Visitor management systems
Ava Group (AVA), a provider of security risk management services and technology will be showcasing its portfolio of security solutions at Intersec Dubai 2019, stand S3-C48. Intersec Dubai features a rich selection of exhibitors in Security, Safety & Fire Protection, attracting visitors from the Middle East, Africa, the Indian subcontinent and well beyond. Ava Group will be presenting the latest exciting solutions from its technology division - which incorporates Future Fibre Technologies (F...
Data Management, Inc., owner of Visitor Pass Solutions, launches with a new name and confirmed focus, further planting their flag in the security industry. The company will now go by the name ‘THRESHOLD,’ a term evocative of their expertise in visitor management systems. With the new tagline, ‘the gateway to stronger security,’ the company emphasises its function as the first line of defense for their clients, as they manage the traffic entering and leaving their clients...
How’s this for a simple access control scenario? You walk up to a door, wave your hand in front of a button, the button lights up, and the door opens. That’s the simplified user experience that startup Openpath is promoting as it enters the crowded and mature market for physical access control. Openpath says a simple user experience provides the extra boost needed for mobile credentialing to gain momentum. In this case, it’s even simpler than using a card credential (no s...
Maxxess will be at Intersec 2019 showcasing its latest advances in corporate risk reduction, improved people management and smarter hospitality access solutions - including new releases in its popular eFusion and Ambit solutions. eFusion Security Management The latest version of the VisitorPoint module within the eFusion security management platform will be showcased, offering a host of new streamlined functions for efficient people and visitor management. Harnessing current advances in cloud...
Maxxess will be at Intersec 2019 showcasing its latest advances in corporate risk reduction, improved people management and smarter hospitality access solutions - including new releases in its popular eFusion and Ambit solutions. The latest version of the VisitorPoint module within the eFusion security management platform will be showcased, offering a host of new streamlined functions for efficient people and visitor management. Harnessing current advances in cloud computing and mobile communic...
Johnson Controls announces that it has partnered with Civic Technologies, the global digital identity leader. Johnson Controls will integrate the Civic Secure ID Platform (SIP) with C-CURE 9000 Security and Event Management Systems from Software House to provide visitor management with greater data privacy and protection, enabling building visitors to securely present their verifiable identity using the Civic App. This partnership will enable properties secured by C-CURE 9000 a more convenient...
Maxxess Systems introduces new enterprise software that combines security, communications, business intelligence and data integration into a single, easy-to-use platform called Maxxess InSite. Maxxess InSite, Unified Interface Platform Maxxess InSite sets a new benchmark for security and business intelligence software platforms by every standard of measure" Nothing operates, functions or looks like Maxxess InSite. It combines systems intelligence and human intelligence to detect and respond to unfolding events in real-time – all of which is queued, organized and displayed on a highly-intuitive user interface. In doing so, Maxxess InSite truly enables early action, allowing IT, Operational Technology and Physical Security departments within organizations to correlate data, improve response coordination, and deal with issues when they’re small – before they become large and costly. This new system is uniquely categorized as an Awareness and Response Coordination System. “Maxxess InSite sets a new benchmark for security and business intelligence software platforms by every standard of measure,” said Nancy Islas, President of Maxxess Systems. “It goes beyond basic detection and control. It empowers total awareness and provides users with unprecedented capabilities to help prevent incidents from happening. It also coordinates the activities of first responders and the people they are assisting from the moment a threatening event is detected. And best of all, is the simplicity of Maxxess InSite’s operation.” Security And Business Intelligence Software Maxxess Insite is a single system that harnesses the power of myriad system technologies Maxxess InSite features an open-architecture framework to accommodate virtually any security or business intelligence application with comprehensive functionality – from automated responses with database integration to mobile alert notifications with two-way communications. Hardware and software solutions from more than 50 different leading manufacturers are already integrated into Maxxess InSite, providing more combined capabilities and functionality than any other cross-platform solution available. This allows Maxxess InSite to be configured for virtually all applications, employing any combination of software modules and hardware to deliver each user with a highly customized solution and unparalleled efficiency. Myriad System Technologies Maxxess Insite is a single system that harnesses the power of myriad system technologies, effectively expanding their collective capabilities while also making human interaction more intuitive. It meshes the capabilities of the following systems and technologies, and more: video surveillance, access control, GPS/IPS location technologies, intrusion detection, fire safety systems, perimeter detection/protection, HVAC/building management, smart phones and tablets, ID/credential badging, two-way communications, guard tour, visitor management, time and attendance, license plate recognition, hotkey emergency notification, reporting/forensics, wireless sensors, elevator/escalator control and database integration. Kevin Daly, CEO of Maxxess Systems, added, “The beauty of the product is that even with these diverse integrations and functions, the system is very user friendly. Simplicity of use is truly the system’s ultimate sophistication.”
Feenics Inc., a provider of the access control as a service (ACaaS) Keep by Feenics cloud-hosted platform, continues to expand its reach globally, adding an office and representative in Beirut, Lebanon. Nancy Abou Eid, who holds a Master’s Degree in Computer Science and a Bachelor’s Degree in Software Engineering will lead the new Middle East location in Beirut and target additional growing areas including Dubai and Abu Dhabi in the United Arab Emirates. Educating Resellers About Keep With the addition of this office, Feenics now has an established presence in North America, Latin America and the Middle EastAbou Eid was one of the first employees of Feenics and an architect of the original Keep by Feenics solution. Her focus will be on educating value-added resellers, consultants and users on the advantages of the scalability, flexibility and advanced security available in the cloud-based ACaaS solution. With the addition of this office, Feenics now has an established presence in North America, Latin America and the Middle East. “I’m excited to be an integral part of the Feenics team again,” Abou Eid said. “The Keep solution has progressed dramatically since the company’s start up in 2010, as has acceptance of the cloud for safe and secure access control management. It’s where the future is going and the Middle East region is receptive and open to the advantages of cloud computing.” As the cloud has become a more comfortable environment for North American users and with many of those customers managing global locations, Feenics can now more fully support additional customers in the Middle East. Expanding Footprint To Support Customers Abou Eid will handle sales and regional technical support for Feenics from the Beirut office“We have many global customers and that requires us to expand our footprint,” said Sam Shalaby, Chief Executive Officer of Feenics. “Nancy hit the ground running and she’s out to make things happen. She was one of our engineers and we had kept the lines of communication open, so when the opportunity presented itself, she was perfect for the role. “Being successful is about having the right people so you can expand properly. It was an easy transition and opportunity for us to open an office in the Middle East. The location will be a natural extension of our efforts in our home office.” Abou Eid will handle sales and regional technical support for Feenics from the Beirut office, which is also staffed with two technicians and a software engineer. Low Cost Advanced Security Solution Keep V3 provides extreme scalability, unprecedented flexibility and advanced security in a cloud-based ACaaS solutionFeenics most recently was recognized with two prestigious security industry awards for innovation: 2017 Security Industry Association New Product of the Year and 2017 Most Valuable Product from Security Sales and Integration magazine, both for the latest Keep by Feenics Enterprise V3. Keep V3 provides extreme scalability, unprecedented flexibility and advanced security in a cloud-based ACaaS solution. It integrates native visitor management and a RESTful API that allows systems installers simple integration of a wide array of complementary systems and open hardware devices, generating new revenue streams while creating a path for customers to lower their total cost of system ownership. Keep by Feenics gives users the choice of on-site servers or offsite cloud deployment, hosted by the public cloud Amazon Web Services. Keep significantly minimizes costs through simple, maintenance-free and automatic upgrades, patches, disaster recovery and back up.
Shaking hands, exchanging business cards, and making meaningful business connections with exhibitors were 8,420 trade visitors from both government and commercial sectors who roamed across 7,000 sqm of exhibition space at the Bangkok International Convention and Exhibition Center. “Smart city was an overarching theme at this 6th edition of the fair,” said Ms Regina Tsai, Deputy General Manager of Messe Frankfurt New Era Business Media Limited. “This, together with three concurrent events for fire & safety, smart home, and info security, ensured that all of the market’s most important needs were covered.” Understanding Market Exhibitors at this year’s fair came from 16 different countries and regions and included some of the providers of security technology “The feedback from visitors and exhibitors alike on the quality and comprehensiveness of the show has been highly encouraging, and the general consensus is that there is still huge potential for growth in the Thai security industry, particularly in light of the construction taking place across the country.” Bidding to tap into the huge potential of the Thai market, exhibitors at this year’s fair came from 16 different countries and regions and included some of the providers of security technology. Dahua, Full Enterprise, Great Lite, Hikvision, HIP global, JVCKenwood, Konica Minolta and ZKTeco were all in attendance with a selection of the latest video surveillance, access control systems and smart city solutions. Ian Shi, Dahua’s overseas business manager for Thailand, spoke about how the company’s participation at Secutech Thailand allows them to deepen their understanding of the market: Smart City Products “Secutech Thailand is the most professional security show in the country. All of the big brands are here and this year we can see customers from many different vertical markets, including the government. For this reason it is a very fruitful exhibition for us to gather market information and understand customer demands. Our surveillance systems can carry out facial and number plate recognition through the use of artificial intelligence. Given that the government is continuing to plan for Thailand 4.0, we see many opportunities in the future for our smart city products.” The smart city theme was also featured at two international pavilions from Taiwan and Singapore. NewDVR, a Singaporean company that specializes in cloud based solutions for smart city were participating at the show for the first time this year in order to launch their smart community solution to property developers. Big Property Developers The market in Thailand at the moment is definitely embracing the smart city concept, and we are positive about the future outlook" The company’s Regional Product Manager, Mr Jonathan Chan said that the market for their solutions is primed for growth and that Secutech Thailand is an excellent way for them to reach potential partners: “The market in Thailand at the moment is definitely embracing the smart city concept, and we are positive about the future outlook. Secutech Thailand gives us a great platform from which to connect with big property developers and partners such as Sunsiri, Design 103 and many more.” With so many different high-tech solutions on display across the fairground, the show was an excellent one stop sourcing platform for trade visitors from across the ASEAN region. Mr Aibert Josha Sainz, a system integrator and IT manager traveled to the show from Laos in order to find the best access control and surveillance systems for his projects. Comprehensive Exhibition “I’m involved in security software integration and I’m here at the show to find CCTV and access control systems that can integrate with our software. This is my first time at Secutech Thailand, it’s a very comprehensive exhibition. Whether you are in the smart city, smart home or smart building sector, whatever you are looking for you can find it here.” The excitement surrounding the smart city, smart home and smart building sectors was equally palpable with regards to Thailand’s fire and safety market. Mr Joji Jose, Marketing Manager of Al Khoory Pumps, a first time exhibitor at the concurrent Fire & Safety Thailand event, recognized the fair as an ideal gateway for international suppliers to enter the market: Gain New Contacts Thailand is a country where a lot of construction is taking place and for this reason we see huge potential in the market for our products" “Thailand is a country where a lot of construction is taking place and for this reason we see huge potential in the market for our products. We manufacture fire pumps in Dubai and by participating at Secutech Thailand we are able to promote our brand, gain new contacts, find the right distributors and gather valuable market data.” Another exhibitor to speak in positive tones about the fire and safety market was Mr Ian Brough, General Manager of Raidrop International: “This is the first time we’ve exhibited at Secutech Thailand. We’re a UK manufacturer of fire protection products. The Thai government has enacted some quite strict fire and safety regulations which helps us because our products are all internationally certified.” Educational Seminars “Exhibiting at Secutech Thailand allows us to develop our presence in the market and find distributors. The visitor flow this morning has been very good and we have been able to gain plenty of new contacts.” While business contacts were being made in the aisles of the exhibition hall, a series of nine educational seminars and events were also taking place. With the IoT and digitisation as central themes, the events illuminated the development opportunities for Thailand’s smart cities. Just one of many highlights was the well-received Thailand mayor’s summit, which involved a panel discussion on the key requirements for smart city development and sustainability. Valuable insights about info security, NB – IoT, smart policing, smart building technology and hotel security could also be gained through the fringe program. Safety Certification Regulations Mr Apichart Prasitnarit, a speaker at the ‘Realtech: IoT for Smart Buildings’ seminar and President of the Real Estate and Partnership Trade Association, spoke about how Secutech Thailand’s fringe events help to spark new business growth: These seminars are so important for spreading ideas and informing stakeholders about new technology in areas such as the IoT and cloud computing" “These seminars are so important for spreading ideas and informing stakeholders about new technology in areas such as the IoT and cloud computing. Through the seminars, attendees can pick up new ideas which they can then apply to their own businesses. This in turn can stimulate growth within the security industry.” In addition to spotlighting new opportunities, several concurrent events also dealt with the fire and safety challenges that have emerged due to urbanisation. The government has enacted stricter fire and safety certification regulations but there remain large issues with non-compliance. Importance Of Certification Mr Lothar Sysk, Chief Representative of VdS, a security and fire safety certification provider, spoke about how attending Secutech Thailand’s fire and safety forums have helped him to spread the word on the importance of certification: “The seminar is vital for engaging directly with local stakeholders. Even though we have an Asian representative office in Shanghai, VdS is still not very well known in Thailand, so by speaking at the seminar today, we are not only able to promote our brand, but we can also spread the word about the importance of certification, which is a hot topic now in Thailand. I definitely intend to return again to future Secutech Thailand shows.”
Evolv Technology announced Evolv Edge, its people screening system that detects weapons and bombs, has achieved the U.S. Department of Homeland Security (DHS) SAFETY Act Designation. Following a rigorous application and due diligence process by DHS, the Evolv Edge is now a Qualified Anti-Terrorism Technology (QATT). As part of the Homeland Security Act of 2002, Congress enacted the Support Anti-Terrorism by Fostering Effective Technologies Act (SAFETY Act) to provide incentives for the development and deployment of anti-terrorism technologies. The purpose of the Act is to ensure that the threat of liability does not deter potential manufacturers or sellers of effective anti-terrorism technologies from developing and commercializing technologies that could save lives. The process to obtain the SAFETY Act Designation involves extensive review of the product, its use and experience – including a review of test results; operational, manufacturing and quality assurance practices and effectiveness; and feedback from customers. Security teams look for technology, such as the Evolv Edge, that is validated by the SAFETY Act to provide peace of mind" Preventing Physical Security Threats “The SAFETY Act Designation mitigates the impact of terrorism-related lawsuits, allowing our customers to focus on what’s most important: providing a seamless experience for their visitors and employees that help keep them safe,” said Mike Ellenbogen, CEO at Evolv Technology. “This Designation provides further validation and reassurance for Evolv Edge customers that the technology can be used effectively for its intended purpose of detecting and preventing physical security threats – ultimately helping people feel safer in places they visit.” “Venues like sports stadiums need to employ a comprehensive, multi-layered plan to ensure the safety and security of their fans, players and staff,” said Mark Sullivan, a member of the Evolv Technology Board of Directors and former director of the United States Secret Service. “Part of this effort includes carefully evaluating security technology to help protect against the kinds of threats we’re increasingly seeing in our world today. Security teams look for technology, such as the Evolv Edge, that is validated by the SAFETY Act to provide peace of mind that their technologies are working as they should, enabling them to be proactive before an event happens, and provide the safest visitor experience possible.” Hassle-Free People Screening Evolv Edge takes the hassle out of people screening by consistently scanning for bombs and weapons Evolv Edge takes the hassle out of people screening by consistently scanning for bombs and weapons without the need to empty pockets. The result is a positive experience for both employees and visitors. The systems have screened millions of people at many different types of venues globally including performing arts venues, sports stadiums, transportation hubs and government institutions. For example, Oakland International Airport (OAK) installed the Evolv Edge earlier this year to enhance its employee screening program; and an iconic tourist attraction with peak traffic of 13,000 visitors per day is using Evolv Edge for daily visitor screening. Evolv Edge also recently completed operational testing and evaluation by Safe Skies and was successfully tested by TNO, an internationally recognized detection and testing facility, among other certifications and awards.
Schools are continuing to upgrade security measures for pupil safety. However, on top of all the fundamental challenges schools face, implementing well-rounded and effective security solutions can seem a great difficulty. Andrew Shaw, architectural consultant for Allegion UK, discusses the advantages of electro-mechanical solutions. Schools can equate to some of the most complex security challenges for architects, specifiers and school officials alike. This is because choosing the right solution requires a comprehensive analysis of a building’s design and layout and the different requirements of each perimeter, alongside specific uses, user groups and opening hours. Different areas and spaces, such as reception areas, entry points or classrooms, each need to be approached differently in terms of safety and security measures. Precautionary Lockdown Strategy Adequate training also means all staff know how to support an effective lockdown and facilitate a safe escape in the event of an emergency What’s more, if the building is used for out-of-hours purposes, or if contractors are on-site, these issues will also need to be addressed. Simply put, there’s no one-size-fits-all solution for schools. Security hardware and a precautionary lockdown strategy are necessities, as they are integral to the safety of teachers, students and visitors. Adequate measures need to be implemented so that schools are prepared for, and safeguarded against, external threats or unauthorized access. While a lot of the responsibility falls on the shoulders of facility managers, it’s also important for teachers and administrators to be aware of, and educated on, solutions and training. This means knowing how certain hardware works and how to spot a faulty product. Adequate training also means all staff know how to support an effective lockdown and facilitate a safe escape in the event of an emergency. Unique Building Requirements This is becoming increasingly important with newer systems too, especially as the Internet of Things (IoT) becomes more commonplace within the industry. Integrating electro-mechanical solutions into existing school security systems is now more commonly viewed as an achievable and viable option. Because an off-the-shelf security solution to fit all doesn’t exist, the benefits of integrating both electronic and mechanical solutions into systems are quickly becoming realized. As such, schools are growing more accustomed to tailored solutions based on their own unique building requirements and budgets. Each school layout is unique and, therefore, must address a range of security factors specific to different areas. Many areas within a school’s building design must accommodate for high capacity, especially in places that may be part of a fire escape route. Mechanical Door Hardware Schools need to consider the amount of exit and entry points, which will be dependent on the size and layout of the school grounds All schools need to address three different levels of security. The first level is the least vulnerable of the three and concerns the perimeter entry and exit points. The second level is more vulnerable than the first and relates to the point at which people are screened before entering the interior of the school. Finally, the third level - and the most vulnerable - refers to the core of the school that both pupils and staff occupy. The first level of security is the perimeter, and these areas become more important depending on the time of day. Schools need to consider the amount of exit and entry points, which will be dependent on the size and layout of the school grounds. Incorporating some level of electronic access control should be a consideration, whether that is a combination of electronic and mechanical door hardware, or a complete electronic solution. Greater Visitor Management An electromechanical solution, such as electric strikes, can be beneficial in the effectiveness of perimeter security as they provide greater visitor management and traffic control. Electric strikes are able to control access via keypads, cards and proximity readers. When combined with mechanical locks, they provide the benefits of unrestricted egress. This option also allows integration with central security systems, which can be automatically activated and pre-programmed for regular scheduled control. These solutions help lower the risk of potential unauthorized entry, which can lead to theft of equipment, and compromising people’s safety. They also aid facility and site managers in knowing where potential weak points are in the school perimeter. Because schools will most likely have multiple access points, the combination of mechanical hardware and access control systems allows for both security and convenience, providing greater control and monitoring. Efficient Access Control A well-designed school with a single-entry point allows for such monitoring, but should also cater to the efficient movement in and out of the building The second level of security is the administration or reception area. As this area will be designed primarily to facilitate visitor entry, it will require adequate monitoring of access control. This area should be able to restrict visitors from freely accessing the rest of the school. A well-designed school with a single-entry point allows for such monitoring, but should also cater to the efficient movement in and out of the building. To do this, the latches used on access-controlled egress doors can be electronically controlled from the reception area or school office. Exit or entry doors can be opened by a push from the inside and, if the entry area is also an emergency exit, electronically-powered panic bars can also provide an effective solution. When using access control solutions, schools are provided with information on who entered a part of the premises and when, are able to restrict or limit access to specific times of the day, and easily add and delete users, allowing them to manage access to the building more efficiently. Integrated Centralized Systems The areas most susceptible to vulnerability are the internal hallways, corridors, stairwells, entry points and restricted areas (such as staff lounges and science laboratories). These are the areas where a school must foster the safest environments for pupils, while also providing protection as they often contain confidential information, expensive equipment or chemicals. For these areas, there are a number of different solutions that will be beneficial, whether electronic, mechanical or a combination of the two. For electronic solutions, there are two options available: remote or centralized systems. With remote lockdown systems, individual locks are activated by remote control within proximity to the door. With integrated centralized systems, the access control system is linked to all doors within the school building and locked at the touch of a button. Mechanical solutions, which include a cylinder lock and key, are also ideal for places such as classrooms, as doors can be locked externally with a key or internally with a thumbturn, to prevent unauthorized persons from entering. When paired with electronic access control systems, mechanical hardware can provide simplified yet improved security levels. Electromagnetic Door Closers Electromechanically exit devices allow for monitored and safe access, while also allowing for an immediate exit In schools, it is often the case that entrance doors will also be fire exits. Electromechanically exit devices allow for monitored and safe access, while also allowing for an immediate exit. When integrated with electronic access control systems, emergency exit points become safer and more secure as access control measures can be added, whether for teachers, pupils or visitors. In the interest of fire safety, and to eliminate the illegal practice of propping fire doors open as well as aid free passage in busy areas, electromagnetic door closers can be linked with the building’s fire alarm system. When the fire alarm sounds (or in the event of a power outage), the electromagnet deactivates, bringing the door to a close in a normal manner, preventing the spread of fire and smoke. Building Design Requirements By design, electronic access control systems are also easy to use and maintain. The reliability and durability of such systems also means that there will be less need for excess time and money spent on maintenance, and there’s peace of mind in knowing the systems are code-compliant. Their flexibility additionally allows for the implementation of a highly-effective bespoke solution. Electronic access control and electronic devices are able to be integrated with or into a variety of other electronic and mechanical systems. This means schools are able to successfully tailor solutions to their own budgets and building design requirements. Fully integrated security solutions and biometrics are becoming increasingly affordable and accessible, giving school officials and managing teams greater control over their buildings. These solutions also give them scalability for the future, meaning systems are both future-proof and easily upgradable.
Security Essen 2018 presented itself as the international source of inspiration for the industry. 950 exhibitors from 43 countries showed their innovations for increased safety and convenience to over 36,000 trade visitors from 125 nations at Messe Essen on topics ranging from cyber security to innovations for building security and new solutions for the protection of valuables. The representatives of the companies, associations and institutions were in great demand as discussion partners. There was strong need for information and investment from trade visitors as a result of current events such as hacker attacks, challenges involving access control at airports, the still-high number of break-ins and increasing legal requirements. The exhibitors praised the significantly increased percentage of international visitors (eight percent up) and the strong decision-making authority of the trade visitors. Trend-Setting Solutions Security Essen attracted more than 36,000 professional visitors – including experts from industry and installers "Security Essen has underlined its position as a trend-setting international trade fair for all aspects of security. We were able to welcome significantly more visitors from abroad – 125 nations, that's an impressive number", says Oliver P. Kuhrt, CEO of Messe Essen. “Protection – whether public or private, digital or analog – is the central theme of our time. Our exhibitors provided answers to these challenges and presented trend-setting solutions. The high number of first-time exhibitors who showed their services to the specialist world indicates the importance of our trade fair as an independent platform for the security industry." There were more than 200 new exhibitors, including Hoppe AG, PwC Cyber Security Services and AEG ID. The trade fair attracted more than 36,000 professional visitors – predominantly including experts from industry, installers and participants from the security sector – who were characterized by greater internationality, a significant interest in new products and new business contacts as well as a strong willingness to invest. There were more than 200 new exhibitors, including Hoppe AG, PwC Cyber Security Services and AEG ID Numerous New Products Around 40 percent of the visitors came from abroad (2016: 32). The 76 percent of visitors were decision-makers within their companies and one quarter prepared their investments at the trade fair or concluded contracts directly. After all, the economy is still excellent. Industry sales in Germany alone are estimated at around 17.2 billion euros – a two-year increase of 18 percent. 62 percent of visitors rated the economic situation in the security sector as good to very good. Over 90 percent were satisfied with their visit to the fair and want to recommend Security Essen to others. The relevance of Security Essen as a pulse monitor for the security industry was particularly evident in the numerous new products. Once again, the influence of digitization became clear: access solutions are becoming smarter and rely on smartphones or biometric identification as keys. Evaluate Video Data Faster Protection of data and networked access was an all-encompassing topic for numerous exhibitors and many lectures Artificial intelligence helps to evaluate video data faster and more accurately. Apps display unsecured windows in the smart home or help keep track of valuable contents of safes. The protection of data and networked access was an all-encompassing topic for numerous exhibitors and many lectures. The winners of the Security Innovation Award attracted a great deal of attention. Seven exhibitors were honored with this award for their pioneering innovations. UrbanAlps convinced the jury with Stealth Key, a forgery-proof key from the 3D printer. The Jansen Tore burglar-proof sectional door with WK5 classification, which also received a prize, is especially secure – suitable, for example, for museums, hazardous material stores or military headquarters. Kötter Security received one of the coveted awards for the new emergency call and service control center, in which high-tech infrastructure and digital processes ensure the best possible customer security. New Service Facilities Security Essen was held for the first time in the modernized halls of Messe Essen, which will set new standards once the final construction phase is completed in 2019. Spacious, single-storey halls, plenty of daylight, the new glass entrance area and new service facilities such as the Business Club have already delighted exhibitors and visitors. Security Essen also provided optimal visitor and exhibitor communication with a new hall structure organized according to exhibition areas. The guests of Security Essen praised the division of the fair into key topics. The exhibition hall for Cyber Security and Economic Security celebrated a successful premiere. Exhibitors such as the Federal Office for Information Security, Telekom Security, Advancis Software & Services GmbH and the newly founded Federal Association for Critical Infrastructure Protection (BSKI) presented here. Numerous campaigns and events relating to the actual trade fair events offered visitors genuine added value Thematically Suitable Exhibitors Numerous campaigns and events relating to the actual trade fair events offered visitors genuine added value. Thus on the ‘Day of training and further education’, which was organized by the Federal Association of the Security Industry (BDSW) and Messe Essen, 300 participants of the security industry were provided with information on training possibilities and career opportunities. At the new Cyber Security Conference, Arne Schönbohm, President of the Federal Office for Information Security, spoke about cyber security as a challenge for politics, business and society. The computer scientist Jan Krissler, known as Starbug, was also a guest at the top-class conference. Gregor Gysi, member of the Bundestag of the German party ‘Die Linke’, discussed the economic importance of cash at the BMWL (Federal Association of Medium-Sized Value Logistics Companies) booth. In the security experts’ forum, practical experts designed a non-stop programme with more than 90 presentations. The guided tours were expressly aimed at architects, planners, installers, operators, authorities and employees of construction and planning departments and stopped at thematically suitable exhibitors. Topic Of DigitizationCooperation between Western Business Exhibitions and Messe Essen offers a comprehensive platform for business The organizers are already setting the course for the next Security Essen, which will take place at Messe Essen from 22 to 25 September 2020. The new thematic hall structure will be further expanded and the topic of digitization will be explored in greater depth. Numerous exhibitors have already confirmed their registration for the next event. 88 percent of the visitors have already stated their intention to participate in Security Essen 2020. The fair is also taking a further step towards internationalization: From 9 to 11 April 2019 ‘The Security Event - powered by Security Essen’ will take place for the first time in Birmingham, Great Britain. This cooperation between the British trade fair organizer Western Business Exhibitions and Messe Essen offers the European security industry a comprehensive platform for business in Great Britain. Over one hundred of the world's leading security brands are exhibiting. Excellent Platform 950 exhibitors from 43 nations presented innovations in the field of civil security at Messe Essen. The projection for the last day of the fair estimated 36,000 visitors from 125 nations including conference participants, VIP guests, delegation participants and journalists (including FKM projection of 33.000). The proportion of professional visitors was 99 percent. The hall distribution was particularly great success this year Andreas Straubinger, Region Manager D/A/CH, Vanderbilt International GmbH said, “Our stand position in the new Hall 6 was a very good choice. Visitor footfall was above average and the results were even better than we saw at the last Security 2016 trade fair. We thought the hall distribution was a particularly great success this year. The number and quality of our D/A/CH trade fair contacts were very good; not only this but we were delighted to see how many trade fair visitors attended from around the world, which was a great fit for Vanderbilt’s global orientation. The trade fair contributed to further developing the level of awareness of the Vanderbilt brand. We consider Security to be the leading trade fair for our industry. It is an excellent platform from which to present our solutions to a broad audience.” Extremely Well Informed Security Essen set up its own exhibition hall for cyber security this year for the first time, to us it was a logical step to come and present our products" Bernd Hohlfeld, Management Board, ALVARA Cash Management Group AG commented, “For us, Security Essen has been our most successful trade fair to date. The high levels of demand for our ALVARA Logistic App and ‘Digital Driver Legitimation’ were one reason, but not the only reason by any means. In particular, the BMWL joint stand brought together all of the stakeholders in cash services, offering an overall solution for efficient cash circulation. The joint stand was well placed not only to present the route to innovation but also to confirm it. The concept is very impressive and we will be back in 2020.” Knud Brandis, Managing Director of PwC Cyber Security Services GmbH said, “PwC Cyber Security Services GmbH is Germany’s leading consultancy firm for data security. As Security Essen set up its own exhibition hall for cyber security this year for the first time, to us it was a logical step to come and present our products and services here. The topics which were in particularly high demand were information security, data protection, emergency services and cyber security. The trade visitors were extremely well informed and precisely our target audience.” Invaluable Validation Stamp Sebastian Mosbacher, Managing Director, Stölting Service Group commented, “Stölting Security was extremely satisfied with Security Essen 2018 in Essen. As a large security services provider operating in Germany, we were able to present our services and position ourselves in the best possible manner. The second day saw high footfall and was of great significance for us as a trans-regional personnel service provider operating in the sector of cleaning, security and staffing. Stölting Service Group will be back in 2020!” Dr. Alejandro Ojeda, CEO and Founder of UrbanAlps AG said, “Security Essen was beyond our wildest expectations; it has been one of our best platforms to get in direct contact with our target audience at an international level. Furthermore, winning the Security Innovation Award 2018 for our core product the Stealth Key, the worlds’ first 3D metal printed key, has been an invaluable validation stamp from arguably the world’s leading security fair. It is clearly the place to be for security and we eagerly look forward to come back once again in 2020.” Topics discussed at Security Essen were information security, data protection, emergency services and cyber security Convenient Contactless Handles Rainer Schratz, Marketing Manager, HOPPE AG, Stadtallendorf commented, “HOPPE presented at Security Essen for the first time this year – and so far, we are extremely satisfied with the results of the trade fair. Security Essen is a good platform for HOPPE innovations and expertise in the field of protection and amenities; this is also clear from the high number of contacts we made at the trade fair – both with customers as well as visitors who came from segments which are new to us, for example from the electrical wholesale trade.” “Of course, the quality of the new contacts can only be evaluated after the trade fair but we are delighted with the high level of interest shown by visitors in our products – both from trade visitors and from the media. Visitors were particularly appreciative of our innovations such as the burglar-proof window handles SecuForte with automatic locking function and convenient contactless front door handles or the wireless window handle offering central locking.” Diverse Possibilities Offered Current aspects such as ‘Security technology in the smart home’ and ‘Digitisation and cyber security’ were afforded a great deal of attention" Norbert Schaaf, Chairman of the Federal Association of Security Technology (BHE) and Chairman of the Advisory Board for Security Essen said, “Trade fair visitors from around the world were able to seek information about the diverse possibilities offered by modern security technology from around 950 exhibitors. The new layout, with six primary areas, also received very positive feedback. The profile of the Security trade fair offers the right background for the entire security industry.” “As a specialist trade fair, it specializes in security and therefore offers the ideal platform for providers and users to share information and views. Current aspects such as ‘Security technology in the smart home’ and ‘Digitisation and cyber security’ were afforded a great deal of attention. The innovative spirit of the security providers also became particularly clear at the presentation ceremony of the Security Innovation Awards 2018.” Secured Connectivity Platform Serge Coppens d'Eeckenbrugge, Regional Manager BNL - DACH, Managing Director DACH, UTC Fire & Security commented, “Smart buildings and smart homes were the focal point of this year’s Security Essen. Thanks to UltraSync, the new secured connectivity platform, integrated smart home or smart building security solutions can be managed using the internet. UTC Fire & Security presented their Lenel range, which offers various security technologies (video, access, fire and burglary), which are integrated into both the home and larger-scale environments in a user-friendly manner.” “The trade fair offered us the ideal platform to present our upcoming new product range of cable and wireless fire alarm systems. The feedback we received from both the domestic market and neighboring countries was outstanding. The relaxed stand design provided the perfect environment for intense yet enjoyable conversations. Security Essen was very successful for us and we are looking forward to taking part again.” The relaxed stand design provided the perfect environment for intense yet enjoyable conversations Digital Burglary Protection Dr. Florian Scharr, Press Spokesman, VdS Schadenverhütung GmbH said, “Our goals were surpassed at Security Essen. At times, our stand was besieged! The burglar protection was particularly important and the topic of digital burglary protection was in high demand, which was very pleasing. We are delighted that so many industry representatives as well as numerous installers and planners came to find out more about VdS. Security Essen is a very important trade fair for us.” For the first time, the three security associations -BDGW, BDSW and BDLS – presented themselves together at Security Essen" Dr. Harald Olschok, Managing Director, BDSW Bundesverband der Sicherheitswirtschaft commented, “Once again we can look back on a successful trade fair week. For the first time, the three security associations – Federal Association of German Money and Value Services (BDGW), Association of private security industry (BDSW) and Federal Association of Aviation Security Companies (BDLS) – presented themselves together at Security Essen.” Buy Something Specific “The expert visitors and interested guests were informed about the work of the security associations through various events and lectures in the trade fair forums. Alone on the ‘Day of training and further education’, which takes place in cooperation with Messe Essen, around 300 visitors again took part.” Friederike Nielsen, VP of Marketing, Dedrone GmbH said, “Two years ago, our subject area ‘protection from civil drones’ was still very new. Even then, we made a great deal of interesting contacts with German and international customers and partners at Security Essen. Since then, our market has seen a great deal of additional growth. A great deal of visitors has come to our stand with a specific intention – many of them have an intention to buy something specific. We are leaving the trade fair very satisfied and will definitely be back.”
As we approach National Safe Schools Week (October 21-27), it is appropriate for a conversation to begin regarding establishing standards for K12 school security. Currently no standards exist for assisting schools navigate the complexity of understanding what they need, how much it will cost and how they will secure their learning environments. Security Industry Experts The Partner Alliance for Safer Schools (PASS) is one of the organizations at the forefront of establishing security standards for schools. In 2014, the Security Industry Association (SIA) and the National Systems Contractors Association (NSCA) formed PASS, which brought together a cross functional group of members including school officials, safe schools’ consultants, law enforcement and security industry experts to collaborate and develop a coordinated approach to protecting K-12 students and staff. School administrators are often contacted repeatedly by organizations with multiple safety and security products PASS has provided valuable insights regarding an ‘All Hazards’ approach to school safety and security. In fact, PASS suggests that school administrators are challenged with two decisions: Determining what they need to do How to prioritize Safe School Environment School administrators are experts in running schools and providing education. However, most are not security experts and do not understand the complexity of implementing a comprehensive physical security and safety program across their districts. Still, they are often contacted repeatedly by organizations with multiple safety and security products. School administrators are experts in running schools and providing education, but most are not security experts Some of these organizations recognize their products are just pieces of a safe school environment puzzle and how they fit in, whereas others focus on specific applications and do not understand how their specific solutions may affect life safety codes and Americans with Disabilities Act law. (Note: Many ‘barricade devices’ fall into this latter category and actually introduce liability concerns with the unintended consequences of their use.)Schools incorporate evacuation drills as part of their emergency preparedness plans and practice on a regular basis Even for experts, the plethora of options and disparate systems required to integrate a safety and security approach at schools is daunting. The ongoing challenge is integrating access control, video, mass notification, and/or visitor management products into a single, effective, and appropriate system the owner can understand, utilize, and afford and that meet local codes and ADA laws. In the absence of standards, schools are likely to amass a collection of devices that do not constitute a comprehensive solution. Lack Of Consensus In years past, the our industry and commercial buildings adhered to legacy codes – like Building Officials and Code Administrators International Inc. (BOCA), Uniform Building Code (UBC), Southern Building Code Congress International Inc. (SBBCI), and International Conference of Building Officials (ICBO) – which have traditionally been revised every three years, while local jurisdictions decided what versions to adopt and enforce. Currently, however, there is a move toward the International Building Code (IBC), which is published by the International Code Council (ICC) and includes standards and guidance for commercial buildings on doors, windows, and other openings. A risk assessment is the next step toward developing a comprehensive security plan, and begins with developing a trend analysis Still, despite this migration of codes from a patchwork of local decisions to global guidelines, there remains a lack of consensus around school security. The current fragmented approach causes confusion regarding how new schools are designed and how to retrofit existing school buildings, whose average age is 45+ years. Right Protection Equipment One can point to the fact that there hasn’t been one student lost in a school fire in over 50 years as testament to standards like NFPA 80 and NFPA 101 being referenced in model building codes. Additionally, schools incorporate evacuation drills as part of their emergency preparedness plans and practice on a regular basis. It’s not just having the right protection equipment in the building, it’s also having a procedural layer in place to make sure everyone knows their roles and responsibilities in the event of fire. The stress of the actual event can limit ones’ ability to think clearly. Practice makes perfect. Why would we approach school security any differently? School security is a team effort, and it is important to understand all the areas security impacts and involves School security is a team effort. It is important to understand all the areas security impacts and involves. PASS suggests starting with a basic team consisting of: Security Director Local Law Enforcement School Administrator Integrator Door and Hardware Consultant IT Director Comprehensive Security Plan Quantifying and mitigating risk are the jobs of security professionals and school administratorsA risk assessment is the next step toward developing a comprehensive security plan. This often begins with conducting a trend analysis requiring the collection of data from a variety of public and private sources. The challenge is to pull these pieces into a usable and easily understood format that provides a guide for current and future risk concerns. Risk assessment and mitigation can never eliminate risk. Quantifying and mitigating risk are the jobs of security professionals and school administrators. Data from the following sources can help measure risk: Campus: Review incident report trends for at least the past 36 months. Area and city: Review crime data from local law enforcement for the surrounding neighborhood and city. Screening procedures: How is hiring conducted? Anonymous tip reporting systems: Enabling students, staff members, parents and the community to anonymously alert administrators to perceived and actual threats. Social media monitoring: such monitoring can provide important information that can be used to identify risks. Monitoring social media could help measure risk for school safety Delay Adversarial Behaviors These assessments can then be incorporated into the best practice approach of Layered Security. Layered security combines best practice components within each layer that effectively deter, detect and delay adversarial behaviors. Layered security works from the outside in. As one layer is bypassed, another layer provides an additional level of protection. The asset being protected is at the center of the layers – students, staff and authorized visitors. PASS defines five layers of Security:As one layer is bypassed, another layer provides an additional level of protection District Wide Property Perimeter Parking Lot Perimeter Building Perimeter Classroom/Interior Perimeter Appropriate Tier Target Each layer can be broken down into Tier levels with Tier 1 being basic and Tier 4 being the highest level of security. It is important to understand that the demographics of individual school buildings varies, even within the same district. Security experts will quickly point out that ‘if you’ve seen one school, you’ve seen one school’. The assessments will determine the appropriate Tier target. Figure 1 Each layer includes essential protective elements, or components, of security. Every layer does not necessarily include all seven of these common components, and a layer may include additional components unique to that particular layer. Safety And Security Components Policies & Procedures People (roles & training) Architectural Communication Access Control Video Surveillance Detection and Alarms Layered Security While components are not listed in a priority order, three components included in all layers are policies and procedures, the roles and training of people, and communication. These components often perform a function in every layer and every tier in each layer. Three tools come together in the PASS approach as outlined in the new 4th Edition of the PASS Guidelines (Figure 2) - the Layers are established and defined, a Checklist/Assessment breaks down each layer into tiered best practices which then tie into the guidelines where a narrative explains each best practice in more detail. Figure 2 Schools need not reinvent the wheel when it comes to school security planning. Following the best practices of Risk Assessments and Layered Security will ensure that every school building in a district will have a unique and comprehensive plan that is tailored to their individual needs.
Surveillance systems can track the locations of cellphone users and spy on their calls, texts and data streams. The Washington Post has reported on such systems that are being turned against travelers around the world, according to security experts and U.S. officials. The summer season highlights the need to take extra precautions when traveling. When traveling anywhere in the world, for business or pleasure, citizens need to be aware of and alert to looming physical and cybersecurity threats. To elaborate on expert security tips, strategies and advice for traveling this summer, we presented several questions to The Chertoff Group, a global security advisory firm that enables clients to navigate changes in security risk, technology and policy. Chris Duvall, Senior Director at The Chertoff Group, offers insights into cybersecurity concerns, physical security precautions, and recommends digital resources/apps for consumers while traveling. Q: How are security risks – physical and digital – changing? Why are threats greater today than five years ago? The exponential number of headlines over the past few years is a strong indication that both physical and digital risks are evolving and increasing Duvall: The exponential number of headlines over the past few years is a strong indication that both physical and digital risks are evolving and increasing. The scope, severity and complexity of physical and cyber risks are increasing and becoming more dangerous and destructive. This is especially true for those traveling outside the U.S. On the physical side, threat actors are actively seeking “soft targets” – public events, social settings, mass audience venues, etc. – to communicate their message, sow chaos and inflict catastrophic harm. On the digital or cyber side, we have seen a shift from “thrill hacking,” to an increase of “hacking as a business” (through credential compromise and ransomware), to an increase in “hacking for harm” - with the rise of “nuke ware” and ransomware without a clear financial motivation. Q. What specific precautions should a traveler take to protect their calls, texts and data streams from being spied on? Duvall: When traveling abroad, we recommend to our clients that their personnel and executives should practice good internet and social media hygiene. Some best practices include: Avoid using public Wi-Fi services—unless you use private VPN service for encryption Increase the privacy setting on your technical devices Disable location identifiers on apps Create a new (unlinked) email for internet correspondence Consider purchasing international MyFi devices to decrease the risk of getting your personal identification information (PII) or protected healthcare information (PHI) stolen Use temporary (i.e. burner) phones to protect your data and your contacts Q. What cybersecurity concerns are likely to impact travelers? Are the threats greater outside the United States or in any specific parts of the world? Significant precautions should be taken to protect personal electronic devices (PEDs) and the data connected to PEDs Duvall: The international cybersecurity landscape has grown increasingly dynamic, with threats posed by government authorities (in some countries), terrorists, insurgents, and criminals, requiring travelers to be proactive and vigilant. U.S. citizens, particularly executives of U.S.-based technology companies, must be aware that they are considered high-value targets for nation-state intelligence services and criminally-motivated bad actors. Many countries will go to great lengths and expense to acquire and exploit proprietary information from U.S.-based companies, and views U.S. executives visiting the country as “soft” targets of opportunity. As such, significant precautions should be taken to protect personal electronic devices (PEDs) and the data connected to PEDs. The tactics, techniques and procedures (TTPs) utilized by bad actors are often covert and nearly undetectable by the affected person. Threat actors routinely access, monitor and utilize Wi-Fi networks at hotels and in public spaces to compromise target devices. Other targeting methods include luggage searches, extensive questioning, and unnecessary inspection and downloading of information from personal electronic devices. There are numerous, high-risk countries for which the U.S. Government warns travelers to be wary of mobile malware, mobile device privacy attacks and hot spots for mobile botnets. The U.S. Department of State has the most recent and up-to-date list. For example, the U.S. Government has investigated numerous incidents in which U.S. travelers’ PEDs (personal and company devices) have been compromised by Russian authorities while transiting Russian airports, left unattended in public spaces and in travelers’ hotel rooms. When traveling to an unfamiliar place, research your destination to understand the local roads and transportation, geography, local roads, culture, etiquette and laws Q: What physical security precautions should a traveler take? Duvall: Here are some useful precautions: When traveling to an unfamiliar place, research your destination to understand the local roads and transportation, geography, local roads, culture, etiquette and laws. Protect your personal information and travel itinerary as much as possible. Limit the amount of jewelry worn, cash, credit cards and electronic devices carried while traveling. Avoid staying on the ground floor of a hotel. Consider choosing a room on the 2nd through 7th floors as these rooms may be more difficult to break into than those on the ground level, but still able to be accessed by fire/emergency response equipment. Never answer your hotel room door for anyone until you’ve determined who they are, why they are at your door, and if it is necessary for you to open the door to interact with them. Carry a rubber door stop/wedge with you to install on the room side of the door before you go to bed. Vary your patterns and routines when venturing out in to a new location, do not become predictable. Politely decline offers of food or drink from strangers (If you do accept beverages, ensure that they are in sealed containers and that there is no evidence of tampering). Never discuss your itinerary, personal, business or other sensitive information where others can hear you. Q: How can companies be proactive in protecting their business travelers? Companies should educate their employees on the importance of maintaining good internet hygiene while traveling abroad Duvall: When traveling on business, companies should provide their employees with clean computers and cell phones before departure. Upon return, the company should immediately wipe the computer clean to prevent any malicious threats from penetrating the company’s internal, cyber-infrastructure. Additionally, companies should educate their employees on the importance of maintaining good internet hygiene and recommend their employees disconnect from social media platforms while traveling abroad. Some general tips to recommend to your employees when traveling abroad include: Register in the Smart Traveler Enrollment Program (https://step.state.gov/step/) Visit Travel.State.Gov to view travel related information specific to the country or countries you’re visiting, including local US Embassy or Consulate contact information, as well as current travel advisories and alerts. Always leave a copy of your transportation and hotel itinerary and driver’s license (or passport if traveling internationally) with a family member or trusted friend. Always use a baggage tag with a protective cover Avoid using public Wi-Fi services Q: What digital resources and/or apps might a traveler benefit from (and how)? Duvall: The Chertoff Group recommends researching the below travel-related Apps before departing on a trip: TravWell: This app provides destination-specific vaccine recommendations, a checklist of what you need to do to prepare for travel, and a customizable healthy travel packing list. The app can store travel documents, keep records of medications and immunizations, and set reminders to get vaccine booster doses or take medicines. My TSA: This app provides real-time updates on airport delays. It includes how long security lines are at various airports; information about what you can and cannot bring onto an airplane; and a frequently-asked question list, including new advanced imaging technology. Border Wait Time: The app provides estimated wait times and open-lane status at land ports of entry, which may be particularly helpful when in an area with multiple crossings. Mobile Pass: The Mobile Passport app speeds you through U.S. Customs and Border Protection at (1) cruise port and (24) airports Q: As a security expert, what’s your best advice for travelers? Duvall: At the end of the day, travel security is not rocket science. Simply put, travelers need to: Be aware and situationally alert at all times. Be aware and situationally alert to the location of your luggage and carry-ons at all times. Don’t access unknown, unsecured or public Wi-Fi if at all possible. Turn off “auto connect” features and institute stringent privacy controls as much as possible. Try to “blend in” – you don’t have to try to look like a local but travelers should avoid gaudy and expensive attire wherever possible. Use your common sense – if an offer, invitation or opportunity seems to good to be true... it probably is.
In today's world of heightened security threats, the Internet of Things (IoT) and the availability of overwhelming amounts of data, comprehensively securing a single small facility is no easy task. Enterprise organizations tend to face even greater challenges when it comes to safety, as multiple people scattered throughout separate locations aiming to collaboratively respond to situations can easily become complicated. Individual buildings, divisions and branches of a large and/or global enterprise each possess diverse needs when it comes to streamlining operations and overall security. Almost all organizations are facing the same types of risks, such as cybersecurity breaches, workplace violence and natural disasters, requiring the decision-making process to be efficiently unified across the enterprise.Enterprises must ensure regular software updates and enforce best practices for employees at all sites to keep data safe Mitigating Cybersecurity Threat One of the biggest threats facing enterprise organizations today is cybersecurity. One small mishap or leak can quickly lead to larger complications and even force the entire business to shut down altogether. This is where strategic decision-making proves to be essential. Involving an IT department in security purchases and system implementations is critical for enterprise organizations to ensure the proposed system meets corporate IT data and security policies, as well as the organization’s required functional capabilities. Enterprises must also ensure regular software updates and enforce best practices for employees at all sites to keep data safe. Integrated Security For Information Exchange Enterprises must similarly address integration. In the past, manufacturers focused on providing products that worked well with other products within their own lines, but the development of open-platform technology has changed the game. Enterprises demand elevated integration across multiple security applications, event management and human resource systems, and open platforms allow integrators to better tailor a solution in accordance with an end user's needs. In the access control market, this requires manufacturers to provide systems that are easy to administer and manage to allow roles to be quickly and efficiently updated.Using a single, intuitive platform that simplifies operations and streamlines workflows helps to maximize investment Throughout the entire process, communication is key. Integrating multiple security systems together, such as access control and video, and enabling them to ‘talk’ to one another in an encrypted manner is necessary for the accurate and timely sharing of relevant information and data. Using a single, intuitive platform that simplifies operations and streamlines workflows helps to maximize investment by allowing enterprises to do more with existing resources, resulting in additional savings. Incorporating Cloud-Based Solutions Today’s enterprise organizations are taking a page from the IT playbook and incorporating cloud-based solutions to address physical security challenges—particularly in access control. Although the cloud is one of the most heavily talked about topics in the industry right now, the concept has existed for many years, decades even. Cloud-based access control technology offers installers and end users simplicity and ease-of-use As leading technology companies throughout the years began to deliver easy-to-use services, the development of mobile Internet devices soon normalized the idea of the cloud to the wider masses. The adoption of smartphones created the opportunity for physical security manufacturers to enter the world of cloud-based solutions. Today, the cloud is safer than ever, and provides unparalleled flexibility. Cloud-based access control technology, more specifically, offers installers and end users simplicity and ease-of-use. The cloud aids simple and quick installations as well as performing maintenance tasks remotely. This deliverance of ultimate control is an important commodity.Business continuity and risk management procedures must be maintained across the enterprise for day-to-day users, employees and visitors. Cloud Security Training Of course, one of the greatest fears surrounding the deployment of cloud systems for companies today is their vulnerability to hackers. But it is important to put those fears into context. All security manufacturers need to make sure their products are tested and bent to the highest standards to defend against vulnerabilities. While there can never be a 100-percent guarantee that there won’t be an attack, once you test your products to the highest degree and use a solid service provider, the risk to customers is greatly deflated. Additionally, establishing best practices for employees in how the cloud is used and passwords are stored can be instrumental in keeping the data being collected secure from outside threats and influences. Collaborating with both the IT and HR departments to develop rules and best practices, as well as effectively communicate these pieces, becomes imperative. On a regular basis, business continuity and risk management procedures must be maintained across the enterprise for not only day-to-day users of security technology, but also employees and visitors. In the event of a security incident or emergency, businesses must ensure that all members of the organization are properly trained and prepared to execute a cohesive and up-to-date response plan.
ADT Inc.’s acquisition of Red Hawk Fire & Security, Boca Raton, Fla., is the latest move in ADT Commercial’s strategy to buy up security integrator firms around the country and grow their footprint. In addition to the Red Hawk acquisition, announced in mid-October, ADT has acquired more than a half-dozen security system integration firms in the last year or so. Here’s a quick rundown of integrator companies acquired by ADT: Protec, a Pacific Northwest commercial integrator (Aug. 2017); MSE Security, the USA’s 27th largest commercial integrator (Sept 2017); Gaston Security, founded in 1994 as a video surveillance integration company and whose services have since expanded to include intrusion, access control, and perimeter protection (Oct. 2017); Aronson Security Group (ASG), which delivers risk and security program consultants and offers advanced integration services, consulting and design engineers and a National Program Management team (March 2018); Acme Security Systems, among the largest privately held security systems integrators in the Bay Area, focusing on electronic security systems, access control, video networks and more (March 2018); Access Security Integration, a regional systems integrator specializing in design, delivery, installation and servicing of electronic security systems including enterprise-level access control, video and visitor management solutions, perimeter security and security operation command centers (Aug. 2018); In addition to their moves in the commercial integrator space, ADT has also sought to expand their presence in cybersecurity with the following two acquisitions: Datashield, specializing in Managed Detection and Response Services (Nov 2017); Secure Designs, Inc., specializing in design, implementation, monitoring, and managing network defense systems, including firewall services and intrusion prevention, to protect small business networks from a diverse and challenging set of global cyber threats (Aug. 2018). ADT has acquired more than a half-dozen security system integration firms in the last year or so For additional insights into ADT’s game plan and the strategy behind these acquisitions, we presented the following questions to Chris BenVau, ADT’s Senior Vice President of Enterprise Solutions. Q: ADT has been actively acquiring regional integrators this year – more than a half a dozen to date. Please describe the history of how ADT came to embrace a strategy of acquiring regional integrators as a route to growth? ADT's acquisition of Red Hawk is set to close in December, and brings premiere fire and life/safety solutions BenVau: Our acquisition strategy started at Protection 1 when we embarked on our journey to build out our commercial and national account business and add enhanced integration capabilities to our portfolio. The merger of Protection 1 and ADT brought that foundation to ADT which up to that point was primarily a residentially and SMB-focused company. After the merger, we set out to identify and acquire additional regional integrators that would continue to build on that foundation and deliver enhanced technical solutions, advanced technologies and an expanded service, install and support footprint. Through our acquisitions we now operate two Network Operations Centers and three Centers of Excellence. We are also unique in the industry with the number and variety of certifications, like Cisco and Meraki, our engineers hold which ultimately allows us to offer Managed Security as a Service. They have also enhanced our operational capabilities. Q: What criteria do you use to evaluate whether an integrator is a good “fit” for ADT? BenVau: First and foremost, we look at the culture of the companies. The companies that we target for acquisition must be metrics- and customer service-driven. Secondly, we look at the leadership teams. ADT view their acquisitions more like mergers and take a patient approach to integrating them into their business We have been fortunate in the fact the leadership of the companies we acquired remain with us today in key management and executive positions helping to drive continued growth within their organizations. We also evaluate their current customer base, unique solutions and their ability to complement and enhance our portfolio with the goal of becoming a leading full-service, enterprise commercial provider. Our acquisitions have bolstered our network capabilities, brought enterprise risk management services, and a broader solution set in high-end video and access control solutions. Our most recent acquisition – Red Hawk, set to close in December – brings us premiere fire and life/safety solutions. Q: What changes are typically needed after an integrator is acquired in order to adapt it to the ADT corporate model? BenVau: We view our acquisitions more like mergers and take a patient approach to integrating them into ADT while taking into account their culture. We want to ensure that we find the right positions for their people, embrace the right messaging and put the right processes in place. We acquire these companies because they are the best in their respective businesses and geographies and bring their knowledge and experience in markets or with solutions that we may not have had previous access to. ADT can support clients with their own in-house technicians which helps to ensure a consistent security program Q: How can regional integrators benefit from the ADT brand? Have your newly acquired integrators realised additional growth? BenVau: The companies we have acquired, generally, have exceeded expectations and surpassed initial goals. ADT brings expanded opportunities for these companies as well with our national footprint. Our National Account Sales Team has seen impressive growth over the years and are only limited by our ability to deliver. These integrators help to deliver on that. In the past, the regional players may have had to rely on sub-contractors to service their larger clients. With ADT, we can now support those clients with our own in-house technicians which helps to ensure a consistent security program across multiple locations.Our National Account Sales Team has seen impressive growth over the years and are only limited by our ability to deliver" Q: Are additional integrator acquisitions planned this year and into 2019? How much is enough and when will it end (or slow down significantly)? BenVau: We expect to close on our latest acquisition, Red Hawk, before the end of 2018. Red Hawk brings a national footprint focused on fire/life safety and security to ADT. While ADT already had a robust security offering, Red Hawk will contribute significantly to the fire side of the business. In addition, we will continue to evaluate the companies in the industry to determine if additional acquisitions make sense. Q: Do you expect greater consolidation of the integrator channel in the industry as a whole? Why is this a good time for consolidation? Is it a good M&A market for buyers like ADT? BenVau: We will continue to evaluate companies in the industry to determine if further acquisitions make sense. As for the industry, we can only speak for ourselves. Q: What other trend(s) do you see in the industry that will impact ADT (on the commercial side) in the next year or so, and how?Our focus is on investing in our field organization, in particular our service technicians, engineers and project management teams" BenVau: Networking is a big one. As we continue to drive integration of devices and services, from AI, “the cloud,” machine learning and even analytics, there will be more focus on the network they ride on. A deeper knowledge of network design, bandwidth impact, and system integration will be critical. As part of our acquisition strategy, we focused on talent to add to the team and have been able to add to our bench strength in this area. Q: Any other comments/insights you wish to share about ADT’s strategy, future, and role in the larger physical security marketplace? BenVau: Our focus is on investing in our field organization, in particular our service technicians, engineers and project management teams. The cornerstone of our success lies in our ability to deliver outstanding customer support and service. It starts with sales and the ability to deliver security and life safety technologies, but it ends with a delighted customer who partners with us to help secure the things that matter most to them. Our recent acquisitions have more than doubled our commercial field operations teams and are key to establishing the ADT Commercial brand as a leading full-service provider of enterprise solutions to the marketplace.
The Global Security Exchange (GSX) seems smaller this year, which is not surprising given the absence on the show floor of several big companies such as Hikvision and Assa Abloy (although their subsidiary HID Global has a big booth). A trend affecting the number of companies exhibiting at GSX 2018, and other trade shows, is industry consolidation, which is impacting the show even beyond the fewer exhibitors this year in Las Vegas. GSX is the new branding for the trade show formerly known as ASIS. There was an impressive crowd of visitors waiting for the show floor to open Tuesday morning; the conference part of the program began on Monday. After the attendees filed through the doors, the foot traffic seemed brisk throughout the morning, and was somewhat steady until the end of the first day. Exhibitors as a whole seemed pleased with the first day and cautiously optimistic about the rest of the show. Acquisitions And Consolidation HID Global announced on the first day that they will acquire Crossmatch - emphasizing the impact of consolidationEmphasising the impact of consolidation on the industry as a whole, and on this show, was an announcement from HID Global on the first day that they will acquire Crossmatch, a biometric identify management and secure authentication solutions provider. It’s a comparatively large acquisition for the company specializing in trusted identity solutions. Just days earlier, another acquisition also seemed to confirm the trend when UTC Climate, Controls and Security — the owner of Lenel — announced an agreement to acquire S2 Security. The fruits of another recent acquisition was on display at the GSX 2018 hall, where Isonas took its place near the front entrance as part of the Allegion booth, just three months after the global security provider acquired the ‘pure IP access control company.’ Isonas is well positioned in two of the three fastest growing segments of the access control market — IP hardware, which is growing 41 percent per year globally, and access control as a service, or ‘cloud’ technology, which is also outpacing the overall access control market. Allegion also has the third fast-growing segment, wireless locks, covered with its Schlage brand. "New Avenues Of Growth" The early days of new ownership is opening fresh opportunities for both organizations as Allegion seeks to leverage Isonas’ intellectual property and the smaller company finds new avenues of growth in the larger organization, says Rob Lydic, Isonas Global Vice President of Sales. Motorola joined Avigilon in a higher profile role at their booth, emphasizing consolidation in the industry Lydic sees a likelihood of additional acquisitions in the near future in the security space, given the large amount of capital currently available to be deployed, and the large number of entrepreneurial companies looking to make the leap, as Isonas did, from a small booth at the back of the hall to front-and-center as part of a big industry player. Another reflection of consolidation: Motorola Solutions is taking a much higher-profile role in the Avigilon booth. In addition to signage, ownership by Motorola is also impacting the Avigilon product offerings. For example, the Motorola Ally security incident management and communications system has been integrated with Avigilon’s analytics-based event detection, and is being positioned to serve the enterprise market. The system simplifies security operations with a single platform that allows access to critical data, including video and access control systems, directly from any web-enabled device. Another reflection of consolidation: Motorola Solutions is taking a much higher-profile role in the Avigilon booth Avigilon is displaying Motorola Solutions’ CommandCenter Aware integrated with Avigilon’s systems for use with public safety applications to provide dispatchers and intelligence analysts with video feeds, incident details, alerts, data mapping and responder location. Avigilon has also integrated its AI-driven Appearance Search technology with its Access Control Manager system, so video searches can be performed based on a badge credential. The system can automatically pull up any information, whether video or events in the access control system, based on the badge information. It can also be used to search for lost badges, or to view where a person is located in the building. Avigilon introduced an AI appliance that allows existing cameras to be integrated with Appearance SearchThe company introduced an AI appliance that allows existing (non-Avigilon) cameras (up to 20 two-megapixel cameras) to be integrated with Appearance Search. Also, the next generation of analytics allows detection of more things, such objects a person may be holding, or detection based on what they are wearing. The Growth Of The Cannabis Market Although attendees at GSX are generally understood to be more end users than integrators, Joe Grillo, CEO of ACRE, the parent company of Vanderbilt Industries and ComNet, says he sees little difference in attendees at GSX compared to the ISC West show in the spring. “We see all our resellers here,” he says. Grillo noticed that Day One booth traffic was “not consistently busy, but steady.” Grillo says ACRE expects to be active again soon in the mergers and acquisitions market. The company has grown through six acquisitions since its founding, and has had one divestiture (when it sold Mercury Security to HID last fall). Since selling Mercury, ACRE has been ‘back in the buying mode,’ just looking for the right opportunity, says Grillo. New markets are a theme at GSX, and one of the biggest new opportunities is the cannabis industry. Marijuana has been legalized in dozens of U.S. states, and Canada is on the verge of legalizing the drug. March Networks works with multiple cannabis operators to provide video solutions, point-of-sale transaction data, and customer analytics March Networks is among the companies targeting the cannabis industry in a big way. Already across the U.S., March Networks works with multiple cannabis operators to provide video solutions, point-of-sale transaction data, and customer analytics. The business intelligence solutions also aid compliance in the highly-regulated industry. March Networks provides radio frequency identification (RFID) tag to track plants throughout the channel, and tracking is integrated with video systems to provide correlated video views. A couple of exhibitors mentioned to me the need for commercial companies to deploy a comparable level of automation as their employees are accustomed to in the smart home environment. That suggests a need for things such as smartphone integration and voice commands. One exhibitor putting its toe in the water is Hanwha Techwin, which showed an Amazon Echo device used to control a video management system (VMS) with voice commands. Could the simple integration be a preview of the future of control rooms, where security officers merely talk to their equipment rather than operating controls? We’ll be talking to more companies (and maybe a few machines) on Day Two of the show, and will be reporting what we hear.
Several recent terrorist and mass violence attacks have been directed at soft targets, or relatively unprotected locations where people gather such as outside a music venue or in the unscreened passenger areas at airports. Attacks in public areas have led to the development of new security technologies aimed at protecting soft targets. One company addressing the challenges is Evolv Technology and its Edge automated high-speed personnel screening solution. The system integrates walkthrough firearm and explosive detection for high-throughput protection of events and soft targets.The Edge system has multiple detection sensitivity settings to respond to various threat scenarios Enhanced Visitor Experience The system seeks to increase security without compromising the ‘customer experience’. People simply walk through single-file – between two 5-foot-tall stanchions. One lane can screen up to 800 people per hour, and the system detects explosives or metallic objects without the need for pat-downs or wands or other invasive procedures. Any personal belongings can remain in visitors’ pockets. A single security guard is needed for each lane to verify any detected threats. “The system combines an improved security posture with a better visitor experience,” says Mike Ellenbogen, CEO of Evolv Technology. “We need to fly and have been trained to be screened at the airport, but we don’t expect to be screened going to see a ball game or a Mozart concert. Evolv recognized a need for a new way to inspect people before they enter these types of facilities. It’s a seamless system that pulls various technologies together. We want to feel safe but without having to sacrifice the quality of the experience.”Screening analytics provide data on the numbers of people screened by time of day and by result The system combines millimeter wave and magnetic field sensors, along with artificial intelligence (AI)/ machine learning and can incorporate additional data such as biometrics. Known bad actors can be identified using facial recognition. The system has multiple detection sensitivity settings to respond to various threat scenarios. Expanding Perimeter Protection A security guard provides the human touch by verifying any threats detected by the system. The locations of concealed items are displayed on a photo of the individual using a color-coded box overlay. Screening analytics provide data on the numbers of people screened by time of day and by result. Ellenbogen says the company is working to have the system adopted at entertainment venues, performing arts centers, sports centers, for air and rail transportation, and to protect high-profile government buildings. The Edge system can expand the protected perimeter to a wider area that was previously unprotected. The Edge system can expand the protected perimeter to a wider area that was previously unprotected For example, concert-goers exited the arena of an Ariana Grande concert May 22, 2017, in Manchester, U.K., and entered the surrounding area that was unscreened and unsecured. Placing a user-friendly screening system around a wider perimeter outside the concert venue might have prevented the use of an improvised explosive device in the terrorist attack.Placing a user-friendly screening system around a wider perimeter outside the concert venue might have prevented the use of an improvised explosive device in the terrorist attack Threat Mitigation With Soft Target Approach Likewise, a 2016 bombing at the Brussels Airport occurred in the departure hall outside the passenger screening areas. Securing a wider perimeter – for example, screening customers discreetly as they enter the airport building from a parking area – could have provided additional security against such an attack. Ellenbogen confirms Evolv has sold a number of systems to major European airports to screen visitors and passengers as they enter the front door. “Addressing the threat to an airport or train system is different than screening passengers; we are looking for different types of objects and different types of materials. The idea is to be able to detect threats to a venue before they get into the venue.” The soft target approach can also be applied to public buildings, such as courthouses, and used in lieu of more invasive metal detectors and x-ray machines. The portability of the Edge system enables a ‘pop-up’ approach to security – i.e., to relocate the system to address specific or changing security threats easily. The self-contained system only requires a wall plug. Labor reduction (because of faster throughput) can help offset the system costs but it’s difficult to quantify the improvement in the visitor experienceImproving Security Posture At Event Venues “It’s surprising the level of importance [venue owners] put on the visitor experience,” says Ellenbogen. “They see that their brand starts at the front door. They are eager to find alternative security solutions that come across as more inviting, less imposing, less closed down, less invasive than the solutions they have been using,” he says. “They are driven by a desire to improve the visitor experience as they improve the security posture.” He says current events, including terrorist attacks and mass shootings, drive awareness among venue owners to improve the security of soft targets. “The level of interest is high, and it spikes somewhat when there is a big headline,” Ellenbogen says. He notes that the system is more expensive than a metal detector, but about a third the cost of familiar airport body scanners. Labor reduction (because of faster throughput) can help offset the system costs, but “it’s difficult to quantify the improvement in the visitor experience,” Ellenbogen says.
Wilson James has appointed SmartTask as preferred technology partner and awarded it a deal for the supply of a mobile patrol and electronic smart form solution for a new security contract with National Museums. Under the agreement, the company will now roll out the SmartTask workforce management software to 10 sites including the Natural History Museum, V&A and Science & Industry Museum. This follows a successful trial that achieved significant time savings by removing paperwork and streamlining operational processes. The new partnership between Wilson James and SmartTask will replace an incumbent supplier agreement that no longer met the business and operational requirements of the security, construction logistics and business services provider. Identify Potential Benefits In particular, the retender process for the security contract with Natural Museums required a single provider of a highly-configurable mobile patrol and electronic smart form solution. An initial trial at the Natural History Museum focused on use of electronic forms via SmartTask-enabled smartphones to reduce administration and increase productivity of operational staff. The trial highlighted the clear benefits of using the SmartForms, most notably around confiscated items and vehicle forms It was designed to identify potential benefits based on the precise requirements of the customer as well as create a suite of seven SmartForms and reports that could deliver standardized data capture and analysis. This included confiscated items and vehicle check SmartForms, scenario testing and incident reporting. The trial highlighted the clear benefits of using the SmartForms, most notably around confiscated items and vehicle forms. Required Monthly Reports Confiscated items, following bag searches carried out at point of entry, historically required between 10-15 minutes to complete and during that time the security officer was away from the floor resulting in lost productivity. Following the adoption of SmartTask, reports can now be created automatically using highly-accurate data, while paper usage and printing requirements have been dramatically reduced. The time savings achieved at the National History Museum by the Wilson James team have led to higher productivity, greater capacity to carry out bag searches and increased visibility of security staff. Management time saving have also been realised in production of required monthly reports, as well as administration savings of 12-hours per week for the Security Duty Managers. Ease Of Deployment Don McCann, Technology Systems Consultant at Wilson James commented: “SmartTask provided significant support throughout the contract bid and contributed to the successful re-signing for a further five years.” SmartTask has also handled a separate project for Bradford Science Festival, which further demonstrated the flexibility of the system" “The solution is now fully operational at five locations – Natural History Museum, National Science & Media Museum, National Railway Museum, Science & Industry Museum and a Wandsworth storage site – with the Science Museum and V&A to follow shortly. SmartTask has also handled a separate project for Bradford Science Festival, which further demonstrated the flexibility of the system, ease of deployment and its suitability for the security sector.” Enhance Customer Satisfaction Paul Ridden, CEO of SmartTask said: “This latest agreement demonstrates our ability to work closely with our customers to develop advanced workforce management solutions that support business development, customer retention and quality service delivery. We are now partner of choice for a growing number of security organizations based on our proven track record helping to tackle some of the most common and difficult operational challenges they face.” SmartTask is an advanced and simple-to-use employee scheduling and mobile workforce management solution that enables security companies to better plan and manage their workers, so they are at the right place, at the right time. The cloud-based software solution combines intelligent rostering, live monitoring and integrated proof of attendance across both static and mobile teams, making it the ideal tool to improve operational control, enhance customer satisfaction, and support duty of care to staff.
It took six years to remodel the interior of the ‘Palace of Culture’, a monument to socialism built in the 1960s under East German communist rule. Now Bosch is contributing intelligent solutions to make sure that visitors feel safe there, without detracting from its historic charm. It takes the right setting for culture to flourish. Various things are essential: an ambiance in which visitors feel at ease, excellent acoustics, and flawless organization. Now that the Palace of Culture has been completely renovated to ensure all of this, the city of Dresden boasts a new, modern venue for promoting the arts. Sophisticated Security Solutions The main auditorium seats 1,700 people, and the building as a whole can accommodate up to 2,800 A completely new, state-of-the-art auditorium is the heart of the building. It meets international standards with its striking architecture and top-notch acoustics, providing ideal conditions for the Dresden Philharmonic Orchestra and all kinds of other musicians to give concerts. There is also a new municipal library branch, emphasizing the Palace of Culture’s new, open character. Spacious lobbies containing a restaurant and ticket sales link all of the facilities and rooms with one another. Many of the events held here in central Dresden are sold out. The main auditorium seats 1,700 people, and the building as a whole can accommodate up to 2,800. Crowds like these call for sophisticated security solutions that can be smoothly integrated into the overall design. Cleverly Integrated Components “We wanted a cost-effective overall solution that would do justice to the Palace of Culture and its unique architecture,” says Steffen Meyer, the building’s manager. “We published an invitation to bid for the project and of all the applications we received, Bosch convinced us that they were right for the job.” The building experts from Bosch implemented a customized solution for the Palace of Culture with a host of cleverly integrated components for fire protection, evacuation, access control, video surveillance and building management. The result is a harmonious overall system that meets the entire range of security needs. “As a public facility where people gather, we have to comply with very strict fire protection rules,” explains Meyer. Invisible Smoke Detectors “We also had to meet some special requirements.” Since the Palace of Culture has protected status as a historic landmark, the appearance of the walls, ceilings and floors may not be noticeably altered. Security staff can also tell whether anyone is still in the building, an important piece of information in case it is ever necessary to evacuate it Now virtually invisible smoke detectors preserve the ambiance of the concert hall. Special calculations were even carried out to avoid impairing its acoustics. Advanced video technology automatically counts visitors to prevent the building’s capacity from being exceeded. Security staff can also tell whether anyone is still in the building, an important piece of information in case it is ever necessary to evacuate it. Building Integration System In critical situations, special speakers powerful enough to be heard over the orchestra or even a rock concert are lowered from the ceiling to make sure that everyone hears important announcements. All of the individual components are networked via the Building Integration System from Bosch. It makes it easy for the well-trained security guards to monitor and control everything. And to ensure that everything functions reliably in the long term, experts from the Bosch center in Dresden will regularly check and service the system. Meyer stresses that “we don’t want our culture fans to run any risks.”
Comelit has worked sensitively on site at Rathview Mental Health Facility, to supply door entry solutions to ensure a therapeutic and safe environment is created for the benefit of residents, staff and visitors. Comelit Door Entry Solutions Situated on a rural greenfield site on the outskirts of Omagh, Rathview Mental Health Facility is a new c£2.8 million, 1169m² site that contains a twelve-bed Discharge Unit and a six-bed Recovery Unit, arranged around two central courtyards. With its innovative design, the unit aims to increase the range of community-based mental health services available in Northern Ireland. Owned by The Western Health and Social Care Trust and designed by award winning Todd Architects, Comelit worked sensitively with electrical consultants on site, WYG Belfast, from the tender process to project completion, understanding the full specification requirements from the entrance through staff stations and concierge resources. Healthcare Security And Safety Comelit was specified through evidence of its understanding of the site requirements, along with the system being IP based, hence highly flexible and configurable" Says Gary Hewitt, Consultant at Chubb NI Ltd, who worked on Rathview Mental Health Facility: “This was an incredibly sensitive works program, where the design of the building was not just important from an aesthetic perspective, but also to ensure a positive impact on the recovery process for residents; and for staff to operate in an environment where they feel safe and secure.” “Comelit was specified through experience and evidence of its understanding of requirements on site, together with the system being IP based, hence highly flexible and configurable. These elements came together to allow for residents to experience independence in a domestic environment, with autonomous access to their accommodation.” 316 Sense Panels In total, Comelit was specified for the door entry systems for all four entrance points to the facility, and a total of four 316 Sense panels installed, along with two staff stations and a concierge unit. Each of the twelve apartments were fitted with a pull cord and emergency response button, cabled into Comelit’s Mini handsfree monitors. Designed to operate through Comelit’s innovative VIP system, it utilizes the Security Systems Network and allows a priority call to the concierge in case of emergency. Patients, Staff And Visitors’ Safety Mike Campbell, Business Development Manager at Comelit Group UK concluded: “Rathview is an important development in the context of provision of mental health facilities across Northern Ireland, where every part of the site is seen as potentially having therapeutic value. We have worked in partnership with the consultants on site to create a door entry solution that can ensure a balance of a welcoming, encouraging environment, while maintaining the safety and security of residents, visitors and staff.”
3xLOGIC, Inc., a provider of integrated, intelligent security solutions, and a three-time Deloitte Technology Fast 500 winner, announced Estill County Emergency Medical Services, located in Irvine, KY, is successfully using infinias access control from 3xLOGIC to improve security and give hard-working staff needed peace of mind to focus on their important work. Bates Security, Lexington, Kentucky, designed, installed, and oversees the system. Shelia Wise, in charge of accounting and training for Estill EMS, oversaw the process to upgrade security at the County’s EMS facility. “We were looking to secure a building that is in operation 24/7/365.” Working on behalf of the County EMS’s Board of Directors, Wise and her team assembled three bids and in the process got a real education on access control, what different systems can do, and what their real security needs were. Securing The Medical Room Our main goals were to secure our medical room, per DEA regulations, and to make our facility safe when staff are here"“Our main goals were to secure our medical room, per DEA regulations, and to make our facility safe when staff are here, but also when they need to clear out at a moment’s notice,” explained Wise. Ultimately, the Board of Directors choose inifinias access control because it met the wide-ranging needs of the County EMS. “We chose the best system for the price and the feature set,” said Wise. Installation was completed about two years ago and the infinias system manages a total of six doors at the main EMS building, two of which are internal, including the medical room where drugs are stored. Later, two more doors were added at a sub-station location. “A top concern is the medical room,” said Wise, “I have to be notified when someone is accessing that door. Now, I get an alert anytime someone is attempting to access that secure room anywhere I am, I don’t need to be onsite. Wise and other staff manage their eight doors from a single interface, by any computer with an Internet connection—anytime, anywhere. Access Management For Employees “It was important that I could easily operate the system software without help from anyone else. And Sean Moberly from Bates is always available for questions and any maintenance that’s needed. It’s a great feeling to know that when we’re away doing our jobs all our worldly possessions back at the facility are protected and we don’t have to worry,” said Wise. The infinias system manages access for all employees, some outside contractors, and the Chairman of the Board of DirectorsEstill County EMS has 35-40 employees and at any given time upwards to 15 people are at the main station on a daily basis. The infinias system manages access for all employees, some outside contractors, who do radio and computer maintenance, and the Chairman of the Board of Directors. Ms. Wise also grants temporary access to hospital staff who use the facility for training. User-Friendly Access Control System As the main administrator, Ms. Wise has created five different sub-groups among all employees and visitors, providing each group with the access privileges they need to do their jobs, while ensuring that only a few individuals have full access to all doors and areas. “I think the system works really well. There was a short learning curve, but it’s quite user-friendly and we’ve not had any problems. From what I was told at our original meeting with Bates through operations today, we got exactly what we user-friendly, and we’re very satisfied,” Wise concluded.
A concierge orders a taxi for an employee or takes his shirts to be cleaned, then greets a visitor and escorts her to an elevator. And these are just a few of countless possible examples of the NOVE office complex’s unique, multifaceted service culture. It attains the standard of security, efficiency and comfort of a five-star international hotel in a state-of-the-art facility where 1,300 people work for no fewer than eight different companies in the heart of Munich. The NOVE has even been honored with platinum certification from LEED (‘Leadership in Energy and Environmental Design’, a program developed by the U.S. Green Building Council to encourage the construction of energy- and resource-efficient, healthy buildings). Completely Integrated Solution Tim Wiesener therefore went looking for a reliable and experienced partner, and found it in Bosch’s building experts “We wanted an office building that felt like a five-star designer hotel,” says Tim Wiesener, the CEO of Salvis Consulting AG. The company envisaged a high standard of security backed by smart networked solutions that blended smoothly and esthetically with the architecture and interior decorating. “We certainly didn’t want employees and other users of the building to feel bothered or overwhelmed by its technology.” Tim Wiesener therefore went looking for a reliable and experienced partner, and found it in Bosch’s building experts. “Bosch applies both experience and foresight to its projects, and its specialists immediately grasped our vision.” Video surveillance, access control and intrusion alarm systems, fire protection, visitor management: Bosch planned and implemented a completely integrated solution that harmonised with NOVE’s character and personality. Its leading-edge technology and software are distributed and networked across six stories, a 23-meter-high atrium, and a nine-floor tower. Manage Video Surveillance The concierges working shifts at the 24-hour reception play an important role in the overall concept, since they are also trained security experts. Among other things, monitors behind the counter let them keep a watchful eye on images from over a hundred surveillance cameras that can be remotely controlled, zoomed and pointed as required, all courtesy of the Bosch Building Integration System. The software lets them efficiently manage video surveillance as well as fire and intrusion alarms. Around-the-clock assistance is also available to the 300 or so visitors that enter the NOVE each day, aided by the dedicated BoVisit visitor management system. The software’s functionality includes announcing guests, printing name tags for them, and assigning them to employees. Thanks to a centralized solution, the concierges always know who is where inside the building. Visually Integrating This is especially important in case a critical situation ever arises. At the press of a button, the system generates a vitally important overview of how many people need to be evacuated from each area. Not everything the concierges do is high-tech, of course; they are devoted to helping both tenants and visitors with a smile. “Our receptionists are efficient but not nameless. We combine security with personal service,” says Tim Wiesener. Tenants can naturally access the NOVE any time of the day or night Italian star architect Antonio Citterio designed the complex, which spans roughly 27,500 square meters of gross floor space. He paid especially great attention to visually integrating the security equipment so it wouldn’t stand out. “This called for a certain finesse,” explains Tim Wiesener. Networked Solutions Tim Kosok, a sales representative with Bosch Energy and Building Solutions in Munich, worked hard to find out exactly what the customer wanted, explaining that “we painted installations the same color as the ceilings or walls and positioned them just right so they would be practically invisible. Even the door intercoms are designed to be inconspicuous.” Tenants can naturally access the NOVE any time of the day or night. Tim Wiesener is confident that everyone consistently feels safe there, thanks to the networked solutions. “Our collaboration for implementing the complex was excellent and collegial. We worked closely with the Bosch experts to create a solution that’s geared to people and their needs.”
Johnson Controls has announced that the Dr. P. Phillips YMCA has installed Software House’s C-CURE 9000 security and event management platform as part of a comprehensive visitor management system designed to increase security by verifying member identity and restricting access of non-members. Dr. P. Phillips’ YMCA, located in Doctor Phillips, Fla., is the largest of 27 facilities that are part of The YMCA of Central Florida. This single location serves 11,000 active members. The facility recently completed an $11 million renovation and expansion project, which also included an upgrade to the physical access control system to incorporate biometric technology to improve the member check-in process. Biometric Fingerprint Access The turnstiles help to manage the flow of visitors and identify when a person does not have membership privileges to gain accessThe comprehensive system integrates Software House C-CURE 9000 with biometric readers from iDentytech and swing glass optical turnstiles from Automatic Systems. Together, the systems manage the flow of visitors into the facility by enabling members to gain access using a biometric fingerprint reader instead of swiping an access control card. The turnstiles help manage the flow of visitors and identify when a person does not have membership privileges to gain access. Membership enrollment information resides in C-CURE 9000, which serves as the central component of the overall access control system. Johnson Controls' integration arm served as the systems integrator on the project. Accurate Accounting Of Membership Status “With the old system,” said Dan Humbert, director of IT for the YMCA of Central Florida, “the only way to tell which family center membership someone held was by the color of the barcode. With the C-CURE 9000 system that’s all automated. We can now capture the information on where they can work out directly in the system.” A major benefit of the new access control system and membership program is that it provides more accurate accounting of membership status. The system can flag out-of-date memberships, so when a person is denied access can be directed to the desk where they can pay on-site and be reinstated.