Resilience and efficiency have become watchwords for public institutions, before, during and after the ongoing health crisis (COVD-19 pandemic outbreak). In delivering services fit for the modern world, these institutions need more than just innovation and accountability. They require flexibility and agility, too, including in how they approach security.

Importance of locks and keys

The lock and key have enjoyed public trust for a long time. Keys were used in Ancient Egypt and Assyria, and warrant a mention in the Christian Old Testament. As a technology, the key is familiar and proven, user-friendly and dependable. It can also be inflexible and time-consuming to manage.

The security challenges of delivering public services do not stand still, but standard mechanical keys cannot move with changing times. Filtering access intelligently and dynamically has become part of security’s job description.

Intelligent, programmable keys

Intelligent keys combine the features of electronic access control with the convenience of a mechanical key

Yet there is no need to dispose of the key altogether. Organisations can adapt it, rather than throw it out all-together. Intelligent, programmable keys combine the powerful features of electronic access control with the convenience of a mechanical key. They are keys that are familiar and user-friendly, while evolved at the same time.

When a key has a brain, it can do more with less. These efficiencies are critical in a world where demands on public institutions are at levels not seen in generations.

Cutting workload and solving the issue of lost keys

Lost keys present mechanical security with its most intractable problem. When a key goes missing, time and budget are expended to remedy the situation. Extensive re-keying and re-issuing to relevant key-holders are complex and expensive. Programmable keys, however, solve the problem quickly.

The French town of Villiers-le-Bel, north of Paris, faced these familiar key management challenges. Each person in their Municipal Technical Centre carried approximately 40 physical keys. If one was lost or stolen, all compromised cylinders had to be changed. To prevent unauthorised access, all the keys had to be replaced as well at great expense. Key duplication costs were mounting.

One [lost] key cost from €3,000 to €4,000 for changing cylinders and replacing the keys,” explains Fabrice Girard, Territorial Technician at the town’s Municipal Technical Centre.

Electromechanical key-operated locking solution

To fix this expensive lost key problem, Villiers-le-Bel city administrators chose to combine trusted mechanical security with new electromechanical key-operated locking, all managed within the same flexible, wireless access control system.

Now, lost or stolen electronic keys are cancelled instantly using secure cloud software that works inside a standard browser with no software installation required. Administrators can program access rights for any key, padlock or cylinder. They filter access to specific sites and doors according to the precise requirements of every municipal employee.

Programmable locking cylinders

In Aalborg, Denmark, around 3,000 citizens in home care now have programmable locking cylinders installed at their front door. This replaces a cumbersome mechanical master-key system. Aalborg’s installation was tailored to meet the needs of this vulnerable group of city residents.

If a home care resident loses their key, its access rights can be deleted from the system without the need for a lock replacement, keeping the keyholder’s home safe and saving the city time and money on rekeying.

Managing Aalborg’s system is straightforward. Lock installation was quick and easy with certified technicians simply replacing each old cylinder with a programmable cylinder with no wiring and no major alterations to the door.

Faster, safer access to buildings

In Skellefteå, Sweden, electromechanical locking has given local firefighters faster, safer access to any building

Aalborg’s fire brigade quickly took over the maintenance process. Brigade staff now grants or revokes access, and tailor permissions for different users or locations according to defined needs.

In Skellefteå, Sweden, electromechanical locking has given local firefighters faster, safer access to any building. To speed up emergency response times and improve firefighter safety, the local service fitted houses with secure façade key cabinets. Property keys are stored inside the cabinets, so authorised firefighters get rapid building access if there is a fire.

Remote key updater

When the emergency call comes, firefighters update their individual, programmable key at the station or while on the move, using a remote key updater kept in the fire engine. There’s no longer any need for fire stations to hold multiple sets of keys or for off-site firefighters to divert to the station to collect the right key.

More rapid response means a better chance to prevent a fire spreading. Safety is improved for everyone, including Skellefteå residents at home and firefighters at work.

Clear workflow bottlenecks in public housing

With crime against empty properties on the rise, public authorities in the English city of Rotherham aimed to minimise the time a council house stands vacant.

However, workers from multiple departments require access to prepare a property for a new tenant. Passing keys securely between all relevant staff members was a major cause of delay.

Intelligent key technology

At Rotherham Metropolitan Borough Council (RMBC), intelligent key technology helped streamline these workflows, upgrading security and saving money at the same time. RMBC identified physical key handover as a major bottleneck in their workflow. They needed a solution to speed up the process.

Now, each relevant RMBC staff member is issued with their own programmable key. Using simple online software, security managers issue the precise permissions which every staff member needs.

The access rights of any key can be amended or revoked at any time. Physical handover of mechanical keys and the time and money spent coordinating this process has now been eliminated.

Wireless electronic cylinders perfect for historic buildings

Public spaces inside protected heritage buildings often cannot opt for card- and reader-based access control

Building type can make a big difference to the access control system chosen. Public spaces inside protected heritage buildings often cannot opt for card- and reader-based access control.

Here, wireless electronic cylinders that simply replace existing mechanical locks solve the problem, preserving doors which may be centuries old. The issue of aesthetics also affects modern public spaces, albeit differently.

Intelligent key security

In Stuttgart, innovative design was a key element of the city’s new library building. Door security should be discreet and not disrupt the vision of Korean architect, Eun Young Yi. This was the first public building in Stuttgart’s Europaviertel, a unique creation with a double façade with glass bricks, a brightly lit atrium that is four-storey in height, and public entrances on all four sides.

Almost as soon as it opened, the building was declared an architectural icon — ‘instantly one of the world’s most beautiful libraries’. Intelligent key security is hardly noticeable for the library’s many visitors, yet critical for protecting Stuttgart’s precious public heritage.

Managing keys for a mobile workforce

Many public services involve managing and directing a mobile or contractor workforce. Mileage expense mounts up when workers must return to base to collect keys or update their access rights.

Mobile workers use more fuel and increase the carbon footprint. Business can be made more sustainable quickly by reducing the mileage they travel. To reduce miles while maintaining security is not easy, especially if people only rely on mechanical keys to secure remote or dispersed sites.

Bluetooth-enabled intelligent keys

Bluetooth-enabled intelligent keys eliminate the need for workers to return to headquarters to collect or return a mechanical key.

With a Bluetooth-powered solution, everyone carries their own programmable key and keeps its access rights up to date on the move, simply by making an encrypted connection to a secure smartphone app. This basically means fewer miles driven and less money wasted on unnecessary fuel.

CLIQ, one technology solution

CLIQ combines electronic and mechanical security in a range of wireless cylinder applications

All the installations referenced above and many more across the full spectrum of public services run on the same technology, CLIQ from ASSA ABLOY. CLIQ combines electronic and mechanical security in a range of wireless cylinder applications, including a full range of mechatronic and electronic cylinders and padlocks.

CLIQ locks are installed without wires with every cylinder’s power supplied by a battery inside the CLIQ key.

CLIQ Connect Bluetooth-enabled keys

These keys are physically identical and programmable by a system administrator using a desktop updater, by key-holders with a portable programmer, or in the case of CLIQ Connect Bluetooth-enabled keys, via an encrypted connection to a secure smartphone app, minimising both wasted journeys and unnecessary social contact between workers and office staff.

Intuitive software makes it simple to manage access rights, enable and disable keys, along with allowing customisation of access schedules, on site or on the go.

Share with LinkedIn Share with Twitter Share with Facebook Share with Facebook
Download PDF version Download PDF version

In case you missed it

Physical security and the cloud: why one can’t work without the other
Physical security and the cloud: why one can’t work without the other

Human beings have a long-standing relationship with privacy and security. For centuries, we’ve locked our doors, held close our most precious possessions, and been wary of the threats posed by thieves. As time has gone on, our relationship with security has become more complicated as we’ve now got much more to be protective of. As technological advancements in security have got smarter and stronger, so have those looking to compromise it. Cybersecurity Cybersecurity, however, is still incredibly new to humans when we look at the long relationship that we have with security in general. As much as we understand the basics, such as keeping our passwords secure and storing data in safe places, our understanding of cybersecurity as a whole is complicated and so is our understanding of the threats that it protects against. However, the relationship between physical security and cybersecurity is often interlinked. Business leaders may find themselves weighing up the different risks to the physical security of their business. As a result, they implement CCTV into the office space, and alarms are placed on doors to help repel intruders. Importance of cybersecurity But what happens when the data that is collected from such security devices is also at risk of being stolen, and you don’t have to break through the front door of an office to get it? The answer is that your physical security can lose its power to keep your business safe if your cybersecurity is weak. As a result, cybersecurity is incredibly important to empower your physical security. We’ve seen the risks posed by cybersecurity hacks in recent news. Video security company Verkada recently suffered a security breach as malicious attackers obtained access to the contents of many of its live camera feeds, and a recent report by the UK government says two in five UK firms experienced cyberattacks in 2020. Cloud computing – The solution Cloud stores information in data centres located anywhere in the world, and is maintained by a third party Cloud computing offers a solution. The cloud stores your information in data centres located anywhere in the world and is maintained by a third party, such as Claranet. As the data sits on hosted servers, it’s easily accessible while not being at risk of being stolen through your physical device. Here’s why cloud computing can help to ensure that your physical security and the data it holds aren’t compromised. Cloud anxiety It’s completely normal to speculate whether your data is safe when it’s stored within a cloud infrastructure. As we are effectively outsourcing our security by storing our important files on servers we have no control over - and, in some cases, limited understanding of - it’s natural to worry about how vulnerable this is to cyber-attacks. The reality is, the data that you save on the cloud is likely to be a lot safer than that which you store on your device. Cyber hackers can try and trick you into clicking on links that deploy malware or pose as a help desk trying to fix your machine. As a result, they can access your device and if this is where you’re storing important security data, then it is vulnerable. Cloud service providers Cloud service providers offer security that is a lot stronger than the software in the personal computer Cloud service providers offer security that is a lot stronger than the software that is likely in place on your personal computer. Hyperscalers such as Microsoft and Amazon Web Service (AWS) are able to hire countless more security experts than any individual company - save the corporate behemoth - could afford. These major platform owners have culpability for thousands of customers on their cloud and are constantly working to enhance the security of their platforms. The security provided by cloud service providers such as Claranet is an extension of these capabilities. Cloud resistance Cloud servers are located in remote locations that workers don’t have access to. They are also encrypted, which is the process of converting information or data into code to prevent unauthorised access. Additionally, cloud infrastructure providers like ourselves look to regularly update your security to protect against viruses and malware, leaving you free to get on with your work without any niggling worries about your data being at risk from hackers. Data centres Cloud providers provide sophisticated security measures and solutions in the form of firewalls and AI Additionally, cloud providers are also able to provide sophisticated security measures and solutions in the form of firewalls and artificial intelligence, as well as data redundancy, where the same piece of data is held within several separate data centres. This is effectively super-strong backup and recovery, meaning that if a server goes down, you can access your files from a backup server. Empowering physical security with cybersecurity By storing the data gathered by your physical security in the cloud, you're not just significantly reducing the risk of cyber-attacks, but also protecting it from physical threats such as damage in the event of a fire or flood. Rather than viewing your physical and cybersecurity as two different entities, treat them as part of one system: if one is compromised, the other is also at risk. They should work in tandem to keep your whole organisation secure.

Video surveillance is getting smarter and more connected
Video surveillance is getting smarter and more connected

The global pandemic has triggered considerable innovation and change in the video surveillance sector. Last year, organisations around the globe embraced video surveillance technologies to manage social distancing, monitor occupancy levels in internal and external settings, and enhance their return-to-work processes. Forced to reimagine nearly every facet of their operations for a new post-COVID reality, companies were quick to seize on the possibilities offered by today’s next-generation video surveillance systems. Whether that was utilising motion sensing technologies to automatically close doors or switch on lighting in near-deserted office facilities. Or checking if people were wearing masks and adhering to distancing rules. Or keeping a watchful eye on streets and public spaces during mandated curfew hours. Beyond surveillance and monitoring use cases, organisations also took advantage of a raft of new Artificial Intelligence (AI) applications to undertake a range of tasks. Everything from automating their building management and optimising warehouse operations, to increasing manufacturing output and undertaking predictive maintenance. Behind the scenes, three key trends all contributed to the growing ubiquity of video surveillance observed in a variety of government, healthcare, corporate, retail, and industry settings. Video surveillance takes to the Cloud Last year the shift to digital working led organisations to rapidly embrace cloud-enabled services, including cloud-hosted Video Surveillance As A Service (VSaaS) solutions that provide tremendous economies of scale and flexibility. Alongside significant cost savings, these solutions make it easier for organisations to enhance their disaster recovery and manage their video surveillance estate in new and highly effective ways. Surveillance cameras with audio recording were used more than 200% by customers between 2016 and 2020For example, in addition to enabling remote access and maintenance, today’s cloud-powered systems eliminate any need to invest in local storage technologies that all too often fail to keep pace with an organisation’s growing data storage requirements. Indeed, data from our worldwide customer base survey reveals how in 2020 an impressive 63% of organisations had abandoned using any on-premises storage option and were instead only storing all their video surveillance recordings and data in the Cloud. A deeper review of the global stats shows that the average cloud recording retention period for this stored data was 28.2 days, with organisations in Asia topping the global average at 38 days – 33% higher than was observed in any other region. Improvements in bandwidth and scalability engendered by the Cloud have also helped boost the growing utilisation of audio recordings in addition to visual image capture. Indeed, our research found the number of surveillance cameras with an audio recording facility used by customers jumped more than 200% between 2016 and 2020. Making sense of Big Data The enhanced ease of connectivity and scalable bandwidth made possible by the Cloud is stimulating more companies to connect a lot more video surveillance cameras to their networks. The top motivation for doing so is to generate live metrics and data that can be utilised to deliver enhanced business insights and operational intelligence. In recent years, a rich choice of video analytics solutions have been developed for a variety of industry verticals. The range of functionalities on offer is impressive and covers a variety of applications. Everything from making it easy to classify and track objects and behaviour patterns in real-time, to undertaking anomaly detection, or generating predictions based on past and present events/activities. Data collected via today’s cloud connected cameras can now also be used to feed deep learning training and AI analytics, utilising the unparalleled virtualised processing capacity of the Cloud to convert Big Data into usable information quickly. By integrating this information with data from other enterprise data capture systems, organisations are now able to gain a 360-degree view of their operations – in almost real-time. IT is now in the driving seat No longer the sole preserve of on-site security staff, the wider application and business use of video surveillance means that IT is increasingly taking the lead role where the management and control of these systems are concerned. IT is asked to integrate video surveillance into key enterprise platforms to generate the data that business leaders need Aside from the fact that IT has a vested interest in addressing the cybersecurity implications that come with attaching a growing range of IoT devices to the enterprise network, they’re also increasingly being asked to integrate video surveillance into key enterprise platforms to generate the data that business leaders need. As organisations expand their integration of video with other business applications, such as point of sale, access control, process control and manufacturing systems, this trend is only set to accelerate. Looking to the future Right now, the video surveillance industry is at a key tipping point, as video systems become increasingly strategic for enabling the enterprise to boost productivity, stay compliant, and fulfil its obligations to protect employees and customers. As the technology’s contribution to enhanced data-driven decision-making and problem solving continues to increase, expect the adoption of IP connected video cameras to burgeon as organisations look to capture more data from their day-to-day business operations.

How has Brexit affected the security industry?
How has Brexit affected the security industry?

When the United Kingdom voted to leave the European Union, a world of uncertainty unfolded for those doing business in the UK and the EU. The referendum was passed in July 2016. Including subsequent delays, the separation was completed after four years in January 2020, with a transition period ending December 2020. Even with the deadlines past, there are still pockets of uncertainty stemming from the separation. We asked this week’s Expert Panel Roundtable: How has Brexit affected the security industry?