Boon Edam Inc., a pioneer in security entrances and architectural revolving doors, announces they are emphasizing the theme of tailgating mitigation and integration in booth #1103 at the GSX (formerly ASIS) exhibition in Chicago, Illinois from September 10-12. GSX is an annual event that brings together over 20,000 participants from across the security profession for a week of networking, educational opportunities and discovering the latest security solutions. Boon Edam is also the official tur...
Smarter Security, the intelligent entrance controls company, has announced new optical technology that reduces the risk of “sidegating” when two people attempt unauthorized side-by-side entry through a turnstile. Layered security strategy Jeff Brown, Chief Executive Officer at Smarter Security, says “Security teams must approach insider threats and collusion with a layered security strategy that starts at the front lobby. This innovative optical turnstile technology available...
Despite any negativity you may hear, Hikvision is optimistic about their role in the U.S. market. “We demonstrate that we can be trusted, and that we should be trusted,” says Jeffrey He, Vice President, Hikvision, and President, Hikvision USA and Hikvision Canada. “We have sound products and technology. Our mission in the security industry is to protect, not to harm. Otherwise why would we be in this industry?” Hikvision is committed to investing in the North American m...
HID Global, a global provider of trusted identity solutions, will showcase new offerings, an industry-changing access control tool and new integrations in HID booth #11063 at this week’s ISC West in Las Vegas. The company will also participate in Security Industry Association (SIA) educational sessions and local community events during the conference. Visit the HID in booth at the Sands Expo and Convention Center from April 10-12, 2018 for live demonstrations of the company’s latest...
Turnstile manufacturers increasingly recognize the value of integrating mobile devices into their lobby security strategy to create more convenient, connected and secure experiences for building occupants and visitors. HID Global, a global provider of trusted identity solutions, announced that it has teamed up with six of the world’s top turnstile manufacturers who have tested and certified HID’s Mobile Access as part of their commitment to a mobile future. Major turnstile manufactu...
Recent technology advances – from the cloud to artificial intelligence, from mobile credentials to robotics – will have a high profile at the upcoming ISC West exhibition hall. Several of these technologies were recently designated by the Security Industry Association as the Top 8 Security Technologies for Security and Public Safety. Some of them will also be a focus at the ISC West conference program, SIA Education@ISC, April 9-11 at the Sands Expo Center. This article will highligh...
Boon Edam Inc., a global provider of security entrances and architectural revolving doors, announced they are emphasizing tailgating mitigation through integrated technologies in booth #8037 at the ISC West exhibition in Las Vegas, NV from April 10-12. ISC West is the largest security trade show in the United States, bringing together 30,000 security professionals for its 3-day event. Boon Edam is also the official turnstile sponsor of the show. Tailgating Mitigation Through Integrated Solutions While access control technologies grant or deny entry to secure areas within a facility, in order to eliminate tailgating you must ensure that only one person enters for each valid authorization,” said Tracie Thomas, Vice President of Marketing, Boon Edam. “We’re proud to be showcasing how our security entrances work hand-in-hand with leading technologies to provide unmatched access control for organizations, ensuring greater overall security.” The following solutions will be on display in Boon Edam’s booth: Tourlock 180+90: The industry’s best-selling security revolving door will feature an AMAG Symmetry card reader to demonstrate access control integration paired with the door’s uniquely high, bi-directional throughput and its ability to prevent tailgating and piggybacking without manned supervision. Circlelock Solo: Popular with Fortune 100 companies, and offering the highest level of security available in an entrance, the Circlelock security portal prevents intrusion into the most sensitive areas such as data centers. The portal will be configured to demonstrate two-factor authentication: an AMAG Symmetry card reader on the outside of the portal conducts the initial authorization, then identity verification is conducted inside the portal by the iCAM7S Series reader from Iris ID. Lifeline Speedlane Swing: The industry’s slimmest optical turnstile features a custom, integrated pedestal that incorporates the MorphoWave touchless fingerprint technology from IDEMIA. This solution enables high throughput with the enhanced security of rapid biometric identification. Lifeline Boost: The Speedlane Swing optical turnstile will be outfitted with a stylish new pedestal design from Boon Edam, the Lifeline Boost. The pedestal houses a wide range of access control activation or biometric devices and its sleek construction perfectly complements the cabinets in the popular Lifeline optical turnstile series. The Lifeline Boost will include the latest version of Essex’s credential card reader now with optical Bluetooth and OSDP capability, the iRox-T with BLE expands for HID Global’s Mobile Access solutions. BoonConnect: Both the Tourlock and Circlelock doors in the booth will feature BoonConnect, an IP-addressable, and proprietary software system providing diagnostic and configuration tools for facility managers or maintenance technicians. Users can remotely access door operations and events using devices such as tablets, laptops or smartphones via a secured corporate network. ‘Tailgating-Themed’ Prize Giveaway To celebrate their continuing position as the market leader for security entrances, according to a recent report by IHS Markit, Boon Edam is again offering a tailgating-themed prize giveaway. All visitors to ISC West are invited to participate by visiting booth #8037 during show hours. Participants have the opportunity to win a variety of prizes that will help them make the most of the upcoming tailgating season: the Big Green Egg grill, a YETI cooler and more. Winners will be selected at random after the exhibition, and an announcement will be made to all participants via email by Friday, April 26.
Boon Edam Inc., a pioneer in security entrances and architectural revolving doors, is proud to announce that their Speedlane Lifeline optical turnstiles have been certified as compatible with the new iRox-T Turnstile Reader from Essex Electronics. “Our Speedlane Lifeline optical turnstiles with the integrated iRox Turnstile Readers deliver a multitude of benefits to users,” said Kurt Measom, Vice President, Technology and Support, Boon Edam Inc. “This integration is one more way Boon Edam continues to create solutions to address the growing demands for security in busy lobbies without sacrificing speed or functionality.” Support For Multi-Technology Applications Supported technologies include standard proximity, iCLASS, iCLASS SE and MIFARE, DesFire, and EV1 & 2 for a range of access control manufacturersBy integrating iRox-T readers with powerful embedded HID iCLASS SE technology, Speedlane Lifeline turnstiles offer users a greater readability range with support for multi-frequency, multi-technology applications including HID’s most secure SEOS technology. Supported technologies include standard proximity, iCLASS, iCLASS SE and MIFARE, DesFire, and EV1 & 2 for a range of access control manufacturers. The low profile of the iRox-T readers allow for optimal placement in the Speedlane Lifeline turnstiles to support maximum convenience and throughput. This support of multiple technologies makes the Speedlane Lifeline optical turnstiles ideal for use in multiple-tenant applications, because each organization can use their preferred access credentials. This approach also supports simple migrations from existing low-frequency card systems to the latest, most secure credentials available today to strengthen and enhance facility security.
Boon Edam Inc., global provider of security entrances and architectural revolving door solutions, has announced the breadth of its 2019 technical training program, including scheduled factory trainings, online webinars and roadshow trainings throughout the United States. Technical training events are free of charge to Boon Edam distributors and integrator partners and include one to three days of intensive product instruction and hands-on exercises. Boon Edam Roadshow In 2016, Boon Edam introduced the first “Roadshow” training program with the goal of bringing the success of its bi-annual factory trainings held in Lillington, NC direct to partners in their local area. Roadshow trainings are unique in that a specially-engineered, full-size security revolving door, security portal and/or optical turnstile are sent to each training location For the 2019 training program, Boon Edam’s Training Manager, Zac Ellett, has created an improved curriculum which addresses the top five issues seen in the field for each product type, in addition to general installation, service and maintenance instruction. The Roadshow will stop in at least a dozen locations this year, focusing on areas where a large number of installations are about to occur. For this reason, the Roadshow schedule for the quarter will be released at the beginning of that quarter. Roadshow trainings are unique in that a specially-engineered, full-size security revolving door, security portal and/or optical turnstile are sent to each training location. Partners have the opportunity to work together to assemble the units and troubleshoot them on-site, gaining confidence and competence that will translate to improved performance in the field. Public-Use Revolving Doors In 2019, Boon Edam will continue to host four trainings at its factory location in Lillington, NC, with each session focusing on different product types. There will also be two AAADM A156.27 certification courses on public-use revolving doors throughout the year. Finally, Boon Edam will also provide four, free public webinars. This portable training method gives partners the convenience of learning on the road or at the office. “I’m proud to be coordinating a technical training program each year that can reach our valued partners and help them delight their customers,” said Ellett. “The response we’ve received over the past three years with our roadshow training has been overwhelmingly positive. We’ll continue to expand our training program and do all we can to support our partners.”
Integrated security manufacturer TDSi is pleased to announce the appointment of Richard Money as Distribution Channel Manager. In his new role, Richard will be a central point of contact for TDSi’s Distribution Partners including ADI, Norbain, EET Europarts, Advanced Access, Enterprise Security Distribution and Anixter. Reflecting upon his new role, Richard commented, “I am excited to be joining the TDSi team. The company has a fantastic range of products that will suit any environment, and all budgets so there is tremendous scope to work with our distributors and grow our mutual business.” John Davies, Managing Director of TDSi also commented, “We are delighted to welcome Richard to this highly pivotal role. TDSi’s products are exclusively sold through our partners and we are committed to ensuring we offer the best support and assistance to facilitate this. Richard is the prime point of contact for our distribution partners - be it for stock enquires, pricing or connecting them with our vast network of expert installer customers.” Richard has over 20 years’ worth of security experience, having joined the industry in 1997 Veteran In The Security Industry Richard has over 20 years’ worth of security experience, having joined the industry in 1997 working at Clarke Instruments Ltd promoting and selling medium to high security electric strikes, turnstiles and barriers. In 2001, he joined Gardiner Security in its access control division and stayed there for 10 years, during which time the company was bought out by ADI Global (part of Honeywell) and Richard became an Account Manager selling access control, intruder and CCTV products. In 2011, Richard moved to ACT (Access Control Technology), an Irish manufacturer of access products, as a Senior Account Manager. He worked with ACT for seven years until he made the move to Inner Range before joining TDSi. Richard concluded, “I have gained a broad experience of the security sales industry during my career and look forward to sharing my expertise that with TDSi’s distribution partners. The UK market is an energetic one, so I am available to help our distributors fully meet the demands and needs of our customers from TDSi’s extensive range of products.”
Professional grade access control technology developer and manufacturer Essex Electronics recently announced the release of the revolutionary iRox-T Turnstile Reader. The iROX-T is a multi-technology reader designed for high-security turnstile systems. It provides streamlined migration for upgrading to the most secure credential technologies by closing the gap to growing security threats with powerful, cost-effective embedded HID iCLASS SE technology that supports a wide range of credentials. The solution meets the increased demand for the highest security in busy lobbies and other environments, without sacrificing functionality or speed. Secure Credential Reading Technology “Lobby security is an increasing concern for organizations that want to close security gaps, especially in smarter and more connected environments,” said Michael Chaudoin, Vice President of Product Management and Marketing, Extended Access Technologies business unit with HID Global. “The New Essex solution with proven HID credential reading technology underscores our shared commitment to helping customers step up their access control systems with a turnstile solution that increases security while also providing efficient access for users.” The Essex Electronics dual-frequency iROX-T turnstile reader supports low frequency proximity cards The Essex Electronics dual-frequency iROX-T turnstile reader supports low frequency proximity cards, HID’s breakthrough 13.56MHz Seos credentials for advanced security, iCLASS SE, iCLASS and other high frequency formats. The reader enables easy upgrades from existing low frequency (and low security) readers to the latest flexible, most secure technology--solving the issues facing many turnstile applications by maximizing the read range necessary for high security credentials and maintaining the highest levels of turnstile throughput. Certified High-Security Turnstile Solution “The iROX-T is already tested & certified with eight of the leading global turnstile manufacturers who have embraced the value of the solution, which features a rugged design, and encapsulated electronics for streamlined upgrades that meets the higher security requirements for turnstiles,” shared Garrett Kaufman, President of Essex Electronics. “Additionally, the iRox-T is designed with the lowest possible profile to retrofit and conceal for various turnstile manufacturers and models.” Attendees can see the iRox-T in action by visiting one of the 9 global security manufacturers at GSX 2018. HID Global - Booth # 1737 Alvarado - Booth # 1023 Automatic Systems- Booth # 2535 Boon Edam- Booth # 1715 Com Infosec- Booth # 3529 Delta- Booth # 711 Gunnebo- Booth # 1431 Orion - Booth # 521 Smarter Security - Booth # 1043
Boon Edam Inc., global supplier of security entrances and architectural revolving doors, is showcasing the company’s continuing advances in technology and customer support in booth #1715 at the GSX (formerly ASIS) exhibition in Las Vegas, NV from September 25-27. With the launch of their new Interactive Troubleshooting Guides for Security Entrances, a range of new partner technology integrations and the growing adoption of anti-tailgating and anti-piggybacking entrances by Fortune 50 Global companies, the company is advancing its position as the market leader in the Americas in security entrance solutions. Global Security Entrances Supplier “Boon Edam has held the top position for security entrances in the Americas since 2012 according to IHS Markit reports,” said Greg Schreiber, Senior Vice President of Sales, Boon Edam, Inc. “Serving our customers and this industry with stronger, safer options for protecting entrances from tailgating and other unauthorized incursions will always be our first priority.” Boon Edam’s focus on providing unsurpassed support for its service partners was the impetus for the launch of the company’s new interactive troubleshooting guides. Created to help accelerate the diagnosis and problem-solving process for service technicians in the Americas, the guides are available to any registered technician with internet access and will greatly assist in performing service on three of Boon Edam’s most popular security products: the Circlelock mantrap portal, the Tourlock security revolving door and the Speedlane Lifeline optical turnstile series. Boon Edam At GSX 2018 Show attendees will be able to test drive a number of Boon Edam products first-hand on the show floor, experience their advanced tailgating prevention technologies, as well as their ease of use and convenience. Tourlock 180+90 And Circlelock Security Portal The Circlelock security portal prevents intrusion into the most sensitive areas such as data centers Several of Boon Edam’s highest-level security entrances will be featured in the booth, including the Tourlock 180+90, the Circlelock security portal, and the Circlelock Combi. Integrating Boon Edam’s best-selling security revolving door with an AMAG Symmetry card reader, the Tourlock 180+90 pairs access control integration with high bi-directional throughput to prevent tailgating and piggybacking without manned supervision. With the highest level of security available in an entrance, the Circlelock security portal prevents intrusion into the most sensitive areas such as data centers. The Circlelock demonstration incorporates two-factor authentication with an AMAG Symmetry card reader on the outside of the portal plus an iris scanning technology from Iris ID to confirm identity. Circlelock Combi Half-Portal Boon Edam’s newest entry, the Circlelock Combi is a half-portal that transforms an existing swinging door into a high security mantrap entrance that prevents piggybacking – saving both space and renovation costs. At GSX, the half portal will demonstrate two-factor authentication, using an AMAG Symmetry card reader plus facial scanning technology from StoneLock Pro. Lifeline Speedlane Swing Turnstiles Also, on display is the New Lifeline Boost access control pedestal Other security entrances being demonstrated in the Boon Edam booth include the Lifeline Speedlane Swing, the industry’s slimmest optical turnstile, with MorphoWave touchless fingerprint technology from IDEMIA for high throughput with fast biometric identification. Also, on display is the New Lifeline Boost access control pedestal. The Boost is suitable for the integration of a variety of access control systems, ranging from card readers and barcode scanners to various biometric devices. BoonConnect IP-Enabled Software Booth visitors will also be able to learn about BoonConnect, an IP-addressable, proprietary software system providing diagnostic and configuration tools for the Tourlock security revolving door and Circlelock mantrap portal. Speedlane Open Optical Turnstile Once again, Boon Edam is the official turnstile sponsor of the GSX show. This year, the company is featuring the sleek Speedlane Open, a new, barrier-free optical turnstile designed for deterring casual intrusion attempts.
The extensive analysis and discussion preceding any decision to implement a new physical security solution – whether it’s hardware, software or a combination of both – often focuses on technology, ROI and effectiveness. When it comes to deciding what type of security entrances to install at your facility, you will almost certainly also consider the aesthetics of the product, along with throughput and, if you’re smart, you’ll also look into service concerns. Each of these factors has its important place within the evaluation process, and none should be overlooked as they all have a significant effect on how well your entrances will perform once they are installed. Culture Influences Door Solution Decisions How significant will the change from current entrances to security entrances be for employees? Still, one additional factor actually trumps everything: if you have not considered your organization’s culture in choosing a security entrance, you may be missing the most important piece of the puzzle. Culture is a part of every other decision factor when selecting an entry solution. Before you make a decision about what type of entrance to deploy, you need to consider and understand the values, environment and personality of your organization and personnel. For example, how significant will the change from current entrances to security entrances be for employees? If people are accustomed to simply walking through a standard swinging door with no access control, this will be a culture change. Beyond this, whether you are considering a type of turnstile, a security revolving door or possibly a mantrap portal, simply walking through it will be a significant change as well. Training Employees On Door Security You’ll want to know whether employees have ever used security entrances before. If these types of entrances are in place in another part of the facility, or in a facility they’ve worked in at an earlier time, the adjustment will not be as great as if they’ve never used them at all. Consider, too, how your personnel typically react to changes like this in the organization or at your facility. They may be quite adaptable, in which case there will be less work to do in advance to prepare them. However, the opposite may also be true, which will require you to take meaningful steps in order to achieve buy-in and train employees to properly use the new entrances. With the increased importance of workplace security, discussing new entrances with workforces will help maintain a safer environment Communicate Through The Decision-Making Process All of this will need to be communicated to your staff, of course. There are a number of ways to disseminate information without it appearing to come down as a dictate. Your personnel are a community, so news about changes should be shared rather than simply decreed. As part of this process, you’ll need to give some thought to the level of involvement you want for your staff in the decision-making process. Finally, do not overlook the special needs among your personnel population. You undoubtedly have older individuals on staff, as well as disabled persons and others who bring service animals to the office. Entrances need to be accessible to all, and you never want to be in the position of having a gap in accessibility pointed out to you by the individual who has been adversely affected. New Security Entrance Installation By communicating early and often with your personnel, you can alleviate a great deal of the anxiety Once you have made the decision about which security entrances to install, training your personnel on how to use the new security entrances – both before and after the installation – will help to smooth the transition. Because workplace security is such a big issue right now, it makes sense to discuss the new entrances in the context of helping to maintain a safer environment. They will prevent violent individuals from entering, decrease theft, and most of all, promote greater peace of mind during the workday. If you can help them take control of their own safety in a responsible way, you have achieved much more than just a compliant workforce. By communicating early and often with your personnel, you can alleviate a great deal of the anxiety and concern that surrounds a significant change in the work environment. Schedule Group Meetings Consider your employees; what type of communications do they respond best to? A few suggestions to educate staff on the benefits of the new entrances include: Typically, you would communicate a general message 2-3 months in advance and then provide more specific information (for example, impacts to fire egress, using certain entrances during construction) in a follow up message closer to the installation date. Schedule group meetings to: announce the rationale for increased security, share statistics on crime, review the new security changes that are coming, show drawings/photos of the new doors/turnstiles, and show the orientation videos available from the manufacturer. These meetings are an excellent way to work through user questions and directly address any concerns. Once the installation of a new security system is complete, it is a good idea to have an "ambassador" on board to help employees use these new systems Ensure You Monitor Public Areas If you are implementing a lot of new changes, such as a new access control system, new guard service and security entrances, you might consider hosting a ‘security fair’ on a given day and have the selected vendors come for a day with tabletop displays to meet employees and answer questions during their lunch. This could be a great way to break the ice in a large organization. Make user orientation videos (provided by the manufacturer) available in several ways, for example: Intranet Site Monitors in public areas—lounges, cafeteria, hallways, etc. Send to all staff as email attachments Immediately after installation, once the doors or turnstiles are operational but before they are put into service, train ‘ambassadors’ on how to use the door/turnstile. Have these people monitor and assist employees during peak traffic times. What Is The Ultimate Success Of The Installation? By communicating clearly and openly with your population you can greatly facilitate adoption and satisfaction If you have thousands of employees, consider dividing them into groups and introduce the new entrance to one group at a time (Group A on Monday, Group B on Tuesday, etc.) to allow a little extra orientation time. Place user education ‘quick steps’ posters next to the door/turnstiles for a few weeks to help employees remember the basic steps and guidelines, e.g., ‘stand in front of the turnstile, swipe badge, wait for green light, proceed.’ Ask your manufacturer to provide these or artwork. While there are always going to be people who are resistant to change, by communicating clearly and openly with your population you can greatly facilitate adoption and satisfaction. Your responsiveness to any issues and complaints that arise during and after the implementation is equally fundamental to the ultimate success of the installation.
In the wake of 9/11, the Federal Government’s secure-the-fort, big idea was to create an identity credential for all federal employees and contractors. Homeland Security Presidential Directive (HSPD)-12 set it all in motion. Today, we know the smartcard-based credential that arose from HSPD-12 as the Personal Identity Verification (PIV) card. The PIV card is meant to give employees/contractors physical access to federal facilities and logical access to federal information systems. While using a PIV card for logical access has been largely successful and compliant with HSPD-12, implementing PIV-based, physical access control systems (PACS) has been much more difficult to conquer. As a result, HSPD-12 compliance for PACS has largely eluded the Federal Government. The noncompliance reasons are many, but there is now hope for fully achieving HSPD-12’s mandates. Interoperability With Any Agency’s PIV Beyond Passports, PIV cards represent the only other open-standards-based, multi-vendor-supported, identity credential program on the planetAll Executive Branch employees and long-term contractors, including the entire Department of Defense, have been issued PIV cards. This has been true since 2013. Beyond Passports, PIV cards represent the only other open-standards-based, multi-vendor-supported, identity credential program on the planet. It seems so simple, where employees/contractors previously used their proximity card to open a federal facility door or go through a turnstile, they should now be able to use their PIV card. However, HSPD-12 took the PIV requirement one step further – compliant PACS must be interoperable with any agency’s PIV. This introduced an entire magnitude of additional complexity. A compliant, interoperable, PIV-based PACS should work like this: an authorized employee (or contractor) presents a PIV card (contact or contactless) to a card reader to enter whichever federal agency building they have reason to be. Over the last 14 years, in all but a very few cases, the lack of PACS’ HSPD-12 compliance has prevented this from happening. Secure Credential Policy Today, less than 1% of the Federal Government’s PACS are HSPD-12-compliant. At most federal facilities, especially those outside the National Capitol Region, a noncompliant PACS works like this: an authorized employee (or contractor) presents a proximity (‘prox’) badge to a proximity card reader to enter his or her agency’s facility. At the fraction of federal facilities with upgraded PACS that work with PIV cards, virtually all such PACS fail to properly use a minimum number of PIV security features before granting access – let alone interoperate with a PIV card from any other agency. Active government solicitations are issued for new, non-compliant, proximity-based systems that perpetuate the delay to HSPD-12 complianceNew federal initiatives frequently suffer from having no policy to enforce their roll-out. That isn’t the case with PACS compliance. Policies have been in place for so long that newer policies like Office of Management and Budget (OMB) M-11-11 (February 3, 2011) remind everyone what the policies said in 2004 and 2006. This year, OMB publicized its proposed OMB M-18-XX (Draft), which will replace M-11-11. OMB M-18-XX’s (Draft) main PACS thrust is, once again, to ensure that everyone understands what the Federal Government’s secure credential policy is. It hasn’t changed since 2004. It would be tempting to say that PACS technology isn’t mature, but that isn’t the case. In 2013, the Federal Government revamped the PACS portion of the FIPS 201 Evaluation Program and, since that time, all PACS on the General Services Administration’s (GSA) Approved Products List are 100% compliant and interoperable. Yet, on any given day, active government solicitations are issued for new, non-compliant, proximity-based systems that perpetuate the delay to HSPD-12 compliance. The usual suspects, policy and technology, are not the culprits for this epic delay. An authorized employee presents a PIV card to a card reader to enter whichever federal agency building they have reason to be Difficulties In Adopting HPSP-12 Compliance For PACS Standards – The Federal Government’s approach to standards is to avoid a great deal of specificity. It’s an unspoken tenet that federal standards must be flexible, promote innovation and avoid disadvantaging any participating market segment. The opposite is true if your goal is interoperability: nearly every detail must be specified. Consider the standards-based success story of chip-based credit cards. When was the last time you used a credit card and it didn’t work? Interoperability failures are nearly unheard of. If you look at the hundreds of volumes of technical specifications that cover minute aspects of every component in credit cards and payment terminals, you quickly realize why it works so well. Nothing is left to chance, nothing is a variable, and there is no optionality. The Good News: Work to increase viability through deep scrutiny has progressed in recent years. The GSA APL PACS Testing Lab, set up in 2013, annually tests credentials from all PIV issuers against all GSA-approved PACS. This testing has significantly reduced interoperability failures at federal facilities. Collaboration – In the past, physical access practitioners from federal agencies rarely collaborated, unlike their logical access counterparts. This is also true for PACS procurement decision-makers across agencies and facilities. The Good News: In 2018, an agency trend has emerged where finally physical access, physical security and IT practitioners have begun sitting down to discuss their shared responsibilities. We have already begun to see coordinated budget requests between IT and Security with enterprise architectures positioning PACS as an enterprise service on the network Scale – The Federal Government owns so many buildings that they can’t be counted. Google doesn’t know how many there are and neither does any one government official. Variability – A significant percentage of facilities have unique aspects making a one-size-fits-all approach infeasible. The Good News: Mature consulting services can now help agencies marry federal requirements with their unique environments to develop robust PACS enterprise architectures. As we see this occurring more and more frequently, a repeatable, achievable, systems-based upgrade of all PACS may be on the horizon. The GSA APL PACS Testing Lab annually tests credentials from all PIV issuers against all GSA-approved PACS Provenance – In many cases, different groups own different parts of a single facility, not all of whom might be subject to, or wish to interoperate with, a high-assurance compliant PACS. For example, GSA manages facilities for Legislative and Judicial tenants who aren’t subject to HSPD-12. Policy dictates that GSA manage the PACS for the front doors of these facilities should be HSPD-12-compliant, despite the fact that these tenants likely don’t have credentials that work with this technology. Sure, these tenants could commercially obtain a PIV-I credential, but almost none have. Economics – It’s difficult for agencies to create their annual security budget requests when HPSD-12 PACS upgrades are in scope, because so many unknowns exist at each facility. To assess the cost, the time to complete, and the facility’s existing equipment inventory, it would be logical for an agency to hire a contractor with PACS expertise to perform a site assessment. Having to do capital planning for an assessment phase in advance of making the annual budget request for the PACS upgrade creates a never-ending cycle of delay. Especially at agencies with multi-year capital planning requirements. Many agencies, trying to avoid this delay cycle, have fallen prey to doing site assessments themselves. This results in their integrators doing their walk-throughs after the contract is awarded. This is the leading cause of PACS upgrade cost overruns. Dependence on the agency’s IT department – Historically, PACS have been deployed on dedicated networks and are rarely ever connected to the enterprise, let alone the Internet. High-assurance PACS that validate credentials from other agencies must now communicate with many different systems on an enterprise network and over the Internet – so much so that the Federal Government reclassified PACS as IT systems. The Good News: With collaboration increasing between Physical Security Officers (PSOs) and Chief Information Officer (CIOs), we expect this to improve in due course. Resistance to change – This is a classic human factors challenge, and it’s a big one. PSOs have spent decades achieving their positions. PIV-based PACS could not be more different from the technologies that proceeded it, and such radical change is often resisted. When the value proposition is clear, change is adopted more readily. But security value isn’t easily measured or observed. It is often said that the best performance review for a PSO is to note that nothing happened. And when something does happen, it is necessarily kept quiet so the risk can be remediated without calling attention to the vulnerability in the interim. To date, the value proposition of moving to PIV-based PACS has been entirely based on policy (without corresponding funding in most cases) and through the shock value of white hat hackers, showing how easily most proximity badges can be cloned. This is not the stuff of change agents. PIV-based PACS could not be more different from the technologies that proceeded it, and such radical change is often resisted Are These Challenges A Unique Situation? No, these PACS challenges are not unique. Cybersecurity initially faced many of the same challenges that federal PACS face today. By 2000, the Federal Government recognized its urgent need to improve cybersecurity practices across its computing infrastructure and issued many policies that required agencies to improve. Improvement was sparse and inconsistent. GSA Schedules were set up to help agencies buy approved products and services to assist them, but this too produced lacklustre results. The Federal Government found that the best cybersecurity results occurred when enforced at the time an agency commissioned a system Congress enacted the Federal Information Security Management Act of 2002 (FISMA) (now amended by the Federal Information Security Modernization Action of 2014). FISMA mandates an Authority To Operate (ATO) accreditation process for all information systems. The Federal Government found that the best cybersecurity results occurred when enforced at the time an agency commissioned (vs. purchased) a system. FISMA and ATO accreditation has been highly successful when implementing new systems. These cybersecurity requirements are the closest thing that the Federal Government has to the ‘PIV Police’ today. However, the PIV requirements in FISMA and ATOs currently apply to only logical access for information systems. The proposed OMB M-18-XX (Draft) mentions that a FISMA PACS overlay to NIST SP 800-53 is forthcoming. The intent of the PACS overlay is to use the army of ATO accrediting officials in the Federal Government and enable them to assess implemented PACS as fit for purpose. This is the first time an enforcement approach has been brought forward that could reasonably succeed. How Long For HSPD-12 Compliance? We know that it won’t take another 14 years to achieve HSPD-12 compliance. Pockets of compliance are popping up. Compliant procurements do exist, and the state of PACS across the Federal Government is better in 2018 than in any previous year. Progress to date has been at a constant rate. The question is: what would take for progress to occur at an exponential rate instead? A major attack or compromise involving PACS would certainly hasten upgrades, but let’s hope that’s not the solution. The energy distribution sector has been riding a wave of security upgrade demands to retrofit their facilities across the U.S. The energy distribution sector, under nearly constant Advanced Persistent Threat attacks, has been riding a wave of security upgrade demands to retrofit their facilities across the U.S. The potential threat exists for Federal Government facilities as well. Looking into the federal PACS-compliance crystal ball, we’re beginning to see the faint outline of a multi-faceted campaign of education, budgetary oversight and accreditation of PACS that will ultimately see us past the tipping point. Consider though, at the current rate of PACS enablement, a 50% compliance rate is still far in the future. When that day arrives, the PIV card form factor may no longer be the key that fits that future lock. (Are you already using a mobile device’s Bluetooth interface to open the door to your office building?) Taking decades to perform a technology upgrade is the aging elephant in the room no one talks about. By the time critical mass is achieved with an upgrade facing these many challenges, there are typically compelling reasons to start over again with the next generation of technology. That cycle may well prove to be the Federal Government’s biggest PACS challenge of all.
Mobile access is probably the largest emerging trend in the security marketplace, but it is only one of several that are changing the face of the access control market. Another factor showing potential to change the market is the emergence of location systems and positioning systems, as reflected by HID Global’s recent acquisition of Bluvision, a provider of real-time location tracking system for assets and employees, and building information modeling (BIM) is impacting how consultants do their jobs. We gathered together several consultants, and a representative of HID Global, to discuss these topics. Participants were Chris Grniet of Guidepost Solutions, Brandon Frazier of Elert & Associates, Terry Harless of Burns & McDonnell, and Harm Radstaak, HID Global’s Vice President and Managing Director, Physical Access Control. Future Of Mobile Access Technology SourceSecurity.com: How is mobility affecting end-user implementations and the way you consult? How has Mobile Access technology affected the way you approach projects? Chris Grniet: I don’t think I am designing a single project now where we are not using a mobile credential. But the industry has been transitioning slowly to frictionless access. We looked at it 20 to 30 years ago, when we started looking at asset tracking with RFID and antennas around doors, and all of that. We are starting to see new products emerge from HID and others for personnel tracking. I think our society has progressed, and we understand that the electronic component of our lives is attached to us – not embedded yet, but attached. Everybody has that electronic device, and it’s making it a lot easier. We have implemented products for mobile credentialing for large corporations. We are really looking forward to the visitor management component of that. It will make visitor management so much easier. We need to keep it affordable. But it’s going to be there. I am designing projects now with 20 to 30 turnstile entrances to a headquarters building. We are putting in visitor management kiosks. I don’t want a single visitor to have to use those at the end of the day. I want to push the credentials out. Unless they weren’t registered, they should be able to walk through the door because they are a trusted individual. We’re moving toward frictionless access, and that’s a big component of it. Terry Harless: Personally, I haven’t had any projects that use any mobile applications as of yet. I have tried to design them on a couple of projects as an alternate, mainly at tech-heavy firms where they understand technology. For the most part, it has always been value-engineered out because of the price, and also because some of these are smaller companies. Some of the mobile applications have larger license packs, for a hundred or more licenses. That’s my experience. "I think we have yet to see the advantages; people are still imagining what the full potential is of location services" Brandon Frazier: One of my biggest verticals is higher education. I really see mobile credentials being big in that space. I see students, and they have their phones and a little holder in the back for credit cards, and that’s it. That’s all they have. I think the idea of carrying another student ID won’t fit in the phone. I really see very specific verticals having great benefits from mobile. In terms of master planning, I have seen the cost of entry as being very expensive: the cost of replacing readers, the cost of replacing downstream devices. But if I’m doing large projects, I am always spec’ing in at least the mobile infrastructure, so they can add the credentials later. Harm Radstaak: It’s fair to say we have learned a lot as HID in the mobile access space. As a supplier, our operational model behind the scenes has completely shifted from producing a card, encoding a card, shipping a card. Now we are issuing over the air, revoking over the air. Our IT infrastructure and the way we serve end users though our IT infrastructure has had substantial investments. Moving into the mobile access space, the requirements are higher. Is it residing in the cloud? How are we going about compliancy, privacy, security? More important, if it’s residing on your phone, questions are being asked by end users. How trusted is this? All these areas are important for HID. That’s on the operational model. The other challenge we have is the variety of phones across the world. There are development challenges to support a substantial portion of the phones worldwide, and all the diverse operating systems. Challenges And Benefits Of Location Services SourceSecurity.com: What are your thoughts on location services / indoor positioning services? Grniet: Indoor positioning services should be integrated into a security platform that is pre-existing in an environment or will be deployed in an environment. There are plenty of location type services out there, whether in hospitals or factories. The signals have to be right, what we’re using as a tracking device has to be right, etc. I see some of the legacy systems laying to waste because it’s an extra set of management tools. So you need integration into the pre-existing or future systems to be deployed. We need to get everything fully integrated in a unified fashion, so we are operating on a single platform without an extraneous management platform. I think we have yet to see the advantages; people are still imagining what the full potential is of location services. It’s going to play into facility usage, area usage, safety, security, mustering; all of those things are going to be very important. Frazier: I see a lot of potential in specific verticals and employee groups. Let’s use guards as an example: The real-time ability to locate a guard, associate that with nearby assets, using analytics, tying data together, aggregating it, putting that to a body and being able to provide a faster response time. I see that coming, but I think the cost of entry will be too high. I used to do a lot of work in healthcare as well, and the cost of entry is extremely high in tracking services. So we need to find a better way to do it. GPS is great; I don’t know if you can get that in buildings. Adding sensors every 20 feet, triangulation, it’s just not the best solution. Grniet: With GPS we still have the height issue, especially in tall commercial buildings. So I can tell where you are on the X and Y coordinates, but not on the Z axis. That’s a big challenge. So having that built into a facility, then we can talk about asset security and asset tracking. That will be the fundamental component of how we sell it to the security side of the business. Radstaak: I think it’s fair to say HID is very excited about location services. It’s one reason we went out to acquire a company like Bluvision. It’s not GPS, but Bluetooth Low Energy (BLE)-enabled location services. This ties into a couple of things we discussed before. You can look at it from a space utilization perspective or workplace optimization, or sustainability, for cost savings in a large corporation. We have had discussions in the pre-acquisition phase about how it would fit with our portfolio and our offerings. HID can provide additional physical and security services. For us, it’s a natural extension. Harless: My experience is in the correctional field, where we have been using [indoor positioning] for 10 to 15 years, either for officer safety or tracking inmates. It hasn’t necessarily been very accurate. You know when a guy walks into a room because you have a detector above the door. The more expensive ones were triangulated, but they were very pricey and unaffordable unless you had some sort of funding. It has been around, and I am glad they are working it into some of the commercial spaces now. It could be very useful. Indoor positioning services should be integrated into a security platform that is pre-existing in an environment or will be deployed in an environment BIM Applications And Trends SourceSecurity.com: What are your thoughts on building information modeling (BIM) processes and how important are they for consultants? Radstaak: As a supplier, we see it as an increasing request and requirement in the consultant space – some regions lead more than others. In the United Kingdom, all critical mass infrastructure projects have to be specified based on the BIM model. So HID and Assa Abloy have invested quite substantially over the last few years in making our products compatible with BIM modeling. We support it with tools such as Assa Abloy Openings Studio. As a supplier, we see it as an important trend and a way we can support the consultant market. Harless: For a consultant, it helps tremendously in a couple of ways. First of all, we can pull our building materials straight out of the model. Another thing is, a lot of architects and owners like to walk through buildings and look what’s on the ceilings, on the walls. When you are showing them where the cameras and card readers are going to be (in a BIM model), it’ll give the architects a good idea of what they are going to see when the building actually gets built. They can tell us where to move stuff. Grniet: To that end, the inception of BIM wasn’t about 3D modeling in CAD, it was about tracking of assets, and understanding everything that was on the ground. It has taken us into: Where are the intersections on construction, so we don’t have pipes running where ducts should be, and is my security equipment going where glass is? If you couldn’t read the plans, we have a BIM model to show you. You talk about seeing what a building will be like, but clients have a hard time envisioning that, seeing beyond the paper, because they are focused on another business – that’s not what they do. So we are utilizing some of the tools being provided out there by firms like HID to put the toolkit for BIM modeling in there. We’re also using it for camera focusing. It helps me get a better idea of what I’m going to see in my final product and then show the client. This is why we are focusing a camera in this area. It goes back to sustainability, asset tracking, maintenance, all those things we have talked about under other product categories. "The future will be security of your software, security of your credentials and your card readers" Frazier: When BIM is properly implemented, it has made our workflow very efficient. We have found it has been very helpful in our personal design, as Chris said. When we are trying to model a camera, we can see the space. But as a project team architect, if it is not properly implemented or misunderstood, it has created a lot of extraneous tasks for us. And has made us very inefficient. Some people are very good at it, and the process goes really well. Other times we find people concentrate too much on collisions and it doesn’t end up like that in the field, or we design it one way and it ends up another way. It’s very helpful to us in our personal design, but as a project team, it can cause difficulties. Grniet: Just to add on to that point: We are still having trouble making the companies that manufacture BIM systems understand security’s role in the overall process. It’s easy for an architect to say I have strikes and hardware sets in my BIM model, but it’s under the architectural model. Security lies in this middle ground. We’re electronics, we’re low-voltage. The intersections, the toolkits, everybody’s got a great Revit model of their product, but it’s not in any of the toolkits. We have to build our own. The industry as a whole has a challenge to find the right place to be. Some people are using the MEP (mechanical, engineering and plumbing) model for Revit, some people are using the architectural model. But we have to build our own toolkits, so it’s still a challenge. Harless: At Burns and McDonnell we have it a little easier because we work with our internal architects. So we do have those tools actually built in-house. When we go to an outside or a third-party architect, to MEP firms, we have the same issues. Sometimes they will delete ceilings or walls instead of moving them, and then we have stuff all over the place. Future Trends For Physical Access And Identity Technology SourceSecurity.com: What do you think the identity technology industry as a whole should pay attention to over the next one to three years? What is your vision for the future in physical access or the office space of the future? Grniet: It’s about convergence of multiple areas of business, security of that convergence, the identification and the operability, and unified platforms to allow single vision, reduced resources and fully effective control and management of security, life safety, building management, you name it. Frazier: To sum it up: Cybersecurity and unification will drive migration basically. We need a more cybersecure solution, which will drive migration to other solutions, and that’s when conversations about global, logical security, what else can I do with this? Single sign-on. The big picture will drive a lot of this. Radstaak: The consolidation of technology from different industries will be substantial. It could come from the IT infrastructure, it might come from identity providers who are not currently operating in the security space. I think we currently don’t see yet the substance and the impact of the data analytics and how we can use that in security and broader applications. The services component will be substantial. Harless: The future will be security of your software, security of your credentials and your card readers. And integration, integration, integration. Grniet: And let’s not forget frictionless access. Read part 3 of our Consultants' Forum series here Read part 3 of our Consultants' Forum series here
Activity slowed on the last day of ISC West in Las Vegas, but there was plenty of momentum remaining and plenty more to see. In the end, Reed Exhibitions declared 2018 the biggest and most successful year to date for the show. There were an additional 4,000 square feet of exhibit space compared to last year and a 6 percent growth in overall attendance, according to Reed. The cloud, biometrics, deep learning and other technologies were among the big topics at the show, and even smaller exhibitors were pleased with the results. In particular, emerging technologies were successfully highlighted. Cloud-based Video Systems Cloud video company Eagle Eye Networks announced multiple new offerings at ISC West. One was the first cloud-based video system that accommodates HD-over-coax cameras using the HD-TVI protocol to operate over existing coaxial cabling. In effect, cameras connect with an HD-TVI recorder, which plugs into Eagle Eye Networks’ on-site hardware “bridge” connecting to the Internet. Eagle Eye Networks has also integrated Hikvision body-worn cameras into their cloud system; transmitting video using the Eagle Eye Bridge ensures end-to-end encryption and the evidentiary integrity of the video. Analytics in the cloud can be turned on and off at will for each camera, and could be deployed over a weekend and switched off the following week “A few years ago, fewer customers were ready to adopt the cloud,” says Ken Francis, President of Eagle Eye Networks. “Now market adoption is changing, and customers don’t want on-site hardware. End-users are driving the move to cloud systems.” He estimates the evolution is about halfway complete, and Eagle Eye Networks continues to sign up new dealers every month because their customers are asking for the cloud. Eagle Eye Networks’ third new offering at ISC West is “analytics in the cloud,” including familiar analytics such as intrusion, people counting and loitering. Francis says the economics of the cloud make implementation of analytics much more affordable – about $4 per camera. The economics of the cloud make implementation of analytics much more affordable Augmented Identity: Biometrics In Security Analytics in the cloud can be turned on and off at will for each camera. For example, analytics could be deployed over a weekend and then switched off the following week. “It’s a far more economically attractive and cost-effective service than on-site,” says Francis. Biometrics continue to make their way into the mainstream of the security market, and IDEMIA brought its message of “augmented identity” to ISC West. IDEMIA (formerly OT-Morpho) provides systems to the largest biometrics users in the world, including big customers such as the FBI and Interpol, and large-scale government projects around the globe. “If you can handle projects that big, enterprise applications are no problem,” says Gary Jones, Vice President, Global Channel & Marketing, Biometric Access & Time Solutions. He says that the company’s technologies apply to any vertical market, and they are especially common in major airports and big financial institutions, in addition to government. The company’s MorphoWave product allows users to wave their hand, and the system captures a three-dimensional shape of fingerprints. The touchless system is also “frictionless” -- it enables fast decision-making that promotes high throughput rates. Artificial Intelligence Applications AI and deep learning have been big topics of conversation at ISC West, and I saw a company on the last day of the show with a different take on the subject. BrainChip uses a type of AI called “spiking neural networking” that models the operation of neurons in the human brain - in contrast to “convolutional neural networks,” which use a series of math functions to train from pre-labelled data sets. The BrainChip Studio software can search vast amounts of video footage rapidly to identify either faces, patterns or objects. Applications are in law enforcement, counter-terrorism and intelligence agencies.The BrainChip Studio software can search vast amounts of video footage rapidly to identify either faces, patterns or objects “We search for specific things,” said Bob Beachler, Senior Vice President, Marketing and Business Development. The software can search hundreds of live or recorded camera feeds for a unique graphic pattern on an item of clothing or on a bag carried by a person, for example. The technology only requires modest processing power and consumes little energy, so it can be used with legacy systems without requiring hardware or infrastructure upgrades. Emerging Technology Zone A new Emerging Technology Zone at ISC West included participation by around 40 companies that are startups and/or new to the security industry. The section opened an hour before the main show floor and was located near the registration area, which increased traffic. “Generally speaking some people said it was hard to find, but I think it’s better for us as someone new to the market, rather than being on the main floor where you can get lost in the shuffle,” said Jeffrey Weiner, Vice President, Networks & Business Solutions, at Mersoft. “It was really smart that they opened this an hour earlier.” Mersoft, one of the Emerging Technology Zone exhibitors, has developed a software product to help the security industry do a better job of streaming live video. The software eliminates the startup delay and lag in live video. With dedicated software, video can be consumed by a browser or mobile app more easily Live Video Streaming “We accomplish that in two ways,” says Weiner. “One, we don’t trans-code the video into another format. Instead, we convert a security camera’s video from RTSP (real time streaming protocol) to WebRTC (Web Real-Time Communication), an open-source technology that has been used extensively in video conferencing, but not so much in security. The video can be consumed by a browser or mobile app more easily, and we don’t need a player on the client, which is another way we reduce lag.” Another advantage is that WebRTC is natively encrypted; every packet is encrypted. In contrast, applications that transmit RTSP have to be wrapped in a VPN (virtual private network) tunnel, which takes some effort to maintain and is a battery hog on a mobile device. Also, multi-casting of video is easier, even using streams of various resolutions. Mersoft works through partnerships, offering a cloud-hosted service on Amazon and a version that can be installed on a local server. They have worked with several DIY camera sellers (who use cloud services), and with some major commercial service providers. “A new partnership strategy we are exploring is with systems integrators, who can incorporate Mersoft and provide a differentiator by improving their video performance,” says Weiner. The 22-year-old company is new to security, and ISC West provides opportunities for in-depth conversations preparing for a future in the security sector. Customizable Turnstile Solutions Delta highlighted their new designer series turnstiles, whose colorful appearance led booth visitors to ask about customization Even the smaller companies, located toward the back of the hall, were enthusiastic about ISC West this year. “The show has been great,” says Vanessa Howell, project manager of Delta Turnstiles. “We did get a lot of traffic. I am a niche product, so it’s not so much about quantity as quality [of leads]. I had great quality at the show.” Being away from competitors, which are grouped next to each other in the front of the hall, was an upside of the turnstile company’s booth location toward the back. Delta highlighted their new designer series turnstiles, whose colorful appearance led booth visitors to ask about customization. “They ask: ‘Why are turnstiles only sold in basic models?’” says Howell. “’Why can’t they look like a piece of art since they are the first thing people see when they enter a building?’ People are very open to making them prettier.” Delta Turnstiles has been coming to ISC West since 2006. “I have manufacturer’s reps, and this is one of two times I get to see them in one place, and they bring a lot of customers to me at the booth,” says Howell. “This is my only face-to-face meetings with some customers. I speak mostly over the phone.” Valuable face-to-face engagement was a benefit of ISC West, and many of those meetings will likely set the stage for continuing successes in our vibrant market. Until next year.
“Mixed reality” may seem like a strange term to apply to the physical security industry, but it describes a new approach to enable the features of access control and video surveillance systems to be used by operators in the field. Mixed or augmented reality technology combines a real-time view of the world through Microsoft’s HoloLens headset, with placement of virtual devices and controls as holograms in a three-dimensional space. Virtual Devices And Controls In effect, a security guard wearing a HoloLens headset can approach a door in his facility and see the real-time status of that door, provided by an access control system, projected as a hologram alongside his live view of the door. It’s the first implementation of a technology with many possibilities. Related to video surveillance, real-time facial recognition could provide the identity of a person walking past a security officer in a hallway, for example. Basically, the approach extends the interfaces and capabilities available in a control room to a security officer on patrol. The officer can place and interact with a variety of virtual devices and controls as holograms in the 3-D space he or she views through the headset. Augmented Reality For Integrated Electronic Security The security industry technology has been developed by CodeLynx, a software engineering and systems integration company headquartered in North Charleston, S.C. As a systems integrator, CodeLynx specialises in audio-visual and physical security design and installation for A/V, access control and video surveillance systems. A complementary business is software engineering; Darren Cumbie, Director of the Software Engineering Division, and his team provide custom integrations of various technologies. The approach extends the interfaces and capabilities available in a control room toa security officer on patrol CodeLynx has developed software to adapt Microsoft’s HoloLens product for use in the physical security field. They are bringing it to market as ARIES (Augmented Reality for Integrated Electronic Security). The software operates using Microsoft’s HoloLens, introduced in 2016, a powerful, self-contained holographic computer worn as a headset. Specialized components enable holographic computing in lockstep with advanced sensors, including five cameras. Users can move freely throughout an environment and interact with holograms that augment the reality they view through the HoloLens. Cumbie says HoloLens provides the best mixed reality headset currently available: “Nothing else has the power, usability and scalability across an organization.” AMAG Symmetry Access Control Integration In ARIES, CodeLynx has created a certified integration with AMAG’s Symmetry access control system to enable operators to view information from Symmetry as holograms in their field of view through the HoloLens. The integration extends the functioning of Symmetry to operators in the field, thus expanding the control room environment. Holograms can be created and positioned for each user, and they function just like physical devices, tied into Symmetry. Approaching a door, an operator can request a list of the last five people who came through the door, for example; he or she can see a photo ID related to each person who swipes through a turnstile. CodeLynx is looking to expand the market for ARIES using integrations with other OEMs in addition to AMAG. “Instead of being chained to their desk looking at monitors or a display wall, operators can work in the field using the full functionality of their systems as they walk throughout the property,” says Drew Weston, CodeLynx Director of Sales and Marketing. “Meanwhile, I am not sitting at a desk, I am out in public.” Holograms can be created and positioned for each user, and they function just like physical devices, tied into Symmetry At some point, the headsets will likely get lighter and more ergonomically appealing. Right now, all the computing power is inside the headset (which, even so, only weighs only 1.3 lbs). In the future, more of that computing will likely be “offloaded” to a nearby desktop or laptop computer, or even to the cloud, and wirelessly “tethered” to the headset. In addition to making the headsets lighter and more ergonomically appealing, tethering would bring down costs from the current $5,000 per headset (possibly into the “three digit” range). CodeLynx is poised to leverage any Microsoft enhancements to the HoloLens environment. Currently the software is priced at $1,500 per user. Benefits For Systems Integrators For systems integrators, ARIES could be used to simplify installations, given its ability to view camera frames through the headset hands-free rather than needing to view a separate laptop when focusing or positioning a camera. For maintenance or troubleshooting, an operations center could access the field user’s view and direct him or her to correct a problem. In this way it would be a training tool to help integrators, which is a separate value proposition from how the devices may be deployed by end users. The ARIES approach could also eventually change how we think of a control room. Instead of video screens and walls, operators might sit in comfortable chairs in rooms with white walls, viewing all the control room “screens” through their headsets as holograms. Less power consumption would be among the benefits. ARIES plans to offer a “virtual operations center” in 2018, enabling command center operation from anywhere, user-customizable layout views and the ability to push content to specific HoloLens users. This video demonstrates how interaction with holograms can drive security functions: https://www.youtube.com/watch?v=B82oAlxt5_s
Seven disparate systems, tens of thousands of existing cards in circulation, new buildings requiring new systems, budget constraints - There are two approaches going forward: keep making it work, or work on a plan to centralize the system for some serious long-term efficiencies. University of East Anglia (UEA), located just outside Norwich city center, has more than 14,000 students studying on campus, and over 2,000 employees. The city had donated what was the Earlham municipal golf course for the site of the campus, and traces of the fairways can still be seen around the grounds today. In 1962, Denys Lasdun was appointed as UEA’s founding architect. It was Lasdun who designed the University’s core buildings – the monumental Teaching Wall, the raised walkways, the central Square and the now famous ‘ziggurats’. Installation of Gallagher security system We needed a system that would give us the ability to keep using what we currently have"The striking ziggurats are like none other – the student accommodation, lining the embankment, are pyramidal in shape. While the historical buildings remain, new buildings and residences have also been developed. These developments and the increasing expectation of student accommodation acted as key drivers for a review of access on the campus. Jonathan Richardson, Access Control Project Manager & Senior Systems Specialist for Corporate Information Systems has championed the roll out of a Gallagher security system for the University. From his previous position as an editor for an IT publication, he relished in critiquing a system to see if it was all it was supposed to be. “We needed a system that would give us the ability to keep using what we currently have, and create an infrastructure to be able to develop it over time to how we envisage the system one day operating,” he says. Compatible with third party card formats The import and export facilities have made the system ideal for combining data from a range of student, personnel and accommodation systems. “We already had 42,000 cards in circulation – there was no way we could replace them. Gallagher was chosen for its ability to work with third party card formats.” We rely totally on the automatic imports to add and remove access as required" “Card data is imported/updated using the import export service with data from the Envision card production system. We additionally use data from a student system, accommodation system and a couple of bespoke databases to automatically calculate access groups – changes to access groups are again handled via the import export service. “There is no way we could realistically manage the level of changes with a manual system – we rely totally on the automatic imports to add and remove access as required. The integration is massive, and the impact it is having in terms of pulling different information sources together is huge.” Four times more secure system Jonathan describes the system as being a “catalyst for change on how security, data storage and management across a range of systems and databases are viewed. The implementation has been very transparent – people are unaware of the changeovers that have taken place. The dynamic updates are now happening, and the system is probably at least four times more secure now.” Jonathan mentions the difference is made by the level of technical support available from the manufacturer, from the UK and even head office (based in New Zealand) dialling in when required. Gallagher controls a range of devices including doors, automatic swing and slide doors, car park barriers, turnstilesGallagher controls a full range of devices including doors, automatic swing and slide doors, car park barriers, turnstiles and elevators. The system also facilitates electronic access for disabled flats for residents in wheelchairs. System Division functionality is used to give building owners their own portion of the system for management purposes. Checking tailgating and card enquiries For car parking, times are recorded for charging parking fees. Louis Chisholm, Transport co-ordinator, uses the Gallagher security system on a daily basis. When asked how she finds the system, Louis replies, “I love it. I can check all the things I need to without asking anyone else.” She uses the reporting to check for people tailgating, and checking any enquiries for specific cards. From parking to the library: students enter the library through turnstiles. Reports on usage patterns have been used to justify access funding to promote the resource. The audit trail has been called on for incidents occurring in the library that have put staff safety at risk, and even disputes on the return of books. Research laboratories and chemical stores rely on the system; previously dangerous chemicals have gone missing with no knowledge of who was there at the time. Changing Prox readers to Mifare We have plans to change the existing 125 Prox to Mifare and then roll out dual function cards to all cardholders"The University has around 150 doors (30 Gallagher Controllers) using third party magstripe readers. There are additionally around 20 Gallagher Prox readers (125 kHz) used in secure areas via a dual technology card. “We have plans to change the existing 125 Prox to Mifare and then roll out dual function cards to all cardholders – replacing magstripe readers with Gallagher Prox Mifare readers,” explains Jonathan. Once converted, this would take into consideration different facets – from the cafeterias to involving the local bus companies – in the use of the smart card technology. The success of Gallagher security systems in centralizing access control and reporting has meant the system is being expanded rapidly, and introducing new functionality is ongoing.
The FeeMaster Smart Console from people and vehicle access control specialist Nortech provides a simple and cost-effective way of managing access to car parks and facilities for vehicles and pedestrians. All the access control data is encoded onto a Mifare card using the FeeMaster Smart Console. As a standalone system, there is no wiring between the access control point and the console, making it easy and cost effective to install. Parking management system The console can print customer receipts and/or barcode exit tokens Part of the popular FeeMaster range, the FeeMaster Smart attendant console is a compact, elegant and easy-to-install device that reads barcode tickets issued at an entry station, calculates the fees payable based on pre-programmed tariff details, and encodes reusable Mifare access control cards with validity data. If necessary, the console can print customer receipts and/or barcode exit tokens. It is also able to control a till drawer and can optionally provide a relay output signal which can be used by third equipment i.e. barrier control whenever a card has been encoded or an exit ticket printed. The FeeMaster Smart time-based parking management system is designed to provide information about the initial arrival time of each visitor and uses cards to strictly control customers’ access rights to car parks and facilities as well as the validity period. Fee calculation system Popular applications that have used the FeeMaster attendant’s console to control visitor access include Bristol Aquarium and Edinburgh Castle, where an easy to install and operate and an automatic fee calculation system with tariff and grace period settings included was required. Bristol Aquarium required a cost-effective and efficient product that would not only save money but would also make the constant stream of visitors easy to monitor. The barcode reader connects to a barrier/turnstile/gate at each site and opens once a valid barcode has been scanned by a visitor using easy to program modes of operation. New security products Nortech has supplied products and solutions to the security industry for over 25 years The simple to use design makes the console ideal for reducing queues and keeping the flow of people moving during busy periods, is extremely versatile and can simultaneously support several methods of revenue generation. Edinburgh Castle has been benefiting from the FeeMaster system for a number of years, using it to control and manage the strict parking at its site. The console allows the staff to control any misuse of the car park and ensures that there are enough parking spaces without the need for expensive cabling or disruption. Nortech has supplied products and solutions to the security industry for over 25 years as an independent British company. The company uses extensive experience and expertise to create new security products to fit their clients’ needs and designs everything with the customer in mind.
The American University of the Middle East (AUM) in Egaila is the largest private university in Kuwait. Its extensive campus is spread over 261,190 square meters of beautiful grounds, including academic buildings, technical labs, AUM library, AUM Sports Center, outdoor sports playgrounds including a FIFA certified football field, AUM Opera House, AUM Conference Center, parking areas, administrative and service areas. The American College of the Middle East (ACM) is also hosted within the campus. With sizeable grounds and multiple institutes of learning operating on site, AUM’s access control requirements were complex. The popularity of the campus with not only AUM students but also Kuwaiti youth in general meant AUM needed to ensure the right access was provided to the right people at multiple points on campus. AUM’s Director of IT highlights the challenge the administration faced in efficiently identifying, authenticating and providing access for more than 800 employees and over 10,000 students. “The campus needed to be secure, but at the same time easy to use, causing no inconvenience to students and staff.” Gallagher Command Center AUM needed a dynamic solution that met their access control requirements AUM needed a dynamic solution that met their access control requirements, could integrate with their core enterprise resource planning (ERP) solution, and was scalable to accommodate future growth. Gallagher’s access control solution, featuring Gallagher Command Center and a range of integrations, was selected as the university’s preferred choice, meeting its requirements in the best possible way. MIFARE contactless smart cards Student and staff ID cards became part of the access control system with MIFARE contactless smart cards provided to students, faculty and staff. Turnstiles installed at the entrances to AUM and intelligent integrations with existing systems provided total control of movement within the campus. AUM uses learning software and automated systems widely across its campus. Extensive integration with the Gallagher solution has significantly reduced operational costs, creating efficiencies for staff and students and enhancing the overall security system. “Gallagher gives us the best option to fulfill our requirements, with a total solution,” says the university’s Director of IT. Integration with CCTV system Exam control rooms at AUM need to be fully secure. Command Center integrates with the CCTV system to ensure that when movement is detected, or someone tries to open the door, the CCTV is triggered, and a photo attached to the security report. Within the campus, access permissions need to be well defined for different groups. Access to the gymnasium, library and sports center is defined by male and female, staff and students. Command Center allows AUM to define these access controls in the directory, ensuring they happen automatically. Fully automated access control Fully automated access control gives us confidence in the system" “Fully automated access control gives us confidence in the system,” says the university’s Director of IT. “We don’t have to worry about it.” The reporting capabilities of Command Center provide AUM with greater control and audit information. The university is governed by a council, that regularly conducts audits. “The Gallagher solution helps us easily produce daily reports to meet those reporting requirements. It’s a fantastic solution, no doubt." The integrated booking system in the library controls access to study rooms, giving entry only to those who are included in the room booking. Staff and students no longer have to manage who is in the rooms, allowing them to get on with their work and study. The university’s Director of IT says in the past, monitoring and reviewing this information would take a person two or three days. “With this small integration from Gallagher, turnaround time has improved to within half a day for the same task.” Restricted access He adds, “Campus access for dismissed students has been prevented. Their access is automatically restricted by the admin department. Student’s whose access has been prevented can visit the admin department to rectify their enrollment status. The integration with the Gallagher solution is amazing. Our operational costs have been reduced wherever it is used.” With new construction underway and increasing popularity with students, AUM is a growing university. The Gallagher solution is growing alongside it, providing regular updates and new innovations. “Gallagher often contacts us about new initiatives and things they are introducing,” says AUM’s Director of IT. “We will implement them, because of the success of the current solution. We try at every point to take full advantage of the features offered to keep reducing operational costs. From an industry perspective, it’s a beautiful solution.”
Located in the buzzing heart of England’s capital city, University College London is one of the top ranking establishments for higher education in the world. Founded in 1826, London’s first university institution, the College now has an estimated 28,600 enrolled students and 14,600 members of staff. Including agency staff, academic associates, and other visitors, UCL currently has a system of over 48,000 valid cardholders. Based primarily in the Bloomsbury area, UCL’s main campus is situated on Gower Street and includes departments such as biology, chemistry, economics, engineering, geography, history, languages, mathematics, philosophy, politics, physics, architecture and the Slade School of Fine Art, as well as the preclinical facilities of the UCL Medical School and the London Centre for Nanotechnology. Electronic access control UCL has been used as a location for a number of high profile film and television productions While the UCL Cancer Institute and Faculty of Laws are also nearby, notable College buildings include the original Wilkins Building and Gower Street’s Cruciform Building, previously home to University College Hospital. The University has further sites based elsewhere in and around London, such as the UCL Institute of Ophthalmology, the UCL Institute of Orthopaedics and Musculoskeletal Science, The Royal Free Hospital Medical School, and also the UK’s largest university-based space research group, the Mullard Space Science Laboratory, and UCL’s own astronomical observatory at Mill Hill. Due to its position within London and the historical nature of its buildings, UCL has been used as a location for a number of high profile film and television productions, including Gladiator, The Mummy Returns, The Dark Knight and Inception. The sheer scale of the University’s operations, with thousands of occupants fluctuating between its numerous facilities, has dictated the need for a comprehensive electronic access control security system – one which has evolved over many years. Physical locking controls UCL’s Security Systems Manager, Mike Dawe explains that while adhering to the University’s culture of ‘general openness’ on campus, Gallagher systems have been introduced as “a progressive response to the need for more security control on site.” Security throughout the University is managed by the Security Department of the Estates Division, which has responsibility for all the physical locking controls and electronic systems, as well as the provision of the security guarding service. By and large an open campus, a number of university buildings are free to visitors from the general public, while others are controlled by turnstiles accessible by valid cardholders only. Many other research areas are available only to those with specific security passes. Gallagher’s systems have been in place with the University since 1993 and were originally chosen for the Gallagher Commander Hardware’s ability to communicate effectively over long distances between buildings. Key industry challenges Following were the key industry challenges involved: Ensuring appropriate access to students/staff onsite Implementation of lockdown and evacuation procedures Controlling access to key University areas Protecting University property Providing unobtrusive but robust security Control and management of multiple systems Visitor time and access management Central records systems Full data integration was achieved in 2006 when the system was linked to UCL’s central HR Recognized by Mike as the ‘next important direction for the University’, the subsequent introduction of the Gallagher Access Control system (formally Cardax FT) in 2003 enabled Gallagher’s main security system to be integrated with UCL’s other data systems. Additionally, Mike highlights how “Gallagher’s ‘building blocks’ approach to programming the software also provided greater flexibility when using the system, while the network infrastructure enabled us to move away from our own discrete wiring.” Full data integration was achieved in 2006 when the system was linked to UCL’s central HR, student records and visitor records databases. Combining the regular ID card with a single access control card then followed, and validity is kept fully updated by the University’s central records systems. Currently the University has 101 buildings on the Gallagher system, which controls 939 doors, 32 turnstiles and 15 lifts. General perimeter control Typically, Gallagher security is used for the general perimeter control of the buildings, such as those with both turnstile access and a reception at the entrance, as well as additional control within College buildings to divide public and semi-public areas from departmental spaces. Gallagher systems also control UCL’s top security areas such as high risk research space and data centers. Describing UCL’s security operation, Mike explains how the Gallagher solution has been integrated with the inhouse HR, student and visitor records systems and filters duplications to ensure a single identity. This information is then fed through the Gallagher system to update cardholder records using an ‘import/export’ function. The Gallagher technology is also used to automatically send barcode information to the Library systems and update the student records system with student photos. Scheduled email notification reports are also sent regularly which, according to Mike, “has proved very useful for UCL’s high value areas.” Security operations team We routinely use reports and produce these in response to departmental concerns and requests" “We routinely use reports and produce these in response to departmental concerns and requests”, he explains. “Typically this is done by the security operations team, which analyses the information, along with CCTV data to investigate suspected crimes.” UCL is planning to integrate the Gallagher Security system with its existing CCTV system and will use this, in addition to the new Command Centre Premier client, to improve the provision of site information to the Security Control room staff. The University is also currently developing its import/ export process to automatically provide access levels based on person-type information, such as department, course etc. Gallagher would like to thank Mike Dawe, UCL’s Security Systems Manager, for his support with the production of this site profile. We would also like to acknowledge the support of our security partner, Reach Active Limited who has contributed significantly to the successful implementation of the Gallagher system at University College London.
In mid-2009, Melco Resorts & Entertainment Limited opened City of Dreams, Macau – a casino and resort complex that quickly become one of the world’s premier entertainment and leisure destinations. The complex brings together a collection of world-renowned hotel brands, including Crown, Grand Hyatt, and Hard Rock, along with a casino area of approximately 448,000 square-feet and over 20 restaurants and bars. Also comprising an audio-visual multimedia experience, and ‘The House of Dancing Water’ – the world’s largest water-based extravaganza showcased in the purpose-built Dancing Water Theater. These unique and innovative entertainment, shopping, food and beverage offerings realize the company’s vision of bringing world-class integrated resort and entertainment experiences to Macau and Asia. Need of a robust security solution Melco Resorts was looking for a robust security solution capable of protecting high-value assetsHaving thousands of staff moving around the site meant that effective people management needed to be a significant part of the security solution. With a large site encompassing multiple areas and a staff of approximately 13,000, Melco Resorts was looking for a robust security solution capable of protecting high-value assets while providing a reliable and flexible system to support daily operations. In the years leading up to the opening of City of Dreams, Gallagher worked directly alongside Melco Resorts, and security partner Certis Security (Macau) Ltd, during the design and construction phases. The Gallagher team were highly involved in discussions and developments relating to software customizations and the final commissioning of critical security areas. MIFARE Classic card technology Part of the City of Dreams philosophy from day one was to operate a one-card, single service entity per staff member – not only for high-level security but across all system requirements. According to Billups, a lot of decisions around system choice were based on meeting the one-card philosophy. Utilizing MIFARE Classic card technology, 1700 access controlled doors were set up across the complex. Utilizing MIFARE Classic card technology, 1700 access controlled doors were set up across the complex Gallagher’s ability to encode the cards with data from multiple system providers was crucial in delivering the one-card policy. Along with Gallagher access data, third-party ASCII data encoding was also provided on the card for use by other on-site systems to achieve the objective of a single card philosophy. Latest generation data security The original system, comprising MIFARE Classic card technology, is now being upgraded to the latest MIFARE DESFire EV1 across all Melco Resorts properties. MIFARE DESFire EV1 provides the latest generation data security and encryption ensuring Melco Resorts globally stays at the forefront of technology. To further meet their one-card philosophy, Melco Resorts wanted a single card technology utilized across all three of their Macau complexes – City of Dreams, Altria Macau, and Studio City. In addition to enabling access across multiple properties, there was a requirement for a central monitoring system that could manage alarms escalated from any of the properties and register such alarms centrally in a main command structure. Highly integrated and expansive platform Gallagher’s multi-server technology delivers this, with seamless connection between all systems and across all sitesFuture-proofing was an important consideration of the security solution. “City of Dreams needed a system that catered well to growth, particularly in the areas of people management and access control. Gallagher provided us with the highly integrated and expansive platform we were looking for,” said Kelly Billups, Director of Security Technology & Administration for Melco Resorts. Gallagher’s multi-server technology delivers this, with seamless connection between all systems and across all sites. If communication between the facilities should fail due to a network fault or similar incident, each site’s security system will continue to function independently. According to Billups, the multi-server system has resulted in reduced labor costs due to the consolidation of security administration. Efficient movement of people The Gallagher system provides rapid response times to access requests ensuring the efficient movement of people in and out of areas. The instant dissemination of cardholder access and configuration data also ensures people have appropriate access delivered in real time. If cardholder access needs to be denied, this information is communicated and applied instantly across the site. In addition to door access activity, 5300 detection points are also monitored throughout the complexIn order to provide Melco Resorts with an audit trail of security events, all site activity is logged in a secure database. In addition to door access activity, 5300 detection points are also monitored throughout the complex. Reports are generated using a simple wizard-based system which steers the report generator through a step-by-step process ensuring the relevant data is retrieved. The City of Dreams site required integration with a number of external systems and Gallagher’s Command Centre central management software provided the platform to deliver this. Cameras integrated with Command Centre As surveillance is a key requirement for a casino, City of Dreams has thousands of cameras throughout the complex. A number of these cameras monitor critical back of house operations and are integrated with Command Centre to provide additional layers of security and enable further administrative functionality. A number of lower-level security points throughout the complex – which utilize traditional keys – integrate Command Centre with an electronic key management system. Keys are electronically released to personnel depending on their access permissions. Two high-level interfaces provide communication to all elevators connected to Command Centre There are approximately 80 elevator shafts located throughout the City of Dreams complex. Two high-level interfaces (Schindler and Otis) provide communication to all elevators connected to Command Centre where access control groups manage access to each of the floors. This integration is particularly important for heart-of-house elevators where access can be highly restricted to only authorized personnel. HR system integrated with Command Centre An integration between City of Dreams Human Resources (HR) system and Command Centre was established. The active connection between the two ensures that basic personnel information is automatically communicated from the HR system to Command Centre without the need for manual intervention. Because of this, the process of updating cardholder information and assigning access to cardholders is a quick and simple procedure – a must for a database of this size. The Gallagher system provides rapid response times to access requests ensuring the efficient movement of people in and out of areas. Where high-level (software) interfaces are not available, the Gallagher system connects with other services including: boom gates, motorized vehicle and pedestrian doors, and turnstiles, using what is commonly referred to as a low-level interface. A control relay in Gallagher’s Command Centre platform activates the door or gate, and in turn the status of the door or gate (open, closed) is reported back. Salto integrated guest locking system Melco Resorts requirement is to seamlessly integrate hotel guest-room locks with the Command Centre platformThe delivery of a high-level integration with a hotel guest-room locking solution is currently in development and will be a world first. Melco Resorts requirement is to seamlessly integrate hotel guest-room locks with the Command Centre platform in order to deliver high-level security across the entire complex. To deliver this solution, Gallagher is working with long-term partner Salto. The Salto integrated guest locking system is required to operate in conjunction with Melco Resorts high-security card encryption and encoding, while complimenting the hotel décor. Melco Resorts and Gallagher maintain an ongoing relationship which brings together Melco Resorts evolving requirements and Gallagher’s product development road map. “The relationship is key for us” said Billups, “having a team based in the region who meet with us regularly and having a level of engagement over development is very important.”
South Africa’s Athlone Campus is home to the Western Cape College of Nursing, a sprawling complex of lecture halls, administration blocks and four hostels that house around 2000 nursing students. Gallagher Command Centre was chosen as the most effective system to manage access to the hostels and keep the students safe. The nursing college had no method of limiting access to its hostels. People came and went as they liked, there was no record of who was on site and it was difficult to enforce visitor hours. Theft was a problem and reported cases of sexual assault had become a major concern. Access needed to be more secure. Access control system for authorized entry Biometric fingerprint readers were mounted on turnstiles at each of the hostel entrances and exits to manage general accessSafety and security are essential to providing a healthy living and learning environment for students. Athlone Campus partnered with local security solutions provider, FS Systems, to install access control and video surveillance in its hostels. Gallagher Command Centre was chosen to manage the access control system, monitoring access points and allowing only authorized students, staff and visitors to enter the hostel buildings. Biometric fingerprint readers were mounted on full-height turnstiles at each of the hostel entrances and exits to manage general access. Fingerprint readers prevent unauthorized entry from people using lost or loaned cards, and the anti-passback measures built into Command Centre means students can’t ‘pass in’ a visitor or bypass the system, as it recognizes and records that someone has tried to enter twice. Integrated visitor management system Gallagher’s integrated visitor management system now monitors visitors and allows the college to control visiting hours. Visitors to the college hostels must register at reception and have their fingerprint captured by the visitor management system. They are then granted access to only the hostel they are visiting. In the evening, the system generates an alarm and reports on visitors still on site – allowing security to ask people to leave and prevent further visitors from entering. The general feeling from students and staff is that they are more secure" Jason Adams, Cost and Estimating Manager for FS Systems says, “The general feeling from students and staff is that they are more secure knowing that everyone entering the facility has gone through some sort of screening or registration process at the security office. The presence of physical security barriers (full-height turnstiles) is reassuring, in that not just any person can gain entry without the necessary authorization.” Installation of video surveillance solution Alongside access control, the college installed a comprehensive video surveillance solution to reduce incidents of violence, vandalism and crime. The entire video management system is seamlessly integrated with Command Centre, creating one easily managed security solution to track student, staff and visitor movements and ensure that when an incident does occur, security staff are quickly informed and able to respond effectively. “It’s essential for the system to be user-friendly and easy to operate and manage,” says Jason. “The detailed maps that appear onscreen with Gallagher Command Centre clearly indicate the location of alarms and give security staff the ability to respond more quickly to emergencies.” Using Gallagher Command Centre, the nursing college now has a powerful and versatile security system that meets the unique needs of its site. Reduction in criminal activity The system provides a reliable way to clearly capture data to monitor students, staff and visitors, lower criminal activity and improve onsite safety. In particular, security personnel can easily find the right information for quick incident resolution, which has led to improved processes, procedures and convictions when necessary. The college has achieved significant cost savings through the prevention of vandalismThe college has also achieved significant cost savings through the prevention of vandalism and a significant reduction in reported cases of theft. The combination of the new access control system and an increase in physical security barriers means they have also been able to decrease the number of security guards patrolling the facility, reducing overhead costs. Customizing and generating reports for college management is also a straightforward task, saving time and money. Most importantly, Gallagher’s security solution has given Western Cape College of Nursing control of who is on site and when – allowing its students to be safe, secure and focused on learning.
Round table discussion
Even the most advanced and sophisticated security systems are limited in their effectiveness by a factor that is common to all systems – the human factor. How effectively integrators install systems and how productively users interface with their systems both depend largely on how well individual people are trained. We asked this week’s Expert Panel Roundtable: What is the changing role of training in the security and video surveillance market?