HID Global, a global provider of trusted identity solutions, will showcase new offerings, an industry-changing access control tool and new integrations in HID booth #11063 at this week’s ISC West in Las Vegas. The company will also participate in Security Industry Association (SIA) educational sessions and local community events during the conference. Visit the HID in booth at the Sands Expo and Convention Center from April 10-12, 2018 for live demonstrations of the company’s latest...
Turnstile manufacturers increasingly recognize the value of integrating mobile devices into their lobby security strategy to create more convenient, connected and secure experiences for building occupants and visitors. HID Global, a global provider of trusted identity solutions, announced that it has teamed up with six of the world’s top turnstile manufacturers who have tested and certified HID’s Mobile Access as part of their commitment to a mobile future. Major turnstile manufactu...
Recent technology advances – from the cloud to artificial intelligence, from mobile credentials to robotics – will have a high profile at the upcoming ISC West exhibition hall. Several of these technologies were recently designated by the Security Industry Association as the Top 8 Security Technologies for Security and Public Safety. Some of them will also be a focus at the ISC West conference program, SIA Education@ISC, April 9-11 at the Sands Expo Center. This article will highligh...
Boon Edam Inc., a global provider of security entrances and architectural revolving doors, announced they are emphasizing tailgating mitigation through integrated technologies in booth #8037 at the ISC West exhibition in Las Vegas, NV from April 10-12. ISC West is the largest security trade show in the United States, bringing together 30,000 security professionals for its 3-day event. Boon Edam is also the official turnstile sponsor of the show. Tailgating Mitigation Through Integrated Solution...
The extensive analysis and discussion preceding any decision to implement a new physical security solution – whether it’s hardware, software or a combination of both – often focuses on technology, ROI and effectiveness. When it comes to deciding what type of security entrances to install at your facility, you will almost certainly also consider the aesthetics of the product, along with throughput and, if you’re smart, you’ll also look into service concerns. Each o...
Boon Edam Inc., a pioneer in security entrances and architectural revolving doors, is proud to announce that their Speedlane Lifeline optical turnstiles have been certified as compatible with the new iRox-T Turnstile Reader from Essex Electronics. “Our Speedlane Lifeline optical turnstiles with the integrated iRox Turnstile Readers deliver a multitude of benefits to users,” said Kurt Measom, Vice President, Technology and Support, Boon Edam Inc. “This integration is one more w...
Boon Edam Inc., global provider of security entrances and architectural revolving door solutions, has announced the breadth of its 2019 technical training program, including scheduled factory trainings, online webinars and roadshow trainings throughout the United States. Technical training events are free of charge to Boon Edam distributors and integrator partners and include one to three days of intensive product instruction and hands-on exercises. Boon Edam Roadshow In 2016, Boon Edam introduced the first “Roadshow” training program with the goal of bringing the success of its bi-annual factory trainings held in Lillington, NC direct to partners in their local area. Roadshow trainings are unique in that a specially-engineered, full-size security revolving door, security portal and/or optical turnstile are sent to each training location For the 2019 training program, Boon Edam’s Training Manager, Zac Ellett, has created an improved curriculum which addresses the top five issues seen in the field for each product type, in addition to general installation, service and maintenance instruction. The Roadshow will stop in at least a dozen locations this year, focusing on areas where a large number of installations are about to occur. For this reason, the Roadshow schedule for the quarter will be released at the beginning of that quarter. Roadshow trainings are unique in that a specially-engineered, full-size security revolving door, security portal and/or optical turnstile are sent to each training location. Partners have the opportunity to work together to assemble the units and troubleshoot them on-site, gaining confidence and competence that will translate to improved performance in the field. Public-Use Revolving Doors In 2019, Boon Edam will continue to host four trainings at its factory location in Lillington, NC, with each session focusing on different product types. There will also be two AAADM A156.27 certification courses on public-use revolving doors throughout the year. Finally, Boon Edam will also provide four, free public webinars. This portable training method gives partners the convenience of learning on the road or at the office. “I’m proud to be coordinating a technical training program each year that can reach our valued partners and help them delight their customers,” said Ellett. “The response we’ve received over the past three years with our roadshow training has been overwhelmingly positive. We’ll continue to expand our training program and do all we can to support our partners.”
Integrated security manufacturer TDSi is pleased to announce the appointment of Richard Money as Distribution Channel Manager. In his new role, Richard will be a central point of contact for TDSi’s Distribution Partners including ADI, Norbain, EET Europarts, Advanced Access, Enterprise Security Distribution and Anixter. Reflecting upon his new role, Richard commented, “I am excited to be joining the TDSi team. The company has a fantastic range of products that will suit any environment, and all budgets so there is tremendous scope to work with our distributors and grow our mutual business.” John Davies, Managing Director of TDSi also commented, “We are delighted to welcome Richard to this highly pivotal role. TDSi’s products are exclusively sold through our partners and we are committed to ensuring we offer the best support and assistance to facilitate this. Richard is the prime point of contact for our distribution partners - be it for stock enquires, pricing or connecting them with our vast network of expert installer customers.” Richard has over 20 years’ worth of security experience, having joined the industry in 1997 Veteran In The Security Industry Richard has over 20 years’ worth of security experience, having joined the industry in 1997 working at Clarke Instruments Ltd promoting and selling medium to high security electric strikes, turnstiles and barriers. In 2001, he joined Gardiner Security in its access control division and stayed there for 10 years, during which time the company was bought out by ADI Global (part of Honeywell) and Richard became an Account Manager selling access control, intruder and CCTV products. In 2011, Richard moved to ACT (Access Control Technology), an Irish manufacturer of access products, as a Senior Account Manager. He worked with ACT for seven years until he made the move to Inner Range before joining TDSi. Richard concluded, “I have gained a broad experience of the security sales industry during my career and look forward to sharing my expertise that with TDSi’s distribution partners. The UK market is an energetic one, so I am available to help our distributors fully meet the demands and needs of our customers from TDSi’s extensive range of products.”
Professional grade access control technology developer and manufacturer Essex Electronics recently announced the release of the revolutionary iRox-T Turnstile Reader. The iROX-T is a multi-technology reader designed for high-security turnstile systems. It provides streamlined migration for upgrading to the most secure credential technologies by closing the gap to growing security threats with powerful, cost-effective embedded HID iCLASS SE technology that supports a wide range of credentials. The solution meets the increased demand for the highest security in busy lobbies and other environments, without sacrificing functionality or speed. Secure Credential Reading Technology “Lobby security is an increasing concern for organizations that want to close security gaps, especially in smarter and more connected environments,” said Michael Chaudoin, Vice President of Product Management and Marketing, Extended Access Technologies business unit with HID Global. “The New Essex solution with proven HID credential reading technology underscores our shared commitment to helping customers step up their access control systems with a turnstile solution that increases security while also providing efficient access for users.” The Essex Electronics dual-frequency iROX-T turnstile reader supports low frequency proximity cards The Essex Electronics dual-frequency iROX-T turnstile reader supports low frequency proximity cards, HID’s breakthrough 13.56MHz Seos credentials for advanced security, iCLASS SE, iCLASS and other high frequency formats. The reader enables easy upgrades from existing low frequency (and low security) readers to the latest flexible, most secure technology--solving the issues facing many turnstile applications by maximizing the read range necessary for high security credentials and maintaining the highest levels of turnstile throughput. Certified High-Security Turnstile Solution “The iROX-T is already tested & certified with eight of the leading global turnstile manufacturers who have embraced the value of the solution, which features a rugged design, and encapsulated electronics for streamlined upgrades that meets the higher security requirements for turnstiles,” shared Garrett Kaufman, President of Essex Electronics. “Additionally, the iRox-T is designed with the lowest possible profile to retrofit and conceal for various turnstile manufacturers and models.” Attendees can see the iRox-T in action by visiting one of the 9 global security manufacturers at GSX 2018. HID Global - Booth # 1737 Alvarado - Booth # 1023 Automatic Systems- Booth # 2535 Boon Edam- Booth # 1715 Com Infosec- Booth # 3529 Delta- Booth # 711 Gunnebo- Booth # 1431 Orion - Booth # 521 Smarter Security - Booth # 1043
Boon Edam Inc., global supplier of security entrances and architectural revolving doors, is showcasing the company’s continuing advances in technology and customer support in booth #1715 at the GSX (formerly ASIS) exhibition in Las Vegas, NV from September 25-27. With the launch of their new Interactive Troubleshooting Guides for Security Entrances, a range of new partner technology integrations and the growing adoption of anti-tailgating and anti-piggybacking entrances by Fortune 50 Global companies, the company is advancing its position as the market leader in the Americas in security entrance solutions. Global Security Entrances Supplier “Boon Edam has held the top position for security entrances in the Americas since 2012 according to IHS Markit reports,” said Greg Schreiber, Senior Vice President of Sales, Boon Edam, Inc. “Serving our customers and this industry with stronger, safer options for protecting entrances from tailgating and other unauthorized incursions will always be our first priority.” Boon Edam’s focus on providing unsurpassed support for its service partners was the impetus for the launch of the company’s new interactive troubleshooting guides. Created to help accelerate the diagnosis and problem-solving process for service technicians in the Americas, the guides are available to any registered technician with internet access and will greatly assist in performing service on three of Boon Edam’s most popular security products: the Circlelock mantrap portal, the Tourlock security revolving door and the Speedlane Lifeline optical turnstile series. Boon Edam At GSX 2018 Show attendees will be able to test drive a number of Boon Edam products first-hand on the show floor, experience their advanced tailgating prevention technologies, as well as their ease of use and convenience. Tourlock 180+90 And Circlelock Security Portal The Circlelock security portal prevents intrusion into the most sensitive areas such as data centers Several of Boon Edam’s highest-level security entrances will be featured in the booth, including the Tourlock 180+90, the Circlelock security portal, and the Circlelock Combi. Integrating Boon Edam’s best-selling security revolving door with an AMAG Symmetry card reader, the Tourlock 180+90 pairs access control integration with high bi-directional throughput to prevent tailgating and piggybacking without manned supervision. With the highest level of security available in an entrance, the Circlelock security portal prevents intrusion into the most sensitive areas such as data centers. The Circlelock demonstration incorporates two-factor authentication with an AMAG Symmetry card reader on the outside of the portal plus an iris scanning technology from Iris ID to confirm identity. Circlelock Combi Half-Portal Boon Edam’s newest entry, the Circlelock Combi is a half-portal that transforms an existing swinging door into a high security mantrap entrance that prevents piggybacking – saving both space and renovation costs. At GSX, the half portal will demonstrate two-factor authentication, using an AMAG Symmetry card reader plus facial scanning technology from StoneLock Pro. Lifeline Speedlane Swing Turnstiles Also, on display is the New Lifeline Boost access control pedestal Other security entrances being demonstrated in the Boon Edam booth include the Lifeline Speedlane Swing, the industry’s slimmest optical turnstile, with MorphoWave touchless fingerprint technology from IDEMIA for high throughput with fast biometric identification. Also, on display is the New Lifeline Boost access control pedestal. The Boost is suitable for the integration of a variety of access control systems, ranging from card readers and barcode scanners to various biometric devices. BoonConnect IP-Enabled Software Booth visitors will also be able to learn about BoonConnect, an IP-addressable, proprietary software system providing diagnostic and configuration tools for the Tourlock security revolving door and Circlelock mantrap portal. Speedlane Open Optical Turnstile Once again, Boon Edam is the official turnstile sponsor of the GSX show. This year, the company is featuring the sleek Speedlane Open, a new, barrier-free optical turnstile designed for deterring casual intrusion attempts.
Boon Edam Inc., global manufacturer of security entrances and architectural revolving doors, has announced the launch of an updated Turnlock full height turnstile that offers increased performance and an improved experience for users and installers alike. The update focuses on the design of the speed control mechanism and the overall construction of the turnstile’s top channel, providing improved rotation action and a significant reduction in overall weight of the top channel. In addition, the optional, emergency backup battery lasts twice as long as before. Secure, Authorized Access In Harsh, Outdoor Environments Boon Edam’s Turnlock full height turnstiles are used around the world to allow only authorized personnel access into secure environments. Typically installed outdoors, their durable construction and efficient operation provide security access even in harsh weather conditions. They serve as visual deterrents against intrusion at perimeter fence lines of corporate headquarters, critical infrastructure locations, distribution centers, amusement parks and more. Speed Control Mechanism Ensures Safe Passage The speed control mechanism in a full height turnstile ensures a safe rotation speed during use by absorbing excessive force The speed control mechanism in a full height turnstile ensures a safe rotation speed during use by dampening or absorbing excessive force when the rotors are pushed. The new and improved mechanism fulfills this purpose by providing a smooth rotation experience while also minimizing the force needed for a user to push the rotor. The rotor also slows down gently as it completes rotation, stopping in place to await the next user. The operation is quiet, smooth and subtle, without vibration, creating an optimal user experience. Easy Installation And Doubled Battery Backup The updated Turnlock now features a narrower top channel that weighs 70 lbs. lighter than the previous version, making installation much easier for contractors. The top channel is now only 8 inches wide, compared to the 18-inch diameter used previously. Finally, the optional battery backup has been completely redesigned and updated using the latest technologies. The battery backup keeps a turnstile working in case the power goes out and the coverage period has now doubled from two hours to four hours of protection. The size and weight of the battery system has also been cut in half, contributing to ease of installation. Redesigned Top Channel And Speed Control Feature The updated features are available on all 3-rotor, single and tandem Turnlock 100, 150 and 200 models The updated features are available on all 3-rotor, single and tandem Turnlock 100, 150 and 200 models. Also, the redesigned top channel and speed control can be easily retrofitted into existing, installed Turnlock turnstiles. “We are always taking steps to improve our products, even a workhorse like the Turnlock, demonstrating our objective of ‘Basic Done Well’,” said Tom Schneider, Engineering Manager at Boon Edam Inc. He further added, “The quiet action and smooth rotation work well indoors or outdoors and contractors will definitely notice a significantly lighter top channel that is much easier to lift and install in the field. We think our customers will appreciate these performance upgrades and we’ll continue to listen to their feedback.” All Boon Edam full height turnstile models have been tested and certified to conform to UL Standard 294, a prevalent industry standard for ensuring the safe operation of turnstile equipment in the United States.
Boon Edam Inc., global provider security entrances and architectural revolving doors, is proud to announce the launch of the Lifeline Boost access control pedestal mount, an attractive and welcoming addition to the Lifeline Speedlane series of optical turnstiles. Lifeline Boost Access Control Pedestal Mount The Lifeline Boost was created in response to the many requests for a well-designed, innovative and unobtrusive pedestal to accommodate a long list of authorization technologies and complement the existing Lifeline Speedlane series. The Lifeline Boost has been engineered with the comfort of the end-user in mind; it is ergonomic, at a comfortable height and features the classic tapered V-shape synonymous with the Lifeline Speedlane series and of course, offers the same outstanding energy saving features that customers have come to expect from Boon Edam. Using modern and intuitive technology, the Lifeline Boost pedestal mount guides each visitor through to their destination without delay or inconvenience. As with the Lifeline Speedlane series, a selection of proven and intuitive light symbols indicates what the visitor needs to do next, from their initial approach, through the authorization steps and their exit into the secured side. Flexible Combinations With ‘Plug ‘n Play’ Feature The latest Lifeline Boost access control pedestal is available in three models: Standard Premium: Suitable for the integration of a card reader, barcode reader or biometric devices. Card Collector: Suitable to integrate a third-party card collector device. Nortech Card Collector: Built/integrated with the Nortech MRC350 card collector. In addition to accommodating a wide variety of authorization technologies, the Boost pedestal is easy and fast to install due to its enclosed raceway that can house electrical and ACS conduit along the surface of any finished floor. Its small footprint and sleek design complement the clean lines of the Lifeline Speedlane optical turnstiles with minimal visual impact. Premium User Experience There was a need to develop a pedestal to enable more integration possibilities for the Lifeline Speedlane series" Users will find the Boost uncomplicated and intuitive to operate as they provide their credentials and then pass through the lane. Intuitive LED lights detect the visitor approaching and guide them through clearly and easily – without any compromise to the journey flow. The directional indicator symbols stand out beautifully against the premium dark, tempered glass and installation does not require any cables to go through the floor. Daan van Beusekom, Product Manager, Royal Boon Edam International B.V. says: "We believe in creating welcoming and secure security access solutions and saw there was a need to develop a pedestal to enable more integration possibilities for the Lifeline Speedlane series. He further added, "The new Lifeline Boost fulfills this mission - it is streamlined and compact – with the same ergonomic and sleek features of the Lifeline Speedlane series – and can accommodate almost any authorization technology available. We’re proud to launch this clever and compact addition to the family."
In the wake of 9/11, the Federal Government’s secure-the-fort, big idea was to create an identity credential for all federal employees and contractors. Homeland Security Presidential Directive (HSPD)-12 set it all in motion. Today, we know the smartcard-based credential that arose from HSPD-12 as the Personal Identity Verification (PIV) card. The PIV card is meant to give employees/contractors physical access to federal facilities and logical access to federal information systems. While using a PIV card for logical access has been largely successful and compliant with HSPD-12, implementing PIV-based, physical access control systems (PACS) has been much more difficult to conquer. As a result, HSPD-12 compliance for PACS has largely eluded the Federal Government. The noncompliance reasons are many, but there is now hope for fully achieving HSPD-12’s mandates. Interoperability With Any Agency’s PIV Beyond Passports, PIV cards represent the only other open-standards-based, multi-vendor-supported, identity credential program on the planetAll Executive Branch employees and long-term contractors, including the entire Department of Defense, have been issued PIV cards. This has been true since 2013. Beyond Passports, PIV cards represent the only other open-standards-based, multi-vendor-supported, identity credential program on the planet. It seems so simple, where employees/contractors previously used their proximity card to open a federal facility door or go through a turnstile, they should now be able to use their PIV card. However, HSPD-12 took the PIV requirement one step further – compliant PACS must be interoperable with any agency’s PIV. This introduced an entire magnitude of additional complexity. A compliant, interoperable, PIV-based PACS should work like this: an authorized employee (or contractor) presents a PIV card (contact or contactless) to a card reader to enter whichever federal agency building they have reason to be. Over the last 14 years, in all but a very few cases, the lack of PACS’ HSPD-12 compliance has prevented this from happening. Secure Credential Policy Today, less than 1% of the Federal Government’s PACS are HSPD-12-compliant. At most federal facilities, especially those outside the National Capitol Region, a noncompliant PACS works like this: an authorized employee (or contractor) presents a proximity (‘prox’) badge to a proximity card reader to enter his or her agency’s facility. At the fraction of federal facilities with upgraded PACS that work with PIV cards, virtually all such PACS fail to properly use a minimum number of PIV security features before granting access – let alone interoperate with a PIV card from any other agency. Active government solicitations are issued for new, non-compliant, proximity-based systems that perpetuate the delay to HSPD-12 complianceNew federal initiatives frequently suffer from having no policy to enforce their roll-out. That isn’t the case with PACS compliance. Policies have been in place for so long that newer policies like Office of Management and Budget (OMB) M-11-11 (February 3, 2011) remind everyone what the policies said in 2004 and 2006. This year, OMB publicized its proposed OMB M-18-XX (Draft), which will replace M-11-11. OMB M-18-XX’s (Draft) main PACS thrust is, once again, to ensure that everyone understands what the Federal Government’s secure credential policy is. It hasn’t changed since 2004. It would be tempting to say that PACS technology isn’t mature, but that isn’t the case. In 2013, the Federal Government revamped the PACS portion of the FIPS 201 Evaluation Program and, since that time, all PACS on the General Services Administration’s (GSA) Approved Products List are 100% compliant and interoperable. Yet, on any given day, active government solicitations are issued for new, non-compliant, proximity-based systems that perpetuate the delay to HSPD-12 compliance. The usual suspects, policy and technology, are not the culprits for this epic delay. An authorized employee presents a PIV card to a card reader to enter whichever federal agency building they have reason to be Difficulties In Adopting HPSP-12 Compliance For PACS Standards – The Federal Government’s approach to standards is to avoid a great deal of specificity. It’s an unspoken tenet that federal standards must be flexible, promote innovation and avoid disadvantaging any participating market segment. The opposite is true if your goal is interoperability: nearly every detail must be specified. Consider the standards-based success story of chip-based credit cards. When was the last time you used a credit card and it didn’t work? Interoperability failures are nearly unheard of. If you look at the hundreds of volumes of technical specifications that cover minute aspects of every component in credit cards and payment terminals, you quickly realize why it works so well. Nothing is left to chance, nothing is a variable, and there is no optionality. The Good News: Work to increase viability through deep scrutiny has progressed in recent years. The GSA APL PACS Testing Lab, set up in 2013, annually tests credentials from all PIV issuers against all GSA-approved PACS. This testing has significantly reduced interoperability failures at federal facilities. Collaboration – In the past, physical access practitioners from federal agencies rarely collaborated, unlike their logical access counterparts. This is also true for PACS procurement decision-makers across agencies and facilities. The Good News: In 2018, an agency trend has emerged where finally physical access, physical security and IT practitioners have begun sitting down to discuss their shared responsibilities. We have already begun to see coordinated budget requests between IT and Security with enterprise architectures positioning PACS as an enterprise service on the network Scale – The Federal Government owns so many buildings that they can’t be counted. Google doesn’t know how many there are and neither does any one government official. Variability – A significant percentage of facilities have unique aspects making a one-size-fits-all approach infeasible. The Good News: Mature consulting services can now help agencies marry federal requirements with their unique environments to develop robust PACS enterprise architectures. As we see this occurring more and more frequently, a repeatable, achievable, systems-based upgrade of all PACS may be on the horizon. The GSA APL PACS Testing Lab annually tests credentials from all PIV issuers against all GSA-approved PACS Provenance – In many cases, different groups own different parts of a single facility, not all of whom might be subject to, or wish to interoperate with, a high-assurance compliant PACS. For example, GSA manages facilities for Legislative and Judicial tenants who aren’t subject to HSPD-12. Policy dictates that GSA manage the PACS for the front doors of these facilities should be HSPD-12-compliant, despite the fact that these tenants likely don’t have credentials that work with this technology. Sure, these tenants could commercially obtain a PIV-I credential, but almost none have. Economics – It’s difficult for agencies to create their annual security budget requests when HPSD-12 PACS upgrades are in scope, because so many unknowns exist at each facility. To assess the cost, the time to complete, and the facility’s existing equipment inventory, it would be logical for an agency to hire a contractor with PACS expertise to perform a site assessment. Having to do capital planning for an assessment phase in advance of making the annual budget request for the PACS upgrade creates a never-ending cycle of delay. Especially at agencies with multi-year capital planning requirements. Many agencies, trying to avoid this delay cycle, have fallen prey to doing site assessments themselves. This results in their integrators doing their walk-throughs after the contract is awarded. This is the leading cause of PACS upgrade cost overruns. Dependence on the agency’s IT department – Historically, PACS have been deployed on dedicated networks and are rarely ever connected to the enterprise, let alone the Internet. High-assurance PACS that validate credentials from other agencies must now communicate with many different systems on an enterprise network and over the Internet – so much so that the Federal Government reclassified PACS as IT systems. The Good News: With collaboration increasing between Physical Security Officers (PSOs) and Chief Information Officer (CIOs), we expect this to improve in due course. Resistance to change – This is a classic human factors challenge, and it’s a big one. PSOs have spent decades achieving their positions. PIV-based PACS could not be more different from the technologies that proceeded it, and such radical change is often resisted. When the value proposition is clear, change is adopted more readily. But security value isn’t easily measured or observed. It is often said that the best performance review for a PSO is to note that nothing happened. And when something does happen, it is necessarily kept quiet so the risk can be remediated without calling attention to the vulnerability in the interim. To date, the value proposition of moving to PIV-based PACS has been entirely based on policy (without corresponding funding in most cases) and through the shock value of white hat hackers, showing how easily most proximity badges can be cloned. This is not the stuff of change agents. PIV-based PACS could not be more different from the technologies that proceeded it, and such radical change is often resisted Are These Challenges A Unique Situation? No, these PACS challenges are not unique. Cybersecurity initially faced many of the same challenges that federal PACS face today. By 2000, the Federal Government recognized its urgent need to improve cybersecurity practices across its computing infrastructure and issued many policies that required agencies to improve. Improvement was sparse and inconsistent. GSA Schedules were set up to help agencies buy approved products and services to assist them, but this too produced lacklustre results. The Federal Government found that the best cybersecurity results occurred when enforced at the time an agency commissioned a system Congress enacted the Federal Information Security Management Act of 2002 (FISMA) (now amended by the Federal Information Security Modernization Action of 2014). FISMA mandates an Authority To Operate (ATO) accreditation process for all information systems. The Federal Government found that the best cybersecurity results occurred when enforced at the time an agency commissioned (vs. purchased) a system. FISMA and ATO accreditation has been highly successful when implementing new systems. These cybersecurity requirements are the closest thing that the Federal Government has to the ‘PIV Police’ today. However, the PIV requirements in FISMA and ATOs currently apply to only logical access for information systems. The proposed OMB M-18-XX (Draft) mentions that a FISMA PACS overlay to NIST SP 800-53 is forthcoming. The intent of the PACS overlay is to use the army of ATO accrediting officials in the Federal Government and enable them to assess implemented PACS as fit for purpose. This is the first time an enforcement approach has been brought forward that could reasonably succeed. How Long For HSPD-12 Compliance? We know that it won’t take another 14 years to achieve HSPD-12 compliance. Pockets of compliance are popping up. Compliant procurements do exist, and the state of PACS across the Federal Government is better in 2018 than in any previous year. Progress to date has been at a constant rate. The question is: what would take for progress to occur at an exponential rate instead? A major attack or compromise involving PACS would certainly hasten upgrades, but let’s hope that’s not the solution. The energy distribution sector has been riding a wave of security upgrade demands to retrofit their facilities across the U.S. The energy distribution sector, under nearly constant Advanced Persistent Threat attacks, has been riding a wave of security upgrade demands to retrofit their facilities across the U.S. The potential threat exists for Federal Government facilities as well. Looking into the federal PACS-compliance crystal ball, we’re beginning to see the faint outline of a multi-faceted campaign of education, budgetary oversight and accreditation of PACS that will ultimately see us past the tipping point. Consider though, at the current rate of PACS enablement, a 50% compliance rate is still far in the future. When that day arrives, the PIV card form factor may no longer be the key that fits that future lock. (Are you already using a mobile device’s Bluetooth interface to open the door to your office building?) Taking decades to perform a technology upgrade is the aging elephant in the room no one talks about. By the time critical mass is achieved with an upgrade facing these many challenges, there are typically compelling reasons to start over again with the next generation of technology. That cycle may well prove to be the Federal Government’s biggest PACS challenge of all.
Mobile access is probably the largest emerging trend in the security marketplace, but it is only one of several that are changing the face of the access control market. Another factor showing potential to change the market is the emergence of location systems and positioning systems, as reflected by HID Global’s recent acquisition of Bluvision, a provider of real-time location tracking system for assets and employees, and building information modeling (BIM) is impacting how consultants do their jobs. We gathered together several consultants, and a representative of HID Global, to discuss these topics. Participants were Chris Grniet of Guidepost Solutions, Brandon Frazier of Elert & Associates, Terry Harless of Burns & McDonnell, and Harm Radstaak, HID Global’s Vice President and Managing Director, Physical Access Control. Future Of Mobile Access Technology SourceSecurity.com: How is mobility affecting end-user implementations and the way you consult? How has Mobile Access technology affected the way you approach projects? Chris Grniet: I don’t think I am designing a single project now where we are not using a mobile credential. But the industry has been transitioning slowly to frictionless access. We looked at it 20 to 30 years ago, when we started looking at asset tracking with RFID and antennas around doors, and all of that. We are starting to see new products emerge from HID and others for personnel tracking. I think our society has progressed, and we understand that the electronic component of our lives is attached to us – not embedded yet, but attached. Everybody has that electronic device, and it’s making it a lot easier. We have implemented products for mobile credentialing for large corporations. We are really looking forward to the visitor management component of that. It will make visitor management so much easier. We need to keep it affordable. But it’s going to be there. I am designing projects now with 20 to 30 turnstile entrances to a headquarters building. We are putting in visitor management kiosks. I don’t want a single visitor to have to use those at the end of the day. I want to push the credentials out. Unless they weren’t registered, they should be able to walk through the door because they are a trusted individual. We’re moving toward frictionless access, and that’s a big component of it. Terry Harless: Personally, I haven’t had any projects that use any mobile applications as of yet. I have tried to design them on a couple of projects as an alternate, mainly at tech-heavy firms where they understand technology. For the most part, it has always been value-engineered out because of the price, and also because some of these are smaller companies. Some of the mobile applications have larger license packs, for a hundred or more licenses. That’s my experience. "I think we have yet to see the advantages; people are still imagining what the full potential is of location services" Brandon Frazier: One of my biggest verticals is higher education. I really see mobile credentials being big in that space. I see students, and they have their phones and a little holder in the back for credit cards, and that’s it. That’s all they have. I think the idea of carrying another student ID won’t fit in the phone. I really see very specific verticals having great benefits from mobile. In terms of master planning, I have seen the cost of entry as being very expensive: the cost of replacing readers, the cost of replacing downstream devices. But if I’m doing large projects, I am always spec’ing in at least the mobile infrastructure, so they can add the credentials later. Harm Radstaak: It’s fair to say we have learned a lot as HID in the mobile access space. As a supplier, our operational model behind the scenes has completely shifted from producing a card, encoding a card, shipping a card. Now we are issuing over the air, revoking over the air. Our IT infrastructure and the way we serve end users though our IT infrastructure has had substantial investments. Moving into the mobile access space, the requirements are higher. Is it residing in the cloud? How are we going about compliancy, privacy, security? More important, if it’s residing on your phone, questions are being asked by end users. How trusted is this? All these areas are important for HID. That’s on the operational model. The other challenge we have is the variety of phones across the world. There are development challenges to support a substantial portion of the phones worldwide, and all the diverse operating systems. Challenges And Benefits Of Location Services SourceSecurity.com: What are your thoughts on location services / indoor positioning services? Grniet: Indoor positioning services should be integrated into a security platform that is pre-existing in an environment or will be deployed in an environment. There are plenty of location type services out there, whether in hospitals or factories. The signals have to be right, what we’re using as a tracking device has to be right, etc. I see some of the legacy systems laying to waste because it’s an extra set of management tools. So you need integration into the pre-existing or future systems to be deployed. We need to get everything fully integrated in a unified fashion, so we are operating on a single platform without an extraneous management platform. I think we have yet to see the advantages; people are still imagining what the full potential is of location services. It’s going to play into facility usage, area usage, safety, security, mustering; all of those things are going to be very important. Frazier: I see a lot of potential in specific verticals and employee groups. Let’s use guards as an example: The real-time ability to locate a guard, associate that with nearby assets, using analytics, tying data together, aggregating it, putting that to a body and being able to provide a faster response time. I see that coming, but I think the cost of entry will be too high. I used to do a lot of work in healthcare as well, and the cost of entry is extremely high in tracking services. So we need to find a better way to do it. GPS is great; I don’t know if you can get that in buildings. Adding sensors every 20 feet, triangulation, it’s just not the best solution. Grniet: With GPS we still have the height issue, especially in tall commercial buildings. So I can tell where you are on the X and Y coordinates, but not on the Z axis. That’s a big challenge. So having that built into a facility, then we can talk about asset security and asset tracking. That will be the fundamental component of how we sell it to the security side of the business. Radstaak: I think it’s fair to say HID is very excited about location services. It’s one reason we went out to acquire a company like Bluvision. It’s not GPS, but Bluetooth Low Energy (BLE)-enabled location services. This ties into a couple of things we discussed before. You can look at it from a space utilization perspective or workplace optimization, or sustainability, for cost savings in a large corporation. We have had discussions in the pre-acquisition phase about how it would fit with our portfolio and our offerings. HID can provide additional physical and security services. For us, it’s a natural extension. Harless: My experience is in the correctional field, where we have been using [indoor positioning] for 10 to 15 years, either for officer safety or tracking inmates. It hasn’t necessarily been very accurate. You know when a guy walks into a room because you have a detector above the door. The more expensive ones were triangulated, but they were very pricey and unaffordable unless you had some sort of funding. It has been around, and I am glad they are working it into some of the commercial spaces now. It could be very useful. Indoor positioning services should be integrated into a security platform that is pre-existing in an environment or will be deployed in an environment BIM Applications And Trends SourceSecurity.com: What are your thoughts on building information modeling (BIM) processes and how important are they for consultants? Radstaak: As a supplier, we see it as an increasing request and requirement in the consultant space – some regions lead more than others. In the United Kingdom, all critical mass infrastructure projects have to be specified based on the BIM model. So HID and Assa Abloy have invested quite substantially over the last few years in making our products compatible with BIM modeling. We support it with tools such as Assa Abloy Openings Studio. As a supplier, we see it as an important trend and a way we can support the consultant market. Harless: For a consultant, it helps tremendously in a couple of ways. First of all, we can pull our building materials straight out of the model. Another thing is, a lot of architects and owners like to walk through buildings and look what’s on the ceilings, on the walls. When you are showing them where the cameras and card readers are going to be (in a BIM model), it’ll give the architects a good idea of what they are going to see when the building actually gets built. They can tell us where to move stuff. Grniet: To that end, the inception of BIM wasn’t about 3D modeling in CAD, it was about tracking of assets, and understanding everything that was on the ground. It has taken us into: Where are the intersections on construction, so we don’t have pipes running where ducts should be, and is my security equipment going where glass is? If you couldn’t read the plans, we have a BIM model to show you. You talk about seeing what a building will be like, but clients have a hard time envisioning that, seeing beyond the paper, because they are focused on another business – that’s not what they do. So we are utilizing some of the tools being provided out there by firms like HID to put the toolkit for BIM modeling in there. We’re also using it for camera focusing. It helps me get a better idea of what I’m going to see in my final product and then show the client. This is why we are focusing a camera in this area. It goes back to sustainability, asset tracking, maintenance, all those things we have talked about under other product categories. "The future will be security of your software, security of your credentials and your card readers" Frazier: When BIM is properly implemented, it has made our workflow very efficient. We have found it has been very helpful in our personal design, as Chris said. When we are trying to model a camera, we can see the space. But as a project team architect, if it is not properly implemented or misunderstood, it has created a lot of extraneous tasks for us. And has made us very inefficient. Some people are very good at it, and the process goes really well. Other times we find people concentrate too much on collisions and it doesn’t end up like that in the field, or we design it one way and it ends up another way. It’s very helpful to us in our personal design, but as a project team, it can cause difficulties. Grniet: Just to add on to that point: We are still having trouble making the companies that manufacture BIM systems understand security’s role in the overall process. It’s easy for an architect to say I have strikes and hardware sets in my BIM model, but it’s under the architectural model. Security lies in this middle ground. We’re electronics, we’re low-voltage. The intersections, the toolkits, everybody’s got a great Revit model of their product, but it’s not in any of the toolkits. We have to build our own. The industry as a whole has a challenge to find the right place to be. Some people are using the MEP (mechanical, engineering and plumbing) model for Revit, some people are using the architectural model. But we have to build our own toolkits, so it’s still a challenge. Harless: At Burns and McDonnell we have it a little easier because we work with our internal architects. So we do have those tools actually built in-house. When we go to an outside or a third-party architect, to MEP firms, we have the same issues. Sometimes they will delete ceilings or walls instead of moving them, and then we have stuff all over the place. Future Trends For Physical Access And Identity Technology SourceSecurity.com: What do you think the identity technology industry as a whole should pay attention to over the next one to three years? What is your vision for the future in physical access or the office space of the future? Grniet: It’s about convergence of multiple areas of business, security of that convergence, the identification and the operability, and unified platforms to allow single vision, reduced resources and fully effective control and management of security, life safety, building management, you name it. Frazier: To sum it up: Cybersecurity and unification will drive migration basically. We need a more cybersecure solution, which will drive migration to other solutions, and that’s when conversations about global, logical security, what else can I do with this? Single sign-on. The big picture will drive a lot of this. Radstaak: The consolidation of technology from different industries will be substantial. It could come from the IT infrastructure, it might come from identity providers who are not currently operating in the security space. I think we currently don’t see yet the substance and the impact of the data analytics and how we can use that in security and broader applications. The services component will be substantial. Harless: The future will be security of your software, security of your credentials and your card readers. And integration, integration, integration. Grniet: And let’s not forget frictionless access. Read part 3 of our Consultants' Forum series here Read part 3 of our Consultants' Forum series here
The global market for card-based electronic access control (EAC) is projected to reach $10.1 billion by 2020 according to Global Industry Analysts. However, as credential technologies have evolved over the years, so have the ways users interact with them. Mobile Credentials One of the bigger developments over the past few years has been the increased adoption of mobile credentials, which allows users to access facilities via their mobile device. To make way for this change, organizations will have to assess their existing technology and build plans to incorporate mobile into their access control ecosystem. This HID Global white paper explores the most common technologies used in access control today, and why the move to mobile seems natural for many organizations. What's Inside? Movement towards mobile Extending access control while converging budgets The future on our doorstep Methodology Click Here to Download the White Paper Now!
Activity slowed on the last day of ISC West in Las Vegas, but there was plenty of momentum remaining and plenty more to see. In the end, Reed Exhibitions declared 2018 the biggest and most successful year to date for the show. There were an additional 4,000 square feet of exhibit space compared to last year and a 6 percent growth in overall attendance, according to Reed. The cloud, biometrics, deep learning and other technologies were among the big topics at the show, and even smaller exhibitors were pleased with the results. In particular, emerging technologies were successfully highlighted. Cloud-based Video Systems Cloud video company Eagle Eye Networks announced multiple new offerings at ISC West. One was the first cloud-based video system that accommodates HD-over-coax cameras using the HD-TVI protocol to operate over existing coaxial cabling. In effect, cameras connect with an HD-TVI recorder, which plugs into Eagle Eye Networks’ on-site hardware “bridge” connecting to the Internet. Eagle Eye Networks has also integrated Hikvision body-worn cameras into their cloud system; transmitting video using the Eagle Eye Bridge ensures end-to-end encryption and the evidentiary integrity of the video. Analytics in the cloud can be turned on and off at will for each camera, and could be deployed over a weekend and switched off the following week “A few years ago, fewer customers were ready to adopt the cloud,” says Ken Francis, President of Eagle Eye Networks. “Now market adoption is changing, and customers don’t want on-site hardware. End-users are driving the move to cloud systems.” He estimates the evolution is about halfway complete, and Eagle Eye Networks continues to sign up new dealers every month because their customers are asking for the cloud. Eagle Eye Networks’ third new offering at ISC West is “analytics in the cloud,” including familiar analytics such as intrusion, people counting and loitering. Francis says the economics of the cloud make implementation of analytics much more affordable – about $4 per camera. The economics of the cloud make implementation of analytics much more affordable Augmented Identity: Biometrics In Security Analytics in the cloud can be turned on and off at will for each camera. For example, analytics could be deployed over a weekend and then switched off the following week. “It’s a far more economically attractive and cost-effective service than on-site,” says Francis. Biometrics continue to make their way into the mainstream of the security market, and IDEMIA brought its message of “augmented identity” to ISC West. IDEMIA (formerly OT-Morpho) provides systems to the largest biometrics users in the world, including big customers such as the FBI and Interpol, and large-scale government projects around the globe. “If you can handle projects that big, enterprise applications are no problem,” says Gary Jones, Vice President, Global Channel & Marketing, Biometric Access & Time Solutions. He says that the company’s technologies apply to any vertical market, and they are especially common in major airports and big financial institutions, in addition to government. The company’s MorphoWave product allows users to wave their hand, and the system captures a three-dimensional shape of fingerprints. The touchless system is also “frictionless” -- it enables fast decision-making that promotes high throughput rates. Artificial Intelligence Applications AI and deep learning have been big topics of conversation at ISC West, and I saw a company on the last day of the show with a different take on the subject. BrainChip uses a type of AI called “spiking neural networking” that models the operation of neurons in the human brain - in contrast to “convolutional neural networks,” which use a series of math functions to train from pre-labelled data sets. The BrainChip Studio software can search vast amounts of video footage rapidly to identify either faces, patterns or objects. Applications are in law enforcement, counter-terrorism and intelligence agencies.The BrainChip Studio software can search vast amounts of video footage rapidly to identify either faces, patterns or objects “We search for specific things,” said Bob Beachler, Senior Vice President, Marketing and Business Development. The software can search hundreds of live or recorded camera feeds for a unique graphic pattern on an item of clothing or on a bag carried by a person, for example. The technology only requires modest processing power and consumes little energy, so it can be used with legacy systems without requiring hardware or infrastructure upgrades. Emerging Technology Zone A new Emerging Technology Zone at ISC West included participation by around 40 companies that are startups and/or new to the security industry. The section opened an hour before the main show floor and was located near the registration area, which increased traffic. “Generally speaking some people said it was hard to find, but I think it’s better for us as someone new to the market, rather than being on the main floor where you can get lost in the shuffle,” said Jeffrey Weiner, Vice President, Networks & Business Solutions, at Mersoft. “It was really smart that they opened this an hour earlier.” Mersoft, one of the Emerging Technology Zone exhibitors, has developed a software product to help the security industry do a better job of streaming live video. The software eliminates the startup delay and lag in live video. With dedicated software, video can be consumed by a browser or mobile app more easily Live Video Streaming “We accomplish that in two ways,” says Weiner. “One, we don’t trans-code the video into another format. Instead, we convert a security camera’s video from RTSP (real time streaming protocol) to WebRTC (Web Real-Time Communication), an open-source technology that has been used extensively in video conferencing, but not so much in security. The video can be consumed by a browser or mobile app more easily, and we don’t need a player on the client, which is another way we reduce lag.” Another advantage is that WebRTC is natively encrypted; every packet is encrypted. In contrast, applications that transmit RTSP have to be wrapped in a VPN (virtual private network) tunnel, which takes some effort to maintain and is a battery hog on a mobile device. Also, multi-casting of video is easier, even using streams of various resolutions. Mersoft works through partnerships, offering a cloud-hosted service on Amazon and a version that can be installed on a local server. They have worked with several DIY camera sellers (who use cloud services), and with some major commercial service providers. “A new partnership strategy we are exploring is with systems integrators, who can incorporate Mersoft and provide a differentiator by improving their video performance,” says Weiner. The 22-year-old company is new to security, and ISC West provides opportunities for in-depth conversations preparing for a future in the security sector. Customizable Turnstile Solutions Delta highlighted their new designer series turnstiles, whose colorful appearance led booth visitors to ask about customization Even the smaller companies, located toward the back of the hall, were enthusiastic about ISC West this year. “The show has been great,” says Vanessa Howell, project manager of Delta Turnstiles. “We did get a lot of traffic. I am a niche product, so it’s not so much about quantity as quality [of leads]. I had great quality at the show.” Being away from competitors, which are grouped next to each other in the front of the hall, was an upside of the turnstile company’s booth location toward the back. Delta highlighted their new designer series turnstiles, whose colorful appearance led booth visitors to ask about customization. “They ask: ‘Why are turnstiles only sold in basic models?’” says Howell. “’Why can’t they look like a piece of art since they are the first thing people see when they enter a building?’ People are very open to making them prettier.” Delta Turnstiles has been coming to ISC West since 2006. “I have manufacturer’s reps, and this is one of two times I get to see them in one place, and they bring a lot of customers to me at the booth,” says Howell. “This is my only face-to-face meetings with some customers. I speak mostly over the phone.” Valuable face-to-face engagement was a benefit of ISC West, and many of those meetings will likely set the stage for continuing successes in our vibrant market. Until next year.
“Mixed reality” may seem like a strange term to apply to the physical security industry, but it describes a new approach to enable the features of access control and video surveillance systems to be used by operators in the field. Mixed or augmented reality technology combines a real-time view of the world through Microsoft’s HoloLens headset, with placement of virtual devices and controls as holograms in a three-dimensional space. Virtual Devices And Controls In effect, a security guard wearing a HoloLens headset can approach a door in his facility and see the real-time status of that door, provided by an access control system, projected as a hologram alongside his live view of the door. It’s the first implementation of a technology with many possibilities. Related to video surveillance, real-time facial recognition could provide the identity of a person walking past a security officer in a hallway, for example. Basically, the approach extends the interfaces and capabilities available in a control room to a security officer on patrol. The officer can place and interact with a variety of virtual devices and controls as holograms in the 3-D space he or she views through the headset. Augmented Reality For Integrated Electronic Security The security industry technology has been developed by CodeLynx, a software engineering and systems integration company headquartered in North Charleston, S.C. As a systems integrator, CodeLynx specialises in audio-visual and physical security design and installation for A/V, access control and video surveillance systems. A complementary business is software engineering; Darren Cumbie, Director of the Software Engineering Division, and his team provide custom integrations of various technologies. The approach extends the interfaces and capabilities available in a control room toa security officer on patrol CodeLynx has developed software to adapt Microsoft’s HoloLens product for use in the physical security field. They are bringing it to market as ARIES (Augmented Reality for Integrated Electronic Security). The software operates using Microsoft’s HoloLens, introduced in 2016, a powerful, self-contained holographic computer worn as a headset. Specialized components enable holographic computing in lockstep with advanced sensors, including five cameras. Users can move freely throughout an environment and interact with holograms that augment the reality they view through the HoloLens. Cumbie says HoloLens provides the best mixed reality headset currently available: “Nothing else has the power, usability and scalability across an organization.” AMAG Symmetry Access Control Integration In ARIES, CodeLynx has created a certified integration with AMAG’s Symmetry access control system to enable operators to view information from Symmetry as holograms in their field of view through the HoloLens. The integration extends the functioning of Symmetry to operators in the field, thus expanding the control room environment. Holograms can be created and positioned for each user, and they function just like physical devices, tied into Symmetry. Approaching a door, an operator can request a list of the last five people who came through the door, for example; he or she can see a photo ID related to each person who swipes through a turnstile. CodeLynx is looking to expand the market for ARIES using integrations with other OEMs in addition to AMAG. “Instead of being chained to their desk looking at monitors or a display wall, operators can work in the field using the full functionality of their systems as they walk throughout the property,” says Drew Weston, CodeLynx Director of Sales and Marketing. “Meanwhile, I am not sitting at a desk, I am out in public.” Holograms can be created and positioned for each user, and they function just like physical devices, tied into Symmetry At some point, the headsets will likely get lighter and more ergonomically appealing. Right now, all the computing power is inside the headset (which, even so, only weighs only 1.3 lbs). In the future, more of that computing will likely be “offloaded” to a nearby desktop or laptop computer, or even to the cloud, and wirelessly “tethered” to the headset. In addition to making the headsets lighter and more ergonomically appealing, tethering would bring down costs from the current $5,000 per headset (possibly into the “three digit” range). CodeLynx is poised to leverage any Microsoft enhancements to the HoloLens environment. Currently the software is priced at $1,500 per user. Benefits For Systems Integrators For systems integrators, ARIES could be used to simplify installations, given its ability to view camera frames through the headset hands-free rather than needing to view a separate laptop when focusing or positioning a camera. For maintenance or troubleshooting, an operations center could access the field user’s view and direct him or her to correct a problem. In this way it would be a training tool to help integrators, which is a separate value proposition from how the devices may be deployed by end users. The ARIES approach could also eventually change how we think of a control room. Instead of video screens and walls, operators might sit in comfortable chairs in rooms with white walls, viewing all the control room “screens” through their headsets as holograms. Less power consumption would be among the benefits. ARIES plans to offer a “virtual operations center” in 2018, enabling command center operation from anywhere, user-customizable layout views and the ability to push content to specific HoloLens users. This video demonstrates how interaction with holograms can drive security functions: https://www.youtube.com/watch?v=B82oAlxt5_s
Boon Edam Inc., a global provider of security entrances and architectural revolving doors, announced that a recently renovated office space in Glasgow, Scotland, 191 West George Street, has installed Lifeline Speedlane Swing optical turnstiles for increased physical security and uncompromising aesthetics. A rising trend in the United Kingdom is the renovation of older office spaces. With a continuously growing workforce, cities across the country are transforming corporate offices into multi-level spaces with increased aesthetics. In keeping with this trend, the office space at 191 West George Street recently underwent a renovation. Revamped with space and simplicity in mind, the building’s atrium stands out due to its high-quality materials, including the sleek, Lifeline Speedlane Swing optical turnstiles used to control access to all occupants and visitors. Optical Turnstiles Integrated With Access Control The requirements were for an optical turnstile solution that could integrate with access control and had the versatility to control a large number of visitorsThe lead architect renovating 191 West George Street was Michael Laird Associates – a firm that flourishes in adaptable yet luxurious designs. Working directly with the architects, owners of the office space underwent a simple product selection process regarding security. The requirements were for an optical turnstile solution that could integrate with access control and had the versatility to control a large number of visitors. 191 West George Street is the home of a 6-level building with 87,000 sq. ft. of usable office space. The architects wanted to keep the look and feel of the entire building, open and clean, without any columns or other impeding structures. The designers chose a stainless-steel finish for the modern and sleek cabinets of the Speedlane Swing optical turnstiles to provide a perfect accent for the neutral white and mushroom colors of the lobby. Their minimal footprint allows them to integrate seamlessly into any location without being obtrusive to user access or aesthetic design. Lobby Security Solution All lanes can be controlled remotely via a device called BoonTouch that gives reception control to open or close lanes at any time191 was designed to be a bustling, flexible workspace for hundreds of daily users, and as space is rented and the building starts to experience higher traffic, the four lanes of optical turnstiles will be able to handle the load. Working in collaboration with Boon Edam’s sales and specification managers, the architect had a clear idea of what they were looking for in a lobby security solution. By reviewing a number of key elements related to security, throughput, aesthetics, safety, and technology, Boon Edam was able to map out all aspects of the entry requirements prior to selection and installation. The four-lane array of Speedlane Swing optical turnstiles includes a single, wide lane at the end. Wide lanes allow large groups to pass through as well as wheelchairs, dollies and luggage. All lanes can be controlled remotely via a device called BoonTouch that gives reception control to open or close lanes at any time.
Season-ticket holders at Belgian football club RWD Molenbeek will soon find it easier to enter the stands at their stadium, thanks to facial recognition technology that is set to be introduced at the turnstiles. Although the project is still in the test phase, fans ordering their season tickets on-line can already upload an ID photo. This photo will be compared in real time with images taken by two cameras installed in the season-ticket holders’ queue at the stadium entrance, allowing supporters to enter much faster. An automatic gate will be installed in early 2019. Data Processing Facility Spectators who have forgotten their paper ticket can still enter the stadium with no problem. Those who haven't uploaded a photo, or who have borrowed an entry ticket, will still have to pass through the conventional gates and show their ticket at the turnstiles. The system was installed by Zetes using Panasonic facial recognition technology. The detection system, with its fast and reliable data processing facility, means we can install a system to speed up entry checks to the stadium" The facial recognition software applies only to the access checks, as a further benefit for season-ticket holders. Thierry Dailly, chairman of RWDM, explains: “The detection system, with its fast and reliable data processing facility, means we can install a system to speed up entry checks to the stadium.” Alain Wirtz, CEO of Zetes, adds: “This project is a perfect example of how we can benefit from the innovative capabilities provided by the Panasonic group, owner of Zetes. Zetes specialises in this identification technology, which has many different applications. We hope this project can act as a shop window for our products.” The pilot project will run for about a year. Guaranteeing Confidentiality Supporters’ photos are scanned and stored on an RWDM server, which is not connected to the Internet or to any other system. Only RWDM-authorized personnel have access to the data. Data collected by the entrance gate cameras is not recorded, guaranteeing confidentiality for the supporters. At this stage, the system is still in the test phase, and the facial recognition facility is not yet fully operational. The installation of the automatic gate at the beginning of 2019 will complete the planned program. 2017 April, Panasonic acquired a majority shareholding in Zetes and 2017 July completed the acquisition of 100% shares of Zetes. Zetes was founded in 1984, and employs 1100 employees in 21 countries in EMEA in 2016. Its headquarters is in Brussels.
Johnson Controls has announced that the Dr. P. Phillips YMCA has installed Software House’s C-CURE 9000 security and event management platform as part of a comprehensive visitor management system designed to increase security by verifying member identity and restricting access of non-members. Dr. P. Phillips’ YMCA, located in Doctor Phillips, Fla., is the largest of 27 facilities that are part of The YMCA of Central Florida. This single location serves 11,000 active members. The facility recently completed an $11 million renovation and expansion project, which also included an upgrade to the physical access control system to incorporate biometric technology to improve the member check-in process. Biometric Fingerprint Access The turnstiles help to manage the flow of visitors and identify when a person does not have membership privileges to gain accessThe comprehensive system integrates Software House C-CURE 9000 with biometric readers from iDentytech and swing glass optical turnstiles from Automatic Systems. Together, the systems manage the flow of visitors into the facility by enabling members to gain access using a biometric fingerprint reader instead of swiping an access control card. The turnstiles help manage the flow of visitors and identify when a person does not have membership privileges to gain access. Membership enrollment information resides in C-CURE 9000, which serves as the central component of the overall access control system. Johnson Controls' integration arm served as the systems integrator on the project. Accurate Accounting Of Membership Status “With the old system,” said Dan Humbert, director of IT for the YMCA of Central Florida, “the only way to tell which family center membership someone held was by the color of the barcode. With the C-CURE 9000 system that’s all automated. We can now capture the information on where they can work out directly in the system.” A major benefit of the new access control system and membership program is that it provides more accurate accounting of membership status. The system can flag out-of-date memberships, so when a person is denied access can be directed to the desk where they can pay on-site and be reinstated.
Aeroturn LLC, a turnstile manufacturer that offers 100% Made in The USA turnstiles, announced that the company was selected by Alliance Security to deliver a state-of-the-art turnstile solution for a high-profile New York based global media giant. Alliance Security is headquartered in New York and deploys a portfolio of security technology installation and managed service offerings. Alliance Security’s parent company, Alliance Building Services is comprised of Alliance Maintenance, Alliance Security, Alliance Restoration, Alliance Electrical and Alliance Painting & Flooring, which services over 60 million square feet of building space in the New York Tri-State region. Alliance Building Services holds an immense portfolio of clients across diverse industries that includes some of the highest profile organizations and real estate properties in the world. Security And Technology Solutions With an evolution spanning decades, Alliance Security has become an industry expert in security and technology solutions and was in the market for a turnstile manufacturer that demonstrated a trusted record of delivering reliable solutions to high-profile clientele. Aeroturn fit the bill perfectly. “Once Aeroturn U.S.A. validated they could accommodate and deliver technical and operational excellence in engineering and design, the Alliance Security management team was confident in selecting Aeroturn U.S.A. as the best strategic partner to deliver for our client,” states Simon Torres, Alliance Security’s head of Engineering Services. Alliance Security will now turn to Aeroturn U.S.A. in the future when seeking a reliable turnstile manufacture" For this particular project and scope, Aeroturn delivered a unique turnstile solution that complied with operational expectations and standards with products manufactured in the U.S.A. Further commenting on deployment success, Simon Torres from Alliance Security states – “Alliance Security and Aeroturn USA architecture and design needed to account for multi-area ingress and egress considerations with the goal of enhancing the employee and visitor experience – and we are happy to announce that our mission was accomplished seamlessly. Since we can classify this deployment as a tremendous success, Alliance Security will now turn to Aeroturn U.S.A. in the future when seeking a reliable turnstile manufacture that delivers design, operational and technical excellence.” Zero-Maintenance Turnstiles Aeroturn designs, manufacturers, tests, delivers, and installs the world’s only zero-maintenance standard and customized turnstiles. “We are extremely proud to have been selected by Alliance Security for this prestigious project and look forward to a long and prosperous strategic partnership in the future,” states Michael Stoll, VP of Technical Sales & Marketing at Aeroturn. The company’s customer first philosophy is the driving force behind its success. Customers and strategic partners like Alliance can rely on Aeroturn to deliver the very best in turnstile solutions.
Fastlane turnstiles have been installed at the Head Office of Allianz Insurance Plc., a leading and highly regarded general insurer in the UK market, to improve overall security and prevent unauthorized pedestrian access via tailgating and collusion. Part of the project involved the installation of six, DDA compliant lanes of Fastlane Glassgate 150 turnstiles, with an integrated Avigilon access control system and Third Millennium multi technology card readers. Access control system The main objective of the turnstiles is to ensure that staff use their access control cards correctly – preventing them from allowing access to colleagues who may have forgotten their own card, for example – while at the same time heightening security by preventing people outside of the organization simply walking in off the street to gain access to the office. Charlie Salamone, Director at AVANZA Intelligent IT & Security, commented: “The Glassgate 150 was chosen as it’s one of Fastlane’s medium security turnstiles, with pedestal-height glass barriers providing a visual deterrent to anyone considering an unauthorized access attempt, while maintaining an open feel enclosure making the units visually appealing.”
A landmark mixed-use development in Nigeria has been secured by the latest British perimeter technology. Crash-tested bi-folding speed gates with inlaid SR security-rated mesh panels have been installed at Nestoil Towers on Victoria island, Lagos, along with crash-tested bollards and blockers. Cova Security Gates from Crawley – creators of the crash-tested speed gate – won the contract to supply and install from Nigerian construction company Julius Berger. Nestoil Towers is a 15-storey mixed-use development consisting of 7,500 sq m of office space, 3,500 sq m of residential space High Performance Glass The prestigious Nestoil Towers is a 15-storey mixed-use development consisting of 7,500 sq m of office space, 3,500 sq m of residential space, a multi-storey parking facility as well as a recreational facility – and houses Julius Berger’s new corporate head office. The building form was created using gentle curved surfaces of high performance glass with horizontal tubular details which accentuate the sweeping effect of the curved façade. The arced curtain walls are further defined by a surround of solid white metal panels to complete the contemporary composition of this building. Cova were tasked to provide secure vehicle and pedestrian access and to protect access from the gatehouse for staff entrances and exits at different areas and around the main building. Security Of The Gates Cova supplied five crash-tested trackless bi-folding speed gates, one standard bi-folding gate, five rising arm barriers, four crash-rated bollards, a crash-tested shallow depth road blocker, a full-height double turnstile and a push button access control system that controlled the entire turnkey project. The gates were clad with steel fencing manufacturer Zaun’s SR2-rated Super10 steel mesh to add to the security of the gates. Cova’s design team manufactured each product bespoke to the client’s specific requirements for the project Cova’s design team manufactured each product bespoke to the client’s specific requirements for the project, because of the weight and material of the mesh, to ensure PAS68 test standards were fully met and foundation requirements, speed of opening and closing and power control were all as specified. Implement Protection All gates and turnstiles were finished in ‘Signal White’ to blend in with the design of the tower and the fence line. Cova filled three 40ft containers for shipping to Nigeria with all products tested prior to leaving the factory as part of its ISO9001 process and by Julius Berger-appointed auditors. Installation was arduous and fraught with difficulties, but once completed, a Cova engineer provided full training to Nestoil Towers security team on how to operate the gates, blockers, barriers and turnstile on a daily basis so that they could correctly implement protection in the event of a terrorist vehicle attack.
Round table discussion
Even the most advanced and sophisticated security systems are limited in their effectiveness by a factor that is common to all systems – the human factor. How effectively integrators install systems and how productively users interface with their systems both depend largely on how well individual people are trained. We asked this week’s Expert Panel Roundtable: What is the changing role of training in the security and video surveillance market?