Near Field Communication
IDEMIA Secure Transactions (IST), a division of IDEMIA Group, is a provider of payment and connectivity solutions for financial institutions, mobile network operators and automotive manufacturers. IST proudly received the NFC Forum Certification according to the latest Certification Release 13 (CR13) for its NFC key card portfolio. The compliance with this certification includes automotive car access NFC use cases as specified by the Car Connectivity Consortium® (CCC), a cross-industry org...
Telcom, the UK’s provider of dedicated business connectivity, has been selected as a strategic partner to deliver its best-in-class connected building solution Preconnect® to the commercial office space at St. Michael’s Manchester. St. Michael’s Manchester A long-term project by Gary Neville’s development company, Relentless Developments, and its strategic partners, St. Michael’s is a £400 million mixed-use development in the heart of the city....
In the competitive world of physical access control, Big Tech companies are seeking to play a larger role. Physical access competition Apple Wallet continues to stake its claim on mobile credentialing. Amazon One Enterprise is pushing a palm-based identity service. Google/Nest offers smart locks for home access control, with identity and access management provided in the Google Cloud. The entry of these big companies in the historically fragmented physical access control market is causing di...
ISC East 2023, the Northeast’s security and public safety event built by RX Global, hosted in collaboration with premier sponsor Security Industry Association (SIA) and partnership with ASIS NYC, delivered another year of successful programming. Over three days, ISC East featured keynote speakers, educational sessions, professional development, and over 220 exhibitors highlighting the latest technologies and solutions across the security industry. Attendance numbers From Nov...
The Connectivity Standards Alliance, an international community of more than 675 technology companies committed to open standards for the Internet of Things, is proud to unveil Aliro, a new effort aimed at transforming how users unlock doors or other entry points using their mobile device or wearable. Adoption of new technology The Alliance and its members, in pursuit of their mission to promote universal open standards, are creating a new communication protocol with a common credential t...
ECS Industrial Computer Co., Ltd., (ECSIPC) is pleased to announce its participation in GITEX 2023 where it will showcase its latest smart retail turnkey solutions, new gaming and factory automation equipment, as well as its LIVA Z5 series family of mini PCs including LIVA Z5 Plus, LIVA Z5E Plus, and brand new LIVA Z5F Plus. ECSIPC LIVA Z5F Plus applications This highly efficient mini-PC is ideal for smart retail, security, and kiosk installations, and wide-ranging industrial use cas...
News
Attributed to Guy Bauman, Co-Founder & CMO, Ironvest. Ironvest is an all-in-one security and privacy app. Biometrics on social media Guy commented on the launch, “X’s introduction of biometrics is part of a growing trend amongst social media platforms aimed not just at enhancing users’ security but also clamping down on widespread identity fraud and misinformation." "Within the last six months alone, YouTube has asked medical professionals to apply to be a verified ‘source’, while LinkedIn now allows users to confirm their identity to receive a free verification badge for their profile.” Centralised biometrics If fraudsters are able to breach a company’s biometric storage they can steal a huge amount of biometric data" “Biometrics is a really effective way to make sure accounts and personal data can't be accessed by unauthorised users. Yet, it doesn’t get any more personal than biometric data, so users need to be highly aware of how these social media giants are storing their most sensitive information.” “For example, using centralised biometrics, where people upload selfies to be stored in the cloud for verification purposes; leaves social media users highly vulnerable. If fraudsters are able to breach a company’s biometric storage they can steal a huge amount of biometric data given it is all stored in one central place.” Decentralised biometrics “By contrast, decentralised biometrics are now the emerging standard that people should demand of these companies. A person’s biometric data, such as a picture of their face, is called a template." "With decentralisation, the template is broken up into different shards, encrypted, and stored securely on multiple nodes. What this means is that the whole template is never reconstructed again and thanks to a zero-knowledge infrastructure, only you have access to your data.” Self-sovereign identity “Consumers are also right to question if they actually want to trust big tech with their biometrics, especially given these firms’ past history of collecting extensive and potentially unnecessary personal identifying information (PII)." "In reaction to this, and underpinned by the belief that people should be in control of their own identity, there is now a movement towards giving consumers a self-sovereign identity. This means that only the individual has access to and control of their information. This approach ensures that people have complete choice over where and with whom they share their PII with.”
Zenitel, a provider of intelligent communication solutions, announced the launch of two new door entry intercoms: the Turbine Extended Intercoms TEIV1+ and the TEIV4+. The new products display Zenitel's commitment to providing convenient and secure entry via best-in-class audio and video performance with hassle-free access control. New door entry intercoms "'Secure, Convenient Access' is the key message behind the product launch. We are excited to provide security system integrators and building owners with these new door entry intercoms,” says Peter McKeag, Product Manager for Zenitel. Peter McKeag adds, “Our goal is to help them simplify and secure their access control solutions. We also want to provide them with the freedom to select third-party accessories to meet their project's requirements.” TEIV1+, TEIV4+ The TEIV4+ is designed to provide convenient access with a card reader of the user’s choice The TEIV1+ is designed to simplify a visitor’s experience with PIN-based access control and easy-to-use scroll and direct calls. The TEIV4+ is designed to provide convenient access with a card reader of the user’s choice. With the TEIV4+ it is also possible to house access control card readers like HID & Elatec, removing the need for separate card reader mounting products. Audio and Active Noise Reduction features Extending on Zenitel’s world-renowned Turbine platform, both new intercoms are engineered to provide the best audio and video communication performance tailored to every environment. Zenitel’s solutions deliver the best audio technology, with Automatic Volume Control, Acoustic Echo Cancellation, and Active Noise Reduction features. HD video quality This new range further expands its feature set with a wide-angle lens and exceptional low-light performance while maintaining HD video quality. As always, Zenitel products are engineered to provide high availability, even in the most demanding environments. They are backed by Zenitel’s promise of long-lifetime components, up-to-date technologies, and long-term technical support of systems and devices.
Sharry, a workplace experience platform around digital employee badges, announces that it has received LenelS2 factory certification and joined the LenelS2 OpenAccess Alliance Program (OAAP). Sharry's solution interfaces with the OnGuard® access control system to further support the delivery of employee badges in Apple Wallet. Sharry receives LenelS2 factory certification Sharry provides a user-friendly web interface for access control management and visitor management" John Marchioli stated, “Sharry has completed the latest required factory testing at LenelS2 to validate the functionality of its interface to the OnGuard system. Sharry provides a user-friendly web interface for access control management and visitor management, along with support for Apple Wallet mobile credentials." "These capabilities are now interfaces into the OnGuard platform,” said John Marchioli, OAAP Product Management, LenelS2, adding “We look forward to their continued involvement in the LenelS2 OpenAccess Alliance Program.” LenelS2’s OnGuard platform “We have been successfully working with LenelS2 for years and we are happy that our collaboration continues with a successful completion of the latest certification process. We consider LenelS2’s OnGuard platform to be the benchmark in the security industry and access control. We are thrilled to complement LenelS2’s security solutions with our PortalWX user interface, allowing access control management to be easily delegated to non-security professionals," said Josef Šachta, CEO and Co-Founder of Sharry. Josef Šachta adds, "This empowers tenants to take full advantage of advanced access control features. Last but not least, our integration with Apple Wallet credentials will elevate the user experience to the next level.”
Logpoint announced a partnership with METCLOUD in the UK to address fundamental cybersecurity challenges for organisations as the threat landscape worsens and cybersecurity expertise becomes increasingly scarce. METCLOUD will offer Logpoint Converged SIEM, including SIEM, SOAR, UEBA, AgentX, and Business-Critical Security (BCS) technologies, to empower customers to efficiently manage, identify and remediate cyber threats across the business landscape. Logpoint’s cybersecurity platform “Logpoint’s solutions give us a greater breadth of capabilities around predictive and preventative analytics, and management and insights across the technology landscape. Logpoint has a unique offering with BCS for SAP, enabling us to address the significant SAP ERP market,” says Ian Vickers, CEO at METCLOUD. SAP customers account for 87 percent of total global commerce, which is an enticing target for cybercriminals. Furthermore, the rapid adoption of AI/ML, IoT, OT, VR, Digital Twins, Robotics and Automation makes for a more connected world and as such significantly increases the risks of cyber attacks.” METCLOUD developed its own AI and Data Analytics services that blend with Logpoint fused SIEM METCLOUD is providing Logpoint Converged SIEM and support services via their award-winning private and hybrid cloud offering. Logpoint’s cybersecurity platform protects the entire business by providing comprehensive threat detection, investigation and response across clients, servers, network systems, cloud workloads and business-critical applications. In addition, METCLOUD has developed its own AI and Data Analytics services that integrate with Logpoint converged SIEM to further accelerate the speed of threat detection and remediation. Cybersecurity operations platform “We’re excited about the synergies that the partnership between METCLOUD and Logpoint brings to market. The ability for mid-market organisations to consume SIEM-as-a-Service with SOAR capabilities included is valuable because it speeds up threat detection and remediation and this sector tends to lack the expertise, resources and experience required,” says Jesper Zerlang, CEO at Logpoint. “For larger organisations that are likely to have well-established SOC capabilities in-house, Logpoint BCS for SAP is a unique, enhanced security offering that adds more capabilities to existing teams.” Logpoint has a range of customers in the UK, spanning the public sector and industries like finance, manufacturing, defence, and retail. By converging SIEM, SOAR, UEBA, endpoint security, and BCS technologies into a cybersecurity operations platform. The platform is available on-prem, in private cloud, and as SaaS.
Jamf, the standard in managing and securing Apple at work, kicked off its 14th annual Jamf Nation User Conference (JNUC) both virtually and in-person in Austin, Texas. Joined by key partners and customers including Apple, Google and Microsoft, Jamf shared with the largest gathering of Apple admins how its continuous product innovation is bringing together management and security into one integrated platform. Author's quote “Jamf’s industry-pioneering Apple management and security solutions, delivered as an integrated platform, help IT and security teams deliver an experience that is loved by users and trusted by organisations,” said John Strosahl, CEO of Jamf. Jamf’s Apple management and security solutions help IT and security teams deliver experience He adds, "We’ve said many times that when Apple innovates, Jamf celebrates. We are so confident in Apple’s continued success that we believe Apple will flip the market over the next decade and be the #1 end-user technology used in the enterprise - and Jamf is the #1 partner to help organisations succeed with managing and securing Apple.” JNUC theme This year’s JNUC theme focused on the power of AND. Jamf bridges the gap between what Apple provides and the enterprise needs. It’s bringing together management, identity and security required to be successful with Apple at Work. It’s what Jamf calls Trusted Access and it’s an outcome organisations can achieve when they manage and secure their Mac and mobile devices with Jamf, regardless of if they are for a person or a purpose. JNUC 2023 Key highlights from JNUC 2023 include: Jamf announced the release of Jamf Pro 11, which introduces an entirely refreshed user interface Jamf announced the release of Jamf Pro 11, which introduces an entirely refreshed user interface that improves accessibility with colour changes, tab support for navigation elements, and improved screen reader behaviour and easy shortcuts to many of the most popular workflows. This new look will be extended to Jamf’s entire product portfolio in the future, providing the consistent experience that users expect. Jamf Pro 11 Jamf Pro 11 also supports Apple’s Declarative Device Management including new software update management workflows, which will allow admins in Jamf Cloud to schedule and enforce the latest software updates on managed devices by a specific date and time automatically. Apple announced they are further enhancing enrolment workflows with Account Driven Device Enrolment which will be supported in Jamf Pro 11 for macOS Sonoma and iOS 17. Additionally, Jamf Pro 11 includes a simplified and more transparent onboarding experience for end users that allows them to monitor app installation progress as they go about their work. Rapid Security Response updates Jamf announced the addition of a new compliance dashboard and vulnerability management to Jamf Protect. Admins can now see the overall compliance status of their environment at a glance. Jamf told the addition of a compliance dashboard and vulnerability control to Jamf Protect They are also able to easily see which apps and OS versions in their environment are impacted by known Common Vulnerabilities and Exposures (CVEs), empowering them to make smarter decisions around access policies and patching priorities. Earlier this year, Jamf Pro added support for Rapid Security Response updates to provide admins with complete visibility and control over important security updates. Streamlined user enrolment and single sign-on Jamf and its identity partners are at the forefront of SSO Extensions. Earlier this year, Jamf introduced support for Enrolment SSO with Okta. In addition, Jamf was also first-to-market with support for Platform SSO with Okta. Enrolment SSO and Platform SSO workflows deliver a next-generation single sign-on experience across Mac and mobile devices. ZTNA incorporated into Jamf Connect Jamf has enhanced Jamf Connect’s IAM capabilities to include ZTNA to provide the least-privilege Since 2018, Jamf Connect has helped organisations bring cloud identity to the Mac. Now Jamf has enhanced Jamf Connect’s Identity and Access Management (IAM) capabilities to include Zero Trust Network Access (ZTNA) to provide least-privilege and high-performance connectivity to cloud and on-premises data resources from macOS, iOS, iPadOS, Android and Windows devices. This turn-key ZTNA solution leverages next-generation networking technology that is easy to deploy while providing welcomed user experience improvements for end users. Replacing legacy VPNs, this solution is efficient, reduces cost, and is far more secure through integrations with Jamf’s platform of products. Jamf Employee Badge Through a partnership Jamf unveiled at JNUC last year with SwiftConnect, Jamf has done away with physical access badges, allowing Jamf customers to badge into buildings with iPhone or Apple Watch. During the keynote, Jamf shared new enhancements to its Employee Badge offering that allows Jamf to send device risk signals or user events that will temporarily disable an employee badge until the device is back in full compliance. Jamf Employee Badge with Jamf Trust brings digital trusted access policies to the physical world, ensuring that only trusted users on secure devices are able to access buildings and offices. MITRE attack framework Jamf also shared its vision for how AI will continue to be integrated into its security products Jamf announced its new AI-powered support bot that will serve Jamf Nation, the largest community of Apple admins in the world. This new chat interface brings together Jamf’s online community, learning hub and technical documentation, so that Jamf admins will be able to ask it questions and receive answers to help resolve issues. Jamf also shared its vision for how AI will continue to be integrated into its security products. This new AI-powered functionality takes detailed raw telemetry and security alert data, applies the MITRE attack framework and summarises a friendly explanation along with recommendations for Jamf admins on how to remedy security issues. This exciting feature will be integrating within Jamf Solutions in the near future. Jamf Safe Internet Jamf announced a brand new user interface for both Jamf School and Jamf Teacher to add more efficiency and visibility to the console, something that is essential for teachers in busy classrooms. Additionally, Jamf is bringing its most requested feature from Jamf Pro, App Installers, to Jamf School to provide a more complete Mac management experience in the solution designed specifically for education. Jamf has rolled out on-device content filtering within Jamf Safe Internet for supervised iOS To further protect students and learning institutions, Jamf has rolled out on-device content filtering within Jamf Safe Internet for supervised iOS and iPadOS 16+ devices. This feature stops both inbound threats and unsafe outbound activity while ensuring greater privacy for students. Jamf is planning macOS support for on-device content filtering later this year. StateRamp Ready instances Jamf recently announced it is now delivering StateRamp Ready instances of Jamf School and Jamf Pro in the United States to give customers the confidence they need to comply with industry standards. StateRAMP is a critical cloud security assessment and authorisation programme designed to address the specific technology and compliance requirements of educational organisations and state and local governments.
Matrix Comsec, a pioneering provider of comprehensive telecom and security solutions, joined hands with MK Agencies to host an exclusive edition of Partner Connect 2023 at the prestigious Hyatt Centric in Chandigarh. The event, held on 16th September 2023, showcased Matrix's latest cutting-edge products and solutions in the telecom and security domains, attracting industry providers, system integrators, and business associates from around the world. Matrix's Video Surveillance solutions With over three decades of experience, Matrix has consistently delivered technology-driven solutions, offering a wide range of advanced products across Telecom, Video Surveillance, Access Control, and Time-Attendance domains. The event highlighted Matrix's commitment to innovation and customer-centric approach. One of the main highlights of the event was Matrix's IP Video Surveillance solutions, addressing key customer challenges such as bandwidth and storage space utilisation, multi-site office management, and proactive security. Attendees had the opportunity to explore a diverse range of 2MP/5MP/8MP Matrix Cameras, including Turret, Dome, Bullet, and PTZ Cameras, providing high-clarity images for detailed scenario analysis and adhering to the latest data security guidelines. Matrix COSEC PANEL200P Event highlighted Matrix's role as sole OEM offering a wide range of business contact Matrix's comprehensive Access Control and Time-Attendance products developed entirely in-house, were also showcased. The spotlight was on COSEC ARGO FACE, an intelligent door controller equipped with high-speed face recognition technology, featuring modern security capabilities. Additionally, the versatile Matrix COSEC PANEL200P, a multifaceted Access Controller Hub, capable of managing 255 door controllers and 25,000 users, was demonstrated. In the telecom domain, Matrix exhibited its range of Telecom products, including Media Gateways and IP-PBXs, presenting industry-specific solutions for diverse sectors. The event emphasised Matrix's position as the sole OEM offering a comprehensive range of business communication products and solutions in the Telecommunications industry. Author's quote Kaushal Kadakia, Marketing Manager at Matrix Comsec, expressed his satisfaction with the event, stating, "Matrix Partner Connect successfully brought together system integrators and potential business partners, offering them a distinctive platform for connection and cooperation." He adds, "Our goal of establishing fresh collaborations and broadening our network was achieved by assembling essential industry players in a single venue. This event has served as a catalyst for meaningful engagements, fostering industry growth. We are enthusiastic about the interactive and fruitful atmosphere that opened up new avenues for business in the security and telecom industry."
Expert commentary
GSX 2023 marks a poignant moment for the security industry as an increasingly complex risk landscape converges with the acceleration of technology innovation. Emerging from this environment are three key trends that will dominate the conference and the future of the security industry: (i) the adoption of AI, (ii) the use of predictive analytics, and (iii) a hybrid global and local risk management approach. As Chief Security Officer of Crisis24, a GardaWorld company, I regularly advise clients on how these trends are evolving and impacting their security and risk management approach. Here’s how we can expect to see them discussed at the show next month: Trend 1: Artificial intelligence is the new industry standard. AI is this year's buzzword. While AI is not new to the industry, this year it has become a standard to operate with AI being adopted or expanded more ubiquitously. Legacy AI-enhanced security offerings that have been years in the making are becoming more advanced and are being integrated into expert analyst teams to leverage the best of both man and machine. Limitations AI augments the data processing ability; however, human-led intelligence is still necessary AI can generate unparalleled levels of data and insights, but it also has its limitations. AI does not have the emotional intelligence that can influence decision-making. For instance, our Crisis24 analyst teams know that every one of the intelligence alerts they provide to leadership may save a life or protect a business. AI augments the data processing ability; however, human-led intelligence is still necessary to effectively elevate knowledge of those threats through an organisation to incite action. Trend 2: Predictive analytics powered by AI will transform security operations. Predictive analytics enabled by AI will allow for more precise planning and execution of true emergency management. Those living or operating in conflict zones must be ready to spring into action and predictive analytics can help better evaluate risks, threat levels, and the probability of certain events. When I served in Iraq in 2003, our greatest challenge was operating in an unpredictable environment and navigating the many unknown threats. With these large-scale threats, it was difficult to account for the vast array of variables involved and ensure that all parties were protected. Broad and instant visibility Predictive analytics provides broad and instant visibility into numerous potential outcomes, impacts, and mitigation strategies for a wide variety of threats. When dealing with risks that are constantly evolving and quickly accelerating, the insights from predictive analytics can have a direct impact on risk management, mitigation strategies, and preparedness levels. Predictive analytics can anticipate the ripple effect that threats can have on organisations, their people, and their assets and enable security teams to plan. Trend 3: Risk mitigation is increasingly both global and hyper-local. A company’s workforce is often scattered across the country or the world, working from home or on the go Remote work and a flood of 24/7 data sources have driven demand for timely, accurate, and hyper-local intelligence. Where before an organisation may have had a handful of facilities around the world where its employees gathered, now a company’s workforce is often scattered across the country or the world, working from home or on the go. Preventive mitigation steps To keep their people and assets safe, business pioneers need to know what’s happening in all corners of the globe, while also easily accessing details on what is happening at the street corner level. How a business takes care of its people, including anticipating risks and taking preventive mitigation steps as well as responding quickly in the face of threats, can directly affect its reputation. Every company is in the business of safety and security when it comes to looking after its people on a global, national, and increasingly hyper-local scale.
Physical security is essential for a modern production facility, users don’t want just anyone entering the building or accessing secure areas. But what about production machinery? Machine authentication is often a missing link in the security plan for manufacturers. Why machine authentication? Most manufacturers have made significant investments in physical access control (PAC) for production facilities. Few shops currently hand out physical keys to employees or leave the building unlocked during production hours. For all but the smallest shops, front-door access typically involves individual radio-frequency identification (RFID) badges that enable tracking of who is coming and going and at what times. Use of physical keys, password login It is simply assumed that anyone who has access to the factory floor has the knowledge, authority, and training But when it comes to production machinery, many manufacturers still rely on physical keys, password login on the human-machine interface (HMI), or a shared PIN to unlock machine access. In some shops, machines may not be secured at all, it is simply assumed that anyone who has access to the factory floor has the knowledge, authority, and training to use the machines responsibly. However, this is not necessarily a good assumption, especially in a larger manufacturing plant where many people can access the production floor. Valuable and sensitive equipment CNC machines, robotic welders, process equipment, and other production machinery can cost anywhere from $5,000 to half a million or more, depending on their size and function. They also have significant safety risks for untrained users and may hold valuable and sensitive IP (such as customer design specs or batch recipes). User authentication Authenticating users at the machine level closes an important security loophole and makes plants safer and more productive. Machine authentication prevents untrained or unauthorised users from accessing production machinery. The right authentication system also allows access levels to be tailored for different users based on training credentials, job roles, or even projects. Machine authentication benefits A strong machine authentication solution provides several benefits for manufacturers: Minimises unplanned downtime and expensive damage to machines caused by untrained operators. Enables tracking of production outcomes by machine operator for better quality control and troubleshooting. Protects company and client IP held on the machine by preventing unauthorised access to machine controls and memory. Enhances plant safety and compliance by limiting machine access to operators with the appropriate credentials. Reduces the risk of deliberate sabotage by unauthorised operators, including damage to machines and production facilities and data theft or corruption. Mark Merino, the Director of the Digital Factory Group for Polaris Automation, explains, “Machine authentication allows us to identify which people are logged into different pieces of equipment and make sure they are trained appropriately for the machine and have the right clearances for the data they are trying to access.” Choosing the right machine authentication solution Access control for production machinery can be accomplished by various means, including password and PIN systems, physical keys or fobs, RFID badges, or smartphone-based mobile credentialing systems. The best machine authentication system will: Be highly reliable and secure to protect the machine from unauthorised access. Enable identification of individual operators and tracking of who has used the machines, at what times, and for what projects. Allow access levels to be differentiated by the user. Be easy to implement and administer. Discourage sharing or cloning of credentials. RFID readers An RFID reader can be easily connected to or integrated with the HMI for the machine In most manufacturing environments, the simplest solution for machine authentication is the RFID badge employees already carry for building entry. An RFID reader can be easily connected to or integrated with the HMI for the machine. All users must do to authenticate themselves is swipe their badge over the reader to unlock machine controls. RFID benefits RFID provides multiple benefits for end users, IT, and managers: It leverages technology already widely used, so users do not have to carry a separate key or fob to access machine controls. It is more secure and easier to manage than a password system, as passwords are frequently forgotten, shared, or hacked. Unlike shared PINs, physical keys, or fobs, user authentication via an ID badge enables accurate identification of who is logging into the machine. Users are much less likely to share their picture ID badge (which is often also linked to HR functions such as time and attendance) than a machine password, PIN, or key. If an ID badge is lost or stolen, or an employee leaves the company, IT can easily disable access to the card. RFID credentials are very difficult to hack or clone. Transmission between the reader and card can be encrypted for added security. Unlike biometric options, RFID is highly reliable even in hot, dirty, or humid environments and does not require workers to remove gloves, safety goggles, or masks. Getting started with machine authentication Machine authentication starts with selecting the right RFID reader. A universal RFID reader supports easy implementation, integration with other building systems, and scaling. A universal reader also provides flexibility for the future in case companies want to change transponder technologies or allow for user authentication using mobile credentials on a smartphone. IIoT model User authentication must be designed within the context of the wider security ecosystem of the plant To ensure the security of production machinery, user authentication must be designed within the context of the wider security ecosystem of the plant. Modern production machines are increasingly networked and connected in an “Industrial Internet of Things” (IIoT) model. That means machines are not only vulnerable themselves but are also endpoints in the broader IT landscape of the plant. Machine authentication systems must incorporate best practices for endpoint security, such as those outlined by ISO (International Organisation for Standardisation), NIST (National Institute of Standards and Technology), and other industry organisations. Best practices: The reader installation should be tamper-proofed to prevent physical disruption of the authentication system. Use an encryption standard suitable for the security level of the application. Encryption prevents data interception or card cloning. If higher security is desired, RFID can be implemented as part of a multi-factor authentication system along with biometrics and/or a password or PIN. The authentication system should support different access levels for different users or classes of users. A role-based permission system allows for different levels of access for line operators, supervisors, IT, and maintenance, for example. For maximum safety and security, individual users should only have the minimum access required to do their jobs. With secure machine authentication, manufacturers can protect people, production equipment, and IP, while enabling smooth operations. It all starts with an authentication system that supports reliable and secure operator identification at the machine level.
Mass attacks continue to lead the news far too often. All are horrific and disturbing, but the heartbreaking tragedies that have unfolded on school campuses touch us the deepest and have the most profound effects on our communities. NTAC statistics According to a January 2023 report from the United States Secret Service National Threat Assessment Center (NTAC), K-12 events accounted for 6% of all mass attacks in public and semi-public spaces between 2016 and 2020. 6% may strike some as being a small number, given all the coverage. Safeguarding schools and campuses By no means does the statistic diminish the pressing need for K-12 stakeholders to better safeguard their schools While the finding indicates campus attacks are relatively rare, that doesn’t mean they are any less significant. And, by no means does the statistic diminish the pressing need for K-12 stakeholders to better safeguard their schools with the most appropriate strategies, technological solutions, training, and other available resources to address vulnerabilities and thwart violence in K-12 schools. What we are learning about mass attacks Questions come up about how mass attacks are evolving and what we’re learning about perpetrators and their tactics. It’s more accurate to describe the circumstances and behaviours as fluid. There’s no obvious straight line that’s simple to track. However, there is reliable research that shows progress is being made in assessing how a range of observable concerning behaviors may play a factor. MAPS report The most comprehensive resource for insights into warning signs is the latest U.S. Secret Service NTAC report cited above that was released early in 2023 titled “Mass Attacks in Public Spaces: 2016 – 2020”. Called MAPS for short, the report details the extensive research and data behind identifying and recognising behaviours that may (but not always) escalate into attacks. Help, and guide communities Sometimes budgeting for higher cost measures but more often, it’s the simpler, lower-cost options It’s valuable content that has the potential to significantly help professionals with interventions and guide communities that are in the process of improving their safety and security protocols, technology decisions, and training to protect schools and other public spaces. Research like this is critical and a worthy investment. So is the need to wisely fund physical security solutions. Sometimes that means budgeting for higher cost measures but more often, it’s the simpler, lower-cost options that are the most appropriate, effective, and necessary. Taking action Parents, faculty, administrators, students, and the public in general rightfully are putting more pressure on school districts, other local education agencies (LEAs), state educational agencies (SEAs), and legislatures. Stakeholders want to make sure earnest efforts are being taken to assess the status of their schools’ safety and security vulnerabilities, enact remedial measures, and provide much-needed funding. Fortunately, more action is being taken at the local, state, and federal levels. Minimum safety levels For example, after Uvalde, Governor Greg Abbott quickly charged the Texas Education Agency (TEA) with assessing public school safety across the state and creating rules to ensure a minimum level of safety on all K-12 campuses. The Texas legislature also took swift action to strengthen programmes and funding and created an investigatory committee to learn how the perpetrator gained access and to identify points of failure in the response. School emergency plan standards Senate Bill 11 proposes creating a new Office of Safety and Security at TEA to work with TxSCC) November 2022, the TEA proposed updated standards with a strong focus on access control relating to exterior perimeter doors and exterior classroom doors, which must operate as fully intended and remain closed, latched, and locked to prevent unauthorised entry. Senate Bill 11 proposes creating a new Office of Safety and Security at TEA to work with the Texas School Safety Center (TxSCC) to develop greater requirements and guidance for establishing school emergency plan standards and provides for a conservator to be assigned to districts that fail to meet those standards. Annual intruder detection audit The bill also calls for the TxSCC to conduct at least one intruder detection audit annually and another every four years that would include a more detailed vulnerability assessment of campus emergency procedures and access control measures. In addition, the bill proposes tightening Texas truancy laws; truancy is considered a red flag for school officials that a student might need a school counselor. Safety and security requirements House Bill 3, which Governor Abbott signed into law on June 14, also creates new safety and security requirements. Among its provisions, the legislation requires district employees who regularly interact with students to complete evidenced-based mental health first aid training programmes. And it creates new requirements for security officers at school campuses as well, including the completion of active shooter response training programmes at least every four years that are approved by the Texas Commission on Law. Improving public schools ESSER III dollars are quickly being put to good use under the Elementary and Secondary School Emergency Relief Fund All these efforts are a step in the right direction. While extra time and dollars would have been beneficial for conducting more comprehensive surveys and research, what states like Texas are accomplishing is significant. Other good news is that the remaining ESSER III dollars are quickly being put to good use under the Elementary and Secondary School Emergency Relief Fund. The acceleration came on the heels of clarification about how those allocations could be applied to safety and security programmes when part of improving the condition of public school buildings and property. Fundings for schools Ideally, any future funding programmes will clarify how the funds can be used for safety and security improvements much earlier in the process so school districts can apply for that funding sooner. It’s all in the interest of using resources wisely. Staying efficacious Urgent action to create new rules and bills for improving best practices is a good thing. However, there have been instances, where moving too fast has resulted in ideas or decisions that need more information regarding the practicality, costs, or effectiveness of a solution, even though the intention was good. Identifying the problem It’s critical to take the time to clearly identify and define the problem that needs to be solved That’s why it’s critical to take the time to clearly identify and define the problem that needs to be solved. What’s the intended outcome? What latitude is there for funding? What alternatives exist? What do the experts advise? What successes have other school districts had in similar situations and deploying similar solution choices? Budget allocations Let’s say there’s a mandate to harden every window and glass door on the first floor of every school with ballistic glass. The budget allocation is $10 million and needs to cover 2,000 campuses across the state. Given the average cost of ballistic glass, that would only be enough to retrofit about four or five openings per school, which would be a major shortfall when considering all the windows and glass doors that are typically on the first floor of most schools. Due diligence The point is that while expediency is important, it shouldn’t come at the expense of due diligence. It takes earnest consultation with stakeholders and experts as well as evidence-based rationale when it comes to recommending the most effective solutions and protocols for improving school safety and security. Doing the simple things well Plan when the timing and funding will make it realistic and appropriate to move on to the next tier Often the best solutions are relatively simple and low-cost to procure, install, and maintain, like retrofitting classrooms with door hardware that can be readily locked from either side, lock status indicators to immediately tell if the room is secured, and silent panic buttons that teachers can activate in an emergency. In short, do the simple things first and do them well. Then plan when the timing and funding will make it realistic and appropriate to move on to the next tier of physical security solutions. Attack-resistant safety/security film treatments Many schools are hardening glass with attack-resistant safety/security film treatments, which helps delay and deter intrusions to buy extra time for first responders to arrive. Some campuses are designing hardened vestibules with ballistic-resistant glass inside main entries to ensure staff safety when screening visitors and contractors. Access control and video surveillance Taking extra measures to strengthen auto and pedestrian traffic routing, tightening access control, installing additional video surveillance cameras, and other new technologies are also part of school security strategies. To find out what security solutions schools across the country have been investing in, see the latest report from the US. Department of Education. Advanced physical security technology We keep moving forward producing better and better options that help us fulfill our responsibility These investments are good signs. At the same time, we know one size doesn’t fit all. We also realise that even though there are plenty of excellent and reasonable solutions available and advanced physical security technology being developed, there is no cure-all. But the industry is determined never to let our guard down. We keep moving forward producing better and better options that help us fulfill our responsibility as security professionals. Programmes start with the right team and tools Careful planning requires a collaborative and broad team of school and district stakeholders. It also needs to include input from security solutions providers who offer consultative expertise. Successful implementation of safety protocols, procedures, and security technology also depends on a commitment to comprehensive staff training that’s followed up with regular updates and refresher sessions. Districts must be ready and able to support and fund such an important commitment. PASS Safety and Security Guidelines Clearways for schools to determine the right solutions based on budget availability, timing, and the issues Whether a school and/or district/LEA is in the earlier stages of developing a programme or already has one fully in place, it can also always benefit from the free resources, information, and advice available from the Partner Alliance for Safer Schools and its 6th Edition of PASS Safety and Security Guidelines for K-12 Schools. Dedicated PASS volunteer advisors have years of valuable school security experience and a rich history of success. Their tiered approach outlines clear ways for schools to determine the right solutions based on budget availability, timing, and the issues they face. School safety and security School safety and security will always be a work in progress. It’s an effort that will continue to require further insight into what motivates perpetrators and what mental health professionals can do to intervene. And there will always be an ongoing need to invest in shoring up physical security and vigilance in ways that won’t detract from a comfortable, positive, and safe learning environment.
Security beat
Companies at GSX 2023 emphasised new ways that technologies such as artificial intelligence (AI) and the cloud can address long-standing issues in the security market. Among the exhibitors at the event in Dallas were companies seeking creative ways to apply technology, lower costs, and make the world a safer place. Reflecting on the exhibition, here are some additional takeaways. Expanding AI at the edge i-PRO is a company reflecting the continued expansion of edge AI capability in the security market. Today, more than half of the company’s lineup supports AI at the edge so the customer has a wide choice of form factors when seeking to leverage the feature set. AI processing relay, extended warranty i-PRO is increasing their warranty period from 5 to 7 years, which could be a lifetime warranty in some cases I-PRO also has an “AI processing relay” device that accepts non-AI video streams and applies edge analytics. AI has progressed from a high-end technology to a feature available in a variety of cameras at different price points. i-PRO is also increasing its warranty period from 5 to 7 years, which could be a lifetime warranty in some cases depending on a customer’s refresh schedule and lifecycle management. Active Guard, MonitorCast The company’s video management system (Video Insight) is continuing to build new features including “Active Guard,” an integrated metadata sorter. Their access control platform, MonitorCast, is a Mercury-based solution that is tightly integrated with Video Insight. Their embedded recorders now have PoE built in. “We can move at a faster pace to fill out our product line since leaving Panasonic,” says Adam Lowenstein, Director of Product Management. “We can focus our business on adapting to the market.” Emphasis on retail and other verticals Shoplifting is a timely issue, and retail is a vertical market that got a lot of attention at GSX 2023. “We see a lot of retailers who are primarily interested in protecting employee safety, but also assets,” says Brandon Davito, Verkada’s SVP of Product and Operations. “Shrinkage is a CEO-level priority.” “Retailers are getting more engaged with security posture, instead of letting perpetrators walk,” Davito adds. Intrusion detection Verkada has an intrusion product that will notify a central station if there is an alarm On the alarm side, Verkada has an intrusion product that will notify a central station if there is an alarm, and operators can review videos to confirm the alarm. Other capabilities seeking to discourage trespassers include sirens, strobes, and “talkdown” capabilities. International expansion Verkada continues to expand internationally with 16 offices in all, including Sydney, Tokyo, and London. The core value proposition is to enable customers to manage their onsite infrastructure more simply, including new elements such as PTZ cameras, intercoms, and visitor management. Verkada emphasises ease of use, including a mobile application to allow access to be managed across the user base. Forging partnerships “We are committed to the channel and industry, and we continue to build relationships and expand our reach,” says Davito. Among the industry relationships is a new partnership with Convergint, which was hinted at during the show and announced later the same day. They are also expanding their partnerships with Schlage, Allegion, and ASSA ABLOY. Working with other verticals They offer new features for K -12 schools, and a new alarm platform is easier to deploy and manage Verkada has also found success across multiple other verticals, notably healthcare, where they integrate with an electronic medical records system. They offer new features for K-12 schools, and a new alarm platform is easier to deploy and manage. They are integrating wireless locks to secure interior doors in schools, looking to secure the perimeter, and installing guest management systems. Transitioning the mid-market to the cloud Salient is squarely focused on the “mid-market,” a large swath of systems somewhere between small businesses and enterprise-level systems. Pure cloud systems are not as attractive to this market, which has a built-out infrastructure of on-premise systems. Adding a camera to an existing system is easier and less expensive than tying it to the cloud. Benefits of cloud It’s a market that may not be ready for the pure cloud, but there are benefits to be realised from adding a cloud element to existing systems. “We are continuing to augment our premise-based solutions with added cloud capabilities and flexibility,” says Sanjay Challa, Salient’s Chief Product Officer. The feedback Salient hears from their customers is “I want to own my data.” The hybrid cloud approach offers the right mix of control, flexibility, and unit economics. Cloud add-on capabilities We want to provide the flexibility for customers to go full-cloud as it becomes more economically attractive" Cloud add-on capabilities include bringing more intelligence about system operation to the user via the cloud. Over time, Salient expects to sell more cloud-centric offerings based on feedback from integrators and customers. “We want to provide the flexibility for customers to go full-cloud as it becomes more economically attractive over time,” says Challa. Vaidio AI technology Salient seeks to be a transition pioneer to help customers realise the path to the cloud. Their approach is “crawl, walk, run,” and helping customers make the transition at each stage. Salient has added AI to its product offering, incorporating Vaidio AI technology from IronYun into a powerful suite and broad array of on-premise analytics, which are gaining traction. The seamless approach makes it easy for customers to embrace AI analytics, although Salient remains broadly committed to open systems. Addressing ‘soft’ features for integrators AMAG is in the process of enhancing its product line with the next generation of access control panels. However, “product” is just part of the new developments at AMAG. In addition to “hard” features (such as products), the company is looking to improve its “soft” features, too; that is, how they work with the integrator channel. Integrator channel Rebuilding a process to make your organisation more efficient, is relatively easy; it just takes a lot of persistence" “We have the depth of our legacy customer base we can learn from, we just need to close the feedback loop quicker,” says Kyle Gordon, AMAG’s Executive Vice President of Global Sales, Marketing, and commercial Excellence, who acknowledges the value of reinstating face-to-face meetings after COVID. “We are laser-focused on nurturing our integrator channel,” he says. “Developing new features takes time, but rebuilding a process to make your organisation more efficient, that’s relatively easy; it just takes a lot of persistence,” says Gordon. More cohesive internal communication is another useful tool, he says. Disrupting the cloud based on price Wasabi is working to make cloud applications less expensive by offering a “disruptive” price on cloud storage, $6.99 per terabyte per month (80% less than hyperscalers). Contending “hyperscalers” like AWS are charging too much for cloud storage, Wasabi is using its own intellectual property and server equipment co-located in data centres around the world. Wasabi sells “hot cloud storage,” which refers to the fact that they only have one tier of storage and data is always accessible. In contrast, a company such as AWS might charge an “egress fee” for access to data stored in a “colder” tier. Cloud storage “We saw that several video surveillance companies had not yet adopted cloud storage, and we saw an opportunity to make it easy to use,” said Drew Schlussel, Wasabi’s Senior Director of Product Marketing. “We just install a little bit of software that allows them to store data in the cloud and bring it back from the cloud.” Performance, protection (cybersecurity), and price Wasabi works with integrators, resellers, and distributors and also integrates with VMS companies Wasabi works with integrators, resellers, and distributors and also integrates with VMS companies such as Genetec and Milestone. Emphasising performance, protection (cybersecurity), and price, their data centres are certified to SOC 2 and ISO 27001 standards. Faster throughput for weapons detection Xtract One is a young company focusing on weapons detection in a time of accelerated concern about gun issues post-COVID. Founded in Canada and based on technology developed at McMaster University, Xtract One has found a niche in providing weapons detection at stadiums and arenas. These customers already have budgets, and it is easy to shift the money to a newer, faster technology. Madison Square Garden in New York City is among its customers. Cost savings solution Xtract One can increase throughput to 30 to 50 people per entrance per minute (compared to 5 to 6 people per minute when using metal detectors). The solution doesn’t require anyone to empty their pockets and the system alarms on items beyond guns and knives. Using Xtract One allows customers to reduce the number of screening lanes and security staff, providing additional cost savings, all while getting fans through the screening process in half the time. Purpose-built sensors The system uses purpose-built sensors looking for specific characteristics, such as reflective and density properties In addition to stadiums and arenas, Xtract One, formerly Patriot One, is also getting “inbound” interest from schools, hospitals, manufacturers, and other verticals that makeup 50% of their business. “We’re on a rocket ride, mainly because the weapons issues are not going away,” says Peter Evans, CEO and Director at Xtract One. The system uses purpose-built sensors looking for specific characteristics, such as reflective and density properties, all correlated by an AI engine. Providing early warning of violence ZeroEyes is another company focused on weapons detection. Their AI gun detection system works with video images to identify if someone is “brandishing” (carrying) a weapon. In other words, the system does not detect concealed weapons. Identifying someone carrying a weapon provides early warning of a possible violent act. Increased response with AI-enables images Images are identified by AI and sent to a monitoring centre where a human confirms the image before contacting first responders. Knowing the location of a shooter enables staff to lock entry points, move people to safety, and direct first responders. The company was founded to leverage existing camera views to stop mass shootings and gun violence by reducing response times.
Large-scale events, including both corporate and sporting events, are coming back strongly in the aftermath of the pandemic. With the increase in activity comes more demand for oversized credentials preferred by many event planners and end users. Pent-up demand due to the pandemic has caused a tremendous uptick in the entire ID card industry in 2022. The return of large-scale events and in-person trade shows will extend the higher demand for cards well into 2023 and beyond, says Andrew Schonzeit, President of Idesco, a provider of ID card solutions. Supply chain concerns Supply chain concerns will continue as companies seek to upgrade and purchase new ID printers and badges An impact of the pandemic was a shortage of supplies related to the ID card industry, says Schonzeit. Like other industries, several leading ID card and printer manufacturers had supply chain issues, and some deliveries were delayed at times for more than six months. Supply chain concerns will continue into 2023 as more companies return to the workplace and others seek to upgrade their current systems and purchase new ID printers and badges. Persistent price increase concerns “The shortage created hardships for end users and often resulted in them purchasing any solution that was readily available even if it was not the preferred one,” says Schonzeit. Another issue during the pandemic was persistent price increases, due both to inflationary pressures and a shortage of products. The industry was used to stable prices with infrequent increases, but the pandemic changed this quickly. Some companies also decided to upgrade their entire system as employees returning to the office increased demand. Oversized credentials advantages Among the advantages of oversized credentials is the ability to print more information on the card, says Schonzeit. For example, a larger credential allows event organisers to preprint the corporate agenda on the back of the card to increase efficiency. In addition, companies can enhance their brand presence by distributing a nice thick plastic badge to attendees. Two categories Standard credit card size These are generally CR100 size, which is around 40% larger than the standard credit card Oversized badges fall into two main categories. One category is for cards that are larger than the standard credit card size (CR80), but smaller than event badges. These are generally CR100 size, which is around 40% larger than the standard credit card. They are generally used by law enforcement or healthcare institutions. It is easier to see an oversized badge more clearly from a distance than a regular-sized badge. Oversized ID badges The other category of oversized ID badges is used for events, these badges are typically 3.5” by 5.5” and are usually worn around the neck. These events include categories such as sporting events, corporate events, music festivals, and trade shows. The badges are generally used only for the duration of the event and are often kept as souvenirs. Anticipating the needs “My advice for event planners is to manage your expectations about badges as it is very hard to order extra badges at the last minute,” says Schonzeit. “It is important to plan well in advance and anticipate your needs upfront to help avoid a shortage.” Idesco often gets requests from customers to include some type of technology on the credentials. The most common technologies are proximity cards, NFC, and/or UHF. “It is a much ‘cleaner’ and safer solution if the chip can be embedded within the credential as opposed to putting a sticker on the outside of the credential,” says Schonzeit. Additional technologies in credentials Customers wanting technology in their credentials should allow additional lead time Generally, these additional technologies are used for gaining entry to a location (access control), or they can be used for gathering valuable information regarding an event, including attendance at seminars, crowd flow, vending, and food services information, among others. Supply chain issues have led to less availability of many of the most common chips, which can impact delivery times. Customers wanting technology in their credentials should allow additional lead time, says Schonzeit. Applications In addition to corporate events, sporting events, and trade shows, other markets can also benefit from oversized ID badges. Industries include healthcare, government, and law enforcement. Oversized badges are becoming more popular in hospitals, for example, where color coding can make it easy to identify doctors, nurses, and hospital personnel from a distance, even in congested hospital spaces. ID card necessity Could there be a negative impact on the ID card industry if more companies allow employees to work from home? It’s always a possibility, says Schonzeit. “However, with many hybrid options out there, most employees are required to come to the office either one or two days a week,” he says. “Employees will still need a way to access their workplace for meetings, conferences, etc., and will require an ID card to do so.” Mobile vs. physical credentials The growing popularity of mobile credentials has created some concerns in the ID card marketplace The growing popularity of mobile credentials has created some concerns in the ID card marketplace about the continuing need for a physical credential. So far it has not been an issue. “[Mobile credentials] have not had any type of meaningful effect on the physical ID card market,” says Schonzeit. Relying on smartphones “Sometimes these disruptive technologies can linger in the background for some time and then suddenly have a massive effect on the market. This is something to be concerned about, but I don’t think there is an imminent threat.” A big issue with using only mobile credentials is the need for a backup plan rather than relying only on a smartphone to enter a facility. Also, for mobile credentials to work, specialised readers are required, which requires a large investment. “In my opinion, ID badges are here to stay for the long haul,” says Schonzeit.
Collaboration among manufacturers in the physical security industry can result in systems that are easier to install for integrators and that provide a better customer experience for end users. Illustrating the point is the recent collaboration among a turnstile technology company, a supplier of short-range wireless readers/writers, and a biometric business focused on ‘frictionless’ access control. “The more manufacturers collaborate with each other, the more benefits for end users,” says Steve Caroselli, the Chief Executive Officer (CEO) of Orion Entrance Control. Better collaboration means a better user experience We look for opportunities to collaborate and make sure the experience is above and beyond" Steve Caroselli adds, “Better collaboration means a better user experience. We look for opportunities to collaborate and make sure the experience is above and beyond.” Orion’s collaboration with ELATEC RFID Systems and SAFR touchless biometrics by RealNetworks Inc. highlights the advantages of manufacturers working together to ensure technologies operate smoothly in the real world. Taking ownership of the customer experience When Orion Entrance Control provides a SpeedGate swing-glass optical turnstile, they take full ownership of the customer’s experience. That means ensuring the turnstile application operates as it should, regardless of which component of the broader system might be at fault. To the customer experience, a card reader that doesn’t work is the equivalent of a turnstile that doesn’t work. Which component is at fault is irrelevant, and in fact, invisible, to the overall customer experience. Importance of dependable operation of turnstiles As the most visible element in many access control systems, dependable operation of turnstiles reflects positively on the manufacturer and on the entire system. Orion tests various third-party components with their turnstiles To ensure an optimum customer experience, Orion tests various third-party components with their turnstiles, in order to ensure flawless operation before a turnstile is delivered to a customer. Customers buying an Orion turnstile send the card readers they want to use to Orion’s corporate headquarters in Laconia, New Hampshire, USA, where Orion engineers ensure seamless operation. Ensuring optimum customer experience All readers are designed to be bolted to the wall rather than installed inside a turnstile In addition to scenario-based testing, readers are placed inside the turnstile for a streamline appearance, which can be a challenge given the variety of sizes and types of readers a customer might choose. All readers are designed to be bolted to the wall rather than installed inside a turnstile, which complicates adaptation efforts. In short, historically for Orion, ensuring the optimum customer experience involved extra time and effort, although obviously it was worth it. Providing flexibility for any environment Seeking to simplify the process, Orion has found an alternative to using many different types and models of card readers for its turnstiles. Deploying an RFID reader/writer from ELATEC provides flexibility to operate in a variety of card and reader environments, including almost all 125 kHz and 13.56 MHz contactless technologies. The product is compatible with low-frequency (LF), high-frequency (HF), near field communication (NFC) or Bluetooth Low Energy (BLE) signals. An integrated BLE module supports mobile ID and authentication solutions. There is an integrated antenna for LF and HF to ensure excellent contactless performance. ‘Universal’ configuration of the ELATEC reader hardware Using applicable firmware, the ‘universal’ configuration of the ELATEC reader hardware is compatible with any card system. It works with all the access control protocols, including SEOS, OSDP and other open protocols. “We can stock an open SKU and flash the firmware as per the customer requirement,” says Steve Caroselli. The small form factor (around 1 1/2 inches square) of the ELATEC module lends itself to easy installation inside the turnstile housing. Easy availability of the ELATEC readers helps Orion continue to serve customers, despite recent disruptions in the supply chain. And, ELATEC’s reader hardware has earned global certifications that enable Orion to use their products for customers around the world. Testing to ensure smooth operation ELATEC was responsive at every stage as the relationship evolved, providing sample equipment for testing Before embracing the ELATEC reader module, Orion tested it for several months to ensure compatibility with its turnstiles. ELATEC was responsive at every stage as the relationship evolved, providing sample equipment for testing and working closely with the Orion team. Everyone in the ELATEC sales and engineering team, right up the company’s C-suite, worked to support Orion during the testing phase. In the end, in addition to other advantages, ELATEC’s detection speed and read range compares favorably to competing technologies. “We move really fast as an organisation, so we are looking for other organisations that move very fast,” says Steve Caroselli, adding “We met with ELATEC one week and had the equipment for testing the next week. We like to work with companies that move fast, and they are culturally aligned with how we do business.” Orion turnstiles with ELATEC TWN4 Palon Compact panel The Orion turnstiles incorporate an ELATEC TWN4 Palon Compact panel, a versatile panel-mount reader designed for integration into third-party products and devices. It supports enhanced interfaces, especially RS-485, and reflects the advantages and integrated tool support of the ELATEC TWN4 family. Orion is implementing SAFR SCAN biometric technology using hardware and software from RealNetworks Inc. “The selection of ELATEC products allows Orion to provide their customers and partners with a flexible RFID reader solution that supports numerous credential options and virtually all transponder technologies,” said Paul Massey, the Chief Executive Officer (CEO) of ELATEC, Inc., adding “This is especially valuable in multi-tenet, multi-credential environments.” Orion works with all the various stakeholders – architects, consultants, integrators, and end users – to ensure total satisfaction with an installation. Biometric technology for ‘frictionless’ access control Orion is also implementing SAFR SCAN biometric technology into their turnstiles using hardware and software from RealNetworks Inc. The facial recognition reader technology, designed for mainstream commercial access control, provides a ‘frictionless’ experience, and allows users to pass through turnstiles at a walk. The system can authenticate up to 30 individuals per minute with 99.9% accuracy, despite varied lighting conditions. SAFR’s system provides a good user experience Orion designed a mounting system to incorporate the biometric reader into their turnstile design Orion designed a mounting system to incorporate the biometric reader into their turnstile design. SAFR’s system provides a good user experience, when it comes to enrollment. On each turnstile, the SAFR technology can operate separate from the ELATEC reader or in conjunction with it for multi-factor authentication in higher-security applications. Innovation for new applications A broad approach to the customer experience reflects Orion’s positioning as a technology company, in addition to being a manufacturer of turnstiles. Their Infinity software is the ecosystem ‘nerve centre’ platform to ensure operation and connected through a single ‘pane of glass.’ The need to protect more entrances beyond the lobby led Orion to develop its recently patented DoorGuard, a LIDAR-based solution that detects each person who passes through a doorway and prevents tailgating (like a turnstile) for applications, such as stairway doors, perimeter doors, data centres, IDF closets, etc. The software mimics the advantages of a turnstile to monitor access control and occupancy. Removing friction during installation and beyond Orion’s Constellation is a presence detection system that uses UWB (ultra-wideband) radar to sense where people are in a building for emergency response and building utilisation applications. “One of our core values is to remove friction and make customers’ lives easier,” says Steve Caroselli, adding “Our people-first philosophy is: What can we do to make your life better? We want to be systematic, and everything must be repeatable in terms of how we react and interact with customers.”
Case studies
The client functions as a prominent producer of phosphate fertilisers in Sub-Saharan Africa. They began mining phosphate rock in the early 1960s and started producing phosphoric acid in the late 1980s. Their extensive industrial facility, located in Senegal, includes various sites such as Mining, an Acid Plant, a Fertiliser site, and a power plant. They mainly export their phosphoric acid to India and distribute their fertiliser products within West Africa and globally. Client's requirements The client had a pressing requirement to connect multiple sites and consolidate them using a single communication platform. Additionally, they were in search of a hybrid communication solution that could support both modern and traditional networks. Their needs can be outlined as follows: Hybrid Communication Solution: Deploy a blend of Voice over Internet Protocol (VoIP) and conventional networks to enhance communication efficiency. Multilocation Solution: Create connectivity among various locations and merge them onto a unified platform to streamline communication effectively. Additional Features: Specifically desired functionalities like Call Accounting and Billing to streamline daily administrative duties and operations across multiple sites. Moreover, the integration of a public address system through the CO line at the power plant was crucial to guarantee the prompt communication of vital instructions to workers, whether in routine activities or emergencies. Hybrid communication solution The solution had to address the challenge of linking remote locations while also leveraging the existing traditional networks Matrix, collaborating with Bintech, developed a Hybrid Communication solution tailored for this industrial pioneer. The solution had to address the challenge of linking remote locations while also leveraging the existing traditional networks preferred by the industry. While there was an opportunity to modernise through VoIP connectivity, analogue terminals were also essential components of the solution. The Matrix solution includes: Two SETU VTEPs and a PRI Gateway extended an IP Connection to the ANANT, a server-based PBX, located at both the MINE and ACID sites. At the MINE, there were five ETERNITY GENX platforms, and at the ACID site, there were two, all connected over LAN to the ANANT. Various analog phones were linked to these GENX platforms, and each GENX platform at the ACID site featured a GSM trunk extension. At the Fertiliser site, the primary ANANT was linked to the WAN. A single GENX platform, connected via LAN, facilitated connections to numerous analog phones on-site. Furthermore, this GENX Platform supported a GSM trunk. At the power plant, an ETERNITY PENX was linked to the WAN, supporting a public address system over CO. Furthermore, 28 analog phones were incorporated into the network at the power plant. At Senchim, a SETU VFXTH, a VoIP-FXS gateway, was linked to the WAN. This gateway provided connectivity to several analog phones as well. Results The Hybrid Communication solution effectively integrated disparate sites onto a common communication platform, utilising both contemporary and conventional networks. Moreover, it enhanced communication through a range of features. The solution delivered: Smooth Multi-site Connectivity: With the support of SETU VTEP, capable of handling up to 2100 IP users, and ANANT, accommodating up to 5000 IP users, seamless connectivity across numerous sites was accomplished. Hybrid Communication Solution: A tailored Matrix solution integrated products capable of harnessing both contemporary and conventional networks. VoIP, GSM, and analog networks were effectively amalgamated to ensure efficient communication among various sites. Contemporary Features: The solution facilitated public address capabilities over CO via ETERNITY PENX at the power plant, allowing for vital information dissemination during emergencies. Integration of Call Accounting software, as requested by the client, was seamlessly integrated into Matrix PBXs. By combining contemporary and conventional networks, the Matrix solution distinguishes itself for its effectiveness, efficiency, distinctiveness, and readiness for the future.
Located in Kerala, India, the Somatheeram Ayurveda Hospital with a Resort Ambiance is the best place for not only visual rejuvenation but also physical and mental rejuvenation. Through Ayurveda, Somatheeram provides a means to shed all worries, anxieties, and illnesses. With the objective of combining Ayurveda and Tourism, the Somatheeram Research Institute & Ayurveda Hospital was founded in the year 1985, thus making it the world’s first-ever Ayurvedic Hospital in a Resort Ambiance. The Somatheeram Group of Companies came into being with the efforts of the Founder Managing Director, and Architect Mr. Baby Mathew. Challenges Multi-location transmission proves to be an expensive affair if devices are not chosen wisely Somatheeram has multiple resorts, located at different locations. Multi-location communication can prove to be an expensive affair if communication devices are not chosen wisely. Their dependence on public service providers for communication added to their woes of communication between their resorts. To elaborate: Feasibility of existing telephony: Existing telephony became impracticable considering the frequent communication between multi-located properties. Managing different protocols: Interface with different telecom networks requires managing different protocols, which can be cumbersome, time, and energy-consuming. Absence of modern phone features: The lack of advanced features like abbreviated dialing, call pick up, and internal call restriction, prevented them from becoming efficient in day-to-day operations. Transition to modern communication with existing infrastructure: Their investment in existing infrastructure needed protection while also a provision had to be made to modernise the communication using existing infrastructure. Solution The solution offered was based on the fundamentals of multi-location communication solutions Matrix analysed the challenges of communications for Somatheeram, and crafted a solution that was the best fit. The solution offered was based on the fundamentals of multi-location communication solutions. This included the Matrix range of IP-PBX (ETERNITY GENX12S) and GSM Gateway (SIMADO GFX11 and SIMADO GFX11 4G) that optimised the feasibility of communication and helped the firm become more efficient. Solution includes: The Hybrid IP-PBX included ETERNITY GENX12SAC, which enabled them up to 240 Analogue users with 64 CO Ports. Another Hybrid IP-PBX included ETERNITY PENX, which allowed them access to 100 IP Users, onboard IP User Support, LDAP Client support, support of 4G VoLTE ports, COSEC Door Integration, and much more. The GSM gateway included SIMADO GFX11 and SIMADO GFX11 4G which enabled them to make and receive calls from analogue extensions. The capability to integrate with almost all industry-pioneering PBXs enabled them a smooth transition to modern communication while maintaining existing infrastructure. Results The solution so implemented enabled all properties to work as a single communication platform and proved to be beneficial for Somatheeram and its properties in more than one way. The Hybrid IP-PBX enabled them, unified communication facilities like Email to SMS, audio/video calling, unified messaging facilities, and multi-location collaboration features like UC client integration, one-number reach, etc. The Hybrid IP-PBX also enabled, investment optimisation through universal network connectivity, easy and centralised phonebook management through LDAP client support, mobility convenience through 4G VoLTE support, and much more. The GSM/4G gateway enabled them, GSM/4G connectivity to existing infrastructure, hotline extension dialing, emergency number dialing even in the absence of a sim card, etc. through secure network bridging.
The Jigme Dorji Wangchuck National Referral Hospital is one of the top most renowned institutions in Bhutan delivering healthcare services. The hospital caters to the population of Thimphu and neighbouring districts. The hospital not only functions as the National Referral Hospital for the entire country but also functions as a Regional Referral Hospital for the Western District, a District Hospital for Thimphu District, a Human resources pool and technical backup for District Hospitals, a Clinical training centre for the Royal Institute of Health Sciences (RIHS) and Technical support to the Public Health Programmes. JDWNRH's challenges As the hospital works round the clock, one of the major concerns was to manage complex shifts of employees. Elevator control, where only users with access rights can call the elevator, was another challenge the hospital wanted to meet. Furthermore, the customer also wanted a solution, with the help of which the admin could assign entry and exit points for patients, visitors, and employees. Lastly, the management wanted to restrict visitor entry to a pre-defined time and rooms of the hospital for better visitor management. Matrix's solution offered Around 206 devices were installed in the hospital that are used in controlling access to rooms and elevators Matrix pitched its Access Control, Time-Attendance, and Visitor Management Solution along with the different variants of biometric devices, which fulfills every requirement of this renowned Hospital. Around 206 devices were installed in the hospital that are used in controlling access to rooms and elevators. Devices were installed at the Main Entrance, Ward Rooms, Server Rooms, Outside Elevators, and at Ramps on every floor to restrict access. So, no individual in the building is not enrolled in the system. Multiple shift management As the Hospital works 24 hours, there are multiple shifts in which the employees work. Through this, the Hospital could manage multiple shifts of employees. Approximately, 700 visitor profiles were created with constrained time to visit, limited rooms to enter, and a pre-defined route of access. Also, the crowd at the elevator was controlled by restricting the use to only users with elevator access rights. Results JDWNRH fulfilled its requirement with Matrix People Mobility Solution and achieved the following results: Improved security by restricting unauthorised entry using an access control solution. Reduced complexity of shifts by time-attendance solution. Crowd control through elevator access control. Time-based and zone-based entry restrictions for visitors and patients. Products with the quantity used COSEC VEGA FAX (47) - Fingerprint and Card-based Door Controller for Time-Attendance and Access Control Application. COSEC VEGA CAX (65) - Card-based Door Controller for Time-Attendance and Access Control Application. COSEC PATH DCFE (28) - Fingerprint and Card-based Door Controller with IP65. COSEC PATH RDCE (66) - Card-based Exit Reader with IP65. COSEC ENROLL CARD (1) - Card Enrolment Station. COSEC ENROLL FINGER (1) - Finger Enrolment Station. COSEC VEGA CPM EM PROX (112) - EM Proximity Card Personality Reader Module for VEGA Series Door Controller. COSEC CPM EM PROX (1) - EM Proximity Card Personality Reader Module. COSEC CENTRA LE (1) - Application Server Platform with 1,000 Users and Expandable up to One Million Users for Basic Access Control and Raw Event Data. COSEC LE TAM (1) - Time-Attendance Module for COSEC CENTRA LE Users. COSEC LE ACM (1) - Access Control Software Module for COSEC CENTRA LE Users. COSEC LE VMM (1) - Visitor Management Module for COSEC CENTRA LE Users. COSEC USER100 (5) - User licence for 100 users.
Orion Entrance Control, Inc wanted to remove friction and frustration for their integrators and end users with a single-source reader that could support any RFID technology and fit seamlessly into their turnstiles and other physical access control (PAC) products. The reader needed to be able to: Provide reliable and secure user identification and access control with excellent read range. Read all of the RFID card technologies their clients might be using. Have a compact form factor and sleek design for integration with their PAC products. Enable remote updates to support changing client requirements. Integrated access solutions Orion Entrance Control creates software, hardware, and infrastructure solutions for physical access control (PAC), occupant sensing, and visitor management. They develop access control software and manufacture high-end turnstiles, speed gates, swing gates, optical door alert systems, and other security solutions. Founded in 2009, they pride themselves on engineering and product excellence, with all of their products manufactured locally near their New Hampshire headquarters. They work with distribution partners and integrators to bring their access solutions to large commercial clients worldwide in education, healthcare, manufacturing, and other industries. One of Orion’s priorities is offering seamless, integrated access solutions that minimise friction for integrators and are simple and reliable for end users. They wanted an RFID reader that would support any RFID technology and be easily integrated into their turnstile products. Challenges faced by Orion Turnstiles and other components provided by Orion need to work within the access systems already in use Orion has 32 different turnstile products, from full-height mechanical turn gates to classic tripod turnstiles, to high-speed retractable barrier gates. An RFID reader embedded into the turnstile reads user credentials (e.g., an ID badge or mobile credential) and connects to the back-end software that verifies access authorisation levels. Both their US and international customers use various RFID transponder technologies. Turnstiles and other components provided by Orion need to work within the access systems already in use by their customers. Traditional credentialing system Traditionally, Orion would work with integrators to determine the credentialing system the customer needed and then order the corresponding readers. This created delays for installers as they waited for the right readers to arrive. It also created complexity in Orion’s supply chain, as they had to manage inventory from multiple reader manufacturers. When the pandemic disrupted supply chains for some of their suppliers, they knew they needed to look for another solution. Read-range challenges At the same time, RFID reader read range was becoming a critical issue for many clients. More sophisticated reader technology and encryption create read-range challenges for some readers, especially when embedded under glass within a turnstile. This creates frustration for end users and slows down entry queues. Need for a standardised reader solution Working with multiple reader manufacturers, each differently sized and shaped readers, created engineering challenges They also needed a standardised reader solution that would fit any of their turnstile products. The architectural community has pushed for smaller, more streamlined turnstiles, so embedded systems must be highly compact. Working with multiple reader manufacturers, each with differently sized and shaped readers, created engineering challenges for Orion and headaches for installers. All of this resulted in more work for integrators and more delays for buyers. Need for a frictionless access range "We were looking for a reliable reader that had a great read range, could accept everyone’s credentials, and would be ready to go when you fit it in the turnstile," said Jerry Waldron, Customer Care Manager, Orion Entrance Control. "It’s one more thing we can do to remove friction and provide better service to our customers." Orion's reader requirements Orion Entrance Control, Inc. wanted to remove friction and frustration for their integrators and end users with a single-source reader that could support any RFID technology and fit seamlessly into their turnstiles and other physical access control (PAC) products. The reader needed to be able to: Provide reliable and secure user identification and access control with an excellent read range. Read all of the RFID card technologies their clients might be using. Have a compact form factor and sleek design for integration with their PAC products. Enable remote updates to support changing client requirements. Solution: ELATEC TWN4 Palon family of readers The Palon Compact Panel Reader features robust panel housing suitable for indoor and outdoor use The ELATEC TWN4 Palon family of readers fits the bill. The versatile readers are designed for seamless integration into third-party products and devices. Palon supports advanced interfaces (including RS-232, RS-485, USB, and more) and is simple to mount and install. The Palon Compact Panel Reader features robust panel housing suitable for indoor and outdoor use and a classic design that fits seamlessly into Orion’s turnstiles. They also have the option of using the TWN Palon Compact M reader, which comes without housing. RFID and smartphone credentials The TWN4 Palon line supports 60+ transponder technologies, including both low- and high-frequency RFID and smartphone credentials via near-field communication (NFC) or Bluetooth® Low Energy (BLE). This gives Orion the flexibility to support virtually any existing transponder technology its clients use with a single reader. Customer experiences "One of our most important values is creating remarkable customer experiences," said Steve Caroselli, Chief Executive Officer and President, of Orion Entrance Control. "We want to provide more than they expect and deliver a product with exceptional quality. With ELATEC, we’ve found a partner that shares that core ethos." Read range and reliability Palon reader acts as a data converter to connect the barcode reader to the Weigand interface, simplifying cabling ELATEC’s readers provide excellent read range and reliability, reducing frustration for users and system managers. ELATEC was also able to help Orion integrate the Palon readers with a barcode reader to meet a customer’s requirements. In that instance, the Palon reader acts as a data converter to connect the barcode reader to the Weigand interface, simplifying cabling for the installer. The integrated system supports barcodes for visitors and RFID for employees for a unified access experience. Flexibility “ELATEC gives us the flexibility to serve all our clients and the confidence that we’re going to be able to deliver a product that just works," said Steve Johnston, Director of Sales and Marketing, Orion Entrance Control. "We know that when it shows up on-site, it’s going to be a good experience for the installer and the owner of the company.” Benefits for ELATEC readers A universal reader allows Orion to reduce friction for clients, installers and distribution partners, and their people. Orion can support all their customers with the same RFID reader, simplifying sales, supply chains, inventory management, installation, and support. The sales team no longer must confirm in advance which transponder technology the end customer needs, the TWN4 Palon supports them all. And the engineering team can eliminate the headaches inherent in trying to fit readers with different form factors into their products. Single-part number solution ELATEC’s readers support fast, contactless reconfiguration after installation via a configuration card A single-part number solution reduces the time it takes to get the right system into the hands of installers and end customers. It also provides flexibility for the future. ELATEC’s readers support fast, contactless reconfiguration after installation via a configuration card or remote update. That means that it’s easy to update the readers for clients who add a new transponder technology, integrate mobile credentials into an existing system, or upgrade their security standards. Their turnstile and door access solutions are ready for the future. Seamless access experience Orion also appreciates the service and support they get from ELATEC. ELATEC has a production capacity in the U.S., which eases Orion’s supply chain worries. With ELATEC’s support, they can offer their customers a truly integrated PAC solution that provides a seamless access experience.
Xtract One Technologies (“Xtract One”), a pioneering technology and AI-driven threat detection and security solutions company prioritising the patron access experience, announced it will deploy its SmartGateway patron screening solution to secure all entrances at selected hospitals within the Virginia region of the U.S. Department of Veteran Affairs network. Xtract One’s system was chosen by the U.S. Department of Veteran Affairs for its ability to detect a broad range of weapons including small arms, long arms, and knives as small as two inches. This partnership demonstrates the focus and commitment to protecting veterans’ well-being. SmartGateway system SmartGateway unobtrusively scans patrons for weapons and other refused items as they enter In recognising the importance of creating a more secure and efficient healthcare environment, the Central Virginia VA Health Care System is embracing the cutting-edge security solutions offered by Xtract One, to ensure the safety and well-being of veterans. This will enable them to uphold their commitment to protecting those who have served their country, while implementing innovation to better serve their needs. The SmartGateway system delivers fast, reliable, and accurate screening for high throughput venues, leveraging AI-powered sensors to detect threats without invading patrons’ sense of privacy and comfort. SmartGateway unobtrusively scans patrons for weapons and other prohibited items as they enter, enhancing safety and optimising their experience by creating a frictionless entry. Author's quote “We are honoured to be working with the U.S. Department of Veteran Affairs to enhance the safety and security of their patients and staff,” said Peter Evans, CEO at Xtract One. He adds, “We look forward to working closely with the Department to provide the security needed to keep their facilities safe, while also providing a positive experience for all those in the VA network.”
In a mountain area in Yunnan Province (China), Dahua Technology safeguards the safe production of a 700+ mu photovoltaic power station, providing intelligent fire prevention and control measures in its vast facilities. The implemented solution significantly increased the accuracy of fire alarms by more than 10 times, as well as the efficiency of fire alarm response by 30%, which help ensure the stable delivery of clean energy to its surrounding areas. Superior lighting conditions The advantageous location of the power station provides superior lighting conditions that yield abundant solar energy generation. Covering an area of over 700 acres, the photovoltaic power station produces over 30 million kWh of green electricity annually for its surrounding area. It is equivalent to saving about 370,000 tons of standard coal and reducing carbon dioxide emissions by over 900,000 tons. Pain Point 1: Long Inspection Time During the fire season in summer, the photovoltaic system areas must also be checked regularly During the first few years of its operation, the power station was only manned by 5 people working deep in the mountain. These hardworking personnel were responsible for the stable operation of more than 30 photovoltaic arrays. Their daily tasks include inspecting the main transformer, GIS, switch room, station transformer, SVG room, and other equipment areas of the power plant, with each inspection usually taking 2-3 hours. During the fire season in summer, the photovoltaic system areas must also be checked regularly. Two inspectors must work at least 5-6 hours a day under the hot sun, taking at least one month to complete the comprehensive inspection. Pain Point 2: Mountainous Terrain The distance between these photovoltaic system areas from the power station is generally dozens of kilometers. It can be reached by driving, but some areas are located on steep hillsides. If the car can't reach them, people can only walk or climb to get there. Even if every area is inspected, potential hazards may not be accurately identified due to the inaccuracy of the previous manual monitoring method. Pain Point 3: Manual Monitoring For fire alarms, the location of the fire point is found based on the understanding of the terrain In the past, local villagers serve as important fire "informants", especially in the photovoltaic system in remote areas. When a fire is found, the villagers immediately notify the personnel on duty. The staff then reports to the centralised control centre first and cooperates with the forest fire personnel to deal with the fire. For fire alarms, the location of the fire point is found based on the understanding of the terrain. The information flow, instructions delay, and manual positioning of the fire point drastically extend the response time. 24/7 remote fire safety inspection & monitoring The fire prevention of photovoltaic power stations requires attention to several aspects, including identifying whether it is a fire in the surrounding forest or a fire on the equipment itself. Failure to accurately detect and respond to this fire emergencies can cause severe damages and loss. Robust system The plant inspection that usually takes 1 month can be completed in less than 10 minutes" Dahua has integrated technology with the inspection mode of the photovoltaic power station to create a robust system that can monitor the fire situation in the power plant and its surrounding areas 24/7 and eliminate unnecessary journeys between mountains during the inspection. The dual-lens cameras installed at high points were configured with cruising paths, enabling them to conduct uninterrupted online inspections of the power plant and display the images through the system. “The plant inspection that usually takes 1 month can be completed in less than 10 minutes. I couldn't even think that it was possible before,” said Mr. Cai, inspector at the power station. Inspection process During the inspection process, algorithms are used to determine whether there is smoke or fire in each area. When a fire is detected, the system will locate the fire source within a range of 3-5 kilometres and find the fire point within 30-50 metres. Improved fire response efficiency by 30% According to Mr. Cai, in addition to eliminating the need for further inspections, improving the efficiency of the overall handling process is another key advantage of this solution. Through integrated communication, the previous reporting and communication methods have been transformed into multi-party terminal equipment discussions. Based on on-site audio and video data, multiple parties can easily communicate and discuss plans and strategies. Real-time information At present, the timely rate of fire alarms in the power plant has increased by over 10 times At the same time, fire alarm information and the fire point location determined by the platform will be sent to relevant personnel in real-time, allowing them to accurately and quickly reach the corresponding location to distinguish the fire. At present, the timely rate of fire alarms in the power plant has increased by over 10 times, and the efficiency of fire alarm response has improved by 30%. Intelligent fire safety solution Fire safety is crucial for production enterprises, especially for photovoltaic power stations. With the advent of technology and innovation, Dahua’s intelligent fire safety solution not only can help protect the power plants and their staff, but also can ensure that thousands of households are provided with green, environmentally friendly, and low-carbon electricity.
Products
Round table discussion
Historically, the emphasis of security systems has been on reactivity, whether it’s providing video evidence of an incident or data to support a resulting investigation. Reactivity is core to impactful security, but increasingly, systems are also seeking to be more proactive. A proactive system seeks to prevent events from happening in the first place, thus mitigating the harm to an organisation, and making the need for a reactive response moot. We asked this week’s Expert Panel Roundtable: How can security systems be proactive? Please provide a couple of examples.
Risk is a core concept in the practice of physical security. However, the risk is not always assessed effectively. Ideally, an organisation's appetite for risk guides its security strategy and action planning to the minutest detail, including buying decisions for security equipment and systems. We asked this week's Expert Panel Roundtable: How does the concept of risk influence buying decisions in the security market?
Biometrics is both a mature technology in the physical security world and an innovation perpetually on the cutting edge. Biometric technologies received a boost during the COVID pandemic when “touchless” became a buzzword with particular relevancy to the world of biometrics. Higher security needs, such as “two-factor authentication,” are also driving demand for biometric products. We asked this week’s Expert Panel Roundtable: What are the latest technology trends in biometrics?