BT Redcare GSM - extra back-up for double protection
BT Redcare GSM - extra back-up for double protection

Do you have valuable stock on your premises?  Is your building out of public sight?  Do you want the police to respond as fast as possible if your premises are broken into?  How long would it take your business to recover following a break-in?Just because you have an alarm system installed, it doesn't mean you're fully protected.  BT Redcare GSM doubly protects because it uses two secure signalling paths to your alarm receiving centre.  If either is tampered with by an intruder, or is faulty, the alarm receiving centre will be alerted and the relevant emergency services, or your authorised key holder, will be called.BT Redcare GSM uses the security of a BT phone line with the added protection of a GSM radio back-up path.  If either is interfered with by an intruder, the other continues to monitor for any further alarms and transmits them as ‘confirmed activations' - extra confirmation that an intruder is on the premises and that the alarm isn't false.  A ‘confirmed activation' attracts immediate response from the emergency services.  BT Redcare GSM is ideal for all commercials risks and homes needing the highest level of security.BT Redcare GSM - maximum protection recommended by insurersHighly secure alarm signalling that provides double protection against all risksUses the BT Redcare secure networkAlerts the alarm receiving centre within secondsWorks for you every second of the day, 365 days of the yearWorks on existing BT telephone lineNo call charges to pay for on the signals sent via the phone line or radio pathNo additional cost for a new phone line

Add to Compare

Browse Intruder Alarms: Communicators & Communication Systems

  • Digital Communicators
  • Yes
  • Voice Diallers
  • Yes

Intruder alarm communicators - Expert commentary

Access control and door entry management: How technology is driving change
Access control and door entry management: How technology is driving change

Access control and door entry is a huge responsibility, and challenge, for local authorities and housing associations UK wide. For councils, they’re accountable for the security and safety of many public facilities such as leisure centres, libraries as well as residential housing developments which are often large scale and home to hundreds of people. Housing associations manage affordable rental housing which also means they’re responsible for the appropriate access control management for each individual house or flat. Technology developments have enabled better entry systems that are far more secure yet also more convenient and easier to manage. For example, with modern intercom and access control systems, remote management and communication is something that offers local authorities and housing associations features that enable them to reduce costs and cut their carbon footprints by managing multiple sites from one place. On the other hand, such technological innovation has meant that local authority and housing association specifiers and consultants now have a wide range of systems and products to choose from which can cause issues in ensuring the right system for a specific building or development is chosen. Choosing an appropritate access control system In choosing an appropriate system, local authorities and housing associations need to opt for a cost effective solution that can be easily maintained with excellent support from the manufacturer and guarantees that the system and system parts will remain supported for the duration of its expected life cycle. It is also important that the chosen system is flexible to cater for the varying needs of the tenants and visitors. Of increasing importance is the reduction of anti-social behaviour which new technology can help by providing the use of data loggers which track the use and events of a door entry system, allowing specific evidence to be located by integrating with CCTV. Using technology to our advantage Through advancements in management systems and services, we can gain a much better visual representation of the events and general usage of an intercom entry system and not just its proximity access control. Systems, for example, can now send email alarms or notifications to the administrator or management. We are now able to modify user rights and access levels on the go from a mobile app which enables a much greater control over service and maintenance engineers, such as making sure they have full access when required via an app, rather than arriving to site with the incorrect keys or access fob. Systems, for example, can now send email alarms or notifications to the administrator or management Dealing with tenant’s lost and stolen keys has never been so easy either. The blocking or deletion of lost fobs and adding a new fob can be carried out in minutes while at the same time removing the cost of sending an engineer to the development to programme new fobs. This greatly reduces the carbon footprint of the whole task as fobs can now be sent out via post to a secure location for collection. Technology has also helped local authorities and housing associations to overcome the issue of not being able to have a concierge or building manager available 24/7 at some developments. Now with internet communication, it’s possible for tenants and visitors to get in touch with someone should they need assistance, whether that’s from within the apartment or from an entrance point. For example, lets take the Videx VX2200 with IP concierge integration. This system is exceptionally flexible, enabling calls to be answered on Videx intercoms and also mobile phones if required. With the integration of the IP concierge each block can be either standalone or networked via the internet back to a central control room. Reduced maintenance costs and carbon footprint We work with a wide range of local authorities and housing associations to help them overcome access control and door entry challenges. One organisation we have recently partnered with is The Living Group to help them greatly reduce their maintenance costs and carbon footprint by installing the MiAccess offline proximity system on many of their developments across the North East. Technology developments have enabled better entry systems that are far more secure yet also more convenient and easier to manage By installing an appropriate system, The Living Group has managed to overcome issues caused by the existing system’s limitations and also enabled much more flexibility when it comes to effectively managing the access control system of all their included developments. For those responsible for effective and appropriate access control, the management of the systems are easier, quicker and there’s no delay or on-going costs for needing a specialist programme to modify fobs and access rights as this can now all carried out in-house. Improved security legislation Further advancements in programmes such as Secured by Design (SBD), a police initiative that improves the security of buildings and their immediate surroundings to provide safe places to live, work and visit, means that there’s more security legislation being implemented that’s making intercoms and access control more secure, without affecting ease and convenience. Videx holds an SBD accreditation and we know, from first-hand experience, how it’s making a difference in keeping tenants safe. When you combine the safety features promoted by an SBD member company like ourselves with the likes of the Videx event logging, image capture and ability to modify access users on the go, for example, we can help to create a very safe and secure environment. Personally, I think there needs to be a greater emphasis on the role of security legislation Technology has completely transformed the way local authorities and housing association are able to choose, install and manage door entry and access control systems for tenants and visitors alike. Personally, I think there needs to be a greater emphasis on the role of security legislation such as Secured by Design to ensure all councils and housing association consultants are up to date with what constitutes a robust and secure system that’s also cost effective too. In my role, I see weaknesses in systems and constant ongoing costs that could easily be avoided. For instance, features such as timed remote entry means local authority and housing association management no longer need to worry about keys being lost, the wrong keys being supplied or locks needing to be changed. With new systems such as the Videx MiAccess and Videx WS4 range, we can help to massively reduce a housing association’s or council’s carbon footprint and engineer costs by allowing them the access to management and control from an offsite location. Crime prevention We can also use live and logged events to help prevent crime in different ways, from antisocial behaviour growing around a tenant being called or visited much more regularly than others, to knowing a tenant is currently still living at a property but isn’t paying rent or answering to any correspondence. Technology enables local authorities and housing associations to receive detailed data and therefore behavioural insights on the people under their management and care. If consultants and specifiers are advised on the most appropriate systems that meet their specific entry needs, they can ensure greater, safer and more convenient access control that meets the requirements of both the end user and the those responsible for its effective management.

How to deter thieves on construction sites
How to deter thieves on construction sites

Construction site theft can cause project delays, property damage and loss of profit for companies in the construction sector. It is imperative to deter thieves from targeting construction sites with the help of construction site security. Here, we look into the various security options and how they can help protect your firm from the threat of a break-in. Construction theft has soared during the COVID-19 Pandemic Construction site theft is an ever-increasing problem in the UK, costing the industry an estimated £800 million per year. Unfortunately, this type of crime has accelerated further throughout lockdown by an estimated 50% due to the abandonment of construction sites across the UK. With many uncertainties around a potential second wave in the UK, it is time for construction firms to enhance their security strategies to help prevent thieves from becoming opportunists on construction sites. Why are construction sites ‘easy’ targets? Construction sites can easily be targeted, as they typically lack adequate security loss prevention practices. The most popular security-related issues that are leading causes of construction site theft are: Poor overall site security Multiple pieces of equipment sharing the same keys Easy access to open cabs Unsecured sites, particularly at night and over weekends Lack of product identification systems If you do not want your site becoming a costly statistic, you might want to try implementing some or all of these preventive measures. Strengthen your perimeter Putting a clear boundary around a construction site will help to prevent youths and members of the public from inadvertently wandering onto the site. To stop opportunist thieves in their tracks, you will need to go one step further by erecting robust fencing and concrete blocks along with signage warning intruders about the consequences of trespassing. Putting a clear boundary around a construction site will help to prevent youths and members of the public from inadvertently wandering onto the siteIf potential trespassers can see that it would be too challenging to attempt a break-in, then they will look elsewhere to find another construction site which is not as well secured. Lock away valuable tools When considering the vulnerabilities in your construction site, it pays to think about this from the perspective of a criminal. What is it exactly that they are looking for? What can a thief steal easily to make money if they were to remove something from your site? Unfortunately, many construction firms do not lock away their tools, materials or vehicles properly, which makes them an easy target. Ensure valuable tools and materials are locked away and are not left unsecured or lying around. Criminals are mostly interested in scaffolding, bowsers and other valuables that are quick to sell on, so it is important to have a strategy in place to keep these locked away, safe and securely. Put tracking devices in your equipment If you are unable to securely lock away valuable tools, then modern technology makes securing equipment easier than ever before. Tracking devices can be installed onto vehicles and equipment; if any thief is unwise enough to steal from the site, site owners will be able to provide the location to the police who will be able to follow this up. Site owners should also engrave company identification numbers on valuable tools, equipment and vehicles so that it can easily be identified and will serve as proof who it rightly belongs to. Invest in CCTV Closed Circuit Television, otherwise known as CCTV, is renowned for being one of the most effective deterrents for thieves, especially when it comes to construction and building sites.The items that criminals steal from sites are notoriously hard to trace The items that criminals steal from sites are notoriously hard to trace, but if you have CCTV, there is a chance that you can capture clear footage to help bring criminals to justice, such as footage of the vehicle used and the car licence plate. CCTV cameras can help to oversee every inch of a construction site, and can even be hidden out of sight where required. Step up with regular site patrols With a wide range of security monitoring methods available, stepping up on regular site patrols can help to keep track and respond to any criminal activity taking place on your site. Traditional site patrols can be carried out on a schedule by professional SIA-approved security agents. With the presence of guards patrolling a construction site, any criminals in the area will be deterred to force entry onto the site. Schedule supply deliveries on an as-needed basis To prevent an excess of supplies ‘sitting around’ on the site, construction site managers should instead order what is needed at the time, so that valuable materials are not left around waiting to be stolen for weeks at a time. Good planning and excellent communication between the team will be required so that projects are not delayed, but planning accordingly will help to reduce the chances of theft on a construction site. Drone surveillance As technology becomes more and more advanced, drone surveillance may soon be a security option that many construction sites could benefit from.Many construction firms in the UK are using drone services to provide aerial images, and are seeing huge cost savings by either purchasing and operating their own drones or by hiring out the work to a company equipped to provide imaging.As technology becomes more and more advanced, drone surveillance may soon be a security option With surveillance drones already handling tasks like mapping and surveying of construction sites, one day they may be able to patrol construction sites at night, equipped with motion sensors and infrared or night vision cameras; They could be automatically deployed from a charging station and fly along a pre-programmed route at regular intervals. One to keep an eye on for the near future! Construction site security to help protect your site If you are ready to tighten security on your own construction site, then your starting point will be to identify your main vulnerabilities and get in touch with a reputable security specialist.

The digital transformation of access control solutions
The digital transformation of access control solutions

The safeguarding of premises through the monitoring of entrance and exit points has traditionally been a very manual aspect of security. Human operators have been relied on to make decisions about who to admit and deny based on levels of authorisation and the appropriate credentials. But the access control business, like many industries before it, is undergoing its own digital transformation; one where the protection of premises, assets and people is increasingly delivered by interconnected systems utilising IoT devices and cloud infrastructure to offer greater levels of security and protection. Modern access control solutions range from simple card readers to two factor authentication systems using video surveillance as a secondary means of identification, right through to complex networks of thermal cameras, audio speakers and sensors. These systems, connected through the cloud, can be customised and scaled to meet the precise requirements of today’s customer. And it’s the ease of cloud integration, combined with open technologies and platforms that is encouraging increasing collaboration and exciting developments while rendering legacy systems largely unfit for purpose. Remote management and advanced diagnostics Cloud technology and IoT connectivity means remote management and advanced diagnostics form an integral part of every security solution.Cloud technology and IoT connectivity means remote management and advanced diagnostics form an integral part of every security solution. For example, as the world faces an unprecedented challenge and the COVID-19 pandemic continues to cause disruption, the ability to monitor and manage access to sites remotely is a welcome advantage for security teams who might otherwise have to check premises in person and risk breaking social distancing regulations. The benefits of not physically having to be on site extend to the locations within which these technologies can be utilised. As an example, within a critical infrastructure energy project, access can be granted remotely for maintenance on hard to reach locations. Advanced diagnostics can also play a part in such a scenario. When access control is integrated with video surveillance and IP audio, real-time monitoring of access points can identify possible trespassers with automated audio messages used to deter illegal access and making any dangers clear. And with video surveillance in the mix, high quality footage can be provided to authorities with real-time evidence of a crime in progress. Comprehensive protection in retail Within the retail industry, autonomous, cashier-less stores are already growing in popularity The use of connected technologies for advanced protection extends to many forward-looking applications. Within the retail industry, autonomous, cashier-less stores are already growing in popularity. Customers are able to use mobile technology to self-scan their chosen products and make payments, all from using a dedicated app. From an access control and security perspective, connected doors can be controlled to protect staff and monitor shopper movement. Remote management includes tasks such as rolling out firmware updates or restarting door controllers, with push notifications sent immediately to security personnel in the event of a breach or a door left open. Remote monitoring access control in storage In the storage facility space, this too can now be entirely run through the cloud with remote monitoring of access control and surveillance providing a secure and streamlined service. There is much to gain from automating the customer journey, where storage lockers are selected online and, following payment, customers are granted access. Through an app the customer can share their access with others, check event logs, and activate notifications. With traditional padlocks the sharing of access is not as practical, and it’s not easy for managers to keep a record of storage locker access. Online doors and locks enable monitoring capabilities and heightened security for both operators and customers. The elimination of manual tasks, in both scenarios, represents cost savings. When doors are connected to the cloud, their geographical location is rendered largely irrelevant. Online doors and locks enable monitoring capabilities and heightened security for both operators and customers They become IoT devices which are fully integrated and remotely programmable from anywhere, at any time. This creates a powerful advantage for the managers of these environments, making it possible to report on the status of a whole chain of stores, or to monitor access to numerous storage facilities, using the intelligence that the technology provides from the data it collects. Open platforms power continuous innovation All of these examples rely on open technology to make it possible, allowing developers and technology providers to avoid the pitfalls that come with the use of proprietary systems. The limitations of such systems have meant that the ideas, designs and concepts of the few have stifled the creativity and potential of the many, holding back innovation and letting the solutions become tired and their application predictable. Proprietary systems have meant that solution providers have been unable to meet their customers’ requirements until the latest upgrade becomes available or a new solution is rolled out. This use of open technology enables a system that allows for collaboration, the sharing of ideas and for the creation of partnerships to produce ground-breaking new applications of technology. Open systems demonstrate a confidence in a vendor’s own solutions and a willingness to share and encourage others to innovate and to facilitate joint learning. An example of the dynamic use of open technology is Axis’ physical access control hardware, which enables partners to develop their own cloud-based software for control and analysis of access points, all the while building and expanding on Axis’ technology platform. Modern access control solutions range from simple card readers to two factor authentication systems using video surveillance as a secondary means of identification Opportunities for growth Open hardware, systems and platforms create opportunities for smaller and younger companies to participate and compete, giving them a good starting point, and some leverage within the industry when building and improving upon existing, proven technologies. This is important for the evolution and continual relevance of the physical security industry in a digitally enabled world. Through increased collaboration across technology platforms, and utilising the full range of possibilities afforded by the cloud environment, the manufacturers, vendors and installers of today’s IP enabled access control systems can continue to create smart solutions to meet the ever-changing demands and requirements of their customers across industry.

Latest BT news

Arc Monitoring to showcase its security services at Security TWENTY 20
Arc Monitoring to showcase its security services at Security TWENTY 20

Arc Monitoring will share their range of services at Security TWENTY 20 Birmingham. Set in the central location of the Hilton Metropole NEC in Birmingham on Thursday, 20th February 2020, the Conference will bring together top security industry speakers and is supported by a large exhibition of cutting-edge security products and services. Doors open at 8.30am allowing access to the exhibition with the conference running between 10.00am and 1.30pm. The exhibition will close at 3.30 pm.  Lone worker protection Arc Monitoring will be sharing its CCTV & Alarm Monitoring services Confirmed speakers so far are Arad Parsi of the Suzy Lamplugh Trust talking about lone worker protection, Julian Hurst of Secured by Design and there will be manufacturer updates from Hikvision, BT, HID Global, Seagate and 6S Global. The conference will be chaired by Security TWENTY regular, Michael White. Most importantly if one registers in advance and is an installer, an end user, a consultant, or someone to do with private security, in the police or the armed forces, or a buyer of security services they will be able to attend the Conference for free. Arc Monitoring will be sharing its CCTV & Alarm Monitoring services. This is a chance to discuss face to-face with Arc’s team about the benefits of its CCTV Monitoring, Alarm Monitoring and Keyholding services. Please come along and join Arc to keep yourself up-to-date with its latest innovations.

ETSI's Industry Specification Group on Securing Artificial Intelligence announces appointing new Chair and Vice Chairs
ETSI's Industry Specification Group on Securing Artificial Intelligence announces appointing new Chair and Vice Chairs

ETSI's new Industry Specification Group on Securing Artificial Intelligence (ISG SAI) announced that they met recently for their second meeting and appointed Alex Leadbeater (BT) as the Industry Specification Group’s new Chair. Dr. Kate Reed (NCSC) was appointed as First Vice Chair and Tieyan Li (Huawei) was appointed as Second Vice Chair. The second meeting of the ISG SAI, after the launch of the group in October 2019, was also the place to discuss work priorities and future scope of action. Industry Specification Group ISG SAI will work on securing AI from attack, mitigate against malicious AI and using AI to enhance security The Industry Specification Group on Securing AI (ISG SAI) was created to develop technical specifications to mitigate threats arising from the deployment of AI throughout multiple ICT-related industries. The group will work on securing AI from attack, mitigating against malicious AI and using AI to enhance security measures. The purpose of the ETSI ISG SAI is to develop the technical knowledge that acts as a baseline in ensuring that artificial intelligence is secure. “I am delighted to be appointed as the Chairman for this exciting new group. Ensuring the security of Artificial Intelligence is a vital topic that affects many stakeholders and I look forward to seeing what work the group produces as it begins its work programme in earnest,” says Alex Leadbeater, Chair of the Industry Specification Group on Securing Artificial Intelligence (ISG AI). AI Threat Ontology report The ISG AI group will create an AI Threat Ontology report to align terminology, a Problem Statement that will guide the work of the group, a Data Supply Chain Report summarising the methods used and risks associated with sourcing data for training AI, a mitigation strategy report with guidance to mitigate the impact of AI threats, and security testing of AI. The next meeting of the Industry Specification Group on Securing Artificial Intelligence (ISG SAI) will be held in Sophia Antipolis, near Nice in France on 2 – 3 April 2020.

ETSI creates Industry Specification Group on Securing Artificial Intelligence to mitigate threats
ETSI creates Industry Specification Group on Securing Artificial Intelligence to mitigate threats

ETSI is pleased to announce the creation of a new Industry Specification Group on Securing Artificial Intelligence (ISG SAI). The group will develop technical specifications to mitigate threats arising from the deployment of AI throughout multiple ICT-related industries. This includes threats to artificial intelligence systems from both conventional sources and other AIs. The ETSI Securing Artificial Intelligence group was initiated to anticipate that autonomous mechanical and computing entities may make decisions that act against the relying parties either by design or as a result of malicious intent. Conventional cycle of networks risk analysis The conventional cycle of networks risk analysis and countermeasure deployment represented by the Identify-Protect-Detect-Respond cycle needs to be re-assessed when an autonomous machine is involved. The intent of the ISG SAI is therefore to address 3 aspects of artificial intelligence in the standards domain: Securing AI from attack e.g. where AI is a component in the system that needs defending Mitigating against AI e.g. where AI is the ‘problem’ or is used to improve and enhance other more conventional attack vectors Using AI to enhance security measures against attack from other things e.g. AI is part of the ‘solution’ or is used to improve and enhance more conventional countermeasures. Developing technical knowledge Three main activities will be undertaken and confirmed during the first meeting of the group The purpose of the ETSI ISG SAI is to develop the technical knowledge that acts as a baseline in ensuring that artificial intelligence is secure. Stakeholders impacted by the activity of ETSI’s group include end users, manufacturers, operators and governments. Three main activities will be undertaken and confirmed during the first meeting of the group. Currently, there is no common understanding of what constitutes an attack on AI and how it might be created, hosted and propagated. The work to be undertaken here will seek to define what would be considered an AI threat and how it might differ from threats to traditional systems. Hence, the AI Threat Ontology specification seeks to align terminology across the different stakeholders and multiple industries. Prioritising potential AI threats ETSI specifications will define what is meant by these terms in the context of cyber and physical security and with a narrative that should be readily accessible to all. This threat ontology will address AI as system, attacker and defence. Data is a critical component in the development of AI systems, both raw data, and information This specification will be modelled on the ETSI GS NFV-SEC 001 ‘Security Problem Statement’ which has been highly influential in guiding the scope of ETSI NFV and enabling ‘security by design’ for NFV infrastructures. It will define and prioritise potential AI threats along with recommended actions. The recommendations contained in this specification will be used to define the scope and timescales for the follow-up work. Data is a critical component in the development of AI systems, both raw data, and information and feedback from other AI systems and humans in the loop. Developing data sharing protocols However, access to suitable data is often limited, causing a need to resort to less suitable sources of data. Compromising the integrity of data has been demonstrated to be a viable attack vector against an AI system. This report will summarise the methods currently used to source data for training AI, along with a review of existing initiatives for developing data sharing protocols and analyse requirements for standards for ensuring integrity in the shared data, information and feedback, as well as the confidentiality of these. The founding members of the new ETSI group include BT, Cadzow Communications, Huawei Technologies, NCSC and Telefónica. The first meeting of ISG SAI will be held in Sophia Antipolis on 23 October. Come and join to shape the future path for secure artificial intelligence!

Related white papers

Preparing your organisation with quality situational awareness