from medium to large organizations: Lite (max. 144 doors), Plus (max. 512 doors), and Professional (max. 10,000 doors). All bundles support up to 200,000 cardholders. No hardware needs replacing when expanding; users only require software upgrades and possibly additional controllers, readers, and cards. So, increasing the system is also cost-efficient. Customers who work with the software solution Access Professional Edition (APE) from Bosch can migrate to the Access Management System 3.0 by using the new importer/exporter tool. Together with regular updates to data security enhancements, these features make the system a future-proof investment - suitable for office and government buildings, retail environments, educational institutions, and more. Easy configuration and operation Access Management System 3.0 also has trusted digital certificates for mutual authentication Configuration is easy: Users can import existing floor maps into the system, and drag and drop icons on the map to represent controllers, doors, and building objects. User onboarding is straightforward. For example, enrollment and assignment of access profiles are all implemented in one dialog manager. Operation is smooth: The graphical user interface (GUI) is simple and easy to understand. The dark color scheme of the GUI reduces eye-strain and fatigue, so operators stay fresh and alert. Access Management System 3.0 offers protection against cybercrime and loss of personal data. The database, as well as the communication between the server and access controllers, is encrypted at all stages through the support of the secure Open Supervised Device Protocol (OSDP) v2 protocol. Access Management System 3.0 also has trusted digital certificates for mutual authentication between the server and client to prevent tampering by unauthorized clients and uses secure design principles such as “secure-by-default” and “principle of least privilege.” Integration with third-party solutions Access Management System 3.0 is ideal as a standalone solution to meet today’s access control needs. It integrates seamlessly with Bosch B Series and G Series intrusion control panels as well as with video systems such as Bosch Video Management System or third-party systems like Milestone’s XProtect for increased security and enhanced situational awareness. The integrated command and control functionality enables operators to arm and disarm intrusion panels directly Integration with Bosch Video Management System (version 10.1 and higher) offers manual video verification to increase the security level at doors. The operator can visually verify whether the person at the door matches the registered person in the database. If so, the operator allows the person to enter. Bosch Video Management System integration also enables searching for cardholder events and events at doors. With the searching functionality, it is possible to quickly check who has entered an area and at what time. Moreover, access commands and events can be handled in Bosch Video Management System, making the operation of the integrated system most efficient. Intrusion control panels integration B and G Series intrusion control panels integrate seamlessly into Access Management System 3.0 for efficient authorization management and a central overview of all access and intrusion events. With central user management, operators can add, delete, and modify intrusion-related user passcodes and authorizations directly into the system, as well as organize users by groups or functionalities. The integrated command and control functionality enables operators to arm and disarm intrusion panels directly in the Access Management System 3.0 user interface as well as to see states of the areas (e.g. “armed”, “ready to arm”) and detectors (e.g. “motion detected”) on the system map. This provides operators with a central overview of all access and intrusion states, allowing them to easily and remotely handle intrusion events. Bosch Access Management System 3.0 is available for sale and makes access management simple, scalable, and always available.
Telaeris, a handheld badge verification and emergency mustering solutions provider for physical access control systems (PACS), has announced its XPressEntry software integration with Maxxess eFusion access control software. XPressEntry - eFusion integration Maxxess access control customers can now use a variety of XPressEntry compatible handheld badge readers to quickly muster employees during an emergency evacuation, verify identity, perform medical screenings at entry points, record entries and exits where door readers are not practical, and much more. “We welcome Maxxess and their powerful eFusion software to the family of XPressEntry access control integrations,” said Dr. David Carta, Chief Executive Officer, Telaeris. He adds, “Securing commercial and government facilities are important work, especially in these new COVID-19 times. The added functionality and flexibility plus Coronavirus screening that XPressEntry bring is helpful for safety and security professionals around the world.” Remote reader solution for secure verification Nancy Islas, Maxxess Systems President, said, “We are excited to offer our customers a robust remote reader solution for day to day secure verification of access control as well as advanced mustering applications for managing emergency situations.” The Telaeris integration enhances the Maxxess emergency management and coordination system" She adds, “The Telaeris integration enhances the Maxxess emergency management and coordination system and allows our customers to easily verify personnel anywhere in their building or on campus.” XPressEntry badge verification solution XPressEntry’s badge verification solution with commercial grade handheld badge readers is now able to be connected to the Maxxess eFusion system. XPressEntry maintains updated facility occupancy information and can quickly verify personnel and visitor badge information including name, photo ID, and permissions against the Maxxess eFusion database from anywhere with cellular and Wi-Fi connectivity. Emergency evacuation and employee mustering solution It also delivers an emergency evacuation and employee mustering solution, verifying that personnel and visitors are accounted for and safely evacuated during emergency situations. In addition, XPressEntry now supports validating personnel and visitor health status information before entering work areas to support COVID19 workplace safety protocols. XPressEntry is globally renowned for handheld badge verification with integrations to most access control systems now, including Maxxess eFusion. XPressEntry handhelds proudly read more badge technologies than any other handheld in the industry including iClass, Prox, Indala, DESFire, Mifare, and PIV and can simultaneously poll for both HF and LF credentials. XPressEntry has also been penetration tested and certified as secure using appropriate security protocols and encryption.
ASSA ABLOY has signed an agreement to acquire FocusCura, a provider of technology solutions for senior care in the Dutch market. FocusCura has developed a software platform, which in combination with other products and technology services, enables elderly care organizations to focus on care. "I am very pleased to welcome FocusCura and their employees into the ASSA ABLOY Group. FocusCura is a strategic technological addition to the ASSA ABLOY Group. The company will reinforce our current offering within Senior Care and will provide complementary growth opportunities,” says Nico Delvaux, President and CEO of ASSA ABLOY. Digital solutions for care providers “FocusCura is a true innovator in digital solutions for care providers and senior people. The FocusCura offering is a good fit with our solutions in Phoniro and together we will continue to support people to stay independent for longer and live enriched lives,” says Christophe Sut, Executive Vice President and Head of Global Technologies business unit Global Solutions. FocusCura was founded in 2003 and the main office is located in Driebergen-Rijsenburg, Netherlands. The acquisition will be dilutive to EPS from start. The acquisition is expected to close during the third quarter of 2020.
Researchers at Check Point have identified security flaws in Apache Guacamole, one of the world’s most popular IT infrastructures for remote work. With over 10 million downloads, the free open-source software enables remote workers to access their company’s computer network from anywhere, by using only a web browser. Apache Guacamole software Apache Guacamole runs on many devices, including mobile phones and tablets, giving remote workers ‘constant, world-wide, unfettered access to computers’, according to the software’s creators. Eyal Itkin, a Vulnerability Researcher at Check Point, demonstrated that a threat actor with access to a computer inside an organization can execute a Reverse RDP attack, an attack in which a remote PC infected with certain malware takes over a client that tries to connect to it. Reverse RDP attack Once in control of the gateway, an attacker could eavesdrop on all incoming sessions In this case, the Reverse RDP attack would enable a threat actor to take control of the Apache Guacamole gateway that handles all of the remote sessions in a network. Once in control of the gateway, an attacker could eavesdrop on all incoming sessions, record all the login credentials used, and even control other sessions within the organization. Check Point researchers say this foothold is equivalent to gaining full control over the entire organizational network. Check Point researchers classified their findings into two attack vectors: Reverse Attack Scenario: A compromized machine inside the corporate network leverages the incoming benign connection to attack the Apache gateway, aiming to take it over. Malicious Worker Scenario: A rogue employee uses a computer inside the network to leverage his hold on both ends of the connection and take control of the gateway. Data security in remote work operations Omri Herscovici, Vulnerability Research Team Leader at Check Point said, “While the global transition to remote work is a necessity, we cannot neglect the security implications of such remote connections, especially as we enter the post-coronavirus era. This research demonstrates how a quick change in the social landscape directly affects what attackers might focus their efforts on. In this case, it’s remote work.” Omri adds, “The fact that more and more companies have externalised many internally-used services to the outside world opens a number of new potential attack vectors for threat actors. I strongly urge companies and organizations to keep their servers up-to-date to protect their remote workforces.” Check Point Research responsibly disclosed its findings to The Apache Software Foundation (Apache), the maintainers of Guacamole, on March 31, 2020. On May 12, Apache issued 2 CVE-IDs to the 4 reported vulnerabilities, and Apache has released a patched version in June 2020.
Facial recognition technology has come a long way since it first came to market several years ago. Initially plagued with technical challenges and widely viewed as a futuristic solution, facial recognition is now firmly implanted in numerous consumer and business products and applications. New advancement in software, specifically in the areas of algorithms, neural networks and deep learning and/or artificial intelligence (AI), have all dramatically improved both the performance and accuracy of facial recognition, further expanding its use for an increasing number of applications. From a purely business perspective, facial recognition’s powerful identification and authentication capabilities make it ideal for two primary applications: first as a security tool, and second as a workforce management solution. The touchless, accurate credential solution Facial recognition readers meet the new emerging need to limit physical exposure to germs and viruses Even before the COVID-19 pandemic, the touchless nature of facial recognition as an access credential was gaining traction with physical and cyber security professionals. By using an individual’s face as an access control credential, facial recognition eliminates the need and expense of physical cards and proximity devices, or the need to physically enter PIN codes. In addition, facial recognition readers meet the new emerging need to limit physical exposure to germs and viruses by offering a highly accurate touchless access control credentialing solution. As a workforce management tool, facial recognition helps preserve the health of employees checking into work, while providing management with an infallible means of documenting employee time and attendance while providing a detailed history of overall workforce activity and individual personnel tracking. Both of which have been longstanding challenges due to easily compromised time tracking systems and practices. Now, nothing is left to question based on hard data. With the growing popularity of facial recognition technology, there are many choices already available with more undoubtedly on the way. Selecting the right solution for your specific access control and/or workforce management application is dependent on a very wide range of variables. But there are a few core characteristics that you should look for when evaluating facial recognition readers. Wide and near-angle LEDs Most facial recognition terminals employ some form of IR (Infrared) technology to help ensure high visibility by the unit’s image sensor. This often limits where the unit can be installed such as outdoors or near windows due to strong ambient light. More advanced facial recognition readers employ as many as 80 wide-angle near infrared LEDs and 60 narrow-angle near infrared LEDs, allowing the unit to recognize faces even in full daylight and brightly lit environments (not direct sun). This enables installation at indoor locations near windows, lobbies and building entries. 3D pixel intensity distribution analysis Another facial recognition reader advancement to look for involves three-dimensional pixel intensity analysis. Ambient lighting contains ultraviolet rays which can negate near infrared LED lighting, and can also cast shadows making it difficult for a facial recognition reader to pinpoint the facial recognition points required for identification and authentication. Three-dimensional pixel intensity distribution analysis minimizes the effects of ambient light when acquiring facial images by minimizing lighting contrasts. As a result, it is easier for the algorithm to recognize the shape of the face, enabling it to extract more facial features and create higher quality face templates, which are critical for accurate facial recognition. Functional ergonomics This results in a faster, more comfortable, and convenient user experience The angle and position of a facial recognition reader directly impact the performance of the unit. Facial recognition readers with different viewing angles for built-in visual and infrared cameras allows users to stand at positions that are most suitable for facial recognition with little or no effort of contortions. This results in a faster, more comfortable, and convenient user experience. High performance processing Like any intelligent edge device, the performance of a facial recognition solution is directly reliant on its processing power. New advanced facial recognition readers deliver exceptional performance by employing enhanced face template extraction technology combined with powerful processor. For example, a facial recognition reader with a 1.4 GHz quad-core processor can perform up to 3,000 facial database matches (1:N) within one second. More advanced solutions also feature Group Matching functionality capable of executing up to 30,000 matches within one second. Live face detection It is most important that the facial recognition readers you evaluate are capable of analyzing faces in real time to maintain fluid entry/egress even during high volumes of employee traffic. Hardware-dependent live face detection systems employing technologies such as facial thermogram recognition and facial vein recognition require expensive hardware components, provide less accurate matches and slower authentication performance, which is counterintuitive for mainstream access control and workforce management applications. Dual authentication for added security Although the use of an advanced facial recognition reader provides the convenience, health benefits and cost-savings of touchless identification and authentication, there are many applications where more than one credential may be necessary to ensure the highest levels of security. Advanced facial recognition readers with multimodal, multifactor credentialing capabilities provide this added security benefit. For example, facial recognition readers that support multiple RFID proximity devices supporting 125 kHz and 13.56 MHz provide varying degrees of protection and greater implementation versatility. Videophone or intercom capabilities Facial recognition readers with multifunctionality can solve several challenges with one solution Facial recognition readers with multifunctionality can solve several challenges with one solution. A perfect example includes devices with SIP (session initiation protocol) videophone capabilities which effectively eliminate the need and associated expense of installing separate intercom devices while adding another layer of security to one’s facility. The COVID-19 pandemic, and hopefully soon to follow post-pandemic world, have surely accelerated the need for highly accurate, cost-efficient, and reliable facial recognition technologies to help get people back to work safely. Selecting the right facial recognition solution for your specific access control and/or workforce management is now more important than ever before, making a little extra due diligence during the evaluation process a smart decision.
Returning to work after the global pandemic will not be business as usual, and security systems are an important asset when it comes to helping to keep occupants and buildings safe. For example, video analytics can provide insight into how spaces have previously been used and can help to predict where and when occupants encounter each other or congregate. These foot-traffic patterns can inform settings for a variety of devices – like ventilation and temperature controls – and even help owners create social distancing plans and monitor personal protective equipment (PPE) compliance. “While the ‘new normal’ is still being defined, we believe there will be a greater focus on creating healthier environments while also complying with new regulations,” says Marcus Logan, Global Offering Leader, Honeywell Commercial Security. “Temperature, humidity, energy efficiency, security, safety, comfort, productivity, and demonstrating compliance with regulations are all a part of a healthy building.” For example, social distancing is a new concept for the workplace. How do you make that happen in an open work setting, in breakrooms, elevator lobbies and meeting spaces? Optimized systems create healthier environments Anxious employees will need reassurance about returning to the workplace Building owners will need to look at how they can optimize their systems – or deploy new ones – to create a healthier environment. Building technologies, like those provided by Honeywell's Healthy Buildings solutions, provide building owners with more control over critical factors to encourage sustained compliance with changing building standards, safety guidelines, government-issued regulations, and a company's risk management policies. These solutions also provide transparency for occupants into a building's status, says Logan. Hygiene will be a critical issue: People will want to know that the spaces are ready for their return. Increased cleaning procedures and schedules will evolve, and a way will be needed to demonstrate the procedures are effective and that they have been strictly adhered to. Identifying ways to measure effectiveness of sanitisation and track compliance to the procedures will be a key challenge to solve. This is a space that will evolve significantly in the coming months and years, says Logan. Access control and video analytics Contact tracing is a new requirement in some businesses, and security technology – like access control and video analytics with advanced reporting – can help. Access control technology integrated with video analytics can be used to trace occupant movements within a facility. These technologies capture data that can be used with advanced reporting to provide a digital footprint of where a person has been within a facility and if they may have been exposed to someone identified as being infected with a contagious virus. Building owners can then proactively notify exposed individuals evolve to self-quarantine and minimize further spread of an infection. Video analytics can help to predict where and when occupants encounter each other Anxious employees will need reassurance about returning to the workplace. They will not only seek confidence that the building is optimized for a healthier environment but also that processes are in place to quickly identify and respond to potential issues. Transparency and visibility into how the building works and the health of the environment will help to reassure occupants returning to the workplace. “One way to do this is to share building analytics with occupants – to help them understand factors about the indoor air quality or occupancy density,” says Logan. Controlled health, safety and security Honeywell’s solutions provide building owners with more control over critical health, safety and security factors to encourage sustained compliance with changing building standards, safety guidelines, government-issued regulations and a company’s risk management policies, Logan adds. Visibility into how the building works and the health of the environment will help to reassure occupants returning to the workplace Every day there is new information coming from the medical and scientific community about COVID-19, and the building industry is just starting to learn what it all means. Logan warns that there is no single solution that will keep every environment healthy and safe. A good strategy features deploying a combination of solutions, optimising systems and being vigilant to make sure that companies are sustaining compliance to new and changing regulations, says Logan. “Today more than ever we must be mindful of the changing culture of how buildings are managed by making apparent the need to be mindful of health and well-being in all aspects of our lives,” says Logan. Honeywell has developed outcome-based solutions that allow building owners to transparently address building quality factors while supporting their business continuity needs in the uncertain environment. “We’re giving them the data they need to confidently reassure their employees to accelerate their business operations,” he adds.
The software-based technology running today’s access control systems is ideal for creating custom solutions for very specific end-user needs. Those needs may vary from delaying bar patrons’ access to a shooting range to reducing the risk of diamond miners pocketing precious stones. The ability to tightly integrate with and control video, intrusion, and other equipment puts access control at the heart of enterprise security. Often, off-the-shelf access systems provide most of the features an end user requires, but due to their type of business, facility or location, some organizations still have unaddressed needs. That’s where a custom solution can fulfill an essential task. Custom solutions are frequently requested by end users or the reseller to expand access control to meet those needs. Here’s a look at some custom solutions designed for end users. Area & time-based access control The owners of a popular shooting range also operate an onsite, full-service bar, and the owners wanted to delay entry to the shooting range once a customer had consumed alcoholic beverages at the bar. The custom solution works with the access cards customers use to enter the range. When a patron orders an alcoholic beverage, the bartender presents the patron’s credential to a reader at the cash register. With each drink, the access control system puts an automatic delay on the card being used to enter the shooting range. An area and time-based control solution was created An area and time-based control solution was created for a major pharmaceutical manufacturer concerned with potential contamination between laboratories testing viral material and others designing new vaccines. If an employee uses a badge to enter a room with viral material, that employee can be denied access to a different area (typically a clean room in this case), for a customized period of time. This reduces the potential of cross contamination between ‘dirty’ and ‘clean’ rooms. The software can be customized by room combinations and times. Random screening A mine operator wanted to prevent easily portable precious stones from being taken by miners. The custom solution uses the access control system integrated with time and attendance software. As the miners clock in, the system randomly and secretly flags a user-defined percentage of them to be searched as their shifts end. Security guards monitor displays and pull selected employees aside. A nice feature of this solution is that the random screening can be overridden at a moment’s notice. For example, if the process causes excessive delays, guards can override the system to enable pre-selected miners to pass until the bottleneck is relieved. The solution has also been adopted by a computer manufacturer looking to control theft by employees and vendors. Scheduler The system automatically unlocks and locks doors A custom solutions team integrated a university’s class scheduling and access control software to lock doors to classrooms that are not in use. With the custom solution in place, the system automatically unlocks and locks doors 15 minutes prior to and after a class. The doors remain unlocked if the room will be used again within the next 30 minutes. Readers mounted at each door enable faculty to enter rooms early for class setup or to work in a lab knowing students or others won’t be able to walk in. Event management This solution simplifies the visitor check-in process, especially for larger events with multiple guests. Efficiently moving people in and out of events booked at a working intelligent office building and conference center required integrating the access control system with a web-based solution storing the names, email addresses and phone numbers of invited guests. Before an event, guests receive an email invitation that includes a link to a downloadable smartphone mobile credential. Upon arrival, guests present that credential to Bluetooth readers at the building’s gated parking garage. The same credential enables smaller groups (up to 50 guests) to enter the building through turnstile-mounted readers – also used throughout the day by hundreds of building employees. To avoid long lines for larger groups of visitors, the turnstiles are kept open with security guards using handheld readers to authenticate credentials as guests enter the lobby. Additionally, a third-party emergency notification system was added to this custom solution. Guests receive instructions on their smartphones should there be a need to shelter in place or evacuate during an event. The credentials and notifications are disabled as guests leave the building through the turnstiles. This allows the hospital to maintain a secure environment while providing a simplified, efficient access solution Similar custom solutions have been deployed at hospitals searching for a way to provide secure access to patients only expected to be staying a short time for surgery. Patients are emailed a mobile credential to access both the hospital’s parking structure and surgical reception area. They can also designate family members and other visitors to receive emailed mobile credentials. This allows the hospital to maintain a secure environment while providing a simplified, efficient access solution for patients and visitors. Custom solutions are about problem solving. It’s finding answers to needs not specifically addressed by an access control system. The robust software of modern access control systems enables the design of custom solutions to efficiently enhance security, save time and reduce redundant tasks through automated processes.
Trends in the alarm industry point to a need for a software system that accommodates business patterns such as recurring monthly revenue (RMR). Workhorse Service Company provides a software that combines customer relationship management (CRM), enterprise resource planning (ERP) and field service management (FSM) into a “cradle-to-grave” system designed specifically for the alarm industry. “Making an alarm sale is different than making a CCTV sale, and the processes for the salesperson, technician and customer service rep are different,” says Steven Hayes, founder of Workhorse Service Company. He says WorkHorse is built on modern programming languages, is responsive, and provides a pleasant user experience regardless of the device being used. Client experience “Before coming on WorkHorse, our clients have needed to use multiple softwares such as bookkeeping, quoting, central station software, email, spreadsheets, and more,” says Hayes. “This would cause issues with continuity between softwares. Mistakes are made, appointments are missed, and customers leave.” When building WorkHorse, Hayes and his team interviewed dozens of companies to find out what they were missing and what their pain points were. “There are other CRM and FSM softwares on the market, but the ones that are made for our industry are generally designed for dealer programs and selling contracts,” he says. “Others are designed to bill your RMR and have basic service call functionality.” Alarm companies know that they need RMR to survive, and WorkHorse seeks to make it easy. WorkHorse allows companies to have multiple subscriptions inside a single deal. Single point of data entry WorkHorse ensures a single point of data entry for alarm companies Merchant services come with Auto Updater. If a credit card expires or even if it is canceled, the service will reach out to the issuing bank and get the new number or token necessary to bill customers. This means less time with past due bills and calling on customers to get an updated form of payment. With two-way sync integration into central stations, WorkHorse ensures a single point of data entry for alarm companies. Information used at the time of the sale to create accounts is then pushed right from the tech portal to the central station. Employees can Create, Place Online/Offline, on test, and terminate accounts through the use of WorkHorse. The Workhorse call center, ProConnect.io, will answer phone calls and provide a Tier 1 Tech Support line for clients as a well as a concierge service. Operators will trouble-shoot alarm issues or create a service ticket if they cannot help them (subscriptions to both ProConnect and WorkHorse are needed). Operators will also try and collect money that is past due while assisting clients. Misconceptions in the industry Over the next year the prevailing trends will likely be a large swing from dealer programs to the traditional alarm company, says Hayes. This will make software like WorkHorse incredibly important as companies move from a funding program to managing their in-house sales, RMR, service, and customer retention, he adds. There is a misconception is that an owner/operator can purchase a bookkeeping software and run their alarm company efficiently and effectively. Another misconception is that someone can just turn on a software and know how to use it without any help or guidance, that “playing around” with it at night will be enough to make them proficient users. The software used to run a business should be a top priority. The software used to run a business should be a top priority The WorkHorse team is looking to expand verticals into other environments in the future. WorkHorse is built in a way that could easily expand verticals by making changes to the deal and service call modules. “In mid-2020 we plan on starting Pool Cleaning and Pest Control followed by HVAC, Plumbing, Electricians, and more,” says Hayes. WorkHorse has all in-house developers located in South West Florida. The team is continuously working to create additional features and integrations in order to bring the best user experience to clients and their customers.
The COVID-19 global pandemic will have a profound and lasting impact on the physical security industry. It will boost adoption of new technologies to address new types of threats. It will map out a path for new involvement of physical security technologies in areas of public health. It will raise new notions of privacy and turn previous thinking about privacy on its head. And the aftermath of the pandemic will give rise to all these changes in a breathtakingly accelerated timeframe. In the wake of the pandemic, change will come faster than ever, and the industry will be more challenged than ever to keep pace. Security and the futureIn the wake of the pandemic, change will come faster than ever, and the industry will be more challenged than ever to keep pace These were some of the thoughts I heard recently in a panel discussion titled “Crisis and the Everyday,” which was part of Genetec’s Connect’DX virtual trade show, April 20-21. The virtual conversation – emphasising both in form and content the current topsy-turvy state of the world – included interesting insights on the current pandemic and its near- and long-term impact on the industry. “In the middle of this pandemic, there is an opportunity to help security reinvent itself,” said Brad Brekke, Principal, The Brekke Group, one of the panelists. “Amid the business disruption, we should ask ‘what’s the new playbook?’ It’s an opportunity for security to look at ourselves now and look at a business plan of what the future might look like. We need to align with the business model of the corporation and define our role more around business and not so much around security. “How do you support the business and, more broadly, societies and communities?” The new normal for security The “new normal” for security will include addressing biological risks alongside our traditional emphasis on physical risk and digital risk. “Some industry sectors are being challenged in a way I have not seen in my lifetime,” said Brekke. “But they are learning fast.” “We should take a look at where we have been and where we are going,” said Brekke, whose firm develops comprehensive strategies to align security organizations with corporate missions. “This is a point in time that has never existed, and a time to take a fresh look at what security is to the corporation and greater community. It’s more a mindset than a specific set of tasks. “We just need to take a fresh look from a mix of perspectives.” “Crisis and the Everyday" was part of Genetec’s Connect’DX virtual trade show Infrared cameras and access control technologies New technologies to address the pandemic are enabling some nations around the world to track how people come and go and who they are exposed to. Technologies like infrared cameras are being used to detect body temperatures, and access control helps to monitor occupancy and social distancing. But what will such use of these technologies mean in the long term? Technologies like infrared cameras are being used to detect body temperatures, and access control helps to monitor occupancy and social distancing “We will see whether people will become more comfortable with this technology,” said Ken Lochiatto, President and CEO, Convergint Technologies, a service-based security integration company. “Tools are in hand, and coming soon, that will allow us to be more proactive, to step in and measure the health of colleagues, for example,” said Lochiatto. “There are a lot of questions that will have to be addressed, and a lot of discussion will have to happen. Coronavirus will knock down the barriers (to the use of newer technology) in the short term, but where will it settle two years from now?” Manufacturer philanthropy Security product manufacturers are expanding their scope beyond law enforcement and emergency management and stepping forward to help with the public good. “Technology in the security space is moving faster than the political establishment is thinking about,” adds Lockiatto. “We have to manage it as an industry so the government will not step in. We need to manage the discussion.” An accelerated timeline will raise the stakes even further. “All the questions that would have taken longer to answer will be answered in the next 6-8 months. For the security industry, it will drive even greater need for products,” said Lochiatto. “The biggest question is ‘Where does this all go?’” said Brekke. “What is the new normal? What is the future, and how do we prepare our companies for it? What does technology look like in the future? There isn’t just one particular set of questions, just a constant stream of ‘What’s next?’” Public health versus individual liberty The current environment of disruption will shift the playbook and rebalance the tradeoff between privacy and protection, especially as it pertains to sharing medical information. “There will be a new balance between public health and safety as a whole versus individual liberties,” said Brekke. “Technology providers need to be at the table talking about the solutions. We should all be engaged in government affairs to balance the discussion and add our own perspectives. As a society and country, we have to come to a different perspective on this.” The current environment of disruption will shift the playbook and rebalance the tradeoff between privacy and protection “There are not enough ethics and guard rails,” said Jonathan Ballon, Vice President and General Manager, Intel Corp. “The majority of people are not afraid enough. They should be afraid; we need more regulation. We need to establish an ethical code of conduct for use of technology in these situations. We need to eliminate bias, respect individuals, and ensure people are being treated fairly. “In the next several years, there will be a lot of experimentation in the quest to get to a future state we can see and almost grasp. There will be black eyes and bruises on the path to getting there.” From smart security to more intelligent technology After the pandemic, the innovation climate will befit new technology adoption. “Platforms are only limited by our imaginations, and it creates an extraordinary opportunity and drives a lot of economic value,” said Ballon. “Long-term, the future is extremely bright. Companies should ensure that they are resilient and take advantage of another period of technology adoption, which we see coming out of every economic downturn.” After the pandemic, the innovation climate will befit new technology adoption Another evolution in the market is a transition from “smart” systems to more “intelligent” ones. Intelligence includes the ability to “learn” using tools such as deep learning and artificial intelligence. “Systems are going from smart to intelligent to autonomous, including systems that can operate within the constraints we have established,” said Ballon. Pierre Racz, president and CEO of Genetec, offered some words of caution about the growth of artificial intelligence in his keynote presentation, “AI Hype Self Defense.” Racz sought to provide guidance on the limits of the technology and urged the online audience to be skeptical of technology that “works best when you need it least.” “Science and technology are morally neutral,” he said. “How we use them is not.” Intelligent automation over artificial intelligence Specifically, Racz contends that artificial intelligence “doesn’t exist” and provides the “reasoning power of an earthworm”. AI systems don’t know anything that isn’t included in their input data – for better and for worse. Racz contends that artificial intelligence “doesn’t exist” and provides the “reasoning power of an earthworm” “A properly designed system can be useful [only] if you engineer around the false positives, false negatives and the unanticipated training set biases,” said Racz. For example, because AI is based on probabilities, it doesn’t perform as well when identifying improbable things. In lieu of “artificial intelligence,” Racz recommends the term “intelligent automation” (IA), which describes using a machine (computer) for heavy computational lifting and keeping a human in the loop to provide intuition and creativity. “Do not misinterpret crafty guessing for intelligence or thinking,” Racz warns. “AI doesn’t exist, but real stupidity exists. And we must design our systems taking into account the legitimate fears of the public we serve.”
In the banking world, the threat of unwanted intrusions into premises leading to loss of property and even risk to life is always present. Small wonder then that banking institutions take so much care over their security systems and also over their choice of suppliers for those products. In the retail banking sector, requirements for intrusion detection and related security measures are necessarily more stringent and more specialized than in most other areas of business and commerce. Data capture form to appear here! The banks clearly need to work with suppliers whose integrity is beyond question. They should also be looking for organizations that can offer expert advice, gained through their knowledge of design and manufacturing security products. Systems need specialist installer partners in order to provide a seamless solution. Systems need specialist installer partners in order to provide a seamless solution The special requirements of the banking sector These supplier organizations must also fully understand the special requirements of the banking sector and, ideally, should be able to demonstrate proven experience in that sector. They must also be willing and able to work with the bank as a partner, to find better ways of addressing old threats and to develop effective measures to counter new ones. Video is a big component of providing security, and variable lighting conditions pose a persistent challenge in video surveillance applications such as large banks and financial institutions. Typically, these venues include an abundance of windows. The resulting excessive light can damage video image quality, by flooding the image plane of the surveillance camera. Dramatic differences between light and dark areas complicate the ability of video cameras to view someone standing in the shadows. A contrasting lack of windows at teller stations can result in dim lighting, equally damaging video image quality, in critical surveillance areas where clear, detailed images are needed the most. Stark contrasts between white and black levels in video images can obliterate faces and finer details of a subject when in a darker area. Particularly, this happens when a person is amid dark internal lighting, with his/her back to the sun. Data capture form to appear here! A new network architecture When upgrading a bank’s digital security system, a new network architecture needs to be created. Usually, this means switching from DVRs to NVR servers. As a result, network switches attach to the camera allowing for easier future system expansion. Along with the newly gained scalability, throughput performance on servers can achieve significantly higher levels. Servers, networking and workstations provide enterprise-quality performance for all financial projects, regardless of size. Servers, networking and workstations provide enterprise-quality performance for all financial projects Implementing a complete video solution with high-performance servers, modern networking protocols and powerful workstations is now possible in financial institutions, even for small projects. Servers, networking and workstations provide enterprise-quality performance for all financial projects, regardless of size. Software is also part of the solution. A new software platform helps banks and credit unions simplify, modernize, and automate security, surveillance and fraud investigations across their enterprise. The platform eases the daily challenges security investigators face. It simplifies and reduces the time to access live and recorded video through an intuitive interface, empowering users to quickly find the data needed to eliminate risks while increasing productivity. With an enhanced user experience, investigators can reduce training time, align investigation workflow, streamline video sharing, and focus on more critical tasks. The fraud and security challenges banks contend with can be overwhelming, but prompt action is necessary to limit the damage that can greatly affect customers, employees, and the brand. When an incident occurs, investigators must turn to innovative security tools to be able to swiftly locate and analyze data. But these solutions are typically complex to use and manage. Investigators must turn to innovative security tools to be able to swiftly locate and analyze data Changing work environments The changing work environment of financial institutions is impacting security needs. A credit union in Australia operates an innovative, modern working environment that utilizes flexible workspaces in place of traditional desks. Staff are not allocated a specific desk but instead choose where they wish to sit each day. To facilitate the operation of the flexible work environment and provide employees with storage for their personal effects (work-related material is stored elsewhere), the credit union uses banks of brightly colored lockers that are managed by electronic access control. Using Gallagher’s smartcard, multi-technology T20 and T10 readers on each locker bank, staff badge their access card to open their allocated locker. With the readers communicating with Gallagher’s Command Center software management platform, the credit union has a simple-to-operate, customizable system that enables staff to carry just one card on site. Read part one and part three of our banking security mini series.
FLIR PT Series cameras were used in a surveillance project to detect and monitor illegal fishing and poaching activities along the Spanish Galician coast. The FLIR thermal imaging cameras combined with maritime video analytics from Gradiant were ideal for spotting illegal vessels on a 24/7 basis and at a long range. The vastness of the Galician coastline and the multitude of fishing and farming activities call for a more automated surveillance approach. Fishing, shellfish harvesting, and marine aquaculture - mainly mussel farming in inshore waters are important economic activities in Galicia (northwest of Spain). Local public authorities strictly control these activities to prevent exploitation, fish stock depletion and resulting economical losses. They are fighting a constant battle against this unfair and illegal competition that affects thousands of professionals who make a living from the fishing and seafood industry. Challenges of coastal monitoring Illegal fishing and poaching has an enormous impact on the environment and food safety Illegal fishing and poaching of seafood resources also has an enormous impact on the environment and food safety; especially during periods of toxic algal bloom (red tides), when fishing conditions are hazardous for public health. The detection of unauthorized fishing and shellfish harvesting is of paramount importance for the Galician authorities. However, monitoring and protecting all of Galicia’s inshore and offshore fisheries, shellfish harvesting areas, and marine aquaculture farms is a challenging task. Galicia has 1,200 km of coastline. Its protection involves the surveillance of activity in 122 ports, including around 5,000 fishing boats, 400 beaches dedicated to shellfish harvesting, and 47 mussel aquaculture farms, with a total of more than 3,000 bateas (floating mussel farms). Long-range thermal imaging Moreover, most illegal activity takes place at night, making it extra difficult for law enforcers to detect any type of vessel. The Galician climate does not help either. With an average of 128 days per year of rain, visibility conditions are usually not ideal for surveillance operations. Manned surveillance patrols can only do so much; they are hindered by the climate and visibility conditions, making it impossible (from a practical and financial standpoint) for coast guards to cover the entire Galician coastline. In 2017, the Galician Coast Guard started a project to test video surveillance of the coastline based on thermal imaging cameras. The pilot included the use of FLIR’s PT Series multi-sensor camera, combined with maritime video analytics software from Gradiant (Pontevedra, Spain). Multi-sensor installation FLIR thermal images were enhanced by Gradiant’s intelligent video analytics software for maritime applications The multi-sensor installation was extensively tested on two different locations along the Galician coast. One set-up was used to monitor illegal vessels on coastal waters at short/medium range, while another set-up was used for long-range monitoring. The PT Series thermal cameras allowed the Galician Coast Guard to monitor the required area over a long range on a 24/7 basis, even at night and in adverse weather conditions. In addition, the FLIR thermal images were enhanced by Gradiant’s intelligent video analytics software for maritime applications. This software is specifically adapted for monitoring coastal environments and allowed the coast guard to detect, track and geo-localise people and vessels, including small wooden and plastic boats. Visible-light camera The software enabled the thermal cameras to detect objects and people despite adverse maritime conditions, such as high waves, low contrast due to low light, fog and rain, reflections on the sea surface, camera vibrations, and the presence of distractors, such as birds and vessel wakes. The FLIR PT Series is a high-performance multi-sensor pan/tilt security camera, incorporating an uncooled thermal camera with sensitivity of <35mK and a visible-light camera with 36x optical zoom. While the thermal camera is used to detect threats over a long range based on their heat signatures, the visible-light camera can be used for verification and identification. Long-range surveillance The requirements for this long-range application were extremely challenging for any thermal camera" “FLIR is the reference for long-range surveillance applications with thermal imaging,” says José Antonio Rodríguez, Head of Video Analytics at Gradiant. “The thermal performance of the camera and the fact that this technology is easy to set up makes it ideal for this type of application. In addition, FLIR supported us from the start for lens selection, calibration of the system and much more.” “The requirements for this long-range application were extremely challenging for any thermal camera,” says Nikitas Koutsourais, Product Marketing Manager at FLIR Systems. “Thanks to the FLIR PT Series’ unique thermal sensitivity of less than 35mK, we could provide the best image performance in the market.” IP video streaming Two different configurations were used in this application. The long-range surveillance station used a FLIR PT-606 camera, and was able to detect a rubber inflatable boat at 4,000m. Despite its narrow field of view, this camera allowed for wide coverage thanks to the high-precision pan/tilt unit. The camera was able to sweep a wide field of view span in a pre-programmed sequence of pan/tilt presets. The port surveillance station used a PT-625, offering a good compromise between detection range and field of view with a single pan/tilt preset. The integration of the video analytics software with the camera was easy thanks to IP video streaming and the camera’s ONVIF compliant interfaces for pan/tilt control. Long-range surveillance typically requires the use of lenses with a narrow field of view, which is a problem when you want to monitor wide areas. Coastal protection applications The FLIR thermal cameras provided the Galician coastguard with increased situational awareness However, the video analytics from Gradiant was able to take advantage of the Preset Sequencing mode of the FLIR PT Series. This allowed the coastguard to cover a wide field of view with a single camera and to perform video analysis on each pan/tilt preset. The FLIR thermal cameras provided the Galician coastguard with increased situational awareness and allowed them to respond much quicker to illegal fishing activities. The pilot project was performed in a realistic surveillance environment along the Galician coast and generated very positive results. The combination of a multi-sensor system with Gradiant’s maritime video analytics proved to be effective to deal with the intricate Galician coast lines and a lack of open view. In addition, this technology combination is a cost-effective alternative, making automated surveillance applications accessible for fish farm companies worldwide. Extremely rugged systems Finally, the PT-Series are extremely rugged systems, which makes them ideal for coastal surveillance, especially in an extremely humid environment such as the Atlantic coast of Spain. The system’s vital core is well protected against dust and water ingress, and complies with IP66 requirements.
Places of leisure, where one spends one’s downtime, are public by design. Unlike a bank vault or power plant, they actively invite visitors. One can’t just lock them down and hope no one turns up. Equally, to ensure user and property safety, access must not be a free for all. Managing risk - separating authorized from unauthorized people and locations - is part of every site manager’s daily routine. Intelligent locking makes this workload a whole lot easier. Intelligent keys combine the powerful features of electronic access control with the convenience and familiarity of mechanical keys. In hugely diverse leisure settings across Europe, they already help managers do more with less. Everyone treasures their leisure. The right access solution can help one do it safely without putting a burden on those responsible for one’s security. We treasure our leisure. The right access solution can help us do it safely without putting a burden on those responsible for our security. Controlling access to outdoor sites and visitor attractions Obviously, for many leisure attractions, wired electronic security is not an option. Locations may be remote - far beyond the reach of mains electricity. Assets themselves may be outside. Thankfully, cabling is not essential for effective intelligent access control. Robust, battery-powered locking, backed by intuitive admin software one can access from anywhere, matches or exceeds the functionality of traditional wired access control. Padlocks built to withstand climate extremes integrate within one’s system exactly like standard interior locks. Intelligent electronic key systems are also budget friendly. Making the switch from mechanical security is not an all-or-nothing decision. The best intelligent key systems let one roll out gradually, as needs evolve and budgets allow. For example, the Llyn Brenig Reservoir and Visitor Center in Wales attracts tens of thousands of tourists every year. Both mechanical and electromechanical locking protect a site which houses critical infrastructure and watersports facilities - with disparate security needs. Here electromechanical locking brings long-term cost savings to site owners Welsh Water, because locks no longer need to be changed when keys are lost. Permissions are simply deleted from the system software. In 2015, Twycross Zoo launched a £55 million, two-decade development plan. High on the agenda was a new intelligent key solution to replace a mechanical master-key system which was labor-intensive to administer. The new system’s flexibility has put zoo security managers in full control of their site. Only staff with the necessary authority and training can access animal enclosures. Carrying one programmable key able to open doors, windows and padlocks makes the security team’s rounds easier It’s simple for system administrators to issue time-defined user keys. These can permit vets or zookeepers access to enclosures for a specific time period outside regular hours - for example, in an emergency. When the period expires, the key no longer works and site integrity is automatically restored. Access control in the museum sector When Edvard Munch’s painting “The Scream” was stolen from an Oslo museum in 1994, thieves left a note which read: “Thanks for the poor security”. Securing museums - open spaces with priceless contents - presents one of security’s biggest challenges. Around 50,000 artworks are stolen every year, according to some estimates. Adding further complexity, many museums are located within historic properties. The building itself may be integral to the attraction - and come with strict heritage protections. Any new locking installation must make minimal mess. For this reason, wireless is increasingly the preferred choice. Wireless access systems based on robust, key-operated locking, rather than cards and other keyless credentials, combine a familiar technology (the metal key) with the intelligence to keep staff and collections safe. Carrying one programmable key able to open doors, cabinets, windows and padlocks makes the security team’s rounds easier. It also minimizes the number of keys in circulation - with obvious security benefits. Companion software makes key tracking straightforward: one always knows who exactly is carrying credentials, can refine or amend those permissions quickly and order a full audit trail on demand. And these locks are discreet enough to maintain the property’s appearance. Museum access control in action London’s Design Museum needed access control designed to protect high-value assets and exhibits. Devices here protect a contemporary site with three galleries, a restaurant/café and an events space, with 100 permanent staff and hundreds (sometimes thousands) of daily visitors. The building has multiple door sizes and must meet British Standards compliance. Installation was easy and wire-free, because encrypted electronics inside CLIQ locks are powered by the standard batteries Electromechanical locks now control access through 56 doors, forming part of a security ecosystem which incorporates traditional mechanical locks, too. Using intuitive management software, security managers ensure every staff member accesses only the right areas. Contractors are issued with temporary programmable keys, which saves time formerly wasted escorting them around the building. The system the Design Museum chose - CLIQ® from ASSA ABLOY - also enables integration with third-party cloud-based solutions, for control via a single, central management interface. The delicate balance between protecting a precious building and guarding its contents sets a major challenge. Security and access control must be “subtle, but ever present,” according to one former moderator of the Museum Security Network. Invasive installation, showy or inappropriately designed devices and components cannot be considered. This was the checklist facing France’s Musée Maurice Denis: the museum is inside a listed 17th-century monument, so they turned to CLIQ access control technology for a solution. Drawing on extensive experience in the heritage sector, ASSA ABLOY delivered security without disrupting the building aesthetic. Installation was easy and wire-free, because encrypted electronics inside CLIQ locks are powered by the standard batteries inside every programmable key. No further power supply is needed at the door. Around 70 robust, hard-wearing cylinders and padlocks now secure doors and windows inside and outside the main building; waterproof padlocks protect CCTV camera housing on the exterior. Every employee receives access to relevant areas via a single CLIQ key, which administrators program with only the appropriate permissions. Insurance compliance is another major concern in the heritage sector. Indeed, insurers for 17th-century warship Vasa demand Sweden’s highest level of locking: Class 3. Yet the Vasamuseet’s access system must also allow 1.2 million annual visitors to move around freely, while keeping exhibits safe. To upgrade an existing mechanical system, around 700 interior door cylinders were equipped with CLIQ Remote electromechanical technology. Museum staff used to carry heavy chains with ten or more keys. Now facility managers can amend the access rights of everyone’s single CLIQ key at any time, even remotely, using the CLIQ Web Manager. It’s easy to issue contractors such as carpenters with access rights scheduled to end automatically as soon as their work is complete. Security for shopping and indoor leisure sites The electronics inside CLIQ locks are powered by the standard battery inside every key, not mains electricity According to one study completed two decades ago, one spends 87% of one’s time indoors. The number is probably higher now - and includes a huge chunk of one’s leisure time. Large retail multiplexes like Festival Place in the UK are a popular destination. Here over 170 shops, a cinema, sports center and restaurants have an ever-changing roster of permanent staff, cleaners and out-of-hours contractors. Every person requires secure entry on demand. The public also needs open access for 18 hours every day. Yet a single lost mechanical key could become a security problem for all users and tenants. Installing 100 CLIQ electromechanical cylinders drastically cut the burden of mechanical key management. Now, cleaners and maintenance workers carry an intelligent key which unlocks specific doors for a pre-defined time period. Using simple online admin software, site managers can immediately de-authorize and reissue a lost key or amend any key’s permissions. Generating a comprehensive audit trail - who accessed which lock, and when - takes a couple of mouse clicks. CLIQ also cuts Festival Place operational costs. The electronics inside CLIQ locks are powered by the standard battery inside every key, not mains electricity. Installation was wireless, a huge saving on potentially expensive electrical work. At Festival Place and wherever one gathers to enjoy leisure - indoors or outside - CLIQ enables easy access control for all openings with just a simple, single, programmable key. To learn how you can put CLIQ® intelligent key technology to work in agile, flexible, secure public services, download a free introductory guide at https://campaigns.assaabloyopeningsolutions.eu/eCLIQ
It has been a long time coming, but the Bexar County Metro 911 Emergency Operations Center (EOC) is up and running, and the security systems implemented to protect the facility are among the best of the best. The regional operations center unifies emergency operations into one cutting-edge facility. A New Home Built in San Antonio, Texas, the EOC provides a new home for the Bexar County Sheriff’s communications operations and is an alternate site for the San Antonio police and San Antonio fire and EMS operations. The facility is a joint operations center not only for Bexar County but also for Comal (New Braunfels) and Guadalupe (Sequin) counties. Tight security system All three counties touch dividing lines and are considered part of the San Antonio metro area. Bexar Metro 911 Executive Director Bill Buchholtz said building the facility has stayed on budget of $40 million, “give or take a couple of million.” The electrical system meets Tier IV data center standards for maintaining operations regardless of any unplanned activity, and the mechanical system meets Tier III standards. Because the building is under a tight security system inside and out, it was also important that redundant systems were in place, as well as uninterrupted power. Employees based at the monitors on the main floor are given breaks every so often to decompress, relax and interact. Early stages of planning Alterman staff was fortunate to work with the general contractor in the early stages of planning security Alterman Technologies was hired to provide, install and direct the security solutions effort for general contractor Whiting-Turner, who directed construction on the 81,500 square foot facility located on 11 acres of land. Alterman Technologies’ staff was fortunate to work with the general contractor in the early stages of planning security for this facility. According to James Carmen, Alterman’s Project Engineer, being able to make early and consistent contact allowed for the integrator to help specify the types of security that they felt would most satisfy the end user. It also allowed the installation crew to be able to meet their integration deadline of 8 months, long before the overall construction of the facility was complete. Enterprise access control systems “We were able to evaluate all components of the security solution when we saw the demonstrations of the Lenel, Axis and Salient products,” Carmen said. “We’re pleased with the decisions we made to deploy this security equipment.” To keep the facility secure, Alterman Technologies installed 170 IP cameras inside and out to enforce perimeter security. Now that the facility has been formally dedicated and is fully in use, if a person doesn’t have a reason to be on property, they aren’t getting inside. The facility is secure. Alterman Technologies installed 120 door enterprise access control systems, including iClass biometric readers. Video management systems To monitor both the outside perimeter and inside the building itself, 110 5 MP Axis Communications IP cameras were paired with Salient Enterprise video management systems integrated with the Lenel access control solution. Inside the operations center, the facility is outfitted with 100 55-inch video control systems side by side, all of which are integrated with video and audio control solutions. During Hurricane Harvey, operators inside are able to coordinate any and all emergency and rescue operations Inside the facility, there is a first-floor, open room for 104 operator desk consoles, where operators can keep tabs on all three counties. Operators sit in a 13,878-squarefoot Public Safety Answering Point (PSAP) to handle all 911 calls, formerly managed at 25 different locations. In fact, during the recent Hurricane Harvey, operators inside are able to coordinate any and all emergency and rescue operations. Getting behind the power “The ability to have multiple supervisor control stations is a key feature, providing access to sources and allowing supervisors to manipulate the wall and change presets as needed,” said Art Salinas, Project Manager for Alterman Technologies. “It’s a great system with no real limitations. I believe the client has been pleased with the capability to control and preview content before it goes on the wall. They currently have about 30 preset displays.” With the number of cameras and the video streaming to the facility, Salinas had to be certain the equipment he was recommending and the software that would power the system would work without a hitch, 24 hours a day, seven days a week. “Our work to determine the right kind of solution was very involved, and we evaluated all the systems,” Salinas said. “When it came right down to it, we selected Lenel’s OnGuard for access control, Axis Communications IP cameras and Salient’s VMS and its PowerUltra servers. All of this is securely stored in an enclosed network so there is no worry of outside hacking.” Perimeter security system With three counties and multiple agencies using this facility, the security solutions have to be dependable" Salient Regional Sales Representative Paul Fisher said the choice of VMS was truly an important decision because it had to be strong enough to stop any breaches but also be able to provide the ability to run the perimeter security system and the internal security. “Our VMS solution is able to take the lead with all the streaming video and push it wherever it is directed,” Fisher said. “With three counties and multiple agencies using this facility, the security solutions have to be dependable, yet easy to use. We were invited in to demonstrate the system, and we were able to show numerous details that would benefit the end user. We are able to provide reliability and scalability, and we’re a local company, so that worked to our benefit as well,” Fisher said. Law enforcement officials The facility is designed to provide uninterrupted 911 services during various emergencies, including terrorist attacks and natural disasters. There also is an onsite helipad for access by law enforcement officials, should area roadways be closed or congested, and for staging for media during a public emergency. The building is constructed to withstand an EF3 tornado strike and to operate without any public utilities for an extended period of time. “The mission of the facility is to provide that emergency response when a caller is quite possibly going through the worst experience of their life,” said James Hasslocher, Bexar Metro 911 Network District Chairman.
The new Student Center at Columbia College Chicago, located at 754 South Wabash Avenue in Chicago, opened its doors in the fall of 2019. This brand-new building offers five spectacular stories of spaces for students including music and film-screening rooms, dining options, a fitness center, a reflection room for meditation and prayer, and event spaces for meetings, performances, and receptions. According to Andy Dutil, Director of the Columbia College Chicago Student Center, the school has taken the initiative to improve overall security, with the intention of keeping an open feel to the campus. Speedlane open turnstiles To help meet that objective at the new Center, the architects designed the building with Speedlane Open turnstiles and a TQM manual revolving door from Boon Edam. Columbia College Chicago has a closed campus. In order to enter any building on campus students and staff must have a Columbia ID or visitors must have a valid appointment. The main entrance at the Student Center is the TQM revolving door that leads to a public foyer that includes a coffee shop and lounge. Guards watch as people pass through them to ensure that everyone is scanning their IDs Since the turnstiles are just past the security desk at the boundary of this area, they serve as a visual and physical indicator of where the public area terminates. Next to the Speedlane Open turnstiles, which are notable because they do not have any closing barriers, guards watch as people pass through them to ensure that everyone is scanning their IDs and that the IDs are valid, in which case the turnstile shows a green light. Controlling access without being obtrusive In a situation where a red light shows and the turnstile alarms, the guard will check the person’s credentials and can try to troubleshoot the ID card. “The decision was really about what creates the least barrier to those entering and exiting the building,” said Dutil. “We don't really want our students to feel like they are overly policed or that our buildings are not accessible to them. So the design of the Open turnstiles provided the best solution in terms of controlling access without being obtrusive.” Before the Student Center was built, students entering any campus building would just show their ID to the security officer as they walked past. The administration realized that while this does provide some level of security, it is not foolproof – particularly when many people are entering at the same time for a class. Brief learning curve The College’s head of security made the suggestion to install a system that would allow for swift passage of authorized people while maintaining accountability around who enters and exits the building. As anticipated, there was a brief learning curve for the students using the new system As anticipated, there was a brief learning curve for the students using the new system. “This was the first system like this on our campus,” said Dutil. “And the first few days that the new Center was open were also the first few days of school. There were a lot of people new to the campus who required a bit of coaching from guards and our student staff in terms of where to place your card, and to not walk through before you place your card.” Dutil confirms that the access systems placed at Boon Edam turnstiles are actually outperforming those placed at swing doors across the campus for convenience and adoption. Benefits beyond campus security “Across the campus, there is a card reader at every swing door entrance of a building where you present your card and a light turns red or green. But oftentimes the card reader is missed, or depending on the placement of the lights and placement of the guard, it can be kind of hit or miss with students walking right by it.” “But with the Open turnstiles, they're very visible and although they're not a total barrier to entry, they are something that's right in front of you. Because it's very noticeable and not easily overlooked, the students have learned pretty quickly to get their ID out. In fact, this was meant to be a test run for the campus to ensure it would be viable and worthwhile for other buildings as well.” The turnstiles have delivered additional benefits beyond basic campus security, according to Dutil. Convenient touch panel “One of the nice things about a system like this is that we can count visitors to the Student Center because we get the data of everybody that scans in. So on a busy day for us it's about 2500 people throughout the day. That can range depending on what's going on and what time of year it is. On weekends we're very slow, since there are no classes – maybe 900 to 1200.” There's a really convenient touch panel right at the security desk called the BoonTouch" “We are a rental venue as well, so we have times where the building is open to non-Columbia College Chicago people for events or other functions. There's a really convenient touch panel right at the security desk called the BoonTouch, where the officer can turn off the turnstiles during those times and then attendees can move through freely without any alarms going off at all.” Keeping the building warm Finally, the TQM revolving door delivers one additional benefit to the Student Center, located in a city known for harsh weather. “Revolving doors are always preferred at a building like this that gets a lot of traffic going in and out. We have cold, drafty weather that blows right into our main space at that first floor entry. The revolving door helps to keep the building warm and saves energy and utility costs as well,” said Dutil. “Students feel safe and comfortable entering the building at night,” he concludes. “Our building has a lot of nooks and crannies, and someone can end up alone in a space. And so I think knowing that the only people that are in that building are the ones that are supposed to be there is helpful. Overall, our students appreciate the effort to try to keep them safer.”
Iris ID, a provider of iris recognition technology, announces it will provide its biometric recognition technology to the County of Los Angeles to make its prisoner release process safer, more accurate and efficient. Iris ID’s OU7S-AK camera module will be part of 163 Livescan stations in 114 law enforcement locations throughout the county. The new criminal booking solution will bring iris-based identity authentication capabilities to a system that previously relied on fingerprints and photos to enroll and identify individuals arrested in the nation’s most populous county. Identification of all criminals arrested The Los Angeles County Sheriff’s Department is one of 64 law enforcement agencies in the county that are part of the Los Angeles County Regional Identification System (LACRIS), which is the entity responsible for the identification of all criminals arrested in the county. Tim Meyerhoff, director, Iris ID, said the company’s contactless iris-based technology was part of an FBI-funded pilot project began in 2015. “The Iris ID system will allow for a more accurate release of individuals as a person’s iris is much less susceptible to damage than their fingerprints,” he said. Automated fingerprint identification system “With more than 300,000 bookings annually, the Los Angeles County Sheriff’s Department is always interested in eliminating the improper release of any individual.” The iris capture technology is part of a larger contract to be overseen by South Carolina-based DataWorks Plus which will also supply central servers, supporting software and implementation and support services. The contract will be paid for using funds from the state Automated Fingerprint Identification System. Program implementation will begin after July 1, the start of the county’s 2020-2021 fiscal year. Full deployment is expected to be completed within six months.
Invixium, a global provider of innovative touchless biometric solutions, has been contracted by Fine Hygienic Holding (FHH), one of the provider Wellness Groups and manufacturer of hygienic paper products, to deploy IXM TITAN devices and integrate Invixium’s workforce management solution with FHH’s Oracle HR cloud as part of its corporate digital transformation initiative. Businesses like FHH that have many operating locations require a workforce management solution where data from all facilities is readily available. Invixium’s IXM WEB is a web-based, cloud-ready biometric access control and workforce management software that the TITAN devices installed at FHH’s sites in Jordan, the UAE, Saudi Arabia, and Egypt constantly share data with. This data, including time tracking, is visualized in IXM WEB’s playful interface through interactive dashboards and intuitive reports showing employee data and the overall health of the biometric system. Payroll and employee time management FHH’s existing ORACLE Fusion time management system created a unique challenge for all stakeholders, including Invixium and their partner ElectroSec, from an implementation and support perspective to cover all FHH’s operations across the MENA region. For the TITAN installation to be effective, employee clock-ins (i.e. punches) needed to be immediately exported to ORACLE Fusion, where FHH’s Human Resources could manage payroll and employee time. Invixium’s team of experts worked with FHH and ORACLE to bridge IXM WEB with Fusion, allowing TITAN to seamlessly share data with FHH’s existing human capital cloud. After three consecutive pay periods with 100% time accuracy, Invixium and FHH share that this custom digital transformation implementation was a complete success. Zero human intervention “We had very tight timelines in 2019 to ensure we go live in 2020 for all our Phase 1 Cloud transformation programmes, where the core focus was on Human Resource processes, technology and improvements. Working with Invixium, Oracle, FHH’s technical team, supported by the HR team, we were able to implement a system that is 100% accurate on employee records for Time and Attendance and then integrated it into the Oracle platform. This leaves very little room for fraud and zero human intervention, and provides FHH with a foundation for the future for all HR related systems and processes," said FHH’s CIO Yahyah Pandor. “Invixium is very proud of what we accomplished with Fine Hygienic Holding,” said Shiraz Kapadia, President and CEO of Invixium. “Our products are made to be highly customizable, so we accepted this challenge knowing that TITAN and IXM WEB were the right fit for FHH’s unique needs. IXM WEB especially is designed with the end-user in mind; we want our customers to have the freedom to build their system around their business needs. Our engineers worked tirelessly with FHH and ORACLE to make this digital transformation happen, and the results have been incredibly positive.”
Round table discussion
Traditionally, dealer-installers and/or integrators provide the front line of support to end user customers after a sale. Because integrators assemble and provide the “solution” – often using products from multiple manufacturers – they are most familiar with the total system and can troubleshoot any problems. However, manufacturers may be better equipped to deal with specific problems after a sale and also to provide a variety of resources to end-users. It’s a delicate balance, and the best approach may be dependent on the product or even the market. We asked this week’s Expert Panel Roundtable: What is the role of manufacturers in providing support to end user customers after the sale?
Ten years is a long time, but it seems to pass in an instant in the world of security. In terms of technology, 2010 is ages ago. Changes in the market have been transformative during that decade, and we called on our Expert Panel Roundtable to highlight some of those changes. We asked this week’s panelists: What was the biggest change in the security industry in the 2010-2019 decade?
Cloud applications are an everyday facet of business these days, exemplified by systems such as Office 365, Salesforce.com and Dropbox. The physical security market is also embracing the cloud after overcoming some initial concerns and thanks to improvements in cloud offerings. We asked this week’s Expert Panel Roundtable: Which security markets are likely to embrace the cloud?
Security software: Manufacturers & Suppliers
- Vanderbilt Security software
- Milestone Security software
- Vicon Security software
- DSX Security software
- Hanwha Techwin Security software
- Gallagher Security software
- HID Security software
- TDSi Security software
- Bosch Security software
- Nedap AEOS Security software
- CEM Security software
- CCTV Software Security software
- Software House Security software
- PAC Security software
- Honeywell Security Security software
- Panasonic Security software
- Dallmeier Security software
- FLIR Systems Security software
- IDTECK Security software
- Geutebruck Security software
Automatic Vehicle Identification: State Of The Industry 2020Download
How Analytics Engines Mitigate Risk, Ensure Compliance And Reduce CostDownload
11 Considerations For Embedded System RFID ReadersDownload