Luxul, globally renowned innovator of IP networking solutions for security integrators, has announced its technology lineup for ISC West 2019, taking place April 10-12 at the Sands Expo in Las Vegas. In Legrand | AV's booth 29098, Luxul will exhibit PoE Self-Healing, managed Gigabit switches; award-winning routers with integrated Domotz remote management technology; the company's next-generation wireless controller; "Good, Better, Best" dual-band wireless access points (APs); and the new Easy Se...
Paxton, the global brand of electronic IP access control and video intercom systems, invites dealers to discover new opportunities to grow their business at their booth at ISC West. This year, they are introducing more products than ever before with exciting demonstrations from their team of industry experts. Demand for dealer training in 2018 exceeded all expectations, so this year, Paxton are launching a new training program across the United States. Attendees can visit Paxton at booth 22043...
Cobalt Robotics, a manufacturer of intelligent security robots used to autonomously patrol indoor facilities, will introduce a new door integration that enables its security robots to open and then pass through a secured door without human intervention, a first for the industry. Cobalt Robotics’ new door integration feature enables its robots to seamlessly pass through areas closed off by a door. Using a secured, wireless credential, the robot transmits a signal using either Bluetooth or...
Antaira Technologies, globally renowned developer and manufacturer of industrial networking devices and communication solutions for harsh environment applications, is proud to announce the expansion of its industrial networking infrastructure family with the introduction of the AMS-2111 Series. Wireless Access Applications Antaira Technologies’ AMS-2111 Series is designed for industrial and enterprise wireless access applications. Embedded with the Qualcomm/Atheros AR9331 chipset, it boa...
A basic tenet of sales is ABC – always be closing. But it's a principle that most professional salespeople would say oversimplifies the process. Especially in a sophisticated, high-tech market such as physical security, the required sales skills are much more involved and nuanced. We asked this week's Expert Panel Roundtable: What unique characteristics are required of salespeople in the arena of physical security systems?
Luxul, global innovator of IP networking solutions for AV integrators, has announced its technology line-up for the NAHB International Builders' Show (IBS), taking place February 19-21, 2019 in Las Vegas. In the Legrand booth SU614, the company will exhibit a wide range of solutions for home builders that deliver reliable, high-performance networks in smart homes, including Gigabit switches; the next generation of wireless controller technology; indoor and outdoor wireless access points (APs); w...
Camden Door Controls, a provider of door activation and locking devices, is pleased to introduce its new CM-CPC1 Clear Protective Cover. Vandal and weather resistant, these low profile, clear lift covers are designed to protect any Camden flush mount, single gang, door activation device, including push/exit switches, keypads and key switches – without limiting the operation of the device. The CM-CPC1 is supplied with a gasket and is suited for both indoor and outdoor use. Protection From Rain And Dust CM-CPC1 heavy-duty polycarbonate covers protect single gang door activation devices from rain and snow outdoors and, in harsh indoor environments, protect devices from water, dust and chemicals. They’re also an ideal solution in vandal-prone applications, where false activation of a device or damage is anticipated. Camden offers the industry's most extensive range of ABS plastic and metal boxes, enclosures and trim rings for flush, semi-flush and surface mounting. ABS plastic models are flame and vandal resistant and ideal for use with wireless door control transmitters.
HID Global, a provider of trusted identity solutions, and Mist Systems, a pioneer in self-learning wireless networks powered by artificial intelligence (AI), announces that the two companies are working together to converge Bluetooth Low Energy (BLE)-based location services with Wireless LAN (WLAN) infrastructure for better deployment, management, and operations of IoT devices. With HID Location Services that is enabled by Bluvision, HID Global is an innovation in the IoT space as market pioneer in sensor beacons for workflow and event management. IoT Asset Tracking The Mist Learning WLAN is a single, converged cloud-based microservices platform for Wi-Fi and BLE indoor location services, eliminating the need for expensive overlay platforms and battery powered gateways for asset location and user engagement. The typical hospital today has over 20 different use cases for IoT tracking and management that can increase profitability" The combined solution provides a simple architecture for scalable IoT asset tracking and management that reduces costs, eliminates complexity, and fosters rapid adoption across organizational functions and use cases. “The typical hospital today has over 20 different use cases for IoT tracking and management that can increase profitability, patient care and overall patient experiences,” said Rom Eizenberg, Vice President of Sales at Bluvision, part of HID Global. Create Seamless Solutions “The introduction of AI-driven indoor location capabilities using standards-based BLE makes the deployment of these services scalable and cost effective, and reduces barriers to entry for many clinical scenarios previously locked out of benefiting from these state-of-the-art capabilities.” “By deploying Mist and HID Location Services together, enterprises have a proven solution to electronically touch and validate anything that moves, playing a strategic role in IoT environments,” said Bob Friday, Founder & CTO at Mist. “As we enter a new era of ubiquitous indoor location services, it is imperative that leading vendors come together to create seamless solutions for seamless and reliable BLE deployments.”
ADT Inc., a provider of monitored security and interactive home and business automation solutions in the United States and Canada, announces that it has acquired LifeShield, LLC, a pioneer in advanced wireless home security systems, in a transaction valued at approximately $25 million. John Owens will continue in his current capacity leading the LifeShield team. Founded in 2004, LifeShield was the first to bring a wireless DIY home security offering to the residential market. Over the past 15 years, LifeShield has further redefined residential home security, improving interactivity, advancing video capabilities and enhancing the overall user experience. Monitored Home Security The addition of LifeShield’s innovative technology to ADT’s security and automation solutions and expertise increases ADT’s ability to address the approximately 80% of U.S. households who do not have professionally installed and monitored home security. We are confident that LifeShield’s capabilities and approach, combined with the brand and scale of ADT" “As more consumers look for real protection solutions that only ADT can provide, we look for companies that share our passion for security, customer service, and innovation,” said ADT President and CEO Jim DeVries. “We are confident that LifeShield’s capabilities and approach, combined with the brand and scale of ADT, will create an opportunity for us to offer our services to a broader cross-section of U.S. households.” Best Security Solutions “Together with LifeShield we will be positioned to offer more solutions to a broader base of customers and create increased value for our shareholders as we seek to grow profitability through expanded, yet focused offerings.” “This combination unites the passion and commitment of two organizations that are focused on security,” said Mike Hagan, LifeShield Chairman, who will continue as an advisor. “Leveraging ADT’s significant experience integrating products, we look forward to working together to ensure a seamless transition and capitalize on the attractive market opportunities in the DIY segment. Together we will continue to advance our strategy to deliver the best security solutions to our customers at every stage of their lives.”
ComNet, Communication Networks of Danbury, Connecticut, a USA-based manufacturer of fiber optic transmission and networking equipment, announces the introduction of its Generation 3 line of NetWave wireless products that offer greater performance and increased stability in applications where interference is a challenge. The NW1 Gen 3 increases throughput up to 240 Mbps, adds a 10/100/1000Mbps port and pass-through PoE and is designed for applications of up to 2 miles. The wide range of channel spectrum widths available on the NW1 series of radios gives the user the option of narrowing channel bandwidths as the network grows increasing the number of non-overlapping channels while improving stability. The all-new NW1 throughput is far greater than the original 95Mbps the original NW1 offered. Unique Connection Procedure The NW1 is available in kit form, the NWK1 and consists of two MAC Address-locked radios and mounting hardware. Each NW1 unit is enclosed in a new more durable enclosure and is designed for extreme conditions and has an extended operating temperature range as well as being IP67 rated for resistance to water and dust intrusion. As with other ComNet NetWave products, the NWK1 is easy to set up and operate. It features a unique connection procedure using LEDs to assist in aiming the units for optimal performance. Our engineering team was challenged to increase performance in our next generation of NetWave products" According to Andrew Acquarulo Jr., ComNet CEO and President, “Our engineering team was challenged to increase performance in our next generation of NetWave products. We wanted to increase performance without increasing the cost to our customers.” “This new NW1 accomplished all our goals for this product line.” Acquarulo concluded. Increased Performance “The increased performance of the NW1 allowed us to reduce our NetWave model offering and ultimately make selecting the right NetWave product very easy for our customers,” said Skip Haight, ComNet VP of Marketing. “We believe everybody is looking for that something extra and, in this case, we are giving ComNet customers increased performance at no additional cost,” Haight added. ComNet offers an extensive line of fiber optic, copper and wireless video and data transmission equipment that is uniquely designed to meet the needs of the Security, Intelligent Transportation System, Utility and Industrial markets.
Camden Door Controls, a provider of door activation and locking devices, is pleased to announce the expansion of its Lazerpoint RF product line. New introductions are the CM-TXLF-1LP Lazerpoint RF recessed one-button key fob and the CM-TXLF-2LP Lazerpoint RF recessed two-button key fob. While Lazerpoint RF fobs have always been designed for ADA applications, these new fobs are now also ideally suited for security/access applications. In addition, they cannot be accidentally activated while in pocket. When used in conjunction with Camden’s CM-TXLFB key fob base, they can be mounted on a wall or desk or on a belt or car visor. Just some of the benefits of the Lazerpoint RF family of wireless products are transmission ‘hops’ over multiple bands to overcome interference; shorter wave length able to penetrate smaller gaps in building materials; up to 10 times the range of typical narrow band wireless products; and longer battery life than any other system.
Matrix Comsec, global manufacturer and provider of Security and Telecom solutions, is participating in IT EXPO 2019 at Fort Lauderdale, Florida to be held from 30th Jan to 1st Feb 2019. Matrix will be showcasing its comprehensive range of people mobility management, IP video surveillance and unified communication solutions at the event. Matrix is known for its customer centric, innovative range of solutions for unified communications, IP video surveillance, access control and time-attendance applications catering to diverse and complex deployments especially for the SMB, SME and large enterprises. SPARSH VP710 Video And COSEC ARGO Door Controller Enterprise video collaboration solution, SPARSH VP710 that sets a new benchmark by offering enhanced video and voice capabilities. SMB IP-PBX, SPARK100, an all-in-one communication solution with enterprise-grade unified communication and collaboration. Next generation door controller, COSEC ARGO for the access control market. The new door controller is equipped with features like 3.5” IPS touchscreen LCD with Gorilla Glass, powerful processor for ultra-fast user identification, intuitive user experience, vandal resistant (IK08). Matrix IP Video - Access Control Integration Matrix will also be demonstrating seamless integration between Matrix IP video surveillance, access control and unified communications solutions, along with Matrix video management and device management software suite. Additionally, at this event, Matrix will exhibit its range of Gateways. These gateways allow easy integration with most of IP-PBX, TDM PBX, Softswitch and hosted solutions. Award-winning series of Matrix Gateways are perfect for enterprise and carrier-class solutions for multi-site connectivity and remote survivability while offering superior voice quality and state of the art routing features.
There’s almost no installation that goes 100-percent smoothly in the field of video surveillance. Unexpected issues routinely arise that can increase time on the job, cost of the project and frustration. Manufacturers work on the product side to help ensure their products are easy to install and – when troublesome situations do arise – are flexible enough for installers to quickly find a remedy. Importance Of Ease Of InstallationEase of installation is a very important part of the project to the system integrator because the cost of labor is variable Ease of installation is a very important part of the project to the system integrator because the cost of labor is variable and can be very expensive. In some cases, the cost of labor to install a camera can be more than the cost of the camera! If labor costs are high – or are more expensive than a system integrator planned – they can lose a great deal of money on a project. If a cautious system integrator includes too high of an estimate for labor in a project bid, his overall bid will to high and it could cost him the project. The easier the camera is to install, the lower the labor cost, subsequently achieving higher savings for end-users. Hence it is essential that camera manufacturers develop products that are easy to install or are flexible in the field for system integrators and installers who know that time is money. Enterprise projects can involve thousands of cameras installed Simplifying Installation Of Cameras Camera installation typically involves an electrician, the camera installer and the person who configures the VMS (Video Management Software). Of course, one person can play all three roles, and in many cases, does, but enterprise projects can involve dozens, hundreds or even thousands of cameras with teams of individuals involved in an installation. The electrician runs conduit with an electrical or PoE (Power over Ethernet) connection to the housing or the backplate of the camera; the installer then installs the camera at that location, hooking it up to power; and then a configurator adds cameras to the network and makes adjustments – renaming the camera, setting the frame rate, enabling WDR (Wide Dynamic Range), and the like. When it’s a project that involves different players for any of these functions, there is the potential for a bottleneck and delay in project completion. And if a system integrator is paying an electrician, installer and software configurator – and they are all three on site waiting for each other to finish – that’s a system integrator’s worst-case scenario. Enhancement Through Modular Cameras Video surveillance camera manufacturers like Hanwha Techwin are producing products that take different roles Video surveillance camera manufacturers like Hanwha Techwin are producing products that take the different roles of electrician, installer and configurator into consideration, allowing them to complete their tasks independently. With a focus on modular design which includes a USB Dongle, a device manager, magnetic module and included accessories, the Wisenet X series Plus is one of the fastest cameras to install, service and upgrade – saving installers time and money. Wisenet X series Plus cameras have a detachable camera module that utilize magnets to lock into the housing for instant configuration. Electricians can run conduit with a single PoE connection to the back plate/housing while the configurator is working on configuring the camera module, allowing security professionals to later snap the camera into place in just minutes. The VMS configurator can then come and add the cameras to the network and program their functionality. Modular Cameras Offer Flexibility In the past, an end user might determine after the camera is installed that there aren’t enough pixels on target, or they need certain different functions like video analytics for example, resulting in the time-consuming replacement of the entire camera. With modular-designed cameras, the camera module can be swapped with a new one without having to focus or replace the camera – even to change the resolution or field of view, also Wisenet X series Plus has optional PTRZ modules that can be remotely adjusted to the field of view and the position of the camera lens. Making camera adjustments in the field is also now easier and perhaps even safer. Installers have been known to climb a ladder and juggle a bulky laptop to access the network to be able to see video of how the camera is positioned. Or they’ve had to use analog video output to view the video feed on a separate monitor which provides the field of view, but not megapixel quality. Using a smartphone, the installer can wirelessly see full and not cropped quality video directly from the camera Wisenet X series Plus cameras have a USB port that allows installers to connect it to a small dongle that converts the camera to a Wi-Fi device. Using a smartphone, the installer can wirelessly see full and not cropped quality video directly from the camera. It’s a much easier way to evaluate video while at the camera. Eliminating the second person looking at live view on a computer guiding through a cellphone to the installer to accurately point the camera to the proper position. If system integrators can do some of the legwork prior to even getting on site, it can reduce cost and improve efficiency. Imagine having 300 cameras ready to send to a project site. To configure those cameras, a system integrator has to take each camera out of the box, plug each into a switch, configure it, take it off of the switch and put it back in the box. To improve this process, camera manufacturers have now developed packaging that provides access to the camera port without even having to remove it from the box. It’s an innovative solution that saves time. Modular cameras have optional PTRZ modules that can be remotely adjusted to the field of view Software Programs Help In Enhancing Installation Whether it’s a one-man show or a team of electricians, installers and configurators, software programs can greatly enhance the installation process. Device managers are important tools in adding multiple cameras to a project. Using that 300-camera project, for example, it’s easier when a manufacturer has a device manager that allows the mass programming and configuration of cameras. Adding 300 cameras one by one is time consuming and leaves room for error when making so many multiple entries. A device manager should be able to scan the network and locate its devices, allowing them to be grouped, configured and much more. Every video surveillance camera project is going to have its ups and downs. But camera manufacturers can do their part in the production process to address the many issues known to slow down progress. It’s impressive that many are taking the lead in producing innovations like modular camera design, flexibility in the field and accessible packaging that can truly reduce installation cost and improve efficiency.
It’s not surprising that people are nervous about the security of newer technologies, many of which are part of the Internet of Things (IoT). While they offer greater efficiency and connectivity, some people still hesitate. After all, there seems to be a constant stream of news stories about multinational corporations being breached or hackers taking control of smart home devices. Both of these scenarios can feel personal. No one likes the idea of their data falling into criminal hands. And we especially don’t like the thought that someone can, even virtually, come into our private spaces. The reality, though, is that, when you choose the right technology and undertake the proper procedures, IoT devices are incredibly secure. That said, one of the spaces where we see continued confusion is around access control systems (ACS) that are deployed over networks, particularly in relation to mobile access, smartcards, and electronic locks. These technologies are often perceived as being less secure and therefore more vulnerable to attacks than older ACS systems or devices. In the interest of clearing up any confusion, it is important to provide good, reliable information. With this in mind, there are some myths out there about the security of ACS that need to be debunked. The fact that these devices communicate with an ACS via Bluetooth or Near Field Communication (NFC) leads to one of the main myths we encounter Myth #1: Mobile Credentials Are Not Secure The first myth we have to look at exists around mobile credentials. Mobile credentials allow cardholders to access secured doors and areas with their mobile devices. The fact that these devices communicate with an ACS via Bluetooth or Near Field Communication (NFC) leads to one of the main myths we encounter about the security of credentialed information. There is a persistent belief that Bluetooth is not secure. In particular, people seem to be concerned that using mobile credentials makes your organization more vulnerable to skimming attacks. While focusing on the medium of communication is an important consideration when an organization deploys a mobile credentialing system, the concerns about Bluetooth miss the mark. Bluetooth and NFC are simply channels over which information is transmitted. Believing that Bluetooth is not secure would be the same as suggesting that the internet is not secure. In both cases, the security of your communication depends on the technology, protocols, and safeguards we all have in place. So, instead of wondering about Bluetooth or NFC, users should be focused on the security of the devices themselves. Before deploying mobile credentials, ask your vendor (1) how the credential is generated, stored, and secured on the device, (2) how the device communicates with the reader, and (3) how the reader securely accesses the credential information. When you deploy smartcard technology as part of your ACS, you should choose the latest generation, such as MiFARE DesFIRE EV1 or EV2 and HID iCLASS SEOS Myth #2: All Smartcards Are Equally Secure The question “how secure are my smartcards?” is a serious one. And the answer can depend on the generation of the cards themselves. For example, while older smartcards like MiFARE CLASSIC and HID iCLASS Classic offer better encryption than proxy cards and magstripe credentials, they have been compromised. Using these older technologies can make your organization vulnerable. As a result, when you deploy smartcard technology as part of your ACS, you should choose the latest generation, such as MiFARE DesFIRE EV1 or EV2 and HID iCLASS SEOS. In this way, you will be protecting your system as well as your buildings or facilities. Some traditional readers and controllers can also pose a serious risk to your organization if they use the Wiegand protocol, which offers no security. While you can upgrade to a more secure protocol like OSDP version 2, electronic locks are a very secure alternative worth considering. It is also important to understand that not all smartcard readers are compatible with all smartcard types. When they are not compatible, the built-in security designed to keep your system safe will not match up and you will essentially forego security as your smartcard-reader will not read the credentials at all. Instead, it will simply read the non-secure portion—the Card Serial Number (CSN) —of the smartcard that is accessible to everyone. While some manufacturers suggest that this is an advantage because their readers can work with any smartcard, the truth is that they are not reading from the secure part of the card, which can put your system and premises at risk. Using electronic locks can help protect facilities and networks through various security protocols, including encryption and authentication Myth #3: Electronic Locks Are More Vulnerable These days, there are still many who believe that electronic locks, especially wireless locks, are more vulnerable to cybercriminal activity as compared to traditional readers and controllers. The concern here is that electronic locks can allow cybercriminals to both access your network to get data and intercept commands from the gateway or nodes over the air that would allow them access to your buildings or facilities. The reality is that using electronic locks can help protect facilities and networks through various security protocols, including encryption and authentication. Additionally, because many of these locks remain operational regardless of network status, they provide real-time door monitoring. This means that many electronic locks not only prevent unauthorized access but also keep operators informed about their status at all times, even if a network goes down. Outdated technology and old analogue systems are more vulnerable to attacks When it comes to deploying electronic locks, it is important to remember that, like any device on your network, they must have built-in security features that will allow you to keep your information, people, and facilities safe. Be Prepared To Unlock Future Benefits Ultimately, the information in your IP-based ACS is at no greater risk than any other information being transmitted over the network. We just have to be smart about how we connect, transmit, and store our data. In the end, maintaining the status quo and refusing to move away from old technology is not a viable option. Outdated technology and old analogue systems are more vulnerable to attacks. The reason it is so important to debunk myths around ACS and, at the same time, get people thinking about network security in the right way is that network-based systems can offer an ever-increasing number of benefits. When we deploy new technology using industry best practices and purchase devices from trusted vendors, we put ourselves and our networks in the best possible position to take full advantage of all that our increasingly connected world has to offer.
In my coverage of China Tariffs impacting the security industry over four recent articles, products on the tariff schedules routinely integrated into security solutions included burglar and fire alarm control and transmission panels, video surveillance lenses, HDTV cameras used for broadcast use cases and fiber optic media converters. The general ‘callout’ of ADP (Automatic Data Processing) devices and peripherals technically includes servers, workstations and microcomputers, all of which are commonly used to support security solutions. The underperformance, from June 15 to August 24, of U.S. stocks with high revenue-exposure to China, and that of Chinese stocks with high revenue-exposure to the United States was significant and almost identical at 3.2%, significant losses to some investors already involved in security industry M&A activity. Significant Public Safety Facial Recognition (FR) vendors leveraging AI expanded their market focus to retail and public safety While it was not apparent that practitioners’ security program budgets kept pace with the growth of the more popular solution providers like video surveillance and cyber security, the ICT industries supporting the security economy continued to expand, especially in wireless and wired infrastructure, including preparations for 5G wireless rollouts. These omnipresent technologies drove significant public safety, smart city and public venue projects in 2018. Facial Recognition (FR) vendors leveraging AI expanded their market focus to retail and public safety. In 2018, virtually every public presentation, webinar and published Q&A on social media monitoring and facial recognition technologies I worked on, involved significant pushback from privacy advocates, almost to the point of alarmism. Massive Risk Reduction Several solution providers in these areas have made significant strides on data protection, accuracy, powered by AI and documented crime reduction cases; however, this real news is quickly shadowed by privacy advocates, seemingly ignoring massive risk reduction, especially in the case of active assailants and gang-related crime. Will FR become mainstream? The cautious security industry may take a cue from the maverick retail industry, sports venue and VIP verification solution providers that grew in 2018. 2019 trends: presupposition or repudiation; winners and losers. Chinese tariffs have had a huge impact on the security industry, which can be seen from changes to U.S and Chinese stocks Although technology adoption forecasting is inexact, there are definitive opportunities in the security industry born on necessity. With the widespread problem of false alarm transmission and inability for first responders to ‘be everywhere,’ developers of solutions that provide automated verification and alternative security incident detection are expected to become mainstream. Promising Detection Systems The use of AI, NLP, LiDAR, UAS (Unmanned Aerial Vehicles aka drones) with surveillance and thermal imaging will grow, mostly due to higher acceptance in other industries like autonomous vehicles, rail safety, terrain and post devastation mapping/rescue. However, legacy ‘listing’ or certification organizations will be forced to make an important decision for their own survival: work toward integrating these promising detection systems into acceptance by insurance, licensing and standards development organizations. 2019’s ‘true’ Industrial Philanthropists will be needed to fund early warning tech for firefighters and the presence of active assailants 2019’s ‘true’ industrial philanthropists will be needed to fund early warning tech for firefighters and the presence of active assailants. For these use cases, 5G infrastructure rollouts, FR acceptance, lower cost perimeter detection and long range object and fire recognition by LiDAR and Thermal imaging will all be watched closely by investors. Should public agencies and philanthropical solution providers in the security industry cross paths, we may just yet see a successful, lifesaving impact. Cyber Risk Profile The ‘Digital twin’ refers to a digital replica of physical assets (physical twin), processes, people, places, systems and devices that can be used for various purposes. Your ‘Security Digital Twin’ has a similar physical and cyber risk profile, either through common threats, similar assets or both. Good news: managing your risk, protecting assets and securing your facilities in 2019 will get easier as security digital twin profiles will grow in maturity, while keeping their data sources private. This will be accelerated by the maturity of AI-based, auto-generated visualizations and image recognition, that happens to also drive the FR solutions. The 5G wireless infrastructure market is emerging as far more of a quantum leap in connectivity, like ‘wireless fiber optics’ performance, than an upgrade to 4G LTE. The 5G infrastructure market will be worth $2.86 billion by 2020 and $33.72 billion by 2026, growing at a compound annual growth rate (CAGR) of 50.9%. Intelligent Applications The explosion of ingested voice, video, and meta-data, the interconnectivity of devices, people and places, and the integration of intelligent applications into expanding ecosystems all require faster communications. To be more accurate, 5G rollouts will accelerate in 2019; however, current project funding will include and be impacted by future enterprise security connectivity: 5G and FWA (Fixed Wireless Access). 5G rollouts will accelerate in 2019; however, current project funding will include and be impacted by future enterprise security connectivity Quite simply put, larger solution providers are gently coaxing practitioners into seemingly ‘open systems;’ the negative discovery during an M&A process, audit or integration with a smart city’s public/private partnerships will continue to be revealed, and related industries will force reform. Autonomous things will be enabled by AI and image recognition. With few affordable rollouts of security robots and outdoor unmanned ground vehicles (UGV) that leveraged platforms popular with research and even NASA, the autonomous security robot was mostly MIA from a security practitioner’s program in 2018. Perimeter Intrusion Detection One platform was even accused of intimidating homeless people in a public place, at a major city. Industries mutually beneficial are often unaware of each other; this will change gradually: one major domestic airport is currently evaluating a UGV platform performing perimeter intrusion detection, runway weather conditions and potential aircraft taxiing dangers. The platform is being used largely in transportation research, yet offers significant opportunities to the security industry. Research firm Gartner estimates that 70% of today’s technology products and services can be enhanced with ‘multi-experience’-based VR/AR/MR The ‘immersive experience’ of virtually any security or threat detection is a twist on virtual/augmented/mixed reality (VR/AR/MR) with additional sensory features. Although VR/AR/MR is well underway in other industries, there are several companies with solutions like VR-based active assailant training that could provide a fighting chance for practitioners, employees, visitors, faculty and children. Research firm Gartner estimates that 70% of today’s technology products and services can be enhanced with ‘multi-experience’-based VR/AR/MR. Security Ecosystem Members Not necessarily MIA, but of special mention is the need of security and safety practitioners to prioritize communications systems over ‘nice to have’ expansive video surveillance systems for mass casualty threats. This will eventually improve with 5G for Enterprise solution rollouts. At the past GSX and upcoming CES Technology trade shows, a new roundup of technologies is discovered: a wider diversity of protection promise to save ASIS members on their technical security program is realized. With each of the ‘winners,’ (5G, AI, NLP, LiDAR, UAS [Unmanned Aerial Vehicles aka drones], thermal imaging, digital security twins and smart-city-friendly technologies) it is both exciting and challenging work for both security practitioners and solution providers. All things equal and with the necessary technology acceptance testing processes, this is a truly great time for security ecosystem members.
How’s this for a simple access control scenario? You walk up to a door, wave your hand in front of a button, the button lights up, and the door opens. That’s the simplified user experience that startup Openpath is promoting as it enters the crowded and mature market for physical access control. Openpath says a simple user experience provides the extra boost needed for mobile credentialing to gain momentum. In this case, it’s even simpler than using a card credential (no searching in a bag or purse for the card). And there’s no personal identification number (PIN) code to remember; no “intrusive” biometric element that can concern some users. James Segil, President and Co-Founder of Openpath, says the simplified process “uses fewer thought cycles.” Reliability of the system comes from Openpath’s SurePath triple-connect technology “We wanted to make mobile access control that people want to use and can use safely and with ease,” he says. “We wanted to make using a smart phone for access control easier and more reliable than using a keycard.” Simplified User Operation In the simplified scenario, the mobile credential resides on a smart phone that can remain tucked away in the user’s purse or pocket. The credential remains active without the user needing to open an app. The wave of the hand signals intent, which causes the button to light up, activate and the door is ready to open. Segil says the simplicity of operation has contributed to the system seeing an unheard-of 94% adoption rate among users. Reliability of the system comes from Openpath’s SurePath triple-connect technology. The smart phone credential is delivered using Bluetooth, WiFi or LTE (cellular) – whichever signal reaches the reader first enables the door to be opened. So even if a company’s WiFi is down or Bluetooth proves unreliable, there is still a third option. Openpath deploys “seamless” cloud integration and makes it easy for landlords and tenants to integrate Openpath with other systems Seamless Cloud Integration Segil is a serial entrepreneur who has had experiences as a frustrated user, dealing with many different offices, people and access control deployments over the years – subletting office space, changing PIN codes, dealing with 10 different offices using 10 different cards. Based on that experience, Openpath’s founders saw a need for a more user-centric approach to access control, and a chance to improve the office experience to be more aligned with employees’ experiences in their smart homes. Segil says he also saw “significant lethargy” among incumbent players in the access control space, and a market in which mobile and cloud technologies had still not taken hold. In addition to a simplified user experience built around mobile credentialing, Openpath deploys “seamless” cloud integration and makes it easy for landlords and tenants to integrate Openpath with other systems. The “elegant” readers, including a flush-mounted version, fit in well with high-end office environments. The company launched in May 2018. Openpath has been signing up national and regional channel partners all across the U.S. Openpath is focused on the commercial real estate market, where they have already seen significant adoptions, especially among mid-sized companies. Larger deployments as part of new construction are in the pipeline. National System Integration In the past six months since its launch, Openpath has been signing up national and regional channel partners all across the U.S. and now has a nationwide footprint and is able to service customers all over the U.S. They are not yet disclosing any specifics about the number of partners they have signed up and who they are. “I can share that we have a number of large national system integration and security brands on board as channel partners and many more regional and local system integrators,” says Segil. They are looking for additional integrator partners. “There is a cohort of folks out there who say ‘I get it,’ and I want to offer it to my customers,” says Segil. The cloud element of the system can provide recurring monthly revenue (RMR). Openpath’s system offers flexibility in terms of meeting each customer’s security needs. In addition to the “super convenient” scenario described above, the system can also be configured to be “super secure,” using two-factor authentication and other measures, says Segil. There are multiple “flavors” between the two extremes. It can also be integrated with elevators to enable the buttons on allowed floors. Integration With Existing Systems Cloud software simplifies operation for both tenants and landlords. The system is backwards-compatible to existing systems and can be used to retrofit and mobile-enable a legacy system, providing the benefits of mobile features and cloud operation to multiple sites. The software can interface with enterprise applications such as Active Directory, and an application programming interface (API) facilitates integration with other systems and building components. It operates with marketing automation platforms such as Flack and visitor management systems such as Envoy. The system is backwards-compatible, providing the benefits of mobile features and cloud operation to multiple sites Open standards make the system easy to install in new or existing buildings using RS485, or Cat 5 or Cat 6 wiring, whatever is in place. Retrofit installations can use existing panels, servers, software, etc., or they can be replaced. The Openpath panel is installed right next to an existing panel in a retrofit and preserves all legacy integrations of the previous system. Access Credentials Compatibility In its simplest configuration, the Openpath system consists of single or four-door panels wired using standard ports, Wiegand ports and REX ports, each connected to software in the cloud. Each panel works offline if the internet connection is down. Various key fobs, cards and other credentials are available in addition to mobile credentials. Openpath was one of the new exhibitors at last fall’s GSX show in Las Vegas, occupying a large-sized booth for a startup company. The “beautiful” hardware drew a lot of attention, says Segil. “The channel loves us, and we signed a lot of people,” he adds. “We were excited by the response.”
Security is among the defining topics at the Consumer Electronics Show (CES) 2019 this week in Las Vegas. More than 4,500 exhibiting companies are participating, including some 1,200 startups, highlighting the next wave of innovation in consumer electronics – and security. Twenty-four product categories at CES feature solutions to transform how consumers live, work and play. Technologies being highlighted include 5G connectivity, artificial intelligence (AI), augmented and virtual reality, smart homes, smart cities, and machine intelligence. Video is an important element at CES. This year, the focus is on intelligent video. For example, Eyecloud.ai, Santa Clara, Calif., is displaying a home security camera with on-device face recognition that uses AI. Powered by a 12-core Intel Movidius VPU (video processing unit), the camera combines AI-on-the-edge with easy setup and wirefree operation for up to six months per battery charge. On-Device Artificial Intelligence On-device AI is the next big trend in smart home surveillance, and deep neural networks will drive the future of do-it-yourself home automation SimCam, an Intel partner, demonstrates how the Intel Movidius VPU can turn a security camera into ‘the ultimate vision-based sensor’. On-device AI is the next big trend in smart home surveillance, and deep neural networks will drive the future of do-it-yourself home automation. A variety of other residential video systems are also on display at CES. For example, Swann Security is displaying 4K wired security systems featuring Google integration, a wireless smart security camera with True Detect heat-based PIR (photo infrared) motion detection, a video doorbell and chime with two-way talk, and indoor and outdoor wi-fi cameras with Alexa integrations. Intelligent Automotive Solutions Camera system-on-chip (SoC) company Ambarella is introducing the new CV25 camera SoC at CES. It combines advanced image processing, high-resolution video encoding and CVflow computer vision (video analytics) processing in a single, extremely low-power design. The CVflow architecture provides Deep Neural Network (DNN) processing required for a new generation of affordable and intelligent home monitoring, professional surveillance and aftermarket automotive solutions. CV25 offers half the performance of Ambarella’s previously released CV22 chip, but the new chip’s lower cost will bring intelligent cameras to a price point desirable for home systems. All Ambarella’s chips have hardware-based cybersecurity. A suite of advanced cybersecurity features protects against hacking, including secure boot, TrustZone, and I/O virtualization. Based on 10nm ultra-low power processing technology, the CV25 chip is optimized for wirefree cameras applications that require long battery life and small form factors. Camera system-on-chip (SoC) company Ambarella is introducing the new CV25 camera SoC at CES Virtual Security Guards Elsewhere, the Deep Sentinel home security system applies video and AI to predict residential break-ins ‘before they happen’. The Pleasanton, Calif.-based tech startup uses ‘AI-infused security cameras’ to keep an eye on your home. Three wireless 1080p full HD cameras provide night vision and PIR motion sensing, connected by a smart hub. Using proprietary artificial intelligence, the cameras act as virtual guards, watching activity around a house and providing alerts to situations that may lead to burglaries, break-ins, package thefts and other dangers. My Safe Patrol is an AI-driven platform that analyses data aggregated from security personnel, citizen alert systems and IoT smart devices, and responds with geolocated alerts in real-time. My Safe Patrol effectively supports the security/safety ecosystem of a building, a campus, a city or a district through a dynamic dashboard that helps command and control operations manage and deploy security plans. AI-Integrated Devices Showcased solutions include Smart Living integration of video surveillance applications to enable real-time two-way audio and video streaming simultaneously MicroVision, Redmond, Wash., showcases an interactive display engine for AI-connected devices, providing an integrated solution for projected display and interactivity through multi-point touch and air gestures. MicroVision’s new consumer 3D LiDAR engine provides high-fidelity spatial awareness to smart home hubs, for input to smart devices such as lighting, security, entertainment, and thermostats. The Internet of Things (IoT) is another big topic at CES, and ThroughTek Co., Ltd., Taiwan, demonstrates IoT developments to transmit voice, video and data over both wide- and narrow-band channels in smart home applications. Showcased solutions include Smart Living integration of video surveillance applications combined with voice assistant to companion robots, wireless doorbells, and battery cameras to enable real-time two-way audio and video streaming simultaneously. Advanced Capacitive Touchscreen Decayeux Group, a European manufacturer of mailboxes and high security doors, is displaying MyColisBox, a secure and connected parcel box delivery system designed to provide online shoppers a secure pickup point accessible by a PIN code sent via SMS message to a smartphone. Walter is the new mobile app for MyColisBox. Kwikset, a division of Spectrum Brands, showcases its smart lock portfolio – including three new smart locks – in the CES Smart Home Marketplace. Kwikset is showing the SmartCode 888, Kwikset Convert, Obsidian, and new designs of the SmartCode 914 and SmartCode 916, as well as a new wi-fi lock. Baldwin, Kwikset’s ‘luxury lock’ sister company, is offering a preview of its new TouchScreen Collection, launching this summer, available in five styles and featuring Advanced Capacitive Touchscreen technology. The Internet of Things (IoT) is another big topic at CES, with many companies demonstrating IoT developments Cyber Security Standards Privacy is increasingly a concern in the consumer space, and Private Discuss, from PIMAN Security, is a premium, secure, white label communication solution. Their active AI-powered defense architecture provides encrypted audio and video calls, messaging and file sharing. It renders a confidential, secure messaging platform that adheres to the highest standards of cybersecurity. FLIR provides virtual reality demonstrations at their CES booth, allowing attendees to put on a virtual fire helmet and try out a FLIR camera in a real-world residential fire response scenario. Participants may also use a FLIR optical gas imaging camera virtually to stop fugitive emissions in a natural gas refinery. Booth visitors may also take “thermal selfies” to post on social media.
One of the biggest recent security divestitures in the news was the sale of Mercury Security to HID Global, which occurred around a year ago. The seller in that transaction was ACRE (Access Control Related Enterprises), also the parent company of Vanderbilt and ComNet. We recently spoke to founder and CEO Joe Grillo, a 30-year industry veteran, about the mergers and acquisitions (M&A) market, ACRE’s future, and new opportunities opened up by the Mercury sale. Q: What’s new with ACRE? Grillo: We have an opportunity to have organic growth and to have some scale on a global basis to be a decent size player" ACRE is a company I founded in 2012, and since then we have had six acquisitions and one divestiture. We’ll never focus on ACRE as a brand, but we currently have more visibility of ACRE as a parent company with our two strong brands, ComNet and Vanderbilt. Last year was a very busy year [with the sale of Mercury Security to HID Global] because it takes as long to sell a brand as to buy one, maybe more so. Q: What’s next? Grillo: What you are seeing from us this year is that we are again in a buying mode. No announcement yet, but we expect one by the end of the year. We are well-funded, have great partners, and see an opportunity to continue to grow acquisitively as our highly fragmented space of access control continues to consolidate. From the standpoint of ACRE, with the ComNet and Vanderbilt brands, we are also doing more integration on the backside – not what the customer sees. We will continue to grow toward a $200 million business. We were there when we owned Mercury, and we will get there again. We have an opportunity to have organic growth and to have some scale on a global basis to be a decent size player. Because ACRE are owned by a private equity company, we are brought into every opportunity: ComNet is a good example" Q: Do you see the M&A market being more competitive – more companies looking to acquire? Grillo: There’s a lot of money chasing not-so-many deals, so evaluations can get expanded. But as interest rates creep up, it is definitely a challenge to find the right valuation, the right financing and the right strategic fit. It is a very strategic market. Q: There have been some big acquisitions lately. Were you guys involved at all in evaluating those opportunities? Grillo: Because we are owned by a private equity company, we are brought into every opportunity. An example of that was ComNet. I would not have been aware that the founder passed away two years ago and that there was this opportunity to own the business. So we look at everything; anything that’s out there we look at. The biggest recent announcement in our world was S2 (being sold to UTC/Lenel), and, yeah, we looked at that. It didn’t fit our profile – it was too expensive. Great business, and it’ll be interesting to see how it fits into the UTC environment. There was also Isonas [which was recently sold to Allegion], but the size didn’t add enough scale, but I like the technology. ComNet sells communication networking solutions and products, which is more attractive than video systems for ACRE Q: So what are you looking for in an acquisition? Grillo: It’s hard for us to find something that moves the needle, and you have to find that right balance. Is it something we can digest and have the financing for, and also is there room on the back end? We are private equity-owned, so we know there will be an exit for our investors, too. So we have to find the right balance, good valuations, the right size and digestible. If you look at our acquisitions, we have done two “carve outs.” The Vanderbilt name didn’t exist until we bought the business from Ingersoll Rand, and then we bought the [intruder] business from Siemens. That’s how Vanderbilt came about. You get a lot of value when you carve out a business, but there’s a lot of work. In the case of Mercury or Access Control Technology (ACT) that we acquired; they were growing and profitable but they stretch your finances a lot more. So you have to find the right mix in there. Q: Does video interest ACRE at all? Grillo: We have to find the right balance, good valuations, the right size and digestible"ComNet is our video play. ComNet sells communication networking solutions and products, and 70 to 80 percent of that is used for video systems. But unlike cameras, which don’t interest us, it’s actually good margins, highly specialized repeat business and with good channel partners. So where are we going to play? Cameras – no (because of commoditization). We have some recorder technology (from the Siemens acquisition) and we have the communication networking technology (with ComNet). On the software side, we have looked at a lot of the VMS companies, and a lot of them have been on the market. But the valuation expectations can be high because they are software companies. And we really believe in partnering as a good thing, too. If we integrate to Milestone or Salient or some of these companies, we will never lose an access control client because they chose a particular VMS. Q: ACRE is also looking to grow organically, isn’t it? Grillo: From a technology perspective, we are a product company and we are continuing to bring new products to the market with the ComNet communication networking business and the access control business. And in Europe, we have a third leg of the stool, which is the very successful intrusion and burgular alarm business we acquired from Siemens (SPC products now sold under the Vanderbilt brand). That business continues to do well and is now one of the highest performing segments in our portfolio.The intrusion and burgular alarm continues to do well and is now one of the highest performing segments in our portfolio" Q: But you don’t have to own a company to make it part of your solution. Grillo: An important word is integration. We have to integrate to all the wireless locks. We have to integrate to the VMS systems. But we don’t have to own them. Q: How has the Mercury Security divestiture impacted the rest of your business? Grillo: It has opened up the opportunity for us to look at Mercury partners as possible acquisition targets without worrying about conflicts with the very good business of Mercury. We have more flexibility now compared to the Mercury era. Q: How will the economic cycle impact the security market? Grillo: Interest rates are a much bigger issue than the overall economic cycle. We talk a lot about it with our owners – clearly interest rates are tightening up. If you go out to do acquisitions or to borrow money to do something with your business, it will be tougher than it was two years ago, and it may get worse in the next two years. Security is less impacted by the economic cycle than some industries.
A 300-plus camera city center video surveillance scheme in Lincoln has been installed and commissioned using cameras, monitors and switching equipment from Dahua Technology. The previous analog-based CCTV system was more than 20 years old and had become expensive to maintain, so City of Lincoln Council decided to replace the analog cameras and transmission equipment with HD digital equipment. The total cost of ownership has been reduced by the savings made on legacy fiber lease costs, as well as reduced energy consumption and the ability to configure and maintain the cameras remotely. Installation Of IP Full HD System The installation of the new IP full HD system and network is part of Lincoln’s smart city strategy – Vision 2020The design of the new all-wireless encrypted system was based around delivering flexible technology, reducing the total cost of ownership, ease of installation, lower maintenance requirements, smart edge analytics and remote connectivity. Environmentally friendly aspects of the project included specifying lower-energy equipment, integrating remote support and recycling hardware wherever possible. The council employed independent consultants Lever Technology Group to help them ensure they had a robust and future-proof radio network design. The installation of the new IP full HD system and network is part of Lincoln’s smart city strategy – Vision 2020 – which seeks to drive innovation in the city and harness new technologies to improve the lives of citizens. One of the results is the provision of free Wi-Fi in the city, working alongside the Dahua cameras using the same IP wireless network. Bandwidth Efficiency Using H.265 Compression A combination of fixed and PTZ cameras were installed over a new 1GB duplex network. These include cameras from the Dahua Pro series, which features high image quality, bandwidth efficiency using H.265 compression and excellent low-light performance. Bullet cameras from the Ultra series – with powerful optical zoom, IR distances of up to 50 metres and software which supports people-counting and heat-mapping – were also installed. The design of the scheme incorporated both camera and server-side analytics with legacy motion and audio detection The bandwidth efficiency of the cameras meant that multiple cameras could be installed in any given position, providing 360° coverage of locations and up to 20 Megapixels of video capacity per location – compared with less than 400,000 pixels with the previous analog cameras. The design of the scheme incorporated both camera and server-side analytics, including video content analytics, facial recognition, ANPR, heat maps and pedestrian counting, as well as legacy motion and audio detection. The objective of the facial recognition aspect is to support operators in areas such as the search for missing and vulnerable individuals. PoE Switches For Providing Power The superior image quality of the new system is borne out in figures which show an increase in ‘actionable’ images from 5% with the previous system to 60% successful reviews with the new one. Dahua PoE switches were also installed to provide power to the cameras, which are then connected to a layer-2 network. A new video wall comprising ten Dahua DHL49-4K LED backlit 49-inch 4K Ultra HD video wall display units featuring industrial level wide-viewing LCD panels, was fitted into a newly refurbished control room in City Hall and connected to i-Comply wonderwall video display drivers. This is a great collaboration of key project partners that have a tried-and-tested pedigree and working relationship with Videcom Security"Supplied through authorized distributor Mayflex, the entire system was installed by public space CCTV specialists Videcom Security, which worked with other partners to provide a high-performance, efficient and feature-rich system. Cost-Effective And Reliable Equipment Bill Mead, Managing Director at Videcom Security, said that working largely with Dahua video equipment meant it was easier for engineers in terms of configuration, as well as being cost-effective and representing good value for money. “Working with the Dahua product range has been great. The products have proved to be reliable and we experienced very few problems, from the initial configuration through to installation and commissioning. “This is a great collaboration of key project partners that have a tried-and-tested pedigree and working relationship with Videcom Security. We broke new ground with the development of 4K H.265 decoding, the support through Luxriot for camera-side analytics and edge recording, and the development by Dahua of camera-to-camera communication, allowing for non-connected systems to communicate locally.” Infinet 5GHz And Siklu E And V Band Radios Videcom Security is a certified Dahua Integration Partner, training for which was delivered both by Dahua and the Mayflex AcademyDahua is a solution provider in the global video surveillance industry and associated technology and has a keen focus on innovation by investing heavily in research and development. For the Lincoln city scheme, its products were selected based on their performance and cost-effectiveness to meet project budgets. Videcom Security is a certified Dahua Integration Partner, training for which was delivered both by Dahua and the Mayflex Academy. This helped Videcom negotiate key firmware enhancements, which added to many of the analytical features available in each of the cameras. The wireless network is built with Infinet 5GHz and Siklu E and V band radios. Resilience and diverse routing has been built into the network design, which supports video surveillance as well as public Wi-Fi and capacity for smart city services. Luxriot have worked closely with Dahua, supplying their Evo Global video management system and supporting edge analytics integration through their ‘events and actions’ management, which has also been integrated through to i-Comply’s VTAS CRVMS software (now rebranded as Viewscape). Real-Time Control And Video Streaming The Dahua system implemented by Videcom Security provides the main elements of our tier-1 solution"The introduction of H.265 compression was ground-breaking for such a project, with the system capable of displaying 4MP and 6MP H.265 to the operator’s spot monitor with real-time control and video streaming. “The Dahua system implemented by Videcom Security provides the main elements of our tier-1 solution,” said Martin Byrne, CCTV Team leader at Lincoln City Council. “The police are extremely pleased with the system and we’ve had very positive feedback from them. “There is really no comparison from how we operated previously to how we can now. It revolutionizes how we manage the CCTV systems and data. The potential for what we can achieve going forward is remarkable. We have now started to get real results from the investment in analytics; in particular vehicle and people-counting has been deployed and data is used to enhance other city projects.” Martin added: “Dahua has taken time out to visit and discuss with us our ambitions for smart city services. We have adopted Dahua as our brand of choice for CCTV cameras and have so far been very pleased and impressed with their reliability, low-light performance and overall image quality.”
ProdataKey (PDK), an innovator of cloud-based network and wireless access control products and ASSA ABLOY, the pioneer in door opening solutions, announced the completion of a campus-wide security upgrade at Glenaire Retirement Community in Cary, North Carolina. Modern Systems, of Yadkinville, North Carolina, has installed a fully integrated wireless lock and access control solution securing 370 doors spread across the community’s main building entrances, public access areas, offices and residential apartment units. It makes use of ASSA ABLOY’s Aperio wireless locksets with PDK’s cloud access control software, providing administrators with the ability to remotely lock and unlock doors, set specific hours for maintenance workers’ access to buildings, continuously monitor door use, and easily retrieve system-wide reports. ASSA ABLOY IN100 Aperio wireless locks feature sleek readers integrated with the door hardware, helping to preserve the upscale aesthetic of Glenaire’s many buildings. Accessing PDK Software From Mobile Device System management of PDK software can be handled completely from any mobile device or computer browserThe system will continue to grow, with expansion to all electrical rooms, storage rooms, mechanical rooms and closets, bringing the total to approximately 650 doors, as well as another 190 apartments and 40 assisted living units. As new doors come online, they will appear within the completely scalable PDK interface with no interruption to service or administrative functions. System management of PDK software can be handled completely from any mobile device or computer browser. Modern Systems was able to upload the user database from Glenaire’s legacy access control system to PDK’s cloud servers, allowing residents to retain use of their existing cards, which previously were used only to open the front doors of main buildings. With the PDK/ASSA ABLOY system, they now use those same cards to access public areas and their own private residences. ‘Guest’ cards, with more restricted access, are available for residents to give to family or friends as appropriate. Customized card permissions have also been established for staff groups, including service workers, nursing professionals and dining staff. Integrating Security Solutions When a resident is missing, administrators will be able to quickly call up cameras from the last door where the resident used his or her access cardModern Systems plans to soon facilitate an integration between the PDK software and several other security solutions they have installed at Glenaire. Mapping between doors and surveillance cameras, which are part of a new Milestone Systems video management solution, will not only enhance security but assist with Glenaire’s missing resident protocol. When a resident is missing, administrators will be able to quickly call up cameras from the last door where the resident used his or her access card. They also plan to connect the facility’s Situational Awareness and Response Assistant (SARA) risk management solution and mass notification system, from Status Solutions, with PDK. This integration will be important both in campus lock-down situations, as well as to assist with entry for response teams during medical emergencies. Glenaire’s Director of Facility Services, Ryan Ferguson, says he was wowed by the cloud-based PDK solution, which he says, “has the most modern, up-to-date access control software of anything I’ve seen. In addition, we were able to install the wireless PDK/ASSA ABLOY solution in about half the time it would have taken to install a wired solution, and for about half the cost.” Protection From Cyber Vulnerabilities The fact that all updates and security patches are automatically installed, system expansion is pain-free and limitless"Cory Jackson, PDK’s Vice President of Strategic Sales, adds, “The Glenaire project demonstrates the many ways in which our cloud solution makes sense for enterprise scale customers. “The fact that all updates and security patches are automatically installed, system expansion is pain-free and limitless – even across multiple buildings or sites, we offer seamless integration with solutions from valuable partners like ASSA ABLOY and others, and the customer’s in-house network is not exposed to any potential cyber vulnerabilities, are all reasons that PDK is gaining traction with larger customers.” “Retirement communities like Glenaire face a very unique set of challenges. The ability to provide a sense of security to residents and their families while still creating an environment that feels like home is paramount,” says Caleb Allen, electro-mechanical specialist for ASSA ABLOY Door Security Solutions. “We were happy to offer them a solution that made it easy and affordable to install comprehensive access control throughout the facility.”
Critical infrastructure requires locks that are proven, tested and trusted. Sometimes electronic locking is the right choice; at other times, mechanical locking does the job. With CLIQ mechatronic locking technology, one water utility combined both in a single, secure system controlled by powerful, intuitive CLIQ software. O des Aravis is responsible for water capture, storage quality, analysis and delivery of around 700,000m3 annually to homes and businesses in the Aravis Mountains region of France. PROTEC2 CLIQ key-based access control with programmable, battery-powered keys now secures 30 opening points across their premises. These robust locking devices are suited to protecting high-security openings, including a potentially dangerous room with high-tension electrical cabling and equipment. They are already deployed at critical infrastructure sites all over Europe. Controlling And Modifying Access Rights The mechatronic CLIQ system enables the utility’s facility managers to control, modify and trace every important accessThe mechatronic CLIQ system enables the utility’s facility managers to control, modify and trace every important access. They know who goes where, and when. They are aware of activity affecting all critical doors; it is even impossible to leave one unlocked. Because CLIQ is a flexible, key-based system, O des Aravis can also retain some mechanical locks at the site, operated by the same secure keys and with the same PROTEC2 high-security disc cylinders. CLIQ software makes it easy and intuitive for O des Aravis to manage their entire locking system. “The programming software platform is very simple to use. We can easily grant or forbid access rights to any user,” explains Laurent Schutz, Water and Sanitation Process Manager. CLIQ Web Manager Software The CLIQ Web Manager software is built to help companies like O des Aravis manage complex workflows. System administrators can program, amend or delete keys remotely. It’s straightforward to generate time-stamped audit trails for any lock or key, to track access in detail. The Web Manager can generate attendance reports for staff and contractors. Yet despite all these features, the CLIQ Web Manager requires minimal IT investment: it runs in the cloud and is accessed via an encrypted connection to a standard web browser. On Demand Audit Trails Of Lock/Key If a key is lost, a security manager can deactivate it instantly with a couple of clicksAt O des Aravis, comprehensive audit trails for any lock or key are available on demand. These also sync automatically when a user key is updated or revalidated. If a key is lost, a security manager can deactivate it instantly with a couple of clicks, ensuring buildings and clean water supplies are not put at risk. “There is very good communication about software updates,” says Laurent Schutz. “It is highly professional.” We live in a world of diverse threats to our critical infrastructure. For Aravis Mountains residents, winter skiers and summer hikers, these refreshing alpine waters are safely locked down — thanks to CLIQ wireless access control.
When a leading English university sought electronic locks for its newest student accommodation block, it turned to Aperio to extend its installed Gallagher Command Centre access control system. The University of East Anglia (UEA) has relied on Gallagher access control for a decade. To extend their Gallagher Command Centre system to Crome Court—a student residence with 231 en suite rooms separated into flats for between 8 and 13 postgraduates—they needed the right wireless solution. Wireless Locking Technology Aperio wireless locks are battery powered, and so use much less energyUEA’s needs included more than just security, stylish component design and affordability. Crome Court was specifically designed to minimise environmental impact, including CO2 emissions. Any access control system was expected to contribute to that goal. The university chose Aperio wireless locking technology from ASSA ABLOY. Aperio wireless locks are battery powered, and so use much less energy than wired magnetic security locks. They only “wake up” when a credential is presented to the reader. On Campus Training “We decided to offer Aperio to upgrade and extend our system at UEA because of its outstanding reputation within the security industry,” explains Jason Boyce, sales manager at Gallagher. “Having worked with us for 6 years, Gallagher knew we would deliver,” adds David Hodgkiss, national sales manager at ASSA ABLOY UK. Installation was quick and easy, aided by training delivered on campus by specialist ASSA ABLOY technicians. “We found ASSA ABLOY’s service faultless,” says Wayne Dyble, installation and support manager at Check Your Security, UEA’s service provider. Environmentally Advanced Profile There’s no need for expensive and time-consuming work changing the locks Crome Court’s secure doors are fitted with Aperio E100 online escutcheons. Students open them with programmable RFID smart cards, instead of cumbersome mechanical keys. If a keycard is lost, it is straightforward for UEA facilities staff to cancel it and issue a replacement—using a simple web-based interface or mobile phone. There’s no need for expensive and time-consuming work changing the locks. UEA also aimed to build Crome Court with an environmentally advanced profile. Here, too, Aperio delivered. Wireless locks are battery-operated and emit much less CO2 than wired magnetic locks. In fact, in carbon terms, Aperio locks emit 0.16 percent of the total emissions produced by standard wired locks. Flexibility is another Aperio asset: additional doors can be brought into the same integrated Gallagher system whenever needed. “We hope to roll out Aperio across all new and existing residential estate,” says Christine Beveridge, head of campus services at UEA.
The University of Birmingham educates over 30,000 students, with more than 6,000 doors providing access to student accommodation. Gallagher’s integrated access control solution is responsible for providing operational continuity and creating a safe and secure environment for students. Access Management System The University recently completed its new state-of-the-art student accommodation development, Chamberlain, which consists of a 19-storey tower and three low-rise blocks. An essential requirement was an integrated access control system, reducing the need for keys. Timothy Owen, General Manager of Student Accommodation at the University says, “We wanted to move away from using keys as students are prone to losing them and trying to manage thousands of locks and associated keys was a constant administration and financial drain.” We need to maintain control over access to our buildings, while ensuring a duty of care to our residents and staff" In order to minimise the complexity of managing a new system, the University required a solution that integrated with, or was an extension of, their existing campus access control and accommodation management systems. “We need to maintain control over access to our buildings, while ensuring a duty of care to our residents and staff so that they can go about their business as required,” says Timothy. “Fundamentally, we needed a system that gives both us and our resident’s confidence in the security of the accommodation.” Adaptable Access Solutions A large and complex estate with buildings of different construction and age, the University needed a solution that was flexible enough to accommodate their unique requirements. Gallagher Command Centre, together with the Aperio® wireless locking technology by ASSA ABLOY Access Control, was selected as the University’s preferred choice, meeting their security needs in a cost-effective way while still delivering to the overall specification. Timothy says, “The completion of our new state of the art Chamberlain development was extremely close to the date of the first student arrival, so the team had to be dedicated and work flexibly to ensure it was ready in time – which it was.” Improved Student Experience The Gallagher Command Centre integration allows for the access key and student ID to be combined in to one card, offering a number of benefits to both students and staff. The student ID and accommodation key is encoded on to one card, so it can be posted out in advance and access to the room automatically granted" Previously the accommodation arrival process required students to arrive at the University with their contracts and queue up so that a member of staff could sign them in manually and hand them the keys to their accommodation. From there students could head to their room. “Arrivals is always a busy time but with the help of the Gallagher solution we’ve not only improved the student experience but also the administration process,” says Timothy. “Now the student ID and accommodation key is encoded on to one card, so it can be posted out in advance and access to the room automatically granted via the accommodation management system. Students no longer need to queue for keys, can get to their rooms instantly, and spend more time enjoying their arrival experience.” Monitoring Access Cards The simple act of swiping an access card automatically checks the student in and a report can be generated to show who has arrived and who hasn’t, allowing staff to follow up accordingly. If the room is no longer required it can be quickly and easily re-allocated to another student, resulting in improved occupancy rates. Using Gallagher Command Centre together with the University’s accommodation management system allows staff to check on the well-being of students by monitoring the use of their access card. The University also houses students under the age of 18, and one of the safeguarding requirements is that the University can monitor their whereabouts on a daily basis. Timothy adds, “This can be difficult to achieve with many students to track, but Gallagher Command Centre can easily confirm the time and location of our resident’s last door access, providing peace of mind that students who may be uncontactable are in fact on site.” Replacing keys with a combined access and student ID card has reduced our operational costs" Creating Business Value University staff are also seeing positive improvements since the installation of the new system – particularly at the start of the year. The arrivals process is now less congested and more relaxed. The team have far fewer issues than with physical keys, enabling them to spend more time on the overall student experience. Since the installation of the first 800 bedrooms at Chamberlain, the University has already extended the system by a further 900 at Mason, with plans in place for an additional 1500 bedrooms this summer. Enduring Partnerships “Replacing keys with a combined access and student ID card has reduced our operational costs as we now have far fewer keys to purchase and store,” explains Timothy. “The student experience has improved, and staff are now free to deal with urgent matters and offer a more personal service. We can easily create reports to help us audit access and have generally provided a much more modern and secure place to live and work.” “The University has worked with 2020 Vision Systems for some time on CCTV and access control systems, so when they won the tender to provide and install the Gallagher and Aperio® systems we had every confidence that they would be able to deliver. The completion of our new state of the art Chamberlain development was extremely close to the date of the first student occupation and so the team had to be dedicated and work flexibly to ensure it was ready in time – which it was.”
Texas A&M University-San Antonio (A&M-SA) has become the first university in the world to deploy an Indoor Positioning Solution across its entire campus for the purpose of providing the safest possible environment. The SafeZone indoor positioning solution, provided by CriticalArc, provides the campus police with an unprecedented three-dimensional view of multi-story buildings. For example, instead of receiving an alert about ‘an incident somewhere in the student union building’, they get pinpoint specifics, such as ‘it’s on the fourth floor, west wing, outside room 410’. "With indoor positioning and SafeZone, we're able to provide a faster response time, whether it's a medical emergency or an active shooter,” says Roger Stearns, A&M-SA’s assistant chief of Police, featured in this video. The entire police department benefits from advanced features such as heat mapping and incident playback to optimize performance" Safer environment for students The university’s Chief of Police Ron Davidson wanted to innovate with this full-coverage system because the campus was expanding, including a newly completed residence hall, which meant having students around the clock for the first time in A&M-SA’s history. He was committed to ensuring a safer environment for students, staff and visitors. In addition, Chief Davidson was in search of a common operating view that would provide the Emergency Operations Center and all officers on patrol a real-time location of all available officers and volunteers, as well as showing the location of all incidents ̶ essential for coordinating first responders and the Campus Community Emergency Response Team (CCERT). Heat mapping and incident playback “SafeZone is essential technology to position your organization on the cutting edge of campus law enforcement. The real-time common operating view both enhances officer safety and acts a force multiplier. Plus, the entire police department benefits from advanced features such as heat mapping and incident playback to optimize performance,” Davidson said. Texas A&M-San Antonio has adopted the indoor positioning solution as a standard and will deploy it in all future buildings on campus. The solution is fully supported by the University’s Information Technology department and has been assessed for additional applications to enhance the student experience including wayfinding and research by academics in the newly completed Science and Technology building. Easy to maintain wireless installation The process to get the SafeZone indoor positioning solution deployed is a simple one, as it’s a wireless installation and easy to maintain"SafeZone was easy to deliver with no disruption to the campus. It was deployed in a matter of weeks during the summer break. “The process to get the SafeZone indoor positioning solution deployed is a simple one, as it’s a wireless installation and easy to maintain,” added Stearns. Organizations can install wireless, wearable duress alarms able to pinpoint anyone anywhere on campus as an alternative to fixed, expensive, wired panic alarms. Among other capabilities, SafeZone allows users to get the most rapid help simply by activating an alert, using an app or a wearable duress alarm. As soon as the alert is triggered, the location and details of the user are streamed to the monitoring team, allowing officers to coordinate a smarter, more targeted response. By enabling responders to visualize the precise location of an incident, anywhere on campus, SafeZone is much more powerful than traditional, fixed panic alarms and blue light telephones, which are more expensive to install and less accurate in operation. SafeZone public safety solution Glenn Farrant, Chief Executive Officer, CriticalArc, notes; “I’m delighted by the close partnership between A&M-SA and CriticalArc resulting in this ground-breaking implementation of the SafeZone public safety solution. Chief Davidson and his team are at the forefront of using this technology and we are pleased to be helping them improve the quality of life, and the learning experience, for everyone on their campus.” The SafeZone indoor positioning solution is commercially available worldwide for a range of university, hospital, enterprise and finance applications and is being deployed in more than 80 countries worldwide.
Round table discussion
Where does the time go? Before you know it, here we are at mid-year reflecting on an eventful first half of 2018 in the physical security market. It’s also a good time for our Expert Panel Roundtable to pause and look ahead at what we might expect in the second half of the year. We asked this week’s Expert Panel Roundtable: What technology development will have the greatest impact in the second half of 2018?
Consolidation – a decrease in the number of companies in a market achieved through mergers and acquisitions (M&A) – has been an important trend among manufacturers in the physical security market for many years. More recently, the trend has also appeared to extend to the integrator market. Larger integrators have been buying up other large integrators; in some cases, they have also been buying up smaller, regional integrators to expand their geographic coverage area. We wondered if this week’s Expert Panel Roundtable has noticed the trend. We asked: Has consolidation among security companies shifted to the integrator/installer market? What is the impact?
“Don’t try this at home.” It’s a common warning, but how does it apply to security systems? With today’s systems becoming easier to install, and with customers becoming more tech-savvy, there is a growing market for “do-it-yourself” or DIY home security systems. The trend also extends beyond the home security market: Business end users may also think they can forgo a professional installer and handle installation in-house. The customer may save money by installing a system, but at what risk? We asked this week’s Expert Panel Roundtable: What are the pitfalls of “do-it-yourself” when it comes to security systems?