Storage - Expert commentary

Data explosion: Futureproofing your video surveillance infrastructure
Data explosion: Futureproofing your video surveillance infrastructure

Video surveillance systems are producing more unstructured data than ever before. A dramatic decrease in camera costs in recent years has led many businesses to invest in comprehensive surveillance coverage, with more cameras generating more data. Plus, advances in technology mean that the newest (8K) cameras are generating approximately 800% more data than their predecessors (standard definition). Traditional entry-level solutions like network video recorders (NVRs) simply aren’t built to handle massive amounts of data in an efficient, resilient and cost-effective manner. This has left many security pioneers grappling with a data storage conundrum. Should they continue adding more NVR boxes? Or is there another, better, route? Retaining video data In short, yes. To future proof their video surveillance infrastructure, an increasing number of businesses are adopting an end-to-end surveillance architecture with well-integrated, purpose-built platforms for handling video data through its lifecycle. This presents significant advantages in terms of security, compliance and scalability, as well as unlocking new possibilities for data enrichment. All of this with a lower total cost of ownership than traditional solutions. Security teams would typically delete recorded surveillance footage after a few days or weeks Previously, security teams would typically delete recorded surveillance footage after a few days or weeks. However, thanks to increasingly stringent legal and compliance demands, many are now required to retain video data for months or even years. There’s no doubt that this can potentially benefit investigations and increase prosecutions, but it also puts significant pressure on businesses’ storage infrastructure. Data lifecycle management This necessitates a more intelligent approach to data lifecycle management. Rather than simply storing video data in a single location until it’s wiped, an end-to-end video surveillance solution can intelligently migrate data to different storage platforms and media as it ages. So, how does this work? Video is recorded and analysed on a combination of NVR, hyperconverged infrastructure (HCI) and application servers. Then, it’s moved to resilient file storage for a pre-determined period, where it can be immediately retrieved and accessed for review. Finally, based on policies set by heads of security, data is moved from file storage to highly secure, low-cost archive storage such as an object, tape or cloud. Data is moved from file storage to highly secure, low-cost archive storage Long-term storage This process is known as tiering. It allows businesses to use reliable, inexpensive long-term storage for most of their data, whilst still enabling security pioneers to retrieve video data when the need arises, such as during a compliance audit, or to review footage following a security breach. In a nutshell, it offers them the best of both worlds. Scaling your video surveillance infrastructure can be a headache. Businesses that rely on NVRs – even high-end units with 64 or even 96 hard drives – are finding themselves running out of capacity increasingly quickly. In order to scale, security pioneers then have to procure new boxes. With NVRs, this inevitably involves a degree of guesswork. Should they go for the largest possible option, and risk over provisioning? Or perhaps a smaller option, and risk running out of capacity again? Common management console Security pioneers can easily add or remove storage capacity or compute resources – separately or together As businesses add new cameras or replace existing ones, many end up with inadequate surveillance infrastructure made up of multiple NVR boxes along with several application servers for running other surveillance functions such as access control, security photo databases, analytics, etc. This patchwork approach leaves security pioneers scrambling for capacity, maintaining various hardware footprints, repeating updates and checks across multiple systems, and taking up valuable time that could be better spent elsewhere. By contrast, flexible HCI surveillance platforms aggregate the storage and ecosystem applications to run on the same infrastructure and combine viewing under a common management console, avoiding ‘swivel chair’ management workflows. Plus, they offer seamless scalability. Security pioneers can easily add or remove storage capacity or compute resources – separately or together. Data storage solutions Over time, this ensures a lower total cost of ownership. First and foremost, it removes the risk of over provisioning and helps to control hardware sprawl. This in turn leads to hardware maintenance savings and lower power use. Many security pioneers are now looking beyond simple data storage solutions for their video surveillance footage. Meta tags can provide context around data, making it easier to find and access when needed Instead, they’re asking themselves how analysing this data can enable their teams to work faster, more efficiently and productively. Implementing an end-to-end video surveillance architecture enables users to take advantage of AI and machine learning applications which can tag and enrich video surveillance data. These have several key benefits. Firstly, meta tags can provide context around data, making it easier to find and access when needed. Object storage platform For instance, if security teams are notified of a suspicious red truck, they can quickly find data with this tag, rather than manually searching through hours of data, which can feel like looking for a needle in a haystack. Plus, meta tags can be used to mark data for future analysis. This means that as algorithms are run over time, policies can be set to automatically store data in the right location. For example, if a video is determined to contain cars driving in and out of your premises, it would be moved to long-term archiving such as an object storage platform for compliance purposes. If, on the other hand, it contained 24 hours of an empty parking lot, it could be wiped. These same meta tags may be used to eventually expire the compliance data in the archive after it is no longer needed based on policy. Video surveillance architecture Continuing to rely on traditional systems like NVRs will fast become unsustainable for businesses Even if your organisation isn’t using machine learning or artificial intelligence-powered applications to enhance your data today, it probably will be one, three, or even five years down the line. Implementing a flexible end-to-end video surveillance solution prepares you for this possibility. With new advances in technology, the quantity of data captured by video surveillance systems will continue rising throughout the coming decade. As such, continuing to rely on traditional systems like NVRs will fast become unsustainable for businesses. Looking forward, when moving to an end-to-end video surveillance architecture, security pioneers should make sure to evaluate options from different vendors. For true futureproofing, it’s a good idea to opt for a flexible, modular solution, which allow different elements to be upgraded to more advanced technologies when they become available.

Hybrid working and the threat of desk data
Hybrid working and the threat of desk data

The transition to remote working has been a revelation for many traditional office staff, yet concerns over data security risks are rising. Mark Harper of HSM explains why businesses and their remote workers must remain vigilant when it comes to physical document security in homes. Pre-pandemic, home offices were often that neglected room in people’s homes. But now things are different. After the initial lockdown in 2020, 46.6% of UK workers did some work at home with 86% of those doing so because of the pandemic. Semi-permanent workspaces Since then, many have found that over time, those semi-permanent workspaces have become slightly more permanent – with official hybrid working coming into effect for an assortment of businesses and their teams. The adoption of hybrid working can in fact be seen as one of the few positives to come from the pandemic, with less travel, more freedom and higher productivity top of the benefits list for businesses and their employees. The handling of sensitive documents, is a growing concern for office managers But those welcomed benefits don’t tell the whole story. The transition to remote working has undoubtedly impacted workplace security, with various touch points at risk. The handling of sensitive documents for example, is a growing concern for office managers. In simpler times, sensitive data was more or less contained in an office space, but with millions of home setups to now think about, how can businesses and their office managers control the issue of desk data? Physical document security As of January 2021, it’s said that one in three UK workers are based exclusively at home. That’s millions of individuals from a variety of sectors, all of which must continue in their efforts to remain data secure. With that, reports of cyber security fears are consistently making the news but that shouldn’t be the sole focus. There is also the underlying, but growing, issue of physical document security. The move to remote working hasn’t removed these physical forms of data – think hard drives, USBs and paper based documentation. A recent surge in demand for home printers for example, only exemplifies the use of physical documents and the potential security issues home offices are facing. Adding to that, research conducted in 2020 found that two out of three employees who printed documents at home admitted to binning those documents both in and outside of their house without shredding them. Data security concern Without the right equipment, policies and guidance, businesses are sure to be at risk Those findings present a huge data security concern, one that must be fixed immediately. The Information Commissioner’s Office (ICO) has since released guidance for those working from their bedrooms and dining tables. Designed to help overcome these challenges, the ‘security checklists’ and ‘top tips’ should be the first port of call for many. Yet throughout, the ICO make reference to ‘following your organisation’s policies and guidance’ – highlighting that the onus isn’t solely on the individuals working from their makeshift offices. Office managers have a monumental task on their hands to ensure teams are well equipped within their home setups. Without the right equipment, policies and guidance, businesses are sure to be at risk. But it would be wrong to insinuate that unsecure desk data has only now become an issue for organisations. Modern office spaces Keeping clear desks has long been a battle for many office managers. In fact, clear desk policies are practised in most modern office spaces, with it recognised as a key preventative to personal information being wrongly accessed and so falling foul of GDPR legislation. Throwing sensitive documents in the bin was never an option pre-pandemic However, the unsupervised aspect of home working has led to a potentially more lax approach to these policies, or in some cases, they can’t be followed at all. For those taking a more laid back approach, organisation leaders must remind staff of their data security responsibilities and why clear desk policies have previously proven effective. Ultimately, throwing sensitive documents in the bin was never an option pre-pandemic and this must be carried through to home workspaces now. Securely destroy documents There are also concerns over the equipment people have access to at home. For example, without a reliable home shredding solution, data security suddenly becomes a tougher task. To add to that, several recommendations state that employees working from home should avoid throwing documents away by instead transporting them to the office for shredding once lockdown rules ease. While this is an option, it does pose further issues, with document security at risk of accidental loss or even theft throughout the transportation period, not to mention the time spent in storage. The best and most effective way to securely destroy documents is at the source, especially in environments where higher levels of personal data is regularly handled. Correct shredding equipment The recent findings on home office behaviour represent a true security risk Only when home workers implement their own clear desk policies alongside the correct shredding equipment (at the correct security level), can both home office spaces and regular offices become data secure. Realistically, these solutions should, like the common home printer, become a staple in home office spaces moving forward. The likelihood is that many UK workers will remain in their home offices for the foreseeable future, only to emerge as hybrid workers post-pandemic. And while the current working environment is more ideal for some than others, the recent findings on home office behaviour represent a true security risk to organisations. With this in mind, it’s now more key than ever for business leaders, their office managers and homeworkers to all step up and get a handle on home data security policies (as well as maintaining their standards back at the office) – starting with the implementation of clear desk policies. After all, a clear desk equals a clear mind.

Data-at-rest encryption: at the centre of the security circle
Data-at-rest encryption: at the centre of the security circle

The past decade has seen unprecedented growth in data creation and management. The products and services that consumers use every day – and the systems businesses, large and small, rely on – all revolve around data. The increasing frequency of high-profile data breaches and hacks should be alarming to anyone, and there’s a danger data security could worsen in the coming years. According to DataAge 2025, a report by IDC and Seagate, by 2025, almost 90% of all data created in the global datasphere will require some level of security, but less than half of it will actually be secured. Nuanced approach to data security Security is a circle, not a line. Every actor involved in the handling and processing of data has responsibility for ensuring its securityThe rapid proliferation of embedded systems, IoT, real-time data and AI-powered cognitive systems – as well as new legislation like the European Union’s GDPR – means that data security has to be a priority for businesses like never before. With data used, stored and analysed at both the hardware and software level, we need a new and more nuanced approach to data security. Security is a circle, not a line. Every actor involved in the handling and processing of data has responsibility for ensuring its security. What this means in practice is renewed focus on areas of hardware and software protection that have previously not been top of mind or received large amounts of investment from businesses, with security at the drive level being a prime example. The importance of data-at-rest encryption In a world where data is everywhere, businesses need always-on protection. Data-at-rest encryption helps to ensure that data is secure right down to the storage medium in which it is held in a number of ways. Hardware-level encryption, firmware protection for the hard drive, and instant, secure erasing technology allow devices to be retired with minimal risk of data misuse. Data-at-rest encryption helps to ensure that data is secure right down to the storage medium in which it is held in a number of ways A recent report from Thales Data Threat found that data-at-rest security tools can be a great way to help protect your data. However, it’s important to note that this must be used in conjunction with other security measures to ensure that those that fraudulently gain access to your key management system can’t access your data. Ensuring drives to be Common Criteria compliant One straightforward test any business can do to ensure its storage is as secure as possible is to check whether the drives are Common Criteria compliantDespite the clear benefits, this kind of encryption lags behind other areas, such as network and endpoint security, in terms of the investment it currently receives. The same Thales Data Threat report found that data-at-rest security was receiving some of the lowest levels of spending increases in 2016 (44%), versus a 62% increase for network and a 56% increase for endpoint security. One straightforward test any business can do to ensure its storage is as secure as possible is to check whether the drives are Common Criteria compliant. Common Criteria is an international standard for computer security certification, and drives that meet this standard have a foundational level of protection which users can build on. Providing an additional layer of security The retail industry has seen a spate of security breaches recently, with several major US brands suffering attacks over the busy Easter weekend this year. As frequent handlers of consumer card information, retailers are particularly vulnerable to attack. Data-at-rest encryption could enhance security in these instances, providing an additional layer of security between customer records and the attacker The advanced threats retailers face can often evade security defences without detection. Such a breach could grant attackers unrestricted access to sensitive information for possibly months – some breaches are known to have been detected only after consumer payment details appeared on the dark web. These types of undetected attacks are highly dangerous for retailers, which are relatively helpless to protect consumer information once their defences have been compromised. Data-at-rest encryption could significantly enhance security in these instances, providing an additional layer of security between customer records and the attacker which has the potential to make the stolen data valueless to cyber criminals. Industries in need of data-at-rest encryption Healthcare organisations, which hold highly sensitive customer and patient information, have a strong use case for data-at-rest encryption. With the widespread adoption of electronic patient health records, that data is increasingly more vulnerable to attack. Recent research from the American Medical Association and Accenture revealed that 74% of physicians are concerned over future attacks that may compromise patient records. With the widespread adoption of electronic patient health records, that data is increasingly more vulnerable to attack The financial sector would also benefit from further investment in data-at-rest encryption, given 78% of financial services firms globally are planning on increasing their spending on critical data, according to Thales’ Data Threat Report. It’s helpful to view security as a circle in which every piece of hardware and software handling the data plays its part SMEs and enterprises are not immune to security threats either – with growing numbers of people traveling for work or working remotely, the risk of sensitive business data becoming exposed via device theft is heightened. Usernames and passwords have little use if thieves can simply remove unencrypted hard drives and copy data across. Securing every hardware and software Technology vendors often focus on aspects of hardware and application security that are within their control. This is understandable, but it risks proliferating a siloed approach to data security. There is no single line for data security -- rather, it’s helpful to view it as a circle in which every piece of hardware and software handling the data plays its part. There’s a clear need for more industry dialogue and collaboration to ensure data security is effectively deployed and connected throughout the security circle and across the value chain.

Latest Hikvision news

Security Essen 2022 provides an opportunity for companies to present their innovations
Security Essen 2022 provides an opportunity for companies to present their innovations

The security industry is booming. Whether technical high-end solutions or highly professional services - almost all sectors reported an increase in turnover last year. "These are the best preconditions for Security Essen 2022,” Oliver P. Kuhrt, CEO of Messe Essen is pleased to say. "We offer the industry a top-class platform to present new solutions compactly and efficiently to decision-makers, buyers and other experts. Security Essen covers the complete range of the security industry, and does so within short distances." Mechanical security technology The focus of the range of products and services is on innovations in the field of electronic and mechanical security technology as well as cyber security, services and fire protection. The fair will be rounded off by an extensive accompanying programme with informative lectures. Among the exhibitors registered so far are Carl Wittkopp, Deutsche Telekom, Hikvision, Kale Kilit aswell as Salto Systems - and also the company ABI Sicherheitssysteme. Security Essen is the most important platform for us as a manufacturer of electronic security technology" ABI Sales Manager, Joachim Schairer: "Security Essen is the most important platform for us as a manufacturer of electronic security technology. The entire security industry meets there, which gives us the optimal opportunity to present our innovations. The fair also offers us a unique option to make new, relevant contacts within the industry." Video security solutions Funkwerk video systeme GmbH will also be among the exhibitors. "We are very much looking forward to finally being able to exhibit at Security in Essen again next year. Even though digital conference solutions certainly have their advantages, the direct and personal contact to our customers and interested parties is simply irreplaceable in the context of an international trade fair. This time, the focus will be on our individual video security solutions, but also on new developments from the Smart Building and Mobility sectors," says Christian Kaup, Head of Product Management & Marketing. Its bandwidth is what makes Security Essen so attractive for the security industry. With the areas of video; access, mechatronics, mechanics, systems & perimeter; fire, burglary & systems as well as services & digital networking security, all segments of the industry are to be found under one roof. Intensive professional contacts The accompanying programme offers further added value for visitors and exhibitors "This successful concept stands for short distances, direct discussions and intensive professional contacts," says fair Project Manager Julia Jacob. Security Essen offers companies numerous opportunities to present themselves to an international audience. Exhibitors benefit from individual stand options, theme-specific joint areas or time- and cost-saving complete packages. The accompanying programme offers further added value for visitors and exhibitors. Together with the technical training institute Haus der Technik, Messe Essen is organising the two-day fire protection forum. The Digital Networking Security Congress is also scheduled for two days of the fair. Here, the speakers will focus on security in networks, IT security, interfaces and cyber threats. Security industry market Despite pandemic conditions, the security industry market developed well last year the Bundesverband der Sicherheitswirtschaft (BDSW) (German Federal Association of the Security Industry) reported an estimated increase in turnover of four percent to 9.21 billion euros for its sector. The German market for electronic security technology grew by 1.6 percent to 4.695 billion euros in 2020. Access control systems (plus 4.3 percent) and video security technology (plus 7.1 percent) grew particularly strongly here. ABI-Sicherheitssysteme sees a trend above all in products that are becoming smarter. "This development is caused, among other things, by the massive advance of cloud solutions. In addition, security technology will communicate more and more with building automation and partly merge," is the assessment of Sales Manager, Joachim Schaire.

Hikvision collaborates with Gurtam on telematics solution
Hikvision collaborates with Gurtam on telematics solution

Hikvision, an IoT solution provider with video as its core competency, announced a new technology partnership with Gurtam designed to integrate its mobile products (cameras/MNVRs) with Gurtam’s Wialon GPS tracking platform. This vital integration uses the latest technologies to create a solution for logistics and transportation industry customers to enhance efficiency in their fleet operations, while also increasing road safety to maintain high-security levels for personnel and merchandise. Comprehensive telematics solution Making use of the HikDeviceGateway protocol, Gurtam’s Wialon GPS tracking platform integrates with Hikvision mobile products to offer a comprehensive telematics solution for fleet operators of buses, trucks, and taxis, achieving easier and smarter supervision, scheduling, and emergency response. The integration enables remote video monitoring of vehicle interiors and their surroundings, GPS location detection, real-time notifications, geofence control, Wi-Fi positioning, and more. Enhancing fleet and vehicle security Integration between Hikvision products and the Wialon platform creates a solution to help customers improve the security" “We are very pleased to welcome Gurtam to our partner ecosystem, and the integration between Hikvision mobile products and the Wialon platform creates a powerful solution to help customers improve the security of their fleets and vehicles,” says Adler Wu, Global Technology Partner Alliance Manager at Hikvision. “Gurtam is a hardware-agnostic telematics software provider that aims to partner with the top manufacturers in the industry. Our cooperation with Hikvision is a possibility to join forces with a reputed video solution provider and give our customers access to Hikvision’s innovation.” “Wialon and Hikvision combined represent a reliable, top-notch solution available globally and suitable for multiple niches, from logistics to public transportation, and from cold chain to dangerous goods transportation,” says Kseniya Dolia, VP of Technology Partnerships at Gurtam.

Inner Range and Antron Security deliver secure access control and robust security at Grade A London office building, The Bailey
Inner Range and Antron Security deliver secure access control and robust security at Grade A London office building, The Bailey

Type of site: Grade A multi-tenant office Location: The Bailey, 16 Old Bailey, London, UK Site size: 115,000 sq. ft over ten floors Client needs: Easy access for users Touch-free and digital sign-in Free flowing movement through reception, avoiding crowds and queues Fast access to other floors via lifts Visitor management system that can be used by multiple tenants and reception staff easily Secure and clear intercom/entry phone and door automation for out-of-hours, deliveries and trades people access Easy access and parking for disabled users Reliable and resilient security, including CCTV monitoring of strategic locations Integriti intelligent integrated access control system Inner Range’s enterprise-level intelligent integrated access control system, Integriti, provides robust security, as well as seamless integration, to an array of other building management systems. Some of the key features of Integriti include: Easy to use proximity card entry for users and tenants Forge Bluepoint, powered by Yardi, visitor management system to create secure, but easy to use credentials for visitors, including via smartphone High-level lift integration, by Mitsubishi that reads user credentials and directs users to the quickest lift, for their desired destination Integrated CAME BPT video entry phone and access control to automate doors, for disabled access near dedicated parking bay, for disabled users, as well as for out-of-hours access, deliveries and trades people Hard-wired IP closed circuit television system (CCTV) with Hikvision cameras, to monitor strategic locations End-to-end encrypted messaging, through every interface and integration, by Inner Range’s Integriti for high-level security Provision for future entry turnstiles/speed lanes Richard Harvell, Engineering Director at Knight Harwood, who managed the refurbishment at The Bailey, said “Our key requirement was to be able to move users, including visitors, swiftly through reception, to their correct floors, with minimal or no touch points. And, all of this, without compromising security.” High-level lift integration Antron Security’s solution, centered on Inner Range’s intelligent access control system, Integriti" Richard Harvell adds, “Antron Security’s solution, centered on Inner Range’s intelligent access control system Integriti, more than delivers. The high-level lift integration automatically directs users to the fastest lift for their floor and only allows access beyond reception, for those with bona fide credentials. We have been impressed with Integriti’s sophistication and integration capabilities, as well as Antron Security’s expertise and diligence in designing and installing our bespoke access and security system.” The Client - The Bailey UK property firm Endurance Land, which is a member of the Hong Kong-based property conglomerate, Nan Fung Group, owns The Bailey. The property, which is situated directly opposite the famous Old Bailey High Court in London, was originally built in the early 20th Century for the Chatham and Dover Railway Company. Its Grade II listed Edwardian Baroque façade features classical reclining figures, while a larger ‘western extension’ was built in 1999, to modern city office standards. Knight Harwood commissioned for refurbishment Knight Harwood was recently commissioned to refurbish the whole site, along with architect, Orms and building design consultancy, GDM Partnership. The commercial site meets Grade A office specifications and offers exceptional internet reliability, and speed for tenants. It achieved a platinum connectivity rating, by WireScore, the Mayor of London’s digital connectivity rating scheme, in 2020. Sophisticated access and security management system A new and sophisticated access and security management system was part of the refurbishment brief. Knight Harwood stipulated an access and security management system that would ensure a free flow of users and tenants through reception, without crowding or queues. This would need to include integrating intelligent lift controls, so as to ensure users were swiftly taken to their designated floor, as well as a good visitor management system that all tenants could use, without the need for a central security team to manage requests. Touchless access and digital sign-in for users Touchless access, as well as digital sign-in for users was also important for the client Touchless access, as well as digital sign-in for users was also important for the client. An intercom or entry phone and access control operated doors were needed for disabled users, who would be accessing the building from the dedicated disabled parking bay, as well anyone arriving ‘out of hours’, or for trades people and deliveries. High-levels of physical and cyber security were needed to keep all legitimate users and the site safe, without hindering access. CCTV monitoring would be needed in strategic locations. Future proofing, including laying under-floor cables ready for entry turnstiles/speed lanes, was desired. Antron Security managed the project Antron Security project managed the design, supply and installation of the access control and security system for The Bailey and acted as the ‘go to’ contact for Knight Harwood. Antron Security is a globally renowned installer of bespoke security solutions and has been providing security installations for the past 30 years. Taking care of the supply, design, installation and maintenance of security systems, Antron Security is NSI and Safe Contractor approved, meaning all staff and systems installed comply with the latest industry standards and are regularly inspected. Bespoke security solutions Inner Range provided the core access and security management system, Integriti, which enabled Antron Security to build the bespoke solutions needed for The Bailey. Inner Range has been a globally renowned company in the design and manufacture of intelligent security solutions, since it was established in 1988. Inner Range systems have been installed in over 25 countries. Its flagship product, Integriti, offers enterprise-level intelligent security and integrated smart building controls, for single sites through to global estate portfolios. Key integration Inner Range’s powerful Integriti intelligent access control system integrates with Mitsubishi’s high-level lift controls Inner Range’s powerful Integriti intelligent access control system, known for its breadth of integration options, integrates with Mitsubishi’s high-level lift controls and Bluepoint’s visitor management system, to ensure all users and visitors can access their floors, and designated areas with ease. The Mitsubishi lifts are able to read credentials from proximity cards, or mobile phones, at a user check-in point, at the reception, or in the lift lobby itself. High-level lift controls to reduce crowding and queues The high-level lift integration with ‘destination control’ means the lift software takes into account, where each of the building’s lifts are, where the user’s ‘home floor’ is, as well as where other users are going/due to go, and instantly calculates the quickest lift for the new user. The user is immediately directed to the most efficient lift via a display screen at reception, or in the lift lobby. If users are able to go to more than one floor, they can update their preference in the lift itself. This integration ensures users move through reception quickly and efficiently, with no unnecessary stops. Fully integrated visitor management Inner Range’s Integriti intelligent access control system also allowed Bluepoint’s visitor management system to integrate with the Mitsubishi lifts. For visitors to access tenanted floors within the building, the following has to take place: A tenant creates the meeting via Bluepoint An email is generated and sent to the visitor’s inbox, where they can create a mobile QR code pass and save it to their smart phone wallet When the visitor arrives, they use their mobile phone to scan the QR code in the Bluepoint invite, at the reception desk to check-in The reception team can then direct them to the Mitsubishi lifts, which display the lift car that they need to get to their meeting To leave, the visitor presents their QR code at the lift or door reader, which tells the system they’re leaving The QR codes are only valid for one entry and one exit, and only on the appointment date and at the planned appointment time. Afterwards, the QR code becomes invalid and is deleted from the system CAME BPT entry panels and video intercom system The QR code gives the visitor the ability to access everything they will need, including the lifts and any locked doors en-route. The integration between Integriti and Bluepoint’s visitor management system was achieved using the Bluepoint API. Bluepoint is cloud-based, hosted on the Microsoft Azure platform. CAME BPT entry panels were installed to allow disabled users to access the building, near the dedicated disabled parking bay, as well as for any visitors entering the facility out-of-hours, to contact the security team, or for deliveries and trades people to use, in order to access doors at the rear of the building. The entry panels allow for a reliable and intuitive video entry intercom system. Hikvision CCTV cameras installed CCTV cameras from Hikvision have been installed throughout the site, to create a hard-wired IP CCTV system CCTV cameras from Hikvision have been installed throughout the site, to create a hard-wired IP closed circuit television (CCTV) system. They are integrated with the Integriti access control system, which allows for intelligent ‘cause and effect’ monitoring. System protocols automatically bring up specific camera feeds for security managers to view, in response to alerts and footage can be viewed together with additional information from Integriti, such as if a door has been left open. Intelligent access control Inner Range’s enterprise product, Integriti, provides seamless integration with a multitude of other smart building management systems, underpinned by robust security. This includes encrypting all communications through every device and interface, and providing intruder detection to European standard EN50131. Integriti helps building managers create greener and more energy efficient sites, by tracking how tenants use the building, and amending heating and lighting settings, as a result. Integriti also provides trace reporting, that can identify a user’s movements, if they have become unwell and identify who else has been near them. System benefits for users include: Touch-free entry and digital sign-in for users and visitors No unnecessary stops for users on their way into the building Reduced risk of crowding or queues in reception area Easy to use visitor management system Robust security that doesn’t impinge on access Future proofing with cabling provision for speed lanes/entry turnstiles in place

Related white papers

Choosing the right storage technology for video surveillance

Hybrid hyperconverged systems benefit growing storage and retention needs

Five things to consider for AI with video technology