Residential security systems
Briton, a specialist in door controls and exit hardware, has launched a newly enhanced version of its long-standing and highly popular self-adhesive Accufit template, designed to aid easy and accurate installation of Briton’s trusted door closers. Accufit system For 25 years, Briton’s unique ‘peel and stick’ Accufit system has provided installers with the means to fit door closers quickly and accurately at the first attempt, improving efficiency and helping to dri...
Codelocks has introduced public functionality to its KL10 KitLock. The mechanical lock now provides multiple users with keyless access to shared storage at public facilities like gyms, sports centres, spas, retail stores, offices, and shared workspaces. KL10 KitLock The KL10, a durable and compact mechanical lock, is designed for easy use and is accessible via a four-digit code. Originally released with Private Function, the new KL10 Public Function allows multiple occupancy facilities to off...
Yale, a pioneer in smart home security, announced the launch of Yale Pro® 2, the brand’s latest product line for the professional and multi-family market. Yale Pro 2 delivers the next generation of smart lock solutions to revolutionise how builders, integrators, and multi-family customers streamline access management and improve building security. Yale Pro 2 Yale Pro 2 includes the trusted convenience and security features that Yale smart locks are known for, including a variety of...
ASSA ABLOY ACCENTRA™ and DoorBird provide a comprehensive solution for property owners looking to enhance the security of their property while adding valuable convenience for their residents and staff. Secure and convenient With this new integration, the DoorBird IP video intercom can be managed seamlessly within the ACCENTRA Mult-family dashboard, eliminating the need to manage two separate systems. ACCENTRA allows a secure and convenient way for residents and staff to access all...
Pimloc, the AI video privacy, redaction, and analytics company announces it will expand its multimedia redaction platform, Secure Redact, to include audio and text redaction. Integrating text redaction capabilities into the platform will increase the speed and efficiency with which proprietary information can be redacted, further saving users time and effort when processing sensitive footage. Visual, audio, and text While Secure Redact can be used for all camera types, the updated platf...
Brinks Home, one of North America’s home security and alarm monitoring companies, announces two new firmware features, Vacation Watch, and Package Detection, to ensure peace of mind for homeowners while they are away. Vacation Watch allows homeowners to seamlessly create temporary Escalated Events rules via the Brinks Home website or mobile app to automatically enable recording while away. Similarly, Package Detection ensures homeowners are the first to know when a package is delive...
News
Nice, a global pioneer in Home and Building Management solutions announced the E+ Extended Range Sensors by 2GIG®, a new line of devices bringing enhanced security coverage to residential and commercial properties. By expanding its portfolio with extended-range sensors, Nice aims to provide end users with the peace of mind that they are protected with the latest technology while delivering new business opportunities for integrators. Enhanced security solutions “At Nice, we’re building the future of security with the launch of our E+ Sensors from 2GIG,” said Emanuel Bertolini, CEO, of Nice North America. “But these aren’t just sensors; they represent a peace of mind for customers by covering every corner of their property with enhanced security solutions." A safer, smarter world "By offering more secure, intelligent living spaces we’re moving beyond traditional barriers and empowering customers to come and go as they please without being overly concerned about security." "With E+ sensors, we’re not just moving towards the future; we’re creating a safer, smarter world... one sensor at a time.” Versatility, innovation, and reliability E+ sensors include coverage for door/window, motion, smoke, and glass break detectors Paired with the innovative 2GIG® EDGE panel, this solution combines versatility, innovation, and reliability. With sleek modern designs that seamlessly integrate into any environment, the E+ sensors include door/window, motion, smoke, and glass break detector coverage. E+ Indoor Door/Window Contact Sensor Designed with a pre-included spacer, the E+ Indoor Door Window sensor seamlessly fits the curves of most doors and windows. The magnet’s closer proximity to the sensor effectively reduces false alarms, providing consistent performance. Intelligently crafted with a rounded outer and square interior, its versatile design enables quick and accurate installation, broadening its range to more door and window applications. With a battery life of up to 8 years, users can enjoy long-lasting operation. E+ Outdoor Wireless Contact Sensor Versatile design allows for easy installation on gates, garages, or poles, making it perfect The E+ Outdoor Wireless Contact sensor is a weather-rugged security solution that is IP56 certified and is designed to withstand extreme temperatures from -40 to 150 degrees Fahrenheit. Versatile design allows easy installation on gates, garages, or poles, making it perfect for curved spaces. With a range of up to 2KM and a 5-year battery life, it provides comprehensive and reliable security. E+ Motion Detector The E+ Motion Detector harnesses the power of passive infrared technology to accurately sense movement within an impressive range of 30 by 50 feet. This sensor includes pet immunity, filtering out the movements of pets weighing up to 85 lbs. E+ Glass Break Detector Providing up to 5-year battery life, it minimises the need for frequent replacements The E+ Glass Break Detector offers a versatile range of options to support a variety of glass types, including plate, tempered, laminated, and coated glass. This performance-designed detector ensures the safety of customers' homes by promptly detecting any glass-shattering noise within a 15-foot radius. Utilising a dual-stage detection algorithm of thud and crash, the detector minimises false alarms from everyday household noise. Providing up to a 5-year battery life, it minimises the need for frequent replacements, saving time and money. E+ Smoke/Heat/Freeze Detector The E+ Smoke Heat and Freeze Detector is a photoelectric smoke detection solution that detects both fixed temperature and rate-of-rise heat. Its advanced One Go / All Go feature seamlessly interconnects smoke detectors, ensuring that when one is triggered, all connected E+ Smoke Detectors will sound the alarm. This not only boosts overall safety but also creates a heightened sense of urgency during emergencies. Edge 1.3 Firmware Update Dealers can save time and effort during panel servicing with the Z-Wave backup and restore functionality In addition to the line of sensors, users will also have access to 2GIG’s latest software update – Edge 1.3 - that enables easier, quicker installation by streamlining programming steps with pre-populated defaults. Dealers can keep track of sensor signal strength enabling efficient troubleshooting through a panel display of RSSI values, thus reducing truck rolls. The update includes the option for normally open programming for select sensors for added customisation and interoperability with a wider range of devices. Dealers can save time and effort during panel servicing with the Z-Wave backup and restore functionality through alarm.com. Expanding opportunities “With the launch of E+ Sensors, we’re not just delivering innovative security solutions, we’re expanding opportunities for our partners,” said Julio Ferreira, Chief Sales Officer, Nice North America. “These new offerings are more than an advancement in security solutions, they’re a way for our dealers and integrators to tap into new residential and commercial markets, meet the demand for comprehensive security in larger spaces, and add to our collective competitive edge." Innovations in security "At Nice, we’re committed to supporting the growth of our partners by equipping them with the latest innovations in security." "E+ sets new standards and enables us to redefine security to drive success together.”
Morse Watchmans, the industry pioneer in key control and asset management systems, adds emergency management to its long list of core competencies with the presentation of its Emergency Key Grab (EKG) Kit at ISC West, April 10-12 2024 at the Venetian Expo in Las Vegas. The EKG Kit, designed to facilitate swift emergency response in the event of a facility lockdown, will be on display at booth #11109 alongside a range of the company’s pioneering key control and asset management solutions. Crisis preparedness solution “In a crisis scenario, time is of the essence as every second first responders waste locked out of a building is a second lost that could have been spent saving lives,” said Tim Purpura, VP of Global Sales and Marketing, Morse Watchmans. “That’s why we created the EKG Kit, to provide facilities of all types with a comprehensive solution for improved crisis preparedness and emergency management.” KeyWatcher Touch System Using a unique PIN code or other provided credentials, emergency personnel can swiftly retrieve the required keys At the heart of the EKG Kit is a one-module or greater KeyWatcher Touch System. The KeyWatcher Touch stores facility keys in an electronic cabinet, only to be accessed by those with the proper permissions (i.e., facility managers and first responders). Using a unique PIN code or other provided credentials, emergency personnel can swiftly retrieve the required keys, such as those for locked rooms or secured areas, enabling them to promptly enter and address the situation. Fast, protected access In addition to the KeyWatcher Touch, the EKG Kit also includes additional materials and support required to provide first responders with fast, protected access to facility keys in the event of an active shooter, natural disaster, or other emergency. With every complete EKG deployment, facilities benefit from both a controlled, known location for master keys as well as the implementation of a complete key control policy developed with the help of Morse Watchmans experts. This significantly improves response times and effectiveness during critical incidents and gives stakeholders peace of mind, knowing that the space they are occupying is equipped with robust security measures to handle emergencies efficiently. EKG kit applications EKG Kit is ideal for any facility where lockdown procedures are enacted during critical events The EKG Kit is ideal for any facility where lockdown procedures are enacted during critical events. This includes schools, hospitals, airports, public venues, government buildings, critical infrastructure sites, data centres, and more. Additional solutions on display Additional solutions on display at ISC West 2024 from Morse Watchmans include: SmartKey® electronic locker systems, are the ideal solution for securing, tracking, and controlling access to larger objects. Set up SmartKey Locker systems as a personal metal locker storage space for one or multiple users. SmartKey metal locker cabinets are engineered for complete interactivity with other business systems such as access control. KeyBank® Touch key access control system, a secure way to manage large quantities of keys with touchscreen convenience. The bright 7″ touchscreen key organiser system gives users an easier-to-use interface for the management and control of up to 18,000 keys and 10,000 users per site. These solutions, coupled with Morse Watchmans’ industry-pioneering software, service, and support, ensure the safety and security of a variety of physical assets.
Hikvision has launched the AX HOME series wireless alarm system designed to meet the needs of homeowners. The AX HOME Series builds on Hikvision’s commitment to deliver cutting-edge, reliable alarm systems that are both cost-effective and user-friendly. AX HOME series Certified to meet European Standards for Intruder Alarm Systems EN grade 2, the AX HOME series ensures homeowners a robust protection system that meets some of the world’s most demanding industry standards. It also addresses many of the common concerns that people have with domestic alarm systems: it is energy efficient, uses very little cellular data, and is simple to learn and use. Intuitive features Enhanced security integration The AX HOME system allows seamless integration with third-party devices and systems through support for Open Things Access Protocol (OTAP), which offers easy deployment, scalability, two-way authentication, data encryption, and high transmission efficiency. Highly energy and cost-effective Consuming as low as 0.05 kWh daily, the system is highly energy efficient and cost-effective. The system's innovative Microcontroller (MCU) platform and OTAP support reduce cellular data usage and provide a smoother operation experience. With at least 12 hours of standby time, homeowners can rest assured even during power outages. Effortless setup & maintenance The AX HOME Series features a user-friendly sliding design which makes it very easy to install. The low maintenance cost is complemented by the accessibility and ease of purchasing AA batteries. Configuration is simplified through the web and mobile apps. Users can check the status remotely via the Hik-Connect app, while installers can use Hik-Partner Pro to remotely maintain the system on behalf of their clients. Instant activation with plug & play The AX HOME Series kit comes complete with devices that are pre-connected to the control panel and that work out of the box. Users simply activate the control panel to enjoy the complete system effortlessly. User-friendly app interfaces The Hik-Connect app features intuitive wizards to help users complete necessary configurations swiftly. Clear navigation icons make operating the system a breeze.
Videx Security, a pioneer in access control and door entry systems, has announced a new 4312 Series entry panel for its VX2300 2-wire video system. This addition highlights Videx's commitment to providing advanced entry solutions that meet the needs of modern residential and commercial buildings. The 4312 Series entry panel, part of the Videx 4000 Series and available in standard vandal-resistant formats, introduces a range of innovative features designed to enhance security and user interaction. Among its key features are a backlit keypad, available with additional alpha keys (A-F) for direct apartment dialling or with name-scrolling keys for ease of use. The panel also boasts a customisable graphical LCD display, providing clear visitor interaction and feedback. 4312 Series panel 4312 Series panel ensures visitors are both seen and heard clearly, announcing call progress Equipped with a wide-angle CMOS camera and voice annunciation capabilities, the 4312 Series panel ensures visitors are both seen and heard clearly, announcing call progress and extending an invitation to enter. This digital panel is designed for versatility, complementing new and existing VX2300 systems and supporting up to 998 apartments. In terms of access control, the panel offers coded access for up to 2800 four to six-digit codes and Mifare proximity for a similar number of users, with an additional layer of security through a combined code+Fob mode. Key features of the intercom panel Key features of the intercom panel include its compact design, wide-angle CMOS camera Rob Sands, Technical Director at Videx, said: “Our new 4312 entry panel integrates cutting-edge features such as Mifare proximity and a wide-angle camera into a compact, vandal-resistant design. This panel not only enhances building security but also offers unparallelled ease of use and visitor interaction, marking a new era for the VX2300 system.” Key features of the intercom panel include its compact design, wide-angle CMOS camera, backlit keys with a graphical LCD display, and voice annunciation for call processing. Notably, the panel is powered directly from the 2-wire bus, simplifying installation by eliminating the need for additional cables. Videx's VX2300 system Videx's VX2300 system is known for its flexibility, allowing integration with a variety of door panels, videophones, video monitors, and concierge units, all through a single pair of cables. The new 4312 panel is customisable and programmable through both its user interface and PC software, featuring USB, RS485, and Wiegand interfaces for comprehensive control.
Allied Universal®, the world’s pioneering security and facility services provider, announced the proposed acquisition of the assets of J E Security Systems & Services Inc., a comprehensive guarding and technology provider based in St. Thomas, Barbados. This proposed acquisition is through Allied Universal’s subsidiary, G4S Secure Solutions (Barbados) Limited and is expected to close during the first quarter of 2024. Author's quote "This proposed acquisition marks a significant milestone in advancing Allied Universal's global growth strategy,” said Allied Universal Global Chairman and CEO Steve Jones. “As we continue to expand our presence internationally, the acquisition of the market-pioneering technology business of J E Security Systems & Services allows us to expand the value of our security services we offer to the customers and communities we serve in Barbados and the English Caribbean.” Diverse range of clients We will be able to provide our clients with expanded service offerings and our employees J E Security Systems & Services has provided electronic security, patrol and response services to the island’s residents and businesses for more than 30 years. Its diverse range of clients includes insurance companies, banks, embassies, construction firms, government facilities and residential communities. “We are excited to become part of the world’s top security provider,” said Jeff Evelyn, Managing Director of J.E. Security Systems & Services. “Through this action, we will be able to provide our clients with expanded service offerings and our employees with additional career opportunities. We look forward to continuing our relationship with our clients, many of whom have been with us since the inception and others who have joined us along the way.” Allied Universal’s growth strategy “Having operated in Barbados for over 35 years, G4S Barbados remains committed to maintaining the highest standards of service, integrity, and innovation throughout this proposed integration process,” said James Devers, Managing Director of G4S English Caribbean. “We believe that the synergy between our companies will result in an unparalleled offering of security solutions in Barbados and the wider English Caribbean.” In 2022 and 2023, Allied Universal completed 18 acquisitions – 13 in North America and six internationally. In 2021, Allied Universal acquired 10 companies, including G4S. These acquisitions are consistent with Allied Universal’s growth strategy and expanding international presence.
SALTO is excited to launch the DBolt Touch smart deadbolt. The SALTO DBolt Touch offers a retrofit and smart locking solution for upgrading mechanical deadbolt locks in the multi-family residential market. The DBolt Touch implements the latest technology and the top level of functionality that multi-family housing residents, operators, and access managers desire and have been eagerly anticipating. SALTO’s advanced technologies Packed with all of SALTO’s most advanced technologies like SVN, BLUEnet, and JustIN Mobile “We're excited to showcase our commitment to the multi-family and residential industry with SALTO’s first smart lock designed specifically for multi-family apartment unit doors and residential homes." "Packed with all of SALTO’s most advanced technologies like SVN, BLUEnet, and JustIN Mobile, the DBolt Touch deadbolt is the most flexible smart lock. Using a unique combination of cloud-based and stand-alone access technology, the DBolt creates a market-defining level of site safety,” said Preston Grutzmacher, SALTO North America Residential Pioneer. SALTO DBolt Touch’s smart access technology Resident experience and convenience are driving the direction and adoption of new smart access and physical security solutions in the residential industry. Easy to retrofit, compatible with any deadbolt door, and with different models available, the SALTO DBolt Touch smart lock has been designed to blend seamlessly and connect wirelessly to the property ecosystem. In addition, the SALTO DBolt Touch’s smart access technology–powered by SALTO’s access management platforms–delivers a comprehensive and modern digitised property that unifies security, access control, property management, and the tenant experience in an all-in-one smart access solution for residential living. Secure keyless and mobile access DBolt Touch series offers the same level of security and comfort by keeping smart RFID key cards With secure smart keypad access, the SALTO DBolt Touch supports a wide range of access control methods to create the perfect keyless experience. The DBolt Touch smart keypad reader enables PIN-based entry for residents and visitors. For users who require a physical credential, the DBolt Touch series offers the same level of security and convenience by supporting smart RFID key cards. The DBolt Touch enables mobile access via SALTO’s Digital Key solution–JustIN Mobile. Property managers and residents can use a smartphone–including Apple Wallet–to access a property’s various doors, amenities, and individual units. SALTO DBolt Touch and DBolt Touch-Interconnected Reliable and future-proof smart locking technology for multi-family residential security With a wide range of finishes, the SALTO DBolt Touch can fit in almost any kind of environment–from apartment building doors to single-family entrances or from modern to classic installations. Rated AAA according to A156.40 (American National Standard for Residential Deadbolts), the DBolt Touch meets the highest standards set by the security industry. The SALTO DBolt Touch comes in two versions: the DBolt Touch and the DBolt Touch-Interconnected (IC). The DBolt Touch deadbolt model is a smart lock that simply replaces an existing mechanical deadbolt. It’s an easy-to-install unit door lock that adds smart features and maintains the design integrity of the residence. The DBolt Touch Interconnected Deadbolt (IC) model is a smart deadbolt that combines the convenience of a passage lever with the security of a deadbolt in an all-in-one unit. Using an innovative multi-sided smart locking mechanism, users can retract both the latch bolt and deadbolt simultaneously in a single motion for a quick and easy exit. Fully compatible with the SALTO product portfolio The SALTO DBolt Touch is part of the most complete locking platform to fit any need The SALTO DBolt Touch is fully compatible across the SALTO platform, so it’s the perfect solution to be used in a system that can manage full sites. SALTO has an extensive access solutions portfolio for common doors, emergency exits, garage doors, elevators, pool areas, and more. The SALTO DBolt Touch is part of the most complete locking platform to fit any need. “The DBolt Touch is fully compatible with SALTO Space on-premise high-end residential access management software and our cloud-based solution SALTO Homelok that can streamline your residential operations. It’s designed to fit the doors most frequently used in multi-family properties,” said Grutzmacher. “Because it's available as a standard deadbolt and an interconnected lock, the DBolt is the perfect solution for new construction and retrofit properties. Experience the ultimate security and convenience with the DBolt smart lock from SALTO!” Reasons to choose the SALTO DBolt Touch Cost-effective, quick, and easy installation standalone battery-powered smart lock that upgrades a traditional mechanical deadbolt key-operated door lock without having to replace the door and with no hardwiring required. Grade 2 deadbolt. Keyless and mobile entry. Create a secure entryway into a smarter home. Utilise multiple keyless entry options. With powerful RFID/NFC and BLE technology inside, residents and staff can use mobile or physical RFID smart credentials. Advanced user PIN Code. Create permanent or temporary entry codes. Activity logs. Easily monitor who is coming and going from the residence. Run activity logs that note every time the door is locked and/or unlocked. SALTO cross-platform capable. On-premise or cloud-connected, the choice is theirs. SVN stand-alone networked locking system. Powered by Data-on-Card SALTO core technology. BLUEnet wireless ready. Advanced connectivity and SVN-Flex ready, extend the system capabilities across any door and user access profile. JustIN Mobile access compatibility. Fully bidirectional–JustIN Mobile NFC/BLE Digital Key, and Apple Wallet. Apple Wallet. Distribute digital keys, enabling compatible iPhones and Apple Watches to unlock SALTO smart locks without the need to download any SALTO app. Grade 2 deadbolt. Meets the highest standards set by the security industry. Rated AAA according to A156.40 (American National Standard for Residential Deadbolts). Robust and long-lasting smart locking solution available in six different finishes that blend into any type of property decor. Cutting-edge hardware and communications security. Security and privacy are assured with end-to-end communications encryption.
Expert commentary
The average business owner or investor has some kind of security precaution in place, especially in the after-hours when there are fewer deterrents to inhibit criminal activity. Security guards, video surveillance systems, motion sensor lights, or even just fake cameras placed around the property are some of the common options people choose. Future of overnight security Smart business owners are starting to realise, however, that some of these traditional security measures are becoming antiquated and no longer cutting. The now and future of overnight security is in remote guarding. Pioneered by companies like Los Angeles-based Elite Interactive Solutions, which was founded back in 2007, remote guarding is revolutionising the overnight security business. Minimising criminal activity Remote guarding is fast becoming the most popular choice among commercial end-user property owners Remote guarding utilises a combination of cutting-edge technology, “digital guards,” highly trained security agents, and local law enforcement if and when necessary to minimise the potential of criminal activity. For those adequately enlightened to its overwhelmingly impressive crime prevention capabilities, remote guarding is fast becoming the most popular choice among commercial end-user property owners to secure and protect their investments. What Is remote guarding? Remote guarding is a revolutionary concept and increasing trend in security systems that utilises a combination of methods to effectively analyse potential threats to property. Cameras and/or other monitoring devices running highly advanced algorithmic software are installed in strategic areas or vulnerable places onsite and remotely located security agents are immediately notified of any activity within a designated perimeter of the property. A blend of AI, cybersecurity, and video analytics When properly deployed by an expert provider, the technology stack includes a proprietary blend of video analytics, artificial intelligence, cybersecurity, and more. Done right, “noise” is effectively filtered out, allowing agents to act on legitimate alerts and achieve zero false alarms communicated to first responders. Today, there are a lot of terms and descriptions tossed around about remote guarding, remote video, virtual guarding, etc., but those attributes must be present to represent the true definition of the offering and its many virtues. Realtime situational awareness Many systems have a two-way speaker that allows the security agent to give a verbal warning When specially trained security agents are alerted to trespassers, possible intruders, or other suspicious activity, they analyse the situation in real-time and determine the necessary level of action. Many systems have a two-way speaker that allows the security agent to give a verbal warning, known as a voice-down, to the individual(s) that they are being watched. Most perpetrators, often believing the response is emanating directly from security personnel on the property itself rather than from a remote command centre, flee immediately. However, if the threat persists, the security agent enlists local law enforcement to get on the scene. Customised remote guarding When properly deployed, remote guarding systems are also customised to specific properties. A team of consultants visits the client’s property to evaluate its vulnerabilities and where to best place cameras and/or other monitoring devices for system efficacy. Traditional security shortfalls According to Keith Bushey, a retired commander for the Los Angeles Police Department, there is much frustration between law enforcement officers and potential victims of crime due to the historically unreliable performance of traditional burglar alarm systems and central monitoring stations. He states about 90% of security-related calls are false alarms, a problem that has been well-documented through the years. Onsite challenges When a legitimate emergency does occur, the perpetrators have often already done their damage When a legitimate emergency does occur, the perpetrators have often already done their damage and/or escaped by the time law enforcement arrives. Onsite security guards are not the remedy either as they bring their own set of issues and challenges. Unexpected costs Traditional security systems can also have unexpected costs. The cost is not only in the security guards’ paycheck or the cost of the equipment itself. The cost comes when an actual incident occurs. In worst-case scenarios, the security guard(s) are injured, the business suffers inventory loss, and/or damage is sustained to the property. The medical and other costs for the security guard(s), the loss of inventory, property damage, deployment of law enforcement resources, and possible fallout of legal expenses all add up. Even in the best-case scenario, false alarm expenses incur if law enforcement is dispatched. These, among many others, are some of the primary issues that remote guarding resoundingly answers as a superior alternative. A bounty of benefits Remote guarding systems have been proven to cut costs and be more effective than traditional security systems. Even though the monthly monitoring costs of remote guarding are significantly higher than traditional intrusion detection system monitoring, the much higher effectiveness in crime reduction, elimination of false alarms, and augmenting or replacement of manned guards result in a substantially higher return on investment (ROI) to the end user. Easy tracking of threats The security cameras already have their image captured on record, making them easier to track down For example, case studies have demonstrated reduced security costs for clients by 60%, on average. These reductions have come from the costs of security staff, inventory, or property loss, plus saving money on insurance premiums and deductibles. The nature of remote guarding reduces the risk and costs of false alarms, with professional security agents able to determine an actual threat before law enforcement is called. In a rare instance when a perpetrator escapes before law enforcement arrives or can detain the individual(s), the security cameras already have their image captured on record, making them easier to track down and identify. Reduction of false alarms The significant reduction in false alarms is greatly appreciated by law enforcement, as it allows them to focus on real emergencies or crises. Better relationships are also developed between clients and law enforcement, as remote guarding systems are highly reliable in providing accurate and real-time information to officers as they approach the scene. In short, it assists law enforcement in doing their job more effectively, as well as more safely thanks to having eyewitness information before engaging in an active crime scene. Partnership When you combine the decreased cost with the increased efficiency and success rate, it is easy to see why many commercial end-user property owners across the country are making the shift to remote guarding. It’s also an outstanding opportunity for professional security dealers and integrators to partner with a remote guarding services provider to bring a superior solution to their end customers and pick up a recurring monthly revenue stream in the process.
It’s no secret that the data security sector is constantly changing. It has an annual CGR of about 12.3%. Future trends in data security Much of this has to do with the rise of cybercrime in recent years, with reports showing that cyberattacks happen as often as every 39 seconds. To combat the growing rate of cybercrime, data security has been on the rise. As we journey further into this era, it becomes evident that a spectrum of significant trends is molding the future of data security. This exploration delves into a selection of these trends, unraveling their importance and the potential implications they carry 1. AI security tools will increase Artificial Intelligence is also being used in the development of smart attacks and malware The introduction of Artificial Intelligence in the data security industry brought significant changes, especially in cybersecurity. AI has been the golden standard for face detection, natural language processing, automated threat detection, and automated security systems. Additionally, Artificial Intelligence is also being used in the development of smart attacks and malware, bypassing even the latest security protocols in data control. And as time progresses, AI security tools will flourish and dominate the scene. Let’s take a more in-depth look at three of the top AI security tools. Targeted attack analysis tool Manufacturers utilise targeted attack analysis tools to uncover targeted and stealthy attacks. Artificial Intelligence can be applied to the program’s capabilities, processes, and knowledge. For instance, Symantec launched this tool to combat the Dragon 2.0 attack in 2022. The phishing attack reprimanded multiple energy companies while trying to gain access to their operational networks. Targeted Attack Analysis Tools can analyse incidents and look for similarities from previous situations. They also help detect suspicious activities and collect all the necessary data to determine whether a specific action is malicious. Intercept X tool Results from the Intercept X Tool feature high accuracy and a low false positive rate Sophos, a British security hardware and software company, launched the Intercept X Tool. It engages a neural network that records and analyses data like a human brain. Sophos’ Intercept X Tool can extract features from a single file and perform a deep analysis. It detects malicious activities within 20 milliseconds. Plus, it’s also trained to work on bi-directional sharing and real-world feedback of threat intelligence. Results from the Intercept X Tool feature high accuracy and a low false positive rate. IBM Watson Technology IBM’s QRadar Advisor uses IBM Watson Technology, a unique AI tool for fighting cyber attacks. Artificial Intelligence can auto-investigate activities and indicators for potential exploitation or compromise. With cognitive reasoning, IBM Watson Technology can present critical insights to accelerate the response cycle. Security analysts can utilise this technology to search for threat incidents, reducing the risk of letting them fly under the radar. 2. Blockchain as a security solution It guarantees no points of failure or hackable entrances that can expose datasets inside the system Blockchain is a type of distributed ledger technology (DLT) that aims to establish trust within an untrusting ecosystem. Today it’s one of the most robust cybersecurity technologies in the industry. Blockchain utilises a decentralised ledger system, but your team members can still gain access to transparent information in the cloud. Members can also record, pass along, and view necessary transactional data in the blockchain. The entire blockchain process maintains data integrity within the system while establishing trust among team members. It guarantees no points of failure or hackable entrances that can expose datasets inside the system. Cybersecurity, biometrics Cybersecurity primarily benefits from these features because blockchain can create a secure and robust wall between data and hackers. On top of that, blockchain ledgers can include biometrics like fingerprints and retina scans. These prevent hackers from accessing any private data. Because blockchain is decentralised, it also limits hackable data. Together with the technology’s record-keeping system, each node is provided insight into data manipulation exposing real-time cybercrime attempts. 3. Increased and widened access control Without access control, expect your company to be open to security issues, including theft, data loss, and breach of data Access control is critical in data security. More than a valuable security tool, business leaders can use access control to regulate people accessing any given resource. A company with an IT security setting can control who has the liberty to edit certain files. One of the primary goals of access control is to minimise threats or attacks to organisations and businesses to keep people and data secure. Without access control, expect your company to be open to security issues, including theft, data loss, and breach of data protection laws. Benefits The benefits of increased and widened access control include: Identifying who can access and control your data at specific time intervals. Protecting data from overwriting, accidental deletion, and malicious intent. User permissions that can be readily changed. Compliance and regulation with data privacy laws. Central management of access to data through a reporting portal or a dashboard. Multi-factor authentication Access control comes in various types and systems, so it’s critical to know the features of what you’re looking for. The most common type is multi-factor authentication or MFA. It involves multiple steps before logging in, requiring the user to enter other relevant information besides the password. Some other examples of information include biometrics, answering a security question, or entering a code sent to the user’s email address. Two-factor authentication, role-based access control Two-factor authentication further prevents unauthorised entries that can result in unnecessary data possession Two-factor authentication further prevents unauthorised entries that can result in unnecessary data possession. Another type of access control is role-based access control. In this setup, only one individual can set up access guidelines and grant permissions to specific team members within an organisation. 4. Greater use of the zero-trust security model The zero-trust security model is a framework that requires every user within and outside the organisation to undergo authentication, authorisation, and validation. These are all essential to ensure proper security configuration before access is granted to the company’s applications and data. A zero-trust model assumes that anyone can cause data breaches and that a traditional network edge is not taken into effect. Moreover, it addresses the following modern-day challenges: Hybrid cloud environments. Security of remote workers. Ransomware threats. This framework utilises the combination of multiple advanced technologies, including: A risk-based multi-factor authentication. Endpoint security. Identity protection. Cloud workload technology. The zero-trust model uses all these innovative tools for system identification, user verification, access consideration, and system security maintenance. Constant validation and monitoring Enforcing strict policies and compliance with data privacy laws are also essential Additionally, it also considers data encryption, email security, and asset verification before establishing connections with applications. The architecture of a zero-trust framework requires constant validation and monitoring of the users and the devices they are using. Enforcing strict policies and compliance with data privacy laws are also essential. More importantly, the zero trust architecture requires all organisations to be aware of all their available services and accounts to gain complete control of data handling and manipulation. 5. Increased privacy regulations Privacy regulations and policies guide organisations in proper data control, handling, and security. These policies guide organisations in proper data control, handling, and security. As a responsible business owner, you must comply with these regulations to avoid legal issues. With cybersecurity attacks becoming common, expect increased and stricter privacy regulations to be released in the next few years. While current policies are still taken into effect, various modifications and adjustments will occur to compete with the rising numbers of data breaches, thefts, data loss, and more. California Privacy Rights Act (CPRA) Currently, the California Privacy Rights Act (CPRA) is the most comprehensive legislation on state data privacy. It only started to take effect on January 1, 2023. The CPRA introduces the following principles: Broad individual consumer rights. Significant duties of people who need to collect sensitive and personal information. Additional definitions of data privacy and security. An individual’s duties include releasing information about data collection to concerned data subjects and proper access, correction, and deletion of information. Final thoughts 2023 is a big year for data security. Trends such as increased adoption of zero-trust policies, a greater reliance on AI security tools, and the implementation of blockchain as a security solution are all things we expect to see shortly. Staying up-to-date with these trends is important for keeping your business current and ensuring that you’re adhering to new and changing regulations. Doing so can give you an edge over the competition and keep you out of legal hot water.
Daniel May of Consort reviews the integration of access control systems in healthcare settings, outlining the benefits and key considerations decision-makers must make throughout product specifications. From patient safety and traversal to the protection of sensitive data and pharmaceuticals, healthcare environments are faced with several operational challenges. And where security remains at the forefront of decision-making, modern access control systems may often hold the answers. Physical security systems Hospitals in particular have developed into multi-faceted spaces that house hundreds to thousands of patients, staff and visitors at any one time. In England for example, research has found in the three months leading to June 2023, an average of 44,626 people visited major hospital A&E departments each day, with over 16 million attendances typically recorded over the course of a year-not to mention an additional nine million logged at other minor units. For any building, this level of sustained footfall can request severe security difficulties For any building, this level of sustained footfall can invite severe security tests. With that, the need to deploy effective physical security systems in healthcare is clear. And so, as access control continues to become more readily adopted and new products enter the market, decision-makers are reminded to consider the requirements of their building, ensuring they select the solutions most suited to their settings and budget. Security controlled Patient safety will always remain the top priority in healthcare settings, and where matters of health and social care come into question, a diverse set of professional regulatory bodies are tasked with setting and maintaining high standards. When it comes to healthcare premises specifically, patient security and perimeter security often come hand in hand and are amongst the most pressing of challenges that decision-makers must face. To help address operational planning and potential design concerns in the NHS, the Health Building Note (HBN), provides general design guidance for healthcare buildings under HBN 00-01-citing the use of access control measures as a way of maintaining security and protecting the safety of patients, staff and visitors. Use of access control Hospital buildings control varied levels of access for a number of security purposes Hospital buildings, for example, must control varied levels of access for a number of operational and security purposes. Routine scenarios exist where vulnerable patients are under monitoring and thus refrained from exiting the premises for their own safety, while at the same time, permitted staff must be able to reach their patients and medicines when required. For this, the use of access control is key. Equally, access credentials can also help management teams keep track of those who may be entering or exiting rooms with equipment and pharmaceutical supplies, deterring any unwanted visitors and opportunists in the process. Incorporation of access control systems On a similar note, regulations have set a minimum standard for how personal data should be stored and managed in healthcare environments, giving decision-makers an added responsibility to regulate staff-controlled areas with patient medical records. While instances of personal data breaches are rare, healthcare facilities and professionals are at legal risk should confidential data be found misused or missing. As such, the incorporation of access control systems has become essential in keeping data storage areas secure, with intuitive online systems capable of permitting access to staff with the correct credentials while simultaneously tracking who has requested clearance at digital entry points. HBN guidance Healthcare experts are better fitted to control the sheer volume of people entering and exiting To function effectively, healthcare facilities must always be perceived as safe places by the people who reside within them, and as HBN guidance implies, a unified physical security system can help address key safety and security concerns while enhancing patient and staff experience. Opportunely, access control systems are more accessible and adaptable than ever and combine several technologies such as mechanical locks and automatic doors with electronic access credentials in the form of smartphone apps, badge readers and biometric scanners. By integrating these systems into the building’s existing infrastructure, healthcare professionals are better equipped to control the sheer volume of people entering and exiting the premises without impairing the general flow of movement and coordination around the facility. Better by design Despite the clear benefits offered to healthcare facilities, there are a number of considerations to be mindful of when choosing an access control solution. Poorly implemented systems can have an adverse effect on security and functionality - quickly costing healthcare organisations time and budget to rectify and replace the inadequate products that don’t meet the building’s requirements. For that reason, decision-makers and design teams are reminded that there is no single solution that fits all healthcare buildings. As such, it’s crucial for decision-makers to understand the systems that are being put in place throughout each of the touchpoints in their facility. Clear collaboration is required during periods of specification, where together, teams can ensure the selected product works on all angles, from meeting fire safety and sustainability standards to aesthetics and scalability. Modern access control products Scalability is a key area that decision-makers must review when selecting access control systemsFrequently overlooked, scalability is a key area that decision-makers must review when selecting access control systems. Such is their diverse nature; healthcare facilities can often change and develop as years go by, and by selecting a system that facilitates growth, such as a cloud-based solution-security and efficiency is long-established. While modern access control products are known for seamless integration, there are some systems that may restrict the ability to use different vendors throughout the remainder of the building’s infrastructure. This, in effect, causes a monopolisation of products throughout the estate, which can have an adverse effect on growth by increasing costs and reducing the levels of service associated with the security system already in place. Improve security and safety A scalable and reliable access control system will continue to improve security and safety by adapting to a building’s new requirements-and all while having minimal impact on its operational network. And so, while technology will no doubt continue to influence and transform the access control market, healthcare facilities and their professionals must continue to remain educated on their own systems, ensuring they have the best options in place to keep their patients, staff and visitors safe and secure for years to come.
Security beat
Companies at GSX 2023 emphasised new ways that technologies such as artificial intelligence (AI) and the cloud can address long-standing issues in the security market. Among the exhibitors at the event in Dallas were companies seeking creative ways to apply technology, lower costs, and make the world a safer place. Reflecting on the exhibition, here are some additional takeaways. Expanding AI at the edge i-PRO is a company reflecting the continued expansion of edge AI capability in the security market. Today, more than half of the company’s lineup supports AI at the edge so the customer has a wide choice of form factors when seeking to leverage the feature set. AI processing relay, extended warranty i-PRO is increasing their warranty period from 5 to 7 years, which could be a lifetime warranty in some cases I-PRO also has an “AI processing relay” device that accepts non-AI video streams and applies edge analytics. AI has progressed from a high-end technology to a feature available in a variety of cameras at different price points. i-PRO is also increasing its warranty period from 5 to 7 years, which could be a lifetime warranty in some cases depending on a customer’s refresh schedule and lifecycle management. Active Guard, MonitorCast The company’s video management system (Video Insight) is continuing to build new features including “Active Guard,” an integrated metadata sorter. Their access control platform, MonitorCast, is a Mercury-based solution that is tightly integrated with Video Insight. Their embedded recorders now have PoE built in. “We can move at a faster pace to fill out our product line since leaving Panasonic,” says Adam Lowenstein, Director of Product Management. “We can focus our business on adapting to the market.” Emphasis on retail and other verticals Shoplifting is a timely issue, and retail is a vertical market that got a lot of attention at GSX 2023. “We see a lot of retailers who are primarily interested in protecting employee safety, but also assets,” says Brandon Davito, Verkada’s SVP of Product and Operations. “Shrinkage is a CEO-level priority.” “Retailers are getting more engaged with security posture, instead of letting perpetrators walk,” Davito adds. Intrusion detection Verkada has an intrusion product that will notify a central station if there is an alarm On the alarm side, Verkada has an intrusion product that will notify a central station if there is an alarm, and operators can review videos to confirm the alarm. Other capabilities seeking to discourage trespassers include sirens, strobes, and “talkdown” capabilities. International expansion Verkada continues to expand internationally with 16 offices in all, including Sydney, Tokyo, and London. The core value proposition is to enable customers to manage their onsite infrastructure more simply, including new elements such as PTZ cameras, intercoms, and visitor management. Verkada emphasises ease of use, including a mobile application to allow access to be managed across the user base. Forging partnerships “We are committed to the channel and industry, and we continue to build relationships and expand our reach,” says Davito. Among the industry relationships is a new partnership with Convergint, which was hinted at during the show and announced later the same day. They are also expanding their partnerships with Schlage, Allegion, and ASSA ABLOY. Working with other verticals They offer new features for K -12 schools, and a new alarm platform is easier to deploy and manage Verkada has also found success across multiple other verticals, notably healthcare, where they integrate with an electronic medical records system. They offer new features for K-12 schools, and a new alarm platform is easier to deploy and manage. They are integrating wireless locks to secure interior doors in schools, looking to secure the perimeter, and installing guest management systems. Transitioning the mid-market to the cloud Salient is squarely focused on the “mid-market,” a large swath of systems somewhere between small businesses and enterprise-level systems. Pure cloud systems are not as attractive to this market, which has a built-out infrastructure of on-premise systems. Adding a camera to an existing system is easier and less expensive than tying it to the cloud. Benefits of cloud It’s a market that may not be ready for the pure cloud, but there are benefits to be realised from adding a cloud element to existing systems. “We are continuing to augment our premise-based solutions with added cloud capabilities and flexibility,” says Sanjay Challa, Salient’s Chief Product Officer. The feedback Salient hears from their customers is “I want to own my data.” The hybrid cloud approach offers the right mix of control, flexibility, and unit economics. Cloud add-on capabilities We want to provide the flexibility for customers to go full-cloud as it becomes more economically attractive" Cloud add-on capabilities include bringing more intelligence about system operation to the user via the cloud. Over time, Salient expects to sell more cloud-centric offerings based on feedback from integrators and customers. “We want to provide the flexibility for customers to go full-cloud as it becomes more economically attractive over time,” says Challa. Vaidio AI technology Salient seeks to be a transition pioneer to help customers realise the path to the cloud. Their approach is “crawl, walk, run,” and helping customers make the transition at each stage. Salient has added AI to its product offering, incorporating Vaidio AI technology from IronYun into a powerful suite and broad array of on-premise analytics, which are gaining traction. The seamless approach makes it easy for customers to embrace AI analytics, although Salient remains broadly committed to open systems. Addressing ‘soft’ features for integrators AMAG is in the process of enhancing its product line with the next generation of access control panels. However, “product” is just part of the new developments at AMAG. In addition to “hard” features (such as products), the company is looking to improve its “soft” features, too; that is, how they work with the integrator channel. Integrator channel Rebuilding a process to make your organisation more efficient, is relatively easy; it just takes a lot of persistence" “We have the depth of our legacy customer base we can learn from, we just need to close the feedback loop quicker,” says Kyle Gordon, AMAG’s Executive Vice President of Global Sales, Marketing, and commercial Excellence, who acknowledges the value of reinstating face-to-face meetings after COVID. “We are laser-focused on nurturing our integrator channel,” he says. “Developing new features takes time, but rebuilding a process to make your organisation more efficient, that’s relatively easy; it just takes a lot of persistence,” says Gordon. More cohesive internal communication is another useful tool, he says. Disrupting the cloud based on price Wasabi is working to make cloud applications less expensive by offering a “disruptive” price on cloud storage, $6.99 per terabyte per month (80% less than hyperscalers). Contending “hyperscalers” like AWS are charging too much for cloud storage, Wasabi is using its own intellectual property and server equipment co-located in data centres around the world. Wasabi sells “hot cloud storage,” which refers to the fact that they only have one tier of storage and data is always accessible. In contrast, a company such as AWS might charge an “egress fee” for access to data stored in a “colder” tier. Cloud storage “We saw that several video surveillance companies had not yet adopted cloud storage, and we saw an opportunity to make it easy to use,” said Drew Schlussel, Wasabi’s Senior Director of Product Marketing. “We just install a little bit of software that allows them to store data in the cloud and bring it back from the cloud.” Performance, protection (cybersecurity), and price Wasabi works with integrators, resellers, and distributors and also integrates with VMS companies Wasabi works with integrators, resellers, and distributors and also integrates with VMS companies such as Genetec and Milestone. Emphasising performance, protection (cybersecurity), and price, their data centres are certified to SOC 2 and ISO 27001 standards. Faster throughput for weapons detection Xtract One is a young company focusing on weapons detection in a time of accelerated concern about gun issues post-COVID. Founded in Canada and based on technology developed at McMaster University, Xtract One has found a niche in providing weapons detection at stadiums and arenas. These customers already have budgets, and it is easy to shift the money to a newer, faster technology. Madison Square Garden in New York City is among its customers. Cost savings solution Xtract One can increase throughput to 30 to 50 people per entrance per minute (compared to 5 to 6 people per minute when using metal detectors). The solution doesn’t require anyone to empty their pockets and the system alarms on items beyond guns and knives. Using Xtract One allows customers to reduce the number of screening lanes and security staff, providing additional cost savings, all while getting fans through the screening process in half the time. Purpose-built sensors The system uses purpose-built sensors looking for specific characteristics, such as reflective and density properties In addition to stadiums and arenas, Xtract One, formerly Patriot One, is also getting “inbound” interest from schools, hospitals, manufacturers, and other verticals that makeup 50% of their business. “We’re on a rocket ride, mainly because the weapons issues are not going away,” says Peter Evans, CEO and Director at Xtract One. The system uses purpose-built sensors looking for specific characteristics, such as reflective and density properties, all correlated by an AI engine. Providing early warning of violence ZeroEyes is another company focused on weapons detection. Their AI gun detection system works with video images to identify if someone is “brandishing” (carrying) a weapon. In other words, the system does not detect concealed weapons. Identifying someone carrying a weapon provides early warning of a possible violent act. Increased response with AI-enables images Images are identified by AI and sent to a monitoring centre where a human confirms the image before contacting first responders. Knowing the location of a shooter enables staff to lock entry points, move people to safety, and direct first responders. The company was founded to leverage existing camera views to stop mass shootings and gun violence by reducing response times.
PKOC stands for Public Key Open Credential. It is a new standard that will meet a 30-year industry challenge and strip away much of the complexity and cost involved in protecting and administering credentials for access control. It could also accelerate the transition from cards to mobile access control. PKOC is a standards-based mobile credential that is essentially free, vendor-agnostic, and interoperable across multiple devices and systems. It is a highly secure access credential that can live on a mobile phone, in a plastic access card, or in any device capable of generating a public-private key pair. Access control systems PKOC is the newest standard of the Physical Security Interoperability Alliance (PSIA), a tax-exempt organisation created to define, recommend, and promote standards for IP-enabled security devices and systems. PSIA introduced the Physical Logical Access Interoperability (PLAI) specification in 2013 to normalise identity data across disparate physical access control systems. The PKOC specification was introduced in 2021. We’re convinced this is the future A challenge for PSIA in promoting the PKOC mobile credential is to explain it quickly and in layman’s terms “We see the benefit of implementing the PKOC technology and doing it well,” says Sam Siegel, Senior Field Applications Engineer for ELATEC, a manufacturer of credential-agnostic readers/writers. “We wanted to get involved and join the discussion.” ELATEC has been participating in PSIA for more than a year. “This is a better way to do things,” says Siegel. “The PSIA, myself included, are convinced this is the future. The challenge is to get enough people to understand that it is a seismic shift away from what has been in place for so long.” A challenge for PSIA in promoting the PKOC mobile credential is to explain it quickly and in layman’s terms. The explanation spans the concept of public key infrastructure (PKI) and the difference between symmetrical and asymmetrical digital keys. Protecting symmetrical keys A symmetrical key system, which has been used historically in the access control market, involves the use of a single proprietary digital key to both encrypt and decrypt information. This means that digital public keys must be incorporated into each access control reader in the form of a module or a license, which the reader uses to read any compatible cards. Protecting symmetrical keys has been an expensive technology challenge the access control world The need to share these digital keys (in effect, the ability to read every compatible card) securely among access control manufacturers, integrators and end users involves extra administration and costs to ensure the security of the system. Protecting symmetrical keys has been an expensive technology challenge the access control world has borne for decades. The use of proprietary keys also promotes dependence on a single manufacturer or vendor to expand the ecosystem. The use of asymmetrical keys takes away these challenges. Advantages of using asymmetrical key pairs PKOC embraces the principle of PKI (public key infrastructure), a two-key asymmetrical system used to ensure confidentiality and encryption. In effect, there are two digital "keys," one public and one private, that are used to encrypt and decrypt information, in this case, a credential for an access control system. The secure credential standard is generated independently of a third-party credential issuer. It is generated within the device. In the access control scenario, the smartphone generates a key pair in the secure element of the phone, including a private key, which is stored on the smartphone, and a public key, which serves as the user’s ID number in the access control system. Sharing the public key is not a security risk because it is worthless without the private key that is locked away on the smartphone. PKOC-enabled smartphone The smartphone must contain the private key in order to interface with the access control system When a PKOC-enabled smartphone approaches a PKOC-enabled reader, the reader sends a one-time random number (a ‘nonce’) to the smartphone, which then encrypts it using the private key, and sends it along with the public key back to the reader. The reader uses the public key to decrypt the random number, which confirms the authorised access associated with the smartphone. The signals are sent via Bluetooth Low Energy (BLE). Importantly, the private key never leaves the smartphone and is never shared with any other elements of the access control system. Therefore, there are no administrative or technical costs associated with protecting it. The smartphone must contain the private key in order to interface with the access control system using the public key. Mobile credentialing system For ELATEC, embracing PKOC provides a new way to highlight the company’s value proposition and promote it to a new group of companies; i.e., those who adopt the PKOC approach to mobile credentialing. The ‘universal’ configuration of the ELATEC reader hardware is credential-agnostic “PKOC serves as a great way to show off our value and what we do best,” says Siegel. ELATEC provides credential readers/writers that operate in a variety of card and reader environments, incorporating an integrated BLE module to support mobile ID and authentication solutions, including PKOC. Using applicable firmware, the ‘universal’ configuration of the ELATEC reader hardware is credential-agnostic and so compatible with any RFID card or mobile credentialing system, all in a small form factor (around 1 1/2 inches square). How readers and smartphones interact The PKOC standard addresses the variables of how the reader and the smartphone share information. Currently, the PKOC standard addresses communication via BLE, but the principle is the same for systems using near-field communication (NFC), ultra-wideband (UWB), or any future protocols. PKOC also defines how device manufacturers can enable devices (readers, locks, control panels, biometric devices, etc.) to securely consume the credential for authentication and access. PKOC can be used with smart cards as well as with smartphones. In the case of a smart card, the public and private keys are contained on the smart card, which communicates via NFC with the reader. The encryption/decryption scenario is exactly the same. PKOC enables users to ‘bring your own credential’ (BYOC). Public key number ELATEC is proud to have played an instrumental role with the PSIA in the implementation of PKOC" BLE offers a broader read range than NFC; the read range can be managed using software and/or by signalling intent or two-factor authentication. Because private keys remain secure inside a smartphone, they do not have to be incorporated into a digital wallet for security purposes, although they could be incorporated for matters of convenience. To simplify administration, the public key number can be used as a badge number. If badge numbers have already been assigned, a column could be added to the database to associate badge numbers with public key numbers. “ELATEC is proud to have played an instrumental role with the PSIA in the implementation of PKOC,” said Paul Massey, CEO of ELATEC, Inc. “End-users should not be limited in their solution mix to one or two vendors due to their proprietary technology. PKOC now provides the ideal combination of security, convenience, interoperability, and cost for industry participants, by industry participants.” ‘Experience PSIA’ will promote PKOC at ISC West ISC West participants include PSIM manufacturer Advancis Software and Services The flexibility of PKOC will be on display at ISC West 2023, where ‘Experience PSIA’ will register attendees and provide them with a PKOC credential that can be used with a variety of readers throughout the show. Also showcasing the PLAI standard, PSIA’s presence at ISC West will include ELATEC along with several other vendors/manufacturers. A special PSIA event will be held from 5:30 to 7:30 p.m. on March 29 at the Venetian Ball Room B&C in Las Vegas. ISC West participants include PSIM manufacturer Advancis Software and Services, which acquired Cruatech software in 2012; and Idemia, specialising in identity-related security services including facial recognition and other biometrics. Integrated security systems Also involved are Johnson Controls (JCI), an integrated security systems provider that offers a range of security products and services; and Siemens, which offers its own range of security solutions and systems. Other participants include Last Lock, which has a unique spin on internet-enabled locks; while SAFR from Real Networks offers accurate, fast, unbiased face recognition and additional computer vision features, and Sentry Enterprises provides the SentryCard biometric platform for a privacy-centric, proof-of-identity solution. Finally, rfIDEAS manufactures credential readers.
Clean, safe mass transit systems benefit everyone. Today’s transit operators face tremendous challenges, including declining revenue due to work-from-home policies, concerns about disease prevention, and high crime environments. Among these concerns, difficulty recruiting and retaining police resources has been exacerbated by the ongoing mental health crisis that disproportionately impacts public transportation networks. Mass transit systems Safe cities require an operational environment where people feel comfortable on mass transit. Sustainable cities are built upon the growth of mass transit systems. Safe cities and mass transit go hand-in-hand. The safety of an urban city is intrinsically linked to the safety of its mass transit systems. Safe cities require an operational environment where people feel comfortable on mass transit For additional insights into the security of transit systems, we spoke with Angela Osborne, Associate Vice President of Risk and Emergency Management Solutions at Guidepost Solutions, who specialises in emergency management planning, security risk assessments, and physical security assessments. Q: How did the COVID pandemic impact the security of transit systems? Angela Osborne: The pandemic had a profound impact on transit system security. Transit systems are already highly susceptible to crime prevention through environmental design (CTPED) issues. Facilities with poor maintenance, lack of active monitoring or incidence response, and low foot traffic all contribute to CTPED issues, and the pandemic only aggravated this. Many regular commuters began remote work, thus leading to less use of transit facilities. Transit centres experienced an uptick in individuals engaging in drug activity, encampments, encounters with mentally disturbed persons, and opportunistic crime. As a result, individuals who maintained their commute became fearful due to safety and public health concerns. Q: How do millions of employees returning to work (after working at home, for example) change the transit security challenges? This has become a reason why individuals are resistant to returning to working onsite Osborne: While employees returning to work has increased foot traffic and the use of transit has provided positive CPTED elements in terms of having additional eyes and ears around, many individuals are stepping back into a risk environment that has significantly changed since these systems were last widely used. Due to the increase of illegal behaviour in transit facilities, criminality has surged across numerous urban areas. Many returning transit users were not prepared to face these changes. This has become a reason why individuals are resistant to returning to working onsite. Q: What role can employers play in keeping commuters safe as they return to the office? Osborne: Organisations need to provide security awareness training focused on transit. At a minimum, they should share safety resources provided by transit authorities. In addition, harassment on transit systems is a persistent issue that should not be overlooked. Organisations need to provide security awareness training focused on transit Organisations cannot assume that everyone is familiar with these elements, taking into consideration that some individuals began employment at the organisation during the pandemic or are recent graduates. Others may not have had to navigate transportation to the office in years. If an organisation is requiring staff to come to an office, the organisation should fulfil its duty by providing training and resources. Q: What other current trends are impacting transit security -- for better or for worse? Osborne: Transit systems are impacted by many serious trends. Transit is a target for terrorists and saboteurs due to the trends of cybersecurity attacks and active assailant targeting. We recently saw how a cyber sabotage event crippled train operations in Germany. Whether the threat actor is a nation-state or non-state actor, many systems have significant cybersecurity vulnerabilities. As more individuals return to the office, more opportunities for targeting arise. In terms of physical threats, most transit systems are simply not equipped to conduct weapons screenings and have difficulty deterring weapons due to legal regulations. Q: What is the biggest missed opportunity when it comes to transit security? By incorporating AI features, systems can leverage an exceptions-based alerting system Osborne: The biggest missed opportunity is leveraging artificial intelligence (AI) advancements for video surveillance. We tend to find that transit systems have a lot of cameras, but systems are rarely monitoring all cameras in real-time due to the high number of cameras present. By incorporating AI features, systems can leverage an exceptions-based alerting system. Many existing cameras have some form of analytics present that can be leveraged to indicate a line cross and alert on motion; however, AI allows for a greater range of options to alert operators to issues. Q: What is the role of technology to ensure a secure transit system? How well does technology, in general, address the need? Osborne: Technology is an important element in securing a transit system. The current challenge is that the use of technology systems is used reactively rather than proactively. For instance, a video surveillance system is usually leveraged after an incident has taken place. Integrating access control systems, intrusion detection and alarms, and video surveillance can provide a much more proactive approach leading to faster detection or system alerts, enabling a safer and more accessible response. Technology can only accomplish this when paired with a response mechanism. Q: How will the practice and impact of transit security change in the next 10 years? One of the big factors will be the ability to recruit and retain transit police or supporting law enforcement Osborne: Most transit systems will need to adapt to a hybrid work approach to right-size their operations and consider greater consolidation to make security resources more sustainable. One of the big factors will be the ability to recruit and retain transit police or supporting law enforcement. This is a challenge for many urban departments and could continue to have ripple effects for mass transit. As more individuals use mass transit and return to some level of pre-pandemic life, people are likely to feel more comfortable on mass transit (pending no follow-on pandemics) with these safeguards in place. Q: What else do transit security professionals need to know? Osborne: I encourage all transit security systems to conduct a threat, risk, and vulnerability assessment to better understand the risk environment. Data is generated across these systems; however, it is often not being collected and leveraged to its fullest capacity to enable informed security and safety decisions. I would also recommend that new transit systems consider full barriers to prevent individuals from deliberately jumping or accidentally falling onto tracks. Although retrofitting stations to include this is difficult, new build stations offer a good opportunity to incorporate safe and secure design from the start.
Case studies
Traka’s intelligent key management systems have been installed at Loughborough University, to achieve its objectives for more efficient processes and controlled access for contractors across the 523-acre single-site campus. Standing as one of the top 20 research-led universities in the country, and the best in the world for sport-related subjects, Loughborough offers top-class facilities with integrated security innovation for the students, staff, and visitors. 25,000 keys operation Alongside academic departments, the Loughborough campus comprises 350 buildings, including 17 halls of residence, the Student’s Union, two gyms, gardens, and playing fields. As a result, facility managers on-site operate over 25,000 keys all of which require careful management for use by its 5,223 staff Traka’s key management solution Seven systems allow automated access control to authorised personnel with a complete audit trail Implementing Traka’s key management solutions has helped manage contractor access on-site, which is often required outside of office hours or during holiday periods. To date, seven systems allow automated access control to authorised personnel with complete audit trail capability to manage the keys from being taken to the point of return. Challenges with security Says Mark Findley, Stores and Key Room Co-ordinator at Loughborough University, “The sheer size of Loughborough University and the number of keys in operation, presents a complex security issue." "It is designed as a ‘welcoming’ public space for our students. This must be balanced with managing constant visitor traffic, securing multiple buildings, and managing the number of contractors on site as we continue to strive for excellence." Key cabinets Key cabinets produce time and cost savings for us as security doesn’t need to be called out every time" “Keys have to be easily located and ready for use to ensure works programmes are not delayed that may impact the university operations. We needed a smarter solution, and Traka helped us right from the design process, through to implementation and continues to grow with us." "Traka’s secure key cabinets produce time and cost savings for us as security doesn’t need to be called out every time a contractor needs a key or access and we can instantly account for who is on-site and what work is being carried out.” Automated email with door numbers Loughborough University recently added a Traka key cabinet to a residential development, offering 60-room facilities. The key management system enables visitors to receive an automated email with door numbers and access requirements relating to the length of their stay. This removes the need for reception operators to provide access at weekends or over holiday periods, a clear cost-saving for the University. Flexibility and scalability It ensures the highest level of security at all times and removes the risk of human error" Traka is also looking at ways to support the Student Union for students requiring temporary access to different rooms for club meetings. Mark continues, “The flexibility and scalability of the Traka system is beneficial to the site team at Loughborough University." "It ensures the highest level of security at all times and removes the risk of human error. It also allows us to adapt and grow our access management capabilities in lockstep with the evolving needs of our dynamic campus environment." Countless advantages Tom Smith, Traka Traka UK Sales Director concluded, “Our work with Loughborough University is a true partnership. We work closely with our universities right from the initial design and specification process where we can understand the issues faced by the team." "We can then implement a bespoke solution with countless advantages, including contractor management. We’re proud to work with Loughborough, not only to enhance security but also to alleviate stretched resource issues, to enable the university to operate seamlessly for the benefit of all its staff, students, and visitors.”
Alarming increases in vehicle thefts, unsolved traffic collisions, and stolen cargo in the Mexican State of Tlaxcala, motivated the Executive Commission of the State Public Security System (CESESP) to expand and upgrade its video security system. To counter the rise in crime, the CESESP sought a flexible, scalable, open-platform video management system (VMS) that could seamlessly incorporate existing cameras as well as over 800 new cameras and edge devices from a range of hardware and software providers. Tlaxcala Located in East-Central Mexico, Tlaxcala is one of 32 states within the Federal Entities of Mexico. With a population of approximately 1,343,000, based on the 2020 census, Tlaxcala is the smallest yet one of the most densely populated states in Mexico. The CESESP of Tlaxcala is tasked with safeguarding residents across the state's 60 municipalities. C4 centre C4 centre has multiple teams of six security professionals who monitor the system around the clock At the core of all security operations, including the 911 emergency response and 089 confidential tip line, is the CESESP's Control, Command, Communications, and Computing centre (C4). The state’s C4 centre has multiple teams of six security professionals who monitor the system around the clock on a large, 24-screen video wall. The C4 also houses the system’s HP and Lenovo servers. Flexibility, scalability, and budget “Flexibility, scalability, and strictly adhering to the budget were top requirements for this critical, state-wide project,” said Maximino Hernández Pulido, Executive Commissioner of the State Public Security System. “We considered a variety of proposals and providers, but we ultimately followed the advice of our integrator, Digital Information Systems, and selected XProtect Corporate from Milestone Systems.” XProtect Corporate The new system includes cameras from Hanwha Vision, Bosch Security and Safety Systems, Hikvision, and Pelco The new system includes cameras from Hanwha Vision, Bosch Security and Safety Systems, Hikvision, and Pelco, all integrated within the system and managed by XProtect Corporate VMS from Milestone Systems. The system is also fully integrated with the BriefCam Video Analytics Platform, delivering video intelligence for system managers to identify, monitor, investigate, and visualise incidents plus video data to make smarter decisions. Efficient and cost-effective integration “Because state officials rely on their video system 24/7, the update needed to be gradual with no downtime. As new cameras were integrated into the Milestone platform, the previous system slowly disappeared,” said Isaac Sánchez Morales, an engineer at Digital Information Systems (SDI), an integrating company. “The XProtect Corporate open platform VMS allowed us to leverage our existing cameras and servers, integrate new equipment and devices, making the process very efficient and cost-effective, and we never had a gap in service.” Data-driven video for fast response times BriefCam video analytics technology The solution detects, identifies, and classifies video metadata to drive more efficient investigations The BriefCam video analytics technology seamlessly integrates into Milestone’s XProtect Smart Client. The solution detects, identifies, and classifies video metadata to drive more efficient investigations and business decisions, such as finding missing persons, investigating the vandalism, theft, assaults, accidents, injuries, or acts of violence, as well as extracting and analysing through heatmaps, dashboards, and visualisations. The analytics have proven beneficial in accelerating investigations, attaining situational awareness, and optimising operational intelligence for enhanced video search, alerting, and data visualisation. Real-time alerts, situational awareness “We installed the BriefCam Insights and Investigator products, and regularly use the platform’s RESPOND and RESEARCH capabilities. One of the advantages of all these XProtect-integrated analytics is that operators do not have to open additional windows or enter new credentials to access them,” said Sánchez. “With this integration of technologies, operators can trigger real-time alerts based on complex object classifications and filter combinations to increase situational awareness meaning authorities can react to events as they unfold.” Proactive policing with LPR With the BriefCam RESPOND solution, object characteristics and licence plate recognition tools can be used" Sánchez added, "With the BriefCam RESPOND solution, object characteristics such as a vehicle, person, or animal, and licence plate recognition tools can be used to trigger rule-based alerts." "These tools can help overcome the challenges of urban video surveillance and drive proactive policing in Tlaxcala." Video technologies reduce state crime rates Following the comprehensive expansion of the security infrastructure, statistics from the Executive Secretariat of the National Public Security Systems revealed Tlaxcala boasted the lowest crime rate nationwide. With the modernised system in place, officials documented a 93% reduction in pilfered freight from transport companies. Similarly, vehicle theft declined by 22.5%. A cost-efficient and flexible way Milestone Interconnect provides a cost-efficient and flexible way to gain central surveillance According to Sánchez and the SDI team, it is expected that each municipality within the territory will soon have its own locally focused VMS. With the use of Milestone Interconnect, all the municipality subsystems will integrate directly with the state-wide platform. Milestone Interconnect provides a cost-efficient and flexible way to gain central surveillance of multiple sites spread across a region. C4 video surveillance operation “The integrated solution delivered through Milestone is a robust, efficient, and secure system that provides all the necessary tools for the C4 video surveillance operation,” added Executive Commissioner Hernández-Pulido. “In addition, the excellent technical and post-sales support from Milestone and SDI has led us to meet the system and performance goals we set for ourselves.”
As one of the main tourist destinations in the Caribbean, The Bahamas welcomes nearly seven million visitors every year. Unfortunately, the City of Nassau, the capital of the Bahamas, has seen increased crime in certain parts of the city over the last several years from pickpockets and vehicular crimes to armed robberies and kidnappings. Policing, safety, and security Based in Nassau, the Royal Bahamas Police Force (RBPF) employs over 3,000 officers and provides policing, safety, and security services to residents and visitors. However, the RBPF was challenged to keep up with the rising tide of criminal activity. The government fully supported the RBPF’s initiative to expand the country's surveillance system as a strategic tool in the fight against crime. Track and monitor, situational awareness The RBPF added system infrastructure and hundreds of new IP-video cameras to increase police presence" “There are known criminal hotspots across the city that people of interest frequent," said Ethan Munnings, CTIO at Proficient Business Services, Bahamas, and the lead engineer for the City of Nassau video surveillance project. “To curb incidents in those areas and to better track and monitor suspects, gain situational awareness, and to be able to help locate or identify people after leaving the scene, the RBPF added system infrastructure and hundreds of new IP-video cameras to increase police presence. One of those areas, for example, is the surroundings of the house of the Prime Minister.” Milestone video management system In 2011, the city set up its initial Milestone video management system, overseeing around 250 cameras. Later, in 2019, Nassau officials collaborated with Proficient Business Services to integrate almost 500 additional cameras and edge devices into the system. A restructuring of the network infrastructure was required to consolidate all data feeds to the city's Real-Time Crime centre. The new crime centre, located at the police headquarters, opened in February 2021, acting as the Royal Bahamas Police Force's technological epicentre. Innovative technology Integration In early 2020, the Ministry of National Security of the Bahamas began expanding its existing Milestone XProtect video management system. Milestone's open platform data-driven video technology system is compatible with various hardware and software vendors. The upgrade led to redesigning of the network infrastructure and the addition of over 500 high-quality network cameras from Axis Communications. Facial recognition and video analytics ShotSpotter, the gunshot detection system was also integrated into the greatly expanded system The project involved several Milestone technology partners, including system servers from Rasilient Systems, and video analytics applications such as Licence Plate Recognition (LPR) and facial recognition from BriefCam. ShotSpotter, the gunshot detection system from SoundThinking, was also integrated into the greatly expanded system. Artificial intelligence and deep learning Within the Milestone VMS, the cameras and servers integrate with BriefCam’s video analytics, providing facial recognition and person/object tracking. By harnessing the power of artificial intelligence and deep learning, integrated BriefCam technologies transform video data into valuable insights for rapid video review, search, and real-time alerting. Two types of LPR The system also offers two types of Licence Plate Recognition. The first is via the Milestone LPR add-on, and the second is through direct integration with BriefCam. A team of 14 operators relies on Auvik for device monitoring and SolarWinds to manage the core network. The fiber network, with a 10G backbone, is based on Cisco technologies. Traffic safety revolutionised Video technology was pivotal in this endeavor, with fatal accidents in New Providence dropping to 33 in 2019 Beyond enhancing security, Nassau's updated city video system has proved instrumental in monitoring traffic accidents and holding drivers responsible for their behaviour. Eyewitness News from Nassau reported 69 deaths related to traffic in 2018. After witnessing an almost 30 percent surge in fatalities from 2017 to 2018, authorities committed to reducing traffic-related deaths and accidents. Video technology was pivotal in this endeavour, with fatal accidents in New Providence dropping to 33 in 2019. Traffic surveillance “The cameras we have strategically installed on traffic lights around the city use LPR integrated with Milestone Systems, which have helped control hit-and-run accidents,” said Munnings. “There have been cases of pedestrians being hit by vehicles that didn’t stop; now the police can track those vehicles and bring those drivers to justice. The new surveillance system has also helped prevent human abductions.” Technology and innovation For more than 12 years, the City of Nassau has been relying on and expanding the capabilities of its video surveillance system. With the help of technologies and deep integration within an open platform VMS ecosystem, the city's authorities and police have effectively addressed evolving challenges to ensure safety for both residents and tourists. “Technology and innovation have taken off at the speed of light and this will only accelerate. Embracing the innovations that improve police work is no longer optional," said Zhivago Dames, Assistant Commis.
Ipsotek, an Eviden Business at Atos Group, has announced that it was appointed to provide its AI video analytics technology at the soon-to-be-opened new Midfield Terminal Building at Abu Dhabi International Airport, in Abu Dhabi, UAE. Delivered in partnership with Atlas Security, deployment of Ipsotek’s AI video analytics solutions is anticipated to improve operations, security, and safety across various areas of the Midfield Terminal Building, which is renowned for its iconic architecture and recently gained international attention as a filming location for Mission: Impossible - Dead Reckoning Part One. Advanced surveillance capabilities Ipsotek's AI video analytics technology is well-equipped to address these circumstances Safety and security are clearly paramount in any airport environment, and Ipsotek's AI video analytics technology is well-equipped to address these concerns. The advanced surveillance capabilities of the solution enable operators to detect and identify potential threats across various zones of the airport. By leveraging intelligent algorithms and machine learning, the system can recognise suspicious behaviours, unauthorised access attempts, or other pre-defined security risks in real time, allowing for swift response and mitigation. Ipsotek's AI video analytics By leveraging Ipsotek's cutting-edge video analytics solutions, the airport aims to enhance its security measures by effectively detecting abandoned baggage scenarios. Security teams at the airport will be able to quickly identify and respond to any unattended baggage, reducing potential security risks and ensuring a safe environment for passengers and staff. "The deployment of Ipsotek's AI video analytics solutions at the Midfield Terminal Building signifies a significant leap forward for the aviation industry," said Sophiene Marzouk, Ipsotek’s UAE Country Manager. Sophiene Marzouk adds, "We are proud to collaborate with Atlas Security to deliver state-of-the-art technology that enhances operations, security, and safety in one of the world's most iconic airport buildings." Ipsotek's solutions Ipsotek's solutions also play a crucial role in optimising queue management and crowd control “Atlas Security aspires to implement the best technology for security systems in airports and we therefore look to partner with companies bringing innovation in security applications with Artificial Analytics. One company that brings this cutting-edge technology is Ipsotek and Atlas Security is proud to work in the Midfield Terminal Building with Ipsotek,” said Khizer Rehman, Project and Technical Manager at Atlas Security. Ipsotek's solutions will also play a crucial role in optimising queue management and crowd control throughout the airport. By analysing video feeds, the software can determine queue lengths and alert airport staff to potential bottlenecks. New standards for excellence The intelligent system will empower operators to proactively manage queues, allocate resources effectively, and ensure a smooth flow of passengers. As travellers eagerly anticipate the unveiling of the Midfield Terminal Building, the deployment of Ipsotek's AI video analytics solutions is set to improve the airport experience, from safety to security and operations setting new standards for excellence in the aviation industry and turning an impossible mission into a successful deployment.
Quanergy Solutions, Inc., a provider of 3D LiDAR (Light Detection and Ranging) solutions for highly dynamic environments, has successfully partnered with a prominent social media provider to effectively optimise the organisation’s use of space across campuses for enhanced productivity and improved employee experience. Improve space utilisation The social media giant faced the critical need to improve space utilisation across their campuses, which comprised of numerous conference rooms, cafeterias, and other general-purpose areas. Existing legacy solutions proved unreliable in these complex environments, failing to provide the desired level of accuracy while compromising employee privacy. Q-Track Q-Track ensures that employees’ privacy is protected while enabling the sensors to track individuals seamlessly To overcome these limitations, Quanergy leverages their seamlessly integrated solution that combines long-range 3D LiDAR sensors with advanced perception software. Quanergy’s solution provides extensive coverage across the diverse campus environments, accommodating both large and small rooms with various occlusions, such as tables, chairs, cabinets, columns, and pillars. With a unique object stitching mechanism, Q-Track ensures that employees’ privacy is protected while enabling the sensors to track individuals seamlessly, even when temporarily obscured from view. Hyper-accurate detection, tracking Quanergy’s solution resulted in the hyper-accurate detection, tracking, and classification of employees without compromising privacy or capturing any Personal Identifiable Information (PII). Through the use of occupancy related insights, the social media giant can optimise the use of available areas and achieve enhanced productivity among its workforce. The result is a comprehensive solution that outperforms traditional camera-based solutions and dramatically lowers total cost of ownership. 3-D LiDAR solutions Quanergy’s success in optimising space utilisation for the social media giant showcases the transformative potential of 3-D LiDAR technology in smart spaces. With its privacy-preserving capabilities and accurate tracking, Quanergy 3-D LiDAR solutions are already the preferred solution at over 100 global locations providing security for critical infrastructure such as data centres, utility plants, and airports, as well as for safe cities, and industrial automation.
Located in Kerala, India, the Somatheeram Ayurveda Hospital with a Resort Ambiance is the best place for not only visual rejuvenation but also physical and mental rejuvenation. Through Ayurveda, Somatheeram provides a means to shed all worries, anxieties, and illnesses. With the objective of combining Ayurveda and Tourism, the Somatheeram Research Institute & Ayurveda Hospital was founded in the year 1985, thus making it the world’s first-ever Ayurvedic Hospital in a Resort Ambiance. The Somatheeram Group of Companies came into being with the efforts of the Founder Managing Director, and Architect Mr. Baby Mathew. Challenges Multi-location transmission proves to be an expensive affair if devices are not chosen wisely Somatheeram has multiple resorts, located at different locations. Multi-location communication can prove to be an expensive affair if communication devices are not chosen wisely. Their dependence on public service providers for communication added to their woes of communication between their resorts. To elaborate: Feasibility of existing telephony: Existing telephony became impracticable considering the frequent communication between multi-located properties. Managing different protocols: Interface with different telecom networks requires managing different protocols, which can be cumbersome, time, and energy-consuming. Absence of modern phone features: The lack of advanced features like abbreviated dialing, call pick up, and internal call restriction, prevented them from becoming efficient in day-to-day operations. Transition to modern communication with existing infrastructure: Their investment in existing infrastructure needed protection while also a provision had to be made to modernise the communication using existing infrastructure. Solution The solution offered was based on the fundamentals of multi-location communication solutions Matrix analysed the challenges of communications for Somatheeram, and crafted a solution that was the best fit. The solution offered was based on the fundamentals of multi-location communication solutions. This included the Matrix range of IP-PBX (ETERNITY GENX12S) and GSM Gateway (SIMADO GFX11 and SIMADO GFX11 4G) that optimised the feasibility of communication and helped the firm become more efficient. Solution includes: The Hybrid IP-PBX included ETERNITY GENX12SAC, which enabled them up to 240 Analogue users with 64 CO Ports. Another Hybrid IP-PBX included ETERNITY PENX, which allowed them access to 100 IP Users, onboard IP User Support, LDAP Client support, support of 4G VoLTE ports, COSEC Door Integration, and much more. The GSM gateway included SIMADO GFX11 and SIMADO GFX11 4G which enabled them to make and receive calls from analogue extensions. The capability to integrate with almost all industry-pioneering PBXs enabled them a smooth transition to modern communication while maintaining existing infrastructure. Results The solution so implemented enabled all properties to work as a single communication platform and proved to be beneficial for Somatheeram and its properties in more than one way. The Hybrid IP-PBX enabled them, unified communication facilities like Email to SMS, audio/video calling, unified messaging facilities, and multi-location collaboration features like UC client integration, one-number reach, etc. The Hybrid IP-PBX also enabled, investment optimisation through universal network connectivity, easy and centralised phonebook management through LDAP client support, mobility convenience through 4G VoLTE support, and much more. The GSM/4G gateway enabled them, GSM/4G connectivity to existing infrastructure, hotline extension dialing, emergency number dialing even in the absence of a sim card, etc. through secure network bridging.
Round table discussion
Headlines of violence in our schools are a reminder of the need to keep educational institutions safe. In fact, if there is a positive aspect to the constant bombardment of headlines, it is that it keeps our attention perpetually focused on how to improve school security. But what is the role of physical security systems? As the new school year begins, we asked this week’s Expert Panel Roundtable: Are schools safer because of physical security systems? Why or why not?
As physical security technologies become more complex, it is incumbent on the dealer/integrator to have the skills and expertise needed to ensure that a system operates smoothly. The value of integrators increasingly rests on the skill sets they bring to bear when installing a system. If the skills are missing, there is a problem. We asked this week’s Expert Panel Roundtable: What missing skills among security integrators can cause problems for customers?
Driving the smart homes market is the convenience of simple technology solutions. Almost every home now has a “smart speaker” that makes it easier than ever for homeowners to interface and control their technology. But where does security fit into the new landscape of smart home systems? We asked this week’s Expert Panel Roundtable: What’s new in smart homes and residential security systems?
Products
White papers
Videos
Residential security systems: Manufacturers & Suppliers
- Visonic Residential security systems
- Climax Technology Residential security systems
- Bosch Residential security systems
- Dahua Technology Residential security systems
- Pyronix Residential security systems
- Codelocks Residential security systems
- Honeywell Security Residential security systems
- Concord Residential security systems
- OPTEX Residential security systems
Multi-residential access management and security
DownloadGuide for HAAS: New choice of SMB security system
DownloadPrecision and intelligence: LiDAR's role in modern security ecosystems
DownloadHikvision: Solar powered product introduction + HCP
DownloadArtificial intelligence
Download