Video, access control and visitor management are among the technologies that are enabling greater safety and security at hospitals and other healthcare facilities. Video surveillance systems enable hospital management and security professionals to know what goes on in and around a medical facility. Recording images in high resolutions (megapixels and gigapixels) is becoming more and more important in healthcare, says Jason Ouellette, Product Line Director – Access Control, Tyco Security P...
Ping Identity, a pioneer in Intelligent Identity, announces an expansion of its Northern European operation with the opening of a new office in Utrecht, Netherlands. The growth of the identity market has been rapid across Benelux and Scandinavia, and Ping Identity continues to drive attention to the importance of identity security in the cybersecurity landscape, as well as support for its local clients and channel partners. Providing secure access to applications The Ping Identity ecosystem i...
Could millions of burglar and fire alarm control units be recalled by the U.S. Consumer Product Safety Commission? That could be the upshot when the independent agency of the U.S. government rules on a 'Complaint of Non-Conforming Products' investigation requested on behalf of a consultant/forensic expert who says he has identified non-compliance dangers and vulnerabilities related to the devices. Breaching security standards Jeffrey Zwirn, an alarm and security forensic expert, s...
Pelco, Inc., a global pioneer in intelligent video solutions, announced the appointment of Kurt Takahashi as Chief Executive Officer, effective November 1, 2019. Previously, Takahashi held the position of President of AMAG Technology, a global end-to-end security management platform. At AMAG, his innovative leadership transformed the company from being an access control focused business into an open, innovative security management solution specialising in access control, video surveillance, vis...
The jury is in: traditional security is out — and it’s being replaced with service-based solutions. The bottom line is: if you’re not embracing it, you’ll soon be left behind. XaaS — the collective term referring to the delivery of anything as a service — includes all services made possible through the use of the cloud. Security-as-a-Service (SaaS), which encompasses any type of system from access control to video surveillance, has paved the way for users to...
A free cyber audit tool has been released to its customers by a global technology leader in integrated access control, intruder alarms management and perimeter protection, in what it believes is an industry first. Gallagher Security has unveiled its Security Health Check (SHC) tool to help its customers identify and understand potential vulnerabilities within their security system. Security risks and system vulnerabilities SHC identifies system vulnerabilities, assesses the severity of the th...
The retail industry is constantly evolving, with a fast-paced environment that requires retailers to quickly respond to changes in the market, while delivering a consistent service that inspires customer loyalty – all in a bid to maintain healthy margins and revenue in what is an increasingly competitive landscape. Helping retailers to drive efficiency and capitalise on new labelling innovations, Checkpoint Systems’ source tagging programme, which celebrates more than 25 years since its inception in 1994 for the American drug store chains, Eckerd Drug Stores and Rite Aid, puts a framework for collaboration at its heart. Most popular products in-store Working with more than 45 per cent of the top-50 global retailers, Checkpoint’s programme has successfully enabled more than 75,000 items to arrive in store, shelf-ready. The mutual benefits for both the retailer and manufacturer are widely known – from open merchandising and reduced out-of-stocks to the improved appearance of products on shop shelves. Both manufacturers and retailers need to anticipate the most popular products in-store and high-risk SKUs However, by introducing an on-going partnership both retailers and manufacturers can weld even more advantages across the supply chain. Moreover, as product introductions become more frequent, treating source tagging as an on-going programme and not a one-off service is critical. For example, in the dynamic consumer goods market, both manufacturers and retailers need to anticipate the most popular products in-store and high-risk SKUs. Latest technological innovations A source tagging programme that focuses on collaboration delivers a continuous, consistent process that helps to identify high-loss SKUs, evaluate tagging placement options in response to packaging and branding changes, and aids frequent compliance audits while delivering the most valuable brand protection possible. By partnering with a respected source tagging partner, like Checkpoint Systems, retailers can also leverage the latest technological innovations and create a clear path to RFID giving both retailers and manufacturers the competitive advantage. For example: Protecting merchandise against counterfeit items Implementing category-specific labels to protect and extend the life of merchandise, e.g. fresh foods Tracking products to reduce the impact of supply chain fraud Protecting the retailer and wider supply chain against theft Effectively assess supply chain and retail challenges Flavio Musci, EMEA Source Tagging Director, Checkpoint Systems, said: “As the market leader in Source Tagging, we understand the importance of working closely with our customers and their vendors to effectively assess supply chain and retail challenges and create a programme that responds to their needs. This not only takes into consideration the design implications of label placement, but the technological innovations required to capture and relay important information to enhance traceability and critically, stock availability.” “With the biggest source-tagging team in the world, we are uniquely placed to help retailers maximise the benefits of their source tagging programmes. And, speaking about the importance of collaboration, a leading European grocery retailer once said: retailers, vendors and solutions providers have to work collaboratively to achieve a successful source tagging programme.”
The newest version of an iconic access control and site management system looks set to revolutionise, both, the operator and user experience. Gallagher Security has released Command Centre v8.10, the latest version of its site management software, with a range of features and enhancements that simplify and improve operation. Improvements to site plans reduce information overload for busy or complex sites by introducing progressive disclosure – the ability to zoom in to reveal more information. It is now easier to create a site plan that includes all floors in the building and easily navigate between them, while new site plan privileges provide greater control over the level of information operators are exposed to. Integration with IDEMIA MorphoWave Compact allows users to be identified with a wave of their hand. This high-level biometric integration delivers faster, more secure biometric access while simplifying the collection and management of biometric data and access rights, and preventing duplication and synchronisation issues. Reducing cyber risk Gallagher’s Mobile Connect app can now be used to open both Gallagher and SALTO Bluetooth® doors with Command Centre v8.10. The SALTO credential has been combined with the Gallagher credential to retain a single mobile credential for each user in Command Centre. Using a single credential and app to open doors creates a simpler experience for users and is easier for operators to manage on a day-to-day basis. The newest release introduces car park management, making it easy to manage and configure parking allocation. Site plan functionality provides detailed oversight, ensuring car park spaces are used efficiently. Improvements to the Inbound Events REST API allow Command Centre to receive external events from third party systems to generate alarms, view alarm instructions, provide alarm indications on site plans, generate notifications, and run reports in Command Centre. This new release builds on Gallagher’s ongoing commitment to design and manufacture security technology that protects people, places, and assets across the world. Enhanced functionality As with all Gallagher version releases, a wide range of minor enhancements that improve existing functionality are included. Gallagher offers a software maintenance programme which provides customers the opportunity to upgrade to every new version of Command Centre as it is released. Adopting the latest technology as it is released helps ensure customers stay ahead of emerging threats and new vulnerabilities – reducing their cyber risk, enhancing system performance, and guaranteeing continued compliance with government standards.
Panorays, a rapidly growing provider of automated third-party security lifecycle management, unveiled a security intelligence solution known as Dark Web Insights. The new feature enhances Panorays’ award-winning third-party security management solution and serves as an additional layer of cyber security protection. Using Panorays’ Dark Web Insights, companies can now become proactive about knowing in advance of in-the-wild threats to their supply chain. The evaluator company automatically receives a notification when there is abnormal activity on the Dark Web regarding the third party. The new Dark Web feature checks mentions of a company’s third party on hacker forums and other nefarious marketplaces. It provides the ability to monitor potentially malicious hacker chatter about opportunities to target the third party, sell databases of personal information or take advantage of system weaknesses for financial benefit. “With the latest rash of misconfigured servers and data leaks, many companies have discovered too late that a significant breach has occurred,” said Noam Maman, VP Product of Panorays. “Many third-party security solutions assess the attack surface of vendors, but do not venture into the Dark Web. With Panorays, companies receive further necessary visibility into the security posture of their third parties.”
Aiphone, an international manufacturer of intercom and security communication products, has updated its popular QuikSpec™ online design tool making it easier for specifiers and installers to find product information required to accurately design and assemble intercom products. The free tool includes all available wiring and other documentation, instructions and product specifications to make an Aiphone system bid quick and easy to prepare and submit. Revamped pages are designed to run faster and smoother. New tab-style navigation makes it easier to find information and more clearly defines when to choose one system over another. Among many other changes, refreshed system images and terminology more accurately reflect current products, style and colour updates better replicate the Aiphone website experience and discontinued products have been removed from the site. Right equipment for every intercom, tower component A QuikSpec-generated parts list can be shared with a distributor within Aiphone’s wide network for pricing and availability. And site users can still work on their own schedules as QuikSpec is available 24/7/365. Live assistance from Aiphone’s award-winning technical support and customer service teams are available during standard business hours. “QuikSpec is designed to ensure the right equipment is provided each time for every intercom, tower component, mounting bolt, power supply and accessories,” said Brad Kamcheff, web marketing analyst, Aiphone. “This eliminates the worry of lost profits resulting from equipment being left out of a bid.”
Nedap and Touchless Biometric Systems (TBS) are hosting the first Security Integration Forum in the Middle East on 7th October 2019. Held at the Conrad hotel on Sheikh Zayed Road in Dubai, it will bring together technology businesses and experts. The aim is to enable discussion of the latest security industry trends and potential collaborations, and showcase advanced technologies and integrations. The highlight of this first Security Integration Forum is the live experience area. Here, in a live demo of a smart building, attendees can experience seamless integrations of technologies from TBS, and other manufacturers, with Nedap’s AEOS access control. Visitor registration and management The integrations on show will be from best-of-breed solution providers and security equipment manufactures It’s also an opportunity to learn more about the commercial and operational value offered by AEOS and TBS integrations. The integrations on show will be from best-of-breed solution providers and security equipment manufactures. This includes Milestone Systems, Axis communication, CNL Software, Samsotech, Traka, Assa Abloy and Boon Edam, as well as Nedap Identification Systems. The scenarios and features available to experience include: End-to-end security for access control Visitor identification and verification using biometrics Visitor registration and management Vehicle identification Key and asset management Wireless access control using online and offline locks Video management systems and CCTV Physical security information management Identifying new opportunities and partnerships All of the businesses involved will present the technology trends in their business area and market" Jochem van Ruijven, Managing Director at Nedap FZE says: “With this event, we aim to display the incredible strength and expertise of each participating technology partner. All of the businesses involved will present the technology trends in their business area and market.” “It’s an amazing opportunity for security industry experts in the Middle East to come together and get to know the people behind the leading security manufacturers. Not to mention the chance to identify new opportunities and partnerships for their business. More than ever before, decision makers must provide both security and convenience,” says Alex Zarrabi, CEO of TBS and co-host of the Security Integration Forum. “This calls for integrated rather than isolated solutions. Navigating the maze of technologies and interoperability takes more time than people have available. But during a few hours at our forum, decision makers can experience what happens when best-of-breed security manufacturers join forces to solve their challenges.”
Matrix has announced bagging the prestigious and highly coveted Good Design 2019 award for its new-age access control controller - COSEC ARGO. The award is given in recognition for excellence in product innovation and design. The Good Design Award evaluates and celebrates the quality of design whether tangible or intangible that has been created to fulfill some kind of ideal or purpose. Good Design awards The Good Design awards are produced by The Chicago Athenaeum Museum of Architecture and Design in cooperation with the European Centre for Architecture, Art, Design and Urban Studies. The awards are amongst the most prestigious global award programs for design excellence and design innovation, honoring both products and industry leaders in design and manufacturing for over seven decades since its inception. Each year, the organisation highlights and recognises the most innovative industrial, product and graphic designs. COSEC ARGO access control controller On winning this prestigious award, Ganesh Jivani, Chief Executive of Matrix said “Matrix is focused on designing and manufacturing high grade cutting-edge security and telecom solutions for modern organisations and enterprises. Matrix offers these products in more than 50 countries worldwide – most of them to the first-world technologically advanced nations.” He adds, “With 250+ R&D engineers and world-class infrastructure and equipment, Matrix is committed to R&D and cutting-edge products. This award is a validation of Matrix's state of the art innovation and design capabilities.” Cutting-edge security and telecom solutions Ganesh further said, “I thank all our customers and channel partners for their trust in Matrix and congratulate the entire Matrix team for this outstanding achievement. Such recognition would encourage us to work harder towards building future technologies and products.”
Today, the world is connected like never before. Your watch is connected to your phone, which is connected to your tablet and so on. As we’ve begun to embrace this ‘smart’ lifestyle, what we’re really embracing is the integration of systems. Why do we connect our devices? The simplest answer is that it makes life easier. But, if that’s the case, why stop at our own personal devices? Connection, when applied to a business’ operations, is no different: it lowers effort and expedites decision making. Integrating security systems Systems integration takes the idea of connected devices and applies it to an enterprise Systems integration takes the idea of connected devices and applies it to an enterprise, bringing disparate subcomponents into a single ecosystem. This could mean adding a new, overarching system to pull and collect data from existing subsystems, or adapting an existing system to serve as a data collection hub. Regardless of the method, the purpose is to create a single, unified view. Ultimately, it’s about simplifying processes, gaining actionable insights into operations and facilitating efficient decision-making. Although integration is becoming the new norm in other areas of life, businesses often opt out of integrating security systems because of misconceptions about the time and resources required to successfully make the change. So, instead of a streamlined operation, the various security systems and devices are siloed, not communicating with each other and typically being run by different teams within an organisation. Time-intensive process When systems are not integrated, companies face a wide range of risks driven by a lack of transparency and information sharing, including actual loss of property or assets. For example, a team in charge of access control is alerted to a door being opened in the middle of the night but can’t see what exactly is taking place through video surveillance. Without integrated systems they have no way of knowing if it was a burglar, an equipment malfunction or a gust of wind. Without integration between systems and teams, the ability to quickly put the right pieces in front of decision makers is missing. Instead, the team would have to go back and manually look for footage that corresponds with the time a door was open to figure out which door it was, who opened it and what happened after, which can be a time-intensive process. Integrating access control and surveillance systems Theft and vandalism occur quickly, meaning systems and users must work faster in order to prevent it This slowed response time adds risk to the system. Theft and vandalism occur quickly, meaning systems and users must work faster in order to prevent it. Security systems can do more than communicate that theft or vandalism occurred. Properly integrated, these systems alert users of pre-incident indicators before an event happens or deter events altogether. This gives teams and decision makers more time to make effective decisions. Integrating access control and surveillance systems allows for a more proactive approach. If a door is opened when it’s not supposed to be, an integrated system enables users to quickly see what door was opened, who opened it and make a quick decision. Integrated solutions are more effective, more efficient and help drive cost-saving decisions. Ideally, companies should establish integrated solutions from the start of operations. This allows companies to anticipate problems and adjust accordingly instead of reacting after an incident has occurred. Security camera system Although starting from the beginning is the best way to ensure comprehensive security, many companies have existing security systems, requiring integration and implementation to bring them together. Typically, companies with established security systems worry about the impact to infrastructure requirements. Is additional infrastructure necessary? How and where should it be added? What financial or human resources are required? These concerns drive a mentality that the benefits gained from an integrated solution aren’t worth the costs of implementation. Thankfully, this is becoming less of a problem as security providers, like Twenty20™ Solutions, work to offer adaptable solutions. With flexible options, operators don’t worry about adding or replacing infrastructure to align with a provider’s model. This allows users to monitor camera footage and gate traffic from one system If a company has an existing security camera system, but identifies a need for access control, a modern integrated solution provider can supply the gates for access points and equip the gates and cameras with the technology to connect the two. This allows users to monitor camera footage and gate traffic from one system. This model also spares operators additional costs by using a sole vendor for supplemental needs. Overall management of security While a single, unified system is beneficial for cost saving, it can also help the overall management of security. The ability to view all operating systems in one dashboard allows security personnel to manage a site from any location, reducing the expense and effort required to manage a system. The mobile world today means security directors no longer need to be in a centralised operations center to see alerts and make decisions. This simplifies processes by allowing users to quickly see an alert, pull up a camera, delete a user or check an access log from a phone. Modern networks are secure and accessible to those with permissions, without requiring those users to be physically present. Consolidating security systems is the first step companies can take toward streamlining work, information and costs. The next step is integrating all sites, both remote and on-grid. Energy and communication technology The integration of sites and systems turns mountains of data and information into actionable intelligence Traditional methods demanded two systems: one for on-grid facilities and another for off-grid locations. With advancements in energy and communication technology, the need for multiple systems is gone. Data from remote sites can be safely and securely fed into an existing system. These remote locations may gather, distribute and manage data in a different manner than a connected system due to the cost of transmission via remote connections (i.e., cellular or satellite connection). The end result, however, is a consistent and holistic view of operations for the decision maker. The integration of sites and systems turns mountains of data and information into actionable intelligence. With connected devices monitoring occurrences at individual sites, as well as events across locations, the data tells a story that is unhindered by operational silos or physical space. Identifying patterns and trends Instead of providing 10 hours-worth of footage that may or may not be relevant, system analytics can provide users with the specific set of information they need. Incidents once discarded as ‘one-off’ events can now be analysed and data-mapped to identify patterns and trends, directing future resources to the most critical areas first. Consumers are increasingly expecting everything they need to be right where they need it – and businesses are right behind them. The current generation of security professionals are increasingly expecting the simplicity of their everyday personal tasks to be mirrored in enterprise systems, which means giving them the ability to see what matters in one place. A unified system can provide just that, a single view to help simplify processes, promote cost saving and accelerate decision making.
There’s a lot of hype around the term ‘digital transformation.’ For some, it’s the integration of digital technology into everyday tasks. For others, it’s the incorporation of innovative processes aimed at making business optimisation easier. In most cases, digital transformation will fundamentally change how an organisation operates and delivers value to its customers. And within the security realm, the age of digital transformation is most certainly upon us. Technology is already a part of our day-to-day lives, with smart devices in our homes and the ability to perform tasks at our fingertips now a reality. No longer are the cloud, Internet of Things (IoT) and smart cities foreign and distant concepts full of intrigue and promise. Enhancing business operations We’re increasingly seeing devices become smarter and better able to communicate with each other These elements are increasingly incorporated into security solutions with each passing day, allowing enterprises the chance to experience countless benefits when it comes to enhancing both safety and business operations. The term ‘connected world’ is a derivative of the digital transformation, signifying the increasing reliance that we have on connectivity, smart devices and data-driven decision-making. As we become more familiar with the advantages, flaws, expectations and best practices surrounding the connected world, we can predict what issues may arise and where the market is heading. We’re increasingly seeing devices become smarter and better able to communicate with each other through the IoT to achieve both simple goals and arduous tasks. Within our homes, we’re able to control a myriad of devices with commands (‘Hey Google...’ or ‘Alexa...’), as well as recall data directly from our mobile devices, such as receiving alerts when someone rings our doorbell, there’s movement in our front yard or when a door has been unlocked. Analytics-driven solutions The focus is now shifting to the business impacts of connectivity between physical devices and infrastructures, and digital computing and analytics-driven solutions. Within physical security, connected devices can encompass a variety of sensors gathering massive amounts of data in a given timeframe: video surveillance cameras, access control readers, fire and intrusion alarms, perimeter detection and more.As the data from each of these sensors is collected and analysed through a central platform, the idea of a connected world comes to fruition, bringing situational awareness to a new level and fostering a sense of proactivity to identifying emerging threats. The connected world, however, is not without its challenges, which means that certain considerations must be made in an effort to protect data, enhance structured networking and apply protective protocols to developing technology. Physical security systems We can expect to see the conversations regarding data privacy and security increase as well As the use of connected devices and big data continue to grow, we can expect to see the conversations regarding data privacy and security increase as well. Connectivity between devices can open up the risk of cyber vulnerabilities, but designing safeguards as technology advances will lessen these risks. The key goal is to ensure that the data organisations are using for enhancement and improvements is comprehensively protected from unauthorised access. Manufacturers and integrators must be mindful of their products' capabilities and make it easy for end users to adhere to data sharing and privacy regulations. These regulations, which greatly affect physical security systems and the way they're managed, are being implemented worldwide, such as the European Union's General Data Protection Regulation (GDPR). In the United States, California, Vermont and South Carolina have followed suit, and it can be expected that more countries and U.S. states develop similar guidelines in the future. Technology is already a part of our day-to-day lives, with smart devices in our homes and the ability to perform tasks at our fingertips now a reality Automatic security updates Mitigating the concerns of the ‘connected world’ extends beyond just data privacy. IoT technology is accelerating at such a pace that it can potentially create detrimental problems for which many organisations may be ill-prepared - or may not even be able to comprehend. The opportunities presented by an influx of data and the IoT, and applying these technologies to markets such as smart cities, can solve security and operational problems, but this requires staying proactive when it comes to threats and practicing the proper protection protocols. As manufacturers develop devices that will be connected on the network, integrating standard, built-in protections becomes paramount. This can take the form of continuous vulnerability testing and regular, automatic security updates. Protocols are now being developed that are designed to ensure everything is encrypted, all communications are monitored and multiple types of attacks are considered for defensive purposes to provide the best security possible. IoT-connected devices Hackers wishing to do harm will stop at nothing to break into IoT-connected devices Built-in protection mechanisms send these kinds of systems into protection mode once they are attacked by an outside source. Another way for manufacturers to deliver solutions that are protected from outside threats is through constant and consistent testing of the devices long after they are introduced to the market. Hackers wishing to do harm will stop at nothing to break into IoT-connected devices, taking every avenue to discover vulnerabilities. But a manufacturer that spends valuable resources to continue testing and retesting products will be able to identify any issues and correct them through regular software updates and fixes. ‘IoT’ has become a common term in our vocabularies and since it’s more widely understood at this point and time, it's exciting to think about the possibilities of this revolutionary concept. Providing critical insights The number of active IoT devices is expected to grow to 22 billion by 2025 — a number that is almost incomprehensible. The rise of 5G networks, artificial intelligence (AI) and self-driving cars can be seen on the horizon of the IoT. As more of these devices are developed and security protocols are developed at a similar pace, connected devices stand to benefit a variety of industries, such as smart cities. Smart cities rely on data communicated via the IoT to enhance processes and create streamlined approaches Smart cities rely on data communicated via the IoT to enhance processes and create streamlined approaches to ensuring a city is well-run and safe. For example, think of cameras situated at a busy intersection. Cameras at these locations have a variety of uses, such as investigative purposes in the event of an accident or for issuing red-light tickets to motorists. But there are so many other possible purposes for this connected device, including providing critical insights about intersection usage and traffic congestion. These insights can then be used to adjust stoplights during busy travel times or give cities valuable data that can drive infrastructure improvements. Physical security market The impact of connected devices on cities doesn’t stop at traffic improvement. The possibilities are endless; by leveraging rich, real-time information, cities can improve efficiencies across services such as transportation, water management and healthcare. However, stringent protections are needed to harden security around the networks transmitting this kind of information in an effort to mitigate the dangers of hacking and allow this technology to continuously be improved. Whether you believe we’re in the midst of a digital transformation or have already completed it, one thing is certain: businesses must begin thinking in these connectivity-driven terms sooner rather than later so they aren’t left behind. Leveraging smart, connected devices can catapult organisations into a new level of situational awareness, but adopting protections and remaining vigilant continues to be a stalwart of technological innovation within the physical security market and into the connected world.
There’s no question that the popularity of Do-It-Yourself (DIY) security and home automation products is on the rise. The reasons for the growth in DIY sales are numerous, including increased awareness of home automation products, fast set-up, limited (if any) installation costs, and interoperability with other smart security products. In fact, with the parallel rise of smart home hubs like Alexa and Google Home, many people are opting to attempt the set-up of smart home devices without any professional assistance. According to a 2018 Residential Security Market Report prepared by Parks Associates and Security Sales & Integration magazine, “More than 60% of installing dealers now report that DIY systems are biting into demand for their services.” But the rise in DIY is not entirely bad news for security and home automation installers and dealers. There are a number of ways to view this glass as half-full. Let’s look at a few of them. Increase in revenue for dealers With their lower cost and perceived ease of installation, DIY products have broken down barriers for additional purchaseThere are reasons for dealers and installers to be cheerful about the rise of DIY. For one thing, according to that same Residential Security Market Report from Parks Associates, residential security dealers are doing quite well. The report states, “In 2017, revenues were up an average 7.72% for security dealers.” What about installations? The report goes on to say, “For 2017, the average number of installs per dealer was 22 per month, compared to 17 per month in 2016.” So, revenues are up for security dealers, and at least part of the reason can be attributed to the fact that DIY products can raise overall awareness of and spur interest in other home automation and security products. With their lower cost and perceived ease of installation, DIY products have actually broken down barriers for the additional purchase, and installation, of complete, professionally installed systems. Wireless, connected smart locks For example, the sale of wireless, connected smart locks (viewed by some consumers as DIY) can lead to opportunities for further home automation product sales and professional installations. Connected smart locks can actually act as an extension of a smart hub or controller. They can be used to wirelessly communicate with and control all the devices that make up a home automation system, including lighting, entertainment, thermostats, air, alarms, shades and more. With their lower cost and perceived ease of installation, DIY products have actually broken down barriers for new security installations And they can do all this from a prime, convenient location – the front door, as well as other points of entry like the side or back doors. Plus, smart lock conversion kits like Kwikset Convert let homeowners easily bring home automation capabilities to their door without altering the aesthetics of the entry. Connected smart locks can allow homeowners to set up their home with custom scenarios, right before they step inside. For example, residents can program their lock so that every time they unlock the door, a foyer light goes on, temperatures begin to rise to a set level – even connected coffee makers can begin to make a cup. Portfolio of home automation products One of the best ways to mitigate the ‘threat’ of DIY sales is for dealers and installers to become more versatileSmart locks are just one example of the potential of DIY products to spark a homeowner’s interest in a wide range of other home automation devices, many of which would benefit from professional installation. One of the best ways to mitigate the ‘threat’ of DIY sales is for dealers and installers to become more versatile and offer a complete portfolio of home automation products. The larger the home automation offering, the more devices there are to sell and install, the larger the installation required, the greater the need for professional installation. Many homeowners who feel like they have a certain level of handiness will start by trying to do it themselves with a DIY product. But things don’t always go as planned, especially if they are attempting to set up a robust home automation system. First off, just because a product is DIY doesn’t mean that the old products that are being replaced are going to easily make way for the new. A DIY thermostat or smart lock might require that the old equipment (and possibly wires) get tugged out of the wall. Messy holes might need to be filled. Advantages of professional installation Even after the old system has been removed, homeowners planning on setting up a connected system may soon realise they don’t have the electrical skills or technological know-how to install and connect all devices, get a system programmed correctly, and get everything up and running smoothly. Professional installers have learned from experience; there’s very little that they haven’t seen before. With their years of experience, installers know the best way to automate a home and how to create a custom smart home experience Do-it-yourselfers might be able to solve problems by searching the internet and finding videos. But, then again, they might not. After going the DIY route once, many full-home automation system enthusiasts are beginning to realise that the best way to get things done right the first time is to leave the installation and set-up to a professional. Professional installers can and should bring an extra level of experience and guidance to the process. Their services should go beyond tech installation and also include interface design. With their years of experience, installers know the best way to automate a home – how to create a custom smart home experience that doesn’t make the user feel less than smart. Selling additional home automation products If a problem arises due to installation error, the DIYer does not have any recourse to correct these mistakesResidential security dealers who offer professional installation should be willing to embrace the DIYer who has attempted to do a self-install but has not been able to complete the process successfully. With an open mind to this scenario, they can save the day for the DIYer, as well as create an opportunity to sell additional home automation equipment that the DIYer may not have known to be available. The disparity between DIY and professional installation also brings to light the fact that there are no ‘satisfaction guarantees’ and no ‘installation/labour warranty’ available when a home automation system is installed by a DIYer. If a problem arises with either the equipment connectivity due to installation error, or if a piece of equipment is installed incorrectly, the DIYer does not have any recourse to correct these mistakes. This may not be as critical if a DIYer installs a minor piece of equipment, but with something as critical as securing and protecting their home with a home automation and security system, most people want full peace of mind that everything has been installed correctly. Reduces connection instability According to a 2017 study by the analyst firm, IHS Markit, “The quality of the equipment is usually higher in professionally installed systems, and professional configuration and setup greatly reduces the potential for connection instability…” This is an issue that DIYers may come to realise over time. On the other hand, one issue DIYers may recognise right away, especially if they are attempting to connect multiple devices, is that the connectivity may be inconsistent. Professionally installed devices operating on a wireless protocol might deliver better, consistent, longer-range connectivity IHS Markit explains that, “DIY systems rely on open protocols and Wi-Fi connectivity that can sometimes be unreliable, creating connection issues. Some of the sensors can become unrecognisable to the system, requiring intervention from the user. In contrast, professional wireless systems rely on UL- or EN-certified equipment to operate on the basis of proprietary frequency, enabling them to work with the control panel much more seamlessly.” In other words, professionally installed devices operating on a wireless protocol, even an open-source protocol like Z-Wave, might deliver better, consistent, longer-range connectivity, and fewer headaches. Not everyone is a DIY customer There are customers who want someone to install the devices correctly and help them learn how to use and maintain themThere’s no doubt that there’s a segment of the security and home automation market that loves to spend their free time doing their own home improvement. They are watching videos, reading how-to books and manuals, and enjoying every minute. There’s also a segment of the market whose top goal is to save money up front. For these customers, there’s no getting around the joy of saving money with the lower cost of many DIY products. But there are also a great number of prospective customers out there for whom DIY is of absolutely no interest. These consumers do not want to be their own IT department. They want expert help: they want someone to install the devices correctly and help them learn how to use and maintain them. The IHS Markit study points out what many home automation dealers already know: that the elder and aging-in-place markets are an ideal destination for the security and convenience of home automation products. The study says, “Many senior citizens are not tech savvy enough to install a DIY system by themselves, so they tend to rely on professionally installed systems that are usually maintained by a family member.” Along with the senior citizens market, there are many other market segments out there that still desire worry-free professional installation. Installers should offer a range of products that includes some DIY products, and some leave-it-to-a-pro products Producing complete and custom solutions Perhaps the best way for dealers and installers to stave off that feeling of doom that they might have about DIY is to tackle the problem head on and be creative. Offer a range of products that includes some DIY products, and some leave-it-to-a-pro products – consider the DIY product a great entry point for a more comprehensive system. Play up the peace of mind that comes with professional installations and support that pitch with flexible monitoring contracts and service plans. Share what you do and why; relay your passion for producing complete and custom solutions and communicate how you add value to any and every sale. No one, not even the most tech-savvy consumer, wants to install their own products if the end result is that the product doesn’t work the way it should. That’s where the pros can, should and will always come into play.
The healthcare market is rife with opportunity for security systems integrators. Hospitals have a continuous need for security, to update their systems, to make repairs, says David Alessandrini, Vice President, Pasek Corp., a systems integrator. “It’s cyclical. Funding for large projects might span one to two years, and then they go into a maintenance mode. Departments are changing constantly, and they need us to maintain the equipment to make sure it’s operating to its full potential.” The experience of Pasek Corp. is typical of the opportunities available for security integrator companies in the healthcare vertical. A single large hospital system can supply a dependable ongoing source of revenue to integrator companies, says Alessandrini. Hospitals are “usually large enough to provide enough work for several people for an extended length of time.” Healthcare customers in Pasek’s service area around Boston provide the potential for plenty of work. “We have four major hospitals, each with in excess of 250 card readers and 200 cameras, in the Boston area,” Alessandrini says. One appeal of the healthcare market for North Carolina Sound, an integrator covering central North Carolina, is the breadth of possible equipment they can sell into the healthcare market, including access control and video, of course, but also other technologies, such as audio-video systems in a dining room. North Carolina Sound has also installed sound masking in some areas with waiting rooms to protect private patient information from being overheard. Locking systems on pharmaceutical doors are another opportunity. Data capture form to appear here! IP based networked video systems A facility’s IT folks must be convinced an IP solution will function seamlessly on their network Among North Carolina Sound’s customers is Wayne Memorial Hospital, Goldsboro, N.C., which uses about 340 video cameras, with 80 percent or more of them converted to IP. The hospital is replacing analogue with IP cameras as budget allows, building network infrastructure to support the system. The healthcare market tends to have a long sales cycle; in general, sales don’t happen overnight or even within a month or two. In fact, the period between an initial meeting with a healthcare facility and installation of a system could stretch to a year or longer. A lot happens during that time. Healthcare systems involve extensive planning, engineering, and meetings among various departments. Physical security systems that involve the information technology (IT) department, as do most systems today, can be especially complex. Installation of networked video systems based on Internet protocol (IP) requires deep and probing discussions with the IT team about how a system fits into the facility’s network infrastructure. A facility’s IT folks must be convinced an IP solution will function seamlessly on their network. Compatible with the network They must vet the technology to ensure the devices and solutions will be compatible with the network, and must sign off on technology choices. And even more important is determining if the security system will adhere to cyber security requirements of the facility. A complete solution that integrates nearly any system that lives on or uses a facility’s network is ultimately what the healthcare vertical is moving toward, says Jason Ouellette, General Manager – Enterprise Access Control & Video, Johnson Controls. Healthcare security professionals are early adopters of technology, implementing the best technology available” “We are hearing more and more from customers across industries that they want to be able to use their security systems and devices for more than just security: they want added value,” says Ouellette. Many want to use access control, video surveillance and other data sources to assess their business operations and/or workflows with the goal of improving efficiency. Upgrade cost-effectively Historically, three factors have prevented many organisations from moving forward with new technologies: lack of money, proprietary systems, and the need to “rip and replace” large parts of the installed systems, says Robert Laughlin, CEO and Chairman, Galaxy Control Systems. "Today, while funding is almost always a limiting factor at some level, the progression of industry standards and ‘open’ systems has made a big positive impact on the ability of organisations to upgrade cost-effectively,” he says. Despite any obstacles, healthcare customers generally welcome new innovations. “I would say healthcare security professionals in general are early adopters of technology and like to implement the best technology available,” says Jim Stankevich, Global Manager – Healthcare Security, Johnson Controls/Tyco Security Products. “For most, rapid implementation is limited by budgets and available funding." Read parts one and three of our heathcare mini series here and here.
Many venues are using access control, video surveillance systems, sensors, and additional hardware solutions as part of a broader security strategy. By utilising so many disparate systems, corporate security teams are left with information “silos” that create inefficiencies and hamper communication. This abundance of hardware has left teams with too much data or too many tools, to manage effectively. Armored Things offers a software solution. The company’s “spatial intelligence platform” currently collects more data than other security intelligence solutions, utilising a broader range of sources and fusing data together rather than integrating it. The platform currently focuses on taking in data from WiFi, access control, and video surveillance systems and applying machine learning to deliver customers features such as real-time predictive analytics to prevent incidents like bottlenecks or overcrowding. Spatial Intelligence is an approach to physical security that enables users to collect, manage, and interpret data in a single platform. Combine machine learning with data The term can best be used to describe how digital transformation has affected physical security. Spatial Intelligence in its infancy looked like video surveillance data combined with machine learning to produce video analytics. The spatial intelligence solutions of today can combine machine learning with data of any source, type, and size to deliver value across a large organisation, not just the security team, says the company. Armored Things’ Spatial Intelligence platform unifies data from information silos to support data-driven decisions around operations and security. By fusing data from multiple sources, we can produce more consistent and useful insights for our customers” A suite of analytics, reporting and visualisation tools helps customers gain a real-time understanding of people and flow in their space. By removing the guesswork of everyday decisions, the product enables customers to make data-driven decisions at a moment’s notice, according to the company. Armored Things is more than a data management tool. “By fusing data from multiple sources (rather than only cameras or only WiFi), we can produce more consistent, accurate, and useful insights for our customers,” says Kevin Davis, Chief Security Officer at Armored Things. "Being able to collect the data is the first step, but turning it into actionable intelligence is where Armored Things excels.” IP cameras and other IoT-enabled devices The range of data sources includes IP cameras and other IoT-enabled devices and even outside data sources like bus schedules and weather reports. Armored Things has built a team of public safety and technical experts with the mission to keep people safe where they live, work, and play. By leveraging emerging technology to enhance physical security, the company built the software-centric Spatial Intelligence Platform for large organisations to enhance the safety and operations of their space. Schools and education facilities are among the customers that can benefit. The leadership at Armored Things cares deeply about school safety, so the recent epidemic of campus violence has definitely been a large topic of conversation, according to the company. “By delivering our products to a greater number of customers, Armored Things hopes to continue making schools a safe place to learn and gather,” says Davis. Recently, there was a significant bottleneck lasting nearly 30 minutes at the Syracuse-Clemson football game. Unifying data into one platform Digital transformation is disrupting the way our customers think about physical security,” Using Armored Things technology and providing real-time data to security and operations personnel could have identified the bottleneck as it began to form. This would have notified relevant personnel, who could have taken steps to mitigate the problem before it turned into a security risk. Keeping the security infrastructure simple is imperative to success. Integrating a software solution into the security strategy shouldn’t complicate existing operations, says the company. “Armored Things Spatial Intelligence Platform can bring your security and operations into focus by unifying all of your data into one platform for ease of use,” says Davis. For this reason, the team chose to integrate not only with customers’ existing security infrastructure but with non-traditional data sources (e.g. WiFi, event schedules, ticketing) as well. “By combining and analysing a more diverse dataset, Armored Things can help our customers make better decisions with deeper data-driven insights,” says Davis. "Digital transformation is disrupting the way our customers think about physical security,” says Davis. “As a team, our aim is to help our customers adapt to the digital age, as they transition from hardware to software-centric security solutions. Fostering organisational change is difficult, and our team hopes to make the transition process easier for our customers.”
Ethics is a particularly important subject in an industry such as fire and security because the result of unethical actions might make the difference in life and death. For example, if an employee acts unethically when servicing a fire extinguisher, the result could be to burn down the building. Although ethics is not a common topic of discussion in the fire and security industry, perhaps it should be. Chubb Fire and Security is a company that provides an example of how an emphasis on ethics can benefit a company, their employees, their customers and the whole world. Fire safety and security risks “The fire and security industry is different than others because lives and people’s safety are on the line,” says Harv Dulay, Director of Ethics and Compliance at Chubb Fire and Security. “Our purpose is to protect clients from fire safety and security risks. This is a business where no one should take short cuts. It is important to do the right thing all the time, every time, and it’s about protecting lives and property.” At Chubb, we have a code of ethics, our ‘bible,’ that is issued to employees when they start" “At Chubb, we have a code of ethics, our ‘bible,’ that is issued to employees when they start,” says Dulay. “Within the bible are core fundamental rules about what’s acceptable and not acceptable. We lay it out for employees very specifically. They understand and embrace the code of ethics, which is based on trust, integrity, respect, innovation and excellence.” “If you get those right, the business moves in the right direction. A key piece of our ethics policy is based on trust. We relate to others with openness, transparency, and empathy. It makes Chubb a better place to work and enables us to provide better service to customers.” Fire audit For Chubb, ethics is not just theoretical, but ethical concepts play out every day in practical ways. An example might be an engineer who goes to a customer’s site and is asked to do a task that is outside his or her duties and/or not allowed under the ethics policy. The pressure might be even greater if the employee is struggling to meet a sales figure. The code of ethics addresses specific situations and outlines the behaviour that is expected. In another example, a customer asked a Chubb technician to forge a certificate saying the customer had previously passed a fire audit in order to validate his previous year’s insurance. Showing ethical integrity, the technician was able to cite the company’s Code of Ethics and refuse to do it. The technician also reported the situation to his Ethics and Compliance Officer. Customers benefit, too. Delivering ethics excellence It’s a message heard from the top down, from everyone in the company" One of Chubb’s sales associates immediately reporting a situation in which all the tenders and competitors’ prices were visible as they prepared a tender for upload to a customer portal. Not only did the sales associate deliver ethics excellence by reporting the issue, he also helped a grateful customer who thereby avoided anti-trust issues, says Dulay. “Ethics is not just a current issue,” says Dulay. “It’s embedded in our values and has been since the beginning. Ethics is making sure people do the right things.” Ethics is integrated into the Chubb business model, and everyone knows what is expected of them. “It’s a message heard from the top down, from everyone in the company.” On-line training modules Ethics discussions begin for employees at Chubb when they join the company; clear instructions about ethics are included as part of employee induction. There are nine modules of ethics training during employee orientation, and a discussion with an Ethics and Compliance Officer is part of the onboarding process. The training program includes information about ethics, company expectations around ethics, where to go for questions about ethical issues, and details of the anonymous ombudsman program. Additionally, field staff are trained by their supervisors via regular face-to-face ethics toolbox talks. Office staff complete a series of on-line ethics training modules regularly. A series of supervisor-led trainings encourage managers to deliver face-to-face ethics training to their team, citing real-life examples. Healthy discussions are encouraged to deal with any ‘gray areas.’ Worldwide implementation of data security Some 14,000 employees globally have multiple options when it comes to reporting an issue Dulay estimates that ethics and compliance officers spend about half their time answering questions and clarifying for employees what’s expected in the code of ethics. Some 14,000 employees globally have multiple options when it comes to reporting an issue, and there are full-time Ethics and Compliances Officers in every country where Chubb does business. A reflection of Chubb’s global approach to compliance is their worldwide implementation of data security requirements of Europe’s General Data Protection Regulation (GDPR); the company saw the benefits of the program for any jurisdiction. Training and education are part of Chubb’s investment in ethics. For example, a recent module on ‘respect in the workplace’ covered the need to create a company culture in which everyone feels respected. “Training and continuous communication are embedded in the organisation,” says Dulay. Managing potential conflicts proactively “We invest in the process,” says Dulay. “We have had employees who left the company and then come back. They realised the importance of ethics and rejoined us. We start with the foundation that we would rather lose business than give up our ethical standards,” says Dulay. Some business is not worth getting if you don’t adhere to your values" “We won’t abandon our policies even if there is money at stake. Some business is not worth getting if you don’t adhere to your values. We manage potential conflicts proactively by creating and instituting methods in which employees have access to tools they can use to be successful and adaptable in times of change,” says Dulay. “Also, we will not tolerate retaliation against any employee who reports wrongdoing – regardless of the outcome of the investigation.” Forming good ethics behaviour And while there is no specific monetary value assigned to good ethical practices, success can be measured. “We measure it by people’s conduct, the number of cases we have, and awareness,” says Dulay. “It’s good for employee morale, and it’s good for customers and our business. It’s not measurable, but it is fundamental for business and customers.” “The work we do as a company can impact people’s lives so it is important that everyone has an understanding of the importance of their role,” says Dulay. A common misconception about ethics is: “If no one is watching, it must be ok.” However, Dulay says it is the things employees do when no one is watching or checking in on them that form good ethics behaviour. During training, Chubb emphasises that ethics is about doing the right thing, all the time even if no one is watching.
There are many matters that must be taken into account when organising a casino. A top priority is the security of the entire workforce and clientele. An access control system that is reliable and easy to operate provides the basis for that. Casino Baden-Baden is open 358 days a year. In addition to various different pay scale groups and work-time models, a variety of bonuses need to be assigned. Pay may therefore be partly exempt of tax or liable to tax, with holiday bonuses and weekend pay. Recording staff work timings Intensive workshops and consultations were conducted to establish the specific requirements of the casino, so that the best possible solution could be developed. The main focus was on recording work times and transmitting that data to the casino's own specially developed shift schedule program. Given the various different work time models and wage types in numerous variants, complex manual procedures must be automated in future. IF-4735, IF-810, and IF-800 access control terminals Employees can use their passes for cashless payment in the cafeteria and at the vending machines In 1991, a solution for physical access control and time recording was implemented in the form of the IF-5020 software. Since 1998, the IF-6020 software solution has been in use. The hardware terminals IF-4735, IF-810, and IF-800 ensure smooth recording of work times and grant authorised employees access to the various separate areas. Also, the employees can use their passes for cashless payment in the cafeteria and at the vending machines. The system solution from Interflex, with its hardware and software components, now brings employees and administrators substantial time savings and a great deal of convenience. Central access control system All access permissions and work times are now recorded and controlled in one central system, eliminating the disruption of transferring from one system to another, such as to the program for pay and shift planning. This has brought considerable improvement in transparency and in the freshness of data, and paper has been completely banished from work time control.
Delta Scientific, the prominent manufacturer of counter-terrorist vehicle control systems used in the United States and internationally, announced that, on Monday, October 7, at approximately 7 am, a Delta MP5000 portable barrier stopped a stolen Dodge Ram pick-up truck at an entrance gate of the Naval Air Station - Corpus Christi. The stolen car was chased by the local police onto the base. The barrier then impacted the rear of the vehicle, disabling it. Simultaneously, the Air Station announced that an unauthorised person was on base and the facility immediately would go under lockdown with all gates secured to all traffic. Having taken flight after the truck was stopped by the barrier, the intruder was quickly apprehended within the hour and taken into custody by the Bureau of Alcohol, Tobacco, Firearms and Explosives. "This is the second attempted intrusion into the Naval Air Station - Corpus Christi in eight months," explained Greg Hamm, Delta vice president of sales and marketing. Control vehicle access "On February 14, a Delta MP5000 portable barrier stopped a stolen Ford Edge crossover SUV at the North Gate. The trespasser had driven across the base to escape but crashed into the Delta unit and erupted into flames. The driver was shot and killed." Delta's totally self-contained MP5000 mobile deployable vehicle crash barriers now carry an ASTM rating as high as M50, able to stop and disable a 15,000 lb (66.7 kN) G.V.W. vehicle moving at 50 mph (80.4 kph). They tow into position to control vehicle access within 15 minutes. No excavation or sub-surface preparation is required. Once positioned, the mobile barricades will unpack themselves by using hydraulics to raise and lower the barriers off their wheels. DC-powered pumps will then raise or lower the barriers. Once the event is over, procedures are reversed and the barriers are towed away.
SMARTair® Wireless Online access management has proven a simple, school-wide electronic solution for greater control and security at Westbridge. Each staff member carries one RFID credential card programmed with access rights personalised to their individual role. In an emergency, the school can institute a complete lockdown via the centralised system. “Having a SMARTair® system in place has given us peace of mind. It’s quicker, it’s safer and it’s simple,” says Joanna Brunton, Executive Officer at Westbridge School. The school’s teaching, administration and residential buildings require multiple layers of access control, for both staff and students. The inflexibility of a legacy mechanical locking system had presented facility management and pupil safety challenges for years.“With over 50 staff, we needed more subtlety in assigning access permissions, which you simply can’t do with a bundle of metal keys,” explains Joanna Brunton, Westbridge School’s Executive Officer. New access system The system would need to be installed over the holidays for minimal disruption to the school’s busy calendar Beyond replacing and upgrading outmoded, inflexible mechanical key security, Westbridge had a number of requirements for its new access system. Devices in the new, unified system would replace piecemeal mechanical locking on 80+ doors around the site. School leaders wanted access control already proven in the field, with a track record of successful installations managing access in schools worldwide. New electronic locks must provide a real-time audit trail, so facility managers always know which doors are opened by which staff cards. The new system would also need to work within the school’s security budget — and be installed over the holidays, for minimal disruption to the school’s busy calendar. "We essentially had a safety and security need,” adds Joanna Brunton. “We needed to be able to discourage students from going where they didn’t need to be on site or redirect a student who was in a heightened state from re-entering a classroom and potentially disrupting the class or causing damage.” Wireless and battery operated SMARTair® solution has done everything we wanted it to do in terms of safety, security and monitoring" System administration is easy even for non-specialists. “I taught staff how to use the software and encode access cards,” says Kylie Bray, director at Western Lock Services, who have long managed hardware maintenance for Westbridge. “If a staff member loses their card, you can go straight in and delete it." The intuitive SMARTair® system software can open or secure individual zones, connecting to individual locks via a network of 9 hubs. “We now have the ability to set higher security for specific areas of our site, especially over the school holidays when students have gone home,” says Joanna Brunton. “Our regular maintenance contractors have their own access keys, so they just get straight on with their work without calling us to meet them for access. This keeps our time, and their costs, down. SMARTair® door devices are wireless and battery operated. Because there’s no need to run cabling to individual doors, installation was fast and cost-efficient. From a facilities management point of view, the solution has done everything we wanted it to do in terms of safety, security and monitoring,” adds Joanna.
Abdullah A. M. Al-Khodari Sons Company is a multifaceted contracting company in Saudi Arabia. This company conducts business in diverse sectors such as civil engineering, roads and bridges, railways, buildings and infrastructure, water and waste water treatment, oil-gas and pipelines. It has 25 construction sites across Middle East. Managing time-attendance, shifts, overtime and leaves of 20,000 employees at different locations was a challenging process for them. They wanted a centralised time-attendance solution that would enable them to manage attendance data from a central location and speed up the payroll process. Project Highlights Time-attendance solution for 25 construction sites Access control solution for 25 sites Centralised attendance management for 20,000 employees Managing time-attendance data Al-Khodari is engaged in wide spread construction activities with 60 construction sites in the Middle East Al-Khodari is engaged in wide spread construction activities with 60 construction sites in the Middle East. Managing time-attendance, shifts, leaves and overtime of 20,000 employees at different locations is very time consuming and a tedious task. Previously, the customer was using Hand geometry solution, which was very time consuming. Workers also found it difficult to place their palms in the proper position. Managing time-attendance data of all employees on a central level was also becoming difficult for the company. Furthermore, the head office was using a different time-attendance solution in comparison to other sites. The head office processed the salary of employees after receiving an attendance summary from each of their branches. The process of salary calculation with respect to working hours and overtime of each employee took around 10 days. Moreover, there were chances that the attendance data was inaccurate, leading loss of efficiency and employee dissatisfaction. To overcome such challenges, the company required a centralised time-attendance and access control solution which could be managed and controlled from the head office. Faster and accurate salary calculation After discussing all of their problems and requirements Matrix offered web based COSEC CENTRA time-attendance and access control solution for their multi located branches across the Middle East. It automated all time-attendance processes right from recording entries to processing salaries. COSEC CENTRA access control solution allows controlling access on three simultaneous dimensions – user, zone and time. COSEC CENTRA server is installed at the head office to where attendance data of all locations are collected Optical fingerprint based time-attendance and access control terminal COSEC DOOR FOP was installed to mark the attendance and get access using fingerprint credentials. As per assigned access rules and time-attendance policies, access is allowed or denied, and event data would be pushed from all devices to the COSEC CENTRA server in real-time. COSEC CENTRA server is installed at the head office to where attendance data of all locations are collected centrally. Various types of time-attendance reports and charts can be generated for faster and accurate salary calculation. Error free time-attendance Time required for salary calculation reduced by 30% Productivity increased by 20% Control of all sites through a live monitoring window Error free time-attendance and overtime data Database management of all employees Centralised report generation Products installed COSEC DOOR FOP - optical fingerprint and RF card based door controller COSEC ENROLL FINGER - fingerprint enrolment station COSEC LE PLATFORM - web based application software platform COSEC LE TAM - time-attendance and leave management module COSEC LE ACM - access control module COSEC LE USER10000 - 10000 user license for LE platform
It’s no surprise that a growing number of people are turning to motorbikes as their primary method of transport due to Spanish cities becoming increasingly congested. In fact, according to a 2016 study by the Institute of Environmental Science and Technology (ICTA-UAB) and the UAB Department of Geography, Barcelona is now the European city with the highest number of motorbikes per inhabitant. The research found that 372,278 trips are made on motorbikes every day in the city. Motorbikes began to experience a boom in 2004 when the Spanish government enacted a regulatory measure that allowed car drivers with three years of experience to switch to motorbikes with capacity up to 125cc. The ability to avoid congestion and complete journeys more quickly promoted exponential growth. Protecting motorbikes from thieves Unattended motorbikes are vulnerable to theft and vandalism, so protecting them has become a key concernAlthough this has brought many benefits, it has also created a significant problem for users – where to park their motorbikes. Unattended motorbikes are vulnerable to theft and vandalism, so protecting them has become a key concern. Similarly, city councils are cracking down on illegally parked motorbikes that obstruct access, and are removing them from pavements and other areas. It’s this situation that prompted Alicante-based motorcyclist, Alejandro Martin, to create Mimoto Parking, along with two other biking friends. As the company’s managing director, he takes up the story and explains, “We want our customers to be able to keep their motorbikes secure and avoid the fines associated with illegal parking. By creating conveniently located facilities that can be accessed at street level, without the need to negotiate dangerous ramps, we have reinvented the parking concept. “We offer a revolutionary service where owners can safely park and also store belongings such as helmets, jackets and gloves in lockers. Users can access our parking lots on a 24/7 basis and go about their business without worrying about their motorbike’s security.” Access code to obtain a parking space Although it only operates a few sites at the moment, the response has been incredible and Mimoto Parking has plans to operate over 40 facilities by 2021 and, in order to finance this rapid expansion, Alejandro Martin and his team is looking to attract additional funding from interested parties. By registering online for free, a user is sent a six digit personal and non-transferable access code to obtain a parking space The company’s success is down to the fact that Mimoto Parking has simplicity at its heart. By registering online for free, a user is sent a six digit personal and non-transferable access code to obtain a parking space. They then identify the facility that is most convenient, key in the six-digit code via a keypad when they arrive, and enter and park. Remote monitoring via Ralset’s ARC Utilising a ‘pay as you go’ concept, leaving users simply re-enter the same six digit code at which point Mimoto Parking automatically charges them for the duration of their stay. Each facility is remotely monitored at all times via Ralset’s alarm receiving centre (ARC) and a full intercom system offers user assistance when they need it. Alejandro Martin says, “When developing Mimoto Parking we knew that our success would hinge on our ability to implement access control and intrusion detection technology that could not only guarantee the highest levels of security but also be intuitive, straightforward to roll-out across multiple sites, and be as reliable as possible. “In order to find out more about what we could do, we invited leading security integrator and PACOM approved partner, Cettec Seguridad, to come in and hear about our requirements.” Integrated access and alarm controller Doors and alarm points can be partitioned into different areas of security and controlled by multiple keypads"Cettec Seguridad configured a solution based around the PACOM 8002 integrated access and alarm controller – an all-in-one platform that integrates the functionality required for a remote security system. PACOM 8002 supports auto-discovery of peripheral devices for simplified installation and all doors can be individually configured to operate via card only, PIN only, or card and PIN, with access schedules providing additional control. Furthermore, doors and alarm points can be partitioned into different areas of security and controlled by multiple keypads. The PACOM 8002 system would have to integrate seamlessly with Mimoto Parking’s mobile app and allow the ARC to monitor events at all times. Alfonso Lorenzo Robledano, business development director for Southern Europe at PACOM, states, “Cettec Seguridad asked us to make some adaptations to the PACOM Graphical Management System (GMS), which is based on a data communications platform that successfully integrates access control, alarm monitoring, video surveillance and many other building services into a single, remotely accessible system. “PACOM’s technical experts were able to modify the software’s algorithms and design new schematics to meet Mimoto Parking’s exact requirements and, in addition, deliver uninterrupted system operation, intelligent self-testing and multiple back-ups.” Manages the parking occupancy status Signs can be operated to indicate availability and the system can even be remotely reset when necessaryAs well as allowing customers to communicate directly with personnel at the ARC, the modified PACOM GMS can also manage the parking occupancy status at each site. Signs can be operated to indicate availability and the system can even be remotely reset when necessary. This level of scalability also means that new technologies can simply be added to as they are developed, offering Mimoto Parking the ability to further develop the system as required and future proof its investment. Just as importantly, PACOM and Cettec Seguridad collaborated to ensure that the system can be quickly and easily rolled out across any new sites as they are acquired. Each system controls one entry and one exit door using a single controller and keypad, which means minimal wiring and allows minor adjustments to be made as necessary. Meeting the objective of securing bikes Mimoto Parking’s Alejandro Martin is delighted with what has been achieved and praised PACOM’s willingness to work closely with his team and Cettec Seguridad to devise a unique solution. He concludes, “Our ability to keep customers’ motorbikes secure is fundamental to our success and therefore we needed to be 100 per cent confident that the technology we installed was able to meet this objective. “PACOM’s experts were a pleasure to deal with and as keen as we were to optimise our entire security and access control infrastructure. I’m looking forward to working together in the future as we expand Mimoto Parking and introduce new sites to our portfolio.”
Mul-T-Lock supplies a high-end jeweller in London with CLIQ® locks in order to help the business manage access to cabinets holding valuable items. Stocking bespoke pieces and precious stones, the jeweller was looking for a high-level security solution that allowed sales personnel access to individual glass cabinets, without the worry that if one of the keys got lost or misplaced that they would have to replace the entire suite. Offering maximum security Over 50 CLIQ® cam locks from Mul-T-Lock were installed at the jewellers on each of the cabinets Over 50 CLIQ® cam locks from Mul-T-Lock were installed at the jewellers on each of the cabinets, offering maximum security with the added benefit of audit trail capabilities. These capabilities include the ability to schedule individual access permissions for each key, as well as to provide time-limited access. In the case of this particular jewellers, each member of staff was given access to a selection of cabinets at varying times, with individual permissions set by the administrator (those who manage the security system). For example, access could be set for only business hours, meaning that the cabinet could not be accessed at evenings or weekends. Similarly, each time a user opens a lock, it will be recorded in the system, meaning that the administrator can keep an eye on operations electronically. Careful consultation Specialist Mul-T-Lock integrator, Elelock Systems Ltd specified and installed the CLIQ® locks at the jewellers, after weeks of careful consultation with the business owner to better understand the store’s requirements. One of the biggest concerns for this particular jeweller was the threat of compromised security" Chrys Chrysostomou, Managing Director of Elelock said: “One of the biggest concerns for this particular jeweller was the threat of compromised security if cabinet keys were lost. Mul-T-Lock’s CLIQ® technology means you can revoke access in minutes, whereas with a traditional system you would have needed to replace the whole lock – costing time and money.” Hands-on training “With no cabling the system was easy to configure and install, making it suitable for a variety of applications. The store manager also received hands-on training from ourselves and Mul-T-Lock, alongside the jeweller’s head of IT and security representative.” Suresh Peri, Commercial & Technical Manager at Mul-T-Lock added: “Our CLIQ® system is ideal for retail applications where there are a number of members of staff who need access at varying times, or that require individual permissions for access to high security storage rooms, cabinets or drawers. “Being able to revoke access permissions when a member of staff leaves also allows retailers to uphold their security and reduce ongoing maintenance costs.”
Round table discussion
While unpacking our bags from a trade show, it is interesting to consider the dominant themes and trends we heard and saw at the show. So it is with the recently concluded Global Security Exchange (GSX) show in Chicago, presented by ASIS International. Amid all the product promotion, training sessions, networking and tired feet at the show, what really stood out? We asked this week’s Expert Panel Roundtable: What was the big news at the GSX 2019 trade show in Chicago?
Passwords are one of the most familiar elements of information systems, but also one that can be overlooked or underutilised. New alternatives are emerging, and the role of passwords is evolving in the age of the Internet of Things. We asked this week’s Expert Panel Roundtable: How is the role of passwords changing in physical security systems?
The ability to treat patients in a secure environment is a base requirement of hospitals and other healthcare facilities. Whether facilities are large or small, security challenges abound, including perimeter security, access control of sensitive areas, video surveillance, and even a long list of cyber-risks. We asked this week’s Expert Panel Roundtable: What are the security challenges of hospitals and the healthcare industry?