PSA, the consortium of professional systems integrators, announces the addition of Seagate Recovery Services to the partners in its Managed Security Service Provider (MSSP) program. The MSSP program is designed to help systems integrators diversify their service offerings and realize the full potential and benefits of a managed services business model. Data recovery services “Seagate Recovery Services is a wonderful addition to our vendor line up as the Seagate Rescue product accounts fo...
Allied Universal, a security and facility services company in North America, announces the appointment of Caress Kennedy as a member of The Committee of 200 (C200) - a prestigious network of top-level women entrepreneurs and corporate innovators. “We are delighted that Caress Kennedy was selected to be a member of the elite C200,” said Steve Jones, CEO, Allied Universal. "Caress is an extraordinary leader who brings valuable hands-on experience and innovative ideas for the security...
The next chapter of the Pelco saga began in May when Pelco Inc. was acquired by Transom Capital Group, a private equity firm, from Schneider Electric. Since the acquisition, Transom Capital has been working with Pelco’s management and employees to define and direct that next chapter. “The more time we spend with the company, the more excited we are about the opportunity,” says Brendan Hart, Vice President, Operations, Transom Capital Group. In addition to his position with Tra...
Door & Hardware Federation (DHF) has announced that its automated gate safety campaign, Gate Safety Week, has become Gate Safety Month. The Tamworth-based trade association launched the initiative in 2014; since then, the campaign has received increasing national attention and the support of some of the most influential organizations in the security, enforcement, inspection, education and safety sectors, such as HSE and The British Safety Council. “Such is the profile of Gate Sa...
PerpetuityARC Training, part of Linx International Group announces that security management professionals operating in Dubai and the wider UAE, will have the opportunity to train for the internationally recognized ASIS Certified Protection Professional (CPP®) accreditation, when it runs its renowned five-day intensive bootcamp from 3rd to 7th November 2019. ASIS International is an organization for security professionals and its CPP® qualification is widely acknowledged at the ‘go...
Ethics is a particularly important subject in an industry such as fire and security because the result of unethical actions might make the difference in life and death. For example, if an employee acts unethically when servicing a fire extinguisher, the result could be to burn down the building. Although ethics is not a common topic of discussion in the fire and security industry, perhaps it should be. Chubb Fire and Security is a company that provides an example of how an emphasis on ethics ca...
ASIS International, the association of security management professionals, released its Enterprise Security Risk Management (ESRM) Guideline, which takes a different approach to traditional security. The new guideline is the first strategic security management tool of its kind, elevating the security function by establishing a partnership between security professionals and business leaders to manage security risks. The objective of ESRM is to identify, evaluate, and mitigate the likelihood and/or impact of security risks to the organization with priority given to protective activities that help enable the organization to advance its overall mission. ESRM positions the security professional as a trusted advisor to help guide asset owners through the process of making security risk management decisions. Maintaining high performance over time “We’re very proud to provide this foundational tool to ASIS members—and the security industry at-large—to help guide them through adoption of ESRM within their organizations” said David R. Feeney, CPP, PMP, Chairman of the ASIS ESRM Guideline Technical Committee. The new guideline further outlines how the ESRM Cycle is built on a foundation of transparency ESRM recommends that security professionals maintain an understanding of the organization’s overall strategy, including its mission and vision, core values, operating environment, and stakeholders. Understanding this context will enable security professionals to effectively support and align with the organization’s strategic goals. The new guideline further outlines how the ESRM Cycle is built on a foundation of transparency, governance, partnership with stakeholders, and holistic risk management. By continually repeating the ESRM Cycle, security professionals can bring ESRM practice to maturity and maintain high performance over time. Global development of ESRM “We remain committed to the global development of ESRM, and the release of our ESRM Guideline demonstrates the ASIS Board of Director’s on-going support to formalize ESRM globally,” said Tim McCreight, ASIS Global Board sponsor of the ESRM Initiative. Security professionals can learn more about ESRM during the Introduction to Enterprise Security Risk Management classroom program on September 8 at McCormick Place in Chicago—the convening place of Global Security Exchange (GSX) 2019. ASIS members receive free digital access to the new ESRM Guideline on the ASIS website. Non-members may purchase a softcover or read-only copy of the Guideline online in the ASIS Store. GSX attendees can purchase a copy in the ASIS Bookstore onsite and learn more about ASIS standards currently in development by visiting the ASIS Hub (Booth #2027) in the exhibit hall.
Security industry veteran Daniel Schmelzer has brought to market a much-anticipated new book – Securing Trust: A Guide For Security Technology Sales Professionals Written From The Customer’s Perspective. This easy-to-read guide was written to equip today’s security integrator with the tools and knowledge they need to close more sales and enhance their customer relationships. The pages are packed with useful sales tips, and are based on real life security selling techniques that have helped senior leaders understand the value of investing in sophisticated security technology. IP-Centric enterprise security platform Schmelzer holds a Master of Arts in Security Management from the American Military University, has six years of experience as a security sales professional and seven years as a Security Technology Director at a Fortune 20, global company. His work portfolio and expertise includes designing, implementing, and management of a $30 million IP-centric, enterprise security platform that spans five continents. He has also designed and implemented over 1,700 complex integrated security installations. Schmelzer wrote SECURING TRUST to empower other security technology professionals to grow their businesses by taking an informed approach to selling the value of security to an organization. Key security topics in the book The twelve Chapters cover key topics ranging from Meeting Preparation; Understanding the Fundamental Role of Security in an Organization; How to Help Customers Identify Risk; How to Discover Sales Opportunities Through Supporting the Customer’s Business Continuity/ Emergency Preparedness Plan; How to Sell the Benefits of System Integration; How to Sell Cross-Functionally and Convergence; The Value of System Design Standards; How to Help The Customer Sell Your Solution Internally; Understanding the Buying Cycle; and, Overcoming Objection.
On September 8–12 in Chicago, ASSA ABLOY will show GSX 2019 attendees the latest innovations in their security and life safety offerings. They’ll also hold special events and educational opportunities for conference attendees at their booth, #1303. “New challenges are always on the horizon, so security professionals need to stay ahead of changing conditions and have access to cutting-edge solutions,” said Mark Duato, Executive Vice President of Aftermarket Solutions at ASSA ABLOY Door Security Solutions. “We’re proud to be at GSX again this year and support professionals across education, government, healthcare, commercial and multi-family security in staying ahead of what’s next for the industry.” Proactive solutions for security ASSA ABLOY is making access more convenient by extending electronic solutions to openings in commercial facilities At GSX 2019, visitors to the ASSA ABLOY booth will experience the latest products to help them better secure, manage and control their spaces. ASSA ABLOY is making access more convenient by extending electronic solutions to openings in commercial facilities and multi-family residences. For example, the award-winning Adams Rite G100 digital glass door lock with Aperio wireless technology offers a surface-mount solution for interior all-glass doors that integrates with existing software. Now glass openings can utilize single-card or dual-factor authentication without the need for cutting and drilling to install the lock. The latest keypad access product by Yale, the nexTouch Keypad Exit Trim, easily upgrades exit devices with keyless technology in commercial, multi-use and multi-family spaces. This scalable solution functions as a stand-alone keypad lock, or it can be integrated with a data-on-card or wireless access system. Enhancing security in educational facilities ASSA ABLOY combines security with cost effectiveness so that safety solutions can be implemented at scaleASSA ABLOY also remains committed to enhancing security in educational facilities. Their award-winning attack-resistant doors are tested according to the FBI’s active shooter report and can withstand a four-minute attack by an assailant using a variety of tools and weapons. ASSA ABLOY combines security with cost effectiveness so that safety solutions can be implemented at scale. “GSX 2019 is a great opportunity to show a range of stakeholders in various industries how ASSA ABLOY can help them strengthen life safety and security at their facilities,” explained Jeff Huggins, VP Government Programs & National Accounts, ASSA ABLOY, Door Security Services. “Our activities and interactive displays onsite will also allow visitors to deepen their knowledge and discover new ways to better secure their spaces, and they’ll even have the opportunity to give back to our brave military members.” Contributing for military ASSA ABLOY will feature hands-on activities and informational opportunities at their booth. On September 11, they will offer an opportunity for GSX attendees to give back to those who sacrifice for our freedoms by hosting a USO Bag Build in their booth. Attendees can pack supplies for military, who transit through the Chicago USO centersFrom 12 – 4 p.m. CT, attendees can pack supplies for military, who transit through the Chicago USO centers, including weekly graduates from the US Navy’s boot camp at Great Lakes and transiting troops who may be en route to or returning from deployments at locations across the globe. Training and education resources At the in-booth Technology Center, visitors can explore the: Customer Support App center, where attendees can view interactive videos, chat with technicians and review troubleshooting resources. BILT app kiosk, which showcases easy-to-use 3D installation instructions for ASSA ABLOY products. ASSA ABLOY Academy for training and education resources. Openings StudioTM kiosk, where attendees can preview integrative BIM software tools for designing, building and managing openings that can be used throughout the lifecycle of a building. ASSA ABLOY Group companies will also be onsite, including ABLOY (booth#2523), Ameristar Perimeter Security (booth#1413), HID Global (booth#1503) and Traka (booth#1213).
Linx International Group, a pioneer in the provision of security, risk management, consultancy and training services, will be at booth 1925 at the Global Security Exchange (GSX) 2019 to introduce more than 100 accredited and certified training courses that it has developed. The company will also premier a new range of Bitesize courses, launched in English, Spanish and French. GSX 2019 takes place 8-12 September at McCormick Place in Chicago, Illinois. Impressive track record More than 100 accredited and certified technical and non-technical courses will be available More than 100 accredited and certified technical and non-technical courses will be available, from entry level through to its pioneering masters degree in International Security and Risk Management. Each classroom, eLearning and blended course is devised, designed and taught by subject matter experts in order to provide high quality, professional training to learners. Every security officer, installer, integrator, architect, specifier, engineer, consultant and end-user visiting GSX 2019 will find training courses to suit them on the Linx International Group booth (1925). The Linx International Group also boasts an impressive track record helping security practitioners all around the world to attain their ASIS Physical Security Professional (PSP®) and Certified Protection Professional (CPP®) qualifications. Director of Sales and Marketing at the Linx International Group, Sarah Hayward AAP, is a member of the ASIS UK Young Professionals Committee and recently achieved its Associate Protection Professional (APP) qualification. Raise security knowledge Sarah comments: “Last year 98% of those studying for a PSP® and CPP® qualification with us passed first time. It is testament to the calibre of our tutors, the training they deliver and the hard-work of those studying.” The company has the ambition to raise security knowledge and standards through expert training and education across the globe. In support of this aim, the Linx International Group will be premiering a range of new Bitesize eLearning courses that are now available in English, Spanish and French. Sarah adds: “Whether you are in the U.S, Central or South America, Europe or Africa, you can now access our affordable world-class training.”
Allied Universal, global security and facility services company in North America, has recently announced a broad array of new all-inclusive capabilities and divisions, which will be showcased at the Global Security Exchange (GSX) conference (Booth #523) slated for September 8 – 12 at Chicago’s McCormick Place. Allied Universal recently launched HELIAUS, an advanced artificial intelligence platform, and announced new divisions such as Allied Universal Technology Services, Allied Universal Risk Advisory and Consulting Services, and Allied Universal Event Services. Allied Universal Smart Services “We are proud to be ahead of the curve in a rapidly evolving industry by delivering all-encompassing capabilities to our clients with the ultimate goal of providing top-notch security services,” said Steve Jones, CEO of Allied Universal. “Our tech solutions are the most highly advanced, comprehensive and integrated in the security industry.” For more than 60 years, Allied Universal has been offering manned guarding services that include armed and cleared security professionals, vehicle patrol, visitor management/concierge, K-9 services and guarded touring and management software. HELIAUS advanced AI platform HELIAUS focuses on creating an ecosystem around the company’s manned guarding security services" HELIAUS: The Power of Insight into Action - “HELIAUS focuses on creating an ecosystem around the company’s manned guarding security services that brings together rich data and advanced artificial intelligence to predict not only what's going to happen but to give recommendations on how to prevent it from happening and drive better outcomes,” said Mark Mullison, CIO of Allied Universal. “The sophisticated location-aware workflow engine ensures that these recommendations are acted upon.” “Allied Universal Technology Services offers clients electronic access control, video surveillance, fire/life safety, alarm monitoring, emergency communications, technological threat management and response, and other smart tech innovative solutions, including a broad array of hosted /managed services via Allied Universal’s Monitoring and Response Center (MaRC), and the Global Security Operating Center (GSOC-as-a-Service),” said Carey Boethel, President, Allied Universal Technology Services. Risk assessment and prevention Allied Universal Risk Advisory & Consulting Services – “We have combined risk assessment, prevention, and investigative practices, developed over more than four decades, with the extensive experience and knowledge of industry-leading consultants into a centralized practice with strategic focus on reducing risk,” said Ty Richmond, President, Allied Universal Risk Advisory & Consulting Services. “We help customers determine where and when risk is most likely to turn into threat and the most effective means to combat threat—arming organizations with the knowledge to make critical business decisions that ensure better risk management outcomes. We also have a network of more than 10,000 armed and unarmed high-level off-duty officers located throughout the country to respond to any threat, disaster or emergency.” Single-source security solution Allied Universal Event Services is a single-source solution for staffing, consulting and security for all events"Allied Universal Event Services - “Allied Universal Event Services is a single-source solution for everything from temporary staffing, consulting and security for all events,” said Steve Claton, President, Allied Universal Event Services. “Our event services team has a successful formula for addressing convention and trade show's complex challenges from a security and staffing perspective. “ Allied Universal is proud to present sessions at GSX 2019 which include: Brent O’Bryan, Vice President of Training & Development is scheduled to be on the following panel: "Are the Lines Blurred? Transforming the Human Factor“ on Tuesday, September 10 from 11AM to 12:20 PM, Location: X Learning - X1 - Booth 3601. Paul Caruso, Vice President, is scheduled to present a session, titled “Balancing Culture Against Control,” with Keith Moser, Manager of Security Operations, Housing and Residential Services, Massachusetts Institute of Technology, on Tuesday, September 10 from 11 a.m. to 12:15 p.m., Room S403 A Brent O’Bryan, Vice President of Training & Development will discuss “How to Use Emotional Intelligence to Build a World-class Security Presence” on Wednesday, September 11 from 3:45 to 4:45 p.m., Room S405 B Mark Mullison, CIO will discuss The Change Driver: AI on Wednesday, September 11 from 11:30 to 11:45 AM, Expo Floor/X Stages. Paul Caruso, Vice President, will discuss “On the Witness Stand,” with Kevin Davis, CPP, Assistant Director of Public Safety, Harding University, on Wednesday, September 11 from 2:15 to 3:15 p.m., Room S404 D. Caress Kennedy, CPP, Regional President, Northeast Region, is scheduled to participate on a panel discussion titled “ASIS Certifications and Your Career” on Wednesday, September 11 from 12:45 to 1:45 p.m., ASIS Career HQ - Booth 2115.
Eagle Eye Networks unveiled enhancements to the Eagle Eye Cloud VMS supporting 15 additional third-party mobile and body worn cameras. The Eagle Eye VMS provides simultaneous operations, search, and cloud storage for fixed and mobile cameras. Managing and retrieving body-worn camera video has historically been a separate process from the primary video surveillance system. With Eagle Eye this can now be an integrated and cohesive process that requires less training, is more secure, and more reliable. The Eagle Eye mobile and body worn camera system includes: Viewing mobile and fixed camera footage in one cohesive interface eliminating the need for multiple applications. Archiving, storage, and retrieval of time-stamped mobile footage with GPS coordinates and tracking. Secure sharing of video via mp4 files or direct links to interested parties. Open platform that provides compatibility with a broad array of cameras. Unlimited video analytics from partners It's been proven repeatedly that open systems architectures win over proprietary systems" Today, Eagle Eye Networks provides support for over 3,500 mobile and fixed cameras. Access to a True Cloud system meaning virtually unlimited scalability, triple-redundant data center architecture, full encrypted video, and comprehensive cybersecurity. Eagle Eye Networks' open API architecture, Eagle Eye Video API Platform, delivers unlimited video analytics from partners. AI Ready - With video stored in the cloud and open API's, new AI analysis is being continually developed and improved. "It's been proven repeatedly that open systems architectures win over proprietary systems. Eagle Eye Networks believes in open architecture standards and our platform, Eagle Eye Cloud VMS, demonstrates this. Extending our platform to encompass mobile cameras is a logical extension of our open camera platform. Our open platform ability to integrate third-party AI and Analytics is delivering on a broad set of applications for our customers," said Dean Drako, CEO of Eagle Eye Networks. Eagle Eye Networks customers have desired integration of mobile and fixed camera surveillance to reduce risk in commercial industries: in-home services, retail, guarding, commercial delivery services, real estate sales, and other service-oriented verticals. The mobile camera video and GPS data will be securely transferred to the Eagle Eye Cloud Data Center where video footage can be reviewed, analyzed and stored.
The extensive analysis and discussion preceding any decision to implement a new physical security solution – whether it’s hardware, software or a combination of both – often focuses on technology, ROI and effectiveness. When it comes to deciding what type of security entrances to install at your facility, you will almost certainly also consider the aesthetics of the product, along with throughput and, if you’re smart, you’ll also look into service concerns. Each of these factors has its important place within the evaluation process, and none should be overlooked as they all have a significant effect on how well your entrances will perform once they are installed. Culture Influences Door Solution Decisions How significant will the change from current entrances to security entrances be for employees? Still, one additional factor actually trumps everything: if you have not considered your organization’s culture in choosing a security entrance, you may be missing the most important piece of the puzzle. Culture is a part of every other decision factor when selecting an entry solution. Before you make a decision about what type of entrance to deploy, you need to consider and understand the values, environment and personality of your organization and personnel. For example, how significant will the change from current entrances to security entrances be for employees? If people are accustomed to simply walking through a standard swinging door with no access control, this will be a culture change. Beyond this, whether you are considering a type of turnstile, a security revolving door or possibly a mantrap portal, simply walking through it will be a significant change as well. Training Employees On Door Security You’ll want to know whether employees have ever used security entrances before. If these types of entrances are in place in another part of the facility, or in a facility they’ve worked in at an earlier time, the adjustment will not be as great as if they’ve never used them at all. Consider, too, how your personnel typically react to changes like this in the organization or at your facility. They may be quite adaptable, in which case there will be less work to do in advance to prepare them. However, the opposite may also be true, which will require you to take meaningful steps in order to achieve buy-in and train employees to properly use the new entrances. With the increased importance of workplace security, discussing new entrances with workforces will help maintain a safer environment Communicate Through The Decision-Making Process All of this will need to be communicated to your staff, of course. There are a number of ways to disseminate information without it appearing to come down as a dictate. Your personnel are a community, so news about changes should be shared rather than simply decreed. As part of this process, you’ll need to give some thought to the level of involvement you want for your staff in the decision-making process. Finally, do not overlook the special needs among your personnel population. You undoubtedly have older individuals on staff, as well as disabled persons and others who bring service animals to the office. Entrances need to be accessible to all, and you never want to be in the position of having a gap in accessibility pointed out to you by the individual who has been adversely affected. New Security Entrance Installation By communicating early and often with your personnel, you can alleviate a great deal of the anxiety Once you have made the decision about which security entrances to install, training your personnel on how to use the new security entrances – both before and after the installation – will help to smooth the transition. Because workplace security is such a big issue right now, it makes sense to discuss the new entrances in the context of helping to maintain a safer environment. They will prevent violent individuals from entering, decrease theft, and most of all, promote greater peace of mind during the workday. If you can help them take control of their own safety in a responsible way, you have achieved much more than just a compliant workforce. By communicating early and often with your personnel, you can alleviate a great deal of the anxiety and concern that surrounds a significant change in the work environment. Schedule Group Meetings Consider your employees; what type of communications do they respond best to? A few suggestions to educate staff on the benefits of the new entrances include: Typically, you would communicate a general message 2-3 months in advance and then provide more specific information (for example, impacts to fire egress, using certain entrances during construction) in a follow up message closer to the installation date. Schedule group meetings to: announce the rationale for increased security, share statistics on crime, review the new security changes that are coming, show drawings/photos of the new doors/turnstiles, and show the orientation videos available from the manufacturer. These meetings are an excellent way to work through user questions and directly address any concerns. Once the installation of a new security system is complete, it is a good idea to have an "ambassador" on board to help employees use these new systems Ensure You Monitor Public Areas If you are implementing a lot of new changes, such as a new access control system, new guard service and security entrances, you might consider hosting a ‘security fair’ on a given day and have the selected vendors come for a day with tabletop displays to meet employees and answer questions during their lunch. This could be a great way to break the ice in a large organization. Make user orientation videos (provided by the manufacturer) available in several ways, for example: Intranet Site Monitors in public areas—lounges, cafeteria, hallways, etc. Send to all staff as email attachments Immediately after installation, once the doors or turnstiles are operational but before they are put into service, train ‘ambassadors’ on how to use the door/turnstile. Have these people monitor and assist employees during peak traffic times. What Is The Ultimate Success Of The Installation? By communicating clearly and openly with your population you can greatly facilitate adoption and satisfaction If you have thousands of employees, consider dividing them into groups and introduce the new entrance to one group at a time (Group A on Monday, Group B on Tuesday, etc.) to allow a little extra orientation time. Place user education ‘quick steps’ posters next to the door/turnstiles for a few weeks to help employees remember the basic steps and guidelines, e.g., ‘stand in front of the turnstile, swipe badge, wait for green light, proceed.’ Ask your manufacturer to provide these or artwork. While there are always going to be people who are resistant to change, by communicating clearly and openly with your population you can greatly facilitate adoption and satisfaction. Your responsiveness to any issues and complaints that arise during and after the implementation is equally fundamental to the ultimate success of the installation.
There’s only so much a corporation can do to counteract the threat of a major incident. You can ask everyone to be vigilant and to report anything suspicious, but you cannot stop someone intent on deliberately starting a fire, threatening a work colleague with a knife or something much worse. And of course, most businesses recognize that even routine events – such as burst pipes, IT system failures, extreme weather event or power outages – can have significant consequences unless they are quickly brought under control. Training Security Officers Governments and organizations across the world are increasingly encouraging businesses to re-assess risks and to plan for and conduct drills for major emergencies. This is driving different agencies and companies to invest in new skills, resources and systems, and encouraging businesses to routinely re-evaluate their emergency response strategies. UK police forces are increasingly training security officers in the public and private sectors on how best to react to potential terrorist incidents For example: UK police forces are increasingly training security officers in the public and private sectors on how best to react to potential terrorist incidents, as part of the UK government’s Action Counter Terrorism program. And organizations including the Association of University Chief Security Officers (AUCSO) and Higher Education Business Continuity Network (HEBCoN) are developing customized training for their members to improve their own response and business continuity plans. Mass Notifications Systems Whether an organization is facing a terrorist attack or a severe weather event, follow up reports consistently identify that the same types of challenges are common to all crisis situations, with similar errors often occurring again and again. Typically, these are centered on three key areas: poor communications, fractured command and control structures, and delayed deployment of resources. Communications skills and technologies clearly play a pivotal role in how effective an organization is in responding to major incidents, particularly when it comes to assessing the situation and its implications, moving people towards safety and providing updates as an incident unfolds. However, when an organization is considering its technology options, emergency response and mass notification systems (MNS) are often touted as the ideal platform to deliver all the required critical communications and ongoing updates. UK police forces are increasingly training security officers in the public and private sectors on how best to react to potential terrorist incidents Emergency Notification System All the incident reporting, command and control, and communications functions have been brought together on a single platform But, if an organization does not know exactly where all its staff or students are, and it cannot see the location and availability of its first responders and other emergency coordinators relative to them and the incident, then how useful is it to send a top-down alert to everyone? And what about fast moving or multi-centre incidents, where previously agreed evacuation procedures, recommended actions or mustering points may need to change if an incident takes an unexpected turn? Many organizations may have been lulled into believing that an emergency notification system will allow them to confidently handle all the communications aspects of virtually any crisis. In reality, too many businesses are still unaware that there are now much more sophisticated and proven technologies where all the incident reporting, command and control, and communications functions have been brought together on a single platform. Using Live Map Tracking The benefit of using these advanced and more integrated approaches – often categorized as mobile distributed command and control systems – is that they enable faster and better decision making in a crisis using real-time feedback and two-way dialogue with those closest to the emergency. And they avoid the risks of any potential delays, miscommunications or mistakes that can happen when an organization is under pressure to respond and often switching between multiple systems. Leading universities and multi-national corporations are already using new mobile/web-enabled platforms to improve their incident response These next generation emergency management platforms have been specifically designed to enable real-time mapping of an organization’s security assets and its users on a single screen and to fully integrate it with a highly targeted geo-fenced notification capability. The mass notification aspect of the system can then be used to advise specific groups on the best actions to take at their location as an incident develops. The use of live map tracking enables real time mapping of an organisation's security assets Segmented Messaging Many leading universities and multi-national corporations are already using these new mobile/web-enabled platforms to plan, manage and improve their incident response, leading to 50% faster reactions and more positive outcomes.During a crisis, users can receive push notifications so the security centre can immediately see their exact location and advise them accordingly The systems have been widely adopted within the higher-education sector, but they are equally applicable to any large company with multiple international sites or those situated in research or corporate campuses where the bulk of assets and people are based in one or more key locations. Typically, systems provide users with a smartphone app that they can use to call for immediate emergency or first aid support when at work, or to report something suspicious which could prevent an apparently minor incident from escalating into a full-scale emergency. During a crisis, users can receive push notifications, SMS and E-mails asking them to open the app if they are not already logged in, so the security center can immediately see their exact location and advise them accordingly. Supporting Dispersed Mustering Now that communications can be more nimble, responsive and flexible this can support the increasing numbers of planners are recognizing the advantages of dispersed mustering. This is a strategy that has been developed to reduce the risk of secondary attacks on unprotected people complying with instructions to evacuate from premises and gather in what are, effectively, exposed locations. It is now acknowledged that evacuees waiting outside for any length of time are more vulnerable to targeted attacks or to injury, from flying glass for example. With dispersed mustering – a strategy made more effective by these new mobile distributed command and control systems - a building’s occupants can be advised not to go outside, but to move to known safe internal locations. People in each specific area can then be kept regularly updated. Many corporations are now using new mobile/web-enabled platforms to improve their incident response Coordination Between Response Agencies The software platforms can be integrated with an organization’s fixed security infrastructure to take real-time sharing of information First responders are permanently logged in, so the emergency operations center can see their exact locations in real-time and can advise what actions to take in mustering people or in setting up and protecting security cordons. Bringing everything together on one platform, with real-time feedback and in a fully integrated system also removes what is often seen as the weakest communication link in managing any major incident: the need to rely on conventional two-way radio as the sole means of communication between the command and control center and its first responders and other team members on the ground. The software platforms can be integrated with an organization’s fixed security infrastructure to take real-time sharing of information to a new level for improved collaboration, coordination and communications between users, the incident management team and external agencies. Improving Emergency Response Strategies One of the most powerful features of some of these new systems is the ability to record and view all alerts, responses and the detailed conversations between first responders, emergency coordinators and other parties. This allows the systems to be used to simulate major incidents involving inputs from the emergency services and other key agencies and to ensure the organization’s crisis management plans have been fully tested against a range of possible incident scenarios.
Whether you are a veteran in the access control world or have never installed a card reader before, there are always ways to increase profits in the ever-evolving world of access control. The hope is that by considering a few key focal points, you can find ways to increase market share. Whether we are releasing an electronic lock through a simple intercom button or using biometric and multi-authentication based on a database; the tactics for bringing on more revenue is the same. Learning to focus on a few key items can help open up opportunities. Business Access Controls Understanding vertical markets is a strong strategy for success in increasing your profits with access controlIf you are new to access control, it’s important to determine the right product offerings for your business model and experience level of your team. Mistakes in estimating or installing can be costly and complex. Take advantage of manufacturer training both online and in the classroom for both your sales team and installation department. It’s important to understand the fire and building codes in your area to make sure you design the proper solution for your customers. Furthermore, understanding the products, components and proper wiring can save you money in labor and materials. Today we will look at four focus points: Vertical Markets, Cloud-Based Access Control, Technology Upgrades, and Preventative Maintenance and Service Agreements. These four focal points are simple to implement and can be easily added to your current operation. Vertical Markets Understanding vertical markets is a strong strategy for success in increasing your profits with access control. The concept is that understanding a certain vertical and their security needs can increase your sales team’s marketability. If you spend your time focusing on the healthcare industry, for instance, you will see that HIPA requirements open doors for selling access control. Getting to know the regulatory concerns of different verticals is a great strategy for more effective salesHaving logs of who entered your HR files room or patient records storage is a crucial part of addressing privacy concerns. Getting to know the regulatory concerns of different verticals is a great strategy for more effective sales. Another example could be apartment communities or other multifamily dwellings. In this competitive marketplace, these complexes are looking for ways to stand out in their market. Knowing this and being able to offer amenities like secured locks with Bluetooth credentials that tenants can open with their smartphones is a selling point for you and for your customer. Building on each customer you contact within a vertical is like free sales and marketing training. The more you learn from each potential client, the more you increase your conversation starters for the next potential client. Cloud-Based Access Control With the growing cloud-based access control market, integrators can find more opportunities in small businesses and vertical markets that typically wouldn’t be on the radar of your sales team. A typical card access system often makes the move from the traditional lock and key systems to electronic card access cost prohibitive. This is due to the large upfront costs for a server, software and annual licensing. With cloud access, integrators can offer less expensive upfront costs with low monthly subscription fees that cover all software updates, database backups, security patches and more. The real benefit for the integrator is the reoccurring revenue. By helping our clients save money on server, software and IT infrastructure costs, we are securing reoccurring revenue for our companies that increase our profitability. Building reoccurring revenue not only provides cash flow but also keeps your name on the top of the minds of your customer and that leads to additional sales. By helping clients save money on server, software and IT infrastructure costs, we are securing reoccurring revenue for companies that increase profitability Technology Upgrades Another often overlooked opportunity is technology upgrades. Training your sales staff and even service technicians to watch out for clients with older technology can reap major benefits. When you bring new technology to your clients, you show another value that you bring to the table. Even if your client isn’t ready to make an upgrade, you can easily plant a seed that will get their minds and budgets rolling. An easy example is a customer with an older intercom door access system An easy example is a customer with an older intercom door access system. This may have met their needs 10 years ago when it was installed, but the office has grown and perhaps an integrated card access intercom system is a great technology upgrade. Bringing this to the customer will once again show that you are the “subject matter expert” and your customer will be more apt to refer you to their friends and colleagues. Another easy way to find technology upgrades is to dig through your ageing client list and build a list of potential targets that you have not visited lately. If you keep records of what was installed previously, it will make it easier to plan ahead and bring solutions to your next visit, saving your sales staff time and again building confidence with your clients. Preventive Maintenance And Service Agreements One thing that sales teams often miss is the opportunity to add service agreements and preventative maintenance agreements. Even if a customer already has an access control system, they may not have a service provider and may be interested in securing a service agreement. Typically, a service agreement can be written to cover all parts and labor or just labor for an annual feeShowing the value of a service agreement is paramount, adding annual or semi-annual preventative maintenance to your service agreement is one way to add value. Inspecting locking mechanisms, request to exit motions and buttons, door status switches, headend equipment, batteries and power supplies, can save your customer from a costly after-hours service call or the inconvenience of a non-functioning access control system during business hours. Additionally, checking computer hardware and software logs for errors can save a customer from a catastrophic failure. Typically, a service agreement can be written to cover all parts and labor or just labor for an annual fee. It is helpful to come up with a percentage of the install value that makes sense so that your sales team can easily quote a service agreement for your customer. Offering several levels of service also opens the table for negotiations. You can offer an “all parts and labor 24/7” or a “parts and labor M-F 8AM-4PM”, as an example. Offering guaranteed response times can also be a marketing strategy. Critical Area Access Management Checking computer hardware and software logs for errors can save a customer from a catastrophic failureA 24-7 facility that has 200 employees moving in and out of critical areas may be a great potential customer for a high-level service agreement with semi-annual preventative maintenance and a guaranteed 4-hour response time. Where a small office that is only open during standard business hours may be better suited for a labor only M-F with annual preventative maintenance inspection. The point is that a creative, intentional, and focused approach to access control can yield the fruit that brings long-term success to your team. Building a plan and learning from each prospect, sale, and installation will develop a process that brings results. Attending a trade specific expo like ESX will give you the opportunity to meet with manufacturers and other integrators that can help you implement a product offering and strategy for success.
While security salesmen are touting megapixels and anti-passback features, they are missing an opportunity to communicate the role of technology in the broader context of risk management and incident response – and in saving lives. That’s the message of Gerald Wilkins, PSP, Vice President of Active Risk Survival. Incident response is at the core of how an enterprise reacts to risk and is a standardized approach to the command, control, and coordination of emergency response. Effective incident response requires integrating a combination of facilities, equipment, personnel, procedures, and communications operating within a common organizational structure. All the elements must work together to achieve the desired outcome – to mitigate a risk using countermeasures. Capabilities of systems during emergencies I want to see us have more meaningful conversations with security directors and emergency operations planners"Equipment such as CCTV, access control and mass notification systems can provide effective countermeasures, but salesmen in the physical security market are not ‘connecting the dots’ between equipment specifications and its capabilities as part of the broader incident command system. “Historically, purchases of security technologies have not been considered in that context,” says Wilkins. “Rather, the industry’s sales pitches have been about features and capabilities – pixels or communication distances or intelligence – not about how those capabilities are useful in the specific context of emergency response.” “My goal is to change the industry,” says Wilkins. “I want to see us have more meaningful conversations with security directors and emergency operations planners.” Focusing on the Emergency Operations Plan “We are in the life safety business, and we need to have more conversations about where technology fits into the Emergency Operations Plan (EOP). When was the last time you [as a security salesman] asked a client to look at their Emergency Operations Plan? No one knows the technology better than we do.” What’s missing, however, is attention to how technology is applied to risk management and response“There are so many folks in our industry who are technology gurus, who ‘get’ the technology, and are good at selling it,” he says. What’s missing, however, is attention to how technology is applied to risk management and response. “As an industry, even guys who have been in the business a long time have never heard about incident command,” says Wilkins. “How are we weaponizing technology to maximize the outcome? We don’t talk about it. We want to talk about megapixels and wide dynamic range. But when are we going to talk about how we can apply that technology to mitigate our tangible and intangible risks?” Importance of security equipment In the wake of each active shooter or other incident in the news, Wilkins looks back to consider the missed opportunities and how security equipment could have saved lives. “What technology did we have to help first responders – video, access control and paging – but they weren’t used?” he asks. An example is the San Bernandino shooting in 2015, when police officers were heard asking “has anybody found that access control card?” In effect, a law enforcement officer was asking for technology that should have been included as part of the emergency plan. Situational awareness, such as that provided by video systems, can help responders judge which areas are safe fasterSituational awareness, such as that provided by video systems, can help responders judge which areas are safe faster and provide Emergency Medical Services (EMS) personnel more time to save lives. However, video is not being viewed in that light as a part of the broader life-saving mission. “Our industry needs to sit down with a security director or operations manager and ask: How are you using technology as a resource tool that will become part of your critical response?” says Wilkins. Understanding how equipment works Technology is often not being incorporated in emergency planning, even with something as simple as a fire drill. Most fire drills are ‘one size fits all’ – every person knows where they should go and how they should exit. But what if there is a fire in a particular part of the building? Today’s fire alarms operate in zones to communicate the location of a fire, but this capability is not being used to practice a variety of resulting scenarios that could save lives. “We need to understand as an industry how our partners in law enforcement and EMS do their jobs,” says Wilkins. “We can help stakeholders in a building understand how our equipment works every day and how they can use it in a critical incident. We need to understand Emergency Operations Plans (EOPs), how incident command works, and how we can help emergency responders.” Security training for salespeople I want to know everything I can know to help guys sell things that can change the outcome if something bad happens"“If a guy wants to talk about his pixels or his anti-passback, he should instead consider having a meaningful conversation with the client about best practices and how to mitigate risk. This creates a different position [for the salesman], and if there is a critical incident, something you said or did might save someone’s life.” When it comes to training and taking a more strategic approach to sales, to some extent, the security technology industry has been a victim of its own success. When business is good, security companies are less likely to look for ways to train their salespeople. “We’re in the life safety business, not in the ‘stuff’ business,” says Wilkins. “I want to know everything I can know to help guys sell things that can actually change the outcome if something bad happens.” Another problem is “we don’t know what we don’t know.”
When it comes to emergency planning and response, there is an abundance of resources to help enterprises prepare to mitigate the impact of an incident. The U.S. Federal Emergency Management Agency (FEMA) has devised the National Incident Management System (NIMS), aimed at defining and standardizing ways that resources can be used to manage and respond to an incident. An enterprise’s Emergency Operations Plan, or EOP, incorporates NIMS concepts and spells out what to do in an emergency. Security equipment purchases But how does an EOP relate to security equipment purchases? In the language of FEMA, enterprises should ask themselves: How do I currently ‘resource type’ my electronic countermeasures as part of my critical incident response plan? In FEMA parlance, ‘resource typing’ is categorizing resources according to capability using FEMA’s ‘Typing Library Tool’. The tool identifies technologies that can improve response. Technology purchases should be considered in the context of their role in the larger plan, says Jerry Wilkins, PSP, Vice President of Active Risk Survival. “Currently, that doesn’t happen, and we as an industry do not even speak in the same language as those who guide emergency responses to which security equipment can be a useful contributor,” Wilkins says. The National Incident Management System is aimed at defining and standardizing ways that resources can be used to manage and respond to an incident Wilkins speaks with authority based on a long career in the industry. Beyond his experience working in burglar alarms, home security, and as a manufacturer’s rep, Wilkins has expanded his expertise to the broader categories of incident command, emergency response and law enforcement. He has received FEMA IS-0100 (incident command training) and has sought to apply it to critical incidents, active shooters and other emergency situations. He has attended Solo Engagement Operator Training (SWAT school) and Tactical Emergency Casualty Care (TECC) military training. Responding to emergencies As a student in a broad array of disciplines, Wilkins has sought to engage the security technology industry in an important conversation: What can we do as an industry to apply technical capabilities to the question of how to respond to an emergency? Adherence to best practices can help to avoid liability – and save lives For example, CCTV is a valuable tool for situational awareness, but it wasn’t deployed in the aftermath of the Parkland, Florida, school shooting in 2018 until 24 minutes into the incident. “By the time they decided to use the video, [the shooter] was already gone. They had 15 high-definition cameras, but they did not know how to use the technology for situational awareness because it was not part of the Emergency Operations Plan. They could have known every move [the shooter] made if the technology had been part of the EOP,” says Wilkins. Here is another example from the Parkland shooting incident response. When responding to an incident, Emergency Medical Service (EMS) typically divides a site into three levels – hot zones, warm zones, and cold zones – based on danger levels. In the Parkland shooting, the 1200 building went ‘cold’ – meaning it was safe – as soon as the shooter left the building. But it was 58 minutes before they called it a ‘cold’ zone, thus delaying survivors’ access to emergency care that could have saved lives. Better situational awareness, provided by leveraging CCTV, would have made the difference. If OSHA puts out a white paper on how to protect a facility and you don’t do it and have an event occur, how does that look?" There are a number of other available standards, processes and other documents to guide emergency response. Adherence to best practices can help to avoid liability – and save lives. Ignoring known and well-documented best practices can leave an enterprise vulnerable in the aftermath of an incident. Understanding these principles and best practices can help security equipment companies understand how the benefits of their products can be maximized in this context. Here are some available resources: NFPA 3000, a 42-page provisional standard for responding to an active shooter, addresses all aspects of the process, from identifying hazards and assessing vulnerability to planning, resource management, incident management at a command level, competencies for first responders, and recovery. National Association of School Resource Officers (NASRO) has created Standards and Best Practices for School Resource Officer Programs. PASS (Partner Alliance for Safer Schools) has compiled School Safety and Security Guidelines and a School Security Checklist. Federal Bureau of Investigation (FBI) has released ‘Making Prevention a Reality: Identifying, Assessing and Managing the Threat of Targeted Attacks’. Department of Homeland Security (DHS) has released ‘Planning and Response to an Active Shooter: An Interagency Security Committee Policy and Best Practices Guide’. U.S. Secret Service has released ‘Enhancing School Safety Using a Threat Assessment Model: An Operational Guide for Preventing Targeted School Violence’. OSHA 3148 provides policy guidance and procedures to be followed related to occupational exposure to workplace violence. (OSHA is the Occupational Safety and Health Administration) OSHA’s ‘general duty’ clause requires that each employer furnish to each of its employees a workplace that is free from recognized hazards that are causing or likely to cause death or serious physical harm. “If OSHA puts out a white paper on how to protect a facility and you don’t do it and have an event occur, how does that look?” says Wilkins. “It’s regulatory guidance that you could have followed but didn’t.”
The threat of drones is a growing concern around the perimeter and in the airspace surrounding airports. According to a UK Airprox Board report, the number of times a drone endangered the safety of an aircraft in the UK airspace rose more than a third in 2018 compared to the year before. The highest-profile recent drone incident was at UK’s Gatwick Airport, where a drone sighting last December triggered a three-day shutdown of the UK’s second busiest airport, disrupted the travel plans of 140,000 people and affected 1,000 flights. Unauthorized drone activity And there have been other recent incidents of drone disruptions at airports: At Heathrow Airport in January 2019, flights were temporarily stopped for about an hour ‘as a precautionary measure’ after a drone was reported. The UK Airprox Board recorded 39 dangerously close drone encounters at Heathrow in 2018. In the U.S., flights into Newark Liberty International Airport were disrupted for about 90 minutes in January after a drone sighting. Dubai International Airport, the world’s busiest for international travel, closed its airspace for about 30 minutes in February due to suspected unauthorized drone activity. In March and again in May, air traffic at Frankfurt Airport in Germany was grounded due to drone sightings – for about 30 minutes in the first instance and about an hour in the second. Drone detection systems Security has a role in preventing drone incidents, although pilots often report themSecurity has a role in preventing drone incidents, although pilots often report them. At Gatwick, the initial reports of a drone over the airfield came from airport security officers. After the incident, the UK government rushed through legislation to enlarge the drone exclusion zones around airports to a maximum of 5 km (up from the previous 1 km). In the U.S., the exclusion zone around airports is a radius of about 5 miles, and even more in sensitive areas such as the National Capital Region around Ronald Reagan Washington National Airport, where restrictions are 15 to 30 miles. Airports in the U.S. are allowed to deploy drone detection systems but may not use counterdrone technology (such as shooting down the drones), which is reserved for the Justice Department and Homeland Security. Dedicated new technology “News that drone threats to aircraft are increasing should come as no surprise,” says Simon Barnes, Business Development Manager – Airports Europe for Genetec. “Recent reported incidents are just the tip of the iceberg. As drones become increasingly ubiquitous – both from hobbyists and their growing use in professional arenas – we can expect to see many more incidents.” From speaking to airports across the world, Barnes has learned that two of the most pressing challenges they face are how they secure their perimeters (as intruders become increasingly sophisticated) and identifying ‘Friend from Foe’ as operational needs must be maintained. “When it specifically comes to drone detection, the short-term temptation can be to introduce a dedicated new technology to address this specific threat,” he commented. More comprehensive response We need to work with technology, not against it, in order to ensure public safety and security"“However, the last thing a functioning airport needs is an independent system that isn’t unified with all of the other security measures in place. Only when the data from all of these inputs is visualized in one place can an airport begin to make sense of its environment and enable a fast and efficient response to evolving challenges such as the insider threat and malicious drone activities. We fully expect airports to respond to this changing landscape, to help ensure a more comprehensive response.” Philip Avery, Managing Director of Navtech Radar, adds: “In today's current climate of increased national threats, we need to work fast to keep up with modern risks. However, creating new, complicated laws open to misinterpretation or enforcing a complete ban on privately owned drones seem like Luddite solutions that undermine the potential of innovative technology. We need to work with technology, not against it, in order to ensure public safety and security.” Help mitigate risk Navtech Radar sells the AdvanceGuard system for drone detection. Tavcom Training, part of the Linx International Group, has responded to requests from the security industry for expert training in order to be better prepared for and mitigate against the threat of Unmanned Aerial Systems (better known as drones). The company offers a two-day Drone Detection classroom-based course for £375+VAT. Our drone detection course gives security professionals advice from experts" “The responses to the [recent] airport drone attacks were played out in the spotlight, with much public debate regarding the seeming lack of a pre-defined plan of action to prevent or contain such an incident,” explains Sarah Hayward-Turton, Sales and Marketing Director at the Linx International Group. “Our drone detection course gives security professionals advice from experts in drone technology, to help mitigate risk and implement countermeasures to thwart unauthorized drone activity.” The course will be offered again in November 2019 and in February 2020.
Four networked MxPro 5 fire panels from global systems provider, Advanced, are now protecting one of Serbia’s most prestigious higher education facilities. The project at the University of Belgrade’s School of Electrical Engineering, involved installing a fire system to reliably protect lives and property while respecting the value and authenticity of its 1920s features. This meant overcoming various problems presented by outdated construction methods, inaccessible areas and high ceilings. 4-loop and 1-loop MxPro 5 fire panels Advanced’s partner in Serbia, TVI Ltd, was responsible for the design, installation, commissioning of the project Thanks to their performance, quality and ease of use, a network of three of Advanced’s 4-loop and one of its 1-loop MxPro 5 fire panels, including over 1000 Argus detectors, were chose to protect the entirety of this top educational and scientific institution, including the facilities of Civil Design, Mechanical and Electrical Engineering. Advanced’s local partner in Serbia, TVI Ltd, was responsible for the design, installation and commissioning of the project. Electrical Engineer, Radomir Kerkez, at TVI Ltd, said, “The flexibility of Advanced’s fire panels to adapt to sites both large and small is what makes us choose them time and time again. Advanced products make even the most complex installation challenges straightforward and we can always rely on them to deliver complete protection.” Multiprotocol fire system solution MxPro 5 is a renowned multiprotocol fire system solution and was recently certified to the EN 54 standard by FM (Factory Mutual). It offers customers a choice of two panel ranges, four detector protocols and a completely open installer network, backed up by free training and support. MxPro panels can be used in single-loop, single-panel format or easily configured into high-speed, multi-loop networks of up to 200 nodes covering huge areas. MxPro’s legendary ease of installation and configuration plus wide peripheral range, make it customizable to almost any application. Building fire safety Our fire systems offer many ways to meet the challenges of protecting a building’s heritage"Vladimir Zrnic, Advanced’s Regional Sales Manager for Southern Europe, said, “Our fire systems offer many ways to meet the challenges of protecting a building’s heritage features while providing robust and reliable fire protection. It is great to see that potential put into practice in yet another successful and prestigious site.” Advanced, owned by FTSE 100 company - Halma PLC, has a long history of protecting some of Europe’s most notable and prestigious buildings, including Athens’ Stavros Niarchos Foundation Cultural Center, Istanbul’s Hagia Sophia and Sofia’s Sofia University. Intelligent fire systems firm Advanced is a globally renowned company in the development and manufacture of intelligent fire systems. The legendary performance, quality and ease-of-use of its products see Advanced specified in locations all over the world, from single-panel installations to large, multi-site networks. Advanced’s products include complete fire detection systems, multi-protocol fire panels, extinguishing control, fire paging and false alarm management systems.
H-Farm has a strong track record supporting innovation and creativity in European start-ups. The company focuses on skills development, new approaches to education and digital transformation. Its most recent transformation project involved an access control system — for its own offices. H-Farm needed a solution to streamline access management for lots of people at a growing portfolio of sites and buildings. H-Farm experiences rapid turnover of users, both because new businesses join regularly and because they organize up to 300 events every year. Battery-powered locks Any new locks would need to extend an existing Axis system, but without adding complexity for day-to-day administration. To meet their needs, H-Farm selected a combination of Aperio® handles, security locks and escutcheons, each easy to retrofit, so day-to-day work at their busy offices would not be disrupted by intrusive installation. So far, 40 Aperio® Online H100 wireless door handles, 6 Aperio® Online L100 wireless locks and 4 Aperio® Online E100 wireless escutcheons have been fitted across multiple H-Farm locations in northern Italy. All Aperio® battery-powered locks are wireless, so no ugly cabling runs to H-Farm’s doors. Because Aperio® offers wide range of battery-powered devices, H-Farm can choose the precise wireless lock for every application: the L100 lock protects doors with high security demands; robust H100 handles suit interior doors with high traffic. Wireless access control Aperio® H100 enables customers to add doors to their access control solution because cost per door is lower H-Farm interior doors are mostly secured with the new Aperio® H100 wireless handle — Intersec’s Access Control Product of the Year in 2018. The Aperio® H100 packs the flexibility and affordability of Aperio® wireless access control into a slim, cleverly designed door handle. Its standard battery slots inside the handle, ensuring a minimal footprint. ASSA ABLOY’s device design team incorporated electronics into the handle lever on the outside of the door, without jeopardizing security. Design has become a major feature of the H100’s appeal. H-Farm wanted devices to blend with the contemporary architecture of their new €101m H-Campus development. “Aperio® wireless access control hardware is solid, nice looking and perfectly fits our environment — solving our access problem,” says Alberto Aldrigo at H-Farm. The H100 and other Aperio® devices are easy to install; for the H100, basically two screws complete the job. Going forward, this will enable H-Farm to quickly bring new buildings into the same access system as they expand to fresh locations. The H100 fits around 90% of target doors with two main models: one for left-handled doors, the other right-handed. “The Aperio® H100 also enables customers to add more doors to their access control solution because the cost per door is lower,” says Tania Amico, Aperio® Sales Manager at ASSA ABLOY Italy. Seamless integration H-Farm managers want to control access to site doors, or bring entirely new premises into their access system The open architecture underpinning Aperio® devices enabled easy online integration with their existing Axis system via PRYSM AppControl. Remote operation from a single, central software interface is seamless, which makes administering the system easy. “The PRYSM AppControl software utilizes the integration Axis completed with Aperio®,” says Piergianni Marana, Key Account Manager at Axis. “And the AXIS A1001 Door Controller is based on open hardware, which makes installing and configuring an Aperio® wireless lock easy and seamless.” An Aperio® RS-485 Hub coordinates up to 8 Aperio® locks within a typical range of 15 to 25 meters, communicating with the admin system via the powerful AXIS A1001 IP Network Controller. One AXIS A1001 Door Controller can manage one wired door and one Aperio® hub, up to 9 doors per hub. AES 128-bit encryption ensures communication between lock and system is secure. Online Aperio® integration gives facility managers real-time status information about their premises. Aperio® locks are wireless, so there was no expensive or time-consuming cabling. The AXIS A1001 uses Power over Ethernet (PoE), which eliminates the need for power cables to the controllers, too. If needs change at a facility — perhaps H-Farm managers want to control access to more site doors, or bring entirely new premises into their access system — it’s quick, efficient and easy for an installer to fit Aperio® locks and integrate the doors with the AXIS Entry Manager control panel. To discover whether your existing security system is ready for wireless Aperio® locks, download a free, fast Compatibility Checker at https://campaigns.assaabloyopeningsolutions.eu/aperio-upgrade
Leon Medical Centers is a privately-owned healthcare organization with seven state-of-the-art facilities serving over 46,000 elderly and Medicare patients in Miami and neighboring communities in Dade County, Florida. Established in 1996 by Benjamin Leon Jr., Leon Medical Centers is one of the largest and most prestigious primary healthcare organizations in the state. However, what really sets it apart is its rigorously enforced service philosophy of ‘personal attention at all times’ and its commitment to treating its patients with the ‘dignity, respect, compassion and human kindness that they deserve.’ Mobile video recorders Leon Medical Centers began deploying previous-generation March Networks mobile video recorders in 2011 In keeping with its commitment to exceptional service, Leon Medical Centers operates a fleet of 230 buses that pick up patients, take them to their appointments and return them home. To ensure their safety in transit and monitor compliance with its service philosophy, it relies on an integrated March Networks® RideSafe™ video surveillance solution. Leon Medical Centers began deploying previous-generation March Networks mobile video recorders in 2011. “We had another vendor’s equipment up to that point, but the system couldn’t support IP video,” said Erick Martinez, Leon Medical Centers’ Security Systems Manager. “At the time, we were using analog cameras and wanted to upgrade to higher definition video. We were also experiencing a lot of issues with hard drive failures.” Hybrid network video recorders In 2014, Martinez began upgrading to RideSafe GT Series Hybrid Network Video Recorders (NVRs), and now has 120 of the new mobile recorders in addition to almost 200 older March Networks mobile DVRs. The RideSafe GT Series recorders are available in 8, 12, 16 or 20-channel models with hybrid capability allowing end users to migrate from 100 percent analog to 100 percent IP video. An embedded Linux-based operating system, ruggedized design offering protection against shock, vibration, dust and moisture, solid state electronics, and internal battery backup make the RideSafe GT Series recorders ideal for reliable operation in punishing mobile conditions. A hard drive mirroring capability ensures redundancy and storage flexibility, while health monitoring proactively alerts system administrators to hard drive failures, irregular temperatures or synching issues with cameras. Safety of our passengers Our patients are elderly, so if there’s a slip and fall incident, we want to have evidence of what happened" Each Leon Medical Centers bus is equipped with six March Networks cameras. Five of the cameras are mounted to capture interior views and the last is used externally to capture video of passenger entry and exit points. “Our focus is on the safety of our passengers,” said Martinez. “Our patients are elderly, so if there’s a slip and fall incident, we want to have evidence of what happened. We also use the system to confirm compliance with our service standards. Our drivers are the first and last points of interaction with our patients, so if there’s an issue, we want to be able to review and rectify it.” In the event of an incident in transit, the driver is able to push a button on the dashboard to tag the associated video. Diagnostic imaging services When the bus arrives at one of the clinics, the tagged video automatically down-loads through a Wi-Fi hotspot to a server for immediate review by Leon Medical Centers risk management personnel. While in range of a Wi-Fi hotspot, the system also downloads health alerts and can also upload any scheduled software updates or new device settings. For routine video downloads, there’s hardly ever a need for Martinez’s staff to board a bus. “Wireless downloading saves us a lot of time,” he said. “It makes incident reporting much more efficient when we need to have an issue resolved. It helps a lot.” The seven Leon Medical Centers are one-stop-shop facilities with onsite labs, pharmacies, diagnostic imaging services and dental clinics. Traveling to multiple locations Leon Medical Centers operates four Healthy Living Centers with modern gyms, exercise and yoga classes This convenient service model enables patients to see their family doctor or a specialist, have blood work done, get an X-ray and fill prescriptions without having to spend time traveling to multiple locations. Each center has a café, where patients can have a coffee and socialize. And to help patients stay fit, Leon Medical Centers operates four Healthy Living Centers with modern gyms, exercise and yoga classes, seminars and other programs. Patients who require surgery or a hospital procedure are picked up and delivered by Leon Medical’s bus transportation service. On arrival, they’re greeted and escorted to their destination by staff from Leon Medical’s Hospital Service Centers, which are located within all of the major Miami-Dade County hospitals. Aside from the seven centers and four Healthy Living Centers, Leon Medical operates a fleet maintenance garage and a 300,000 square-foot corporate headquarters. Video management software Martinez says that the fixed facilities are also being equipped with March Networks 8000 Series Hybrid NVRs, which are managed using the same March Networks Command video management software powering the mobile recorders. Having a single software solution to access and manage video - regardless of whether it’s recorded on a bus or in one of the medical centers - means that Leon Medical Centers doesn’t have to train staff on multiple software systems. It also provides the organization with complete oversight of its clients and operations. Once again, it’s all about patient safety and service excellence. “If a patient loses a purse or a wallet, for example, we’ll be able to find it for them on one of our buses or in a clinic. Or if they have an issue with an employee, we’ll be able to review the video and take care of it,” said Martinez. Video surveillance infrastructure Martinez and his staff are trained to take full advantage of all the Command software functionality A Microsoft certified engineer, Martinez heads up a department solely focused on overseeing Leon Medical’s video surveillance infrastructure. “This department didn’t exist four years ago,” he said. “I was part of the IT department responsible for PC support. Mobile security was handled by transportation at the time. I thought it would be a good idea to create a separate department with IT expertise to look after mobile security, and senior management agreed.” Martinez and his staff are trained to take full advantage of all the Command software functionality. For example, they’re able to manage video viewing privileges to ensure users have access only to those cameras corresponding to their roles or responsibilities. They’re also able to take advantage of Command’s support for Microsoft Active Directory integration, which collects established user account information from Leon Medical’s corporate network directory. Patient safety and service excellence This allows them to select users from the company directory, assign a profile and customize their user interface to display the tools needed for their role. Looking ahead, Martinez and his team will be busy this year, as Leon Medical Centers continues to expand. We have four construction build-outs planned, including a four-story, 80,000 square-foot building" “We have four construction build-outs planned, including a four-story, 80,000 square-foot building and two parking garages - one six-floor and one seven-floor garage - so there will be opportunities for additional fixed video surveillance systems. Because we lease our buses for three years, we’re also always adding to our transportation fleet, so we’ll continue swapping out our 5308 recorders in favor of the newer GT Series.” “March Networks has served us well,” said Martinez. “Without a high-quality, reliable video surveillance system, we would have a much more difficult time fulfilling our commitment to patient safety and service excellence. It’s that simple.”
PerpetuityARC Training, part of the Linx International Group recently delivers a risk and crisis management workshop for Lafarge Egypt (part of the LafargeHolcim Group) in Cairo. The training provided senior managers from across the organization with the knowledge and skills needed to manage resources during a crisis and operate within the organization’s crisis management and compliance framework. The intensive program was built collaboratively between PerpetuityARC Training and Lafarge Egypt and specifically tailored to its operating environment in the construction materials industry. Achieve successful resolution It was great to see them solving problems in a pressured, but safe environment"In a series of practical and theoretical exercises, Linx International Group Director, Angus Darroch-Warren, assessed and enhanced the ability and confidence of participants to apply their new skills to manage complex and evolving crisis scenarios, each requiring close collaboration between team members, in order to achieve a successful resolution. Security Director at Lafarge, Magdy Khorshid, stated: “The course was amazing, very practical and interesting to all and I received much positive feedback from all learners.” Angus commented: “The Lafarge teams engaged fully with the workshop scenarios. It was great to see them solving problems in a pressured, but safe environment, that allowed them to think through issues and respond using identified resources and procedures.” The workshop is the latest collaboration in a five year relationship between Lafarge Egypt and PerpetuityARC Training. During this time PerpetuityARC Training has delivered its security and risk related courses to employees and stakeholders in Egpyt and the UK.
The sensor solutions provider HENSOLDT is equipping the second batch of the German Navy’s K130 corvettes with its TRS-4D Rotator naval radar and its MSSR 2000 I friend-or-foe identification system (IFF). Only six months after the order was placed, the company has now successfully passed the factory acceptance test by the German procurement authority BAAINBw for the second system. “With the TRS-4D, the corvettes are getting an extremely powerful radar system,” said HENSOLDT’s CEO Thomas Müller. “Since we have started to produce our radars in series a short time ago, we have been able to reduce the time required for delivery to our customers considerably.” Order for seven TRS-4D radars On board the new F125 frigate, the TRS-4D is used in a configuration comprising four fixed planar arraysHENSOLDT has orders for seven radars which are intended for five ships and two land-based systems and are to be delivered by 2022. The company had previously equipped the first K130 batch with its proven TRS-3D radar. For the second batch, the TRS-4D has now been ordered to be supplied in a version comprising a mechanically rotating antenna (TRS-4D Rotator), which is also under contract for the U.S. Navy’s littoral combat ship (LCS). On board the new F125 frigate, the TRS-4D is used in a configuration comprising four fixed planar arrays. This radar system is part of a family of products which also includes ground-based air defense radar, TRML-4D. It thus benefits from shorter production cycles, continuous product improvements as well as advantages in stock levels of spare parts and training. Quick detection and tracking of targets The TRS-4D Rotator has been designed to be used for anti-aircraft and anti-surface operations. Its rotating antenna combines mechanical and electronic azimuth scanning, which allows targets to be detected and tracked very quickly. Thanks to its higher sensitivity, the AESA radar allows more precise detection, especially of small and maneuvering objects, as well as faster confirmation of the target, which means that the ship crew has more time to respond to threats. The system includes an MSSR 2000 I secondary radar for friend-or-foe identification (IFF) The radar can be specifically programmed according to the customer’s needs, and its characteristics can be changed via the software to match new requirements that arise during its useful life. The system also includes an MSSR 2000 I secondary radar for friend-or-foe identification (IFF), which complies with all IFF standards, even the latest ‘Mode S / Mode 5’. This is all the more important as all NATO troops and their allies are currently in the process of converting their IFF systems to Mode 5. The Mode 5 capability enables the troops to take part in joint and combined operations with NATO and other allied forces.
Mul-T-Lock supplies a high-end jeweler in London with CLIQ® locks in order to help the business manage access to cabinets holding valuable items. Stocking bespoke pieces and precious stones, the jeweler was looking for a high-level security solution that allowed sales personnel access to individual glass cabinets, without the worry that if one of the keys got lost or misplaced that they would have to replace the entire suite. Offering maximum security Over 50 CLIQ® cam locks from Mul-T-Lock were installed at the jewellers on each of the cabinetsOver 50 CLIQ® cam locks from Mul-T-Lock were installed at the jewelers on each of the cabinets, offering maximum security with the added benefit of audit trail capabilities. These capabilities include the ability to schedule individual access permissions for each key, as well as to provide time-limited access. In the case of this particular jewelers, each member of staff was given access to a selection of cabinets at varying times, with individual permissions set by the administrator (those who manage the security system). For example, access could be set for only business hours, meaning that the cabinet could not be accessed at evenings or weekends. Similarly, each time a user opens a lock, it will be recorded in the system, meaning that the administrator can keep an eye on operations electronically. Careful consultation Specialist Mul-T-Lock integrator, Elelock Systems Ltd specified and installed the CLIQ® locks at the jewelers, after weeks of careful consultation with the business owner to better understand the store’s requirements. One of the biggest concerns for this particular jeweler was the threat of compromised security" Chrys Chrysostomou, Managing Director of Elelock said: “One of the biggest concerns for this particular jeweler was the threat of compromised security if cabinet keys were lost. Mul-T-Lock’s CLIQ® technology means you can revoke access in minutes, whereas with a traditional system you would have needed to replace the whole lock – costing time and money.” Hands-On training “With no cabling the system was easy to configure and install, making it suitable for a variety of applications. The store manager also received hands-on training from ourselves and Mul-T-Lock, alongside the jeweler’s head of IT and security representative.” Suresh Peri, Commercial & Technical Manager at Mul-T-Lock added: “Our CLIQ® system is ideal for retail applications where there are a number of members of staff who need access at varying times, or that require individual permissions for access to high security storage rooms, cabinets or drawers. “Being able to revoke access permissions when a member of staff leaves also allows retailers to uphold their security and reduce ongoing maintenance costs.”
Round table discussion
People are an essential component of any physical security system. Automation hasn’t taken over completely yet! But how has innovation changed the skillsets security operators need to operate systems effectively? The two elements – technology and manpower – must operate seamlessly and hand-in-glove to ensure that modern systems live up to their full potential. We asked this week’s Expert Panel Roundtable: How does technology innovation in security systems impact the skillsets needed by security operators and officers?
Technology advancements often come with new terms and definitions. The language of our marketplace evolves to include new words that describe innovations in the industry. In the skilled hands of marketers, terms intended to be descriptive can also take a new element of ‘buzz,’ often presaging exciting developments that will drive the future. We asked this week’s Expert Panel Roundtable: What new buzzword have you heard, and what does it mean for the industry?
What is a business, or an industry, but a collection of people and the results of their work? People make all the difference in the destiny of a business or industry. And the people involved in a business reflect the impact of demographic changes – and the passage of time. The security industry has been largely built by Baby Boomers, who are getting older and increasingly stepping aside to make way for younger folks. We asked this week’s Expert Panel Roundtable: Is there a “new generation” of employees and managers entering the physical security marketplace, and what will be the impact?