Security access systems
Videx Security, a provider of access control and door entry solutions, has announced the launch of its XPROX-MO, a cutting-edge panel mount Mifare proximity reader. Designed for use with the Videx WS4 web server access control system and compatible with third-party access control systems supporting the Open Supervised Device Protocol (OSDP), the XPROX-MO offers unparalleled flexibility and security for modern access control needs. Versatile compatibility and installation The XPROX-MO reader s...
At this year’s Road Transport Expo, Labcraft, the industry-pioneering designers and manufacturers of LED lighting for commercial vehicles, is presenting its latest Banksman lighting systems alongside a new range of compatible harness kits, designed to save time and money during installation. Available in four models – BM2, BM3, BM4, and BM6 - Labcraft’s innovative Banksman lighting solutions deliver additional bright light around the vehicle, helping drivers to manoeuvre more...
Blackline Safety Corp., a global pioneer in connected safety technology, has announced that it has signed a new contract to provide G7c devices and services to a major U.S. utility provider based in California. The contract — a collaboration between Blackline Safety and one of its U.S. channel partners — is valued at more than $1.5 million. The utility provider has already started rolling out the devices across their organisation. Number of the utility industry The announcement is...
Global law firm Clifford Chance announced that it is participating in a Department of Commerce initiative to support the development and deployment of trustworthy and safe Artificial Intelligence (AI). Established by the Department of Commerce’s National Institute of Standards and Technology (NIST) on February 8, 2024, the U.S. AI Safety Institute Consortium (AISIC) brings together AI creators and users, academics, government and industry researchers, and civil society organisat...
The British Security Industry Association (BSIA) has appointed Martin Watson as its new Chair at the Association’s Spring Forum and Annual General Meeting. With a background in fire, security, and engineering spanning 40 years, Martin is currently Industry Laison Director for BSIA members Mitie Fire & Security Systems; he is also the Chair of the Fire Industry Association, and until recently, was Chair of the Association’s Security Systems section. BSIA’s chairman Martin...
The Security Event (TSE) 2024 was a landmark occasion for CIE Group, which marked its 60th year in business with an impressive display of innovative security products and a champagne drinks reception on the first two days of the show. Latest brand offerings Long established for its unique and value-added distribution model in the audiovisual industry, CIE is making a significant impact in the security sector. Consequently, TSE 2024 served as a powerful platform to unveil the company’s l...
News
Illumio Inc., a Zero Trust Segmentation company, announced it has become a member of the Microsoft Intelligent Security Association (MISA), an ecosystem of independent software vendors (ISV) and managed security service providers (MSSP), who have integrated their solutions with Microsoft security technology to build a better defence against a world of increasing cybersecurity threats. The development follows the release of Illumio for Microsoft Azure Firewall, which combines the security benefits of cloud-native Azure Firewall and Zero Trust Segmentation (ZTS) to enable Azure customers to better protect their Azure deployments, accelerate the move to the cloud and provide consistent end-to-end security across their hybrid and multi-cloud deployments. Impact and value of Azure Firewall Illumio for Azure Firewall makes it easier than ever to use Azure Firewall as a Zero Trust enforcement point Firewall policy setting can be complex and commonly defaults to highly permissive access. Illumio for Azure Firewall makes it easier than ever to use Azure Firewall as a Zero Trust enforcement point to visualise and secure all traffic between Azure resources connecting through the Azure Firewall. Illumio for Azure Firewall builds resilience to ransomware and other cyberattacks, while also maximising the impact and value of Azure Firewall as a security investment. Illumio and Microsoft partnership “This is another milestone in our growing relationship with Microsoft, as we work together to make it easier for enterprises to strengthen cyber resilience and simplify firewall management in the cloud,” said Mario Espinoza, Chief Product Officer at Illumio. Mario Espinoza adds, “Together with Microsoft, we have extended the visibility and agility of Zero Trust Segmentation to anyone using Microsoft Azure Firewalls, allowing organisations to reduce their risk and get even more impact from their security strategy by implementing security policy.” Integration with Azure Firewall Illumio joining MISA demonstrates the quality of its deep integration with Azure Firewall Illumio joining MISA demonstrates the quality of its deep integration with Azure Firewall and its shared goal of strengthening and simplifying enterprise security. It also follows Illumio’s participation in the Microsoft Copilot for Security Partner Private Preview. “The Microsoft Intelligent Security Association has grown into a vibrant ecosystem comprised of the most reliable and trusted security software vendors across the globe,” said Maria Thomson, Director, Microsoft Intelligent Security Association. Maria Thomson adds, “Our members, like Illumio, share Microsoft’s commitment to collaboration within the cybersecurity community to improve our customers’ ability to predict, detect, and respond to security threats faster.” Microsoft and Illumio strengthen cyber resilience Microsoft and Illumio continue to work together to help customers strengthen cyber resilience. Microsoft is the only cloud provider to offer end-to-end segmentation from Illumio across cloud, endpoint, on-premises and Microsoft Azure Firewall. Enterprises can now procure end-to-end Zero Trust Segmentation from Illumio directly from the Microsoft Azure Marketplace, making it easier to buy, deploy and manage Zero Trust across all environments at scale. Illumio’s Microsoft Azure Consumption Commitment (MACC) Eligible customers can use Azure credits to purchase the platform as part of Illumio’s Microsoft Azure Consumption Commitment (MACC) agreement. Partners who are interested in learning more can visit the MISA Partner Catalogue: Microsoft Intelligent Security Association.
ISS (Intelligent Security Systems), a renowned global provider of video intelligence and data awareness solutions, was named one of the small group of winners of this year’s “E-Awards” by the U.S. Department of Commerce. Originally created by President John F. Kennedy via executive order in 1961 as part of an effort to honour America’s pioneering exporters, the “E-Award” (“E-for-Export”) is the highest recognition an individual or entity can receive for making significant contributions to the expansion of U.S. exports. E-Star Awards This is the second time that ISS has been recognised with an “E-Award” During this year’s awards ceremony, a total of 64 U.S. companies and organisations from 32 states were presented with the President’s “E” and "E- Star Awards". This is the second time that ISS has been recognised with an “E-Award” as the honour was previously presented to the New Jersey-headquartered business in 2020, and the company now holds “E-Star” status. The Awards were presented by the Hon. Gina Raimondo, U.S. Secretary of Commerce, in the name and by the authority of the President of the United States. Development of new products In her letter citation to ISS, Sec. Raimondo, stated: “ISS has demonstrated a sustained commitment to export expansion. The company’s innovative development of new products and redesign of existing products was also notable. ISS’ achievements have undoubtedly contributed to national expansion efforts that support the U.S. economy and create American jobs.” In a joint statement, ISS Chairman - Richard Burns and CEO - Aluisio Figueiredo, said: “Winning first the “E-Award” and now an “E-Star Award” have meant a great deal to ISS. The recognition has given us confidence and credibility in highly competitive foreign markets. We’re showing the world that a highly innovative, emerging New Jersey-based software company can compete and win against the biggest and the best around the globe.” ISS products and services are installed in 56 countries and the company operates 16 offices worldwide.
The Cyber Safety Force (CSF) has launched to change the way businesses manage their cybersecurity. Forming a consortium of renowned cyber experts, the CSF takes a data-driven, collaborative approach to revolutionise the way businesses think about and manage threat defence and risk aversion – moving from ‘cybersecurity’ to ‘cyber safety’. The CFO recently found that 75% of security professionals have observed an increase in cyber attacks over 2023, with the global average cost of a data breach hitting $4.45 million – a 15% increase over three years (IBM). Businesses manage cybersecurity Guy Golan, Founder of the CSF and global cybersecurity firm Performanta, believes it has never been more imperative for such an initiative to drive real change across organisations. Guy comments: “The way most businesses manage cybersecurity is through compliance. Experts understand that this forms the bare minimum when striving for cyber safety. The CSF has been created to combat this misunderstanding and introduce principles to reform the way businesses think about cybersecurity. Clear demand for better protection has enabled us to combine field-pioneering expertise and actionable data to form a new set of best practices. It’s an exciting time for the CSF as we gain momentum toward sparking true change for businesses globally, ushering in a new, vastly more impactful method of managing risk and achieving cyber safety.” Organisations to reconsider Guy is joined by a group of pioneers in this initial launch of the CSF, including Greg Sim Guy is joined by a group of pioneers in this initial launch of the CSF, including Greg Sim, Founder of cyber group 2020 Partners, Simon Hodgkinson, ex-CISO of BP and strategic advisor to pioneering cybersecurity firms, and Wolfgang Selzer, Co-Founder and CEO of myResilience GMBH, among others. Simon Hodgkinson believes the initiative will create a talking point and a platform for organisations to reconsider the way they view cybersecurity within their organisation. He comments: “Cybersecurity is too often viewed as the technical team’s problem. In fact, CISOs are often fired for poor cybersecurity while the CEO remains in their position. It’s time to take cybersecurity as seriously as physical security and adopt a cyber safety mindset. I’m proud to be pioneering this mission with some of the very best in the business.” Cyber safety approach More information and events will be announced on the CSF website throughout the year for industry pioneers to collaborate and make change happen. The website will also feature advice and insight that will help other pioneers to adopt a cyber safety approach within their organisations.
Genetec Inc., a technology provider of unified security, public safety, operations, and business intelligence solutions, concluded its “Powering Innovation 2024: A Genetec Empower 360 roadshow” in Saudi Arabia. The roadshow took place on 13 May at the Narcissus Hotel Riyadh and showcased the company’s latest innovations and strategic vision for the future. Genetec roadshow As Saudi Arabia continues to prioritise smart city initiatives, physical security assumes paramount importance within the nation's overarching security infrastructure. Echoing this dedication, the Genetec roadshow delved into critical topics impacting security professionals. In collaboration with Axis Communications, HID Global, and Ipsotek, the event explored biometrics, video analytics, and access control solutions that transcend conventional boundaries. Central to the discussions was the exploration of a unified approach to seamlessly integrate these solutions. Regional physical security Attendees gained exclusive insights into the latest Genetec technologies, upcoming product launches The event covered important themes around the state of regional physical security and the evolving trends and best practices for safeguarding assets and infrastructure. Attendees gained exclusive insights into the latest Genetec technologies, upcoming product launches, and strategic initiatives shaping the industry landscape. Additionally, they had the opportunity to engage in live demonstrations of solutions and connect with both industry experts and partners to explore emerging trends and technologies. Innovation and collaboration "At Genetec, we're committed to shaping the future of physical security and public safety through innovation and collaboration," said Firas Jadalla, Regional Director – Middle East, Turkey & Africa, Genetec Inc. “Our goal is to equip our customers in with the resources and knowledge they need to effectively navigate the complex world of physical security. The roadshow was a testament to our dedication to empowering professionals with cutting-edge solutions. In collaboration with our long-standing partners, we hope this event in Riyadh paves the way for a safer, smarter tomorrow." SaaS solution The “Powering Innovation 2024: A Genetec Empower 360 roadshow” also showcased Security Center SaaS, a massively scalable, open, and unified software as a service (SaaS) solution. The new offering combines access control, video management, forensic search, intrusion monitoring, automation, and many other advanced security capabilities.
The PSA Network (PSA), the world’s largest consortium of professional systems integrators, announced the 12 recipients of the Technology Partner Achievement Awards at PSA TEC 2024 (TEC) in Dallas, Texas. PSA awarded Johnson Controls Security Products with the Nova Award for achieving the highest partner sales and Hanwha Vision with the Superstar Technology Partner of the Year Achievement Award for their exceptional partnership. Remarkable achievements “Our success is deeply intertwined with the contributions of our technology partners," said Matt Barnette, president and CEO of the PSA Network. "Their invaluable support enables us to deliver exceptional educational opportunities, unparalleled networking advantages and a wealth of essential resources to our members. It's a privilege to honour their remarkable achievements through these awards, and we look forward to further strengthening our partnership for continued success.” Partnership with PSA technology partners PSA Partner Program (P3) partners received league plaques, adding to the carnival of excellence The PSA Technology Partner Achievement Awards recognise outstanding manufacturers, distributors and service providers based on customer service, shipping support, lead generation returns, product performance and cybersecurity precautions. Additionally, PSA Partner Program (P3) partners received partnership plaques, adding to the celebration of excellence within the industry. "Over the past three years the partnership with PSA technology partners has looked different," said Brittany Board, director of technology partners of the PSA Network. "We have increased our communications and our processes with the technology partners which has led to higher involvement within the network. This change showcases why we value these partnerships and want to acknowledge their success among the PSA integrators." Three categories More than 300 systems integrators, owners and members in the PSA Network voted across the following three categories: Superstar Technology Partner of the Year Achievement Star Technology Partner Achievement Star MSP Technology Partner Achievement Customer Excellence Awards The Customer Excellence Awards voted upon by the PSA Customer Success team included: Customer Excellence Individual Award Customer Excellence Team Award The Full List of Winners Nova Technology Partner: Johnson Controls Security Products Superstar Technology Partner of the Year Achievement: Hanwha Vision Star Technology Partner Achievement: 3MillID Alarm.com Altronix Corporation BCD LifeSafety Power Windy City Wire Zenitel Star MSP Technology Partner Achievement: OpenEye Customer Excellence Individual Award: Beth Taylor, ScanSource Customer Excellence Team Award: Windy City Wire P3 Partnership Plaques: 3MillID acre security Aiphone Allegion Altronix Corporation Alvarado AMAG Technology ASSA ABLOY BCD Bosch ComNet by acre Digital Watchdog Eagle Eye Networks Hanwha Vision HID Identiv Johnson Controls Security Products LenelS2 LifeSafety Power March Networks Milestone Systems OpenEye Salient Systems Windy City Wire Zenitel
Codelocks (Australia) Pty Ltd, an access control company that designs and distributes innovative, standalone keyless door locks, is celebrating ten years of providing leading-edge mechanical and electronic access control solutions to the APAC market. In ten years, the Australian arm of the global company, headquartered in the UK with subsidiary offices in North America and Europe, has grown into a multi-million AUS dollar business serving over 1,500 clients across Australia, New Zealand and Asia. Doors of cabinet makers Mark Samuelson was one of the first appointments made at Codelocks Australia Codelocks’ APAC General Manager, Mark Samuelson was one of the first appointments made at Codelocks Australia and has steered the company to its tenth anniversary. Mark Samuelson said, “When we first set up the Codelocks Asia Pacific entity, we had little market share and there was very low recognition of Codelocks as a player in the market, so building brand awareness became our number one priority.” Mark and his colleagues set about bringing the Codelocks brand to the market by knocking on the doors of cabinet makers and joiners and exhibiting at trade shows including the AWISA (Australian Woodworking Industry Suppliers Association) exhibition, no vacancy, and local industry organisations like the Master Locksmiths Association of Australia and the Locksmith Guild of Australia. Holding significant stocks Codelocks’ reputation for reliable, cost-effective, and easy-to-fit and programme access control products combined with its focus on exemplary service and support has seen it become the first choice for hundreds of businesses across hospitality, mining, banking, retail, education, healthcare and government. By holding significant stocks Codelocks Australia can service customer demand, whether this be for a single unit or several thousand units. This is part of the company’s ethos to provide a level of service that is determined by the customer and is unparalleled in the industry. Network of industry and channel partners Colin Campbell, Managing Director of Codelocks puts the success of Codelocks Australia down to the firm foundation that Mark Samuelson and his fellow Director, Adrian Young built through sheer hard work and determination. Colin Campbell said, “The growth of the company has been stellar, and that’s down to Mark and Adrian having a strong strategy from the outset and the commitment to see their strategy through. We have seen their model pay off, with strong sales through a network of industry and channel partners who actively champion Codelocks’ solutions.” Easy-to-use access control products Mark Samuelson said, "Ten years ago electronic locks weren’t a big thing, and we had some work to do to convince joiners and cabinet makers of their suitability. We took care to build out from having a single level of reseller by engaging a level of expert partners who are a channel to the locksmiths, and another that works with specifiers and architects." He adds, "Now whenever you walk through an airport or go to a gym, school, hospital or large retail chain, the chances are you’ll see Codelocks’ products on doors and cabinets." Codelocks moved into larger offices in Chatswood, NSW Last year, Codelocks moved into larger offices in Chatswood, NSW. This was essential to meet the increasing demand for its range of easy-to-use access control products which are sold directly through the company’s website, by specialist trade retailers and via a network of distributors and cabinet makers.
Expert commentary
As we head into a new year, it’s fair to say that it isn’t easy out there for the security integrator community. That’s understandable given the big ruptures felt in the market for physical security in 2023. Typically, Commercial Real Estate (CRE) landlords are the biggest and most influential buyers of physical security hardware and software, but this is starting to wane as heightened borrowing costs and biting inflation cause real estate valuations to plunge. Building security upgrades A lot of CRE landlords are in a fight for survival which unfortunately doesn't leave much room for budget spend on building security upgrades. This state of affairs is a problem for security integrators with extensive connections in the CRE space. Where do they pivot their services to keep their business growing in 2024? From the conversations I’ve been having with integrators and customers alike over the past few months – the answer is that the growth potential lies in the enterprise space. The trajectory of enterprise IT and physical security Aren’t enterprises carrying out cost-cutting efficiency drives and downsizing office space to reflect hybrid working It might initially feel unnatural to see the enterprise segment as a potential driver of demand for physical security services and products. Aren’t enterprises carrying out cost-cutting efficiency drives and downsizing office space to reflect hybrid working habits? These things are true but also present an opportunity for the right physical security proposition. Standardisation of enterprise IT Take efficiency drives as an example. A key element of such efforts is an acceleration towards the standardisation of enterprise IT platforms, hardware, and solutions, using the cloud. What was once a focus on moving on-prem systems and workloads to the cloud has shifted to efforts to keep cloud OpEx costs down by centralising as much as possible. Practically, this means utilising APIs to plug disparate IT applications and services into central platforms that boast a “single pane of glass” view. APIs APIs drive consumption, open new business models, and foster cross-industry partnerships APIs aren’t anything new to enterprises. They drive consumption, open new business models, and foster cross-industry partnerships. However, the use of APIs in the physical security sphere has been surprisingly slow to take off. There are multiple elements to this but a key reason is that some security software products on the market aren’t cloud-based. Adding cloud-based solutions to network Others are cloud-based, however, and these are the solutions that security integrators need in their portfolio to serve the influential enterprise market segment and its approach to IT networks. Selling the value of these solutions requires integrators to take it a step further by speaking the language of the enterprise IT buyer and understanding their goals. The power of cloud-based access control in the enterprise Hybrid working and the occupancy rate fluctuations it brings require closer monitoring of access events The continued relevance of physical security for enterprises can’t be understated. After all, hybrid working and the occupancy rate fluctuations it brings require closer monitoring of access events – not less. Despite the discourse around office downsizing, the reality for most enterprises is that the office can’t be done away with completely and there’s always going to be growth experienced by successful companies that require an upgrade in physical square footage. Physical security Access control systems that are cloud-based will be preferred by the enterprise to fulfill the essential function of physical security. That’s because they align with the push towards centralisation in the cloud that enterprises are carrying out business-wide. Access control has the potential to result in lots of disparate dashboards and apps. Think video management, license plate recognition, building management software, elevator monitoring, hot desking solutions, guest booking software, room booking functions, and more. Uniting all of these functions in one platform suits enterprise security teams well. Access control solutions Linking employee databases to an IAM solution, or creating seamless experiences by tying access credentials But this only scratches the surface. Access control solutions that can be integrated with hugely popular corporate software applications like Okta, Azure Active Directory, and Google Workspace quickly catch the eyes of enterprise IT security teams by pulling in the same direction as the broader tech stack. Whether it’s applying AI analytics to anomaly detection, linking employee databases to an Identity Access Management (IAM) solution, or creating seamless experiences by tying access credentials to things like meeting room bookings, it’s through APIs that cloud-based access control can thrive in an enterprise setting. Security integrators It’s worth also noting that as enterprises grow, access control gets harder. Managing the access requirements of thousands of employees across a global real estate footprint requires the scale that cloud computing is best placed to bring. Security integrators who can join the dots to make that link are well positioned to pivot toward the enterprise. Broadening horizons Concepts like smart access and applying AI to access data to automate the monitoring of occupancy rates This pivot is understandably a daunting prospect but the potential for natural synergy shouldn’t be overlooked. Concepts like smart access and applying AI to access data to automate the monitoring of occupancy rates and security anomalies won’t be completely alien to cloud-first enterprises. That’s an opportunity for integrators to upsell more sophisticated security set-ups in a way that they may have found more difficult with CRE clients and prospects. Tailored propositions It would be remiss to avoid mentioning that ‘enterprise’ is a very loose term that encompasses businesses across multiple industry verticals. To better pivot, security integrators need to offer tailored propositions specific to set verticals that cover all bases as opposed to offer, for example, piecemeal alarm or video product solutions. Enterprise industry verticals Security integrators should be weary of all-encompassing narratives in 2024. Whether or not the global economic picture darkens, there are always going to be pockets of growth within certain enterprise industry verticals. Plus, anecdotally, the indicators point to enterprises being the driver of demand for cloud-based access control as we head into the new year. Integrators who can dial into that shift have a lot to gain and nothing to lose.
When a bomb detonated in the Port of Beirut, I had hundreds of employees under my care inside the blast zone. Within just two hours, I was able to determine who was impacted, understand their safety conditions, and share resources for on-the-ground support—all thanks to mobile technology. For Chief Security Officers, receiving calls like these launches a variety of protocols and necessary decision-making with the safety and security of people and assets as a top priority. And these calls are only becoming more common. Dependence on threat intelligence Mobile phones have dominated the post-COVID environment where people work from anywhere Threats ranging from natural disasters to geopolitical conflicts are becoming more frequent and complicate the responsibility organisations have in keeping their people safe. To meet these needs CSO’s are staying ahead of negative outcomes through creating a greater dependence on threat intelligence. In these times, effective, real-time risk management depends on hyper-local data from technology that is accessible, portable, and dynamic–such as cell phones. Mobile phones have revolutionised the way people live and work. They allow us all to walk around with a computer in our pocket, bringing the world to our fingertips and eliminating digital borders for over 90% of the world's population. Mobile phones have dominated the post-COVID environment where people work from anywhere and have geographically distributed teams but are also more vulnerable to threatening events. Mobile-friendly risk management platforms Mobile technology assigns workers with easy entry to data that can help keep them and their teams safe As we approach 2024, many organisations are adopting comprehensive risk management tools that empower personnel across the organisation with the intelligence and knowledge they need to stay safe wherever they are. Mobile-friendly risk management platforms, such as Crisis24 Horizon, provide always-on awareness, on-hand threat intelligence, and immediate communications and distress signalling through location monitoring. Users receive location risk assessments and push notifications directly to their devices about nearby issues and threats no matter if they are on or off the job. While only select risk managers have complete control of the platform and all sensitive employee data is protected through encryption, the app distributes critical intel to foster a culture of shared awareness and responsibility. Thus, mobile technology empowers employees with easy access to information that can help keep them and their teams safe. Creating a culture of mobile technology adoption In the last few years, the world has proven the importance of being well-informed of risks and mitigation plans to minimise harm. However, psychological barriers tend to trump physical barriers when it comes to accessing the vast array of tools our mobile devices offer. World has proven the matter of being well-informed of risks and relief plans to minimise harm Adopting this technology and establishing a culture that enforces risk management across an organisation is a daunting challenge that demands substantial commitment from leadership to be successful. Some companies have tackled this challenge by positioning security technology as part of the organisation’s employee benefits package, such as commuter benefits and health insurance, to encourage people to take advantage of these resources and learn how to use them. Cohesive risk management culture Technology is only as effective as the people whose actions it informs, which is why adoption and integration are so important. When a cohesive risk management culture meets a powerful technology platform, individuals are enabled to receive threat alerts and counter their impacts, letting others know when and how to take the necessary precautions to protect themselves and their team. For more information on mobile technology and other security trends, check out the Global Risk Forecast, an annual report by Crisis24 that provides a comprehensive analysis of key events around the world most likely to affect operations in the coming year.
These days, business is more collaborative, adaptable and connected than ever before. In addition to offering new identities and access privileges, new applications and data also increase the attack surface available to cyber criminals, hacktivists, state actors and disgruntled insiders. These new identities need to be handled carefully. CISOs must develop an identity management strategy that is consistent across on-premises, hybrid and cloud systems. Good security is built on solid identity governance and administration (IGA) principles. From ransomware to supply chain intrusions, high-profile cybersecurity events frequently take advantage of weak identity and access management procedures. The Identity Defined Security Alliance found that 84% of organisations experienced an identity-related breach during its one-year study period. Robust IGA system Consequently, organisations need to find best-of-breed solutions for each section of the fabric Some of the most well-known cyber-attacks have not been made possible by a nation-state exploiting a remote zero-day vulnerability; rather, they have been made possible by something as basic as a hacked orphaned account. This resulted in lateral movement from an insecure platform to a high-value system, illegitimate privilege escalation or unsanctioned access to a computer system. To safeguard against such attacks, organisations must be aware of who has access to their systems and apps, and guarantee that access is revoked when it is no longer required. Here, a robust IGA system is helpful. It is not the whole picture, though; IGA is part of a larger identity fabric. A report by KuppingerCole noted that “Identity Fabrics are not necessarily based on a technology, tool or cloud service, but a paradigm for architecting IAM within enterprises.” The report pointed out that the paradigm is created using several tools and services. That’s because, contrary to marketing claims, no one vendor has a platform that provides all the needed elements. Consequently, organisations need to find best-of-breed solutions for each section of the fabric. Threats to the new corporate landscape Due to their exclusion from the corporate firewall and the security culture that comes with working on-site, remote employees and third parties are desirable targets for hackers. The transition to online office suites is another vulnerability that hackers are taking advantage of–for instance, through bogus authentication login dialogues. Additionally, hackers are using technologies like machine learning and artificial intelligence to circumvent current security tactics. A cyberattack powered by AI will imitate human behaviour and develop over time. Even publicly available information might be used by this "weaponised AI" to learn how to get past a target’s defences. CISO and the business users Attackers will finally find an entryway, but firms can protect the new perimeter–their identities It's no longer possible to secure the traditional perimeter. Attackers will eventually find an entryway, but businesses can protect the new perimeter–their identities. To defeat these threats, organisations must look again at identity and access management tools and how they are weighed against the impact on the organisation. Should you mandate multi-factor authentication (MFA) more often and earlier? Should only company-owned devices have access to networks, or should access be restricted to specific business hours or regions? Should access to sensitive information and critical systems be given just temporarily or should it be offered on a task-by-task basis? Both the CISO and the business users they assist should be asking these questions. Staying ahead of threats with identity Access control limits decrease dangers but can come with a cost. If you give your users too much access, your organisation becomes susceptible; if you give them too little, productivity suffers. But there are ways to strike a balance with security, compliance and productivity. More CISOs are turning to Zero Trust–which is based on the principle of maintaining strict access controls and not trusting anyone by default–to protect their systems from new attack types. However, Zero Trust is reliant upon having a thorough and baked-in strategy that underpins it. Other actions that companies can take include implementing automation for identity management, such as automating workflows for approval. This would significantly lessen the administrative burden and friction that security solutions like multifactor authentication (MFA) or time-restricted access to critical systems have on business users. This might include restricting access to particular devices, capping access hours during the day or enforcing MFA based on user behaviour. Identity fabric: Putting it all together Make sure your identity architecture is scalable, secure, and provides a seamless user experience These are just two elements of the identity fabric approach. Most organisations today have implemented pieces of an identity fabric, which is basically an organisation’s identity and access management (IAM) infrastructure and typically includes a mix of modular IAM solutions for multi-cloud and/or hybrid environments. Now, organisations need to define, enhance and develop this infrastructure. They must also institute guiding principles for how it should operate, meet current and future business requirements as well as identity-related cybersecurity challenges. In doing so, businesses can move past identity platforms and adopt an identity fabric perspective. The key is to make identity governance the starting point of your identity fabric strategy, ensuring seamless interoperability within your identity ecosystem. Make sure your identity architecture is scalable, secure, and provides a seamless user experience. Aligning security with business Due to the increase in knowledge workers using the cloud and working remotely, attackers are focusing on this group. These employees are easier to compromise, give access to valuable data and offer more attack targets. Knowledge workers also lack an administrator’s level of security expertise. Therefore, as part of their security fabric strategy, enterprises require a scalable IGA system. It is easier to comply with security and access regulations and takes less time for IT teams to do normal administrative activities when they invest in IGA, a crucial tenet of identity security. CISOs and boards, though, are currently looking at more than identity management. IGA is at the centre of the debate about security and governance. Taking an identity fabric-based approach, with a foundation built on modern, cloud-based IGA, will safeguard identities, increase productivity, and make staff adherence to organisational procedures easier.
Security beat
Active shooter situations grab the most attention, but there is a long list of other threats facing schools, including bullying, vandalism and emergency medical situations. Broadly speaking, a comprehensive approach to school security should prioritise prevention, preparedness and response to all threats. Holistic security approach “Fostering a culture of safety within a school, which involves strong relationships, trust, and communication, is highly effective and does not require significant costs,” says Christin Kinman, End User Sales Consultant with Allegion, a security manufacturer. “It is crucial to educate stakeholders about the unintended consequences of quick fixes, like barricade devices, to ensure informed decision-making and a holistic security approach. The goal should be to promote safety and security for all, every day, in every situation.” Integrated and successful security plans While this might solve a particular challenge, it can also create unintentional conflicts" "Creating an integrated security plan requires a multi-faceted approach," says Kinman. "Too often, security measures are implemented as a reaction to either an event or a specific vulnerability. While this might solve a particular challenge, it can also create unintentional conflicts," adds Kinman. “Creating a successful security plan involves a comprehensive approach,” she says. “An effective, systematic approach begins with assessing, identifying, and valuing assets, identifying threats and vulnerabilities, quantifying the impact of a loss, analysis and prioritisation, and finally, development of mitigation measures.” Safety and security An effective resource is the Partner Alliance for Safer Schools (PASS), which provides a framework to help with school assessments, including identifying and valuing assets, identifying external threats and internal vulnerabilities, assessing the impact of loss, and analysing and prioritising mitigation measures. Safety and security are words used seemingly interchangeably when it comes to schools, but they mean different things. “How we define these terms influences planning and addressing challenges,” says Kinman. “It is easiest to think of these terms as being either external or internal to the individual.” Coordinated security Safety is internal to the individual and relates to the individual’s perception of being free from harm Security is external to the individual and encompasses the protective physical, emotional, and environmental measures implemented in conjunction with policies, procedures, and training, as well as mental health measures and social and emotional learning. Safety is internal to the individual and relates to the individual’s perception of being free from harm or danger. Coordinated security measures create an environment of safety. Four main elements of physical security Kinman lists four main elements to physical security, often referred to as the 4D’s. These elements are deter, detect, delay, and deny: Deter refers to measures implemented to prevent an attack or threat from happening. These are usually visual deterrents that communicate legitimate use. Detect refers to measures that can detect the presence of a threat, such as video surveillance and monitoring. Delay refers to measures that slow down an attack or increase the level of effort needed for an incident to occur. Finally, deny refers to measures that prevent or restrict access to valued assets. Four layers of ground perimeter A layered approach to school security creates “layers” that must be defeated for an event to occur, says Kinman. Typically, the four layers are the ground perimeter, the private grounds around the building, the building perimeter, and the building interior. The ground perimeter layer demarcates public vs private space, and deterrence is the primary objective. The grounds layer allows for identification of legitimate vs illegitimate users and detection is the primary objective. The building perimeter layer prevents illicit users’ intent on harm from gaining access. The primary objectives at this layer are delay/deny. The building interior protects the most valuable assets, and the denial of an unauthorised individual is the primary objective. Report on Indicators of School Crime and Safety The second element is impact, also rated on a scale of 1-5 and ranging from negligible to catastrophic “Quantifying loss and assessing risk is one of the most important steps in creating an integrated security plan,” says Kinman, who explains that the two elements that guide this step are probability and impact. Probability is the likelihood that an event will occur, typically rated on a scale of 1-5 ranging from rare to almost certain. The second element is impact, also rated on a scale of 1-5 and ranging from negligible to catastrophic. “Probability multiplied by impact equals risk, which has a score ranging from 1-25,” says Kinman. “The higher the score, the higher the risk.” An analysis of vulnerabilities and threats using a matrix yields a systematic approach to prioritise improvements and identify mitigation measures. For statistics on crime and safety in schools, visit the Report on Indicators of School Crime and Safety: 2022. Security improvements “The costs of school security encompass various aspects, including physical measures, personnel, training and policy enforcement,” says Kinman. “While there is no fixed amount, it often involves investments in technology, such as access control and emergency response systems. Many security improvements do not require additional funding, like training staff and students on security protocols and implementing policies to create a culture of safety.” Generally, funding for public school security is a shared responsibility among federal, state and local governments; communities also contribute. “Striking a balance between shared responsibility and ensuring adequate resources is crucial for effective school security,” says Kinman. K-12 school security Community members and parents can donate by being vigilant and noting any suspect activities Various stakeholders play crucial roles in enhancing K-12 school security in addition to schools and communities. Stakeholders include community members, parents, local government, local law enforcement, first responders and non-profit organisations. “Engaging these stakeholders fosters a comprehensive approach to school security,” says Kinman. Community members and parents can contribute by being vigilant and reporting any suspicious activities. Local government can support schools with funding and resources, while local law enforcement and first responders can provide expertise, conduct drills, and establish emergency response protocols. Safe and secure learning environment In addition, non-profit organisations can offer valuable resources, training, and support programmes to address specific security concerns. “By involving all these stakeholders, schools can tap into a diverse range of expertise, resources and perspectives, pioneering to a more effective and comprehensive approach to school security,” says Kinman. “Collaboration and communication among these entities are vital to ensure a safe and secure learning environment for students and staff.”
Companies at GSX 2023 emphasised new ways that technologies such as artificial intelligence (AI) and the cloud can address long-standing issues in the security market. Among the exhibitors at the event in Dallas were companies seeking creative ways to apply technology, lower costs, and make the world a safer place. Reflecting on the exhibition, here are some additional takeaways. Expanding AI at the edge i-PRO is a company reflecting the continued expansion of edge AI capability in the security market. Today, more than half of the company’s lineup supports AI at the edge so the customer has a wide choice of form factors when seeking to leverage the feature set. AI processing relay, extended warranty i-PRO is increasing their warranty period from 5 to 7 years, which could be a lifetime warranty in some cases I-PRO also has an “AI processing relay” device that accepts non-AI video streams and applies edge analytics. AI has progressed from a high-end technology to a feature available in a variety of cameras at different price points. i-PRO is also increasing its warranty period from 5 to 7 years, which could be a lifetime warranty in some cases depending on a customer’s refresh schedule and lifecycle management. Active Guard, MonitorCast The company’s video management system (Video Insight) is continuing to build new features including “Active Guard,” an integrated metadata sorter. Their access control platform, MonitorCast, is a Mercury-based solution that is tightly integrated with Video Insight. Their embedded recorders now have PoE built in. “We can move at a faster pace to fill out our product line since leaving Panasonic,” says Adam Lowenstein, Director of Product Management. “We can focus our business on adapting to the market.” Emphasis on retail and other verticals Shoplifting is a timely issue, and retail is a vertical market that got a lot of attention at GSX 2023. “We see a lot of retailers who are primarily interested in protecting employee safety, but also assets,” says Brandon Davito, Verkada’s SVP of Product and Operations. “Shrinkage is a CEO-level priority.” “Retailers are getting more engaged with security posture, instead of letting perpetrators walk,” Davito adds. Intrusion detection Verkada has an intrusion product that will notify a central station if there is an alarm On the alarm side, Verkada has an intrusion product that will notify a central station if there is an alarm, and operators can review videos to confirm the alarm. Other capabilities seeking to discourage trespassers include sirens, strobes, and “talkdown” capabilities. International expansion Verkada continues to expand internationally with 16 offices in all, including Sydney, Tokyo, and London. The core value proposition is to enable customers to manage their onsite infrastructure more simply, including new elements such as PTZ cameras, intercoms, and visitor management. Verkada emphasises ease of use, including a mobile application to allow access to be managed across the user base. Forging partnerships “We are committed to the channel and industry, and we continue to build relationships and expand our reach,” says Davito. Among the industry relationships is a new partnership with Convergint, which was hinted at during the show and announced later the same day. They are also expanding their partnerships with Schlage, Allegion, and ASSA ABLOY. Working with other verticals They offer new features for K -12 schools, and a new alarm platform is easier to deploy and manage Verkada has also found success across multiple other verticals, notably healthcare, where they integrate with an electronic medical records system. They offer new features for K-12 schools, and a new alarm platform is easier to deploy and manage. They are integrating wireless locks to secure interior doors in schools, looking to secure the perimeter, and installing guest management systems. Transitioning the mid-market to the cloud Salient is squarely focused on the “mid-market,” a large swath of systems somewhere between small businesses and enterprise-level systems. Pure cloud systems are not as attractive to this market, which has a built-out infrastructure of on-premise systems. Adding a camera to an existing system is easier and less expensive than tying it to the cloud. Benefits of cloud It’s a market that may not be ready for the pure cloud, but there are benefits to be realised from adding a cloud element to existing systems. “We are continuing to augment our premise-based solutions with added cloud capabilities and flexibility,” says Sanjay Challa, Salient’s Chief Product Officer. The feedback Salient hears from their customers is “I want to own my data.” The hybrid cloud approach offers the right mix of control, flexibility, and unit economics. Cloud add-on capabilities We want to provide the flexibility for customers to go full-cloud as it becomes more economically attractive" Cloud add-on capabilities include bringing more intelligence about system operation to the user via the cloud. Over time, Salient expects to sell more cloud-centric offerings based on feedback from integrators and customers. “We want to provide the flexibility for customers to go full-cloud as it becomes more economically attractive over time,” says Challa. Vaidio AI technology Salient seeks to be a transition pioneer to help customers realise the path to the cloud. Their approach is “crawl, walk, run,” and helping customers make the transition at each stage. Salient has added AI to its product offering, incorporating Vaidio AI technology from IronYun into a powerful suite and broad array of on-premise analytics, which are gaining traction. The seamless approach makes it easy for customers to embrace AI analytics, although Salient remains broadly committed to open systems. Addressing ‘soft’ features for integrators AMAG is in the process of enhancing its product line with the next generation of access control panels. However, “product” is just part of the new developments at AMAG. In addition to “hard” features (such as products), the company is looking to improve its “soft” features, too; that is, how they work with the integrator channel. Integrator channel Rebuilding a process to make your organisation more efficient, is relatively easy; it just takes a lot of persistence" “We have the depth of our legacy customer base we can learn from, we just need to close the feedback loop quicker,” says Kyle Gordon, AMAG’s Executive Vice President of Global Sales, Marketing, and commercial Excellence, who acknowledges the value of reinstating face-to-face meetings after COVID. “We are laser-focused on nurturing our integrator channel,” he says. “Developing new features takes time, but rebuilding a process to make your organisation more efficient, that’s relatively easy; it just takes a lot of persistence,” says Gordon. More cohesive internal communication is another useful tool, he says. Disrupting the cloud based on price Wasabi is working to make cloud applications less expensive by offering a “disruptive” price on cloud storage, $6.99 per terabyte per month (80% less than hyperscalers). Contending “hyperscalers” like AWS are charging too much for cloud storage, Wasabi is using its own intellectual property and server equipment co-located in data centres around the world. Wasabi sells “hot cloud storage,” which refers to the fact that they only have one tier of storage and data is always accessible. In contrast, a company such as AWS might charge an “egress fee” for access to data stored in a “colder” tier. Cloud storage “We saw that several video surveillance companies had not yet adopted cloud storage, and we saw an opportunity to make it easy to use,” said Drew Schlussel, Wasabi’s Senior Director of Product Marketing. “We just install a little bit of software that allows them to store data in the cloud and bring it back from the cloud.” Performance, protection (cybersecurity), and price Wasabi works with integrators, resellers, and distributors and also integrates with VMS companies Wasabi works with integrators, resellers, and distributors and also integrates with VMS companies such as Genetec and Milestone. Emphasising performance, protection (cybersecurity), and price, their data centres are certified to SOC 2 and ISO 27001 standards. Faster throughput for weapons detection Xtract One is a young company focusing on weapons detection in a time of accelerated concern about gun issues post-COVID. Founded in Canada and based on technology developed at McMaster University, Xtract One has found a niche in providing weapons detection at stadiums and arenas. These customers already have budgets, and it is easy to shift the money to a newer, faster technology. Madison Square Garden in New York City is among its customers. Cost savings solution Xtract One can increase throughput to 30 to 50 people per entrance per minute (compared to 5 to 6 people per minute when using metal detectors). The solution doesn’t require anyone to empty their pockets and the system alarms on items beyond guns and knives. Using Xtract One allows customers to reduce the number of screening lanes and security staff, providing additional cost savings, all while getting fans through the screening process in half the time. Purpose-built sensors The system uses purpose-built sensors looking for specific characteristics, such as reflective and density properties In addition to stadiums and arenas, Xtract One, formerly Patriot One, is also getting “inbound” interest from schools, hospitals, manufacturers, and other verticals that makeup 50% of their business. “We’re on a rocket ride, mainly because the weapons issues are not going away,” says Peter Evans, CEO and Director at Xtract One. The system uses purpose-built sensors looking for specific characteristics, such as reflective and density properties, all correlated by an AI engine. Providing early warning of violence ZeroEyes is another company focused on weapons detection. Their AI gun detection system works with video images to identify if someone is “brandishing” (carrying) a weapon. In other words, the system does not detect concealed weapons. Identifying someone carrying a weapon provides early warning of a possible violent act. Increased response with AI-enables images Images are identified by AI and sent to a monitoring centre where a human confirms the image before contacting first responders. Knowing the location of a shooter enables staff to lock entry points, move people to safety, and direct first responders. The company was founded to leverage existing camera views to stop mass shootings and gun violence by reducing response times.
A pioneer in the access control sector since 1971, AMAG Technology is looking to the future and the next generation of products that will expand its services to customers. “In our vision, we have advanced approaches that will not only provide our partners with advanced technologies but also ones that are easier to install with tools to expand their services,” says David Sullivan, who was appointed President of the venerable access control company in September 2022. New challenges at AMAG Sullivan brings a new outlook to the AMAG business, a part of Allied Universal, and a new vision to lead the company into the future. We caught up with David Sullivan to discuss his new challenges at AMAG and the journey ahead as the company looks to the future. Q: How does your background inform your approach to leading AMAG? I believe that it helps me to define a vision for AMAG that will be unique and on the leading edge of our industry David Sullivan: With the exception of only a few short years, my career has been in access control. I have experience with several systems and have had the privilege to manage several successful access control companies. As a result, I bring a great deal of experience into my role at AMAG. I believe that it helps me to define a vision for AMAG that will be unique and on the leading edge of our industry. Q: How would you describe AMAG’s journey over the last several years and how do you see the future? Sullivan: Prior presidents of AMAG always shared their leadership vision and direction with senior leaders located in the United Kingdom. This had an impact on the full direction of the business, sometimes limiting its ultimate success. Before I became a part of AMAG, these senior leaders that were located in the UK retired, placing for the first time the full management responsibilities of the president. This has allowed me to integrate the business into a single team, with single objectives, and a single vision. We expect to begin to reveal this new vision in the coming weeks. We are excited about the future of AMAG and believe we will surprise the industry with our new products and approach in the coming months and years. Q: How important is it that a manufacturer provides both hardware and software solutions? How does AMAG’s approach (in general) differentiate it in the market? We can design the complete solution, providing functionality that others may find more difficult to accomplish Sullivan: Regardless of the manufacturer, we all provide hardware and software. An access control solution is not complete without both. Some of us choose to make our panels, and others do not. Those who are dependent on third-party suppliers are restricted to the developments and direction of that company, and while it might be perceived to be an open technology, it still is proprietary to the hardware manufacturer. AMAG has controlled its manufacturing of panels from day one. The result means that we can design the complete solution, providing functionality that others may find more difficult to accomplish. Q: How does the breadth of AMAG’s product suite provide advantages to customers and/or integrators? Sullivan: AMAG’s product portfolio is unique and provides the end user with an end-to-end identity management solution from one company. Our Control Room PSIM, Symmetry CONNECT Identity Management Solution, Symmetry Access Control, and Symmetry GUEST solutions all integrate to provide the user with a broad set of features and capabilities from a single provider. There is no finger-pointing when we come to support your system. We hold full responsibility for making it work and can quickly provide a resolution to any application difficulties the user may be experiencing. Q: How does AMAG address the divide between on-prem and cloud systems? How do you help customers make the transition and/or plan for the future? We are in the early stages of developing our next generation of access control in which we intend to provide on-prem Sullivan: In our current product portfolio, we have three products that are cloud-based. Our mobile credential platform (Symmetry Mobile), our visitor management solution (Symmetry GUEST), and our physical identity and access management solution (Symmetry CONNECT) are all offerings that operate in the cloud. We are in the early stages of developing our next generation of access control in which we intend to provide on-prem, web client, and cloud-based offerings. One of the primary objectives is to ensure that the large installed base of systems that are out there today will be able to migrate not only to our next generation but as well to the cloud if the client so desires. Q: What is AMAG’s approach to mobile credentialing? Sullivan: As an access control provider, adding Symmetry Mobile credentialing to our portfolio just made sense. We want our customers to have a forward-thinking solution with the opportunity to save money not only on the physical badges but the cost of printing and distributing badges. Mobile credentials can be easily issued and revoked remotely, reducing administrative overhead, and eliminating the need for physical inventory management. Organisations can centrally configure what devices are used and the read range for each type of device and operating system, thus providing flexibility. Symmetry Mobile offers a customised questionnaire that controls access and reduces liabilities. Q: What has surprised you the most in your first year or so leading AMAG? Not many companies are blessed with such a broad portfolio that is supported by a resource-rich company Sullivan: I wouldn’t say I was surprised by this as much as happy to see, but I would say that the quality of our people was a pleasant surprise. As well, the AMAG product offering is broad and has some unique elements. When coupled with the depth of the resources that we have in AMAG, I know that we are second to none. Not many companies are blessed with such a broad portfolio that is supported by a resource-rich company that has so many talented people. Q: Please describe your dealer channel, and how you are seeking to expand it. Sullivan: The AMAG products are sophisticated and typically are installed for higher-end applications. With this sophistication comes a need to be well able to install such a solution. We have a strong group of certified and loyal partners who help us to deliver these enterprise solutions. We desire to provide our existing partners with updated and competitive systems to offer to their end users. Q: What is the security industry’s (and/or AMAG’s) biggest challenge in the next five years? We need to find ways to provide both our channel partners and the customers with solutions that are easily integrated Sullivan: I believe that the advancements that we are seeing in technology provide our industry with the opportunity to truly change how security is provided to our collective customers. As we advance these solutions, we will need to do so responsibly and in a way that helps the channel’s abilities. We need to find ways to train our partners to both install and support these more complex solutions. At the same time, we need to find ways to provide both our channel partners and the customers with solutions that are easily integrated, moving away from proprietary closed systems to open and cohesive solutions. This will ensure that the users get the best, and most complete solutions. Q: What does the industry as a whole misunderstand about AMAG -- time to set the record straight! Sullivan: Well, I am not ready to openly share where we are heading. We are in the process of putting together some advanced approaches to how we will do business with our partners. We are focused on providing tools that will enhance their services to their customers, and with products that are leading edge. I can only state that all should keep their eyes on AMAG, because over the next few years, we are going to surprise some people, and more importantly make our loyal partners quite powerful.
Case studies
ZeroEyes, the creators of the only AI-based gun detection video analytics platform that holds the US Department of Homeland Security SAFETY Act Designation announced that its proactive gun detection and intelligent situational awareness solution will be deployed by Michigan’s Olivet Community Schools to protect students and faculty against gun-related violence. The school was approved for the State’s dedicated grant funding, enabling Olivet to implement ZeroEyes. Olivet Community School Olivet Community School comprises an elementary school, as well as a middle and high school that is located at the same complex. According to The Gun Violence Research Center, 55% of the incidents analysed in Michigan educational systems were spontaneous attacks and 42% involved former students. To combat the rising threat of violence, the district has been bolstering its safety and security efforts by installing an access control system and brand-new digital cameras, along with the deployment of ZeroEyes. Multi-layered security framework "We've always maintained a multi-layered security framework, from our security camera and access control system to CRG maps for first responders, and adding ZeroEyes significantly strengthens our preparedness," said John Mertz, Superintendent of Olivet Community Schools. "While this technology greatly enhances our security, we hope we never have to use it in a real-world situation." AI gun detection and intelligent situational awareness If a gun is identified, images are instantly shared with the ZOC staffed 24/7/365 by specially trained U.S. veterans ZeroEyes’ AI gun detection and intelligent situational awareness software layers onto existing digital security cameras. If a gun is identified, images are instantly shared with the ZeroEyes Operations Centre (ZOC), staffed 24/7/365 by specially trained U.S. military and law enforcement veterans. If these experts determine that the threat is valid, they dispatch alerts and actionable intelligence including visual description, gun type, and last known location to local law enforcement and the district's school resource officers as quickly as 3 to 5 seconds from detection. Proactive safety measures "We applaud Olivet Community Schools for their proactive approach to safety," said Mike Lahiff, CEO and co-founder of ZeroEyes. "Our AI gun detection technology is a vital layer in fortifying the security of both students and staff."
Every year, the Veronafiere exhibition centre and its conference centre host an average of 35 exhibitions and 50 conventions. Among the successful and best-known events, Vinitaly, Marmomac, Fieracavalli, Fieragricola, Samoter, Progetto Fuoco, and MotorBike Expo stand out. These events attract up to 800,000 trade fair visitors and exhibitors every year. To ensure security for the outdoor areas of the brand new “Gallerie Mercatali” in Verona, Veronafiere again decided to install a Dallmeier video security system with Panomera® cameras. Trade fairs and events Veronafiere S.p.A. is an international group that has been organising trade fairs and events “connecting people, nations, and different businesses” since 1898. The trade fair site of Veronafiere with its various exhibition halls stands in the centre of the Italian city of Verona. Dallmeier video security system The high-tech solution also allows for objective management of any complaints Precisely to ensure greater safety for its guests, since 2016 Veronafiere implemented a Dallmeier video security system with a total of 15 Panomera® cameras. The initiative protects as much as possible both exhibitors, starting from the stand set-up phase, and visitors and operators, during the events. This high-tech solution also allows for objective management of any complaints, in a rapid, reassuring, and unequivocal way. “Recognition” with a minimum number of cameras In 2021 the Dallmeier Panomera® video coverage was also extended to the spaces of the “Gallerie Mercatali” of Verona, transformed by Veronafiere into additional exhibition and meeting spaces serving business and the city, after a long conservative restoration intervention of the two archaeological industrial structures. “The purpose of the video system is to minimise the hazards from vandalism, theft, and unauthorised entry, even when no trade fairs or events are taking place. At the same time, Veronafiere wanted to watch over the adjacent parking area,” says Simone Sterza, System Engineer of Italsicurezza, installer and system integrator who collaborates with Dallmeier. Price-performance ratio “It was just as important to the customer to have the best possible price-performance ratio: Veronafiere wanted to have 'Recognition' image quality according to DIN 62676‐4 over the entire area to be monitored, with the smallest number of cameras possible and low total operating costs.” Furthermore, the system should also offer high availability and have comprehensive data protection and data security functions. Any number of “virtual PTZs” and just one Allen key To find a video solution that satisfies the requirements profile, Veronafiere instituted a call for tenders To find a video solution that satisfies the requirements profile, Veronafiere instituted a call for tenders, which was won by the Italian general contractor Cubi S.r.l. One of the main reasons the contract was awarded to Cubi was that as a customer of Italsicurezza, it was able to offer the patented “Panomera®” multifocal sensor cameras. High-resolution images The remarkable feature of the Panomera® cameras is that they can capture long distances and large expanses in high resolution. To do this, they combine up to seven detail sensors having various focal lengths with an overview sensor in one optical unit. The result is a homogeneous, high-resolution total image covering the entire area that is to be captured. 4K cameras The benefit in this case is equivalent to combining multiple 4K cameras with any number of “virtual” PTZ systems but with significantly lower total operating costs. The reason for this is that, apart from fewer cameras, users also need considerably less infrastructure, such as cables, masts, networks, and monitors, to be able to see everything that is happening. Mountera® mounting “Besides their well-known image quality, the thing I found particularly surprising about the new Dallmeier Panomera® cameras was how quickly and easily we were able to mount them,” declares Simone Sterza, System Engineer with Italsicurezza. “Just a single Allen key size was needed for all of the main installation and adjustment work. Thanks to the Mountera® mounting system we were able to mount the cameras safely using just one technician, without needing any assistance from a second person.” Helpful extra services It was also a simple matter to integrate the new cameras and the IPS 10000 Recording Server The Dallmeier cameras capture the outdoor area of the Gallerie Mercatali in the resolution specified in the call for tenders. Italsicurezza was able to define this precisely for the entire area of 10,625 m2 using Dallmeier planning software. It was also a simple matter to integrate the new cameras and the IPS 10000 Recording Server into the existing Dallmeier system. Panomera® S8, S4, and single-sensor cameras Accordingly, Veronafiere only needs two Panomera® S8, three Panomera® S4, and two single-sensor cameras to secure the whole outdoor area of the Gallerie Mercatali and keep a reliable watch over everything that is happening over the entire area. To take advantage of the expanded video system from the very beginning, the security personnel at Veronafiere received thorough training from the team of Dallmeier Italy. Privacy & Security by Design These days, the Veronafiere control centre houses just three workstations, with which the authorised security personnel can observe the entire outdoor area of the trade fair site live and access camera recordings. RAID-6 storage ensures high availability of the recordings. To satisfy Italian data protection regulations, the system deletes the recordings of the camera images automatically after seven days. VCA or AI-based video analysis Searches for specific incidents could also be carried out even more rapidly Moreover, the modular nature of the system allows “upgrades on demand”: this means that Veronafiere could also implement Video Content Analyse (VCA) or AI-based video analysis applications to enable automatic reporting of unauthorised access to “sterile areas” (i.e., areas in which people and objects are not permitted to remain). Searches for specific incidents could also be carried out even more rapidly. Video system for safe events “The Dallmeier system”, ends Simone Sterza, “helps to ensure that exhibitors and visitors have an untroubled, enjoyable trade fair experience.”
In the heart of Aalborg is a lovely and well-kept private home. Here lives a family of five who in 2016 would rent out their basement to utilise the home’s square metres. WHY – To access the basement, the tenants must go through the back door. The family and the tenants thus share the same entrance at the back of the house. Therefore, the family was looking for a solution on how they could give the tenants access to the basement without them also having access to the family’s private residence. WHAT – It was important for the family to keep the architectural style of the house. However, it was not entirely straightforward to find an access control solution where the solution only sat on one side of the door, says Michael Goth-Rindal. Together with CONLAN’s CEO, Ejner Hansen, the family found a solution where they could both preserve the old door and at the same time avoid pulling wires for electricity. Tenants keyless access The keyboard can go through many cycles before the battery needs to be replaced The CT1000 keypad is installed on the back door of the house, giving both family and tenants keyless access to the house. In addition, the C1000LP keypad is installed on the front door of the private home, where the solution is only visible from the side of the staircase. From the inside of the house, they can not see that the door is powered by a keypad. The keypad on the front door of the private residence is battery-powered, meaning the old door could remain, without the pull of wires. As the keypad is a low-power device, the keyboard can go through many cycles before the battery needs to be replaced. The family changes the battery themselves, and the keyboard tells when it’s time. Keypad’s daycode function This allows them to create a code for, e.g., the cleaning, which only works the one-day Benefits - With this solution, the family can access their home, completely without the need for keys. “We are really happy with our solution. It works and is a flexible system that we can easily handle ourselves,” says Michael Goth-Rindal. In addition, the family also uses the keypad’s daycode function. This allows them to create a code for, e.g., the cleaning, which only works the one day. With this, the family has full control over who has access to the house and when. Low power consumption CT1000 reader on the back door – A standalone reader with code. Possibility of up to 28 user codes. The keypad can also be connected to the alarm, so that the alarm is switched off at the same time as the door is unlocked. C1000LP reader on the entrance door for the private home – Reader with code and low power consumption for access control. Several options for access with codes, including one-time, day and period codes that are active from one to 28 days. In addition, the keypad can be powered by both battery or wired power.
Completed in 2023, Thanet Parkway Station, the new high-speed rail hub serving the Thanet area in southeast Kent, has implemented a significant infrastructure enhancement: the installation of high-quality parking barriers to optimise accessibility and safety within its premises. Investment in connectivity Thanet Parkway Station, which opened on 31st July 2023, is a testament to the region's commitment to advancing its transportation infrastructure. With a total investment of £44 million secured through a combination of council financing and various building and growth funds, the station addresses the rising demand for efficient connectivity to London and neighbouring towns. Swift and convenient travel Furthermore, its ample car park, boasting space for 293 vehicles, serves as an indispensable "park and ride" facility Featuring two expansive platforms capable of accommodating 12-car trains and strategically situated on the high-speed line through Ashford International, Thanet Parkway Station offers commuters swift journeys to key destinations. Furthermore, its ample car park, boasting space for 293 vehicles, serves as an indispensable "park and ride" facility, alleviating congestion in central Thanet and providing convenient access to the surrounding areas. Enhancing safety and traffic flow To enhance safety and streamline traffic flow within the station's car park and adjoining pedestrian and cycleway, Jacksons Fencing was specified to implement a comprehensive suite of parking barriers and demarcation measures. Warden Swing Barriers were installed along the pedestrian and cycleway to regulate vehicular access. These galvanised steel barriers offer a robust solution, while ensuring ease of operation for maintenance and emergency vehicles. Safeguarding pedestrian pathways Along the same path, Jacksons Fencing’s timber knee rail fencing served as an unobtrusive demarcation device. This fencing solution, constructed from kiln-dried, pressure-treated timber and galvanised steel straps, safeguards grass verges and delineates pedestrian pathways. Ensuring peace of mind Strategically positioned to enforce height restrictions within designated parking areas, Jacksons’ MaxHite parking height restriction barriers were installed. Crafted from galvanised steel and finished in a highly visible yellow polyester powder coating, the barriers provide durable protection against unauthorised access, while facilitating smooth traffic management. Each installed product comes with the assurance of Jacksons Fencing’s 25-year guarantee, symbolising a commitment to quality and sustainability. High-quality, sustainable products Commenting on the project, Peter Jackson, Managing Director of Jacksons Fencing, underscored the transformative impact of the enhanced security measures at Thanet Parkway Station, said "As a local supplier, we’re thrilled to have been involved in this project, and it’s great to see that the developers have invested in high-quality, sustainable products, showcasing this project’s commitment to providing a lasting transport solution for the community." He adds, "Beyond parking, the upgraded access control and increased security measures not only enhance safety, but also foster a profound sense of reassurance and pride in the area for all station users."
As the UAE's economy progressed, its territory became the world's experimental zone for pioneering construction technologies. The continuous rise of the construction industry has introduced a large number of labourers to stations on construction sites. How to systematically manage workers under regulations, while ensuring the rights and interests of both workers and enterprises is the main problem currently faced by NGC on its way forward. The customer Nael General Contracting (NGC), founded in 1998, is one of the UAE's premier construction companies. Its core areas of expertise include the Design and Execution of Turnkey Construction Projects, Steel Structures, Aluminum & Glassworks, Interior Fit-out, Hard & Soft landscapes, MEP infrastructure, and Facilities Management. Based on 25 years of safe working life, NGC currently has more than 9,000 employees and has successfully contracted not limited to 250 projects. “NGC is seeking the best intelligent attendance solution for one of its construction sites with nearly a thousand workers.” To this end, NGC consulted Anviz's long-term partner Xedos. The challenge Workers' attendance management on and off work is bitterly chaotic without intelligent attendance Workers' attendance management on and off work is bitterly chaotic without intelligent attendance equipment. Workers' shifts are unreasonable and shift coordination is formidable. There are even abundant irregularities such as punching in on behalf of others and tampering with attendance data without permission. So labourers take the fairness of wage calculations with a grain of salt. Need for an intelligent and complete attendance solution “At the same time, the human resources department spends at least 10 hours per month sorting out the clock data of nearly a thousand employees to output monthly results reports." "The financial department also demands to settle workers' compensation based on attendance reports. It leads to continuous delays in salary payments. It is urgent to seek an intelligent and complete attendance solution." The solution Simplify attendance while outputting cloud reports FaceDeep 3 & CrossChex Cloud can cover the above needs and submit a satisfactory solution to NGC Based on ensuring the attendance management of nearly a thousand labourers, while also meeting the output of centralised visual reports and reducing labour costs, FaceDeep 3 & CrossChex Cloud can cover the above needs and submit a satisfactory solution to NGC. NGC's site manager said, "Attendance at the construction site is not transparent, and most workers are often worried about whether their salary for the next month will be recorded in their accounts. There has even been chaos in paid attendance, which has brought a lot of trouble to the normal operation of construction." FaceDeep 3, CrossChex Cloud Based on high-precision liveness face detection and dual-camera lenses, FaceDeep 3 can accurately identify workers and complete personal attendance verification under any environmental conditions, preventing the use of fake faces such as videos and pictures to check in. The CrossChex Cloud implements hierarchical management and designs administrator operation logs to record their action lines, effectively eliminating the unhealthy trend of tampering with records for personal gain. Attendance visualisation reports Integrate through CrosssChex Cloud and SQL DATABASE to synchronise each employee's attendance records NGC's Finance Minister said, "Every month some workers appeal against errors in attendance records, but there is nothing we can do about the large amount of confusing data records." Integrate through CrosssChex Cloud and SQL DATABASE to synchronise each employee's attendance records, and automatically generate attendance visualisation reports. Real-time updates Administrators and employees can make attendance management transparent by viewing reports at any time. The cloud system is equipped with shift and schedule management functions that administrators can adjust in real time according to the construction progress. Workers can apply for make-up attendance to achieve flexible management. Key benefits Convenient and worry-free attendance experience The efficient attendance system ensures a quick clock-in experience and simplifies the attendance process. Cloud visual reports make it easy to calculate workers' salaries. Reduced human resource costs Cloud visual reports make it easy to calculate workers' salaries. For the HR department, there's no longer a need to manually sort out large amounts of attendance data. Client's quote “The person in charge of NGC said, "The attendance plan tailored by Anviz for us has received unanimous praise from all employees." "It reduced more than 85% of the labour costs spent on worker attendance management and saved the company nearly 60,000 dirhams per month."
With approximately 29,000 employees worldwide, Amdocs is a pioneering global software company providing services and solutions to communications and media companies. When building a new campus in Ra’anana, Israel, their large site with four office buildings and three underground floors required a door closer solution tailored to every door, considering their different size, type, and usage. Finding a single supplier to meet all their needs was a challenge, but they succeeded. Site requirements This new site required reliable, flexible door-closing solutions tailored for use at several hundred doors of multiple types: fire doors, public entrances, high and low traffic, and many more. For such a complex project, they also sought trustworthy specification support from an established, experienced manufacturer with a proven track record and a team with local knowledge. Door solutions across campus Requirements included full support for choosing, supplying, and installing solutions for doors across the campus “ASSA ABLOY has many access solutions related to openings in the building, including door closers. I am pleased that our project specification team was able to provide the right solutions for our customer’s requirements,” says Avi Kimhazi, Managing Director at ASSA ABLOY Israel. This included full support for choosing, supplying, and installing solutions for doors across the campus. ASSA ABLOY’s expertise and advice were always available. Product portfolio to meet the individual needs The vast range of available ASSA ABLOY Door Closers, Electric Strikes, Locks, Panic Exit Devices, and other products ensured every opening at the Amdocs Park campus was equipped with its ideal solution, without compromises. Certifications including fire compliance across the full range help to remove regulatory worries for specifiers and facilities managers. Cam-Motion technology Models supplied include ASSA ABLOY Cam-Motion® Door Closers for several applications Models supplied include ASSA ABLOY Cam-Motion® Door Closers for several applications. With innovative Cam-Motion technology, the push-force required to open a door falls rapidly, providing barrier-free access for all plus secure closing to keep premises safe. DC700, DC840 and DC200 ASSA ABLOY’s Cam-Motion DC700 model creates comfortable, secure access to high-traffic public doors in the building. The DC840 model conceals the same technology within the door leaf itself and is deployed where minimal aesthetic impact is required. For smaller door sizes, choosing the cost-efficient DC200 rack and pinion door closer helped the project hit its budget targets. Hitting project deadlines with specification support Designers could visualise door solutions accurately and the right solution was specified for each opening The project was managed using BIM principles from the outset. ASSA ABLOY’s local specification team became a hub for coordinating and disseminating up-to-date information for every door solution as part of the BIM process. Alongside providing timely specifications, the team made sure supply and installation hit the timelines that construction managers required. Detailed specifications were supplied and updated digitally, so designers could visualise door solutions accurately and the right solution was specified for each opening. Openings Studio® software Openings Studio® software was a key tool for everyone involved in the project. This user-friendly software ensures accurate specification data is logged and, when approved, transmitted to the live Revit® design. With detailed specifications supplied and updated digitally, designers visualise door solutions accurately as soon as possible and ensure the right solution is specified for each opening. And because every stakeholder can have appropriate Openings Studio access, they work transparently and with accurate, up-to-date specifications.
Round table discussion
The economic fallout of the COVID-19 epidemic was felt in supply chain disruptions, higher prices, and shortages of certain goods. The physical security industry was not spared, although the epidemic also presented opportunities for security companies. Changing access control trends triggered by the pandemic are still reverberating throughout the industry, for example. Four years later, the impact of the pandemic is still being felt in the security market, lingering like the symptoms of "long COVID." We asked this week's Expert Panel Roundtable: Four years after the start of the COVID-19 pandemic, what is its lingering impact on the physical security industry?
The security industry offers a vast array of technologies and vendors. This can be overwhelming for end users, who depend on security integrators for guidance and service. But how well do security integrators provide end users with what they need? We asked this week’s Expert Panel Roundtable: What are the biggest challenges that end users face when working with integrators?
Technology offers a range of tools to bolster security at public events, including before, during, and after. This year, the 2024 Summer Olympics in Paris will draw the attention of the world, requiring the best protection available for the venues, the athletes, and the attendees. Other happenings such as the FIFA World Cup, the Super Bowl, the Tour de France, and the U.S. NBA Finals are momentous events that challenge security and law enforcement personnel to keep them safe. We asked this week’s Expert Panel Roundtable: How is technology contributing to security in the arena of public events?
Products
White papers
Multi-residential access management and security
DownloadGuide for HAAS: New choice of SMB security system
Download2024 trends in video surveillance
DownloadBoost efficiency and streamline security with integrated access control
DownloadAI in security solution
DownloadManaging security in the age of boundaryless working
DownloadThe top 4 reasons to upgrade physical security with the Cloud
DownloadAccess control: The enterprise buyer's guide
DownloadEffectively branding a multifamily property
DownloadIntegrating control access and security
DownloadIdentity and access management
DownloadAccess management in higher education
Download6 good reasons to embrace mobile credentialing
DownloadThe welcoming workplace
DownloadA step-by-step checklist for choosing an intercom system
DownloadVideos
Security access systems: Manufacturers & Suppliers
- Vanderbilt Security access systems
- HID Security access systems
- CyberLock Security access systems
- Alpro Security access systems
- ABLOY Security access systems
- Bosch Security access systems
- Software House Security access systems
- CEM Security access systems
- AMAG Security access systems
- Parabit Security access systems
- Honeywell Security Security access systems
- Delta Scientific Security access systems
- Aritech Security access systems
- TESA Security access systems
- ASSA ABLOY - Aperio® Security access systems
- Hikvision Security access systems
- Nedap AEOS Security access systems
- TDSi Security access systems
- Paxton Access Security access systems
- Dahua Technology Security access systems