Mobile access articles

What change would you like to see in security in 2022?
What change would you like to see in security in 2022?

Here’s a news flash: 2022 will be a pivotal year for the security industry. As we enter the new year, continuing change is a safe prediction for any fast-moving, technology-driven marketplace. Recent history confirms the ability of the security industry to shift and adapt to changing conditions and to provide an ever-expanding menu of technology solutions to make the world a safer place. Given that the new year will bring change, what will that change encompass? More to the point, what should it encompass? We asked this week’s Expert Panel Roundtable: What is the biggest change you would like to see within the security industry in 2022?

HID Global hails the renewed promise of mobile access
HID Global hails the renewed promise of mobile access

It’s been almost exactly a decade since HID Global launched the world's first university pilot of smartphones carrying secure mobile IDs. A lot has changed in the following 10 years. Today’s technology has matured, advanced, and proliferated across a variety of high-value use cases. To catch up on the latest developments in mobile access, we contacted Luc Merredew, Product Marketing Director, Physical Access Control, at HID Global.   Q: What has changed since the first pilot implementation of smartphones used for secure mobile identification? Merredew: One of the biggest milestones several years ago was when mobile access solutions achieved certification to the ISO 27001:2013 Information Security Management System (ISMS) standard. With increasing awareness of cloud-based security threats and resulting high expectations from a solution, today’s system owners, operators, and users insist on companies being able to demonstrate that they have had their services vetted by independent laboratories and/or agencies. When adopting mobile access solutions that maximise convenience and efficiency, and deliver dramatically improved user experiences, it is neither necessary nor acceptable to compromise security in either the physical or digital domains. Q: Do universities continue to be the biggest users? Mobile IDs on devices eliminate person-to-person credentials when accessing secured areas Merredew: The use cases have grown dramatically, spread evenly across all types of organisations in locations ranging from high-rise buildings to multi-campus global enterprises. But yes, universities continue to be big adopters, and they were among those most eager to leverage the technology so they could bring people back to campus in person during the pandemic. In this environment, mobile IDs on smartphones and other devices eliminate person-to-person credential (e.g., badge or ID card) issuance or revocation, as well as the need to physically touch cards, readers, or keypads when accessing secured areas.   Q: How were mobile IDs employed by your customers as they brought people back to physical locations after the pandemic shutdown? Merredew: One example is Vanderbilt University, where the challenges of COVID-19 brought renewed attention to the importance of a modern system for identity management and access control that was compatible with Near Field Communication (NFC) and Bluetooth technologies. Members of the campus community could more conveniently access buildings and services with their mobile devices, and the university could efficiently provision and de-provision credentials remotely without person-to-person contact. More recently, Vanderbilt leveraged HID Mobile Access® to deploy campus IDs on iPhone and Apple Watch through Apple Wallet. Q: Is there another example outside the university vertical? Merredew: Another example is the iconic tower Arcos Bosques Torre 1 in Mexico City, where the owners and tenants enjoy the simplicity of using their trusted mobile devices to seamlessly access their spaces. As with the Vanderbilt deployment, the drive for operational efficiency and convenience in the tower was combined with a desire to minimise the need for users to come in physical contact with the system. Having a solution like HID Mobile Access that delivers touchless entry and increased safety and security is important.  Q: What have been the biggest mobile access advancements? The mobile credential provides contactless, seamless access to a wide range of devices and services Merredew: One of the most important advancements was simplifying upgrade paths to mobile access. In the Vanderbilt example, our HID Reader Manager was used to upgrade the firmware on the university’s physical access control readers and extend support for NFC-based credentials in Apple Wallet. The university uses the HID Origo™ Mobile Identities API integrated with CS Gold®, a higher education transaction system from CBORD, for credential lifecycle management. Another significant enhancement has been the expanded range of uses cases for the mobile credential, going beyond simply opening doors to include providing contactless, seamless access to a wide range of devices and services such as time-and-attendance terminals, cashless vending machines, printers, computers, workstations, and many other applications. Q: Wearables are also having an impact. Merredew: Contactless mobile experiences are also delivered through wearable wristbands. One example is the Nymi band which, once authenticated, continuously authenticates the identity of the user until it’s removed from the wrist. This delivers zero-trust security principles and access control using convenient fingerprint and heartbeat biometrics to users seeking touchless authentication. Q: What is the impact of the cloud? Merredew: The move to a cloud-based system to issue and manage mobile identity credentials has unified, automated, and simplified identity issuance at a single facility or across any number of distributed office or remote work locations. Q: What should end users look for in a mobile access solution? Look for solutions that use a secure element in the reader as well as cloud certificates, to ensure security and data privacy Merredew: Solutions should support the largest possible number of popular mobile devices – in HID’s case, this includes more than 250. Look for solutions that use a secure element in the reader, and a secure key management process, as well as cloud certificates, to ensure both security and data privacy. Make sure the solution supports Bluetooth Low Energy (BLE), Near Field Communication (NFC), and both iOS and Android operating systems. Solutions that provide Application Programming Interface (API) and Software Development Kit (SDK) support offer direct access to the solution’s access control hardware, speeding deployment while enabling integration partners to continue innovating products that deliver even better user experiences. Q: Wonder what this market will look like in 10 more years. What’s next for mobile access? Merredew: Future innovations are on the horizon with technologies such as Ultra-Wideband (UWB) wireless connectivity, which HID expects will become ubiquitous on mobile devices. It provides unprecedented accuracy and security when measuring the distance or determining the relative position of a target. It is not HID’s expectation that UWB will replace Near Field Communication (NFC) or Bluetooth, but rather supplement Bluetooth and other technologies to provide the assurance, reliability, and granularity of device position that enables truly seamless experiences. 

Motorola Solutions to showcase their integrated technology ecosystem at Intersec 2022
Motorola Solutions to showcase their integrated technology ecosystem at Intersec 2022

The global pandemic fuelled the need to use technology to overcome challenges and support safety. An expansive global study has revealed that 88% of citizens globally now want to see public safety transformed through the use of advanced technology. Additionally, 71% consider technologies such as video cameras, data analytics, and cloud solutions as necessary to address the challenges of the modern world. At Intersec 2022 (Jan 16-18, Dubai), Motorola Solutions will showcase its integrated technology ecosystem that unifies voice, data, video security, and access control solutions. Highlights will include video cameras and analytics software, advanced mission-critical broadband push-to-talk services, and digital radio solutions. Accelerating business productivity Motorola Solutions will share the following innovations at Intersec 2022: M500 in-car video system: On display for the first time in the Middle East, the new M500 in-car video system is enabled by artificial intelligence (AI). It features new backseat passenger analytics that automatically starts the in-car camera recording as soon as an individual enters the back seat of a police car. This is a major step forward in automating an everyday policing challenge to ensure that the presence of an individual in a police vehicle is securely recorded and the video evidence is automatically tagged and saved to the incident record. This software solution connects individuals and groups over a carrier's network Mission-critical broadband push-to-talk (PTT) solution: This software solution connects individuals and groups over a carrier's network to improve operational efficiency, accelerate business productivity and enhance customer service. It offers a broad set of multimedia services, such as push-to-video, push-to-text, geo-location and geo-fencing, device sharing, and operational status messages. The solution can be easily scaled to support new staff or third-party partners, enabling rapid response to developing situations or changing needs. Additional vehicle information L5M mobile Automatic Number Plate Recognition (ANPR) camera system: The high-performance ANPR solution is designed to accurately capture number plates and additional vehicle information, such as the car model, even when moving at high speed. The software also identifies vehicles of interest by providing officers with real-time alerts and quick searches to boost insight and awareness. H5A rugged PTZ (Pan-Tilt-Zoom) camera: This camera combines high-resolution imaging, 360-degree views, and up to 36x zoom with an extremely robust design to perform reliably in the harshest environments. Its wide dynamic range captures critical details in very bright and dark areas and its optional infrared and white light illuminators can also provide ideal brightness in low-light scenes. Simplified device management The VB400 is designed to improve responder safety and increase transparency between police and citizens MXP600 compact TETRA radio: The MXP600 radio is small, lightweight, and extremely rugged. It features intelligent microphone technology for high-performing noise cancellation and simplified device management via over-the-air programming (OTAP). VB400 body-worn camera and VideoManager Software: The VB400 is designed to improve responder safety and increase transparency between police and citizens. It offers long battery life of up to twelve hours and a pre-recording function, allowing events to be documented up to two minutes before manual recording starts. This enables police officers to record unexpected situations without missing the start of an incident. Remote management capabilities Cloud-based access control software solution: Openpath’s cloud-based access control platform is a scalable and reliable solution that offers touchless access, remote management capabilities, and a suite of safety and wellness features designed to improve safety and security while reducing friction for end-users. Openpath’s triple-patented ‘Wave to Unlock’ technology offers touchless access for doors, elevators, or turnstiles. Openpath also offers occupancy management capabilities to comply with social distancing, health-check, and fever detection enforcement. The Video Reader Pro can easily integrate with many third-party video management systems Openpath Video Reader Pro: Combining the heightened security of a built-in, high-resolution camera with the form factor of a mullion door reader, the Video Reader Pro automatically associates video footage with access events, alerts, and motion and visually monitors entries in the Openpath Control Center. Designed with open video standards, the Video Reader Pro can easily integrate with many third-party video management systems. Access control solutions Compass Decision Management System: This intuitive operational interface supports the decision-making process for control room security operators, as well as provides a structured response to incidents with custom standard operating procedures. "The public's expectation for and acceptance of the use of technology to ensure their safety and security has never been greater," said Patrick Fitting, regional Vice President of Middle East and Africa at Motorola Solutions. "Customers are accelerating technology deployments, particularly when it comes to the adoption of easy-to-use PTT services offering greater interoperability between systems, cloud-based software, video security, and access control solutions. Motorola Solutions is connecting these technologies into truly integrated workflows to unlock new levels of collaboration between workgroups and provide access to information in real-time to help make the world safer.”

AlertEnterprise solves the healthcare visitor problem with Visitor Identity Management (VIM)
AlertEnterprise solves the healthcare visitor problem with Visitor Identity Management (VIM)

Security is of the utmost importance in the healthcare setting so that patients and staff alike can focus their attention on improved clinical outcomes. Unfortunately, visitors are often a contributing factor to safety incidents and the burden on hospital staff has increased exponentially since the onset of the pandemic. Let’s review the current state of healthcare workplace safety and how an automated, cyber-physical approach can help eliminate the administrative hassle and strengthen safety protocols. Global pandemic adds undue strain The ongoing global pandemic has placed enormous strain on healthcare systems and people are only beginning to understand the impact in terms of both patient outcomes and healthcare worker wellbeing. A recent analysis by Press Ganey revealed an increase in patient safety events of all types during 2020. In late 2021, the Johns Hopkins Centre for Health Security released a new report sharing survey results from 1,189 healthcare workers in which 47 percent reported feelings of burnout. Workplace violence in healthcare Incidents of serious workplace violence are four times more common in healthcare than in private industry Even before the current stressors placed on healthcare systems by the pandemic, hospitals were a relatively dangerous place to work. While a high level of danger is expected from industries like construction or manufacturing, healthcare presents a more high-risk environment than both. According to the Occupational Safety and Health Administration, incidents of serious workplace violence are four times more common in healthcare than in private industry. And in 2019, U.S. hospitals recorded 221,400 work-related injuries and illnesses, which amounts to 5.5 work-related injuries and illnesses for every 100 full-time employees. Visitors play a role According to the Bureau of Labor Statistics, violence is among the top five causes of injury among hospital workers. Those acts of violence stem from a mix of patient and visitor aggressions. Among the most common acts committed against nurses, which are shouting and yelling, swearing, and grabbing, visitors account for 35.8, 24.9, and 1.1 percent of incidences according to the American Nursing Association. From 2013-18, roughly 33 percent of nurses reported verbal abuse by visitors and 3.5 percent reported physical abuse. The pandemic has only increased these types of incidences. A Missouri hospital, for example, recently installed panic buttons on their badges to summon hospital security as needed. Fully automated visitor identity management can help VIM software integrates with the Epic HL7 interface to retrieve patient and visitor data A cyber-physical approach to visitor management that incorporates automation can both strengthen vetting protocols and relieve the administrative burden on staff. The Visitor Identity Management (VIM) software, for example, automates the entire visitor identity lifecycle from pre-registration to check-in, on-site experience, and check-out. And compliance never comes into question, since VIM software integrates with the Epic HL7 interface to retrieve patient and visitor data. Here’s how it works: When a patient is admitted to the hospital, Epic generates an HL7 message that processes the event and creates a patient profile. VIM syncs this information, pulling patient information like the patient’s name, department, MRN unique identifier, and more The system pushes back HL7 messages for discharge and updates using the same interface  Benefits of VIM Here’s where the practical benefits start to set in. The software creates a visitor profile associated with the appropriate patient. From there, visitors can check-in and out on their own through a self-service kiosk app. Or, staff can issue visitor stickers, technology badges, or advanced mobile credentials using lobby workstation software. VIM automatically vets visitors against internal and third-party watch lists before issuing an approved profile Beyond automation efficiencies, VIM also ensures the highest level of safety and security for everyone in the building. The software automatically vets visitors against internal and third-party watch lists before issuing an approved profile. Additionally, VIM software integrates with physical access control systems so that a visitor’s physical access would remain limited to only approved areas of the hospital. By leveraging both systems, healthcare facilities with heightened security needs, such as children’s hospitals, can create a much more controlled environment for patients and staff. Manage new vaccination and testing data Another major challenge facing the healthcare system complies with the emergency temporary standard issued by OSHA, which requires adequate personal protective equipment, timely exposure reporting, and more. In a survey of over 5,000 registered nurses conducted by National Nurses United (NNU), just 23 percent said their employer reported COVID-19 exposures promptly. Using VIM software, healthcare providers can automate workflows related to COVID-19 health and safety compliance, as well as vaccination checks, to expedite the management and flow of critical health data. And with a secure record of all visitor comings and goings, healthcare systems have one more reliable, auditable data point to conduct contact tracing. Cyber-physical approach An automated, cyber-physical approach to managing the visitor experience increases the number of checks and balances available to secure an already stressful working environment. In short, visitors get a better experience and staff have more time to focus on higher-value work. Meanwhile, automated workflows for vaccination and physical access can help expedite compliance with new requirements and contact tracing in the event of an exposure. Due to the integration with Epic software, an organisation can reap these benefits using the systems they already have in place

Editor’s picks

Top 10 articles of 2021 reflect a changing security marketplace
Top 10 articles of 2021 reflect a changing security marketplace

Our most popular articles in 2021 provide a good reflection of the state of the industry. Taken together, the Top 10 Articles of 2021, as measured by reader clicks, cover big subjects such as smart cities and cybersecurity. They address new innovations in video surveillance, including systems that are smarter and more connected, and a new generation of computer chips that improve capabilities at the edge. A recurring theme in 2021 is cybersecurity's impact on physical security, embodied by a hi...

IDEMIA launches a new generation of MorphoWave contactless fingerprint terminals
IDEMIA launches a new generation of MorphoWave contactless fingerprint terminals

In the context of a global health crisis, implementating contactless authentication terminals is now crucial in many public and private spaces; allowing a faster, more secure, and barrier-free biometric authentication. IDEMIA, a global provider of augmented identity, innovates to offer ever more complete and adapted solutions to its consumers. With MorphoWave™, users simply wave their hands in a quick and easy gesture to have their four fingerprints 3D-scanned and verified in less than...

Oosto’s deep learning enhances facial recognition accuracy and expands uses
Oosto’s deep learning enhances facial recognition accuracy and expands uses

Newer facial recognition systems are scalable and provide more accurate results, and the end-user selects the parameters of system performance to suit their own application needs. “We have developed algorithms that can be optimised in various compute environments, whether in a small chip inside an edge device or on a large server device,” says Ido Amidi, Oosto’s Vice President of Products and Business Development. “It all depends on client needs. We can do it all withou...

LiDAR delivers security and intelligence to casinos with no privacy concerns
LiDAR delivers security and intelligence to casinos with no privacy concerns

Casinos offer several attractive applications for LiDAR, including security and business intelligence. Using laser sensors, the technology can replace the use of surveillance cameras. For casino security, LiDAR can track player movement and provides complete coverage and accuracy that have not been achievable by surveillance cameras. Massive coverage areas can save on costs of sensor deployment versus other technologies. LiDAR and its applications LiDAR is a method for determining ranges by t...

Round table discussions

How should end users measure the ROI of security systems?
How should end users measure the ROI of security systems?

Traditionally, security has been seen as a cost centre rather than as a profit centre or a source of revenue in an organisation. Therefore, end-user security managers have struggled to cost-justify their purchases of security systems: How can you assign value to preventing a catastrophic loss unless or until such a loss happens (which you’re trying to avoid!). Even so, security’s return on investment (ROI) picture is changing, with expanded system capabilities and technologies that provide benefits beyond the traditional security function. For the latest, we asked this week’s Expert Panel Roundtable: How should end users measure the return on investment (ROI) of security systems?

What change would you like to see in security in 2022?
What change would you like to see in security in 2022?

Here’s a news flash: 2022 will be a pivotal year for the security industry. As we enter the new year, continuing change is a safe prediction for any fast-moving, technology-driven marketplace. Recent history confirms the ability of the security industry to shift and adapt to changing conditions and to provide an ever-expanding menu of technology solutions to make the world a safer place. Given that the new year will bring change, what will that change encompass? More to the point, what should it encompass? We asked this week’s Expert Panel Roundtable: What is the biggest change you would like to see within the security industry in 2022?

What are the security challenges of the healthcare industry?
What are the security challenges of the healthcare industry?

The COVID-19 pandemic has complicated the task of securing hospitals and healthcare facilities by adding new concerns about disease transmission to the long list of other threats healthcare security professionals face. Hospital security must also crack the code to both allow open public access to healthcare facilities while keeping out violence and other security threats. We asked this week’s Expert Panel Roundtable: What are the security challenges of the healthcare industry?   

Case studies

Utah school using mobile video system deployment as first line of defence
Utah school using mobile video system deployment as first line of defence

Canyons School District is located in the Southeast region of Salt Lake County, Utah. The school system serves approximately 33,900 students in 44 schools, including 29 elementary schools, eight middle schools, five high schools, and several special program schools.   This large district covers 192 square miles and relies on a well-coordinated bus system to transport 15,000 students daily on bus routes that cover close to 1.5 million miles a year. The district's 200 Transportation Department employees maintain a fleet of 175 school buses that serve over 4,700 stops and 2,500 activity trips annually. Challenge “Student safety is a top priority for us and buses have more than their fair share of problems," said Director of Technology Support, Canyons School District. “Our video systems are a key piece of technology used to keep our students and drivers safe. Bullying, fights, inappropriate behaviour, accidents, and vandalism have all been documented with our camera systems. Video evidence is a critical piece of the puzzle that helps our Principals and Administrators know what happened.”  Upgrading to open platform technology The team specified a system that includes VMS from Milestone, network cameras from Axis, and Sintron's mobile server After several years of dealing with an older, failing, analogue video system on its buses, the district needed to update the fleet. The district's Transportation Department together with the IT department spent two years researching technologies and best practices to find the right mobile video security system. The team ultimately specified a system that includes video management software (VMS) from Milestone Systems, network cameras from Axis Communications, and Sintron Technologies’ mobile server/recorder. Stone Security is the Milestone Diamond Partner responsible for the implementation and maintenance of the solution.    Installing the solution Stone Security made sure the installation went according to Canyons School District standards. They worked around the district's tight bus schedule, keeping flexible in dealing with special situations and emergencies. Over 85 of the district's buses were installed with the new mobile video system during the summer of 2017 and the rest of the total 175 buses were recently upgraded this summer in preparation for school to start end of August 2018. In the future, when Canyons School District adds buses to its fleet, they will be outfitted with the same Milestone, Axis, Sintron solution.        IP-based open platform An important part of the solution is that the system must use open platform IP-based, industry-standard components “Milestone and Stone Security have been awesome partners,” said the Director of Technology Support at Canyons School District. “We started this project after school ended in June, the same day we began to repave the bus yard. The logistics of getting old camera systems removed and new ones installed while at the same time having buses parked at many temporary locations was daunting. Stone Security handled it with grace and even finished a week ahead of schedule.”    An important component of the solution is that the system must use open platform IP-based, industry-standard components. Traditional analogue solutions only use proprietary cables, cameras, DVRs, etc., but the Canyons School District wanted to make sure that it moved to an open standard, so if problems arose, it would not be locked into any vendor, and a range of expansion options would be possible. A connected solution The Canyons School District solution includes onboard two, three, or four AXIS M3037-PVE 360-degree cameras per bus depending on the size of the vehicle, and a Sintron mobile recording server, fully customisable and ruggedised, Windows OS-based. Administrators can manage the OS, group policies, updates, and software from a centralised location with Microsoft System Centre Manager. The server includes a built-in UPS to protect it from battery drops as the engine starts and stops, as well as loss of power in the case of a vehicle accident. It provides PoE to the cameras and has options for GPS, Cellular, multiple storage locations, WiFi, as well as reading data from a CAN-BUS network.  Milestone XProtect software and Interconnect add-on  Operators can retrieve video in a matter of hours following an incident, rather than days “Milestone VMS is the system we use for many of our school-based systems. By also using it in our buses, it makes it easier on our Principals and Administrators because they don’t have to learn multiple systems,” said the Director of Technology Support at Canyons School District.   The Milestone XProtect software was selected because it allows the recording server to be located on the bus and manage itself, while the Milestone Interconnect add-on enables the video to be transferred from the buses anytime they are near a school or in the main bus yard over WiFi. Operators can retrieve video in a matter of hours following an incident, rather than days. Video storage solution “We developed a new way to deploy the Milestone VMS for transportation. We're using XProtect Expert on the buses, with XProtect Corporate in the data centre, and XProtect Interconnect as the connection between the systems. With Milestone, we were able to craft a flexible solution that didn't exist previously," said Andy Schreyer, Stone Security. Schreyer explained that video is stored redundantly within the bus both on the server as well as within the cameras. If there's an accident that takes down the server, video from the cameras can be retrieved. The bus servers store video for 30 days, and any time an equipped bus pulls into a district schoolyard, the server will connect back to the corporate Milestone server and offload the video. The video is stored in the district's data centre and accessed on an as-needed basis. When an incident occurs, the Transportation Department can share recorded video with the school administration or local authorities. Total visibility The system captures the four video streams coming from each camera and picks up external images through the windows The internal 360-degree cameras cover all activity within a bus, often providing data from a minimum of two different angles. The system captures the four video streams coming from each camera (up to 16 video feeds from a four-camera equipped bus) and picks up external images through the windows as well. While some windows are digitally masked in the software to avoid excessive recording on motion, the district has an option for mounting cameras on the exterior of a bus. They can expand to external camera systems by equipping buses with Axis P3905-RE high-performance outdoor cameras, helping to assure that what's happening outside and around a bus is captured. Video security “I’m excited about the Milestone solution. After extensively studying all of the software and hardware manufacturers in the video security industry, the Milestone, Sintron, and Axis combination ticks all of the boxes." "Also, we are not locked into proprietary systems as the industry evolves. Lastly, Stone Security has proven to be a rock-solid partner in all of this and I highly recommend them,” said the Director of Technology Support, Canyons School District.

Read more

Company in profile

List your company

Increase your online visibility and get found by relevant security professionals.