Hanwha Techwin America, a supplier of IP and analog video surveillance solutions, announced a new app for systems integrators. The new Wisenet QR Scanner App is designed to help quickly create a list of all Wisenet devices associated with a specific project, without having to take the products out of their packaging. The QR code is found on the outside of the product carton, the bottom of the device, as well as on an included extra sticker for Wisenet modular cameras. This allows a technician...
Briefcam, the industry’s renowned provider of Video Content Analytics and Video Synopsis solutions, has announced that its advanced video analytics software platform will serve as the analytics engine for Verizon’s Intelligent Video solution. Intelligent Video solution The comprehensive monitoring service from Verizon helps law enforcement and security teams keep public and private facilities secure with near real-time, actionable data from video content. The combined solution enh...
Police users in the Municipality of Padova have deployed over 300 Sepura SC20 radios for the city’s police force. These are the first Sepura radios to be deployed in the Padova region, with the radios being chosen to replace existing TETRA units after a successful user trial. Radio users will benefit from the SC20’s loud audio and robust design, while also being protected by the radios’ advanced functions; Man Down and Lone Worker applications will initially be deployed, while...
Antaira Technologies, a globally renowned developer and manufacturer of industrial networking devices and communication solutions for harsh environment applications, is proud to announce the expansion of its industrial wireless family with the introduction of the ARS-7235 series, ARX-7235-AC-PD-T, ARY-7235-AC-PT. ARS-7235 series Antaira Technologies’ ARS-7235 series is an industrial IEEE 802.11a/b/g/n/ac wireless LAN access point with added router capabilities. It is designed for e...
Flexibility and a trusted record of reliable security in real-world environments: these are critical features when choosing any new electronic locks. With the Aperio E100 Wireless Escutcheon from ASSA ABLOY Opening Solutions, one can get both. A robust device suited to almost any medium- to high-traffic door, the E100 is easy to install wire-free - an ideal choice for both retrofit projects and new buildings. With Aperio’s open platform, it is straightforward to then integrate the escutch...
Last year saw vehicle thefts rise by a staggering 50% in the UK, and again by a further 20% so far this year, which is regarded to be the highest level in four years. With cases worsening during lockdown, motorists are now being warned that they face a greater risk of vehicle theft now that the nation is making fewer trips in their vehicles and spending more time at home. Countering the rise in vehicle thefts The cost of a lost or damaged vehicle can quickly mount up for any business owner, no...
Safetrust, the globally renowned company in virtual credential solutions, has released touchless mobile access and WiFi options for the millions of HID iCLASS SE and multiCLASS SE readers deployed globally with their new SABRE MODULE. The 30-second plug-in makes the SABRE MODULE the fastest way to enable touchless mobile access at the door, turnstile or elevator, while using existing readers. SABRE MODULE touchless mobile access The SABRE MODULE enables hands-free authentication from a configurable distance As organizations transition back to the workplace, eliminating community touchpoints of legacy door readers is paramount for employee safety. Unlike traditional cards and keyfobs that in practice are touched at the reader, the SABRE MODULE enables hands-free authentication from a configurable distance. With dynamic credential management, administrators can instantly issue and reissue a secure mobile credential to employees or visitors with the click of a button, removing the need for face-to-face onboarding and handling cards. IoT technology integration with readers “Lifetime warranty should mean for a lifetime,” said Jason Hart, the Chief Executive Officer of Safetrust, adding “We independently developed the SABRE MODULE to extend the useful life of existing HID iCLASS SE and multiCLASS SE readers by adding the connectivity and sensor features that were missing.” Jason further stated, “By adding IoT technology to the reader, organizations can augment their traditional physical access solution and utilize the readers as network-connected sensors for touchless access, presence detection and remote management, in addition to being forward capable as industry standards evolve.” WiFi-enabled and full remote management The SABRE MODULE is WiFi-enabled and supports digital certificate 802.1x authentication, MQTT and SIA OSDP, allowing full remote management of the traditional RFID reader, no matter the reader’s current wiring configuration. The module is made in the USA and comes with a lifetime warranty.
Safetrust, a pioneer in virtual credential solutions, introduces the SABRE MODULE, a 30-second plug-in upgrade that adds DESFire EV3 and remote management capabilities to installed HID iCLASS readers. Supports Wi-Fi The module simplifies the transition from legacy prox, iCLASS, or SEOS credentials to DESFire EV3 and supports Wi-Fi which allows customers to remotely manage and configure their readers, eliminating the need for onsite visits. Plug and play The fast, plug-and-play solution requires no rewiring and allows organizations to extend the ROI of their existing infrastructure with their installed readers, it’s the end of rip-and-replace. Bring Your Own Key (BYOK) “Safetrust technology extends the useful life of access control infrastructures and provides a transition path away from expensive and proprietary vendor card products to interoperable industry standards such as DESFire EV3, Global Platform, and OSDP SC,” said Jason Hart, CEO of Safetrust. “With support for Bring Your Own Key (BYOK), a customer can choose the card manufacturers that best suit their design needs and pricing.” Over-the-air updates Over-the-air (OTA) updates enable future features to be delivered seamlessly from a central management portal. This includes future product features, software patches, and any evolution of new card specifications.
Iris ID, a pioneering provider of iris recognition technology, announced the compatibility of its iCAM M300 handheld, multi-modal biometric reader and the MozaicID iCAM M300 smartcard software credential application. This application enables the mobile device to accommodate a range of Personal Identity Verification (PIV) compatible credentials including PIV Interoperable (PIV-I) and the Transportation Worker Identification Credentials (TWIC), a smartcard used by workers requiring access to secure areas of U.S. maritime facilities and vessels. Secured identity authentication The MozaicID app uses the iCAM M300’s detachable FBI-certified Sherlock fingerprint sensor from Integrated Biometrics to authenticate workers’ identities by comparing a live fingerprint to a stored template embedded in the credential. The application will also check the trust status of the presented credential. The iCAM M300 also enables mobile enrollment of workers with its embedded camera simultaneously capturing both iris and facial modes for contactless identity authentication. Authorities statement Mohammed Murad, vice president of global sales and business development, Iris ID, said compatibility with the MozaicID app adds to the versatility of the iCAM M300. “Iris ID and MozaicID have combined best of breed technologies to create an accurate and more secure means of identifying maritime employees wherever their jobs take them,” he said. “The iCAM M300 provides an unparalleled intuitive user interface, which makes the process easier for the user and operator.” Jim Parroco, chief executive officer of MozaicID said “MozaicID is dedicated to providing effective, relevant, and user-friendly security solutions. We institute intuitive and innovative technology in our software with proven results. The product offering, we have with Iris ID provides an excellent security solution in response to a specific need.” Features and benefits Supports other contact or contactless Personnel Identity Verification (PIV) smartcards such as Common Access Cards (CAC) used by military, civilian, and vendor employees in controlled government spaces Commercial Identity Verification (CIV), used by commercial organizations to meet federal government access control standards Comes equipped with software development kits (SDK’s) ready to deploy a wide variety of Android-based identity application Organizations requiring remote identity verification, such as the U.S. Customs and Border Patrol and law enforcement departments, use the water- and dust-resistant iCAM M300 Provides magstripe and contactless card support, as well as an MRZ reader to verify ePassports Communications protocols include NFC, Wi-Fi, Bluetooth, GPS, 4G LTE
Globally renowned access control systems manufacturer and supplier, Videx has announced the launch of two new apps for its web server access control system, the WS4 and has also released a new firmware with additional features. WS4 web server access control The WS4 can manage up to 20 entrances locally or remotely from anywhere via a mobile phone, tablet or PC using a web browser to connect to the system and it’s very easy to install. It can also hold approximately 2,500 proximity and coded access users, each with up to two proximity fobs and store up to 50,000 events which can also be viewed online or via the app. The two new apps are now available, making the access control system even more convenient to manage The two new apps are now available, making the access control system even more convenient to manage. The admin app allows system managers to simply add, edit or remove users on the go, and additionally, gives them a real time event log and status updates on the system’s health, by indicating power issues or alarm trip events. The system administrator is also able to open any of the entrances via the admin app. Secure access control system The user app provides a great alternative or addition to the user carrying a proximity fob or when remembering an access code. Users of the app are setup via the web portal and can be given access through selected entrances on any of the developments or buildings that the WS4 access control system manages. They can also be restricted to certain days and times, and the ability to set an expiry date, which is considered a highly useful feature for short term users, such as visitors or temporary staff. James Gray, Project Manager at Videx, said “The WS4 is one of the most secure and convenient access control systems on the market. It’s easy to install, standalone and the entire system can be accessed and managed from anywhere in the world via a web portal - you only need an internet connection.” Admin app for enhanced system administrator control The user app enables specific user profiles to be created, to let administrators control authorized entry" James adds, “The new apps create even more benefits to those managing the system with the admin app giving greater control to the system’s administrator to ensure the system is running smoothly and providing an easier way for it to be modified as and when it needs to, which can all be done remotely.” He further stated, “The user app enables specific user profiles to be created, meaning administrators can drill down into the specifics of authorized entry, whether that’s via selected entrances or only allowing some users access to certain buildings or sections of a building or property on certain days and times.” Intuitive access management capabilities The WS4’s web portal provides highly intuitive access management capabilities enabling multiple developments and buildings to be managed from one convenient web page. 1, 2 & 4 door control cabinets are also available with options for connecting to the network via an Ethernet connection or via the optional 4G router for those applications where an Ethernet connection is not available. All controllers can be combined up to 20 doors if required (using a maximum of 10 cabinets). Security alarm integration Additional features of the WS4 include security alarm integration, where a user can set or unset the alarm system from an access control reader, a lift interface option using an additional relay card, colored proximity fobs for easy management of users and email alerts for both managers and engineers.
ASSA ABLOY Door Group, a unit of ASSA ABLOY Opening Solutions UK & Ireland, leads the way with its range of high-performance timber doors for the public, commercial & high-end residential market. Fire door quality Fire Door Safety Week reported 60% of local authorities experienced delays in their fire door programs, leaving safety to chance and impacting over 16,500 fire doors recently. With local authorities still playing catch-up from these delays, it is vitally important for building managers to ensure their fire doors are safe, compliant, and up to standard. High-quality doorset solution ASSA ABLOY Door Group offers complete doorset solutions from one trusted single point of contact managing the whole process from specification to maintenance. The SMARTec range of high-performance timber doors has been developed to offer a complete doorset solution of high quality, high performing doors and frames, complete with all ironmongery solutions. With Q-mark and FSC (Forest Stewardship Council) certifications across all commercial timber fire doors, architects, specifiers, and contractors can rest assured that doorsets from ASSA ABLOY Door Group are both fire resistant and responsibly sourced as well as containing outstanding security and sound reduction properties. Security values are a top priority Brian Sofley, Managing Director at ASSA ABLOY Door Group, comments “Here at Door Group, we pride ourselves on delivering responsible and compliant doorsets to ensure maximum safety and performance in any suitable setting.” “We want to assure building managers that their security values are our top priority. With the capability to deliver an entire doorset solution from start to finish – we offer a full service from initial specification and manufacture, to onsite installation, after sales inspections and maintenance of our doors.” “The high performance SMARTec range aims to help set the industry standard for timber doors, encouraging stakeholders to prioritize safety and sustainability.”
Euralarm, the European association of the fire safety and security industry, has commented on the upcoming delegated act (DA) for internet-connected and wearable radio equipment, as part of the Radio Equipment Directive. The comments and proposals are given in view of the activation of the delegated act pursuant to article 3(3) of the RED (d, e and f) and cover the scope of the delegated act, the definition of ‘internet-connected devices’ and the implementation period. Relevant technical aspects addressing cyber security While Euralarm supports the need for increased cyber security, the fire and security industry will preferably support a horizontal cyber security regulation. Nevertheless, if embedded in the RED, Euralarm wants to ensure that the technical aspects addressing cyber security are relevant for wireless fire safety and security equipment, and can work for manufacturers and service providers. The idea is to include the cyber security requirements through a delegated act on internet-connected and wearable radio equipment. Such an act is a legally binding act that enables the Commission to supplement or amend non‑essential parts of EU legislative acts, for example, to define detailed measures. Scope of DA limited to ‘internet-connected devices’ Euralarm believes that the scope of the DA should be limited to the ‘consumer internet-connected devices’ Since the essential requirements of the delegated act have been triggered by cases involving toys and other consumer devices, Euralarm believes that the scope of the DA (delegated act) should be limited to the ‘consumer internet-connected devices’. Article 3(3) (d) of the RED states, “Radio equipment does not harm the network or its functioning, nor does it misuse network resources, so as to cause an unacceptable degradation of service." The term ‘network’ is not defined in the RED. Applying Art 3(3) (d) to internet-connected devices would create a deviating understanding of network, instead of radio communication network, it is enlarged to the ‘internet’. Ensuring users' privacy and data security According to Euralarm, it is therefore, sufficient to enforce Art 3(3) (e) and (f) to ensure that personal data and privacy of the user and subscriber are protected, and that the equipment is protected from fraud. This will also reduce the risk of inconsistent and overlapping requirements. As far as the definition of ‘internet-connected devices’ is concerned, Euralarm believes that a clear definition is crucial for the correct application of this delegated act and that, therefore, the concept of ‘directly or indirectly’ shall be avoided. Defining ‘consumer internet-connected device’ Since ‘internet’ is not used nor is it defined in RED, Euralarm also proposes to re-formulate this definition to cover radio equipment connected by using any internet protocol. This specifically covers those devices that could potentially present cyber security risks. The definition of a consumer internet-connected device that Euralarm proposes is “Any radio equipment, falling within the scope of Directive 2014/53/EU, which is capable to be connected to internet by using any internet protocol and intended to be put into service by a consumer or any other end-user.” Proposed transition period of five years As far as the date of application is concerned, Euralarm proposes a transition period of five years, before the requirements of the delegated act become mandatory. This allows enough time for a harmonized standard to become available and cited, and for manufacturers to finalize their product design and demonstrate the compliance.
Indoor positioning is, in many ways, an inside version of the satellite-navigation apps we rely on for outdoor navigation, but with an added twist – it can also be used to help locate people and things. Let’s say you’re at home and misplaced your car keys, or you’re in a grocery store and can’t find your favorite brand of coffee. Or maybe you’re working in a factory and need a particular tool from a storage bin, or you’re a site manager dealing with an emergency and need to make sure everyone’s exited the building. Indoor positioning helps in all these situations, because it can locate items and guide you to where they are. The importance of “where” Knowing where an asset is located in real time is useful in many ways. In industrial settings, it improves item utilization rates and saves time spent searching for things. It opens the door for a new level of “just in time” efficiency on factory floors, and for inventory management in warehouses and retail environments. Safety is another benefit of accurate location, because knowing where people, automatic guided vehicles, and robots are in real time can help prevent accidents and keep people out of harm’s way. Accurate location in real time also enables contextual decision-making, so your smart house adjusts your stereo automatically as you move from to room or lets you control objects by simply pointing at them. Lets you control objects by simply pointing at them Security authorisations based on location is another possibility. Precise real-time location is something that can be hard to fake, so it can be used to restrict access to an area or used to add protections based on where an asset sits, where a piece of data resides, or the origination point of a communication. Getting the technology right Developing an effective technology for indoor positioning requires several things. To begin with, location readings needs to be very precise, with accuracy down to as small an area as possible. The technology has to be secure, because location often needs to be kept private. The technology has to be reliable, even in harsh environments, and easily scalable, too, so it can address the thousands of people and assets in large venues. It has to be low power and affordable, so it can be embedded in everything from high-end, complex devices like smartphones to low-end, simple devices like asset tags. And, of course, the technology has to have latency low enough that it can track movement in real time. Various wireless technologies, including Bluetooth and Wi-Fi, are already used for indoor positioning, but they don’t deliver on the full set of requirements, especially in terms of accuracy. A different kind of wireless, called Ultra-Wideband (UWB) checks all the boxes. It has the potential to change the way we do all kinds of everyday tasks. What is UWB? UWB is based on the IEEE standard 802.15.4a/z, which has been optimized for micro-location and secure communication. UWB is highly accurate. It can pinpoint people and things to within just a few centimeters, making it 100 times more accurate than the current implementations of Bluetooth Low Energy (BLE) and Wi-Fi. UWB is reliable because it has high immunity to various types of interference, including multipath, which is when a wave from a transmitter traveling to a receiver by two or more paths causes interference. UWB also offers very low latency, with update rates of up to 1000 times per second and readings that are as much as 50 times faster than satellite navigation. UWB is also implemented using mainstream technology, so it’s both affordable and optimized for low power. Lastly, UWB leverages distance-bounding techniques defined by the IEEE to provide a level of security that makes it extremely difficult to hack. Ultra-Wideband (UWB) checks all the boxes How is all this possible? Physics! UWB out-performs other location technology because, unlike Bluetooth and Wi-Fi, which transmit narrowband signals and use Received Signal Strength Indicator (RSSI) to determine location, UWB transmits wideband signals (500 MHz) and uses Time-of-Flight to determine location. Already in 40+ verticals UWB is already bringing value to products and services in more than forty verticals covering the consumer, automotive, industrial, and commercial market segments. For example, it brings operational visibility to manufacturing and logistics, helps businesses protect workers, and reduces safety-management costs. UWB also lets robots and drones self-navigate, and enables secure, hands-free access to cars, front doors, and other secure locations. It even helps with contact tracing and social distancing in the fight against COVID-19. Now in smartphones Recent adoption in smartphones means UWB is ready to grow quickly. Developers are using UWB as part of new services, with an eye toward making various everyday activities more convenient and safer. With UWB as part of smartphone apps, purchases will be more secure, accessing your car will be possible without a key fob, and misplaced items won’t stay hidden for long. Retail outlets will use location for targeted marketing, and finding things on store shelves will be easier than ever. Home automation will become seamless, and friends and family will be easy to find even if they’re in a crowd. The question of interoperability Having UWB in smartphones is an important first step Having UWB in smartphones is an important first step toward making UWB an everyday part of life, but interoperability is another key factor, since smartphones have to interact with a wide range of other devices and services. That’s where the FiRa Consortium comes in. Launched just over a year ago, the FiRa Consortium is a member-driven organization of market leaders from the consumer, mobile, industrial, enterprise, and semiconductor industries. FiRa members work collectively to define the future standards that will make interoperability across UWB products a reality. With FiRa making it possible for developers to use UWB in all kinds of new ways, the future of indoor location is really only limited by the developer’s imagination.
Motion detection is a key feature of security systems in residential and commercial environments. Until recently, systems have relied heavily on closed circuit television (CCTV) and passive infrared (PIR) sensors, which both require significant investment and infrastructure to install and monitor. Developments in wireless technology are increasing home security possibilities. Few years ago, these developments led Cognitive Systems to discover that the wireless signals surrounding oneself can be used to detect motion. Known in the wireless industry as WiFi sensing, this technology brings many benefits that other motion detection solutions have not been able to provide. The working of WiFi sensing At Cognitive Systems, the company has used WiFi sensing technology to develop a motion detection solution called WiFi Motion™, which measures and interprets disruptions in RF signals transmitted between WiFi devices. When movement occurs in a space, ripples in the wireless signals are created. WiFi Motion interprets these ripples and determines if an action, such as sending a notification, is needed. Enabling this functionality in a space is incredibly simple. With a software upgrade to only one’s WiFi access point (or mesh router), motion sensing capabilities are layered into one’s WiFi network. Existing connected WiFi devices then become motion detectors without detracting from their original functions or slowing down the network. Using artificial intelligence (AI), WiFi Motion establishes a benchmark of the motionless environment and learns movement patterns over time, which could be used to predict trends. This allows unusual movement patterns to be detected with greater accuracy while decreasing the potential for costly false alerts. WiFi Motion requires no line-of-sight or installation WiFi sensing and other home monitoring solutions All of these capabilities are made possible by WiFi sensing and together create a motion detection system that provides unparalleled accuracy, coverage, privacy and affordability compared to other solutions on the market. PIR integration is far more complex and imposes electronic and physical design restrictions compared to WiFi sensing. In terms of placement, PIR systems are difficult to install, requiring line-of-sight and a device in every room for localization. WiFi Motion requires no line-of-sight or installation and is also a scalable solution compared to PIR. Much like cameras, PIRs can only cover so much space, but WiFi Motion can cover the entire home and even detect motion in the dark and through walls, without adding additional devices to the home. WiFi Motion detects less distinguishing context than cameras and microphones, but more context than regular PIR sensors for the perfect balance of privacy and highly accurate motion detection. Privacy solution While cameras have been the security solution for years, WiFi Motion offers a more affordable solution that can rival the privacy and coverage capabilities of even the most high-end cameras. With such a wide coverage area, one might think that WiFi sensing infringes on privacy, but actually, the opposite is true. With WiFi Motion, the contextual information collected cannot be used to identify a specific individual, unlike cameras which can clearly identify a person’s face or microphones, which can identify a person’s voice. It is different from other smart home security options that use cameras and microphones because it only senses motion using WiFi signals - it doesn’t “see” or “listen” like a camera or microphone would. This provides opportunities for added security in spaces where privacy might be a concern and installing a camera may not be a comfortable solution, such as bathrooms and bedrooms. The data collected is also anonymized and highly encrypted according to stringent industry privacy standards. Existing connected WiFi devices then become motion detectors Additional WiFi sensing applications Since WiFi sensing technology requires no additional hardware or subscription fees, it is much more affordable than other motion detection solutions. It can be used as a standalone solution, or it can be easily layered into more complex systems. This ease of integration, scalability and relatively low cost brings a lot of potential for various applications. Motion detection can trigger other smart devices in the network to turn lights on or off In eldercare, for example, WiFi sensing can be used to help seniors live comfortably in their homes for as long as possible. With the increasing aging population and high costs associated with care homes, the market for this application is considerable. Caregivers can use an app to monitor movement in their loved one’s home and be alerted about unusual movement patterns that could indicate a concern. For smart homes and other environments that have a network of smart devices, the artificial intelligence (AI) component of the technology allows for improvements to automated features. Motion detection can trigger other smart devices in the network to turn lights on or off or make adjustments to the temperature in a room. Security for the commercial sector For office buildings and other commercial properties, it is easy to see how all of these features could be scaled up to offer a highly accurate and cost-effective motion sensing and smart device automation solution. Cognitive Systems is closely involved with the development of WiFi sensing technology, working with various industry groups to establish standards and help it reach its full potential. WiFi Motion is merely the tip of the iceberg in terms of motion sensing possibilities, but its applications in the world of security are undeniably compelling. It is an exciting time for the wireless industry, as one works with stakeholders in the security space to explore everything this technology can do.
The emergence of smartphones using iOS and Android is rapidly changing the landscape of the IT industry around the world. Several industries, such as digital cameras, car navigation, MP3, and PNP, have been replaced by equivalent or even better performance using smartphones. Smartphones provide increasing portability by integrating the functions of various devices into a single unit which allows them to connect to platforms with network-based services and offer new services and conveniences that have never been experienced before. These changes have expanded into the access control market. Although not yet widespread, ‘Mobile access cards’ is one of the terminologies that everyone has been talking about. RF cards used for access security are being integrated into smartphones just as digital cameras and MP3s were in the past. While people might forget their access cards at home in the morning, they seldom forget their smartphones. Using smartphones for access control increases entry access reliability and convenience. Mobile/smartphone access control A key aspect of mobile credential is that it makes it possible to issue or reclaim cards without face-to-face interaction As in other markets, the combination of smartphones and access cards is creating a new value that goes beyond the simple convenience of integration enhancing the ability to prevent unauthorized authentication and entrance. People sometimes lend their access cards to others, but it is far less likely they might lend their smartphone with all their financial information and personal information – to another person. This overcomes an important fundamental weakness of RF cards. Another valuable aspect of mobile credential is that it makes it possible to issue or reclaim cards without face-to-face interaction. Under existing access security systems, cards must be issued in person. Since card issuance implies access rights, the recipient’s identification must be confirmed first before enabling the card and once the card has been issued, it cannot be retracted without another separate face-to-face interaction. Mobile access cards In contrast, mobile access cards are designed to transfer authority safely to the user's smartphone based on TLS. In this way, credentials can be safely managed with authenticated users without face-to-face interaction. Mobile cards can be used not only at the sites with a large number of visitors or when managing access for an unspecified number of visitors, but also at the places like shared offices, kitchens and gyms, currently used as smart access control systems in shared economy markets. The market share of mobile access cards today is low even though the capability can offer real benefits to users and markets. While the access control market itself is slow-moving, there are also practical problems that limit the adoption of new technologies like mobile access cards. Use of Bluetooth Low Energy technology While NFC could be an important technology for mobile credential that is available today on virtually all smartphones, differences in implementation and data handling processes from various vendors prevents universal deployment of a single solution to all devices currently on the market. Accordingly, Bluetooth Low Energy (BLE) has been considered as an alternative to NFC. Bluetooth is a technology that has been applied to smartphones for a long time, and its usage and interface are unified, so there are no compatibility problems. However, speed becomes the main problem. The authentication speed of BLE mobile access card products provided by major companies is slower than that of existing cards. Enhancing credential authentication speed Authentication speed is being continuously improved using BLE's GAP layer and GATT layers The second problem is that mobile access cards must be accompanied by a supply of compatible card readers. In order to use mobile access cards, readers need to be updated but this is not a simple task in the access control market. For 13.56 MHz smart cards (which were designed to replace 125 kHz cards), it has taken 20 years since the standard was established but only about half of all 25 kHz cards have been replaced so far. Legacy compatibility and the need for equivalent performance, even with additional benefits, will drive adoption timing for the Access Control market. While BLE technology helps resolve the compatibility problem of mobile access cards, it can identify some breakthroughs that can solve the speed problem. Authentication speed is being continuously improved using BLE's GAP layer and GATT layers, and new products with these improvements are now released in the market. Making use of key improvements allows Suprema's mobile access card to exhibit an authentication speed of less than 0.5 seconds providing equivalent performance to that of card-based authentication. AirFob Patch MOCA System's AirFob Patch addresses the need for technological improvements in the access control market in a direct, cost effective, and reliable way – by offering the ability to add high-performance BLE to existing card readers – enabling them to read BLE smartphone data by applying a small adhesive patch approximately the size of a coin. This innovative breakthrough applies energy harvesting technology, generating energy from the RF field emitted by the existing RF reader – then converting the data received via BLE back into RF – and delivering it to the reader. By adding the ability to use BLE on virtually any existing RF card reading device, MOCA allows greater ability for partners and end users to deploy a technologically-stable, high performance access control mobile credential solution to their employees, using devices they already own and are familiar with. Adding MOCA AirFob Patch eliminates the need to buy and install updated readers simply to take advantage of mobile credential, lowering costs and risks, and increasing employee confidence and convenience. Growth forecast of mobile access card market in 2020 In 2020, forecasts show that the mobile access card market will grow far more rapidly Several companies have entered the mobile access card market, but they have not set up a meaningful product solution stream until 2019. In 2020, forecasts show that the mobile access card market will grow far more rapidly. Reviewing new entries into the market allows identification of the latest products that provide improving solutions to compatibility and speed problems. MOCA AirFob Patch addresses development plans in process today that overcome the legacy installed base of card readers – allowing rapid creation of an environment that can make immediate use of BLE mobile access cards. Integrated mobile digital ID With proven usability and within suitable environments, mobile access cards will also begin to make inroads into other markets, not just the access control market. In the sharing economy market, which seeks access management without face-to-face interaction, the integrated mobile digital ID led by the 'DID Alliance' will serve as a technical tool that can be used in access authentication – forging increasing links between the access control and digital ID markets.
If one employee stands less than six feet away from another employee, a fob attached to a lanyard around his or her neck emits an auditory beep – an immediate reminder to observe social distancing. If an employee were to be diagnosed with COVID-19, a cloud-based database provides a record of who at the company the sick employee had contact with. These capabilities of HID Location Services ensure social distancing and provide contact tracing to enable companies to return to work safely. They have been deployed in a pilot program at HID Global’s Corporate Headquarters in Austin, Texas. Social distancing using a BLE beacon To ensure social distancing, a Bluetooth Low Energy (BLE) beacon is emitted from an employee’s fob (or from a badge that has the same functionality). The beacon communicates peer-to-peer with a beacon emitted by another employee’s fob or badge to alert if the location of the two employees is less than six feet apart. To ensure social distancing, a Bluetooth Low Energy (BLE) beacon is emitted from an employee’s fob For contact tracing, the beacons communicate via a nearby “reader” (a BluFi BLE-to-Wi-Fi gateway) to the Bluzone cloud-based software-as-a-service. The building area covered by each reader constitutes a “zone,” and the system records when two beacons are signaling from the same zone, which indicates contact between employees. In effect, the system records – historically and forensically – who was near whom (and for how long) using the zone-based approach. “In the workplace, we provide organizations with visibility into the location of their workforce,” says Mark Robinton, Vice President, IoT Services Business Unit at HID Global. Pilot program spans variety of environments By documenting where a sick individual moved in the building, the system also can guide any need to close off a certain area for deep cleaning. Instead of quarantining a whole building, a company could quarantine a small subset of employees who were likely exposed. Importantly, the system only reports data, while management makes the actual decisions about how to respond. The site of the pilot program is the 250,000-square-foot HID Global facility in Austin, which includes a variety of environments, including manufacturing areas, an executive suite, cubicles, a training area, a cafeteria, and lobbies. This spectrum of use cases enables the pilot program to evaluate how the system works in various scenarios. The building in Austin has two floors, plenty of natural lighting and emphasises sustainability in its design. HID Location Services ensure social distancing and provide contact tracing Pilot starts small and expands For the pilot program, 80 readers were installed in a wide area in the facility, including a variety of environments. Initially 30 badges and 30 fobs, all BLE-enabled, were issued to employees. If a badge identifies another nearby beacon (suggesting a social distancing failure), it emits a blinking LED light, which can be seen by the offending co-worker. The fobs emit an audible beep, which employees have overwhelmingly said they prefer. Observers overseeing the pilot program have documented employee reaction and comments. It emits a blinking LED light, which can be seen by the offending co-worker There were challenges in setting up the pilot program remotely to ensure fewer employees were on site during the pandemic. The equipment was provisioned in Florida and then shipped to the Austin location. Fine-tuning was required to adjust the signal strength of the BLE beacons. The badges were initially more powerful, but the strength was dialed back to be comparable to the fobs and within the six-foot social distancing range. Signal strength is also a variable in diverse environments – the 2.4 Ghz signal tends to reflect easily off metal, so adjustments in signal strength are needed in a factory setting, for example, versus a collection of cubicles. “This facility is large enough and diverse enough that it provides great test results and quality data to analyze,” says Dean Young, Physical Security Manager at HID Global. “Our employees are eager to be part of the pilot to demonstrate that we use the technologies we provide to our customers, and they want to help us stay in compliance with social distancing and contact tracing.” Ensuring privacy while protecting employees HID Global’s headquarters had approximately 425 employees before the coronavirus pandemic lowered the number drastically to include only essential workers. As more people return to work, additional fobs and badges are being issued to expand the scope of the pilot program. The program is also incorporating contact tracing of suppliers and others who visit the facility. Except when triggered by contact among employees, locations are not recorded. Each employee’s location is always available in real-time (e.g. in case of an emergency), but they are not “tracked.” Through BluFi placement and geofence capabilities, the system closes off private areas where location should not be monitored, such as a rest room. Geofencing also identifies when employees enter and/or exit the area covered by the pilot program. Although each beacon is associated with an employee, the employee’s identity is not part of the data stored in the cloud, so there are no privacy concerns. Data is completely anonymized, and no personally identifiable information (PII) is stored in Bluzone. Other computer systems in a company, such as a human resources (HR) program, can privately and securely store the identities associated with each beacon. Other applications for HID location services In addition to social distancing and contact tracing applications, HID Location Services offer other use cases ranging from asset tracking and employee safety/security to location analytics. For example, the system can analyze room usage for better building management and operational efficiency. It can also quickly find people in emergency situations. These use cases ensure continued value for a system even after concerns about social distancing and contact tracing have faded. The system can analyze room usage for better building management and operational efficiency Another big selling point is the ability of a company to be better prepared in case of a future pandemic, or a second wave of this one, says Robinton. The HID Location Services social distancing and contact tracing applications will be available at the end of Q3 and will be rolled out through HID Global’s existing integrator channel. Vertical markets likely to embrace the technology include healthcare, where hospitals need to track patients as they come in and to know which other patients or staff they may have been exposed to. The financial sector is another likely market, as is manufacturing, which is looking to avoid the prospect of shutting down an entire plant. It’s better to address the three or four people who were near a sick employee than to shut down the plant. In the hospitality industry, fobs can be used to signal duress by the housekeeping staff.
The next step in the journey of digital transformation, the fifth generation of wireless communications technologies (5G) will have an enormous impact on mankind, and on every industry including security. In short, 5G will disrupt the way we live and work. To discuss the changes, we presented our questions to Benoît Jouffrey, VP 5G Expertise at Thales, which is at the forefront of the transformation with an emphasis on trust and security. Following are his responses. Q: In layman's terms, what is the difference between 4G and 5G ecosystems as they relate to opportunity, flexibility and choice in networking tools? Jouffrey: Compared with largely one-size-fits-all 4G services, the 5G ecosystem will provide organizations with much greater choice and flexibility in the way they communicate over mobile networks. The network slicing capabilities of 5G means that business can have their own independent networks, with each one customized to their unique requirements and backed up by service-level agreements (SLA). Another aspect of 5G will be the ability to drive latency between UE (User Equipment) and network down to below a few milliseconds, which will massively boost the performance and scalability of enterprise applications. Q: How can these capabilities drive a company's digital operations? 5G will allow enterprises to be connected more efficiently Jouffrey: 5G will allow enterprises to be connected more efficiently: they can rely on a higher density of connected devices exchanging more information in a better timeframe. Due to these slicing capabilities, 5G networks allow for much greater personalization than 4G networks. This means that businesses could benefit from this personalized network, tailored to their portfolio of Internet of Things (IoT) use cases, and not be necessarily expected to rely on a one-size-fits-all network. By combining the unique capabilities of 5G with the insights derived from analytics, machine learning, and artificial intelligence, enterprises will be in much better stead to run their operations efficiently and securely. Q: How might 5G impact the use of cloud systems? Jouffrey: 5G is the first communication environment that is cloud-native. As such, 5G networks will support cloud-based applications in a way that 4G, 3G and 2G can’t support. For instance, sensors (e.g. in a manufacturing plant) often have a small internal storage and rely on synced devices (e.g. gateways) to interact with the cloud. Soon, these sensors will be able to work more efficiently, interacting with the cloud via the ultra-low latency and the edge computing capabilities supported by 5G networks. Unlike current IoT services that make performance trade-offs to get the best from these existing wireless technologies, 5G networks will be designed to bring the high levels of performance needed for the increasing use of IoT. It will enable a perceived fully ubiquitous connected world, with the boosted capacity offered by 5G networks transferring exponentially more data at a much quicker rate. Q: How can one provide trustworthy 5G lifecycle management for IoT devices? Jouffrey: Trustworthy IoT lifecycle management is an end-to-end approach from the secure provisioning of keys within the devices, to the proper identification of the users, from the authentication on the network or the network slice, to the secure handling of the data either at stored or in motion. Resources need to be invested long before this to qualify the business model, in prototyping, as well as prototype testing. Most organizations don’t have the resources to counter all the security challenges of their 5G IoT deployments. Businesses will often end up choosing between navigating a risk-laden 5G environment, with inadequate or incomplete trust mechanisms, or outsourcing these requirements. When looking at outsourcing, companies must choose a provider with expertise in digital security, ensuring 5G IoT deployments have data protection and connectivity credentials built in, together with end-to-end data protection solutions such as encryption – protecting data in the device, network, and cloud at rest and in transit. Q: How can wireless modules address new 5G IoT use cases? Wireless modules can be expected to play a bigger role than in previous generations of cellular Jouffrey: As IoT considerations are integrated into the 5G ecosystem, wireless modules can be expected to play a bigger role than in previous generations of cellular. 5G modules support different characteristics to earlier generations – the 5G use cases are much more complex, varied, from high-end use cases requiring high data usage and throughput, such as for industrial routers, to low-throughput, energy consumption optimized devices, as required for some IoT sensors. At the end, compared to the largely one-size-fits-all approach that preceded it, 5G will increase the demand for vertical-tailored wireless modules. Importantly, these wireless modules need to support new data protection and security features that go well beyond conventional compliance to 3rd Generation Partnership Project (3GPP) standards. Due to the extent of personalization within 5G networks, wireless modules must also offer providers and customers greater security as well as agility all along the device lifespan. Q: What are the new data protection challenges posed by 5G, and how can they be addressed? Jouffrey: The 5G era presents exciting opportunities, as well as security challenges. The greatest risks to enterprise data on 5G networks – including eavesdropping, man-in the middle attacks, denial of services, loss or compromisation of data – were already known in 4G. The 5G standards have looked at providing answers to these threats and come with some noticeable improvements, such as the encryption of the international mobile subscriber identity (IMSI), otherwise known as the Subscription Permanent Identifier in 5G. But what’s different with 5G is the threat surface area, due notably to the variety of devices that will be used over these 5G networks and the underlying technologies used for the deployment of the networks, such as cloud native virtualization. On top of this, it’s the first generation of cellular to launch in an era of global cyber-crime, funded by organized crime and states alike. So, whilst enterprises should look to the ecosystem of telecom operators and cloud providers, vendors, and system operators to help understand the opportunities presented by 5G – this same ecosystem needs to guide them in countering any new risks that the 5G architecture may pose. The key to securing 5G enabled devices is to build security into devices from the outset using encryption. The key to securing 5G enabled devices is to build security into devices from the outset Q: What new roles can the 5G embedded universal integrated circuit card (eSIM) endorse in network authentication? Jouffrey: 5G is the first generation of cellular to launch in a buoyant eSIM market. The eSIM will be key in supporting network slicing authentication and security, enabling enterprises to leverage their credentials to pre-select network slices. However, to support secure authentication for mobile networks that may require the usage of different authentication algorithms over time, these 5G eSIMs must support this flexibility of usage of multiple authentication and authorization credentials. With this capability built into these eSIMs from the start, mobile operators can remotely swap the authentication algorithm either for a dedicated primary authentication, or in a definitive way, thanks to key rotation management, thus maintaining a trusted environment.
The success of smart homes began with professional security providers offering bundled packages, focused mostly on security monitoring. However, due to the cost of professional contracts, consumers began to embrace the do-it-yourself (DIY) approach. Despite the challenges and opportunities that come with professional and DIY approaches, the momentum of smart home growth depends on these two approaches working symbiotically. Smart home systems In 2017, there were about 122 million smart home devices shipped globally, according to IHS Markit. The retail channel represented about 62 percent of all device shipments in 2017 and will represent about 70 percent in 2021. Despite the increased demand for professional installation, the “do-it-for-me” approach, most the volume remains with ad-hoc purchases. This includes a consumer video camera or a smart thermostat purchase from a retailer. Data capture form to appear here! When a consumer wants to add devices to an existing professionally installed system, they often will buy products from retail. Flexible service offerings and pricing are already taking shape across smart home offerings. DIY installed smart home systems such as Scout Alarm already offer no contract monitoring. Professional monitoring companies are already offering no contract pricing, and providers such as Comcast are looking to pilot programs for just video monitoring, bundled with Internet for a low monthly fee. Home automation system Connected smart locks can actually act as an extension of a smart hub or controller Options for financing are also going to become commonplace. Smart home equipment is expensive, even when attempting to outfit a modest size home (2,500 square feet). Immediate access to services is becoming more critical. This means consumers should be able to access on-demand service options directly from a mobile device to activate or deactivate professional monitoring. Lastly, pricing still needs to come down for many smart home devices, but there is a threshold. For example, the sale of wireless, connected smart locks (viewed by some consumers as DIY) can lead to opportunities for further home automation product sales and professional installations. Connected smart locks can actually act as an extension of a smart hub or controller. They can be used to communicate wirelessly with and control all the devices that make up a home automation system, including lighting, entertainment, thermostats, air, alarms, shades and more. Residential security According to a 2018 Residential Security Market Report prepared by Parks Associates, “More than 60% of installing dealers now report that DIY systems are biting into demand for their services.” But the rise in DIY is not entirely bad news for security and home automation installers and dealers. There are a number of ways to view this glass as half-full. For example, with their lower cost and perceived ease of installation, DIY products have broken down barriers for additional purchases. There are reasons for dealers and installers to be cheerful about the rise of DIY. For one thing, according to that same Residential Security Market Report from Parks Associates, residential security dealers are doing quite well. The report states, “In 2017, revenues were up an average 7.72% for security dealers.” Full-time monitoring DIY products have broken down barriers for additional purchase and installation of professionally installed systems What about installations? The report goes on to say, “For 2017, the average number of installs per dealer was 22 per month, compared to 17 per month in 2016.” So, revenues are up for security dealers, and at least part of the reason can be attributed to the fact that DIY products can raise overall awareness of and spur interest in other home automation and security products. With their lower cost and perceived ease of installation, DIY products have actually broken down barriers for the additional purchase, and installation, of complete, professionally installed systems. Instead of paying for monthly monitoring, homeowners can install a web cam, access from a smartphone or tablet and essentially do their own security monitoring. The downside of this approach is readily apparent. Without full-time monitoring, homeowners can easily miss the break-in or the aged parent who falls and can’t get up. Near-field communication Until they log on and take a look, there’s no central station to send medical aid or call the police. Connecting door locks and other devices to the Internet can also open a door to hackers, if the infrastructure isn’t properly protected. The areas of consumer electronics and security are closely intertwined. For example, Apple recently expanded near-field communication (NFC) support to include the NDEF (NFC Data Exchange Format), which will likely accelerate the adoption of smartphones for access control credentialing. In another recent development, Amazon acquired Blink, a home security camera startup that offers wireless home security systems. The acquisition aligns with Amazon’s effort to offer more home devices. A common theme among professional monitoring providers is that a homeowner who is aware of events happening in the home does not necessarily have a secure and protected household Traditional security features For example, a Nest camera, a DIY product, notifies a consumer via smartphone about events in the home when it detects motion, but only when the notification is opened and identified will a consumer be able to act on the related event. Self-installable smart home devices may resonate with a segment of the market that want security but are unwilling to adopt professional monitoring; however, providers can leverage these devices to enhance traditional security features and communicate the value of professional monitoring. Missed part one of our smart home mini series? Read it here.
Hicking Building RTM Company Ltd has teamed up with Videx Security and Joes UK Limited to solve a major door entry issue for a large residential complex. The Hicking Building Ltd. is a Nottingham-based development comprising 329 self-contained flats, managed by property agents Walton and Allen. Many residents were struggling with a call issue because the existing intercom system developed a fault which meant residents weren’t receiving calls from the system panels. Because of this, tenants were missing visitors and deliveries with people thinking they weren’t home. Videx GSM 4812 intercom system Installer Joes UK Ltd. was tasked with finding a suitable intercom system Installer Joes UK Ltd. was tasked with finding a suitable intercom system that would also work in conjunction with the existing access control system, where the fob entry element of this was working normally. Joe, who owns and manages Joes UK Ltd., said “The system installed is a very old system and we were struggling to source the repair parts needed to fix the calling issue tenants were experiencing. To fix the problem and reduce the risk of the issue happening again, I recommended the installation of a digital audio GSM 4812 intercom system by Videx that could work concurrently with the fob entry function of the existing solution.” He adds, “With the Videx GSM 4812, when someone calls a specific apartment the call is automatically directed to a registered phone number of the tenant’s, which is usually their smartphone. They now will never miss that important visitor or delivery and are made aware of who has visited even when they are not there and can authorize entry if they wish, while away from their home.” Parallel operations with software-based fob entry solution The Videx system works alongside the existing software-based fob entry solution that residents have used for many years. Mobile phones are now the handset of choice for the majority of people and as they are enabled with Wi-Fi calling, there’s no need to worry about poor mobile signal. If the existing fob system also developed a fault and stopped working, the Videx GSM system includes a preinstalled fob reader so it would be easy to switch this over to the GSM solution. Mark Gibbon, Sales Manager at Videx Security, said “The GSM system is the ultimate entry system of convenience that also provides maximum security too. There’s no infrastructure or wiring involved; it’s very easy to set up and use.” The GSM system is the ultimate entry system of convenience that also provides maximum security Mark adds, “It’s a win-win situation for both the resident and management company because it means residents won’t have to stay home waiting for a delivery, or miss a visitor, as they can answer the call to their apartment from anywhere in the world. For management companies, our GSM solution offers a fixed cost and minimizes the risk of call outs because there’s no handset maintenance involved.” Remote event log with online access A really useful feature of the GSM system is that it also carries a new remote event log that can be accessed online, allowing events to be viewed in real time, on the move via a phone, tablet/laptop. It’s a great security feature because it’s where a record is kept of calls, gate/door openings and much more. What’s also useful is that alerts can be programmed where an email will be sent should that alert be triggered. For example, if the gate or door is opened out of normal hours or if the registered number for a flat or property is changed too frequently - any unusual activity is flagged.
Redlands Unified School District, located in San Bernardino Country, California, hosts more than 21,000 students across its 16 elementary schools, four middle schools and four high schools. School security is paramount for the district. It’s taken extra precautions, including a focus on lockdown procedures across its locations and the district office. K-12 school security can be challenging, especially with the uniqueness of Redlands High School. It’s an older facility that was constructed more than 100 years ago. Additionally, students must walk outside to pass from building to building, and there’s a street that cuts through campus. A crosswalk is needed to get from one end to the other. The district needed to take all of this into account when assessing their security plan. Securing every layer The district’s security team took into consideration each physical layer that needed protection The district’s security team took into consideration each physical layer that needed protection at Redlands High School, from the district level to the classroom and many openings in between. Yet, there was a common area that needed addressed. There’s a fence around the campus to protect the property perimeter. And Redlands High School is extending that fence to include the cross walk, which will help funnel guests into a single point of entry, the main office. Schlage AD Series electronic locks This opening, as well as many other perimeter openings that lead into offices, gyms, auditoriums, libraries and hallways in the school feature Schlage AD Series electronic locks that are connected to the district’s access control system. At the classroom layer, each door has mechanical hardware that can be locked from the inside. Redlands School District has started district-wide implementation of a full-feature enterprise access control system through Vanderbilt, which is capable of operating across different schools, campuses and other locations. RedRock Security and Cabling, Inc. (RedRock Technologies) had implemented and continue to support the solution. Electronic access control “When these systems are managed district-wide, schools have the ability to lock down a door at a time, a school at a time or an entire district at a time,” said Jennifer Martin, Director of System Sales at Vanderbilt, adding “It’s all about protecting the students.” With electronic access control on main points of entry and many assembly areas, plus secure mechanical locks on classroom doors, Redlands High School had most of the layers prepared in the event of a lockdown event. However, the school’s cafeteria, Terrier Hall, was a vulnerable space. “Hundreds of students use Terrier Hall,” said James Fotia, Director of Maintenance, Operations and Transportation at Redlands Unified School District, adding “In a lockdown situation, that’s a place where we would secure the kids and keep them safe by clustering them into that area and having it locked down. But it was secured by one AD-400 lock on a pair of double doors. That was incomplete.” Von Duprin RU retrofit option Allegion representatives recommended a new K-12 security solution from Von Duprin To demonstrate how the school could affordably secure big banks of doors without having a reader on each opening, Allegion representatives recommended a new K-12 security solution from Von Duprin. The Von Duprin RU retrofit option is a cost-effective solution for openings with existing exit devices that enables remote locking, or un-dogging, for centralized lock down. This enables staff to initiate an immediate campus-wide lockdown from a secured location instead of putting themselves in harm’s way to manually undog exit-device doors throughout the building. Integrated request to exit (RX), latch bolt (LX) and door position switch (DPS) signals are included to provide real-time remote monitoring and confirmation of the security status of the door. Wireless connectivity to ENGAGE Gateway There’s also a ‘dog on next exit’ feature, which is a scheduled function sent to the device to allow the door to remain unlocked the first time someone depresses the push pad of the exit device to leave that space. The door is secured in the evening, and with ‘dog on next exit’ enabled at a specific time in the morning, staff simply depresses the push pad to unlock the door. This makes unlocking the door simple for scheduled events and daily lock-up easy by reducing the need to distribute keys to staff. Additionally, the RU option connects wirelessly via Bluetooth Low Energy to Allegion’s ENGAGE Gateway which provides real-time, bi-directional communication to the access control software. RU is a modular battery powered kit that can be added on to existing Von Duprin 98/99 and 33A/35A Series devices. Enhanced door security “The Von Duprin RU option fits into special applications that haven’t been addressed in the past,” said Russell Gamble, End User Consultant at Allegion, adding “There are several openings that will benefit from this secure lockdown solution.” At Redlands High School, the Von Duprin solution is installed on five doors that surround the cafeteria area. There are main entry doors where students enter, plug in their lunch numbers and go through the buffet line. From there, they enter the multi-purpose space, where there are four additional doors, which are secured with the RU options. Access control solution with lockdown capabilities There was also interest in implementing the security solution at the district office There was also interest in implementing the security solution at the district office. The school wanted to pilot the solution there to experience the product and its features, especially the lockdown capabilities. And being that the building is so unique, it has a need for enhanced security. “The district office is a converted warehouse, so it was never really meant for meetings and offices,” said Fotia, adding “Having the Von Duprin RU has been a wonderful fit in providing security in a not so ideal building.” Integration with Vanderbilt solution The main building is built U-shaped and the loading dock is in the middle. In the middle there is a courtyard area with four portable offices. The Von Duprin RU is on each portable door. At both locations, the Von Duprin RU options are integrated into the Vanderbilt solution and part of the broader lockdown solution. “The greatest thing about this solution is schools now have a way to electronically add control to doors that used to be manually monitored,” said Jennifer Martin. Remote lockdown and door access control She adds, “With the Von Duprin 99 Series, doors allow for free egress, but they aren’t usually monitored by access-controlled systems. If someone has it dogged so the doors are unlocked or propped open, someone has to manually go around and lock each door.” This solution ensures staff is alerted if a door is propped open and enables the ability to lock down the door remotely, even if it was previously mechanically unlocked. Enhanced lockdown capabilities for peace of mind Redlands Unified School District is pleased with the addition of the Von Duprin RU Redlands Unified School District is pleased with the addition of the Von Duprin RU to its school security plan. Integrating the solution with the Vanderbilt system, along with the Schlage electronic locks on campus has improved lockdown. According to the district’s Coordinator of Operations and Facility Planning, Ken Morse, it’s also improved peace of mind because there are less errors and more control over these areas. In the cafeteria, Terrier Hall, they’re able to secure doors that used to be manually controlled. This eliminates human error and the risk of manually locking doors in an emergency. Fotia said the school also likes the budget-savings aspect since it was able to simply upgrade the hardware it already had in place versus purchasing entirely new equipment. He’s excited to see other areas where the Von Duprin RU might be a fit. “The security measures and the lockdown capabilities are the main reasons we wanted the Von Duprin product,” said Morse, adding “Putting something on a schedule is also a great bonus because of how many common-use facilities we have. We’ve found that scheduling it is relatively easy. The doors are open only when they need to be. We have everything scheduled at the district office so it’s open during our hours, which has been a huge benefit.”
Interface Security Systems, a pioneering managed services provider that delivers managed network, business security and business intelligence solutions to distributed enterprises, recently provided Thrive Restaurant Group, one of Applebee’s largest franchisees in the US, with scalable network, communications and security services. Business security systems platform The new solutions include a next-generation secure SD-WAN architecture with network upgrades, 4G/LTE wireless capability, unified communications as service (UCaaS) with cloud-based VoIP and a secure and standardized business security systems platform. As a significant update to Thrive’s outdated legacy systems, the new Interface solution unclogs productivity bottlenecks and gives the flexibility the restaurant chain needs to address changing customer preferences. Managing multiple network and voice providers We needed a partner we could count on to manage our network, voice, and security for all locations" With 81 restaurants across the United States, Thrive found itself struggling with challenges common to many geographically distributed businesses, including managing multiple network and voice providers, dealing with outdated CCTV hardware, and a lack of accountability from vendors. “With 81 restaurants across ten states, we needed a partner we could count on to manage our network, voice, and security for all locations,” explains Brian Houchin, Director of IT for Thrive Restaurant Group. Troubleshooting technical issues When it came to managing vendors, Thrive simply had too many. Troubleshooting technical issues was challenging as it was difficult to pin accountability on a specific vendor. In addition, tracking invoices, service credits and administering multiple vendors was an inefficient and time-consuming exercise every month. Outdated hardware and changing regulations also posed a challenge. Unreliable CCTV equipment left the restaurants, employees and customers vulnerable to security risks on-premises. Constantly evolving Payment Card Industry (PCI) compliance rules meant Brian Houchin had to devote hours of his limited bandwidth to keep up with the latest changes and updates, so that Thrive could avoid major penalties and security threats. With the COVID-19 pandemic significantly disrupting Thrive’s business, restaurant staff found it challenging to handle sudden spikes in call volumes, as they had to work with a legacy phone system that was not scalable. The lack of 4G wireless coverage, outside of the restaurant premises made curbside pickup and take-out services impossible to manage. Secure, scalable network and communications Thrive turned to Interface to implement a secure, scalable network and communications backbone that would unclog the productivity bottlenecks and give the flexibility the restaurant chain needed to cater to changing customer needs. Interface implemented a next-generation secure SD-WAN architecture with network upgrades to guarantee seamless connectivity between all of Thrive’s locations. To deliver a better guest experience for customers calling in with their orders and enabling curbside pickup and payment, Interface rolled out a 4G/LTE wireless network that also doubled up as a backup when the primary network failed. UCaas with cloud-based VoIP implemented With managed network services from Interface, Brian and Thrive never have to worry about PCI compliance With managed network services from Interface, Brian and Thrive never have to worry about PCI compliance. Interface also implemented unified communications as service (UCaaS) with cloud-based VoIP and auto-attendant features for Thrive’s locations to seamlessly route high volumes of customer calls to their dedicated order center. “We wanted to take the call-in experience out of the individual restaurants and put it into the hands of professionals who weren’t in a hurry to get off the phone,” explains Brian Houchin, adding “The VoIP service from Interface lets us take additional orders, dramatically improving our customer experience and increasing revenue.” Deploying secure video surveillance platform To solve the limitations of Thrive’s legacy CCTV infrastructure, Interface delivered a secure video surveillance platform with easy remote viewing from any location and simplified access management to boost restaurant security. Thrive’s partnership with Interface has allowed the restaurant group to focus more on their growth strategy and long-term plans. By consolidating their SD-WAN, UCaaS, CCTV and 4G/LTE services with Interface, Thrive gets real accountability without having to deal with the vendor run-around. Perhaps the greatest advantage is Thrive’s ability to aggressively expand, confident that Interface’s 24/7 managed services will always be ready to support their growth. “We’ve had a chance to test out multiple vendors for network, communications and business security and Interface definitely has provided us the best experience,” concludes Houchin.
Sonitrol, the globally renowned provider of verified electronic security solutions, has announced that CMS Corporation, an award-winning construction contractor, relies on one of Sonitrol’s newest offerings, Sonitrol Network Protection. CMS Corporation’s scope of services encompasses new construction, renovations, fueling systems, and energy and sustainability projects for a wide range of commercial and federal government clients. The company’s projects are approximately 70% Federal and 30% civilian undertakings. Upgrading network security According to CSO Online, the average small business loss when a network has been breached is US$ 170,000 According to CSO Online, the average small business loss when a network has been breached is US$ 170,000. CMS Corporation’s management knew that they needed to upgrade their network security in an effective, comprehensive and cost-effective manner. Matthew Wilson, Director of Information Technology at CMS Corporation, was impressed with Cisco’s reputation, and he was aware of their Cisco Meraki software. He chose Sonitrol Network Protection as the preferred network security solution because it offered a world-class solution provided by a known and trusted provider, Sonitrol. SB/MBEs more vulnerable to cyber-attacks The company, CMS Corporation’s Bargersville, Indiana Office is a two-story administrative space with a large workshop and fabrication area, and a large detached workshop/storage area. Small Business and Minority-Business Enterprises (SB/MBEs), like CMS Corporation, are particularly vulnerable to cyber-attacks, because their relatively small size means that they have a lower IT budget and resources. Furthermore, with CMS Corporation’s large number of federal government contracts, effective cyber security is essential to the company’s continued growth and success. Cybersecurity Maturity Model Certification compliance Due to upcoming Cybersecurity Maturity Model Certification (CMMC) compliance, federal contractors are required to tighten their network security to protect Controlled Unclassified Information (CUI). “Cisco Meraki products enable us to have proactive insight into our network activity to help ensure compliance with current and new federal regulations,” Matthew Wilson explained. Sonitrol Network Protection Wilson was attracted to Sonitrol Network Protection’s ease of deployment, auto mesh VPN and seamless scalability Wilson was attracted to Sonitrol Network Protection’s ease of deployment, single pane of glass administration, auto mesh VPN, and seamless scalability. These features are powered by the Cisco Meraki products and solutions, installed by CMS Corporation, which include: MX68CW, MS120-8 FP switch, and four MR36 access points. They also have a handful of Z1 and Z3 devices in remote construction trailers that are able to support the software. In addition to topline network protection from potentially daily cyber-attacks and ransom-ware attacks, Wilson and his colleagues are now learning post-deployment that Sonitrol Network Protection offers a host of additional security features and benefits. Cisco Meraki and Sonitrol intregation Wilson noted, “Cisco Meraki and Sonitrol are a winning combination and Sonitrol’s knowledgeable, courteous installation staff made the transition to our powerful, new network protection quick and easy.” Sonitrol Network Protection, powered by Cisco Meraki, can protect any size company’s network, devices, and data from daily cyber-threats and attacks. Firewall and intrusion protection The solution provides firewall protection, intrusion protection and prevention, ransom-ware protection, anti-phishing, malicious file scanning and more, thereby protecting businesses from huge monetary and data losses. It is cloud-based and managed from a single dashboard GUI, making managing ones network easy. Sonitrol Network Protection solution also provides robust business management tools: content/URL filtering, application-aware traffic control, guest WIFI access, analytics and heat mapping, and custom reporting options. The technology stays current with automatic firmware and security patches, and it works within a connected ecosystem, delivering security on Day 1 of implementation.
Schools and heritage sites present their own unique difficulties for security and access control. It becomes a challenge when the same is to be applied to a school that is also a heritage site of exceptional value. This was the challenge facing security administrators at the Colegio Diocesano Santo Domingo in Orihuela, Spain. The Colegio Diocesano is more than just a school. Its historic buildings date to the 1500s, a heritage site as well as a place of learning - with a museum that requires the protection of the same access system. Hence, the brief for a new access system required minimal disruption on two fronts. The college buildings are a Resource of Cultural Interest and on Spain’s heritage registry: they must not be damaged. School chiefs also required little disturbance of everyday school learning. Wireless access control was the obvious answer. A wireless access solution to a 16th-century problem Powerful management option enables real-time security control to limit free access to and around the site SMARTair® wireless access control devices now control access through 300 doors around the school. A mix of battery-powered escutcheons and weather-proof escutcheons, knob cylinders and wired wall readers (including for lifts) are connected to SMARTair’s intuitive software by a network of 38 wireless communication hubs. The school chose SMARTair Wireless Online management for its new keyless access system. This powerful management option enables real-time security control to limit free access to and around the site, even if the school data network is down. Automated emails inform security staff of any incidents, keeping students, staff, equipment, and precious heritage safe. “The main benefit is the ease of real-time key management — from any place and at any time — via the wireless online management system,” says IT Manager, Francisco Fernández Soriano. “This increases security for children and for staff because no unauthorized people can enter the school.” SMARTair locks and readers SMARTair TS1000 software makes it easy to issue and cancel access credentials for temporary visitors such as parents SMARTair locks and readers provide a streamlined way to manage access. Student and staff carry credentials programmed to allow access to specific authorized areas. SMARTair TS1000 software makes it easy to issue and cancel access credentials for temporary visitors such as parents. “In addition to the main entrances and classrooms, access to private spaces such as lifts, offices, staff rooms, the church, the museum, the library and the IT room is constantly monitored,” he adds. “Thanks to our SMARTair devices installed at more than 300 doors, the security team can find out who has accessed which space and when, at any time.” Installation and integration The system was installed without a hitch and also without any disruption to classes" The installation of the school’s new SMARTair system demanded minimal work. Some school doors date to the 16th century, so major alterations to door hardware were not possible. “The system was installed without a hitch and also without any disruption to classes,” confirms Fernández Soriano. Because SMARTair is a modular system, scalability is built in. They can extend or fine-tune their access system when they choose. Indeed, SMARTair’s “Phase II” is already under discussion. SMARTair software also easily slotted into the school’s existing management workflows. The Colegio Diocesano has used iinventi education management software for the past five years. Integration with SMARTair software was simple: access control, the library and canteen are managed from an integrated system. “SMARTair gives the school’s security team the answers they need,” concludes school director, Reverend José María Fernández-Corredor. To learn how easily SMARTair® wireless access control could secure your premises, download a free solution guide at https://campaigns.assaabloyopeningsolutions.eu/smartair
Schools and heritage sites present their own unique difficulties for security and access control. But what about a school that is also a heritage site of exceptional value? This was the challenge facing security administrators at the Colegio Diocesano Santo Domingo in Orihuela, Spain. The Colegio Diocesano is more than just a school. Its historic buildings date to the 1500s, a heritage site as well as a place of learning - with a museum which requires the protection of the same access system. Hence, the brief for a new access system required minimal disruption on two fronts. The college buildings are a Resource of Cultural Interest and on Spain’s heritage registry: they must not be damaged. School leaders also required little disturbance of everyday school learning. Wireless access control was the obvious answer. Wireless access control devices The school chose SMARTair Wireless Online management for their new keyless access system SMARTair wireless access control devices now control access through 300 doors around the school. A mix of battery-powered escutcheons and weather-proof escutcheons, knob cylinders and wired wall readers (including for lifts), are connected to SMARTair’s intuitive software by a network of 38 wireless communication hubs. The school chose SMARTair Wireless Online management for their new keyless access system. This powerful management option enables real-time security control to limit free access to and around the site, even if the school data network is down. Automated emails inform security staff of any incidents, keeping students, staff, equipment, and precious heritage safe. Issue access credentials “The main benefit is the ease of real-time key management - from any place and at any time - via the wireless online management system,” says IT Manager, Francisco Fernández Soriano. “This increases security for children and for staff, because no unauthorized people can enter the school.” SMARTair locks and readers provide a streamlined way to manage access. Student and staff carry credentials programmed to allow access to specific authorized areas. SMARTair TS1000 software makes it easy to issue and cancel access credentials for temporary visitors such as parents. Installation and integration The system was installed without a hitch and also without any disruption to classes" “In addition to the main entrances and classrooms, access to private spaces such as lifts, offices, staff rooms, the church, the museum, the library and the IT room is constantly monitored,” he adds. “Thanks to our SMARTair devices installed at more than 300 doors, the security team can find out who has accessed which space and when, at any time.” Installation of the school’s new SMARTair system demanded minimal work. Some school doors date to the 16th century, so major alterations to door hardware were not possible. “The system was installed without a hitch and also without any disruption to classes,” confirms Fernández Soriano. Because SMARTair is a modular system, scalability is built in. They can extend or fine-tune their access system when they choose. Indeed, SMARTair’s “Phase II” is already under discussion. Education management software SMARTair software also easily slotted into the school’s existing management workflows. The Colegio Diocesano has used iinventi education management software for the past five years. Integration with SMARTair software was simple: access control, the library and canteen are managed from an integrated system. “SMARTair gives the school’s security team the answers they need,” concludes school director, Reverend José María Fernández-Corredor.
Round table discussion
Driven by technology developments such as voice recognition, smart devices and the Internet of Things, our homes are getting “smarter” all the time. Increasingly, we expect our residential environments to be responsive to our voice commands, whether we are adjusting a thermostat, turning on a light, or lowering the window shade. Smarter home integration yields new opportunities and challenges for home security, too, which contributes an element of safety and protection to the convenience aspects of smart homes. We asked this week’s Expert Panel Roundtable: How are new smart home systems impacting security?
A basic tenet of sales is ABC – always be closing. But it's a principle that most professional salespeople would say oversimplifies the process. Especially in a sophisticated, high-tech market such as physical security, the required sales skills are much more involved and nuanced. We asked this week's Expert Panel Roundtable: What unique characteristics are required of salespeople in the arena of physical security systems?
Where does the time go? Before you know it, here we are at mid-year reflecting on an eventful first half of 2018 in the physical security market. It’s also a good time for our Expert Panel Roundtable to pause and look ahead at what we might expect in the second half of the year. We asked this week’s Expert Panel Roundtable: What technology development will have the greatest impact in the second half of 2018?