Voice recognition systems
Fime has extended its portfolio of biometric consultancy and testing services to its Taiwan laboratory. Now accredited by the FIDO Alliance Biometric Component Certification Program, Fime is supporting APAC device manufacturers, and biometric component and software providers, with local services. The accreditation allows local stakeholders to confirm the performance and security of their fingerprint and facial biometric solutions as they seek to replace passwords. Dr. Rae Rivera, Certification...
National systems integrator, IES Communications, LLC, a subsidiary of IES Holdings, Inc., has added the Alcatraz Rock autonomous access control solution to its security technology portfolio. IES Communications has selected the Alcatraz Rock to leverage the latest in biometrics – facial authentication – which is more secure and more hygienic, as it reduces touchpoints. “IES is always striving to bring safe new ways to utilize cutting-edge security solutions to its customers. W...
The Security Industry Association (SIA) has named a new chair and vice-chair to lead the SIA Identity and Biometric Technology Advisory Board (IBTAB), an exclusive advisory panel to the SIA Board of Directors comprised of biometric and digital identification experts. Benji Hutchinson –president of U.S. federal government business at NEC Corporation of America – will serve as SIA IBTAB chair, with Jim Black – director of security standards and controls within Microsoft’s...
Gradiant leads a project to develop a technology capable of verifying the identity of citizens in the online processes of public services in a secure, easy-to-use, and private way. To do so, the alliance will work on the concept of Electronic Identity (eID), the way users can identify themselves through the network and will use Artificial Intelligence and Blockchain technologies to ensure the process. This is IMPULSE (Identity Management in PUbLic SErvices), an initiative with a budget of around...
Suprema, a globally renowned company in access control, biometrics and time & attendance solutions, hosted a virtual partner summit on Feb 3, 2021, where it announced new leadership, shared business success stories as well as a business blueprint for future growth. Suprema Partner Summit The Partner Summit, attended by close to hundred Suprema partners, began with a greeting from James Lee, the new Chairman of the company. Lee thanked partners for Suprema’s sales performance, shared...
We are several weeks into 2021, and it is already shaping up to be an eventful year. The happenings and trends from 2020 will likely carry over into the new year, but in a fast-moving industry such as ours, there will also be additional trends to watch. Looking toward the year ahead, we asked this week’s Expert Panel Roundtable: What will be the biggest security trends in 2021?
News
LenelS2 has announced a global distribution agreement to resell Invixium’s contactless biometric solutions through the LenelS2 OnGuard and NetBox value-added reseller (VAR) channels. The agreement also includes a new interface with the OnGuard and NetBox systems to enhance access control and proactive screening to help protect people and optimize building health and efficiency. The solutions are offered as part of Carrier’s Healthy Buildings Program, an expanded suite of advanced solutions to help deliver healthier, safer, more efficient and productive indoor environments. LenelS2, an internationally renowned company in advanced security systems and services, is a part of Carrier Corporation, a global provider of healthy, safe and sustainable building and cold chain solutions. IXM TITAN solution with Enhancement Kit LenelS2 will now offer the IXM TITAN solution with Enhancement Kit: an intelligent dual-camera biometric solution LenelS2 will now offer the IXM TITAN solution with Enhancement Kit: an intelligent dual-camera biometric solution that performs contactless facial recognition authentication with no mask removal required, and mask detection and elevated body temperature detection measured at the tear duct. The Invixium TITAN solution offers an API interface with the NetBox access control system and an interface with the OnGuard security management system through a certification in the LenelS2 OpenAccess Alliance Program (OAAP). Flexible configuration of workflows The interface enables flexible configuration of workflows utilizing any permutation combination of card, biometric fingerprint, facial recognition, temperature screening and mask detection access parameters. “The collaboration with Invixium provides our users with a versatile access control and proactive screening solution that can help them navigate today’s complex safety and security requirements,” said Jeff Stanek, President, LenelS2, adding “The advanced biometrics and built-in mask detection add new functionality to our Healthy Buildings portfolio.” TITAN solution and LenelS2 access integration “The powerful interface between the TITAN solution and LenelS2 access control systems provides very relevant biometric solutions that meet the world’s most pressing demands,” said Shiraz Kapadia, the Chief Executive Officer (CEO) and President of Invixium. Shiraz adds, “Our health-focused portfolio combines temperature screening with mask detection for contactless access control and workforce management in one elegant device, allowing businesses in key industries to easily create healthy business environments.” Touchless biometric security and access control TITAN solution delivers touchless biometric security through face recognition via a 21-megapixel camera The TITAN solution delivers touchless biometric security through face recognition via a 21-megapixel camera and adding the Enhancement Kit transforms the TITAN solution into a health kiosk capable of measuring temperature for biometric access control. Not only can the TITAN solution authenticate 12 to 18 users’ faces in one minute with high accuracy, but it can also screen each of those users’ temperatures at the tear duct in the same amount of time. Bolstering entrance controls The TITAN solution features an easy, one-piece installation and installs just like a traditional reader. In addition to its touchless access and proactive screening capabilities, the TITAN solution can be easily used to bolster entrance controls. These readers, purchased through LenelS2, do not require any additional licensing fees. TITAN readers and Enhancement Kits must be purchased individually or as part of a kit from LenelS2.
Times are changing fast and so is the need for using and combining technologies in new ways. With the new edition of Milestone Marketplace, buyers will not only find the complementary hardware and software functionality, but they will also explore solution services when building best-of-breed video management solutions. COVID19 has forced businesses, cities, and entire countries to operate in new ways and increased the demand for new technologies and digital solutions. Adaptable video solutions Versatile use of video solutions that can be expanded with more functionalities help companies thrive when the world changes, whether the need is to ensure public safety, secure access to buildings, or check adherence to social distancing rules. Milestone Marketplace is empowering businesses to explore the unmatched possibilities of video solutions, relevant to companies looking for a new video solution and for existing users of Milestone XProtect looking to enhance the solution’s functionality. In addition to verified hardware and software, the new release of Milestone Marketplace also holds solution services with a total of more than 500 options to choose from. Digital platform The global digital platform includes powerful technologies, like artificial intelligence, augmented reality, video analytics, GIS, and GPS along with combined solutions tailormade to meet several business challenges. The partners behind this are all part of the Milestone Community, ready to help businesses use video solutions to solve new challenges. Explore, connect and deploy Buyers can filter through a network of trusted Milestone integration partners to find the best fit Milestone Marketplace allows buyers access to a vast catalog of Milestone Systems XProtect-compatible software, hardware, and solution services, as well as recommendations and guidance on how to solve specific challenges. Moreover, buyers can filter through a network of trusted Milestone integration partners to find the best fit for their business across the globe. Customer cases, documentation, implementation guides, and demos are just some of the elements made available by the partners using Milestone Marketplace to allow customers to explore solutions available to them. Onboarded integrators “Since we first introduced Milestone Marketplace in 2019, we’ve been working to extend the experience for both customers and partners when searching for and creating XProtect-compatible solutions.” “With this version we’ve onboarded integrators as a new partner type, improved the search functionality, and added use categories to name but a few, all with the aim to offer a future-proof platform open to integrating with innovation from around the world,” says Chief Sales & Marketing Officer Kenneth Hune Petersen, Milestone Systems.
Almost everything in the enterprise is or can be connected and powered by the IP network. Once-disparate systems – VoIP, security, computers, WAPs, lighting, and even HVAC – are converging. AV is no exception. More and more, AV systems are being migrated to the IP network. This approach is more scalable for future growth, allows extended distances for transmission, enables PoE, and eliminates the hassle and expense of installing a separate AV-only infrastructure. Delivering error-Free transmission AV technologies are advancing rapidly, and the amount of video traffic crossing IP networks is growing at a rate of 25% every year. By 2021, it’s expected that one million minutes of video traffic will cross global IP networks every single second. With that kind of demand, it’s more important than ever to install an AV system that your system. Berk-Tek is at the forefront of these advancing AV technologies As a member of the HDBaseT Alliance and SDVoE Alliance, Berk-Tek is at the forefront of these advancing AV technologies. Their certified solutions are specially not only delivers flawless image quality with low latency, but also delivers the scalability and flexibility needed to expand designed to deliver error-free transmission of audio and video over the IP network, while overcoming the noise and heat rise inherently present with high-power PoE (802.3bt). More efficient installation LANmark-XTP delivers the best Category 6A performance for both AV over IP and high-power PoE, thanks to its unique discontinuous shield. LANmark-HD is a revolutionary new Category 6 cable that allows you to connect and power IP-enabled AV equipment with ease. Designed specifically for AV applications, LANmark-HD is shielded for superior signal isolation and available in 500-ft reels for more efficient installation.
Rapid aging population, high healthcare costs, and physician shortages are creating an increasing demand for care at home, especially for seniors with long-term health conditions. The GX features a LCD display that shows clock time, temperature, GSM signal strength and sensor faults to keep users fully informed at all times. GX smart care medical alarm is an all-in-one wellness, and personal safety medical alarm solution, bridging medical health monitoring and emergency alarm to keep seniors safe in their own homes. Bluetooth medical devices GX is compatible with Bluetooth medical devices, like blood glucose/blood pressure monitors, pulse oximeters…etc, to track medical data and remote monitoring directly from caregivers/physicians; and also has telecare alarm features, including voice recognition, emergency monitoring, Inactivity monitoring, voice control, and home automation capabilities to assist seniors to have a more secure, healthy living. Allowing seniors to receive emergency attention even in situations where they are unable to seek help manually ZigBee, Z-Wave, and/or Bluetooth automation devices incorporated into GX creates a smarter and safer home, by auto turning on hallway lights at night to decrease chance of a fall; or auto turn on the heater if there’s a sudden temperature drop. GX has built-in voice recognition and can activate an emergency all to CMS by preset vocal commands or keywords. Allowing seniors to receive emergency attention even in situations where they are unable to seek help manually. Control home electronic devices GX can be paired with BRPD-1 Bluetooth pendant, a small wearable panic button that partners with a smartphone application for GPS location reporting and trigger help alarm with one button press, whether the user is at home or out for a walk. GX is compatible with Google Home voice control to seek help during emergencies, and control home electronic devices. GX is also compatible with Amazon Alexa voice control to control home electronic devices. GX is compatible with Pivotell® Advance Automatic Pill Dispenser, keeping secure of all pills, remind users to take their medication, keep track of their medicine intake, and allow caregiver/physician to monitor pill taking results/record and keep an eye on user’s needs. GX’s built-in VOIP function allows users to initiate two-way voice calls to contact CMS and family members during alarms and emergency. Supporting wireless sensor devices GX can support wireless sensor devices, allowing users to add in smoke detectors With the optional add-on of DECT, GX can pair with voice extenders, talking pendants, call points…etc placed around the home to create a safety net and peace of mind. GX can integrate Camera PIR Motion Sensors to deliver real-time visual monitoring and verification. When an emergency occurs, alerts are immediately sent to family members, and Monitoring Center to verify the event and sending immediate assistance as needed. GX can support wireless sensor devices, allowing users to add in smoke detectors, water leakage sensors, and gas sensors to monitor emergencies; and motion sensors, door contacts, sensor pad transmitters for inactivity monitoring, to build a healthier, safer independent living. GX also has LED nightlight featuring both multicolour adjustment and light level button control for pleasant ambiance. Smart Care medical alarm solution Features of GX-Cubic2 - smart care medical alarm solution Communication Path Options: IP (Ethernet), LTE Built-in Module: RF, DECT Protocol Module Options: Zigbee, Z-Wave, Bluetooth Able to support multiple communication protocols with Monitoring Centers for Alarm Reporting LCD Display: Clock, Temperature, GSM Signal Strength, and Sensor Faults Compatible with Bluetooth (BLE) medical devices Voice Recognition capabilities Voice over Internet Protocol (VoIP) capabilities Certified RF range, reliability and performance Supports Pivotell® ‘Advance’ Pill Dispenser integration ZigBee or Z-Wave compatible home automation features Compatible with Amazon Alexa & Google Home voice control 24/7 Environment Safety Monitoring Voice Prompt feature Multi-party emergency intercom system capability Supports multiple programming methods Remote firmware update capabilities
Advanced Mobile Lite Series is a 4G/LTE PERS locator that is equipped with Wi-Fi location tracking. Leveraging industry-certified A-GPS and Wi-Fi technology, Mobile Lite has improved location accuracy especially when users are inside the buildings. In addition to both GPS & Wi-Fi positioning technologies, Mobile Lite Series has built-in fall detection (Mobile Lite-R15/R18 only), providing comprehensive care for all seniors. The positional information can be accessed via Climax’s online platform “My GPS Alert” on web portal or smartphone app, offering proactive engagement to users and their caregivers. When there is a need, with raised guidance buttons and voice prompts, users can open two-way voice communication immediately and learn the status of emergency reporting. Typical emergency response products Mobile Lite-R8/R18 is able to have RF devices integrated such as emergency pendants and wrist transmitters. The lightweight, portable Mobile Lite goes beyond typical emergency response products by integrating both safety monitoring and telecare capabilities. These features make Mobile Lite the best companion for active, healthy, and worry-free aging. Features Portable PERS for both indoor and outdoor protection Fall Detection built-in (Mobile Lite-R15/R18 only) Reports up to five emergency calls numbers or CMS Location coordinates viewable on Climax’s online platform & app “My GPS Alert” Extensive full-duplex two-way voice communication range Remote programming Enhanced location accuracy with GPS & Wi-fi technologies Integrate emergency pendants / wrist transmitters (Mobile-Lite R8/R18 only) Remote firmware upgrade Geofence alerts can be generated when the user leaves a defined safe area (optional) Automatic check-in reports Specifications RF Frequency - 919 MHz / 869 MHz (EN-300-220, Class 1) (Mobile Lite-R8/R18 only) SIM Card - Supports 1.8V and 3V micro SIM cards 4G/LTE Frequencies - EU: B1 (2100 MHz) / B3 (1800 MHz) / B7 (2600 MHz) / B8 (900 MHz) / B20 (800 MHz) / B28 (700 MHz) US: B2 (1900MHz) / B4 (1700MHz) / B5 (850MHz) / B12 (700MHz) / B13 (700MHz) 3G Frequencies - EU: B1 (2100 MHz) / B8 (900 MHz) US: B2 (1900MHz) / B4 (1700MHz) / B5 (850MHz) Power Source - 3.7V, 800mAhr Lithium rechargeable battery x 1 Battery Life - 64 hours Operating Temperature - -10°C to 45°C (14°F to 113°F) Operating Humidity - Up to 85% non-condensing Dimensions - 42 mm x 23 mm x 71 mm Ordering Information Mobile Lite-R3-QT - GPS Locator Mobile Lite-R8 - GPS Locator with RF technology Mobile Lite-R15 - GPS Locator with Fall Detection feature Mobile Lite-R18 - GPS Locator with Fall Detection feature and RF technology
IP Communications enabler Softil announces that its BEEHD technology has been selected by Fujitsu Spain to build the ARCONTE Trial Recording System. The multilingual, secure, modular and adaptable digital recording system will allow courts to work more quickly, transparently, and cost-efficiently. The system also ensures compliance with strict mandatory data requirements across Europe, Middle East, India and African (EMEIA) jurisdictions where courts are legally required to record and store legal proceedings. Cloud-ready system ARCONTE is already used by three out of four Spanish courts and has processed more than five million court cases to date. The cloud-ready system seamlessly integrates with other judicial applications and can store more than 500,000 hours of video per year. Fujitsu now offers courts across the EMEIA region the finest trial recording system on today’s market" “Fujitsu now offers courts across the EMEIA region the finest trial recording system on today’s market,” says Vicente Delás, Director of Justice Solutions at Fujitsu Spain. “Inevitably, our developers turned to the world’s leading IP enabler Softil for its software development kit and support teams to build the Fujitsu ARCONTE system.” Case management applications “Softil’s BEEHD technology is enabling many of the world’s IP communications providers to deliver the highest quality end-products across all sectors of human activity and Fujitsu ARCONTE is a perfect example,” adds Pierre Hagendorf, Softil’s CEO. Fujitsu ARCONTE enables courts to seamlessly and securely record audio-video, and to catalog, store, share and electronically distribute all the documentation generated during court hearings and trials. This significantly speeds up administrative processes. For minimal disruption and added efficiency, the solution can be easily integrated with other court applications, including case management applications. Data security and integrity Fujitsu ARCONTE uses digital seals and signatures to certify recordingsAs courts move towards paperless, electronic processing, the cloud-ready solution from Fujitsu offers a reliable, powerful audio and video recording platform to replace traditional documentation methods, while offering maximum data security and integrity. Fujitsu ARCONTE uses digital seals and signatures to certify recordings, helping meet compliance requirements. The new video conferencing solution is a complement of a trial recording application based on windows PC. The application allows video and voice conferencing from the same system used to record the trial and supports H323 and SIP protocols. It replaces an earlier video conferencing solution from another IP supplier from lack of support. Development of voice and video solutions BEEHD was chosen as a replacement and Fujitsu decision has “since been validated and impressed with the quality, time to market, support received and overall experience working with Softil,” adds Vicente Delás. Softil’s BEEHD technology is a cross-platform framework designed for chipset vendors, device manufacturers, system integrators, application developers and service providers looking to accelerate development of voice and video solutions over IP.


Expert commentary
Several major players vigorously employ biometric recognition technologies around the globe. Governments use biometrics to control immigration, security, and create national databases of biometric profiles. Being one of the most striking examples, the Indian Aadhaar includes face photos, iris, and fingerprints of about 1.2 billion people. Financial institutions, on their part, make use of biometrics to protect transactions by confirming a client's identity, as well as develop and provide services without clients visiting the office. Besides, biometric technology ensures security and optimizes passenger traffic at transport facilities and collects data about customers, and investigates theft and other incidents in retail stores. Widespread use of biometrics Business, which suddenly boosted the development of biometrics, is an active user of biometric technology Business, which suddenly boosted the development of biometrics, is another active user of biometric technology. Industries choose biometric systems, as these systems are impossible to trick in terms of security, access control, and data protection. Being in demand in business, these three tasks are also relevant for the industry. However, the use of biometrics at industrial sites is discussed unfairly seldom. Therefore, it is the face identification that is the most convenient there, as workers often use gloves, or their hands may be contaminated, and the palm pattern is distorted by heavy labor. All these features make it difficult to recognize people by fingerprints or veins and significantly reduce identification reliability. Therefore, industries seek facial recognition solutions. Thus, let us demonstrate the application of face recognition technology at different enterprises, regardless of the area. Facial recognition use in incident management Facial biometric products are known to automate and improve the efficiency of security services by enriching any VMS system. These systems provide an opportunity of instantly informing the operator about recognized or unrecognized people, and their list membership, as well as save all the detected images for further security incident investigation. Furthermore, some sophisticated facial biometric systems even provide an opportunity to build a map of the movements of specific people around a site. Besides, it is relevant not only for conducting investigations but also in countering the spread of the COVID-19 virus. Identifying and tracking COVID-19 positive cases Therefore, if an employee or visitor with a positive COVID-19 test enters a facility, the system will help to track his/her movement and identify his/her specific location. It will also help to take the necessary measures for spot sanitary processing. Thus, the introduction of biometric facial recognition at the industrial enterprise can improve and speed up the incidents’ response and investigations without spending hours watching the video archive. Access control system to secure physical assets The right access control system can help industries secure physical and informational assets The right access control system can help industries secure physical and informational assets, cut personnel costs, and keep employees safe. Facial recognition systems may enrich access control systems of any company by providing more security. As biometric characteristics, by which the system assesses the compliance of a person with the available profiles in the database, cannot be faked or passed. The human factor is also reduced to zero, due to the fact that while identity documents can be changed, the inspector can make a mistake or treat his/her task carelessly, be in collusion with an intruder, the biometric system simply compares a person in front of the camera with the biometric profiles database. Biometric facial identification software For example, RecFaces product Id-Gate, a specialized software product for reliable access control to the site, checks the access rights by using biometric facial identification alone or in conjunction with traditional IDs (electronic passes, access keys, etc.), which means that there is almost a zero probability of passing to the site by someone else's ID. The access control system’s functionality allows one to strictly account the number and time of all the facility’s visitors and also track their movement. When unauthorized access is attempted or a person from the stop list is detected, Id-Gate sends an automatic notification to the access control system and operator. Enhanced data and information security Even despite the division of access to different industrial enterprise areas, the security service needs to provide independent information system security. Employees with the same facility access rights may have different access rights to data. However, in that case, a personal password is not enough, as an employee may forget it, write it down and leave it as a reminder, tell a colleague to do something for him/her during the vacation, or just enter it at another person’s presence. Password-free biometric authentication systems make the procedure user-friendly and secure Password-free biometric authentication Password-free biometric authentication systems make the procedure user-friendly and secure. Such systems usually provide an option of two-step verification when successful password entry is additionally confirmed by biometric recognition. Hence, it is particularly relevant due to the current lockdown in many countries. To sum up, the application of biometric technologies solves several issues of the industry, such as: Optimizes and partially automates the work of the security service, as it provides reliable identification and verification of visitors/employees, reduces the amount of time spent on finding a person on video and making a map of his/her movements, without spending hours on watching video archive in case of investigation. Provides a high level of reliability and protection from unauthorized access to the enterprise and the information system. Provides a two-step verification of the user/visitor (including password and biometric data) and almost eliminates the risk of substitution of user data/ID.
News reports and opinion columns about face recognition are appearing everyday. To some of us, the term sounds overly intrusive. It even makes people shrink back into their seats or shake their head in disgust, picturing a present-day dystopia. Yet to others, face recognition presents technology-enabled realistic opportunities to fight, and win, the battle against crime. What are the facts about face recognition? Which side is right? Well, there is no definitive answer because, as with all powerful tools, it all depends on who uses it. Face recognition can, in fact, be used in an immoral or controversial manner. But, it can also be immensely beneficial in providing a safe and secure atmosphere for those in its presence. Concerns of facial recognition With the increased facial recognition applications, people’s concerns over the technology continuously appear throughout news channels and social media. Some of the concerns include: Privacy: Alex Perry of Mashable sums up his and most other peoples’ privacy concerns with face recognition technology when he wrote, “The first and most obvious reason why people are unhappy about facial recognition is that it's unpleasant by nature. Increasing government surveillance has been a hot-button issue for many, many years, and tech like Amazon's Rekognition software is only making the dystopian future feel even more real”. Accuracy: People are worried about the possibilities of inaccurate face detection, which could result in wrongful identification or criminalization. Awareness: Face recognition software allows the user to upload a picture of anyone, regardless of whether that person knows of it. An article posted on The Conversation states, “There is a lack of detailed and specific information as to how facial recognition is actually used. This means that we are not given the opportunity to consent to the recording, analyzing and storing of our images in databases. By denying us the opportunity to consent, we are denied choice and control over the use of our own images” Debunking concerns The concerns with privacy, accuracy, and awareness are all legitimate and valid concerns. However, let us look at the facts and examine the reasons why face recognition, like any other technology, can be responsibly used: Privacy concerns: Unlike the fictional dystopian future where every action, even in one’s own home, is monitored by a centralized authority, the reality is that face recognition technology only helps the security guard monitoring public locations where security cameras are installed. There is fundamentally no difference between a human security guard at the door and an AI-based software in terms of recognizing people on watchlist and not recognizing those who are not. The only difference is that the AI-based face recognition software can do so at a higher speed and without fatigue. Face recognition software only recognizes faces that the user has put in the system, which is not every person on the planet, nor could it ever be. Accuracy concerns: It is true that first-generation face recognition systems have a large margin for error according to studies in 2014. However, as of 2020, the best face recognition systems are now around 99.8% accurate. New AI models are continuously being trained with larger, more relevant, more diverse and less biased datasets. The error margin found in face recognition software today is comparable to that of a person, and it will continue to decrease as we better understand the limitations, train increasingly better AI and deploy AI in more suitable settings. Awareness concerns: While not entirely comforting, the fact is that we are often being watched one way or another on a security camera. Informa showed that in 2014, 245 million cameras were active worldwide, this number jumped to 656 million in 2018 and is projected to nearly double in 2021. Security camera systems, like security guards, are local business and government’s precaution measures to minimize incidents such as shoplifting, car thefts, vandalism and violence. In other words, visitors to locations with security systems have tacitly agreed to the monitoring in exchange for using the service provided by those locations in safety, and visitors are indeed aware of the existence of security cameras. Face recognition software is only another layer of security, and anyone who is not a security threat is unlikely to be registered in the system without explicit consent. The benefits In August 2019, the NYPD used face recognition software to catch a rapist within 24 hours after the incident occurred. In April 2019, the Sichuan Provincial Public Security Department in China, found a 13-year-old girl using face recognition technology. The girl had gone missing in 2009, persuading many people that she would never be found again. Face recognition presents technology-enabled realistic opportunities to fight, and win, the battle against crimeIn the UK, the face recognition system helps Welsh police forces with the detection and prevention of crime. "For police it can help facilitate the identification process and it can reduce it to minutes and seconds," says Alexeis Garcia-Perez, a researcher on cybersecurity management at Coventry University. "They can identify someone in a short amount of time and in doing that they can minimize false arrests and other issues that the public will not see in a very positive way". In fact, nearly 60% Americans polled in 2019 accept the use of face recognition by law enforcement to enhance public safety. Forbes magazine states that “When people know they are being watched, they are less likely to commit crimes so the possibility of facial recognition technology being used could deter crime”. Saving time One thing that all AI functions have been proven to achieve better results than manual security is speed. NBC News writes, “Nearly instantaneously, the program gives a list of potential matches loaded with information that can help him confirm the identity of the people he’s stopped - and whether they have any outstanding warrants. Previously, he’d have to let the person go or bring them in to be fingerprinted”. Facial recognition can also be immensely beneficial in providing a safe and secure atmosphere for those in its presence With AI, instead of spending hours or days to sift through terabytes of video data, the security staff can locate a suspect within seconds. This time-saving benefit is essential to the overall security of any institution, for, in most security threat situations, time is of the utmost importance. Another way in which the technology saves time is its ability to enable employees (but not visitors) to open doors to their office in real-time with no badge, alleviating the bottleneck of forgotten badge, keycode or password. Saving money A truly high-performance AI software helps save money in many ways. First, if the face recognition software works with your pre-existing camera system, there is no need to replace cameras, hence saving cost on infrastructure. Second, AI alleviates much of the required manual security monitoring 24/7, as the technology will detect people of interest and automatically and timely alert the authorities. Third, by enhancing access authentication, employees save time and can maximize productivity in more important processes. The takeaway AI-enabled face recognition technology has a lot of benefits if used correctly. Can it be abused? Yes, like all tools that mankind has made from antiquity. Should it be deployed? The evidence indicates that the many benefits of this complex feature outweigh the small chance for abuse of power. It is not only a step in the right direction for the security industry but also for the overall impact on daily lives. It helps to make the world a safer place.
There’s growing noise around smart homes and smarter security. You’ve probably heard it. But there is a place where access control and more have been smart for decades: the workplace. Home automation and IoT are still playing catch-up with the commercial sector. A new insights report from ASSA ABLOY and IFSEC Global — “The Smart Door Locks Report 2018” — measures just how fast consumer smart technology is running. According to a survey conducted for the report, 61% of households now claim to own at least one smart home device or system. Energy monitors, home CCTV cameras, intruder alarms and smart door locks are the most popular, according to the report. All these functions, of course, have been available to businesses for years.61% of households now claim to own at least one smart home device or system Educating The Smart Home Consumer Paradoxically, report data also questions how much consumers really know about their smarter home. A surprising 42% of those surveyed, for example, were unaware they could control a smart door lock from their phone. In fact, many leading smart door lock models offer this feature, delivered by Wi-Fi or Bluetooth and an app. Despite a wealth of features offered by the latest smart door locks — remote and location-based locking/unlocking; voice activation; timed access; emailed entry alerts; and integration with smart camera and lighting systems — most people still have limited knowledge of their capabilities. Smart technology is increasingly becoming the new norm in terms of home security Only 14% of survey respondents described themselves as “very familiar” with what a smart lock can do. Even though most of them probably use smart access control solutions at their workplace. Secure Homes Through Smart Technology Monitoring and security are not the only drivers for smart home adoption. We humans also love convenience, and modern living presents us with problems that smart home technology can solve. Ironically, given the report’s findings, it takes a smartphone to really unlock the convenient possibilities of smarter living. The device that’s “always to hand” is central to the newest generation of smart door locks.A smart door lock is a convenient way for a landlord or agency to offer round-the-clock check-in and check-out If homeowners wish to remotely manage property access for friends and family, many smart door locks oblige. You let in guests remotely, send them a virtual digital key, or provide a temporary or single-use PIN to unlock the door. It is just as easy to revoke a digital key, if you don’t want its owner to come around anymore. This is a significant improvement over sharing physical keys — or hiding one under the doormat. We cannot be totally sure where a metal key ends up and have no way to track or cancel it once it’s “out in the wild”. Commercial access control offers such functionality as standard, of course. In addition, smart door locks offer more than just stand-alone operation and clever functions. In a domestic setting, magic happens when locks work in harmony with a home automation system, connected by protocols like Z-Wave, ZigBee or Wi-Fi. "Smart" Security On The Move The smartphone is becoming a remote control for managing a connected life beyond just home (and even workplace) security. According to Accenture, the parcel delivery services market will grow by $343 billion by 2020. Just like home security, convenience is a major driver of change. Homeowners can send guests a virtual digital key to their phones, or provide a temporary or single-use PIN to unlock the door A recent PostNord pilot in Sweden aimed to remove the inconvenience of waiting home for a postal delivery. Selected customers of some major Scandinavian e-retailers could choose to have parcels delivered inside their front door, if it was equipped with a Yale smart door lock. Home delivery is among potential smart services covered in “The Smart Door Locks Report 2018 ”. When asked whether the ability to receive parcels securely in a porch or lobby would make them more likely to invest in a smart door lock, 79% said it would.It is easy to revoke a digital key, if you don’t want its owner to come around anymore Vacation Rentals And Smart Home Tech ASSA ABLOY research published in 2017 forecasts continued growth in the European vacation rentals sector (at 5.8% CAGR). Smart door locks are also making an impact here, at both ends of the market: for service providers — agents and homeowners — and for travelers. A smart door lock is a convenient way for a landlord or agency to offer round-the-clock check-in and check-out, without creating extra work or staff costs. Both Intersoft, in Croatia, and Hoomvip in Spain have built vacation rentals management systems around an app and the ENTR® smart door lock. Agents issue, revoke, track and manage virtual keys for all their guests, saving everyone time and hassle. travelers use their phones and an app to unlock their apartment. For these visitors the smartphone is already an essential travel accessory. It is a boarding pass, a credit card, a travel guide, and a postcard home... why not a door key, too? And if this key is backed by a trusted home security brand — and a company with vast experience in the mature market for commercial “smart” security — better still.
Security beat
The mindset behind a new law to prohibit the use of facial recognition and other security-related technologies by San Francisco police and other city agencies is obvious in the name of the new ordinance: “Stop Secret Surveillance.” Ordinance To Stop Secret Surveillance The San Francisco Board of Supervisors passed the ordinance 8-1 with two abstentions on May 14, and there will be another vote next week before it becomes law. We have an outsize responsibility to regulate the excesses of technology precisely because they are headquartered here" The irony of such a law emanating from northern California, where tech giants promote the use of numerous technologies that arguably infringe on privacy, is not lost on Aaron Peskin, the city supervisor who sponsored the bill. “We have an outsize responsibility to regulate the excesses of technology precisely because they are headquartered here,” he told the New York Times. Regulating Facial Recognition Technology Although the facial recognition aspects of the ordinance have been the most publicized, it also targets a long list of other products and systems. According to the ordinance, "Surveillance Technology" means “any software, electronic device, system utilizing an electronic device, or similar device used, designed, or primarily intended to collect, retain, process, or share audio, electronic, visual, location, thermal, biometric, olfactory or similar information specifically associated with, or capable of being associated with, any individual or group.” Broadly interpreted, that’s a lot of devices. Includes Biometrics, RFID Scanners The ordinance lists some examples such as automatic license plate readers, gunshot detection hardware and services, video and audio monitoring and/or recording equipment, mobile DNA capture technology, radio-frequency ID (RFID) scanners, and biometric software or technology including facial, voice, iris, and gait-recognition software and databases. Among the exceptions listed in the ordinance are physical access control systems, employee identification management systems, and other physical control systems; and police interview rooms, holding cells, and internal security audio/video recording systems. The ordinance ban applies to city departments and agencies, not to the general public and exceptions include physical access control systems, employee identification management systems, and internal security audio/video recording systems Airport Security Not Part Of Ordinance The ban only applies to city departments and agencies, not to private businesses or the general public. Therefore, San Franciscans can continue to use facial recognition technology every day when they unlock their smart phones. And technologies such as facial recognition currently used at the San Francisco airport and ports are not impacted because they are under federal jurisdiction. Furthermore, the San Francisco police department does not currently use facial recognition anyway, although it has been deployed in places such as Las Vegas, Orlando, Boston and New York City. Safeguarding Privacy Of Citizens The ordinance appears to have a goal of avoiding government uses of technologies that can invade individual privacy, seeking to avoid worst-case scenarios such as an existing system in China that uses millions of surveillance cameras to keep close tabs on the Uyghurs, a Muslim minority population. Any new plans to use surveillance technology must be approved by the city government, and any existing uses must be reported and justified by submitting a Surveillance Technology Policy ordinance for approval by the Board of Supervisors within 180 days. Surveillance Technology Policy Banning use of facial recognition just when its capability is being realized is counterproductive But might such a ban on technology uses undermine their potential value as crime-fighting tools just when they are poised to become more valuable than ever? Ed Davis, a former Boston police commissioner, told the New York Times it is “premature to be banning things.” He notes: “This technology is still developing, and as it improves, this could be the answer to a lot of problems we have about securing our communities.” Technology development doesn’t happen in a vacuum and banning uses of facial recognition and other technologies just when their capabilities are being realized is counterproductive. We should be thoughtful, deliberate and transparent in how we embrace new technologies. However, discarding them out-of-hand using emotionally charged words such as “secret surveillance” does not promote the best use of technology to the benefit of everyone.
What happens to a company’s data in the case of a disaster such as 9/11 or Hurricane Sandy? How can a company recover from a disaster and continue their business uninterrupted? It’s a complicated challenge – and one many security professionals and risk management professionals must consider. Companies like Recovery Point provide resources to help a company survive a catastrophic event and keep its computer programs and business processes running. Their customers include large, well-known companies and the government. “When big disasters happen, people begin rethinking what they need to protect against,” says Dick Fordham, Director of Marketing and Strategy, Recovery Point. “We try to imagine the worst that can happen, and put in place adequate measures to provide the security in those areas.” Recovery Point is a national provider of integrated business continuity and disaster recovery systems. The company stores copies of its customers’ critical enterprise data on its servers in multiple locations. Recovery Point enables customers to bring their systems and networks back up and let employees continue working despite any damage from the disaster. “We’re not a big company – about 150 employees – but we can service the biggest clients because we provide a high degree of personalized service,” says Fordham. There is also a 45,000-square-foot facility in Gaithersburg, Maryland, where clients’ data can be stored up to 30 days on disk and up to seven years on tape Client Data Storage And Backup Recovery Point’s flagship facility is located on a 17-acre private campus in Germantown, Maryland; about 30 miles northwest of Washington, D.C. There is also a 45,000-square-foot facility in Gaithersburg, Maryland, where clients’ data can be stored up to 30 days on disk and up to seven years on tape in high-end, secure vaults. There are also two 100-seat work areas where displaced workers from customer companies can continue to perform their duties – one in Gaithersburg and another one in Kenosha, Wisconsin. Recovery Point is also a tenant in a data center in Mt. Prospect, Illinois, providing an additional, redundant location to store data in case of a disaster. Recovery Point offers cloud backup strategies to handle data from major computer systems used by large companies; whether it’s mainframe computers, AIX operating systems or iSeries. In addition to providing recovery services in case of a disaster, the company works with companies daily to test and maintain their systems and to provide proof-of-concept demonstrations. Concentric Circles Of Security Security is a large part of the services Recovery Point provides. The company leverages the most secure approaches and technologies to ensure that customers’ data is protected, including the familiar “concentric circles of security” approach familiar to most security practitioners. At the center of the circle is the data of customer companies, what Fordham calls ‘the crown jewels.’ Recovery Point uses a combination of cyber, network and physical security to protect a customer’s data assets. “If their data is gone or corrupted, their business is gone or corrupted,” says Fordham. Location of the data center(s) is the first stage of protecting the backup data. Recovery Point is located outside urban areas, away from likely terrorist threats, in an area that is not prone to hurricane or tornado activity. The ‘geographically stable’ area is above the 100-year floodplain. At the perimeter, there is no signage identifying the company or its mission. An anti-ram barrier topped with a 10-foot personnel security fence encircles the campus. At the gate, visitors must be validated remotely or by authorized badge and security code. Inside the perimeter, there are hydraulic anti-vehicle barriers that can resist a 30-ton truck going 50 miles per hour. Bollards at four-foot intervals keep vehicles away from the building. Visitors require access badges and receptionists at multiple sign-in desks are located behind ballistic-rated bullet-proof glass Inside, visitors require access badges and receptionists at multiple sign-in desks are located behind ballistic-rated bullet-proof glass. Badges allow access only to the specific areas a visitor needs, whether it is the location where their data is stored, temporary work areas, meeting rooms or overnight sleeping quarters. Two-factor authentication includes iris-scan, fingerprint and voice recognition biometrics. Data Security Process Independent certification, including auditing of processes and physical boundaries around the data, meets standards such as the Federal Information Security Management Act (FISMA) and the Federal Risk and Authorization Management Program (FedRAMP). The network and power must also be stable and Recovery Point has Uptime Institute Tier 3 certification, which includes redundant, switchable systems. There is an A side and B side to each system; if one side is ‘down’ for maintenance or a malfunction, the other side is fully functional to ensure uninterrupted service. “Customers have already had one disaster,” says Fordham. “We make it as painless as possible for them not to worry about their data, to make them feel secure. In a disaster there are other things to worry about, such as their home and families. We want security you can see and security you can feel.”
Security vigilance can be sporadic at many companies and institutions. Facilities tend to tighten security in the days after a scary event happens or makes headlines, and people are generally tolerant of the associated inconvenience – for a time. But as memory fades, so too does tolerance for being inconvenienced. We want to be safe, but we also don’t want to be bothered. We want a security system that both provides safety and is unobtrusive. Security doesn’t have to be inconvenient. That’s a core message of FST Biometrics, which leverages multiple technologies to identify people in motion, ensuring non-invasive, seamless security in a variety of environments. “In Motion Identification” FST Biometrics’ system analyses body size, gait, movement and direction as an individual approaches an entry point, and then uses facial recognition to confirm that person as someone authorized to enter a facility The approach, says FST Biometrics, is to combine facial recognition biometrics with analysis of body behavior and characteristics. Their system analyses body size, gait, movement and direction as an individual approaches an entry point, and then uses facial recognition to confirm that person as someone authorized to enter a facility. It all happens without the individual realising it or thinking about it – in effect, tightened security is invisible and non-intrusive to the environment being protected. FST Biometrics calls it “In Motion Identification” (IMID). The benefits are obvious in a global environment where security increasingly is needed everywhere. “It’s very accurate identification that translates into security without a high visibility of security,” says Arie Melamed, CMO of FST Biometrics. “If you have security that isn’t invasive, and without changing the status quo of life, people feel safer and they will be safer.” Accuracy With a false accept rate around 3 in 10,000, the system is sufficient for all but the most secure facilities, says Melamed. If additional security is needed, the system can also implement a voice recognition element, or other multi-factor identification such as cards or smart phone credentials can be added (with resulting false accept rates around 1 in 1 million). FST Biometrics’ software includes visitor management and access control suites, too. It can also be integrated with access control platforms such as Lenel, Tyco’s C-Cure, Honeywell and others. Analyzing Body Recognition Factors FST Biometrics analyses body recognition factors as an individual approaches an entry point to narrow the field of possible identities, from which a face is confirmed at the entry point. Narrowing the possible matches from 10,000 to 500 or fewer, the system both simplifies the task of recognizing the face and eliminates a majority of possible false accepts, thus improving the accuracy of the total system. Body characteristics are analyzed at distances ranging 12 to 18 feet from the entry point, and the final facial recognition takes place 2 or 3 feet from the entry. The system can be used with doors, speed gates or turnstiles, or even in an open environment where a security guard is notified if a person isn’t recognized. The company claims throughput at turnstiles of 30 people per minute. “It’s very accurate identification that translates into security without a high visibility of security. If you have security that isn’t invasive, and without changing the status quo of life, people feel safer and they will be safer”, says Arie Melamed, CMO of FST Biometrics The software system works with standard hardware, including a 5 megapixel IP camera installed at the entry point, and a server. Only the facial image is enrolled in the system. Over time, the system then “learns” information about body behavior and characteristics -- and applies the data to simplifying identification and increasing accuracy. About FST Biometrics FST Biometrics was founded in 2007 by the former head of Israel’s military intelligence. The company installed the first systems in customer facilities in 2012, and has been receiving feedback since then. In 2014, they began to focus on the enterprise market, including “open campuses” that want security but without the “feel” of security. Clients include corporate, retail, financial services, telecommunications, residential and governmental sectors. Melamed says a new $15 million investment in FST Biometrics by GMF Capital is an endorsement of the company’s approach and a statement of trust. “We know how hard they look for uniqueness [in companies they invest in],” he says. “They are looking for companies that are changing the world.” Former Israeli Prime Minister Ehud Barak will represent GMF Capital on the FST Biometrics Board of Directors. FST Biometrics has also introduced a system that uses an Android-based mobile device (such as a smart phone with a camera) to enable a security guard to recognize people without being tied to a specific location, even in an environment such as a parking garage. After the identity is confirmed, the mobile system advises whether the person can enter and may also list who is authorized to be a passenger in their car (to identify possible car-jacking scenarios).
Case studies
Oman Airports manages and operates all civil airports in the Sultanate of Oman. As a result of the growing aviation sector in the Middle East, Salalah, Duqm and Muscat International airports were all recently redeveloped with new state-of-the-art terminal facilities and technologies. Access control solution To protect Oman Airport’s growing number of passengers and new hi-tech terminal buildings, Oman Airports required an advanced access control solution that not only incorporated the latest advances in technology but also had proven resilience within the aviation industry. With 30 years’ experience of securing airports around the world, the CEM Systems’ AC2000 Airport security management system was the ideal match. As the largest airport in Oman, Muscat International’s upgrade was a landmark $1.8 billion expansion project. Phase one involved the construction of a new state-of-the-art 580,000 sqm Terminal 1 building, which was officially inaugurated for operations in March 2018. CEM intelligent card readers additionally feature a large internal database for offline card validation" Airport edition access control system “Oman Airports required a proven, fully integrated security solution to secure Muscat Airport’s new hi-tech Terminal 1 building, as well as a number of its external peripheral buildings. At the same time we were also awarded the contract to secure the new Salalah and Duqm Airports in Oman. “This allowed all three airports to use the CEM Systems’ AC2000 Airport Edition access control system and share a commonality of security infrastructure for operational excellence. We congratulate Oman Airports in their achievement and are delighted to be part of such an important leading infrastructure project for the development of Oman.” said Philip Verner Regional Sales Director, Security Products, Johnson Controls. Intelligent IP card readers CEM Systems’ range of intelligent IP card readers with integrated controllers (S610e, S700 readers) were installed throughout Oman Airports to provide the highest possible level of on-board smart card technology. CEM intelligent card readers additionally feature a large internal database for offline card validation and can store up to 200,000 cardholder records and 50,000 transactions offline. This ensures zero system downtime, prevents any loss of transaction data and delivers the highest possible level of system reliability within airports. Over 3,000 CEM IP card readers were installed throughout Muscat Airport’s new Terminal 1 to protect airside and landside locations, including 45 arrival and departure gates, 29 jet-bridges and 82 immigration counters. Emerald touchscreen terminals CEM Systems’ emerald touchscreen terminals have also recently been chosen by Duqm airport A large number of outlying annex buildings (spread out over 30,000 m2) were also secured with CEM intelligent card readers. These included a new 97m high Air Traffic Control (ATC) tower, aircraft hangars, cargo and crew facility buildings and the new pivotal headquarters building for the Public Authority for Civil Aviation (PACA). CEM Systems’ emerald touchscreen terminals have also recently been chosen by Duqm airport for heightened security. Emerald is a combined access control card reader and controller featuring fully integrated Voice over IP (VoIP) intercom, onboard Power over Ethernet technology and a range of smart airport applications and operational modes, all in one single, powerful terminal. Integrated biometric and access control solution For areas of heightened security, over 1,300 CEM fingerprint card readers (S610f & emerald fingerprint terminals) have also been installed throughout all three Oman airports. As an all-in-one advanced IP card reader, controller and integrated biometric solution combined, CEM fingerprint readers uniquely provides three layers of security (card, PIN and biometric verification) via one hardware device and one integrated software enrolment process. This eradicates the need for a separate biometric enrolment solution, provides a quick and accurate biometric read time and ultimately creates less biometric verification errors at the door/gate. Intelligent IP readers critically provide Oman Airports with aviation specific door modes Gate room management CEM Systems’ intelligent IP readers also go beyond security by helping airport operations. Intelligent readers are used to enable air-bridge monitoring, provide check-in-desk enabling, control baggage belts and assist with airport passenger flow and gate room management. Intelligent IP readers critically provide Oman Airports with aviation specific door modes such as ‘Passenger mode’ which enables the efficient management of gate rooms for departing and arriving passengers. Passenger mode controls the open times of single or interlocking doors, ensuring Gate Room doors are opened or closed depending on the configuration set for a specific flight. The user-friendly LCD screen on CEM card readers effectively acts as a smart information point for ID staff and flight agents and allows staff to easily manage the Gate Arrivals process on the ground. S3040 portable hand-held readers Oman Airports now utilise portable card readers to enable random ID checks on personnelCEM Systems’ S3040 portable hand-held readers uniquely protected Muscat International Airport during its initial construction phase in December 2014. Portable readers enabled ID card validation at temporary airport site entrances and gates, which at the time of construction had no power or comms. Oman Airports now utilise portable card readers to enable random ID checks on personnel throughout all three airports. Designed specifically for airports, CEM Systems’ AC2000 Airport security management system provides powerful aviation-specific access control throughout airside and landside areas. Using a range of powerful AC2000 Airport software applications, Oman Airports benefit from sophisticated ID badging, airport visitor management and high levels of airport systems integration. Open architecture integration tools CEM Systems’ open architecture integration tools successfully enabled the AC2000 access control system to be seamlessly linked with other airport security systems including video, perimeter detection and Oman Airport’s central ‘Airport Operating System’ for the resolution of maintenance faults. This ensures that system maintenance faults and alarms are dealt with promptly, efficiently and with full accountability. Oman Airports use the CEM Systems’ AC2000 VIPPS application to manage airport pass applications and biometrics To provide the highest possible level of smart card security to over 30,000 authorised card holders, all three Oman Airports utilise highly secure CEM DESFire smart card technology with multiple layers of encryption. Oman Airports use the CEM Systems’ AC2000 VIPPS (Visual Imaging Pass Production) application to successfully manage airport pass applications and biometrics. AC2000 Visitors application The AC2000 Visitors application also provides a powerful tool for Oman Airports to monitor and control ID card access for visitors and temporary airport staff. Information such as ‘name of airport sponsor’ can be recorded and once visits have been completed, cards can then be recycled, creating efficiency savings within the airport ID centre. Moving forward, CEM Systems will continue to work together in partnership with Oman Airports and their chosen system integrators as all three airports move into their next development phases. It is understood that airport security needs and legislation requirements change over time and thus CEM Systems will remain flexible to help meet their evolving project needs.
Founded in 1927, the University of Houston (UH) is the renowned public research university in Houston and the third largest university in Texas. In 2018, UH enrolled 46,324 students per semester in 261 undergraduate and graduate academic programs — both on campus and online. The UH System comprises four universities and six multi-institution regional campuses that offer degrees in partnership with the universities. The University of Houston is the largest and most comprehensive institution of the UH System. UH System UH has grown to service the city of Houston and beyond through their extensive educational offerings, partnerships UH has grown to service the city of Houston and beyond through their extensive educational offerings, partnerships, and contributions to the community. A recent market analysis supported a demand for UH programs in the Sugar Land and Katy communities, and the UH System responded with constructing one new building on each campus. The University’s Sugar Land location serves about 2,200 students and offers a variety of classes that lead to undergraduate and graduate degrees from UH, including a Second Degree BSN program. The new College of Technology building at Sugar Land is a 100,000 sq. ft. facility with state-of-the art features. The three floors include classroom space and research labs, auditoriums, student lounge areas, faculty and staff offices, and a greenhouse area. University campus security The expansion of UH at Sugar Land will offer greater opportunities to prepare career-ready students poised for leadership in technology. The new instructional building at UH at Katy is an 80,000 sq. ft. facility and houses programs from the UH College of Nursing and the UH Cullen College of Engineering. Class enrollment at the University of Houston (UH) at Katy is more than 600 students. American Direct was chosen to provide its advanced access control solution, AccessNsite for the Sugar Land campus and American Direct’s partner, Skyhawk, was chosen for the Katy UH campus. According to American Direct Vice President of Sales, Todd Neely, ”American Direct was able to provide significant savings to University of Houston because, instead of considering product mix for two different buildings individually, they were able to use similar product mix on both buildings and reduce the amount of coordination time to manage both projects”. AIPHONE IXSeries VoIP intercom The mix included hard wired, card-based, Mercury panels and IN-120 and IN-220 battery-powered WiFi locks. Sugar Land also uses AIPHONE IXSeries (VoIP, Voice over Internet Protocol intercoms) at the entrances to the building and on each floor near the elevators. Integrating with existing systems, like AIPHONE, is possible because of AccessNsite’s multi-layer security integration. This flexibility component is a significant contribution to the complete access control solution. Proximity card readers The card readers are proximity readers where the user just taps their card on the reader American Direct and AccessNsite staff consulted with the general contractor, Tellepsen Builders Construction, to discuss if all doors should have card readers and who should be granted access. The card readers are proximity readers where the user just taps their card on the reader or gets close enough to the door so that the lock picks up the credentials. A card swipe is no longer needed with proximity readers. Providing Division 8 and 28 products and services for the same client on one job is extremely efficient according to Todd Neely. He adds, “It eliminates the scope gap and the possibility of trying to identify the area of responsibility, should an issue occur. For example, if there is an issue with a door opening, then we take care of that issue as the total openings solution provider.” Secure door access control solution Neely further stated, “Providing doors and access control together for one client involves massive internal coordination with the entire team from the onset of the project. “We have meetings very early on to talk about what we need to do to meet all of the requirements of the project. This makes it easier to coordinate shop drawings and submittals and determine what needs to be included.” Tellepsen Project Manager, Cameron Carter recalls a great working relationship with American Direct Procurement (AccessNsite access control solution provider). Cameron said, “The University of Houston (UH) changed a few things near the end of the construction process and American Direct and AccessNsite were in direct contact with them about the changes. On a project like this, you can easily run into issues late in the game, either with the security or door people, and find out that an installation needs adjusting. We were able to minimize those kinds of issues by using American Direct and AccessNsite for all of the access control. It was a smooth, fluid process.” AccessNsite access control technology Finding a balance between securing buildings and keeping a friendly campus feel is not easy, but the right openings solutions can help. Advanced access control technology, like AccessNsite, can give campus security teams more control over their environment. AccessNsite is a total access control software solution with powerful systems interoperability and automation configurable to a building’s distinct and specific needs. This ultimately goes a long way in ensuring that students and staff feel safe as they move in and out of classrooms throughout the day. The University of Houston (UH) is full steam ahead in student growth. It is likely that the growth of UH campus buildings will follow. American Direct and AccessNsite will be ready to provide the total openings solutions.
IP video intercom systems are becoming more popular not only in industrial environments but also in residential projects. Security business has moved towards IP technology. Video intercom, on the other hand, is a key system that should be considered as a link between the user and the security systems due to its integration capabilities. With MEET, it’s easy to integrate video surveillance systems and receive alarms at home. It can be integrated with third-party home automation systems and access control solutions. Face recognition, CCTV visualiszation MEET system is a 100% IP technology based on a Point-to-Point infrastructure MEET, the most advanced IP system from FERMAX, was specially designed for residential communication. Secure, reliable and with cutting-edge functionalities, it ensures an outstanding high-quality audio & video, featuring call divert. Moreover, it is easy to install and maintain, with almost unlimited capacity. The system is a 100% IP technology based on a Point-to-Point infrastructure, highly efficient, flexible and powerful. As pointed out by Juan Madrid, Business Development Director and IP Product Manager at FERMAX, “MEET second-generation technology allows our customers to benefit from a top-notch 100% full IP system, even compatible with GPON infrastructure, and a broad range of built in security functions as proximity reader, lift control, face recognition, CCTV visualization and alarm detection”. Monitoring CCTV cameras The devices communicate directly, so MEET does not require central units or servers which could compromise the availability of the system in the event of an unforeseen error. MEET allows the installer to freely assign the range of IP addresses according to the needs of each project, and thus facilitate the control of the networks in every building. MEET system, has already been successfully adopted by FERMAX integrators worldwide MEET system, launched in January 2018, has already been successfully adopted by FERMAX integrators worldwide. “The market feedback has been very positive, especially due to the flexibility of the system, its capability to integrate with Wiegand controllers or readers and to monitor CCTV cameras through RTSP protocol. All these features allow the system to fulfill project requirements from different markets around the world” assures Francisco Alapont, Solutions Department Director and Digital Business at FERMAX. Home automation integration MEET is the system that brings to life the state-of-the-art digital panels which include a triple access control system: face recognition, keypad and proximity. The system’s range is made up of digital panels, one-button panels, touch screen monitors, concierge stations and various accessories. KIN panel, for instance, is an interactive approach featuring touch screen. While being elegant and customizable, it allows the visitor to interact in a simple way with its user interface. MILO panel and MEET Guard Unit are outstanding due to their design and intuitive interaction features. When it comes to the apartments, MEET offers indoor monitors with a simple and compact design. WIT PoE monitor, with its technology and exclusivity, is specially designed for home automation integration and suitable to fit in the most sophisticated environments; MIO monitor, is a symbol of urban and modern residences, represented by its compact and simple design. Single internet connection Our customers will benefit from a wide variety of intercom and security functions in all MEET products" Call Divert function to smartphone has been one of the key goals achieved thanks to MEET ME App, which features a high-resolution image even in portrait mode. It is not only an additional gadget; it is a part of the core features of MEET, which implements by default this function at zero cost. “Connectivity is the cornerstone of FERMAX´s strategy. With MEET system we can offer a seamless and enhanced experience to our installer, connecting our MEET monitors by default without any additional costs related to servers, gateways or licenses. Only one single Internet connection for the building is required.” adds Francisco Alapont. Competitiveness is key for FERMAX and MEET IP technology allows to offer a complete bundle of features already built in the product without increasing its price. “Our customers will benefit from a wide variety of intercom and security functions in all MEET products. This adds value to the MEET system and revert back to the installer as a turnkey solution in terms of easiness of installation and cost reduction” says Juan Madrid.
In the aging trend of 21th century with rapid aging population and high healthcare costs are creating a growing demand for care at home, especially for seniors with long-term health conditions. Home care is moving towards tele-health monitoring and telemedicine, including video conferencing and remote monitoring technology to help increase caregiver efficiency while still providing constant convenience to the patients. Living independently and aging gracefully are the ideals that every individual seeks to pursue, and the challenge is to ensure that all people can age with dignity and security. Climax’s GX Cubic Smart Care Medical Alarm is an all-in-one wellness, and personal safety medical alarm solution, designed to help the elderly to manage their long-term health conditions, bridging medical health monitoring information to care providers/hospitals and create points of care to keep them safe in their own homes. GX Cubic medical alarm GX Cubic can be flexibly connected with third-party Bluetooth (BLE) healthcare sensors GX Cubic can be flexibly connected with third-party Bluetooth (BLE) healthcare sensors, like blood glucose monitor, pulse oximeter, blood pressure monitor, or weight for tracking health data and providing customized alerts to meet individual needs. The measurements can be automatically sent to a health professional who can review the results and continuously keep an eye on the patient’s health needs and provide early treatment as necessary. In addition to medical health monitoring, GX Cubic is also compatible with Pivotell Advance Automatic Pill Dispenser to keep secure of all pills, and remind the user to take the correct medicine at the pre-set time. The solution allows health professionals to monitor pill taking timely results and keep an eye on the patients’ treatment as needed. For situation when remote monitoring care given is insufficient and the user requires onsite assistance, GX Cubic can raise an emergency alarm to inform the caregiver or medical personnel for immediate action. Seniors can be assured that they are always being taken care of, and provide their family members with a peace of mind. Voice recognition solution Voice recognition has innovated over time and continues to advance, allowing products to become even more intuitive and easier to use. GX Cubic has built-in voice recognition and can activate an emergency call to care provider or central monitoring center by preset vocal commands or keywords. This allows seniors to receive emergency attention even in situations where they are immobilized or cannot manually reach the panic button. Working with the leading voice ecosystems Amazon Alexa and Google Home via cloud, GX Cubic also features voice control to activate home electronic devices, complete daily tasks, and seek help during emergencies. Voice over Internet Protocol With the VoIP (Voice over Internet Protocol) feature, GX Cubic users can also initiate two-way voice callsWith the VoIP (Voice over Internet Protocol) feature, GX Cubic users can also initiate two-way voice calls to contact their caregivers or family members at any time. With the additional add-on of DECT, GX Cubic can pair with voice extenders, talking pendants, call points, and voice extenders placed strategically around the home to create a safety net. Smart Home Automation Comprehensive elderly-friendly health care should also have a focus on preventive action to maintain a healthy ageing process. To realize independent living in a smart way, GX Cubic pairs with Zigbee or Z-Wave sensors to enable the whole-home control with various protocol-of-choice. GX Cubic can be programmed to turn on the hallway lights automatically when a sensor reports a senior’s movement in the middle of the night, to reduce a chance of falling; or automatically adjusting air conditioning when there is a sudden temperature-drop. The scenarios are unlimited to fit individual requirements, ensuring a safest living experience for the senior users. GX Cubic can also integrate IP security cameras and camera PIR motion sensors to deliver real-time visual monitoring and verification. When an emergency occurs, alerts are immediately sent to family members, and Monitoring Center to verify the event and sending immediate assistance as needed. Lastly, GX Cubic can support wireless sensor devices, allowing users to add in smoke detectors, water leakage sensors, and gas sensors to monitor environmental emergencies; and motion sensors, door contacts, sensor pad transmitters for inactivity monitoring, to build a healthier, safer independent living.
One of the world’s most famous hotel-chains, DoubleTree by Hilton, part of Hilton Worldwide, has selected a high-performance fire system from Advanced Fire Systems Inc. at their eight-story, 366 room hotel in Boston, Massachusetts. The challenge was to replace an existing system, integrate speakers to all guest rooms and ensure that all audio messages and strobes were fully synchronized across the hotel, in the event of a fire situation, without the need for costly re-wiring. Advanced Audio System The Axis AX system was the preferred choice of the client too thanks to its voice communication system, coupled with PerfectSync" An Advanced audio system was specified by the stylish, four-star, DoubleTree by Hilton Boston North Shore as it met regulatory requirements for the low frequency 520 Hz warning tones necessary for the sleeping areas of the hotel and its award-winning emergency communications system, PerfectSync, synchronized tones and digital messages to ensure compliance with local codes. Christopher Whitmarsh, President at Hayden Systems, Inc., commented: “I was confident that the Advanced equipment could meet the application requirements based on my knowledge and experience with the equipment. In this case, the Axis AX system was the preferred choice of the client too thanks to its voice communication system, coupled with PerfectSync, ensuring the hotel adhered to strict guidelines. The system integrated seamlessly into the fabric of the building and provided the client with a solution that met their needs as well as satisfying the rigorous demands of the local fire authority.” PerfectSync Emergency Communications System PerfectSync automatically synchronises audio, voice and strobe signals across Advanced’s Axis AX fire alarm networks dynamically, as conditions change. Synchronization of audio and visual signals across multiple notification zones, floors & areas, prevents confusion in an emergency situation and aids in meeting intelligibility standards. Using high performance, distributed, digital amplifiers that come standard with an integral backup amplifier and power source, should a fire spread to an adjacent floor or area, audio and visual indicators come on immediately, and the audio messages will quickly synchronize with any identical audio message on the system. Advanced’s Axis AX Fire Alarm System Advanced’s Axis AX system has been designed to offer enhanced power and performance in a user-friendly format Advanced’s Axis AX system has been designed to offer enhanced power and performance in a user-friendly format, offering a vast range of configurations, control and interface options all with simple set-up and operation. The Axis AX systems includes easily networked panels, audio panels and command centers, DynamixSmoke smoke control and a huge range of peripherals, devices and interfaces that make it ideal to suit almost any fire and life safety application. Advanced Fire Systems Mike Troiano, President and CEO of Advanced in the USA, said: “Advanced fire systems are specified in some of the most famous and prestigious hotels across the world and it was a pleasure to work with our customer Hayden Systems, Inc. to provide a system that will meet the rigorous standards required and ensure that the DoubleTree by Hilton’s staff and guests alike are safeguarded.” “PerfectSync insures synchronization of audio, paging and strobe signals without the need for special wiring or programming, it’s all done automatically by the Axis AX system. Since its introduction in 2014, Award Winning PerfectSync has built a solid reputation with engineering firms and fire authorities alike for its ability to deliver superior performance. The end result is a technologically advanced, easy to use audio and visual communications system that improves life safety for all of the occupants of a building in an emergency situation.”
Brazilian infrastructure company Companhia Energética de Pernambuco (CELPE) is the main supplier of electricity in the country’s Northeastern state of Pernambuco. Headquartered in the state capital Recife, one of the most important economic and urban hubs in the country, CELPE serves a population of more than 8.8 million inhabitants in the 184 municipalities of Pernambuco. As part of the Brazilian government’s commitment to clean energy, the CELPE grid also contains several hydropower plants at rivers across the state. Providing electricity to private customers and industrial clients in the expansive region requires a 136,762 kilometres distribution network and 4,386 kilometres of transmission lines. As critical parts of the power infrastructure, CELPE operates 240 substations across Pernambuco. But as most of these stations are located in remote areas, the last few years saw an alarming increase of vandalism and theft of expensive power cables. For video security, Bosch installed its AUTODOME IP starlight 7000 HD cameras, integrated via the Bosch Video Management SystemBosch’s Building Integration System Looking to safeguard its vital infrastructure, CELPE needed an integrated security solution that achieved three goals: firstly, keep out criminals and alert police upon security breaches. Secondly, provide seamless access control for the 300 maintenance teams in the field. And thirdly, connect fire alarm, communications, and voice evacuation on an integrated system that allows for remote management from CELPE headquarters. As a one-stop solutions provider, Bosch won the contract for equipping sixteen substations with video security systems, access control, communications, fire alarm and voice evacuation as well as intrusion alarm connected on the Building Integration System (BIS). For video security, Bosch installed its AUTODOME IP starlight 7000 HD cameras, integrated via the Bosch Video Management System (BVMS). The fire alarm revolves around smoke and heat detectors, while for voice alarm and evacuation, Plena Mixer Amplifiers are connected to driver loudspeakers. Cameras With Built-In Video Analytics For added security, selected cameras feature built-in video analytics to automatically set off intruder alarms and alert authorities All systems and cameras are monitored by security personnel at the company’s control center in Recife. For added security, selected cameras feature built-in video analytics to automatically set off intruder alarms and alert authorities. The system also fulfills the key customer requirement for remote management via the management system BIS (Building Integration System), including administration of user credentials and access rights for the 300 maintenance teams serving various substation sites. Successfully installed at sixteen stations in Pernambuco, the Bosch solution has proven to be an asset for CELPE and its personnel. Aside from safeguarding valuable infrastructure against criminals, the system has also streamlined communications among the service teams in the region by including elements such as conferencing and automatic alerts for fires and intrusions through a messenger system. The remote management of user access rights at the substations has enhanced the overall service level and prevented security breaches. Satisfied with the end-to-end solution, CELPE has now commissioned Bosch to equip approximately 240 electrical substations over the next years.


Round table discussion
A shift toward touchless devices during the coronavirus pandemic has been a boon to the biometrics sector. Another factor in the recent increase in use of biometrics is lower prices, which are a symptom of a maturing market and of new technology capabilities. Increasingly, integration of biometrics with access control and other security systems is expanding use cases and sales numbers. For additional insights, we asked this week’s Expert Panel Roundtable: What are the new trends and opportunities with biometrics (facial, fingerprint, iris and/or voice)?
Driven by technology developments such as voice recognition, smart devices and the Internet of Things, our homes are getting “smarter” all the time. Increasingly, we expect our residential environments to be responsive to our voice commands, whether we are adjusting a thermostat, turning on a light, or lowering the window shade. Smarter home integration yields new opportunities and challenges for home security, too, which contributes an element of safety and protection to the convenience aspects of smart homes. We asked this week’s Expert Panel Roundtable: How are new smart home systems impacting security?

How To Ramp Up Perimeter Security With License Plate Reader Technology
Download
Solve Access Control Challenges in the Healthcare Sector
Download
Getting the Most Value From Software Subscription Agreements
Download
Shifting Trends in Operation Centers and Control Rooms for 2021
Download