Editor’s picks

Steps to develop an integrated retail security strategy
Steps to develop an integrated retail security strategy

There are many aspects to consider when developing a retail security strategy, including loss prevention, physical security, asset protection, risk management, and IT. All these areas could be the responsibility of just a few people working to secure a handful of stores or each of these areas could be entirely separate departments, as is often the case for major retailers with locations throughout the country. Regardless of the size of the retailer, there are many different technologies that ca...

Five security essentials to protect your business from crime
Five security essentials to protect your business from crime

Crime is preventable and safeguarding your businesses through the use of technology is essential. Whether you want to avoid burglaries or common vandalism, you need to comply with the General Data Protection Regulations to protect your brand’s identity. Security should be one of your main focuses and with the help of 2020 Vision, providers of access control systems, we look at some of the most efficient items that you need in place to protect your property. 1) Deploy CCTV effectively acr...

What role does social media play in promoting security?
What role does social media play in promoting security?

Social media is part of our everyday lives, and increasingly it is also part of the security marketplace. Social media can be used for effective marketing and to communicate with customers, and it can be leveraged as a tool to make us all more secure. Communicating information in a crisis is another role social media can play to promote security. To elaborate on social media’s increasingly vital presence in the security marketplace, we asked this week’s Expert Panel Roundtable: What...

Intelligent fire detection: Releasing the potential of remote monitoring
Intelligent fire detection: Releasing the potential of remote monitoring

A new study reveals that intelligent fire detection systems have the potential to unlock more than 30 percent cost-savings on routine maintenance checks through real-time, data-driven remote monitoring. Kevin Mears, Product Manager for Kentec Electronics, describes how remote monitoring and predictive maintenance can meet the competitive challenges of the digital age. Leading economists have identified the convergence and synergies delivered by The Internet of Things – the interconnection...

Round table discussions

What are the obstacles to adoption of mobile credentials for access control?
What are the obstacles to adoption of mobile credentials for access control?

Using a smart phone as an access control credential is an idea whose time has come – or has it? The flexible uses of smart phones are transforming our lives in multiple ways, and the devices are replacing everything from our alarm clocks to our wallets to our televisions. However, the transformation from using a card to using a mobile credential for access control is far from a no-brainer for many organisations, which obstacles to a fast or easy transition. We asked this week’s Expert Panel Roundtable: When will mobile credentials dominate access control, and what are the obstacles to greater adoption?

What is driving the growth of cloud systems in physical security?
What is driving the growth of cloud systems in physical security?

The physical security industry is embracing the cloud in a big way. Cloud-based systems – which involve accessing a shared pool of information technology resources via the Internet – are much higher-profile in the video and access control markets, and large and small companies are getting on the cloud bandwagon. We asked this week's Expert Panel Roundtable: What factors are contributing to growth in cloud systems in the security market?

What is the value of physical security data?
What is the value of physical security data?

We are living in the age of Big Data, and businesses are inundated with large volumes of data every day. Success depends on capturing, analysing and ultimately transforming that data into information and intelligence that can be used to improve the business. So, it is with today's physical access control and video systems, too, which also generate unprecedented levels of data. But how can we make the data useful to end users and how can they realise its full value? We asked this week's Expert Panel Roundtable: Relating to physical security systems, what is the value of data and how can that value be measured?

Case studies

ASUCQ chooses SMARTair for real-time access control and virtual keys on a smartphone
ASUCQ chooses SMARTair for real-time access control and virtual keys on a smartphone

An initial investment of $100 million launched the first American public university campus in Mexico: Arkansas State University Campus Queretaro (ASUCQ). Within five years of its 2017 opening, around 7,500 staff and students are expected to use the site, including campus accommodation for up to 1,500 students. To accompany such a high-profile development, the university needed security and access control systems with a trusted and proven track record protecting staff, students and other university assets. They sought a technology-based solution to reduce security risks across the campus, and specifically an access control system able to monitor multiple spaces and monitor all access points in real time. System software and hardware should make it fast and intuitive to generate or modify access rights for any campus user. A single solution needed to work across both common university facilities and separate areas with student accommodation. Monitoring campus in real time With the SMARTair Wireless Online option, facilities managers monitor the campus in real time, with live updating of who enters where, and when ASUCQ turned to SMARTair to protect its investment and site users. So far, around 600 SMARTair battery-powered online escutcheons have been installed across campus. High traffic flows through many campus doors required robust access control devices. With the SMARTair Wireless Online option, facilities managers monitor the campus in real time, with live updating of who enters where, and when. Intuitive SMARTair software enables all day-to-day administration from a central control point. "SMARTair is a very secure access control system that is also very intuitive for user and access management,” says Jose Alfonso Suarez Torres, Operations Chief at ASUCQ. Future plans for ASUCQ envision a ‘university city’ with up to 20,000 students — all protected in real time with SMARTair access control. And because a SMARTair system is wireless, expanding and upgrading access control will never disrupt the daily work or campus life at this fast-growing university. SMARTair mobile solution Openow A single interaction with the SMARTair TS1000 software is all it takes to make a virtual key disappear automatically from a user’s Openow app The new SMARTair mobile solution, Openow also gives facility managers the option to send, revoke and amend the validity of users’ keys, wherever they (or the keyholder) may be — with no need for physical credentials like keys or smart-cards. Students and staff save time, with no access cards to collect or validate. Each user installs and validates their Openow app and collects keys virtually. Tap a SMARTair escutcheon with your phone... and the door unlocks, if you are authorised to enter. Administrators save time and resource at the end of a student or staff member’s time on campus. A single interaction with the SMARTair TS1000 software is all it takes to make a virtual key disappear automatically from a user’s Openow app. A simple, secure, modern solution to university access control.

Read more

Company in profile

List your company

Increase your online visibility and get found by relevant security professionals.