India’s foremost shop window and business hub for the security industry, Secutech India, is set to return from 25 – 27 April 2019 against a backdrop of rising government investment in smart city projects. Jointly organised by Asian Business Exhibition and Conferences Ltd (ABEC) and Messe Frankfurt Trade Fairs India Pvt. Ltd, the 2019 edition of the fair will introduce a new smart home zone to accommodate India’s growing home automation sector. Indian security indu...
SALTO Systems UK, global provider of wire-free, wireless and cloud-based access control solutions, has opened a new training facility at its Southam office to support end users, installers and partners. Wireless access control solutions The modern open plan working space is divided into a number of product-themed areas and modelled on that found at SALTO HQ. It provides state-of-the-art resources and demonstrations of SALTO’s latest wireless and wire-free products, solutions and technolo...
BlackBerry Cylance, a business unit of BlackBerry Limited, announces the introduction of CylancePERSONA, the first proactive, native AI behavioural and biometrics analysis solution for the security industry. CylancePERSONA adds user monitoring to the company’s expansive defence of the enterprise and augments the AI-driven prevention, detection, and response capabilities of the Cylance native AI platform. This lightweight solution combines continuous biometric behaviour and user conduct mo...
Matrix COSEC ARGO is a performance, design and engineering wonder that brings a modern design to the access control and time-attendance applications. The device is equipped with an enhanced 3.5” IPS LCD touchscreen for optimising users’ visual experience. The door controller is designed to meet the aesthetics, technology and harsh environment application requirements of the large & multi-location enterprises, SME & SMB organisations. Matrix COSEC ARGO door controller: Enh...
Ping Identity, global identity defined security solutions provider, has announced new programs and benefits for its Technology Alliance and Channel Program partners, including a new online partner directory, app integrations catalog, education and training services, on-demand resources, and enhanced services designed to improve partner products and drive business. Ping is also recognising Microsoft, Optiv and ProofID for their shared commitment to deliver innovative identity solutions to the mar...
Evolis announces the formation of a wholly-owned subsidiary in Tokyo, Evolis Japan K.K. The globally renowned French card issuance company designs, manufactures and commercialises a complete range of personalisation and issuance solutions for plastic cards in various markets such as retail, hospitality, banking or public administrations across the globe.Evolis has been present since 2008 in Japan through a distributor. The creation of a local subsidiary aims at strengthening relations with local...
In preparation for ISC West, the largest converged security and public safety industry trade show, the Security Industry Association (SIA) has identified the top technology advancements to look out for at ISC West 2019. The “Top 8,” presented with ISC Security Events, represent the key technology advancements impacting the converged security and public safety landscape. The “Top 8” security technologies at ISC West 2019: Cloud Artificial intelligence Robotics/autonomous systems Mobile credentials Security audio Facial biometrics 5G LTE Voice control Ever-converging physical and cybersecurity As physical and cybersecurity continue to converge within the broader security industry, SIA and ISC West are regularly keeping a close pulse on the latest trends As physical and cybersecurity continue to converge within the broader security industry, SIA and ISC West are regularly keeping a close pulse on the trends driving this industry transformation. Together, they present what SIA has identified as the most significant technology-first issues impacting the industry and made recommendations for security professionals looking to further their education at the show. ISC West will be held April 9-12 (SIA Education@ISC: April 9-11, 2019 | Exhibit Hall: April 10–12, 2019) at the Sands Expo Center in Las Vegas, Nevada, drawing over 30,000 security professionals and over 1,000 exhibitors and brands. A more detailed look at the Top 8 security advancements at ISC West: Cloud: Video surveillance as a service (VSaaS) is a growth area this year, as more companies deliver solutions that move recording, storage, management, analytics and monitoring solutions to the cloud. As SIA director of standards Joseph Gittens notes, this is especially common in residential video solutions, which often have low camera counts. Artificial intelligence (AI): AI is permeating many security product categories but is most visible at ISC West in video security systems. Attendees will see analytics applications for automated motion detection and trespassing detection, advanced algorithms performing identification and categorisation of persons and objects within scenes and systems that can even analyse human behavior within scenes such as long line queues and crowded situations. AI is also being used more extensively in the intrusion and alarm systems categories AI is also being used more extensively in the intrusion and alarm systems categories AI is also being used more extensively in the intrusion and alarm systems categories, with the promise of AI being able to leverage combined data from multiple sensors to help reduce false alarms and enhance home automation. Other firms are even offering AI solutions to identify cyber threats and network intrusions. Robotics/autonomous devices: Driven primarily by advancements in AI, power storage and mobility, steady improvements are being made in robot and drone security solutions. SIA notes that many of the companies are taking a managed service approach, allowing users to “rent” the services that these robots and drones provide. Mobile credentials: While a true mobile credentialing explosion may be a few years away, SIA expects the public to become more comfortable using mobile devices to complete transactions outside of access control. Mobile credentialing may expand into more commercial security installations, and industries will increasingly migrate to systems that incorporate all facets of identity management into unified systems capable of granting and managing access rights. Security audio: Audio has long been a component of security systems, particularly with intercoms, emergency notification platforms and public address systems, but the industry is now delivering specialised solutions which can actively monitor audio and apply analytics to the audio –enabling functions like automated alerts on possible aggression. SIA adds that audio is proving to be a value-added augmentation to video security systems. SIA adds that audio is proving to be a value-added augmentation to video security systems Facial Biometrics: Thanks to popular consumer efforts like Apple’s Face ID and Windows Hello for Microsoft Windows 10, facial recognition has become less of the curiosity from futurist movies and more of a common place logical and physical access solution. As facial biometrics have proliferated in consumer technology, so has the technology advanced in professional solutions. SIA expects to find more presence of this solution on the show floor, particularly as verification accuracy increases and competition makes solutions more affordable. 5G LTE: With the major telecommunications firms in the process of planning their networks to support 5G LTE, which could deliver nearly 10 gigabits of data per second to a cellular phone, IoT solutions that use cellular connectivity will no longer be limited to the throughput of today’s 4G speeds. Expect to see early glimpses of technology solutions, particularly mobile video security solutions with applications primarily in public safety and smart cities –even though full 5G LTE networks are still in development and are not widely available from most carriers. Voice control: With smart speaker adoption growing dramatically in 2018 (up 24 percent in Q2 2018 according to Nielsen), these solutions are being integrated into residential technology ecosystems. Look for new products in the areas of home security and home automation to have existing or available integration with common voice control/smart speaker providers like Amazon and Google. Voice control and natural language processing will also likely augment video analytics Augmented video analytics Voice control and natural language processing will also likely augment video analytics. According to SIA, in today’s analytics, users still need operators with a level of database/querying skills to find a particular event or scene, but the ability to say “Show me all persons in red shirts carrying an object who entered through door three” will prove much faster than waiting on an operator to input that analytic query manually. “Each year at ISC West, the largest audience in the security industry gathers to strengthen business connections, learn and see the latest trends in security technology,” said SIA CEO Don Erickson. “SIA is proud to be the premier sponsor of ISC West and looks forward to engaging with influential attendees through our compelling SIA Education@ISC education and training sessions, networking events and the SIA New Product Showcase.” ISC West 2019 In addition to connecting with nearly a thousand companies on the show floor, ISC West attendees will have access to 85 top-quality training sessions led by SIA. SIA Education @ ISC West provides critical information on the newest technologies in security. “ISC West has been a driving force in bringing together and educating the security and public safety community for more than 50 years. As the industry moves towards a converged mindset for physical and cyber security, it’s critical we’re addressing the technology-specific trends our attendees are looking to learn more about,” said Will Wise, group vice president, security portfolio, Reed Exibitions. “With SIA’s collaboration, we’re able to put forth this cheat sheet so attendees can easily identify the topics they care about and all the ways we can help them learn more.”
Videonetics, global visual computing platform development company, is all set to launch its latest Artificial Intelligence & Deep Learning-enabled Unified Video Computing Platform for vertical markets, including enterprise, industrial, education, IT Parks, healthcare and hospitality at FSIE 2019, India’s most comprehensive event for fire safety & security, scheduled from 28th February to 2nd March in Mumbai, India. AI and Deep Learning framework Powered by its patented and award-winning AI & Deep Learning Framework, Videonetics will be showcasing its Unified Video Computing Platform which is custom built for securing enterprise workplace and workforce. Videonetics Unified Video Computing Platform encompassing Intelligent VMS & video analytics like dire & smoke detection, safety gears like helmets, glasses and apron detection, graffiti and vandalism detection, property cleanliness detection & garbage management, crowd detection, perimeter protection, object classification, vehicle movement monitoring using ANPR and speed detection, vehicle entry-exit monitoring for gate management and facial recognition, will be demonstrated live during the show. FSIE Show will be an appropriate platform to launch Videonetics solutions for Enterprise, Industrial and Commercial verticals" Expressing on the participation, Mr. Avinash Trivedi, VP-Business Development Videonetics said that, “FSIE Show will be an appropriate platform to launch Videonetics solutions for Enterprise, Industrial and Commercial verticals and meet consultants, end users, decision makers and other stakeholders of the eco-system. We are looking forward to the show and very sure of its grand success.” Mitigating safety and security risks “Field-proven and tested with real-time video data of varied environment, our solutions are well-competent to solve their day-to-day challenges as well as address critical needs such as mitigating safety & security risks, improving work environment, reducing production loss and improving profitability, improve workers/employees occupational safety, create situational awareness, maintaining business continuity and optimising operations for organisations, assets and infrastructure.” The pavilion will be having a demo zone to provide live & hands-on experience of our technology to visitors. Videonetics customer interface and technical team will be providing live demos to the visitors and prospective customers on the operations, flow and utility of its solutions.
Fingerprint Cards' (Fingerprints) technology has been selected by Gemalto to bring additional performance to its next generation of dual interface payment cards. Gemalto, the world provider of digital security, will offer biometric EMV payment cards to its bank customers, using Fingerprints' T-Shape sensor and licensing the recently-launched Biometric Software Platform for payments. The initial order confirms the commitment of both companies to accelerate the deployment of biometric payment cards. Faster and seamless authentication With Fingerprints, we are bringing stronger, faster and more seamless authentication to payment cards""We evaluated a number of biometric systems for cards and Fingerprints came out with the most performing and promising solution," comments Sylvie Gibert, SVP Payment Card Business Line at Gemalto. "The new software working in harmony with their power-efficient T-Shape sensor, gives us maximised performance which, combined with the optimised and secure design of our biometric card, provides a market leading solution for our customers. With Fingerprints, we are bringing stronger, faster and more seamless authentication to payment cards." Fingerprints' T-Shape module is optimised for integration into smartcards using established manufacturing processes. The module's ultra-low power consumption means that cards do not need a battery, and its superior biometric performance ensures both security and convenience for cardholders. To ensure privacy, storage of biometric templates and image matching is conducted securely on the card, ensuring data never leaves consumers' control. Strong authentication to contactless payments We are looking forward to seeing the first biometric cards in consumers' hands, adding strong authentication to contactless payments""This is a turning point for biometric payment cards," says Thomas Rex, SVP Business Line Smartcards at Fingerprints. "Working with Gemalto, the leader in EMV Payment cards & digital security, is a gratifying collaboration and the recognition that our technology can meet their strong requirements in terms of performance. We are looking forward to seeing the first biometric cards in consumers' hands, adding much-needed strong authentication to contactless payments without impacting the user experience." This initial order comprises a few hundred thousand sensors to be delivered during 2019 and 2020 and is not, in itself, financially significant in relation to Fingerprints' total revenues. However, this is the first volume order in the biometric smartcard industry, which strengthens Fingerprints' view that the global market for biometric payment cards is about to materialise.
HID Global, a provider of trusted identity solutions, announces that its IdenTrust Enterprise Solution has been certified compliant with SAFE-BioPharma Association’s digital identity and signature standards, paving the way for the association’s global member companies to confidently deploy the solution. SAFE-BioPharma Association was created by the biopharmaceutical industry and its regulators, and the standards developed are now used to provide global high-assurance identity trust for cyber-transactions throughout the pharmaceutical and healthcare community. Two-factor authentication We are pleased to have certified our IdenTrust Digital Certificates with SAFE-BioPharma standards" Pharmaceutical and healthcare companies can use HID IdenTrust digital certificates to provide digital credentials that improve the user experience enhance patient safety and allow for secure access to websites, networks, systems or applications with strong, two-factor authentication, which is critical for regulatory compliance and countering cyberattacks. The digital certificates also support advanced security use cases, including data encryption and digital signing capabilities. “We are pleased to have certified our IdenTrust Digital Certificates with SAFE-BioPharma standards.” said Brad Jarvis, Vice President and Managing Director, Identity & Access Management, with HID Global. “With our IdenTrust digital certificates along with our portfolio of HID identity and access management products, we look forward to helping SAFE-BioPharma members and the wider pharmaceutical and healthcare communities to solve challenges they face related to regulatory compliance, end-user authentication, digital signing, interoperability and data protection.” Binding digital signature HID Global’s IdenTrust digital certificates can be used by pharmaceutical companies and healthcare organizations to secure applications with two-factor authentication thereby increasing overall information security when compared to more traditional, password-only protection. HID Global’s IdenTrust digital certificates enable digital signing of clinical trial information to regulatory bodies, such as the United States Federal & Drug Administration (FDA). This method of creating digital signature(s) is integral to processes and practices in the pharmaceutical and healthcare industry Additionally, SAFE-BioPharma compliant IdenTrust digital certificates can be used to digitally sign electronic documents to create a legally binding digital signature. This method of creating digital signature(s) is integral to processes and practices in the pharmaceutical and healthcare industry, such as digitally signing ePrescriptions for controlled substances in compliance with Drug Enforcement Agency’s (DEA) rules for creating Electronic Prescriptions of Controlled Substances (EPCS). Personal health information Of course the same IdenTrust digital certificates can also be used for more traditional uses such as to secure emails, strong user authentication, smartcard logon, and data protection both in transit and at rest. “Knowing who is accessing systems or signing documents is critical in the healthcare industry where the impact of a mistake or malicious action can have serious implications for patient safety or create serious risks to healthcare companies who must protect personal health information,” said Matt King, Director, SAFE-BioPharma Association. “SAFE-BioPharma is pleased that HID Global’s IdenTrust solution is now available to our member companies who can benefit from HID Global’s experience and industry leadership."
It has been announced that next year will see IFSEC move to a brand-new dateline of 19 - 21 May and welcome three prestigious events alongside it at ExCeL London; Security & Counter Terror Expo (SCTX), Ambition and Forensics Europe Expo. Focal point for security industry Building on a rich history of the two exhibitions - IFSEC steeped in the trade and commercial security world and Security & Counter Terror Expo immersed in national security – the collaboration of these key events has been designed to meet the strength of demand for a central focal point for the security industry. The additional synergies between the first responder focused, Ambition and Forensics Europe Expo, which currently run alongside SCTX, and FIREX International as well as the wider security community, also lend additional diversity and strength to this new alliance. Extensive security products on display ExCeL London will become the global destination for the security community, pushing the boundaries of security product innovation and expertise ExCeL London will become the global destination for the security community, pushing the boundaries of security product innovation and expertise. 38,000 trade, commercial, public and policing security professionals will unite at one venue to discover the most extensive range of security suppliers on offer. In doing so, the industry will see a single marketplace for the security ecosystem made up of installers, government end users, corporate end users, integrators, manufacturers and distributors. The announcement of the move to stage IFSEC and SCTX together at London’s ExCeL from 2020 is already being warmly welcomed, as the security industry look forward to seeing one sole event for the whole community. “This has come at the perfect time for the security industry. The BSIA are excited to be supporting this major new partnership between the UK’s two leading security exhibitions. We have a long-standing partnership with IFSEC and we look forward to extending our welcome to SCTX.” Mike Reddington, CEO, BSIA Dahua Technology to participate in IFSEC, SCTX “Dahua is excited to see this partnership between IFSEC and SCTX in 2020. It will provide a rewarding balance of end-users, consultants, installers and integrators. This presents a fantastic opportunity for likeminded end-users and integrators to exchange ideas with manufacturing security professionals.” Steve Norman, Sales Director, Dahua Technology UK & Ireland “Risk UK, Benchmark and Professional Security Installer welcome the news that Security & Counter Terror Expo is running alongside IFSEC in 2020. We have a long-standing association with this market sector via Risk UK magazine and associated media. We look forward to supporting SCTX and IFSEC in 2020.” Mark Quittenton, Managing Director, Risk UK, Benchmark and Professional Security Installer Magazines Hikvision to take part in SCTX and IFSEC 2020 Hikvision are pleased to hear the news that IFSEC and Security & Counter Terror Expo will run alongside each other in 2020" “Hikvision are pleased to hear the news that IFSEC and Security & Counter Terror Expo will run alongside each other in 2020. This is a good move forward for the security community, and we look forward to supporting this.” Justin Hollis, Marketing Director, Hikvision UK & Ireland “IFSEC is always a great success for BRE Global / LPCB and we’re looking forward to showcasing the dynamic Attack Testing Zone to the SCTX and IFSEC 2020.” Richard Flint, LPCB Physical Security Certification Scheme Manager, LPCB / BRE Global security industry to attend “IFSEC never stops surprising me. Great move for the whole security industry, getting SCTX alongside IFSEC in 2020. It’s going to be a massive set of shows.” Roy Cooper, Managing Director, Professional Security Discussing this move for the market, the organisers of IFSEC and SCTX share their thoughts as they announce the culmination of these 18 month-long discussions to co-locate these events. “The security industry is both broad and complex – and in recent years Clarion and UBM have come to realise that in this environment both IFSEC and SCTX had evolved in ways which were seeing them become increasingly complementary in both profile and audience.” said Tim Porter of Clarion Events. SCTX 2020 to be global Counter Terror arena This is a great fit for IFSEC as it strengthens our message of the critical nature of security as a major global issue" ‘’SCTX is by far the most prestigious and market leading event in the counter terror arena, with a proven track record in drawing a high calibre audience of government specifiers, law enforcement and related crime intelligence agencies.” added Gerry Dunphy of IFSEC. “This is a great fit for IFSEC as it strengthens our message of the critical nature of security as a major global issue. IFSEC will also highly complement this offering by continuing to champion integrated security for the trade and commercial markets. The prospect of these events, working in harmony, promoting expertise and guidance for the broader security environment has already been met with immense anticipation by the security community.” Bringing the events together will offer exhibiting manufacturers and distributors an unrivalled opportunity to access the entire end-to-end security audience, with a greater number of security product buyers in one venue than any other security event across the globe. Over 600 exhibiting companies will join to represent all aspects of the security sector, ranging from the latest developments in commercial and corporate security through to critical national infrastructure and policing.
Iris ID, global provider of iris recognition technology, and GenKey, a trusted provider of biometric identification solutions, has announced the integration of iris recognition cameras and matching engine into GenKey’s biometric ID platform, to provide an all-in-one solution for various biometric registration and verification initiatives. Advanced security and privacy Iris ID iCAM TD100 and iCAM T10 cameras and IrisAccelerator matching engine have been integrated into GenKey’s ID solutions. GenKey’s ID platform has helped many governments and organisations to improve inclusivity, reduce fraud and improve time and cost efficiencies. IrisID, the world’s most deployed iris recognition platform, provides advanced security and privacy, which further enhances GenKey’s ID platform. “GenKey’s ID platform is being used to identify and verify millions of people in several countries worldwide,” said Arnd Langguth, chief operating officer, GenKey. “We are experts in fingerprint biometrics, but our ID platform has been designed for multi-modality. Our customers expect proven, secure, high performance, that is why we choose IrisID. IrisID’s IrisAccelerator will plug-in seamlessly into our ID platform.” Iris ID biometrics authentication systems The integration into Genkey’s ID platform now offers full deduplication on both modalities" The Iris ID technology provides a fast, accurate and non-contact method of capturing citizens’ biometrics, identifying people and detecting duplicates. Iris ID authentication systems are used worldwide for access control, time and attendance checks, national ID programs, border crossings, voter registration, and many other applications. The company’s solutions are currently being used by public and private organisations across Africa and on five other continents. Mohammed Murad, vice president of global sales and business development, Iris ID said the company’s technology is a natural fit with GenKey. Integration with GenKey biometrics ID platform “Our cameras are unaffected by dirt, grease, gloves, facial hair and other factors that can limit the quality of registration and identity verification of other biometric systems.” he said. “In addition to its speed and accuracy, our software has been proven to be highly effective for deduplication – the elimination of multiple registrations by the same person. The integration into Genkey’s ID platform now offers full deduplication on both modalities.” GenKey’s ID platform is designed for capturing biographic and biometric data of individuals in small to large-scale registrations and ensuring that each subject stored is unique. Besides its standard registration, verification and reporting modules, the software has customised modules for biometric voter verification, election management and biometric member verification for healthcare, and other use cases.
The industry faces numerous challenges in the coming year. Physical and cyber security threats continue to become more complex, and organisations are struggling to manage both physical and digital credentials as well as a rapidly growing number of connected endpoints in the Internet of Things (IoT). We are witnessing the collision of the enterprise with the IoT, and organisations now must establish trust and validate the identity of people as well as ‘things’ in an environment of increasingly stringent safety and data privacy regulations. Meanwhile, demand grows for smarter and more data-driven workplaces, a risk-based approach to threat protection, improved productivity and seamless, more convenient access to the enterprise and its physical and digital assets and services. Using smartphone apps to open doors Cloud technologies give people access through their mobile phones and other devices to many new, high-value experiencesEnterprise customers increasingly want to create trusted environments within which they can deliver valuable new user experiences. A major driver is growing demand for the ‘digital cohesion’ of being able to use smartphone apps to open doors, authenticate to enterprise data resources or access a building’s applications and services. Cloud technologies are a key piece of the solution. They give people access through their mobile phones and other devices to many new, high-value experiences. At the same time, they help fuel smarter, more data-driven workplace environments. With the arrival of today’s identity- and location-aware building systems that recognise people and use deep learning analytics to customise their office environment, the workplace is undergoing dramatic change. Improved fingerprint solutions Cloud-based platforms and application programming interfaces (APIs) will help bridge biometrics and access control in the enterprise, overcoming previous integration hurdles while providing a trusted platform that meets the concerns of accessibility and data protection in a connected environment. At the same time, the next generation of fingerprint solutions will deliver higher matching speed, better image capture quality and improved performance. The next generation of fingerprint solutions will deliver higher matching speed, better image capture quality and improved performance Liveness detection will ensure that captured data is from a living person. Biometrics authentication will also gain traction beyond access control in immigration and border control, law enforcement, military, defence and other public section use cases where higher security is needed. Flexible subscription models Access control solutions based on cloud platforms will also change how solutions are deployed. Siloed security and workplace optimisation solutions will be replaced with mobile apps that can be downloaded anywhere across a global ecosystem of millions of compatible and connected physical access control system endpoints. These connections will also facilitate new, more flexible subscription models for access control services. As an example, users will be able to more easily replenish mobile IDs if their smartphones are lost or must be replaced. Generating valuable insights with machine learning Machine learning analytics will be used to generate valuable insights from today’s access control solutionsEducation, finance, healthcare, enterprise, and other niche markets such as commercial real-estate and enterprises focussed on co-working spaces will benefit from a cloud-connected access control hardware foundation. There will be a faster path from design to deployment since developers will no longer have to create an entire vertically integrated solution. They will simply add an app experience to the existing access control infrastructure. New players will be drawn to the market resulting in a richer, more vibrant development community and accelerated innovation. Data analytics will be a rapidly growing area of interest. Machine learning analytics will be used to generate valuable insights from today’s access control solutions. Devices, access control systems, IoT applications, digital certificates and location services solutions, which are all connected to the cloud, will collectively deliver robust data with which to apply advanced analytics and risk-based intelligence. As organisations incorporate this type of analytics engine into their access control systems, they will improve security and personalise the user experience while driving better business decisions.
Consolidation persisted in the physical security industry in 2018, and big companies such as Motorola, Canon and UTC continued to make moves. Also among the mergers and acquisitions (M&A) news in 2018 was a high-profile bankruptcy (that ended well), continuing consolidation in the integrator market, and the creation of a new entity called “LenelS2.” Here’s a look at the Top 10 M&A stories in 2018: 1. Motorola acquires Avigilon Motorola Solutions announced in February that it had entered into a definitive agreement to acquire video surveillance provider Avigilon in an all-cash transaction that enhances Motorola Solutions’ portfolio of mission-critical communications technologies. Avigilon products are used by a range of commercial and government customers including critical infrastructure, airports, government facilities, public venues, healthcare centers and retail. The company holds more than 750 U.S. and international patents. 2. UTC Climate, Control & Security buys S2 Security UTC Climate, Controls & Security agreed in September to acquire S2 Security, a developer of unified security and video management solutions. UTC subsequently combined S2 with its Lenel brand to create LenelS2, “a global leader in advanced access control systems and services” with “complementary strengths.” 3. Costar Technologies acquires Arecont Vision after bankruptcy Arecont Vision, the provider of IP-based megapixel camera and video surveillance solutions, announced in July that the acquisition by Costar Technologies, Inc. of its assets had been approved by the bankruptcy court. After the closing of the sale, the company began operating as Arecont Vision Costar, LLC and is part of Costar, a U.S. corporation that designs, develops, manufactures, and distributes a range of products for the video surveillance and machine vision markets. 4. Allegion acquires access control company ISONAS Allegion plc, a security products and solutions provider, agreed in June to acquire ISONAS through one of its subsidiaries. ISONAS’ edge-computing technology provides access control solutions for non-residential markets. ISONAS' devices – like its integrated reader-controllers – utilise power over ethernet, making them easy to install and cost effective as they utilise existing customer infrastructures. The company is based in Boulder, Colo. 5. HID buys Crossmatch for Biometrics HID Global announced that it had acquired Crossmatch, a provider of biometric identity management and secure authentication solutions, from Francisco Partners. Crossmatch’s portfolio of products includes biometric identity management hardware and software that complement HID’s broad portfolio of trusted identity products and services. 6. BriefCam announces acquisition by Canon BriefCam, a global provider of video synopsis and deep learning solutions, announced its acquisition in May by Canon Inc., a global digital imaging solutions company. The addition of BriefCam to Canon’s network video solutions products portfolio complements the Canon Group’s previous acquisitions of Axis Communications and Milestone Systems. 7. Allied Universal acquires U.S. Security Associates Allied Universal, a security and facility services company, finalised its acquisition of U.S. Security Associates (USSA) in October, further building on its position in the security services industry. This acquisition includes Andrews International (including its Government Services Division and Consulting and Investigations and International Division) and Staff Pro. 8. Johnson Controls acquires Smartvue Corp. Johnson Controls announced in April that it had acquired Smartvue, a global IoT and video provider that empowers cloud video surveillance and IoT video services. The addition of the Smartvue cloud-based video platform will enhance Johnson Controls’ offering of an end-to-end, smart cloud-based solution that can provide superior business data and intelligence to customers and added value to partners. 9. ADT acquires Red Hawk Fire & Security (and others) ADT Inc.’s acquisition of Red Hawk Fire & Security, Boca Raton, Fla., was the latest move in ADT Commercial’s strategy to buy up security integrator firms around the country and grow their footprint. In addition to the Red Hawk acquisition, announced in mid-October, ADT has acquired more than a half-dozen security system integration firms in the last year or so. 10. Convergint Technologies continues to acquire Convergint Technologies announced in August the acquisition of New Jersey-based Access Control Technologies (ACT), bringing further electronic security systems experience to Convergint's service capabilities. Convergint has strategically grown its service footprint across the United States, Canada, Europe and Asia Pacific through strong organic growth and the completion of 18 acquisitions since early 2016. And it continues: Convergint announced acquisition of SI Technologies, Albany, N.Y., in November and Firstline Security Integration (FSI), Anaheim, Calif., in December. (And Convergint itself was acquired in February by private equity group Ares Management.)
Whether you are a veteran in the access control world or have never installed a card reader before, there are always ways to increase profits in the ever-evolving world of access control. The hope is that by considering a few key focal points, you can find ways to increase market share. Whether we are releasing an electronic lock through a simple intercom button or using biometric and multi-authentication based on a database; the tactics for bringing on more revenue is the same. Learning to focus on a few key items can help open up opportunities. Business access controls Understanding vertical markets is a strong strategy for success in increasing your profits with access controlIf you are new to access control, it’s important to determine the right product offerings for your business model and experience level of your team. Mistakes in estimating or installing can be costly and complex. Take advantage of manufacturer training both online and in the classroom for both your sales team and installation department. It’s important to understand the fire and building codes in your area to make sure you design the proper solution for your customers. Furthermore, understanding the products, components and proper wiring can save you money in labour and materials. Today we will look at four focus points: vertical markets, cloud-based access control, technology upgrades, and preventative maintenance and service agreements. These four focal points are simple to implement and can be easily added to your current operation. Vertical markets Understanding vertical markets is a strong strategy for success in increasing your profits with access control. The concept is that understanding a certain vertical and their security needs can increase your sales team’s marketability. If you spend your time focusing on the healthcare industry, for instance, you will see that HIPA requirements open doors for selling access control. Getting to know the regulatory concerns of different verticals is a great strategy for more effective sales Having logs of who entered your HR files room or patient records storage is a crucial part of addressing privacy concerns. Getting to know the regulatory concerns of different verticals is a great strategy for more effective sales. Another example could be apartment communities or other multifamily dwellings. In this competitive marketplace, these complexes are looking for ways to stand out in their market. Knowing this and being able to offer amenities like secured locks with Bluetooth credentials that tenants can open with their smartphones is a selling point for you and for your customer. Building on each customer you contact within a vertical is like free sales and marketing training. The more you learn from each potential client, the more you increase your conversation starters for the next potential client. Cloud-based access control With the growing cloud-based access control market, integrators can find more opportunities in small businesses and vertical markets that typically wouldn’t be on the radar of your sales team. A typical card access system often makes the move from the traditional lock and key systems to electronic card access cost prohibitive. This is due to the large upfront costs for a server, software and annual licensing. With cloud access, integrators can offer less expensive upfront costs with low monthly subscription fees that cover all software updates, database backups, security patches and more. The real benefit for the integrator is the reoccurring revenue. By helping our clients save money on server, software and IT infrastructure costs, we are securing reoccurring revenue for our companies that increase our profitability. Building reoccurring revenue not only provides cash flow but also keeps your name on the top of the minds of your customer and that leads to additional sales. By helping clients save money on server, software and IT infrastructure costs, we are securing reoccurring revenue for companies that increase profitability Technology upgrades Another often overlooked opportunity is technology upgrades. Training your sales staff and even service technicians to watch out for clients with older technology can reap major benefits. When you bring new technology to your clients, you show another value that you bring to the table. Even if your client isn’t ready to make an upgrade, you can easily plant a seed that will get their minds and budgets rolling. An easy example is a customer with an older intercom door access system An easy example is a customer with an older intercom door access system. This may have met their needs 10 years ago when it was installed, but the office has grown and perhaps an integrated card access intercom system is a great technology upgrade. Bringing this to the customer will once again show that you are the “subject matter expert” and your customer will be more apt to refer you to their friends and colleagues. Another easy way to find technology upgrades is to dig through your ageing client list and build a list of potential targets that you have not visited lately. If you keep records of what was installed previously, it will make it easier to plan ahead and bring solutions to your next visit, saving your sales staff time and again building confidence with your clients. Preventive maintenance and service agreements One thing that sales teams often miss is the opportunity to add service agreements and preventative maintenance agreements. Even if a customer already has an access control system, they may not have a service provider and may be interested in securing a service agreement. Typically, a service agreement can be written to cover all parts and labour or just labour for an annual feeShowing the value of a service agreement is paramount, adding annual or semi-annual preventative maintenance to your service agreement is one way to add value. Inspecting locking mechanisms, request to exit motions and buttons, door status switches, headend equipment, batteries and power supplies, can save your customer from a costly after-hours service call or the inconvenience of a non-functioning access control system during business hours. Additionally, checking computer hardware and software logs for errors can save a customer from a catastrophic failure. Typically, a service agreement can be written to cover all parts and labour or just labour for an annual fee. It is helpful to come up with a percentage of the install value that makes sense so that your sales team can easily quote a service agreement for your customer. Offering several levels of service also opens the table for negotiations. You can offer an “all parts and labour 24/7” or a “parts and labour M-F 8AM-4PM”, as an example. Offering guaranteed response times can also be a marketing strategy. Critical area access management Checking computer hardware and software logs for errors can save a customer from a catastrophic failureA 24-7 facility that has 200 employees moving in and out of critical areas may be a great potential customer for a high-level service agreement with semi-annual preventative maintenance and a guaranteed 4-hour response time. Where a small office that is only open during standard business hours may be better suited for a labour only M-F with annual preventative maintenance inspection. The point is that a creative, intentional, and focused approach to access control can yield the fruit that brings long-term success to your team. Building a plan and learning from each prospect, sale, and installation will develop a process that brings results. Attending a trade specific expo like ESX will give you the opportunity to meet with manufacturers and other integrators that can help you implement a product offering and strategy for success.
More good news for exhibitors on the second day of the Global Security Exchange (GSX) in Las Vegas. Brisk attendance continued early in the day, and then slowed somewhat in the afternoon, but most comments from exhibitors were positive. Exhibitors such as Lenel were “thrilled” with the show, and noticed the steady, good traffic and lots of sales leads. Lenel’s position at the front of the hall probably helped. New developments in mobile credentialing are a big trend at GSX, and Lenel’s BlueDiamond mobile credentials are traveling on a new path, so to speak. The access control company is introducing the idea of “Pathways” as a way of automatically signaling intent to a Bluetooth-enabled smart phone to open a door. A recognisable “pathway” is programmed into the phone, based on signals from nearby readers and locks and also geolocation signals. The system recognises when a user travels along the pathway and automatically signals the correct door(s) to be opened along the way without the user having to touch his smart phone.A recognisable “pathway” is programmed into the phone, based on signals from nearby readers, locks and also geolocation signals Providing a lightweight alternative “When you trigger a pathway, it’s signalling intent to open the door,” says Greg Berry, Vice President Mobile Credentialing, Global Security Products, for United Technologies, parent company of Lenel. “Pathways are customised to a user’s needs and are the common places you are going all the time.” A user who walks the same path daily to the door of an office will find that door opens automatically. Previously using mobile credentials has been “slightly more work than using a badge,” says David Weinbach, Manager of Identity and Product Innovation for Lenel. “Now with Pathways, it’s less work than using a badge.” Specifically, a user no longer has to take out his phone and push a button to signal intent. “Rather than trying to emulate the badge, you create an experience that is better than the badge,” adds Berry. “We want to change the paradigm and turn the market on its ear.”New browser-based clients are being released with each new version of OnGuard software Other news from Lenel includes the release of more mobile and browser-based clients for OnGuard to be used for greater convenience alongside the Window-based clients. Providing a “lightweight” alternative enables some of the functionality of the Windows client in a format that is easy to access on the go. New browser-based clients are being released with each new version of OnGuard software. Cloud-hosted systems using Microsoft Azure are also among the plans for OnGuard, which ultimately will offer on-premises and cloud options. There’s not much comment from the Lenel folks about their parent company United Technologies’ plan to acquire S2 Security, which was announced days before the show. They would only say that the acquisition is waiting for regulatory approval, and that the expectation is that the two companies’ products will be complementary, given S2’s focus on the SMB (small and medium-sized business) market and Lenel’s strength at the enterprise level. The acquisition strategy is to grow both businesses. More details to come about the new combined company. Modern network infrastructure NVT Phybridge, a PoE connections company located near the back of the hall, also reported steady booth traffic on Day 2. “There are lots of customers and partners here,” said Steven Fair, Executive Vice President. “We are pleased with the quality of people, but not overwhelmed with the quantity.” FacePRO AI facial recognition is used for real-time searches of terror suspects or criminals throughout a location NVT Phybridge, which provides IP networking products for the telephony industry as well as security, is focused on networking concepts at GSX, in particular the changing requirements for network infrastructure in the age of IoT. We are pleased with the quality of people, but not overwhelmed with the quantity.” Fair uses the term “Modern LAN” to describe the new, changing requirements and in consideration of the specific networking needs of each edge device, whether cameras, sensors, or door access control devices. “Start with the edge device — what does it need from the network? What are its needs and have there been any innovations to enable you to connect to the network more economically?” asks Fair. There is also a green aspect to designing network infrastructure. Can existing equipment, such as coaxial or single twisted-pair cabling, be used, and thus save on disposal costs of the used cabling as well as lowering installation costs? Among NVT Phybridge’s offerings that can serve the changing networking needs in the IoT era is Smart Path PoE, which offers smart power, smart network access and secure connections. The CLEER family of products provides ethernet over existing coaxial cabling to enable easy transition from analogue to IP cameras. The PoLRE products supply ethernet and power to travel over a single unshielded twisted pair cable with reach over 400 metres. The products have been used recently to transition a series of cruise ships from analogue to IP video without having to replace cabling and spending only two days in dry dock for the installs. A new focus away from AI Panasonic is looking to apply AI-based capabilities to vehicle recognition in the near future, with the ability to identify vehicle characteristics Deep learning and artificial intelligence (AI) seem to be taking a lower profile at this show, perhaps signaling the end of the hype. Companies that mention AI point to specific products that use the technology and are currently available. For example, Panasonic is featuring its FacePRO AI-based facial recognition system. The system uses face images captured from video — grabbing up to 30 to 35 faces a second as video is recorded. The system saves the best of those face images, eliminating extensive duplication, as thumbnails, which are linked to the video footage where the faces appear. To find video in which a face appears, the operator merely drags-and-drops the thumbnail image and commands the system to “go fetch” video that contains that face. The system then produces a timeline showing where the face appears in the feed from each video camera on the premises, so an operator can track the movements of a suspect throughout a facility. The tool helps to simplify and shorten the workflow of locating a suspect in real-time and is affordable for a wider range of uses beyond the traditional airports or high-end applications. The FacePRO software is offered on any Panasonic camera, and works with a separate FacePRO server that is integrated with the video recorder. The system can be added easily to existing systems and is useful for such applications as real-time searches for terror suspects or other criminals throughout a location. Panasonic is also looking to apply AI-based capabilities to vehicle recognition, too, in the near future, with the ability to identify vehicle characteristics such as color, type of vehicle and direction of travel. On the VMS side, Panasonic is transitioning its Video Insight software to a modular approach, tailoring solutions for a growing range of vertical markets, such as transportation and retail, all using “plug-ins” that enhance operation of Video Insight software. No additional license fees are involved That’s just a sampling of what I saw on Day 2 of the show. I have more to share in a final show report, including what I see tomorrow on the final (shortened) day.
Several recent terrorist and mass violence attacks have been directed at soft targets, or relatively unprotected locations where people gather such as outside a music venue or in the unscreened passenger areas at airports. Attacks in public areas have led to the development of new security technologies aimed at protecting soft targets. One company addressing the challenges is Evolv Technology and its Edge automated high-speed personnel screening solution. The system integrates walkthrough firearm and explosive detection for high-throughput protection of events and soft targets.The Edge system has multiple detection sensitivity settings to respond to various threat scenarios Enhanced visitor experience The system seeks to increase security without compromising the ‘customer experience’. People simply walk through single-file – between two 5-foot-tall stanchions. One lane can screen up to 800 people per hour, and the system detects explosives or metallic objects without the need for pat-downs or wands or other invasive procedures. Any personal belongings can remain in visitors’ pockets. A single security guard is needed for each lane to verify any detected threats. “The system combines an improved security posture with a better visitor experience,” says Mike Ellenbogen, CEO of Evolv Technology. “We need to fly and have been trained to be screened at the airport, but we don’t expect to be screened going to see a ball game or a Mozart concert. Evolv recognised a need for a new way to inspect people before they enter these types of facilities. It’s a seamless system that pulls various technologies together. We want to feel safe but without having to sacrifice the quality of the experience.”Screening analytics provide data on the numbers of people screened by time of day and by result The system combines millimetre wave and magnetic field sensors, along with artificial intelligence (AI)/ machine learning and can incorporate additional data such as biometrics. Known bad actors can be identified using facial recognition. The system has multiple detection sensitivity settings to respond to various threat scenarios. Expanding perimeter protection A security guard provides the human touch by verifying any threats detected by the system. The locations of concealed items are displayed on a photo of the individual using a color-coded box overlay. Screening analytics provide data on the numbers of people screened by time of day and by result. Ellenbogen says the company is working to have the system adopted at entertainment venues, performing arts centres, sports centres, for air and rail transportation, and to protect high-profile government buildings. The Edge system can expand the protected perimeter to a wider area that was previously unprotected. The Edge system can expand the protected perimeter to a wider area that was previously unprotected For example, concert-goers exited the arena of an Ariana Grande concert May 22, 2017, in Manchester, U.K., and entered the surrounding area that was unscreened and unsecured. Placing a user-friendly screening system around a wider perimeter outside the concert venue might have prevented the use of an improvised explosive device in the terrorist attack.Placing a user-friendly screening system around a wider perimeter outside the concert venue might have prevented the use of an improvised explosive device in the terrorist attack Threat mitigation with soft target approach Likewise, a 2016 bombing at the Brussels Airport occurred in the departure hall outside the passenger screening areas. Securing a wider perimeter – for example, screening customers discreetly as they enter the airport building from a parking area – could have provided additional security against such an attack. Ellenbogen confirms Evolv has sold a number of systems to major European airports to screen visitors and passengers as they enter the front door. “Addressing the threat to an airport or train system is different than screening passengers; we are looking for different types of objects and different types of materials. The idea is to be able to detect threats to a venue before they get into the venue.” The soft target approach can also be applied to public buildings, such as courthouses, and used in lieu of more invasive metal detectors and x-ray machines. The portability of the Edge system enables a ‘pop-up’ approach to security – i.e., to relocate the system to address specific or changing security threats easily. The self-contained system only requires a wall plug. Labour reduction (because of faster throughput) can help offset the system costs but it’s difficult to quantify the improvement in the visitor experienceImproving security posture at event venues “It’s surprising the level of importance [venue owners] put on the visitor experience,” says Ellenbogen. “They see that their brand starts at the front door. They are eager to find alternative security solutions that come across as more inviting, less imposing, less closed down, less invasive than the solutions they have been using,” he says. “They are driven by a desire to improve the visitor experience as they improve the security posture.” He says current events, including terrorist attacks and mass shootings, drive awareness among venue owners to improve the security of soft targets. “The level of interest is high, and it spikes somewhat when there is a big headline,” Ellenbogen says. He notes that the system is more expensive than a metal detector, but about a third the cost of familiar airport body scanners. Labour reduction (because of faster throughput) can help offset the system costs, but “it’s difficult to quantify the improvement in the visitor experience,” Ellenbogen says.
The European Union has spelled out specific requirements and safeguards for handling and protecting personal data. In the General Data Protection Regulation (GDPR), the EU makes clear exactly what is expected of those who control and process data. (The United Kingdom has committed to follow the regulation despite the Brexit vote.) Everyone is facing a deadline on May 25th 2018 to comply with the GDPR. What are the exact implications for the physical security market? What do customers need to do to ensure they are compliant? These are urgent questions, given that the clock is already ticking. The GDPR’s implications are especially timely considering the physical security industry’s current emphasis on the value and importance of data. The growing value of data was a big topic at the recent IFSEC show in London. The industry is looking for new ways to leverage data for benefits in a company beyond the security department. New cybersecurity responsibilities One example is access control data: Who is granted access to which door and more generally, how do employees move throughout an enterprise? This is information that can be useful to managers, whether to analyse facility usage trends or promote more efficient operations. Access control data is especially valuable when combined with other data in an organisation, such as human resource (HR) and accounting records. It provides more data points that a company can use in overall metrics to guide business operations. But as the GDPR emphasises, the value of data and the ability to leverage data come with new responsibilities, specifically a need to protect privacy. This includes a need for additional cybersecurity of networked systems, another current “hot topic” in the market and historically a weak, or at least under-addressed, point for the industry. The GDPR applies to “personal data,” but its detailed definition includes digital information such as IP addresses and a range of personal identifiers. Sensitive personal data, such as biometric data used to uniquely identify an individual, is in a “special category.” Physical security systems collect plenty of personal data, some of it critical and sensitive, including an employee’s PIN code, fingerprints, or even video footage. GDPR impact on physical security Other areas that might impact the physical security industry include requirements to provide information about any transfers of data to other countries outside the EU and the retention period of data and criteria used to determine the retention period. There is also a “right to erasure” that provides an individual a right to have personal data erased if it is “no longer necessary in relation to the purpose for which it was originally collected/processed.” Physical security systems collect plenty of personal data, some of it critical and sensitive, including an employee’s PIN code, fingerprints, or even video footage In the accountability section of the regulation, companies are required to implement “appropriate technical and organisational measures” to ensure and demonstrate compliance. In the category of “data protection by design”, there is a general obligation to “implement technical and organisational measures to show that [a company] has considered and integrated data protection into processing activities.” It is even more reinforcement to the need for more cybersecurity. Data protection by design The GDPR endorses the use of approved codes of conduct and certification mechanisms to demonstrate compliance, including codes created by trade associations or representative bodies. There may be an opportunity for organisations in the physical security market to step in and create such guidelines and to clarify best practices as they relate to our market’s technologies. In the category of “data protection by design,” physical security system manufacturers should include data protection and security from the ground floor as they are designing new products. Based on several recent conversations, I can say with confidence that these concerns are definitely on the minds of many in our industry. But concerns aren’t necessarily answers, and time is short to fully comply with GDPR by the deadline. And the issue isn’t limited to Europe; multi-national companies that do business in Europe, or even cloud systems that store data there, are also impacted. And even beyond GDPR, data protection is an urgent concern around the world. It’s time to step up.
As increasing digital engagement powers forward in the hospitality industry, SALTO Systems has joined forces with the KeezApp technology platform to offer hotels an unrivalled guest experience. Property management systems The KeezApp platform provides a range of solutions for any property that hosts guests and is able to integrate with most PMS (Property Management Systems) on the market. Guests can check in from anywhere, receiving a virtual key straight to their smart phone and getting an alert when their room is ready for occupation. The front desk is then alerted when the guest has used the mobile key to enter their room even for doors equipped with offline electronic locks. The virtual app provides for access to all permitted areas of the hotel during their stay and when the time comes to check out, guests can again use KeezApp removing the need to queue at reception. KeezApp – SALTO software integration KeezApp has implemented JustIN Mobile key access technology and interfaced it with SALTO front desk management software ProAccess SPACE Additional tools include live chat with the front desk. This provides a better, more efficient way for guests to talk and interact with the front desk whether they are in the hotel or out and about. Guests can also choose different departments to contact such as reception, concierge, housekeeping or room service depending on their needs. KeezApp has implemented JustIN Mobile key access technology and interfaced it with SALTO front desk management software ProAccess SPACE. SALTO Hospitality add-ons include functionalities such as mobile keys (BLE), group check-in; real-time re-rooming and real-time extended stay. These plus other key hotel features make it easy to control all the offline and online rooms and back-of-house doors from different front desk guest workstations. SALTO electronic locks Both companies are driven by the opportunity for hotels to provide a superior guest experience to their clients, whether by offering mobile functionalities or superior management standards like quick check-in and check-out, online billing, live chat with reception, housekeeping and concierge or auto Wi-Fi connection for guests. SALTO welcomes new partnerships with industry leaders like KeezApp that will result in improved hospitality management and the guest experience. SALTO also continuously adds integrations with other technology providers so that those in the hospitality industry have a choice when it comes to which platform, they use to control SALTO’s robust line of electronic locks and supporting products.
Integrity Security Group is using SmartTask’s SmartForms to gain added visibility and dramatically cut down on its administrative burden. Having adopted the employee scheduling and mobile workforce management software last year for the provision of proof of attendance, control room management and staff rostering, the company is now using its electronic data capture functionality to streamline a range of operational processes. Initially, SmartForms are being used for vacant property and mobile patrol inspections as well as daily vehicle checks, already saving more than 15 hours of admin a month. SmartTask SmartForms The SmartForms replace previous paper-based processes that were increasingly difficult to manage by the office-based admin team “We are now using the SmartTask SmartForms to help reduce administration, capture critical work data and enforce health and safety procedures,” explains James Chittil, General Manager at Integrity Security Group. “We are constantly looking at clever ways to take advantage of the software’s rich functionality, so we can continue to simplify and enhance the way we operate.” The SmartForms replace previous paper-based processes that were increasingly difficult to manage by the office-based admin team. All reporting for vacant property and mobile patrol inspections – for both scheduled patrols and alarm activations – are now completed using a SmartTask-enabled smartphone. By electronically capturing all relevant information, including photo evidence, Integrity can quickly provide customers with a status update and details of all undertaken work as well as respond to any identified issues. Vehicle checks and fleet management Meanwhile, daily vehicle checks for Integrity’s fleet of vans are now completed using a specially-developed SmartForm, so the company can instantly see if drivers are complying with this health and safety procedure. Any vehicle-related problems or damage can be raised by the driver and actioned immediately by the admin team to mitigate fleet risk. Mileage data is also captured through the software, enabling maintenance requirements to be tracked and scheduled at appropriate intervals. “The SmartForms are enabling us to dramatically reduce paperwork and remove manual processes. This is making it much simpler for both our security officers in the field and our office-based admin team to capture, collate and communicate essential operational data. This is not only helping us make better use of our valuable resources, but also enhance the service we are providing to customers,” added James Chittil. Paul Ridden, CEO of SmartTask commented: “Our experience within the security sector means we are continually developing new functionality that overcome real-world problems for our customers. This is the reason we are working in partnership with a growing number of security businesses who recognise the value they can gain and the benefits they can achieve from using the SmartTask software.” Integrity selected SmartTask to replace an outdated time and attendance system, enabling it to effectively monitor the whereabouts and welfare of staff Lone worker protection Integrity selected SmartTask to replace an outdated time and attendance system, enabling it to effectively monitor the whereabouts and welfare of staff as part of its commitment to lone worker protection. The company is also using the intelligent rostering functionality to streamline internal planning processes, while the interactive dashboard supported the launch of a dedicated, out-of-hours control room operation by providing a live view of all scheduled shifts and expected or missed check calls. SmartTask is an advanced and simple-to-use employee scheduling and mobile workforce management solution that enables security companies to better plan and manage their workers, so they are at the right place, at the right time. The cloud-based software solution combines intelligent rostering, live monitoring and integrated proof of attendance across both static and mobile teams, making it the ideal tool to improve operational control, enhance customer satisfaction, and support duty of care to staff.
Losing keys is a given. It’s just something that happens at some point. One study in the UK estimated around 10,000 annually end up just in the refuse, by mistake*. At CROUS Montpellier student accommodation block in southern France, they sought a solution to lost keys and the other hassles of managing an outdated mechanical master-key system for a large facility with a transient population. Aperio wireless locking devices CROUS Montpellier fixed lost key problems by exchanging their mechanical locks for Aperio cylinders. Aperio wireless locking devices with built-in RFID readers are already trusted at universities all over Europe to protect staff, students and assets against burglary and unauthorised intruders. Easy-to-fit Aperio locks have transformed facility management for the accommodation block. To date, 1,500 wireless Aperio cylinders are seamlessly integrated online with their ARD security system, which gives facility managers an overview of block security in real time. Aperio cylinders integrated with ARD security system Now, when a student loses their key-card, it’s simple for a site manager to cancel the old credential and issue a new one. There is no need to engage a locksmith to replace physical locks, saving everyone’s time and CROUS money. A constant drain on resources has been eliminated. Aperio easily integrates with payment and other smart-card systems, as well as access control Because Aperio integration at CROUS is online, managers block lost credentials quickly using the software, without visiting the door. It is just as easy to de-authorise credentials for students who leave, even if they forget to return their smart-card. An operator simply removes them from the system database, and they are locked out. Aperio-access control system integration Aperio easily integrates with payment and other smart-card systems, as well as access control. “Aperio provides a comfortable access solution. Our students can access their accommodation, use the printer and pay in the canteen with the same card,” explains Cyril Combacal at CROUS Montpellier. Because Aperio is easily scalable and can expand any security system when needs change, investments in new wireless locking can be rolled out over time. It has made logistics and budgeting much easier for CROUS. Refurbishment at CROUS Montpellier is ongoing: up to 500 new Aperio cylinders are installed efficiently and wirelessly every year.
Primark, the international retailer that offers Amazing Fashion at Amazing Prices, is using Traka’s dock door and intelligent management solutions to ensure maximum efficiency and safety across its warehouse and distribution centres. Primark operates from eight distribution centres. Its most recent opening was in Islip, Northamptonshire, UK covering 1.1 million sq. ft. of space – the equivalent of 17 football pitches. It has 13 miles of aisles and is a 24/7 operation powered by over 250 committed employees. A key part of Primark’s success is its efficient distribution of goods to store to meet growing customer demands. This is a complex operation involving the use of a wide range of technology. Traka DockSafe door dock solution To ensure effective turnaround times, Traka’s multifunctional DockSafe door dock solution was installed to stop vehicles prematurely leaving Goods Out Bays, alongside intelligent key management systems. Traka supports Primark’s distribution centres with its DockSafe solution and key management systems" David Flavell, Primark’s Operations Development Manager – Supply Chain said: “Primark’s products fly off the shelves and rails, so we need to get our products from suppliers to stores as quickly and as safely as possible. Implementing the Traka DockSafe has been critical here. Not only is it simple to use, but also provides data on driver activity and bay usage, as well as increased peace of mind thanks to the prevention of driveways. It ensures the system runs like clockwork, which is great news for our colleagues whilst working hard to deliver Amazing Fashion to our customers.” DockSafe combination with iFob technology Traka’s intelligent DockSafe solution has been exclusively designed to stop vehicles prematurely leaving the Goods Out bays of a busy distribution centre. DockSafe combines Traka’s iFob technology with a unique Susie lock to create a robust protocol where a vehicle must be immobilised prior to the loading dock door being opened. Once goods are loaded, the door must be closed and the loading bay clear of forklifts or personnel, before the vehicle can be unlocked and driven away. Steve Bumphrey, UK Sales Director added: “Traka supports Primark’s distribution centres with its DockSafe solution and key management systems. With advanced features and data reporting, it ensures its people can optimise loading bay planning for long-term efficiency and productivity, in a safe and secure working environment.”
A chain of one-stop shopping destination is one of the pioneers of discount shopping center in the UAE and Dubai. With a selected chain of suppliers, they offer the widest choices of products at very affordable prices. The products of this retail chain range from daily food items to beauty products and perfumes. Household items such as kitchenware, tableware, appliances, decors and electronics including mobile phones and computer accessories are also available here. The store offer apparels such as ladies wear, menswear, and children’s wear, in addition to shoes, bags, school and office supplies. Branches of this retail chain are located in more than eight locations with the one in Sharjah being the biggest branch till date. Easy attendance management Since branches of this retail chain are spread across UAE, managing attendance of every employee became a tedious task. Moreover, keeping track of each of their IN and OUT timings, overtime, leaves, and shift management for multiple locations from a single location was another challenge the retailer faced. Attendance management, multiple shift management and over time calculation became tricky challenges to deal with. Apart from that, they required specific type of reports to map everything department or location wise. Matrix offered its dynamic range of biometric hardware products along with the software solutions to complement the devices Matrix offered its dynamic range of biometric hardware products along with the software solutions to complement the devices. As the retail chain is an exponentially growing company building stores at several locations, Matrix offered its Time-Attendance module along with fingerprint and card based door controller, COSEC DOOR FOT. This solution assisted in easy attendance management of employees along with their shift and overtime management. Analysis of employees’ attendance The solution also allowed generation of several specific types of reports with detailed filtering options for smooth process and analysis of employees’ attendance details. Matrix People Mobility Management solution assisted the retail chain achieve following results: Centralised Attendance Management and Monitoring Easy Shift & Schedule Management Elimination of Overtime Issues Smooth HR Process with Various Precise Reports The products used for providing solutions: COSEC DOOR FOT - Fingerprint and Card based Door Controller for Time-Attendance COSEC CENTRA ME - Application Server Platform with 500 or more Users and Expandable up to 1,000 Users COSEC ME TAM - Time-Attendance Module for 500 or more Users COSEC USER100 - User license for 100 users
Globally-renowned Pay on Foot parking systems manufacturer, DESIGNA, has worked with the White Rose shopping centre in Rhyl, North Wales, to update its car parking system to the company’s advanced ABACUS software and equipment. Contactless card payment The installation included new state-of-the-art entrance and exit terminals accepting tap in/tap out contactless card payment technology After many successful installations abroad, the shopping centre is the first DESIGNA site in the UK to have installed its new tap in/tap out contactless credit card technology. The installation included new state-of-the-art entrance and exit terminals accepting tap in/tap out contactless card payment technology. There are also three full pay stations, a DBS server, manual pay station and intercom. All of this helps improve the efficiency and security of the car park, which is popular with shoppers due to its seafront location. As the first part of the shopping experience, the convenience and availability of a car park is crucial to the overall service and satisfaction of a customer. DESIGNA recognised this and developed ABACUS, an advanced car park access system that intelligently integrates various elements to create the ultimate system that is highly reliable and requires less maintenance. It can also cope with large volumes of traffic while providing the highest level of monitoring to ensure a secure parking environment. ABACUS car park access system The parking system is barrier controlled and makes use of DESIGNA barcode ticket technology. In addition to the standard ticket technology, the car park offers the facility to tap in/tap out using a contactless credit card. This operates with a unique identifier from the credit/debit card as a substitute for a ticket for the duration of the stay at the car park. When the customer presents a contactless card on entry, it recognises them and by tapping again at the exit it automatically calculates the tariff and allows payment to take place at the exit. The system has three pay on foot machines which accept coins, notes and credit cards. With more than 30 stores, White Rose shopping centre, Rhyl’s number one shopping destination, has a wide range of quality stores. Located in the centre of the town, White Rose is a short walk from Rhyl’s seafront, railway station and sea aquarium, and has direct access car parking for 300 vehicles. The centre previously had a chip coin solution installed on site. Advanced ticket machines The biggest advantage of having the DESIGNA system in place is the easy payment method" Sue Nash, Centre Manager at the White Rose commented, “The biggest advantage of having the DESIGNA system in place is the easy payment method. The advanced ticket machines make it possible to pay using several means, therefore reducing the problem of queuing at the pay machines and having to pay with change. Another payment option we now have is the facility to pay through mobile devices and via contactless cards.” She continued, “The majority of people move around with credit cards rather than cash and having a versatile payment option in the car park makes for a painless process. The maintenance of the system at our local level was extremely important to avoid costly and timely engineer callouts. Simple things like ticket and coin jams, system resets are now extremely easy to resolve as is the exchange of entry tickets when required. I would certainly recommend the DESIGNA system to others and we are extremely pleased with the results.” Car parking ease and convenience Specifier Andrew Bailey, of Parking Ideas, commented, “Parking Ideas is a complete car parking and transportation consultancy that helps institutions, property owners, landlords and managing agents develop and optimise their assets. I have worked with the White Rose shopping centre for a number of years and following a competitive tender found that DESIGNA’s systems best suited the client’s requirements.” He continued, “The ABACUS system is good value, commercially viable and ticked all the right boxes for the White Rose. It is very important to have the facility to pay by card, so the payment terminals having this feature are vital to the centre and have made all the difference to the running of the car park. Parking Ideas has been in the parking industry for more than 15 years, so we have worked with DESIGNA before and are very happy with the end result.” DESIGNA ticket terminals The car park’s entrance and exit are installed with DESIGNA In+ and Out+ ticket terminals so that using the site is fast and easy The car park’s entrance and exit are installed with DESIGNA In+ and Out+ ticket terminals so that using the site is fast and easy. The advanced terminals operate on the lowest energy consumption of their class with the ability to hold more tickets than before, with the bin adapting itself to the fill quantity. Customers are greeted with excellent user-friendliness due to the simplicity of the equipment and illuminated display with clear instructions. The four-way barcode readers also ensure visitors can insert their ticket any way round into any of the pay stations around the site. DESIGNA Pay on Foot machines For payment, three of DESIGNA’s new Pay on Foot machines are in place in the car park. This allows customers to pay for their visit before returning to their car and exit the car park more quickly. The pay station is deliberately designed to allow disabled customers to pay freely without assistance. Each of the pay stations is installed with an interactive monitor that makes it easy to pay and offers several different languages. Shopping centre management has full control of the ABACUS system through the DBS server, with a manual pay station (MPS) to allow them to create or override payments. The control room also links with the ticket and payment terminals via a DESIGNA VoIP Intercom to assist customers if required. Global implementation DESIGNA has more than 15,000 systems installed globally across a wide range of car park situations DESIGNA’s parking systems are used in a number of impressive shopping centres around the world. These include the Dundrum shopping centre in Dublin, the Mid Valley Megamall in Malaysia and the Mall of Emirates in Dubai. In the UK the Belfry shopping centre in Redhill, the Woolshops shopping centre in Halifax and the Wellgate centre in Dundee have also benefited from the ABACUS system. Recognised worldwide for its high quality and intelligent systems, DESIGNA has more than 15,000 systems installed globally across a wide range of car park situations, including shopping centres, airports and hospitals. ABACUS is one of the company’s innovations and demonstrates the endless possibilities available to car park operators. The future-proof technology allows for expansions of premises or new property acquisitions by allowing additional systems to be added to the network. In its many global applications, ABACUS has proved to be an effortless system for both operators and users and is a great investment for companies looking to the future.
Round table discussion
The concept of how security systems can contribute to the broader business goals of a company is not new. It seems we have been talking about benefits of security systems beyond “just” security for more than a decade. Given the expanding role of technologies in the market, including video and access control, at what point is the term “security” too restrictive to accurately describe what our industry does? We asked the Expert Panel Roundtable for their responses to this premise: Is the description “security technology” too narrow given the broader application possibilities of today’s systems? Why?
Even the most advanced and sophisticated security systems are limited in their effectiveness by a factor that is common to all systems – the human factor. How effectively integrators install systems and how productively users interface with their systems both depend largely on how well individual people are trained. We asked this week’s Expert Panel Roundtable: What is the changing role of training in the security and video surveillance market?
Finding the exact right technology to solve an end user’s problem is challenging, but the rewards are great when an integrator gets it right. A wide range of available product types, price levels and added features increases the likelihood of identifying a technology to solve any problem. But with so many technology and product choices in the marketplace, identifying that one solution can be akin to finding a needle in a haystack. We wondered whether a vast range of product choices is always a good thing. We asked this week’s Expert Panel Roundtable: Are security integrators and end users overwhelmed by “too many choices” related to security equipment and systems? How can they make sense of it all?
Gallagher Mobile Connect App is a unique mobile security application with optional two-factor authentication