Visitor management systems
Booth number: 20031 Pelco is highly invested in providing end-to-end video surveillance solutions for customers, so this priority will remain the same in 2019 and beyond Pelco’s priorities for 2019 at ISC West are informed by worldwide trends in the security industry. As a result, Pelco will be focusing on enhancing cloud connectivity and cybersecurity for their customers. In addition, VideoXpert is Pelco’s best-selling video management solution, so this system will be t...
Booth number: 11053 At ISC West, Bosch Security and Safety Systems will showcase how intrusion and fire detection, video surveillance and analytics, access control, and communications technology work together to deliver increased security, more efficient monitoring and control, automated audio announcements, and valuable data that extends beyond security to deliver clear business advantages. Bosch’s solutions solve challenges in retail, critical infrastructure, transportation, smart city...
Feenics Inc., a provider of the Access Control as a Service (ACaaS) Keep by Feenics cloud-hosted platform, continues to grow and expand, adding Blair Cox, CPA as Chief Financial Officer (CFO). Cox specializes in financial reporting, forecasting and modeling as well as corporate taxes. Most recently he worked at a cloud-based SaaS telecommunications company in San Francisco where he was responsible for finance operations as well as strategic budgeting, planning and analysis. Blair has both the...
The Security Event - powered by Security Essen arrives at the National Exhibition Centre (NEC) in Birmingham, UK from 9 to 11 April 2019. This major new security exhibition features around 100’s of security brands. Visitors can now register online for the event, organized by Western Business Exhibitions (WBE). Cooperation partner is Messe Essen (Germany), organiser of the trade fair for civil security Security Essen. The British market is one of the most important markets for the security...
Ava Group (AVA), a provider of security risk management services and technology will be showcasing its portfolio of security solutions at Intersec Dubai 2019, stand S3-C48. Intersec Dubai features a rich selection of exhibitors in Security, Safety & Fire Protection, attracting visitors from the Middle East, Africa, the Indian subcontinent and well beyond. Ava Group will be presenting the latest exciting solutions from its technology division - which incorporates Future Fibre Technologies (F...
Data Management, Inc., owner of Visitor Pass Solutions, launches with a new name and confirmed focus, further planting their flag in the security industry. The company will now go by the name ‘THRESHOLD,’ a term evocative of their expertise in visitor management systems. With the new tagline, ‘the gateway to stronger security,’ the company emphasises its function as the first line of defense for their clients, as they manage the traffic entering and leaving their clients...
Maxxess will be at Intersec 2019 showcasing its latest advances in corporate risk reduction, improved people management and smarter hospitality access solutions - including new releases in its popular eFusion and Ambit solutions. eFusion Security Management The latest version of the VisitorPoint module within the eFusion security management platform will be showcased, offering a host of new streamlined functions for efficient people and visitor management. Harnessing current advances in cloud computing and mobile communications, VisitorPoint is being used at premises from hotels and campuses to corporate headquarters. It allows the whole process of visitor management to be streamlined in a way never previously possible. For example, it lets guests’ phones be used as access credentials, making it a perfect alternative to room keys in the hospitality sector. Compatibility of the VisitorPoint system with ASSA Abloy Hospitality products has proved to be particularly popular with hotels. VisitorPoint System VisitorPoint is also ideal for busy hotel reception teams who need to keep across who is entering the premises VisitorPoint is also ideal for busy hotel reception teams who need to keep across who is entering the premises. With the latest version of VisitorPoint, users can easily view pre-registered visitors in advance; manage and sign-in large groups in seconds; book meeting rooms; manage visitor car parking; and automate notifications and messaging. Now organizations can go even further in streamlining their people and diary management processes, thanks to integration with Outlook and Google calendars. A new VIP feature allows automatically tailored welcomes for specified guests and/or groups; and a QR Scan App allows visitors and VIPS to be immediately verified. In addition, a new, sleek self-service kiosk will be unveiled at the show, which is ideal for positioning in hotels and high-end corporate lobbies. Open-Technology Systems Integration Meanwhile, with its versatile, open-technology software eFusion is proving a practical alternative to costly or complex conventional PSIM solutions. It offers the advantages of a modular, building block approach and gives users the freedom to integrate, customize and adapt their security systems to meet both current needs and emerging risks. Ensuring compatibility with leading surveillance, intruder, access and fire detection systems, eFusion now supports more than 60 off-the-shelf integrations and several important additions are confirmed for the show. These latest integrations include Jaquies IP intercom hardware; the mobile phone app GuardPoint; and the Metra locker system hardware. “For users who want control and better value from their security investments, eFusion with its expanding choice of integrations is the ideal management platform”, says Lee Copland, Managing Director, Maxxess EMEA. Smart, Open Infrastructure The eFusion platform allows legacy systems to be transformed into a smart, open infrastructure and extends the life of equipment" “The eFusion platform allows legacy systems to be transformed into a smart, open infrastructure and extends the life of equipment. Our technology is proving particularly popular because it gives users all the advantages of advanced PSIM without the associated cost or complexity.” eFusion can be easily scaled from one site to multiple sites globally and it can connect stand-alone systems for easy upgrades such as retro-fits with existing hardware. Network Monitoring For Public Safety Also on show, Ambit allows security controllers to communicate directly with both individuals and groups and to monitor the safety of everyone on site (or on multiple sites), for example employees, residents, visitors, or contractors. Now Ambit users will benefit from direct notification of a wide range of risks thanks to a new integration with the NC4 incident alert service. NC4 monitors risks and issues alerts in real time, covering potential threats ranging from terrorist incidents to weather events, from civil disruption to cyber-attacks. With this new integration, as N4C alerts arise they will be filtered by proximity/relevance and directly sent to Ambit users. Lone Worker Monitoring Visitors to the Maxxess stand will also learn how Ambit’s latest life-saving technology comes with a choice of applications tailored to the user’s needs. For example, it can allow lone-worker monitoring; courtesy communications and remote escorting after-hours; panic alarm features; and individualized messaging during incidents. It can help security teams co-ordinate and work more effectively with emergency responders too as well as improving the efficiency of day-to-day operations. We are well positioned to further capitalize on major infrastructure projects across the region such as hotels and leisure" With new customers and projects including Bluewater Island, TAJ Hotel & Residences JLT Dubai, TAJ Hotel & Palace on Palm Jumeirah, the Emirates Nuclear Energy Corporation, Emirates Flight Catering Extension, the Jewel of the Creek and Yahsat, 2019 will be an exciting year of growth for Maxxess in the Middle East. Maxxess Expands Middle East Reach “We are well positioned to further capitalize on major infrastructure projects across the region such as hotels and leisure. The demand for increased operational efficiencies across the MENA region has seen many organizations look to automate tasks and at the same time mitigate against the potential for human error. This is evident in the demand we’re seeing for streamlined visitor management, the elimination of keys and better optimized workforces across security and facilities management functions.”, said Lee Copland, Managing Director, Maxxess EMEA. He adds, “And as real-world applications for artificial intelligence become a reality, we are continuing to collaborate with our world leading video surveillance partners to bring these advanced analytics into the eFusion platform. Meanwhile, we will continue to support our customers in complying with revised fire and safety codes and new security regulations.”
Maxxess will be at Intersec 2019 showcasing its latest advances in corporate risk reduction, improved people management and smarter hospitality access solutions - including new releases in its popular eFusion and Ambit solutions. The latest version of the VisitorPoint module within the eFusion security management platform will be showcased, offering a host of new streamlined functions for efficient people and visitor management. Harnessing current advances in cloud computing and mobile communications, VisitorPoint is being used at premises from hotels and campuses to corporate headquarters. It allows the whole process of visitor management to be streamlined in a way never previously possible. Diary Management Processes VisitorPoint is also ideal for busy reception teams who need to keep across who is entering their premises For example, it lets guests’ phones be used as access credentials, making it a perfect alternative to room keys in the hospitality sector. Compatibility of the VisitorPoint system with ASSA Abloy Hospitality products has proved to be particularly popular with hotels. VisitorPoint is also ideal for busy reception teams who need to keep across who is entering their premises. With the latest version of VisitorPoint, users can easily view pre-registered visitors in advance; manage and sign-in large groups in seconds; book meeting rooms; manage visitor car parking; and automate notifications and messaging. Now organizations can go even further in streamlining their people and diary management processes, thanks to integration with Outlook and Google calendars. Important Additions A new VIP feature allows automatically tailored welcomes for specified guests and/or groups; and a QR Scan App allows visitors and VIPS to be immediately verified. In addition, a new, sleek self-service kiosk will be unveiled at the show, which is ideal for positioning in hotels and high-end corporate lobbies. Meanwhile, with its versatile, open-technology software eFusion is proving a practical alternative to costly or complex conventional PSIM solutions. It offers the advantages of a modular, building block approach and gives users the freedom to integrate, customize and adapt their security systems to meet both current needs and emerging risks. Ensuring compatibility with leading surveillance, intruder, access and fire detection systems, eFusion now supports more than 60 off-the-shelf integrations and several important additions are confirmed for the show. Security Investments The eFusion platform allows legacy systems to be transformed into a smart, open infrastructure and extends the life of equipment" These latest integrations include IP intercom hardware from Jaquies; the mobile phone app GuardPoint; and the Metra locker system hardware. For users who want control and better value from their security investments, eFusion with its expanding choice of integrations is the ideal management platform, says Lee Copland, Managing Director, Maxxess EMEA. “The eFusion platform allows legacy systems to be transformed into a smart, open infrastructure and extends the life of equipment. Our technology is proving particularly popular because it gives users all the advantages of advanced PSIM without the associated cost or complexity.” eFusion can be easily scaled from one site to multiple sites globally and it can connect stand-alone systems for easy upgrades such as retro-fits with existing hardware. Allows Security Controllers Also on show, Ambit allows security controllers to communicate directly with both individuals and groups and to monitor the safety of everyone on site (or on multiple sites), for example employees, residents, visitors, or contractors. Now Ambit users will benefit from direct notification of a wide range of risks thanks to a new integration with the NC4 incident alert service. NC4 monitors risks and issues alerts in real time, covering potential threats ranging from terrorist incidents to weather events, from civil disruption to cyber-attacks. With this new integration, as N4C alerts arise they will be filtered by proximity/relevance and directly sent to Ambit users. Lone-Worker Monitoring Visitors to the Maxxess stand will also learn how Ambit’s latest life-saving technology comes with a choice of applications tailored to the user’s needs. For example, it can allow lone-worker monitoring; courtesy communications and remote escorting after-hours; panic alarm features; and individualised messaging during incidents. It can help security teams co-ordinate and work more effectively with emergency responders too as well as improving the efficiency of day to day operations It can help security teams co-ordinate and work more effectively with emergency responders too as well as improving the efficiency of day to day operations. With new customers and projects including Bluewater Island, TAJ Hotel & Residences JLT Dubai, TAJ Hotel & Palace on Palm Jumeirah, the Emirates Nuclear Energy Corporation, Emirates Flight Catering Extension, the Jewel of the Creek and Yahsat, 2019 will be an exciting year of growth for Maxxess in the Middle East. Better Optimized Workforces “We are well positioned to further capitalize on major infrastructure projects across the region such as hotels and leisure. The demand for increased operational efficiencies across the MENA region has seen many organizations look to automate tasks and at the same time mitigate against the potential for human error. This is evident in the demand we’re seeing for streamlined visitor management, the elimination of keys and better optimized workforces across security and facilities management functions.” “And as real-world applications for artificial intelligence become a reality, we are continuing to collaborate with our world leading video surveillance partners to bring these advanced analytics into the eFusion platform. Meanwhile, we will continue to support our customers in complying with revised fire and safety codes and new security regulations.”
Johnson Controls announces that it has partnered with Civic Technologies, the global digital identity leader. Johnson Controls will integrate the Civic Secure ID Platform (SIP) with C-CURE 9000 Security and Event Management Systems from Software House to provide visitor management with greater data privacy and protection, enabling building visitors to securely present their verifiable identity using the Civic App. This partnership will enable properties secured by C-CURE 9000 a more convenient and secure solution for processing visitors at point of reception and ensure Johnson Controls remains a leader in secure access technology with innovative digital identity solutions. Offering Solutions We’re looking forward to integrating Civic as a part of our access management technology" “Lack of user-controlled identity information and decentralized verification using current methods is an ongoing challenge in the identity access management industry,” said George Martinez, director of Cloud Services at Johnson Controls. He further added, “The ability to digitally verify the identity of people coming in and out of C-CURE 9000 secured buildings, without needing to collect and store excess personal information, offers incredible compliance and security benefits. We’re looking forward to integrating Civic as a part of our access management technology and to offering solutions that help our customers and the guests that use and visit their facilities.” The Johnson Controls and Civic partnership will simplify and streamline the proof of identity process for managing visitors in building lobbies. Visitor identity verification with the Civic App will initially be deployed in three New York locations, with an expected volume of over 20,000 visitors per month. Manage Sensitive Data The Civic integration provides data privacy with the benefits of blockchain-powered security Visitors typically have to sign in with the receptionist and provide information, usually a physical ID and contact information, to check in for their visit and receive temporary access to the building. By integrating Civic for authentication and Know Your Customer, when visitors walk into a building, they will be able to scan a QR code on the C-CURE 9000 check-in kiosk with their Civic App without needing to dig out a physical ID or enter personal information into a form. Integrating the Civic App provides benefits beyond a simplified visitor management process. For visitors, the Civic integration provides data privacy with the benefits of blockchain-powered security. Using the Civic Secure ID platform, user information is always stored locally on a user’s mobile device and is protected by biometrics. This also means that properties secured by C-CURE 9000 are able to securely verify the identity of users without any requirements to store or manage sensitive personal data that attracts hackers. Secure Access Management Civic enables guest and employees to prove who they are with a mobile device" “Today, we all carry various items to identify ourselves, from government-issued IDs to fobs that grant us building access. By integrating the Civic App, anyone who needs to visit a C-CURE 9000 secured building will have the opportunity to identify themselves with their Civic App,” said Vinny Lingham, Civic co-founder & CEO. “Civic enables guest and employees to prove who they are with a mobile device, rather than requiring them to show an ID document, sign a visitor logbook and stand in line to check in/out of a facility. We’re looking forward to working with Johnson Controls to bring blockchain-powered identity verification to enable secure access management for Johnson Controls customers’ sites and with their guests across the U.S.” The way we prove who we are is changing. The partnership between Johnson Control and Civic is the perfect example of how this transformation is taking place. In the future, it will not be necessary to carry and surrender a personal document to prove identity when this can all be seamlessly managed from a mobile app that offers the additional benefits of allowing users to control how their personal information is shared.
Maxxess Systems introduces new enterprise software that combines security, communications, business intelligence and data integration into a single, easy-to-use platform called Maxxess InSite. Maxxess InSite, Unified Interface Platform Maxxess InSite sets a new benchmark for security and business intelligence software platforms by every standard of measure" Nothing operates, functions or looks like Maxxess InSite. It combines systems intelligence and human intelligence to detect and respond to unfolding events in real-time – all of which is queued, organized and displayed on a highly-intuitive user interface. In doing so, Maxxess InSite truly enables early action, allowing IT, Operational Technology and Physical Security departments within organizations to correlate data, improve response coordination, and deal with issues when they’re small – before they become large and costly. This new system is uniquely categorized as an Awareness and Response Coordination System. “Maxxess InSite sets a new benchmark for security and business intelligence software platforms by every standard of measure,” said Nancy Islas, President of Maxxess Systems. “It goes beyond basic detection and control. It empowers total awareness and provides users with unprecedented capabilities to help prevent incidents from happening. It also coordinates the activities of first responders and the people they are assisting from the moment a threatening event is detected. And best of all, is the simplicity of Maxxess InSite’s operation.” Security And Business Intelligence Software Maxxess Insite is a single system that harnesses the power of myriad system technologies Maxxess InSite features an open-architecture framework to accommodate virtually any security or business intelligence application with comprehensive functionality – from automated responses with database integration to mobile alert notifications with two-way communications. Hardware and software solutions from more than 50 different leading manufacturers are already integrated into Maxxess InSite, providing more combined capabilities and functionality than any other cross-platform solution available. This allows Maxxess InSite to be configured for virtually all applications, employing any combination of software modules and hardware to deliver each user with a highly customized solution and unparalleled efficiency. Myriad System Technologies Maxxess Insite is a single system that harnesses the power of myriad system technologies, effectively expanding their collective capabilities while also making human interaction more intuitive. It meshes the capabilities of the following systems and technologies, and more: video surveillance, access control, GPS/IPS location technologies, intrusion detection, fire safety systems, perimeter detection/protection, HVAC/building management, smart phones and tablets, ID/credential badging, two-way communications, guard tour, visitor management, time and attendance, license plate recognition, hotkey emergency notification, reporting/forensics, wireless sensors, elevator/escalator control and database integration. Kevin Daly, CEO of Maxxess Systems, added, “The beauty of the product is that even with these diverse integrations and functions, the system is very user friendly. Simplicity of use is truly the system’s ultimate sophistication.”
Feenics Inc., a provider of the access control as a service (ACaaS) Keep by Feenics cloud-hosted platform, continues to expand its reach globally, adding an office and representative in Beirut, Lebanon. Nancy Abou Eid, who holds a Master’s Degree in Computer Science and a Bachelor’s Degree in Software Engineering will lead the new Middle East location in Beirut and target additional growing areas including Dubai and Abu Dhabi in the United Arab Emirates. Educating Resellers About Keep With the addition of this office, Feenics now has an established presence in North America, Latin America and the Middle EastAbou Eid was one of the first employees of Feenics and an architect of the original Keep by Feenics solution. Her focus will be on educating value-added resellers, consultants and users on the advantages of the scalability, flexibility and advanced security available in the cloud-based ACaaS solution. With the addition of this office, Feenics now has an established presence in North America, Latin America and the Middle East. “I’m excited to be an integral part of the Feenics team again,” Abou Eid said. “The Keep solution has progressed dramatically since the company’s start up in 2010, as has acceptance of the cloud for safe and secure access control management. It’s where the future is going and the Middle East region is receptive and open to the advantages of cloud computing.” As the cloud has become a more comfortable environment for North American users and with many of those customers managing global locations, Feenics can now more fully support additional customers in the Middle East. Expanding Footprint To Support Customers Abou Eid will handle sales and regional technical support for Feenics from the Beirut office“We have many global customers and that requires us to expand our footprint,” said Sam Shalaby, Chief Executive Officer of Feenics. “Nancy hit the ground running and she’s out to make things happen. She was one of our engineers and we had kept the lines of communication open, so when the opportunity presented itself, she was perfect for the role. “Being successful is about having the right people so you can expand properly. It was an easy transition and opportunity for us to open an office in the Middle East. The location will be a natural extension of our efforts in our home office.” Abou Eid will handle sales and regional technical support for Feenics from the Beirut office, which is also staffed with two technicians and a software engineer. Low Cost Advanced Security Solution Keep V3 provides extreme scalability, unprecedented flexibility and advanced security in a cloud-based ACaaS solutionFeenics most recently was recognized with two prestigious security industry awards for innovation: 2017 Security Industry Association New Product of the Year and 2017 Most Valuable Product from Security Sales and Integration magazine, both for the latest Keep by Feenics Enterprise V3. Keep V3 provides extreme scalability, unprecedented flexibility and advanced security in a cloud-based ACaaS solution. It integrates native visitor management and a RESTful API that allows systems installers simple integration of a wide array of complementary systems and open hardware devices, generating new revenue streams while creating a path for customers to lower their total cost of system ownership. Keep by Feenics gives users the choice of on-site servers or offsite cloud deployment, hosted by the public cloud Amazon Web Services. Keep significantly minimizes costs through simple, maintenance-free and automatic upgrades, patches, disaster recovery and back up.
Shaking hands, exchanging business cards, and making meaningful business connections with exhibitors were 8,420 trade visitors from both government and commercial sectors who roamed across 7,000 sqm of exhibition space at the Bangkok International Convention and Exhibition Center. “Smart city was an overarching theme at this 6th edition of the fair,” said Ms Regina Tsai, Deputy General Manager of Messe Frankfurt New Era Business Media Limited. “This, together with three concurrent events for fire & safety, smart home, and info security, ensured that all of the market’s most important needs were covered.” Understanding Market Exhibitors at this year’s fair came from 16 different countries and regions and included some of the providers of security technology “The feedback from visitors and exhibitors alike on the quality and comprehensiveness of the show has been highly encouraging, and the general consensus is that there is still huge potential for growth in the Thai security industry, particularly in light of the construction taking place across the country.” Bidding to tap into the huge potential of the Thai market, exhibitors at this year’s fair came from 16 different countries and regions and included some of the providers of security technology. Dahua, Full Enterprise, Great Lite, Hikvision, HIP global, JVCKenwood, Konica Minolta and ZKTeco were all in attendance with a selection of the latest video surveillance, access control systems and smart city solutions. Ian Shi, Dahua’s overseas business manager for Thailand, spoke about how the company’s participation at Secutech Thailand allows them to deepen their understanding of the market: Smart City Products “Secutech Thailand is the most professional security show in the country. All of the big brands are here and this year we can see customers from many different vertical markets, including the government. For this reason it is a very fruitful exhibition for us to gather market information and understand customer demands. Our surveillance systems can carry out facial and number plate recognition through the use of artificial intelligence. Given that the government is continuing to plan for Thailand 4.0, we see many opportunities in the future for our smart city products.” The smart city theme was also featured at two international pavilions from Taiwan and Singapore. NewDVR, a Singaporean company that specializes in cloud based solutions for smart city were participating at the show for the first time this year in order to launch their smart community solution to property developers. Big Property Developers The market in Thailand at the moment is definitely embracing the smart city concept, and we are positive about the future outlook" The company’s Regional Product Manager, Mr Jonathan Chan said that the market for their solutions is primed for growth and that Secutech Thailand is an excellent way for them to reach potential partners: “The market in Thailand at the moment is definitely embracing the smart city concept, and we are positive about the future outlook. Secutech Thailand gives us a great platform from which to connect with big property developers and partners such as Sunsiri, Design 103 and many more.” With so many different high-tech solutions on display across the fairground, the show was an excellent one stop sourcing platform for trade visitors from across the ASEAN region. Mr Aibert Josha Sainz, a system integrator and IT manager traveled to the show from Laos in order to find the best access control and surveillance systems for his projects. Comprehensive Exhibition “I’m involved in security software integration and I’m here at the show to find CCTV and access control systems that can integrate with our software. This is my first time at Secutech Thailand, it’s a very comprehensive exhibition. Whether you are in the smart city, smart home or smart building sector, whatever you are looking for you can find it here.” The excitement surrounding the smart city, smart home and smart building sectors was equally palpable with regards to Thailand’s fire and safety market. Mr Joji Jose, Marketing Manager of Al Khoory Pumps, a first time exhibitor at the concurrent Fire & Safety Thailand event, recognized the fair as an ideal gateway for international suppliers to enter the market: Gain New Contacts Thailand is a country where a lot of construction is taking place and for this reason we see huge potential in the market for our products" “Thailand is a country where a lot of construction is taking place and for this reason we see huge potential in the market for our products. We manufacture fire pumps in Dubai and by participating at Secutech Thailand we are able to promote our brand, gain new contacts, find the right distributors and gather valuable market data.” Another exhibitor to speak in positive tones about the fire and safety market was Mr Ian Brough, General Manager of Raidrop International: “This is the first time we’ve exhibited at Secutech Thailand. We’re a UK manufacturer of fire protection products. The Thai government has enacted some quite strict fire and safety regulations which helps us because our products are all internationally certified.” Educational Seminars “Exhibiting at Secutech Thailand allows us to develop our presence in the market and find distributors. The visitor flow this morning has been very good and we have been able to gain plenty of new contacts.” While business contacts were being made in the aisles of the exhibition hall, a series of nine educational seminars and events were also taking place. With the IoT and digitisation as central themes, the events illuminated the development opportunities for Thailand’s smart cities. Just one of many highlights was the well-received Thailand mayor’s summit, which involved a panel discussion on the key requirements for smart city development and sustainability. Valuable insights about info security, NB – IoT, smart policing, smart building technology and hotel security could also be gained through the fringe program. Safety Certification Regulations Mr Apichart Prasitnarit, a speaker at the ‘Realtech: IoT for Smart Buildings’ seminar and President of the Real Estate and Partnership Trade Association, spoke about how Secutech Thailand’s fringe events help to spark new business growth: These seminars are so important for spreading ideas and informing stakeholders about new technology in areas such as the IoT and cloud computing" “These seminars are so important for spreading ideas and informing stakeholders about new technology in areas such as the IoT and cloud computing. Through the seminars, attendees can pick up new ideas which they can then apply to their own businesses. This in turn can stimulate growth within the security industry.” In addition to spotlighting new opportunities, several concurrent events also dealt with the fire and safety challenges that have emerged due to urbanisation. The government has enacted stricter fire and safety certification regulations but there remain large issues with non-compliance. Importance Of Certification Mr Lothar Sysk, Chief Representative of VdS, a security and fire safety certification provider, spoke about how attending Secutech Thailand’s fire and safety forums have helped him to spread the word on the importance of certification: “The seminar is vital for engaging directly with local stakeholders. Even though we have an Asian representative office in Shanghai, VdS is still not very well known in Thailand, so by speaking at the seminar today, we are not only able to promote our brand, but we can also spread the word about the importance of certification, which is a hot topic now in Thailand. I definitely intend to return again to future Secutech Thailand shows.”
As we approach National Safe Schools Week (October 21-27), it is appropriate for a conversation to begin regarding establishing standards for K12 school security. Currently no standards exist for assisting schools navigate the complexity of understanding what they need, how much it will cost and how they will secure their learning environments. Security Industry Experts The Partner Alliance for Safer Schools (PASS) is one of the organizations at the forefront of establishing security standards for schools. In 2014, the Security Industry Association (SIA) and the National Systems Contractors Association (NSCA) formed PASS, which brought together a cross functional group of members including school officials, safe schools’ consultants, law enforcement and security industry experts to collaborate and develop a coordinated approach to protecting K-12 students and staff. School administrators are often contacted repeatedly by organizations with multiple safety and security products PASS has provided valuable insights regarding an ‘All Hazards’ approach to school safety and security. In fact, PASS suggests that school administrators are challenged with two decisions: Determining what they need to do How to prioritize Safe School Environment School administrators are experts in running schools and providing education. However, most are not security experts and do not understand the complexity of implementing a comprehensive physical security and safety program across their districts. Still, they are often contacted repeatedly by organizations with multiple safety and security products. School administrators are experts in running schools and providing education, but most are not security experts Some of these organizations recognize their products are just pieces of a safe school environment puzzle and how they fit in, whereas others focus on specific applications and do not understand how their specific solutions may affect life safety codes and Americans with Disabilities Act law. (Note: Many ‘barricade devices’ fall into this latter category and actually introduce liability concerns with the unintended consequences of their use.)Schools incorporate evacuation drills as part of their emergency preparedness plans and practice on a regular basis Even for experts, the plethora of options and disparate systems required to integrate a safety and security approach at schools is daunting. The ongoing challenge is integrating access control, video, mass notification, and/or visitor management products into a single, effective, and appropriate system the owner can understand, utilize, and afford and that meet local codes and ADA laws. In the absence of standards, schools are likely to amass a collection of devices that do not constitute a comprehensive solution. Lack Of Consensus In years past, the our industry and commercial buildings adhered to legacy codes – like Building Officials and Code Administrators International Inc. (BOCA), Uniform Building Code (UBC), Southern Building Code Congress International Inc. (SBBCI), and International Conference of Building Officials (ICBO) – which have traditionally been revised every three years, while local jurisdictions decided what versions to adopt and enforce. Currently, however, there is a move toward the International Building Code (IBC), which is published by the International Code Council (ICC) and includes standards and guidance for commercial buildings on doors, windows, and other openings. A risk assessment is the next step toward developing a comprehensive security plan, and begins with developing a trend analysis Still, despite this migration of codes from a patchwork of local decisions to global guidelines, there remains a lack of consensus around school security. The current fragmented approach causes confusion regarding how new schools are designed and how to retrofit existing school buildings, whose average age is 45+ years. Right Protection Equipment One can point to the fact that there hasn’t been one student lost in a school fire in over 50 years as testament to standards like NFPA 80 and NFPA 101 being referenced in model building codes. Additionally, schools incorporate evacuation drills as part of their emergency preparedness plans and practice on a regular basis. It’s not just having the right protection equipment in the building, it’s also having a procedural layer in place to make sure everyone knows their roles and responsibilities in the event of fire. The stress of the actual event can limit ones’ ability to think clearly. Practice makes perfect. Why would we approach school security any differently? School security is a team effort, and it is important to understand all the areas security impacts and involves School security is a team effort. It is important to understand all the areas security impacts and involves. PASS suggests starting with a basic team consisting of: Security Director Local Law Enforcement School Administrator Integrator Door and Hardware Consultant IT Director Comprehensive Security Plan Quantifying and mitigating risk are the jobs of security professionals and school administratorsA risk assessment is the next step toward developing a comprehensive security plan. This often begins with conducting a trend analysis requiring the collection of data from a variety of public and private sources. The challenge is to pull these pieces into a usable and easily understood format that provides a guide for current and future risk concerns. Risk assessment and mitigation can never eliminate risk. Quantifying and mitigating risk are the jobs of security professionals and school administrators. Data from the following sources can help measure risk: Campus: Review incident report trends for at least the past 36 months. Area and city: Review crime data from local law enforcement for the surrounding neighborhood and city. Screening procedures: How is hiring conducted? Anonymous tip reporting systems: Enabling students, staff members, parents and the community to anonymously alert administrators to perceived and actual threats. Social media monitoring: such monitoring can provide important information that can be used to identify risks. Monitoring social media could help measure risk for school safety Delay Adversarial Behaviors These assessments can then be incorporated into the best practice approach of Layered Security. Layered security combines best practice components within each layer that effectively deter, detect and delay adversarial behaviors. Layered security works from the outside in. As one layer is bypassed, another layer provides an additional level of protection. The asset being protected is at the center of the layers – students, staff and authorized visitors. PASS defines five layers of Security:As one layer is bypassed, another layer provides an additional level of protection District Wide Property Perimeter Parking Lot Perimeter Building Perimeter Classroom/Interior Perimeter Appropriate Tier Target Each layer can be broken down into Tier levels with Tier 1 being basic and Tier 4 being the highest level of security. It is important to understand that the demographics of individual school buildings varies, even within the same district. Security experts will quickly point out that ‘if you’ve seen one school, you’ve seen one school’. The assessments will determine the appropriate Tier target. Figure 1 Each layer includes essential protective elements, or components, of security. Every layer does not necessarily include all seven of these common components, and a layer may include additional components unique to that particular layer. Safety And Security Components Policies & Procedures People (roles & training) Architectural Communication Access Control Video Surveillance Detection and Alarms Layered Security While components are not listed in a priority order, three components included in all layers are policies and procedures, the roles and training of people, and communication. These components often perform a function in every layer and every tier in each layer. Three tools come together in the PASS approach as outlined in the new 4th Edition of the PASS Guidelines (Figure 2) - the Layers are established and defined, a Checklist/Assessment breaks down each layer into tiered best practices which then tie into the guidelines where a narrative explains each best practice in more detail. Figure 2 Schools need not reinvent the wheel when it comes to school security planning. Following the best practices of Risk Assessments and Layered Security will ensure that every school building in a district will have a unique and comprehensive plan that is tailored to their individual needs.
Surveillance systems can track the locations of cellphone users and spy on their calls, texts and data streams. The Washington Post has reported on such systems that are being turned against travelers around the world, according to security experts and U.S. officials. The summer season highlights the need to take extra precautions when traveling. When traveling anywhere in the world, for business or pleasure, citizens need to be aware of and alert to looming physical and cybersecurity threats. To elaborate on expert security tips, strategies and advice for traveling this summer, we presented several questions to The Chertoff Group, a global security advisory firm that enables clients to navigate changes in security risk, technology and policy. Chris Duvall, Senior Director at The Chertoff Group, offers insights into cybersecurity concerns, physical security precautions, and recommends digital resources/apps for consumers while traveling. Q: How are security risks – physical and digital – changing? Why are threats greater today than five years ago? The exponential number of headlines over the past few years is a strong indication that both physical and digital risks are evolving and increasing Duvall: The exponential number of headlines over the past few years is a strong indication that both physical and digital risks are evolving and increasing. The scope, severity and complexity of physical and cyber risks are increasing and becoming more dangerous and destructive. This is especially true for those traveling outside the U.S. On the physical side, threat actors are actively seeking “soft targets” – public events, social settings, mass audience venues, etc. – to communicate their message, sow chaos and inflict catastrophic harm. On the digital or cyber side, we have seen a shift from “thrill hacking,” to an increase of “hacking as a business” (through credential compromise and ransomware), to an increase in “hacking for harm” - with the rise of “nuke ware” and ransomware without a clear financial motivation. Q. What specific precautions should a traveler take to protect their calls, texts and data streams from being spied on? Duvall: When traveling abroad, we recommend to our clients that their personnel and executives should practice good internet and social media hygiene. Some best practices include: Avoid using public Wi-Fi services—unless you use private VPN service for encryption Increase the privacy setting on your technical devices Disable location identifiers on apps Create a new (unlinked) email for internet correspondence Consider purchasing international MyFi devices to decrease the risk of getting your personal identification information (PII) or protected healthcare information (PHI) stolen Use temporary (i.e. burner) phones to protect your data and your contacts Q. What cybersecurity concerns are likely to impact travelers? Are the threats greater outside the United States or in any specific parts of the world? Significant precautions should be taken to protect personal electronic devices (PEDs) and the data connected to PEDs Duvall: The international cybersecurity landscape has grown increasingly dynamic, with threats posed by government authorities (in some countries), terrorists, insurgents, and criminals, requiring travelers to be proactive and vigilant. U.S. citizens, particularly executives of U.S.-based technology companies, must be aware that they are considered high-value targets for nation-state intelligence services and criminally-motivated bad actors. Many countries will go to great lengths and expense to acquire and exploit proprietary information from U.S.-based companies, and views U.S. executives visiting the country as “soft” targets of opportunity. As such, significant precautions should be taken to protect personal electronic devices (PEDs) and the data connected to PEDs. The tactics, techniques and procedures (TTPs) utilized by bad actors are often covert and nearly undetectable by the affected person. Threat actors routinely access, monitor and utilize Wi-Fi networks at hotels and in public spaces to compromise target devices. Other targeting methods include luggage searches, extensive questioning, and unnecessary inspection and downloading of information from personal electronic devices. There are numerous, high-risk countries for which the U.S. Government warns travelers to be wary of mobile malware, mobile device privacy attacks and hot spots for mobile botnets. The U.S. Department of State has the most recent and up-to-date list. For example, the U.S. Government has investigated numerous incidents in which U.S. travelers’ PEDs (personal and company devices) have been compromised by Russian authorities while transiting Russian airports, left unattended in public spaces and in travelers’ hotel rooms. When traveling to an unfamiliar place, research your destination to understand the local roads and transportation, geography, local roads, culture, etiquette and laws Q: What physical security precautions should a traveler take? Duvall: Here are some useful precautions: When traveling to an unfamiliar place, research your destination to understand the local roads and transportation, geography, local roads, culture, etiquette and laws. Protect your personal information and travel itinerary as much as possible. Limit the amount of jewelry worn, cash, credit cards and electronic devices carried while traveling. Avoid staying on the ground floor of a hotel. Consider choosing a room on the 2nd through 7th floors as these rooms may be more difficult to break into than those on the ground level, but still able to be accessed by fire/emergency response equipment. Never answer your hotel room door for anyone until you’ve determined who they are, why they are at your door, and if it is necessary for you to open the door to interact with them. Carry a rubber door stop/wedge with you to install on the room side of the door before you go to bed. Vary your patterns and routines when venturing out in to a new location, do not become predictable. Politely decline offers of food or drink from strangers (If you do accept beverages, ensure that they are in sealed containers and that there is no evidence of tampering). Never discuss your itinerary, personal, business or other sensitive information where others can hear you. Q: How can companies be proactive in protecting their business travelers? Companies should educate their employees on the importance of maintaining good internet hygiene while traveling abroad Duvall: When traveling on business, companies should provide their employees with clean computers and cell phones before departure. Upon return, the company should immediately wipe the computer clean to prevent any malicious threats from penetrating the company’s internal, cyber-infrastructure. Additionally, companies should educate their employees on the importance of maintaining good internet hygiene and recommend their employees disconnect from social media platforms while traveling abroad. Some general tips to recommend to your employees when traveling abroad include: Register in the Smart Traveler Enrollment Program (https://step.state.gov/step/) Visit Travel.State.Gov to view travel related information specific to the country or countries you’re visiting, including local US Embassy or Consulate contact information, as well as current travel advisories and alerts. Always leave a copy of your transportation and hotel itinerary and driver’s license (or passport if traveling internationally) with a family member or trusted friend. Always use a baggage tag with a protective cover Avoid using public Wi-Fi services Q: What digital resources and/or apps might a traveler benefit from (and how)? Duvall: The Chertoff Group recommends researching the below travel-related Apps before departing on a trip: TravWell: This app provides destination-specific vaccine recommendations, a checklist of what you need to do to prepare for travel, and a customizable healthy travel packing list. The app can store travel documents, keep records of medications and immunizations, and set reminders to get vaccine booster doses or take medicines. My TSA: This app provides real-time updates on airport delays. It includes how long security lines are at various airports; information about what you can and cannot bring onto an airplane; and a frequently-asked question list, including new advanced imaging technology. Border Wait Time: The app provides estimated wait times and open-lane status at land ports of entry, which may be particularly helpful when in an area with multiple crossings. Mobile Pass: The Mobile Passport app speeds you through U.S. Customs and Border Protection at (1) cruise port and (24) airports Q: As a security expert, what’s your best advice for travelers? Duvall: At the end of the day, travel security is not rocket science. Simply put, travelers need to: Be aware and situationally alert at all times. Be aware and situationally alert to the location of your luggage and carry-ons at all times. Don’t access unknown, unsecured or public Wi-Fi if at all possible. Turn off “auto connect” features and institute stringent privacy controls as much as possible. Try to “blend in” – you don’t have to try to look like a local but travelers should avoid gaudy and expensive attire wherever possible. Use your common sense – if an offer, invitation or opportunity seems to good to be true... it probably is.
In today's world of heightened security threats, the Internet of Things (IoT) and the availability of overwhelming amounts of data, comprehensively securing a single small facility is no easy task. Enterprise organizations tend to face even greater challenges when it comes to safety, as multiple people scattered throughout separate locations aiming to collaboratively respond to situations can easily become complicated. Individual buildings, divisions and branches of a large and/or global enterprise each possess diverse needs when it comes to streamlining operations and overall security. Almost all organizations are facing the same types of risks, such as cybersecurity breaches, workplace violence and natural disasters, requiring the decision-making process to be efficiently unified across the enterprise.Enterprises must ensure regular software updates and enforce best practices for employees at all sites to keep data safe Mitigating Cybersecurity Threat One of the biggest threats facing enterprise organizations today is cybersecurity. One small mishap or leak can quickly lead to larger complications and even force the entire business to shut down altogether. This is where strategic decision-making proves to be essential. Involving an IT department in security purchases and system implementations is critical for enterprise organizations to ensure the proposed system meets corporate IT data and security policies, as well as the organization’s required functional capabilities. Enterprises must also ensure regular software updates and enforce best practices for employees at all sites to keep data safe. Integrated Security For Information Exchange Enterprises must similarly address integration. In the past, manufacturers focused on providing products that worked well with other products within their own lines, but the development of open-platform technology has changed the game. Enterprises demand elevated integration across multiple security applications, event management and human resource systems, and open platforms allow integrators to better tailor a solution in accordance with an end user's needs. In the access control market, this requires manufacturers to provide systems that are easy to administer and manage to allow roles to be quickly and efficiently updated.Using a single, intuitive platform that simplifies operations and streamlines workflows helps to maximize investment Throughout the entire process, communication is key. Integrating multiple security systems together, such as access control and video, and enabling them to ‘talk’ to one another in an encrypted manner is necessary for the accurate and timely sharing of relevant information and data. Using a single, intuitive platform that simplifies operations and streamlines workflows helps to maximize investment by allowing enterprises to do more with existing resources, resulting in additional savings. Incorporating Cloud-Based Solutions Today’s enterprise organizations are taking a page from the IT playbook and incorporating cloud-based solutions to address physical security challenges—particularly in access control. Although the cloud is one of the most heavily talked about topics in the industry right now, the concept has existed for many years, decades even. Cloud-based access control technology offers installers and end users simplicity and ease-of-use As leading technology companies throughout the years began to deliver easy-to-use services, the development of mobile Internet devices soon normalized the idea of the cloud to the wider masses. The adoption of smartphones created the opportunity for physical security manufacturers to enter the world of cloud-based solutions. Today, the cloud is safer than ever, and provides unparalleled flexibility. Cloud-based access control technology, more specifically, offers installers and end users simplicity and ease-of-use. The cloud aids simple and quick installations as well as performing maintenance tasks remotely. This deliverance of ultimate control is an important commodity.Business continuity and risk management procedures must be maintained across the enterprise for day-to-day users, employees and visitors. Cloud Security Training Of course, one of the greatest fears surrounding the deployment of cloud systems for companies today is their vulnerability to hackers. But it is important to put those fears into context. All security manufacturers need to make sure their products are tested and bent to the highest standards to defend against vulnerabilities. While there can never be a 100-percent guarantee that there won’t be an attack, once you test your products to the highest degree and use a solid service provider, the risk to customers is greatly deflated. Additionally, establishing best practices for employees in how the cloud is used and passwords are stored can be instrumental in keeping the data being collected secure from outside threats and influences. Collaborating with both the IT and HR departments to develop rules and best practices, as well as effectively communicate these pieces, becomes imperative. On a regular basis, business continuity and risk management procedures must be maintained across the enterprise for not only day-to-day users of security technology, but also employees and visitors. In the event of a security incident or emergency, businesses must ensure that all members of the organization are properly trained and prepared to execute a cohesive and up-to-date response plan.
How’s this for a simple access control scenario? You walk up to a door, wave your hand in front of a button, the button lights up, and the door opens. That’s the simplified user experience that startup Openpath is promoting as it enters the crowded and mature market for physical access control. Openpath says a simple user experience provides the extra boost needed for mobile credentialing to gain momentum. In this case, it’s even simpler than using a card credential (no searching in a bag or purse for the card). And there’s no personal identification number (PIN) code to remember; no “intrusive” biometric element that can concern some users. James Segil, President and Co-Founder of Openpath, says the simplified process “uses fewer thought cycles.” Reliability of the system comes from Openpath’s SurePath triple-connect technology “We wanted to make mobile access control that people want to use and can use safely and with ease,” he says. “We wanted to make using a smart phone for access control easier and more reliable than using a keycard.” Simplified User Operation In the simplified scenario, the mobile credential resides on a smart phone that can remain tucked away in the user’s purse or pocket. The credential remains active without the user needing to open an app. The wave of the hand signals intent, which causes the button to light up, activate and the door is ready to open. Segil says the simplicity of operation has contributed to the system seeing an unheard-of 94% adoption rate among users. Reliability of the system comes from Openpath’s SurePath triple-connect technology. The smart phone credential is delivered using Bluetooth, WiFi or LTE (cellular) – whichever signal reaches the reader first enables the door to be opened. So even if a company’s WiFi is down or Bluetooth proves unreliable, there is still a third option. Openpath deploys “seamless” cloud integration and makes it easy for landlords and tenants to integrate Openpath with other systems Seamless Cloud Integration Segil is a serial entrepreneur who has had experiences as a frustrated user, dealing with many different offices, people and access control deployments over the years – subletting office space, changing PIN codes, dealing with 10 different offices using 10 different cards. Based on that experience, Openpath’s founders saw a need for a more user-centric approach to access control, and a chance to improve the office experience to be more aligned with employees’ experiences in their smart homes. Segil says he also saw “significant lethargy” among incumbent players in the access control space, and a market in which mobile and cloud technologies had still not taken hold. In addition to a simplified user experience built around mobile credentialing, Openpath deploys “seamless” cloud integration and makes it easy for landlords and tenants to integrate Openpath with other systems. The “elegant” readers, including a flush-mounted version, fit in well with high-end office environments. The company launched in May 2018. Openpath has been signing up national and regional channel partners all across the U.S. Openpath is focused on the commercial real estate market, where they have already seen significant adoptions, especially among mid-sized companies. Larger deployments as part of new construction are in the pipeline. National System Integration In the past six months since its launch, Openpath has been signing up national and regional channel partners all across the U.S. and now has a nationwide footprint and is able to service customers all over the U.S. They are not yet disclosing any specifics about the number of partners they have signed up and who they are. “I can share that we have a number of large national system integration and security brands on board as channel partners and many more regional and local system integrators,” says Segil. They are looking for additional integrator partners. “There is a cohort of folks out there who say ‘I get it,’ and I want to offer it to my customers,” says Segil. The cloud element of the system can provide recurring monthly revenue (RMR). Openpath’s system offers flexibility in terms of meeting each customer’s security needs. In addition to the “super convenient” scenario described above, the system can also be configured to be “super secure,” using two-factor authentication and other measures, says Segil. There are multiple “flavors” between the two extremes. It can also be integrated with elevators to enable the buttons on allowed floors. Integration With Existing Systems Cloud software simplifies operation for both tenants and landlords. The system is backwards-compatible to existing systems and can be used to retrofit and mobile-enable a legacy system, providing the benefits of mobile features and cloud operation to multiple sites. The software can interface with enterprise applications such as Active Directory, and an application programming interface (API) facilitates integration with other systems and building components. It operates with marketing automation platforms such as Flack and visitor management systems such as Envoy. The system is backwards-compatible, providing the benefits of mobile features and cloud operation to multiple sites Open standards make the system easy to install in new or existing buildings using RS485, or Cat 5 or Cat 6 wiring, whatever is in place. Retrofit installations can use existing panels, servers, software, etc., or they can be replaced. The Openpath panel is installed right next to an existing panel in a retrofit and preserves all legacy integrations of the previous system. Access Credentials Compatibility In its simplest configuration, the Openpath system consists of single or four-door panels wired using standard ports, Wiegand ports and REX ports, each connected to software in the cloud. Each panel works offline if the internet connection is down. Various key fobs, cards and other credentials are available in addition to mobile credentials. Openpath was one of the new exhibitors at last fall’s GSX show in Las Vegas, occupying a large-sized booth for a startup company. The “beautiful” hardware drew a lot of attention, says Segil. “The channel loves us, and we signed a lot of people,” he adds. “We were excited by the response.”
ADT Inc.’s acquisition of Red Hawk Fire & Security, Boca Raton, Fla., is the latest move in ADT Commercial’s strategy to buy up security integrator firms around the country and grow their footprint. In addition to the Red Hawk acquisition, announced in mid-October, ADT has acquired more than a half-dozen security system integration firms in the last year or so. Here’s a quick rundown of integrator companies acquired by ADT: Protec, a Pacific Northwest commercial integrator (Aug. 2017); MSE Security, the USA’s 27th largest commercial integrator (Sept 2017); Gaston Security, founded in 1994 as a video surveillance integration company and whose services have since expanded to include intrusion, access control, and perimeter protection (Oct. 2017); Aronson Security Group (ASG), which delivers risk and security program consultants and offers advanced integration services, consulting and design engineers and a National Program Management team (March 2018); Acme Security Systems, among the largest privately held security systems integrators in the Bay Area, focusing on electronic security systems, access control, video networks and more (March 2018); Access Security Integration, a regional systems integrator specializing in design, delivery, installation and servicing of electronic security systems including enterprise-level access control, video and visitor management solutions, perimeter security and security operation command centers (Aug. 2018); In addition to their moves in the commercial integrator space, ADT has also sought to expand their presence in cybersecurity with the following two acquisitions: Datashield, specializing in Managed Detection and Response Services (Nov 2017); Secure Designs, Inc., specializing in design, implementation, monitoring, and managing network defense systems, including firewall services and intrusion prevention, to protect small business networks from a diverse and challenging set of global cyber threats (Aug. 2018). ADT has acquired more than a half-dozen security system integration firms in the last year or so For additional insights into ADT’s game plan and the strategy behind these acquisitions, we presented the following questions to Chris BenVau, ADT’s Senior Vice President of Enterprise Solutions. Q: ADT has been actively acquiring regional integrators this year – more than a half a dozen to date. Please describe the history of how ADT came to embrace a strategy of acquiring regional integrators as a route to growth? ADT's acquisition of Red Hawk is set to close in December, and brings premiere fire and life/safety solutions BenVau: Our acquisition strategy started at Protection 1 when we embarked on our journey to build out our commercial and national account business and add enhanced integration capabilities to our portfolio. The merger of Protection 1 and ADT brought that foundation to ADT which up to that point was primarily a residentially and SMB-focused company. After the merger, we set out to identify and acquire additional regional integrators that would continue to build on that foundation and deliver enhanced technical solutions, advanced technologies and an expanded service, install and support footprint. Through our acquisitions we now operate two Network Operations Centers and three Centers of Excellence. We are also unique in the industry with the number and variety of certifications, like Cisco and Meraki, our engineers hold which ultimately allows us to offer Managed Security as a Service. They have also enhanced our operational capabilities. Q: What criteria do you use to evaluate whether an integrator is a good “fit” for ADT? BenVau: First and foremost, we look at the culture of the companies. The companies that we target for acquisition must be metrics- and customer service-driven. Secondly, we look at the leadership teams. ADT view their acquisitions more like mergers and take a patient approach to integrating them into their business We have been fortunate in the fact the leadership of the companies we acquired remain with us today in key management and executive positions helping to drive continued growth within their organizations. We also evaluate their current customer base, unique solutions and their ability to complement and enhance our portfolio with the goal of becoming a leading full-service, enterprise commercial provider. Our acquisitions have bolstered our network capabilities, brought enterprise risk management services, and a broader solution set in high-end video and access control solutions. Our most recent acquisition – Red Hawk, set to close in December – brings us premiere fire and life/safety solutions. Q: What changes are typically needed after an integrator is acquired in order to adapt it to the ADT corporate model? BenVau: We view our acquisitions more like mergers and take a patient approach to integrating them into ADT while taking into account their culture. We want to ensure that we find the right positions for their people, embrace the right messaging and put the right processes in place. We acquire these companies because they are the best in their respective businesses and geographies and bring their knowledge and experience in markets or with solutions that we may not have had previous access to. ADT can support clients with their own in-house technicians which helps to ensure a consistent security program Q: How can regional integrators benefit from the ADT brand? Have your newly acquired integrators realised additional growth? BenVau: The companies we have acquired, generally, have exceeded expectations and surpassed initial goals. ADT brings expanded opportunities for these companies as well with our national footprint. Our National Account Sales Team has seen impressive growth over the years and are only limited by our ability to deliver. These integrators help to deliver on that. In the past, the regional players may have had to rely on sub-contractors to service their larger clients. With ADT, we can now support those clients with our own in-house technicians which helps to ensure a consistent security program across multiple locations.Our National Account Sales Team has seen impressive growth over the years and are only limited by our ability to deliver" Q: Are additional integrator acquisitions planned this year and into 2019? How much is enough and when will it end (or slow down significantly)? BenVau: We expect to close on our latest acquisition, Red Hawk, before the end of 2018. Red Hawk brings a national footprint focused on fire/life safety and security to ADT. While ADT already had a robust security offering, Red Hawk will contribute significantly to the fire side of the business. In addition, we will continue to evaluate the companies in the industry to determine if additional acquisitions make sense. Q: Do you expect greater consolidation of the integrator channel in the industry as a whole? Why is this a good time for consolidation? Is it a good M&A market for buyers like ADT? BenVau: We will continue to evaluate companies in the industry to determine if further acquisitions make sense. As for the industry, we can only speak for ourselves. Q: What other trend(s) do you see in the industry that will impact ADT (on the commercial side) in the next year or so, and how?Our focus is on investing in our field organization, in particular our service technicians, engineers and project management teams" BenVau: Networking is a big one. As we continue to drive integration of devices and services, from AI, “the cloud,” machine learning and even analytics, there will be more focus on the network they ride on. A deeper knowledge of network design, bandwidth impact, and system integration will be critical. As part of our acquisition strategy, we focused on talent to add to the team and have been able to add to our bench strength in this area. Q: Any other comments/insights you wish to share about ADT’s strategy, future, and role in the larger physical security marketplace? BenVau: Our focus is on investing in our field organization, in particular our service technicians, engineers and project management teams. The cornerstone of our success lies in our ability to deliver outstanding customer support and service. It starts with sales and the ability to deliver security and life safety technologies, but it ends with a delighted customer who partners with us to help secure the things that matter most to them. Our recent acquisitions have more than doubled our commercial field operations teams and are key to establishing the ADT Commercial brand as a leading full-service provider of enterprise solutions to the marketplace.
The Global Security Exchange (GSX) seems smaller this year, which is not surprising given the absence on the show floor of several big companies such as Hikvision and Assa Abloy (although their subsidiary HID Global has a big booth). A trend affecting the number of companies exhibiting at GSX 2018, and other trade shows, is industry consolidation, which is impacting the show even beyond the fewer exhibitors this year in Las Vegas. GSX is the new branding for the trade show formerly known as ASIS. There was an impressive crowd of visitors waiting for the show floor to open Tuesday morning; the conference part of the program began on Monday. After the attendees filed through the doors, the foot traffic seemed brisk throughout the morning, and was somewhat steady until the end of the first day. Exhibitors as a whole seemed pleased with the first day and cautiously optimistic about the rest of the show. Acquisitions And Consolidation HID Global announced on the first day that they will acquire Crossmatch - emphasizing the impact of consolidationEmphasising the impact of consolidation on the industry as a whole, and on this show, was an announcement from HID Global on the first day that they will acquire Crossmatch, a biometric identify management and secure authentication solutions provider. It’s a comparatively large acquisition for the company specializing in trusted identity solutions. Just days earlier, another acquisition also seemed to confirm the trend when UTC Climate, Controls and Security — the owner of Lenel — announced an agreement to acquire S2 Security. The fruits of another recent acquisition was on display at the GSX 2018 hall, where Isonas took its place near the front entrance as part of the Allegion booth, just three months after the global security provider acquired the ‘pure IP access control company.’ Isonas is well positioned in two of the three fastest growing segments of the access control market — IP hardware, which is growing 41 percent per year globally, and access control as a service, or ‘cloud’ technology, which is also outpacing the overall access control market. Allegion also has the third fast-growing segment, wireless locks, covered with its Schlage brand. "New Avenues Of Growth" The early days of new ownership is opening fresh opportunities for both organizations as Allegion seeks to leverage Isonas’ intellectual property and the smaller company finds new avenues of growth in the larger organization, says Rob Lydic, Isonas Global Vice President of Sales. Motorola joined Avigilon in a higher profile role at their booth, emphasizing consolidation in the industry Lydic sees a likelihood of additional acquisitions in the near future in the security space, given the large amount of capital currently available to be deployed, and the large number of entrepreneurial companies looking to make the leap, as Isonas did, from a small booth at the back of the hall to front-and-center as part of a big industry player. Another reflection of consolidation: Motorola Solutions is taking a much higher-profile role in the Avigilon booth. In addition to signage, ownership by Motorola is also impacting the Avigilon product offerings. For example, the Motorola Ally security incident management and communications system has been integrated with Avigilon’s analytics-based event detection, and is being positioned to serve the enterprise market. The system simplifies security operations with a single platform that allows access to critical data, including video and access control systems, directly from any web-enabled device. Another reflection of consolidation: Motorola Solutions is taking a much higher-profile role in the Avigilon booth Avigilon is displaying Motorola Solutions’ CommandCenter Aware integrated with Avigilon’s systems for use with public safety applications to provide dispatchers and intelligence analysts with video feeds, incident details, alerts, data mapping and responder location. Avigilon has also integrated its AI-driven Appearance Search technology with its Access Control Manager system, so video searches can be performed based on a badge credential. The system can automatically pull up any information, whether video or events in the access control system, based on the badge information. It can also be used to search for lost badges, or to view where a person is located in the building. Avigilon introduced an AI appliance that allows existing cameras to be integrated with Appearance SearchThe company introduced an AI appliance that allows existing (non-Avigilon) cameras (up to 20 two-megapixel cameras) to be integrated with Appearance Search. Also, the next generation of analytics allows detection of more things, such objects a person may be holding, or detection based on what they are wearing. The Growth Of The Cannabis Market Although attendees at GSX are generally understood to be more end users than integrators, Joe Grillo, CEO of ACRE, the parent company of Vanderbilt Industries and ComNet, says he sees little difference in attendees at GSX compared to the ISC West show in the spring. “We see all our resellers here,” he says. Grillo noticed that Day One booth traffic was “not consistently busy, but steady.” Grillo says ACRE expects to be active again soon in the mergers and acquisitions market. The company has grown through six acquisitions since its founding, and has had one divestiture (when it sold Mercury Security to HID last fall). Since selling Mercury, ACRE has been ‘back in the buying mode,’ just looking for the right opportunity, says Grillo. New markets are a theme at GSX, and one of the biggest new opportunities is the cannabis industry. Marijuana has been legalized in dozens of U.S. states, and Canada is on the verge of legalizing the drug. March Networks works with multiple cannabis operators to provide video solutions, point-of-sale transaction data, and customer analytics March Networks is among the companies targeting the cannabis industry in a big way. Already across the U.S., March Networks works with multiple cannabis operators to provide video solutions, point-of-sale transaction data, and customer analytics. The business intelligence solutions also aid compliance in the highly-regulated industry. March Networks provides radio frequency identification (RFID) tag to track plants throughout the channel, and tracking is integrated with video systems to provide correlated video views. A couple of exhibitors mentioned to me the need for commercial companies to deploy a comparable level of automation as their employees are accustomed to in the smart home environment. That suggests a need for things such as smartphone integration and voice commands. One exhibitor putting its toe in the water is Hanwha Techwin, which showed an Amazon Echo device used to control a video management system (VMS) with voice commands. Could the simple integration be a preview of the future of control rooms, where security officers merely talk to their equipment rather than operating controls? We’ll be talking to more companies (and maybe a few machines) on Day Two of the show, and will be reporting what we hear.
Apstec Systems (Apstec) announces that its Human Security Radar (HSR) system will be deployed at the Palexpo Exhibition and Congress Centre in Geneva to improve safety and security for the International Motor Show 2019. Asptec’s HSR system is the world’s first fully automatic real-time mass people screening solution. Held over a period of ten days, the Geneva International Motor Show is one of the automotive industry’s flagship events and attracts large numbers of visitors every year. The organisers are anticipating up to three-quarters of a million visitors over the duration of this year’s event, with capacity reaching 150,000 attendees a day during peak times. Largest Conference Centres The Palexpo is one of the largest conference centres in Europe, and as such has a duty of care to its visitors HSR is uniquely well suited to managing this level of throughput and providing a high level of security without causing disruption to the flow of visitors into the venue, or negatively impacting their experience. Two HSR systems will be deployed for the show, each capable of screening up to 10,000 people per hour. The Palexpo is one of the largest conference centres in Europe, and as such has a duty of care to its visitors. Traditional security checkpoints or manual searches, which scan one individual at a time, are not suited to large venues and public places, leading to queues and delays. Although security is still paramount, attention has moved towards the need to add a critical level of defense that doesn’t impede visitor experience. Cost-effective solution HSR was designed to address this challenge, and offers a practical and cost-effective solution to security screening in high footfall scenarios. The first fully automated, real-time mass screening solution, HSR provides seamless security to protect public places from terrorist attacks. Developed by specialists in the fields of radio physics, electronics and software engineering, the walkthrough system has been built in conjunction with authorities and ‘end users’ in security and counter-terrorism. HSR screens for mass casualty threats including improvised explosive devices concealed on the body or in body-worn bags, and firearms wherever they are carried, without the need for an operator to inspect suspect materials. It leverages centimeter wave technology, meaning it can discriminate explosives from benign materials, with a high degree of accuracy. Security screening The Palexpo’s deployment of HSR is the latest major implementation of this new technology Gregory Labzovsky, CEO, Apstec, explained: “Until recently, it’s been almost impossible to secure public spaces in a simple and cost-effective way, with existing approaches to security screening proving to be impractical, inconvenient and expensive to operate. HSR enables venue owners to close a critical security capability gap without impacting the experience of their patrons. We’re delighted to be working with The Geneva International Motor Show to enhance safety for thousands of motoring exhibitors and enthusiasts.” The Palexpo’s deployment of HSR is the latest major implementation of this new technology. The system has been installed in some of the world’s busiest airports, as well as in sports stadiums, entertainment venues, mass transport hubs and networks.
Boon Edam Inc., a global provider of security entrances and architectural revolving doors, announced that a recently renovated office space in Glasgow, Scotland, 191 West George Street, has installed Lifeline Speedlane Swing optical turnstiles for increased physical security and uncompromising aesthetics. A rising trend in the United Kingdom is the renovation of older office spaces. With a continuously growing workforce, cities across the country are transforming corporate offices into multi-level spaces with increased aesthetics. In keeping with this trend, the office space at 191 West George Street recently underwent a renovation. Revamped with space and simplicity in mind, the building’s atrium stands out due to its high-quality materials, including the sleek, Lifeline Speedlane Swing optical turnstiles used to control access to all occupants and visitors. Optical Turnstiles Integrated With Access Control The requirements were for an optical turnstile solution that could integrate with access control and had the versatility to control a large number of visitorsThe lead architect renovating 191 West George Street was Michael Laird Associates – a firm that flourishes in adaptable yet luxurious designs. Working directly with the architects, owners of the office space underwent a simple product selection process regarding security. The requirements were for an optical turnstile solution that could integrate with access control and had the versatility to control a large number of visitors. 191 West George Street is the home of a 6-level building with 87,000 sq. ft. of usable office space. The architects wanted to keep the look and feel of the entire building, open and clean, without any columns or other impeding structures. The designers chose a stainless-steel finish for the modern and sleek cabinets of the Speedlane Swing optical turnstiles to provide a perfect accent for the neutral white and mushroom colors of the lobby. Their minimal footprint allows them to integrate seamlessly into any location without being obtrusive to user access or aesthetic design. Lobby Security Solution All lanes can be controlled remotely via a device called BoonTouch that gives reception control to open or close lanes at any time191 was designed to be a bustling, flexible workspace for hundreds of daily users, and as space is rented and the building starts to experience higher traffic, the four lanes of optical turnstiles will be able to handle the load. Working in collaboration with Boon Edam’s sales and specification managers, the architect had a clear idea of what they were looking for in a lobby security solution. By reviewing a number of key elements related to security, throughput, aesthetics, safety, and technology, Boon Edam was able to map out all aspects of the entry requirements prior to selection and installation. The four-lane array of Speedlane Swing optical turnstiles includes a single, wide lane at the end. Wide lanes allow large groups to pass through as well as wheelchairs, dollies and luggage. All lanes can be controlled remotely via a device called BoonTouch that gives reception control to open or close lanes at any time.
Genetec Inc., a technology provider of unified security, public safety, operations, and business intelligence solutions announces that the South Grand Community Improvement District (CID) in St. Louis, Missouri is using the Genetec Stratocast cloud-based video monitoring system to deter license plate theft in its parking lot and provide video access to the local police department to help reinforce security. License Plate Theft One of the services offered by the South Grand CID is free parking. At any time of the day, drivers can park in a central parking lot to visit businesses or residents. While this lot has always been convenient and safe, license plate theft was troubling nearby areas. Video recordings are sent over a wireless network which connects to the South Grand CID main office To deter license plate theft in their own community, the South Grand CID board decided to add video surveillance to the lot. Currently, three cameras monitor the entire 90-space parking lot. Video recordings are sent over a wireless network which connects to the South Grand CID main office, just a few blocks away from the lot. With this cloud-based video monitoring system, Rachel Witt, Executive Director at South Grand CID, can quickly and easily view video from anywhere, at any time. Cloud Video System “Using the cloud video system, I am able to find and view the video in seconds. I can narrow down my search based on dates and time and watch the event unfold with all camera feeds up on the monitor. It’s really that simple,” commented Witt. Only two weeks after installing the Stratocast video monitoring system, a visitor reported that their license plates had been stolen. “The visitor provided a description of the car, and a timeframe in which the incident likely happened. Using the Stratocast system, I was able to find and view the video in seconds. I could clearly see the suspect enter the lot, remove the plates and leave in his own car. Since the police are very busy here, I was able to bookmark the video recording and then notify them that the video was ready,” said Witt. View Video Recordings Stratocast has made it easy for the South Grand CID to give video access to local police so that when a crime is reported in the district, officers can immediately begin to conduct investigations without leaving their desks. While the South Grand CID manages and owns the Stratocast solution, officers can log into the system and view video recordings when required While the South Grand CID manages and owns the Stratocast solution, officers can log into the system and view video recordings when required. This is enabled by the Genetec Federation feature, which gives an organization access to manage multiple independent Genetec systems as one. A memorandum of understanding was signed so each parties’ responsibilities are clear. Better Sense Of Safety “Instead of driving over and picking up a DVD, officers can directly access video from our cameras to see what happened. Not only does it help speed up investigations, it saves officers’ valuable time,” continued Witt. The installation of Stratocast is not only helping to reduce license plate theft but it is also helping residents and visitors feel safer than ever. “Business owners, residents, and visitors have a better sense of safety when they know cameras are up. But they also need to know that we’re equipped to respond quickly to any disturbance. And that’s what Stratocast helps us achieve. With the addition of Stratocast, we’re able to show everyone that we have strengthened the security in our community,” concluded Witt.
HID Global, globally renowned trusted identity solutions provider, and Phunware, Inc., a fully integrated enterprise cloud platform for mobile that provides products, solutions, data and services for brands worldwide, has announced their collaboration to improve the experience for hospital patients and visitors to find their way within medical facilities, using wayfinding on their mobile phones. Wayfinding is indoor navigation to guide a person step-by-step on the way to a desired destination. Wayfinding And HID Location Services Phunware and HID are addressing the need of healthcare institutions to deploy standardised technology "The combination of Phunware’s market-leading wayfinding and mobile engagement capabilities with innovative HID Location Services will ultimately revolutionize wayfinding within healthcare institutions,” said Phunware co-founder and CEO Alan S. Knitowski. “It’s easy for visitors and patients to get lost in hospitals, and every time they do it puts appointment times and patient satisfaction at risk. With our location-aware app on a mobile device, we equip the visitor to get instant, turn-by-turn navigation that creates a better experience than that which is currently available on the market.” Phunware and HID are addressing the need of healthcare institutions to deploy standardized technology to provide a better wayfinding and visitor engagement experience inside the hospital, across campus and even in parking lots. Unified Healthcare IoT Solutions Healthcare organisations can easily lay out the foundation for IoT applications, such as wayfinding" “Wayfinding is one more application that we are integrating into HID’s unified healthcare IoT solution to make it easier for healthcare systems to manage a growing demand for automated and streamlined experiences,” said Rom Eizenberg, Vice President of Sales, Bluvision, part of HID Global. “With HID technologies, we have changed the location-aware landscape, delivering location as a service. Now, healthcare organizations can easily lay out the foundation for IoT applications, such as wayfinding.” Healthcare IoT-Enabled Platform HID’s healthcare IoT solution-enablement platform simplifies the delivery of real-time location of clinicians, patients and devices. The platform is enabled by Bluvision (part of HID Global). Multiscreen-as-a-Service (MaaS) Platform Phunware’s Multiscreen-as-a-Service (MaaS) platform also provides enterprise-level mobile wayfinding, engagement, data and more for other vertical markets, including retail, residential, hospitality, media and entertainment and more.
Comprising a large tertiary and secondary hospital, along with three rural hospitals, Waikato DHB is a substantial healthcare operator which employs approximately 6,000 staff throughout the region. With security needs that include protecting staff from verbal and physical abuse, safely securing high-dependency patients in dementia wards, restricting unauthorized access to medication and medical equipment, and protecting high-risk facilities such as newborn intensive care units, Waikato DHB required security systems that could be applied to both high and low security areas and found the solution in Gallagher’s range of innovative security products. Serving a large geographical area of the North Island of New Zealand, the Waikato District Health Board (Waikato DHB) provides hospital and community-based health services to a population of nearly 400,000 people. Controlling Access Areas Within Hospital Gallagher’s system enables us to make changes quickly and push that information out to the card readers instantly"Gallagher’s access control system and Command Centre central management platform provide Waikato DHB with control over access in and out of areas within the hospital. With access profiles that change on a daily basis, as medical staff – predominantly nurses – move between different departments on different days, it’s vital that the system can be updated simply and efficiently. “Gallagher’s system enables us to make changes quickly and push that information out to the card readers instantly, ensuring that staff can approach doors with the confidence that they can enter or leave areas as necessary,” said David Wilson, Manager of Security and Parking for Waikato DHB. The safe and secure storage of medication and medical equipment, ranging from syringes and surgical tools, to large expensive machinery, is a legal requirement of all hospitals in New Zealand. Single Access Card System Gallagher’s access control solution forms a part of the security system that delivers this for Waikato DHB facilities. Utilizing a single accesscard system where permissions can be set to allow different access ensures the efficient movement of staff, reduces the risks associated with handling keys, and provides a comprehensive audit trail that identifies access movements by employee. Utilizing a single access card system where permissions can be set to allow different access ensures the efficient movement of staff Waikato DHB is proud to put people at the center of what they do, and strives to ensure staff and patient safety at all times. A number of Waikato DHB’s wards require high-level security either for the protection of the patients – as in the case of dementia facilities – or staff. Duress buttons located throughout the hospital and its high-risk areas automatically notify security staff of the exact location where a duress alarm has been activated. Lock-Down System Gallagher’s Command Centre Mobile application delivers these duress notifications directly to a guard’s mobile device – speeding up the delivery of urgent information directly to security personnel. The ability to lock-down areas of the hospital for safety reasons is paramount. “Command Centre gives us the ability to isolate areas and restrict access. This is a critical requirement for us and the reliability of that lock-down system is hugely important,” said Wilson. With so many visitors and staff coming and going from the hospital, carpark management is an important aspect of facilities administration for Waikato DHB. In choosing a solution, the DHB selected Gallagher’s Carkpark Management system - an optional license feature. Streamlined Parking Processes Through an integration with Gallagher’s Command Centre security management software, staff are able to badge their access card at one of the many staff and public carparks on site, and have their parking fee deducted from their pre-paid account. The program has in-built intelligence including the ability for staff to exit and re-enter during a set period without being rechargedThe program has in-built intelligence including the ability for staff to exit and re-enter during a set period without being recharged. This system has streamlined parking processes, particularly for part-time and shift-work staff who have irregular parking requirements. According to Wilson, “One of the real strengths of this system is the reporting. By managing the pre-paid carpark system through Command Centre and linking it to staff access cards, we are able to effortlessly extract detailed reports.” Electronic Tag Boards Waikato DHB’s facilities are continually expanding and this means a large number of contractors may be present on site within a 24 hour period. By utilizing another Gallagher license feature - electronic Tag Boards - contractors can easily sign on and off of the site. A key driver for this was health and safety, “It’s really important for us to know who is on site in case of an emergency,” said Wilson. “Making this process as simple as possible for contractors is the best way to ensure it is used.” A number of other system integrations appear across the site, including CCTV. Waikato DHB’s largest hospital facility, Waikato Hospital, has over 250 CCTV cameras connected to Gallagher’s Command Centre platform. As Waikato DHB’s requirements continue to evolve, Gallagher’s systems expand alongside them. Security Ward Standard The Security Ward Standard details the minimum security equipment required for new buildings, including access control, duress alarms, and camerasTo remain at the forefront of technology, Waikato DHB has a software maintenance agreement with Gallagher, to ensure they operate the very latest software available. “Any advancement in technology will make life easier, that’s a straightforward investment for us,” said Wilson. Through Waikato DHB’s experience with Gallagher products, the team developed a ‘Security Ward Standard’. This standard details the minimum security equipment required for new buildings, including access control, duress alarms, and cameras. The Security Ward Standard has greatly reduced the time involved by Waikato DHB staff in producing specification documents and gathering approvals. “Gallagher gives us a complete and total security package that is expandable and easy to manage,” said Wilson. “We are confident that a high-standard of security is being consistently applied across our sites for the safety of our staff, patients, and visitors.”
Wilson James has appointed SmartTask as preferred technology partner and awarded it a deal for the supply of a mobile patrol and electronic smart form solution for a new security contract with National Museums. Under the agreement, the company will now roll out the SmartTask workforce management software to 10 sites including the Natural History Museum, V&A and Science & Industry Museum. This follows a successful trial that achieved significant time savings by removing paperwork and streamlining operational processes. The new partnership between Wilson James and SmartTask will replace an incumbent supplier agreement that no longer met the business and operational requirements of the security, construction logistics and business services provider. Identify Potential Benefits In particular, the retender process for the security contract with Natural Museums required a single provider of a highly-configurable mobile patrol and electronic smart form solution. An initial trial at the Natural History Museum focused on use of electronic forms via SmartTask-enabled smartphones to reduce administration and increase productivity of operational staff. The trial highlighted the clear benefits of using the SmartForms, most notably around confiscated items and vehicle forms It was designed to identify potential benefits based on the precise requirements of the customer as well as create a suite of seven SmartForms and reports that could deliver standardized data capture and analysis. This included confiscated items and vehicle check SmartForms, scenario testing and incident reporting. The trial highlighted the clear benefits of using the SmartForms, most notably around confiscated items and vehicle forms. Required Monthly Reports Confiscated items, following bag searches carried out at point of entry, historically required between 10-15 minutes to complete and during that time the security officer was away from the floor resulting in lost productivity. Following the adoption of SmartTask, reports can now be created automatically using highly-accurate data, while paper usage and printing requirements have been dramatically reduced. The time savings achieved at the National History Museum by the Wilson James team have led to higher productivity, greater capacity to carry out bag searches and increased visibility of security staff. Management time saving have also been realised in production of required monthly reports, as well as administration savings of 12-hours per week for the Security Duty Managers. Ease Of Deployment Don McCann, Technology Systems Consultant at Wilson James commented: “SmartTask provided significant support throughout the contract bid and contributed to the successful re-signing for a further five years.” SmartTask has also handled a separate project for Bradford Science Festival, which further demonstrated the flexibility of the system" “The solution is now fully operational at five locations – Natural History Museum, National Science & Media Museum, National Railway Museum, Science & Industry Museum and a Wandsworth storage site – with the Science Museum and V&A to follow shortly. SmartTask has also handled a separate project for Bradford Science Festival, which further demonstrated the flexibility of the system, ease of deployment and its suitability for the security sector.” Enhance Customer Satisfaction Paul Ridden, CEO of SmartTask said: “This latest agreement demonstrates our ability to work closely with our customers to develop advanced workforce management solutions that support business development, customer retention and quality service delivery. We are now partner of choice for a growing number of security organizations based on our proven track record helping to tackle some of the most common and difficult operational challenges they face.” SmartTask is an advanced and simple-to-use employee scheduling and mobile workforce management solution that enables security companies to better plan and manage their workers, so they are at the right place, at the right time. The cloud-based software solution combines intelligent rostering, live monitoring and integrated proof of attendance across both static and mobile teams, making it the ideal tool to improve operational control, enhance customer satisfaction, and support duty of care to staff.
Round table discussion
Using a smart phone as an access control credential is an idea whose time has come – or has it? The flexible uses of smart phones are transforming our lives in multiple ways, and the devices are replacing everything from our alarm clocks to our wallets to our televisions. However, the transformation from using a card to using a mobile credential for access control is far from a no-brainer for many organizations, which obstacles to a fast or easy transition. We asked this week’s Expert Panel Roundtable: When will mobile credentials dominate access control, and what are the obstacles to greater adoption?
Hospitality businesses work to provide a safe and pleasant customer experience for their guests. Hotels offer a “home away from home” for millions of guests every day around the world. These are businesses of many sizes and types, providing services ranging from luxury accommodations to simple lodging for business travelers to family vacation experiences. Hospitality businesses also include restaurants, bars, movie theaters and other venues. Security needs are varied and require technologies that span a wide spectrum. We asked this week’s Expert Panel Roundtable: What are the security challenges of the hospitality market?
Enterprise customers provide a large, and very lucrative, business opportunity for the physical security market. These customers include big global companies with plenty of revenue to spend and employees and facilities to protect. As a group, enterprise customers also tend to be a demanding lot, requiring systems that are large, scalable, that can operate across a wide geographic area, and that provide top-notch system performance. Enterprise customers set the standards of performance for the entire market, and they challenge manufacturers to up their game. We asked this week’s Expert Panel Roundtable to reflect on the industry’s biggest customers: What are the security challenges of the enterprise market?