Airspace security technology pioneer Dedrone has been awarded certification from the UK’s Centre for the Protection of National Infrastructure (CPNI) for its counter-drone technology platform DroneTracker. DroneTracker detects, tracks, and identifies drones by using multi-sensor capability combining RF, radar, and optical sensors. The new CPNI drone detection standard is the first official validation of counter-drone technology. It enables organisations deemed to be of critical national i...
Swedish smart home technology specialists, Minut, led by former senior executives at Apple and Google, today announces the availability of its easy to install, all-in-one wireless smart home alarm in the UK. The Minut alarm will be distributed in the UK by smart home specialists Thames Distribution and is available from Minut.com and Amazon UK for £129. Minut believes that every home should feel safe and has executed on the vision to make home security smart, simple and accessible for eve...
Meesons, UK’s entry control innovator, will be unveiling its innovative EasyGate Superb at this year’s International Security Expo (ISE19), Olympia London, 3-4 December, stand K40. At 99mm the EasyGate Superb cabinets are the slimmest of any Speed Gate on the market, accentuating the sleek, minimalistic aesthetics created by the glass wings. EasyGate Superb is an ultra-slim, fully customised Speed Gate that is an ideal solution for controlling access to offices, schools, universities...
The Face Recognition Company (FRC) has announced that its multi-camera face-recognition security product is to be unveiled for the first time at the International Security Expo in London. The company, which has been in stealth mode for three years, has developed the world’s first ultra-accurate facial recognition security system, optimised for commercial businesses. Available in January 2020, its first product is designed to provide enhanced security for retail and commercial premises or...
A new partnership between Nedap Security Management and biometric security specialist Recogtech has made highly secure palm vein recognition technology available for a much wider audience. Recogtech’s Palm-ID and Palm-ID card have been integrated with Nedap’s AEOS access control system. Which enables Nedap clients worldwide to use both technologies (based on palm vein recognition technology) in combination with AEOS. This verified partnership was cemented once Nedap’s access c...
Suprema ID., global provider of biometrics and ID solutions, has announced that the company would showcase a wide range of global partner's solutions integrating its World's slimmest FAP20/FAP30 fingerprint authentication scanners at TRUSTECH 2019 in Cannes, France on 26-28 November 2019. Live Finger Detection The partner's solutions include Sleek Android Tablet/POS, Rugged Windows 10 Capturing Terminal, and Programmable Fingerprint Keyboard. All products have adopted Suprema ID's latest techn...
Matrix is gearing up for participation in the 13th edition of The International Fire & Security Exhibition and Conference (IFSEC) India. The company will be demonstrating their latest Time-Attendance and Access Control device COSEC ARGO along with People Mobility Management and Video Surveillance solutions. At the event, Matrix will be showcasing COSEC ARGO, their performance, design and engineering wonder, equipped with an enhanced IPS LCD touchscreen for a visually splendid experience. The addition of Gorilla glass ensures enhanced toughness. This device has higher processing speed, wall and flush mounting options, and increased fingerprint and event storage capacity. It is specifically designed for serious Time-Attendance and Access Control applications. Standalone Access Control solution Their enterprise grade IP Cameras – NETRA will also be exhibited at the event. Furthermore, this device offers connectivity options like Bluetooth, Wi-Fi, PoE, and USB. Last but not the least, IP65 and IK08 certifications make it suitable for challenging and outdoor installations. Our solution experts will be demonstrating the Standalone Access Control solution and exhibiting the Aadhaar Enabled Biometric Attendance system as well. They will also elaborate their cloud based Time-Attendance solution. Matrix Video Surveillance solution experts will be talking about the company’s Parking Management solution, which is known to easily solve parking woes faced by organisations. Their enterprise grade IP Cameras – NETRA will also be exhibited at the event. NVRX - PARAM, Matrix’s Network Video Recorders, and SAMAS - Video Management System will be highlighted at the event too. Advanced Security solutions “IFSEC is South Asia’s largest security, civil protection and fire safety show, which in turn provides us with a platform to expand our ties with industry experts and system integrators. The event also serves as a great stage for highlighting our well-engineered solutions. We aim to use this opportunity to expand our network and spread the word about our technologically advanced Security solutions,” commented Vihar Soni, Marketing Manager, Matrix Comsec.
Suprema ID., globally renowned provider of biometrics and identity solutions, has announced that its best-selling RealScan Series, including RealScan-G10 and RealScan-D are now compatible with secunet biomiddle. secunet biomiddle platform The secunet biomiddle is an intermediate platform for biometric systems and eIDs The secunet biomiddle is an intermediate platform for biometric systems and eIDs, enabling the modular use of biometric system components and card readers in various biometric or eID applications. Both functions are provided via one interface. Biometric hardware- and software-components are embedded and used by the secunet biomiddle via an integrated BioAPI 2.1 framework, according to ISO/IEC 19784-1. The secunet biomiddle communicates with client applications via a SOAP interface, which makes the middleware independent of system platforms and programming languages. Therefore, the secunet biomiddle is easily and quickly integrated into existing infrastructures and already the linchpin in many regulatory and border control projects. Fingerprint Live Scanners “It is our great pleasure having achieved integration of our proven Fingerprint Live Scanners into the secunet biomiddle, a reliable platform for many opportunities that are currently ongoing. With its award-winning live fingerprint detection based on deep-learning and versatile performances offering Multi-OS (operating system) for various environments, it is expected that we could join various global projects simultaneously such as the Biometrics based EU Entry-Exit System (EES) for Stronger and Smarter Borders for the European Union using secunet biomiddle that is recognised internationally as the reference implementation and preferred architecture for the use of biometrics in connection with official ID documents,” said Bogun Park, CEO at Suprema ID. Suprema ID is a globally renowned provider of biometrics and ID solutions. By combining the world’s renowned biometric algorithm with superior engineering, Suprema ID continually designs and develops high-tech identity products and solutions. Suprema ID’s extensive range of portfolio includes fingerprint enrollment scanners, fingerprint authentication scanners, fingerprint embedded modules and ePassport readers.
BIRD Aerosystems, the developer of Airborne Missile Protection Systems (AMPS) and Airborne Surveillance, Information and Observation (ASIO) solutions, will present its AMPS Family of solutions, including the MACS Sensor and the SPREOS DIRCM, at the Quad-A Aircraft Survivability Equipment Symposium 2019 in Huntsville, Alabama. BIRD's AMPS missile protection system provides the most enhanced protection for military and civilian aircraft against the growing threat of ground to air missiles (MANPADS). Electro-optical passive sensors The AMPS family of solutions include the MACS sensor and SPREOS DIRCM: MACS (Missile Approach Confirmation Sensor) sensor performs unique confirmation of suspected incoming missile threats detected by the main electro-optical passive sensors, and ensures zero false alarms - hence only real missiles will be declared by the system and reacted upon. SPREOS (Self Protection Radar Electro-Optic System) DIRCM combines a radar-based confirmation sensor and an active laser jammer to ensure optimal protection against different MANPADS threat types. SPREOS uniquely performs multiple functions, including threat confirmation, tracking and jamming of advanced IR guided missiles. Innovative aircraft survivability equipment ITAR free, BIRD's AMPS solutions are already installed on US Army aircraft. AMPS has also evolved into a standard system for NATO, having been selected and installed on Military, VIP and civil platforms used by NATO members. Ronen Factor, Co-Chief Executive Officer and Founder at BIRD Aerosystems: "BIRD Aerosystems specialises in the development and production of innovative aircraft survivability equipment. "Amongst our leading solutions are the SPREOS DIRCM and MACS sensor, two patented solutions that protect military and civilian aircraft around the world against MANPADS. As a supplier of airborne missile protection solutions for the US Army, NATO and the UN, we are happy to participate at the Quad-A Aircraft Survivability Equipment Symposium, and to present our latest solutions here in Alabama."
Honeywell is expanding its OmniAssure access control reader product line with the launch of the OmniAssure Touch access control solution. OmniAssure Touch provides advanced security against credential cloning and reader tampering, increases operator productivity when deploying mobile credentials, and is interoperable with a range of credential technologies and panel communication protocols. The passive intent access control readers help people get into an area faster – just with the touch of a finger – no swiping of a card or a phone is necessary. “Our customers want the latest in security and protection against growing credential and identity attacks,” said Frédéric Haegeman, business leader for Honeywell Commercial Security, Europe and Novar GmbH. Access control solution “With OmniAssure Touch, users benefit from advanced security and an adaptable platform that strengthens access control in their building. Our goal is to develop a comprehensive access control solution suite so that every user can identify a solution that works best for their business.” OmniAssure Touch provides: Ultra-secure protection: protects against credential cloning and replay attacks with technology that is fully compliant with OSDP Secure Channel Protocol (SCP) and the latest DESFire EV2 encryption standards; readers wipe encryption and certificate data when device tampering has been detected with all form factors available with a capacitive touch keypad for two-factor authentication Exceptional adaptability: features hassle-free, user-friendly mobile credential capabilities that eliminate the need to present a phone to the reader; easy migration from legacy prox to smart and mobile technologies; as well as configure reader settings in the field via mobile app Integrated security suites A comprehensive solution: saves time by deploying mobile credentials directly through Honeywell’s WIN-PAK, WINMAG and Pro-Watch integrated security suites, revokes mobile credentials in real-time, and transforms the way people interact with your building using the Honeywell Vector Occupant App Easy to configure: leverages the Honeywell Utility app which allows installers to configure the readers in the field or wherever they use the app making installation and configuration easier and faster Reliable read/write cards OmniAssure Touch is ideally suited for enterprise and critical infrastructure environments across a wide variety of industries including defense, education, pharma, utilities and financial. The Honeywell suite of OmniAssure readers incorporate smart card technology to manage access control, logical (PC) access, storage of biometric templates, parking, ePurse and many other applications requiring reliable read/write cards.
TAKEX EUROPE LTD, a Japanese manufacturer of active and passive infrared perimeter intruder detection sensors, are pleased to announce the launch of a new 12m x 180 degree dual-zone outdoor PIR sensor with anti-masking technology. Following the success of the MS and OMS series sensors, the newly developed MX-12FAM features the same dual-zone detection system which, requiring simultaneous detection across horizontal and downward zones, prevents nuisance alarms from small animals and passing vehicles. Beyond this core detection principle, TAKEX have added and tuned a host of features and technologies ready for the next generation of intruder detection. A new external appearance with a single colour-matched lens design allows MX-12FAM to blend discreetly within any environment in which it's placed. Sophisticated anti-masking system Front and back tampers can detect interference or attempted theft of the sensor any time of the night or day Beneath the cover the optical heads have been streamlined into fixed, but independent 90-degree left and right sides for up to 180-degrees of complete coverage; still fully configurable from 2m to 12m, with durable area masks now stored conveniently within the device which allow the coverage pattern to be customised to meet specific site requirements. MX-12FAM includes a sophisticated anti-masking system with near-lens awareness designed to expose any attempt to defeat the sensor by obstruction, and initiate a trouble alarm if compromised. Front and back tampers can detect interference or attempted theft of the sensor any time of the night or day for true peace of mind protection, all the time. Dual alarm signal outputs Also included are dual alarm signal outputs, which allow you to choose between individual outputs for each 90-degree left and right side, or a combined 180-degree output plus an external trigger for connecting CCTV or ancillary devices. With a selectable pulse count of 1 or 3, and sensitivity adjustment between 60 to 120%, MX-12FAM is capable of maintaining operational stability in even the most challenging conditions. Additional details including pricing will be announced in local markets at the time of availability.
Under the headline “Start-up since 1919”, EVVA presented the company to journalists from eight countries at a two-day international media event from 13 to 14 November 2019. True to EVVA's innovative spirit, the event started with a start-up tour of Vienna. On the second day, the media representatives were able to participate in an exclusive press conference and tour of the Wienerberg facility where they were given personal insights into the site and a current outlook on future challenges and new opportunities - keyword ‘digitalisation’. In the conference, Stefan Ehrlich-Adám, CEO of the EVVA Group, Michael Kiel, Group Division Executive of Operations and Johann Notbauer, Group Division Executive of Market Innovation and Technology reported on the most important milestones since EVVA was founded 100 years ago. In addition to this, they presented upcoming product and manufacturing innovations and gave an outlook on the future of security technology. Mechanical locking systems Having witnessed constant innovation since its foundation in 1919, the internationally renowned and recognised supplier of high-quality security systems has been successfully combining tradition with innovation for 100 years, making it one of the world’s leading manufacturers of mechanical and electronic locking systems. Stefan Ehrlich-Adám, CEO of the EVVA Group, gave an outline of the company, “Since the company was founded as the ‘Invention, Experimentation and Application Institute’, it has been defined by courageous and forward-looking entrepreneurship and the pursuit of innovation”. EVVA's innovative strength is visible in the invention and patenting of the GPI and MCS mechanical systems A successful example of EVVA's innovative strength - and at the same time an important milestone in the company's expansion - was the invention and patenting of the GPI and MCS mechanical systems, which are still important today, four decades ago. But the permanent further development also continues for the mechanical locking systems. “As patents expire after 20 years, we need to continually develop mechanical locking systems and come up with new ideas.” EHRLICH-ADÁM explains. Electronic locking systems The cultivation with in-house electronic locking systems division on the European market demonstrates EVVA's pioneering spirit. In the 1970s, the Viennese family-owned company EVVA was considered to be the world’s first company in the industry to use computer programs to calculate and control the most complex master key systems. Meanwhile, Xesar and AirKey are well-established on the market and they are a unique solution for the challenges of global megatrends in the security industry. “We had a head start with our in-house development when electronic locking systems were introduced about 25 years ago. And from the very beginning, we had important expertise in the area of mechanical locking systems and to this day we are constantly striving to complement this as well as possible with electronic access control systems. The combination of mechanical locking systems and electronic access control systems is the technically sensible response to the specific security and organisational needs”, said Ehrlich-Adám. In-house research and development We aspire to invent and develop durable, very high-quality products in-house; therefore we have an in-house research and development department, which has grown substantially in recent years. “The engineering is done by us and we decide on the product concept. We know the market, the customers and know which solutions the operators expect”, explained Ehrlich-Adám. EVVA employs around 460 people at the main production facility in Vienna and has rapidly increased its workforce, particularly in the area of electronic systems and software, coupled with ongoing investments in machinery. For EVVA, the transition from mechanical systems to mechatronic systems ultimately means an increased need for technicians and software engineers. “Going forward, we will also invest in staff who are able to assist with installations”, Ehrlich-Adám explained. In addition to securing and creating jobs, the Viennese family-owned company is also pursuing a targeted CSR strategy at the site, which is being implemented through the Clean Production Approach. The proportion of clean production is currently at 60%. EVVA locking systems EVVA locking systems have been installed throughout the world, for instance, on the Queen Mary ocean liner In addition to the main site in Vienna, there are now a total of ten subsidiaries throughout Europe and a network of already over 1,000 electronic and other mechanical locking system sales partners. These are an important factor in our further expansion and international success. Interesting target markets include Southeast Asia and Australia. EVVA locking systems have been installed throughout the world, for instance, on the Queen Mary ocean liner, in Copenhagen's opera theatre, the new Juventus Stadium in Turin, as well as St. Stephen's Cathedral in Vienna. “Our well-developed sales network is one of our greatest strengths. Our core competencies include the project planning, calculation and realisation of large systems,“ Ehrlich-Adám said. Industry 4.0 and excellence In the second part of the conference, Michael Kiel, Head of Operations, outlined EVVA's status and its plans in the area of Industry 4.0. “EVVA does not see Industry 4.0 as just digitalisation, but also a variety of opportunities for its own development of excellence. We have defined four development focus areas for our claim to excellence associated with Industry 4.0: Digitalisation; Automation, Site development Collaborations. Our highest priority has always been, and will continue to be, to bring “the people” with us, through the relevant qualification measures and participation in projects”, Kiel explained. Digitalisation A flagship tool for ‘lived digitalisation’ is EVVA’s Order Fulfillment Tool, which was developed in-house. It provides order support by showing the current status of orders. With the Next Generation Cross Link Production (Xpro) project, EVVA is pursuing several goals: On the one hand, the goal is to create a blueprint for a flexible manufacturing system. To achieve this, in collaboration with TU Vienna, EVVA ‘digitally upgraded’ a machine, adding collaborative robotics to it. On the other hand, we are also accelerating digitalisation in the sense of going “paperless” with drawingless Computer Aided Manufacturing (CAM), which is already in use as a prototype. Automation For EVVA, the mid-term goal is to use ‘digital twins’ to create fully digital models of production to plan and optimise processesFor EVVA, the mid-term goal is ultimately to use ‘digital twins’ to create fully digital models of production to plan and optimise processes and procedures. To achieve this, a digital production plan with simulation and optimisation will be implemented by 2020, as part of the AutProSim research project with the Fraunhofer Institute. “By 2023, EVVA will invest a volume of 20 million euros in shaping the development of excellence, of which two thirds will be spent on high-quality automation solutions”, Kiel explained, adding “We will particularly drive forward new technologies for 3D printing of plastic parts for machine construction and image processing for testing scenarios that are integration into the automation line.” Collaborative robots But EVVA is also increasingly using collaborative robots (cobots) to support employees in simple, monotonous tasks, such as sorting. “Using automation, we can bring certain tasks and consequently orders from low-wage countries back to the Wienerberg facility. Apart from reducing errors and raising the qualification level, cobots will allow EVVA to increase its competitiveness”, Group Division Executive Michael Kiel explained. On the topic of site development, Kiel explained why Industry 4.0 is connected to internationalisation. “As part of our Powerplant Strategy with satellite sites, in the future the three sites of Vienna, Tišnov and Krefeld will become a Powerplant, meaning that they will be production units for the manufacturing of components and automated assembly. In turn, the satellite sites will consist of eight Europe-wide distribution sites for manual assembly of smaller production batches.” By 2023, EVVA plans to have established all Powerplants and satellite sites as a unified process chain. Collaborations EVVA is a co-partner of the Austrian Center for Digital Production on research of end-to-end digitalisation Finally, Kiel outlined the various research collaborations as the fourth development focus area on the path to excellence. For instance, we have worked together with TU Vienna on feasibility studies on the possible ways in which cobots can be used or machine-to-machine communication solutions in production. EVVA and the Fraunhofer Institute are The University of Vienna, in turn, is supporting EVVA in the development and expansion of the centurio.work production platform. Furthermore, EVVA is a co-partner of the Austrian Center for Digital Production (CDP), where, among other things, we are researching end-to-end digitalisation from order placement through to production and delivery. A look into the future “For EVVA, however, the aim of excellence development is not just about continuous development, but about regularly determining our position. For example, next year, EVVA will face the industry benchmark, “Fabrik 2020 – die beste Produktion Österreichs” (Factory 2020 – Austria’s best production),” Kiel concluded. Finally, Johann Notbauer, Group Division Executive of Market Innovation and Technology reported on trends and developments, also based on recent impressions in Silicon Valley at ARM and Microsoft. In his view, the possible scenarios are based on two future technologies: 1. Artificial intelligence (AI) and machine learning, linked to 2. Connectivity. Both topics are also linked to the disruptive changes for the security technology sector. Machine learning According to Notbauer, machine learning will be disruptive, as machines in the future will be “intelligent” – and therefore the processing and evaluation of the continually calculated data will be done by the machines themselves. Various other possible applications arise from linking digital data with physical data. Digital data is generated through the various touchpoints; physical data refers to diverse sensory data. In the future, we will be able to gain an even greater understanding of how end components and entire systems are used by combining these different forms of data in a targeted way. Intelligent systems The calculated algorithm would be able to recognise when and for which component a battery failure will occur" Notbauer described an application example “For instance, for a Xesar system it will be possible in the future for all ‘intelligent’ components to continually measure their own voltage curve and this data could then be centrally evaluated in a ‘neural’ network.” “The calculated algorithm would be able to recognise when and for which component a battery failure will occur. In turn, this optimises the sustainability and maintenance costs of the system and gives the sales department valuable information for a required modernisation of the whole system. The added value and benefit for the customer consists is in “predictive maintenance”, i.e. failure-free operation linked to cost-optimised maintenance”, explained Notbauer. Connectivity The second biggest driver of innovation is connectivity, as a result of the many new opportunities that the game changing 5G has opened up. “5G makes it possible for us to connect production machines directly to the cloud. There is no longer any need for a local programmable logic controller, which is time-consuming to program. This takes place in a central cloud – quickly set up and quickly changed if products or the market demand changes,” explained Notbauer. This trend is called ‘access as a service’. However, despite machine learning and 5G - EVVA will continue to drive forward innovations in mechanical locking systems, in addition to the benefits of new Technologies as there is still a mechanical element at the end of the chain.
Johnson Controls recently unveiled the findings of its 2018 Energy Efficiency Indicator (EEI) survey that examined the current and planned investments and key drivers to improve energy efficiency and building systems integration in facilities. Systems integration was identified as one of the top technologies expected to have the biggest impact on the implementation in smart buildings over the next five years, with respondents planning to invest in security, fire and life-safety integrations more so than any other systems integration in the next year. As advanced, connected technologies drive the evolution of smart buildings, security and safety technologies are at the center of more intelligent strategies as they attribute to overall building operations and efficiencies. SourceSecurity.com spoke with Johnson Controls, Building Solutions, North America, VP of Marketing, Hank Monaco, and Senior National Director of Municipal Infrastructure and Smart Cities, Lisa Brown, about the results of the study, smart technology investments and the benefits of a holistic building strategy that integrates security and fire and life-safety systems with core building systems. Q: What is the most striking result from the survey, and what does it mean in the context of a building’s safety and security systems? The results show an increased understanding about the value of integrating safety and security systems with other building systems Hank Monaco: Investment in building system integration increased 23 percent in 2019 compared to 2018, the largest increase of any measure in the survey. When respondents were asked more specifically what systems they we planning to invest in over the next year, fire and life safety integration (61%) and security system integration (58%) were the top two priorities for organisations. The results show an increased understanding about the value of integrating safety and security systems with other building systems to improve overall operations and bolster capabilities beyond the intended function of an individual system. Q: The survey covers integration of fire, life safety and security systems as part of "smart building" systems. How do smarter buildings increase the effectiveness of security and life safety systems? Hank Monaco: A true “smart building” integrates all building systems – security, fire and life-safety, HVAC, lighting etc. – to create a connected, digital infrastructure that enables individual technologies to be more intelligent and perform more advanced functions beyond what they can do on their own. For example, when sensors and video surveillance are integrated with lighting systems, if abnormal activity is detected on the building premise, key stakeholders can be automatically alerted to increase emergency response time. With integrated video surveillance, they also gain the ability to access surveillance footage remotely to assess the situation. When sensors and video surveillance are integrated with lighting systems abnormal activity on the premise can automatically be detected Q: How can integrated security and life safety systems contribute to greater energy efficiency in a smart building environment? Hank Monaco: Security, fire and life-safety systems can help to inform other building systems about how a facility is used, high-trafficked areas and the flow of occupants within a building. Integrated building solutions produce a myriad of data that can be leveraged to increase operational efficiencies. From an energy efficiency standpoint, actionable insights are particularly useful for areas that are not frequently occupied or off-peak hours as you wouldn’t want to heat or cool an entire building for just one person coming in on the weekend. When video surveillance is integrated with HVAC and lighting systems, it can monitor occupancy in a room or hallway. The video analytics can then control the dimming of lights and the temperature depending on occupant levels in a specific vicinity. Similarly, when access control systems are integrated with these same systems, once a card is presented to the reader, it can signal the lights or HVAC system to turn on. In this example, systems integration can ultimately help enable energy savings in the long run. Security and life safety systems contribute to help enable greater energy efficiency and energy savings in the long run Q: What other benefits of integration are there (beyond the core security and life safety functions)? Hank Monaco: Beyond increased security, fire and life-safety functions, the benefits of systems integration include: Increased data and analytics to garner a holistic, streamlined understanding of how systems function and how to improve productivity Ability to track usage to increase efficiency and reduce operational costs Enhanced occupant experience and comfort Increased productivity and workflow to support business objectives Smart-ready, connected environment that can support future technology advancements Q: What lesson or action point should a building owner/operator take from the survey? How can the owner of an existing building leverage the benefits of the smart building environment incrementally and absent a complete overhaul? Lisa Brown: Johnson Controls Energy Efficiency Indicator found that 77% of organisations plan to make investments in energy efficiency and smarter building technology this year. This percentage demonstrates an increased understanding of the benefits of smart buildings and highlights the proactive efforts building owners are taking to adopt advanced technologies. There is an increased understanding that buildings operate more effectively when different building systems are connected As smart buildings continue to evolve, more facilities are beginning to explore opportunities to advance their own spaces. A complete overhaul of legacy systems is not necessary as small investments today can help position a facility to more easily adopt technologies at scale in the future. As a first step, it’s important for building owners to conduct an assessment and establish a strategy that defines a comprehensive set of requirements and prioritises use-cases and implementations. From there, incremental investments and updates can be made over a realistic timeline. Q: What is the ROI of smart buildings? Lisa Brown: As demonstrated by our survey, there is an increased understanding that buildings operate more effectively when different building systems are connected. The advanced analytics and more streamlined data that is gathered through systems integration can provide the building-performance metrics to help better understand the return on investment (ROI) of the building systems. This data is used to better understand the environment and make assessments and improvements overtime to increase efficiencies. Moreover, analytics and data provide valuable insights into where action is needed and what type of return can be expected from key investments.
Whether you are a veteran in the access control world or have never installed a card reader before, there are always ways to increase profits in the ever-evolving world of access control. The hope is that by considering a few key focal points, you can find ways to increase market share. Whether we are releasing an electronic lock through a simple intercom button or using biometric and multi-authentication based on a database; the tactics for bringing on more revenue is the same. Learning to focus on a few key items can help open up opportunities. Business access controls Understanding vertical markets is a strong strategy for success in increasing your profits with access controlIf you are new to access control, it’s important to determine the right product offerings for your business model and experience level of your team. Mistakes in estimating or installing can be costly and complex. Take advantage of manufacturer training both online and in the classroom for both your sales team and installation department. It’s important to understand the fire and building codes in your area to make sure you design the proper solution for your customers. Furthermore, understanding the products, components and proper wiring can save you money in labour and materials. Today we will look at four focus points: vertical markets, cloud-based access control, technology upgrades, and preventative maintenance and service agreements. These four focal points are simple to implement and can be easily added to your current operation. Vertical markets Understanding vertical markets is a strong strategy for success in increasing your profits with access control. The concept is that understanding a certain vertical and their security needs can increase your sales team’s marketability. If you spend your time focusing on the healthcare industry, for instance, you will see that HIPA requirements open doors for selling access control. Getting to know the regulatory concerns of different verticals is a great strategy for more effective sales Having logs of who entered your HR files room or patient records storage is a crucial part of addressing privacy concerns. Getting to know the regulatory concerns of different verticals is a great strategy for more effective sales. Another example could be apartment communities or other multifamily dwellings. In this competitive marketplace, these complexes are looking for ways to stand out in their market. Knowing this and being able to offer amenities like secured locks with Bluetooth credentials that tenants can open with their smartphones is a selling point for you and for your customer. Building on each customer you contact within a vertical is like free sales and marketing training. The more you learn from each potential client, the more you increase your conversation starters for the next potential client. Cloud-based access control With the growing cloud-based access control market, integrators can find more opportunities in small businesses and vertical markets that typically wouldn’t be on the radar of your sales team. A typical card access system often makes the move from the traditional lock and key systems to electronic card access cost prohibitive. This is due to the large upfront costs for a server, software and annual licensing. With cloud access, integrators can offer less expensive upfront costs with low monthly subscription fees that cover all software updates, database backups, security patches and more. The real benefit for the integrator is the reoccurring revenue. By helping our clients save money on server, software and IT infrastructure costs, we are securing reoccurring revenue for our companies that increase our profitability. Building reoccurring revenue not only provides cash flow but also keeps your name on the top of the minds of your customer and that leads to additional sales. By helping clients save money on server, software and IT infrastructure costs, we are securing reoccurring revenue for companies that increase profitability Technology upgrades Another often overlooked opportunity is technology upgrades. Training your sales staff and even service technicians to watch out for clients with older technology can reap major benefits. When you bring new technology to your clients, you show another value that you bring to the table. Even if your client isn’t ready to make an upgrade, you can easily plant a seed that will get their minds and budgets rolling. An easy example is a customer with an older intercom door access system An easy example is a customer with an older intercom door access system. This may have met their needs 10 years ago when it was installed, but the office has grown and perhaps an integrated card access intercom system is a great technology upgrade. Bringing this to the customer will once again show that you are the “subject matter expert” and your customer will be more apt to refer you to their friends and colleagues. Another easy way to find technology upgrades is to dig through your ageing client list and build a list of potential targets that you have not visited lately. If you keep records of what was installed previously, it will make it easier to plan ahead and bring solutions to your next visit, saving your sales staff time and again building confidence with your clients. Preventive maintenance and service agreements One thing that sales teams often miss is the opportunity to add service agreements and preventative maintenance agreements. Even if a customer already has an access control system, they may not have a service provider and may be interested in securing a service agreement. Typically, a service agreement can be written to cover all parts and labour or just labour for an annual feeShowing the value of a service agreement is paramount, adding annual or semi-annual preventative maintenance to your service agreement is one way to add value. Inspecting locking mechanisms, request to exit motions and buttons, door status switches, headend equipment, batteries and power supplies, can save your customer from a costly after-hours service call or the inconvenience of a non-functioning access control system during business hours. Additionally, checking computer hardware and software logs for errors can save a customer from a catastrophic failure. Typically, a service agreement can be written to cover all parts and labour or just labour for an annual fee. It is helpful to come up with a percentage of the install value that makes sense so that your sales team can easily quote a service agreement for your customer. Offering several levels of service also opens the table for negotiations. You can offer an “all parts and labour 24/7” or a “parts and labour M-F 8AM-4PM”, as an example. Offering guaranteed response times can also be a marketing strategy. Critical area access management Checking computer hardware and software logs for errors can save a customer from a catastrophic failureA 24-7 facility that has 200 employees moving in and out of critical areas may be a great potential customer for a high-level service agreement with semi-annual preventative maintenance and a guaranteed 4-hour response time. Where a small office that is only open during standard business hours may be better suited for a labour only M-F with annual preventative maintenance inspection. The point is that a creative, intentional, and focused approach to access control can yield the fruit that brings long-term success to your team. Building a plan and learning from each prospect, sale, and installation will develop a process that brings results. Attending a trade specific expo like ESX will give you the opportunity to meet with manufacturers and other integrators that can help you implement a product offering and strategy for success.
Considering how much the modern smartphone has become a common everyday tool and cultural icon, it’s hard to believe it has only been with us for a relatively short space of time. The first Apple iPhone was launched in 2007 and yet in a little over a decade the smartphone has become as essential as our keys or wallet. From its conception as a multi-faceted communications device, it has morphed into something far more integrated in our daily lives. Services such as Apple Pay, Android Pay and PayPal have seen the smartphone become a credible replacement for cash and cash cards, but equally, it is possible to replace access cards and keys as well.Smartphones can easily receive authentication credentials remotely and access can be confirmed or denied instantly The ability to accurately authenticate an individual and the applications this offers for security purposes, is something that the security industry needs to continue to embrace and further promote to our customers. Considerable advantages Most security professionals understand the potential benefits of using mobile device authentication, with flexibility being the key advantage. Smartphones can easily receive authentication credentials remotely and access can be confirmed or denied instantly. Equally, smartphones already contain many secure options to ensure they are only used by the authorised user – fingerprint and face recognition, as well as pattern authentication and PIN, being prime examples. Unfortunately, there is still a lack of awareness amongst some security operators, customers and the public of these exciting benefits. Potentially there may also be some reluctance, in certain quarters, to trusting a mobile device with physical security. A lack of trust in seemingly ‘unproven’ technology is not unusual, but the security industry needs to demonstrate reliability along with the considerable security and convenience benefits of using it. Trusted part of security network Many smart devices already securely bind the mobile device with the right person by using 2-factor authenticationMobile device security needs to earn its trust, in much the same way as any other new ground-breaking application. In fairness to the doubters, it’s not hard to imagine how much of a risk a badly protected mobile device could be to any secure network! There are two key obstacles that smartphones need to clear before they can become a trusted part of the security network though. Firstly, that they are secure enough to be trusted as part of a security network, and secondly that they can reliably identify an authorised user in a real-world environment. Many smart devices already securely bind the mobile device with the right person by using 2-factor authentication. For example, this could combine a PIN code with the fingerprint or face of the authorised individual. In areas with particularly high security, you could also implement a wall-mounted biometric reader (fingerprint, facial recognition or iris scan) to add a further level of protection and ensure there is no wrongful use of the mobile device. Security tokens or access cards are typically rigid in their programming, only allowing access to certain areas Security by location With its many and varied functions, undoubtedly one of the most useful systems on any smartphone is its GPS location tracking. It’s also a perfect tool to assist with security systems interaction.A benefit of using smart device authentication is the cost savings over operating traditional tokens Consider any secure facility – it will feature different levels of access. This can vary from a humble canteen and break-out areas, right through to secured doors around potentially dangerous or highly sensitive areas - such as plant rooms, or even a nuclear facility! Security tokens or access cards are typically rigid in their programming, only allowing access to certain areas. A smartphone, however, can be granted or denied access depending on the location of the request by the individual – GPS literally adds a level of extra intelligence to security. Personal items Using QR codes seem to be a simple but reliable identity and access control authentication option Mobile devices tend to be guarded and protected with the same concern as your money or your keys. Many of us literally carry our mobile device everywhere with us, so they are relatively unlikely to be misplaced or lost – certainly in comparison to a key card for example. Also, think about how often you use or hold your smartphone – some estimates suggest 2,600 times each day! With that level of interaction, you’ll be aware very quickly if it’s been misplaced, not least because of the inconvenience and cost to replace it. This level of personal connection makes it perfect for use with security systems. Cost savings Another obvious benefit of using smart device authentication is the cost savings over operating traditional tokens. No more plastic badges, access cards, lanyards, printers and consumables used to administer security. This is something the security industry really needs to shout about! It will come as no surprise to hear that smartphones are exceptionally common too. Figures suggest that in 2015 there were nearly 41m in use in the UK and this is predicted to rise to 54m by 2022. With the UK population being just over 65m, that is a very high percentage of people already carrying this technology. Using a resource that people already have, and which is highly secure, makes unquestionable financial as well as practical sense. GPS location tracking is a perfect tool to assist with security systems interaction Integrated technology Agreeing on common and shared open protocols has unfortunately been one of the stumbling blocks for the security industry in adapting to a predominantly smartphone authentication approach. NFC (Near Field Communications) technology in mobile phones and smart devices has failed to be the universal success it promised.Not everyone has an iPhone, but it is such an important segment of the market for customers Mobile technology trends have dictated to the systems that use it. Apple’s earlier (Pre iOS 11) decision to restrict the use of NFC to Apple Pay on its devices has had a profound effect on the implementation of NFC in other applications too. Not everyone has an iPhone, but it is such an important segment of the market that other manufacturers are wary of how customers will be able to use any new technology. We have seen a much bigger focus on using Bluetooth Low Energy technology on mobile devices instead. With providers such as HID Global, STid in France and Nedap in the Netherlands now concentrating on developing Bluetooth Low Energy readers and mobile credential applications, this seems like a highly credible alternative. Along with NFC and Bluetooth Low Energy options, there also seems to be a lot of interest in using QR codes as simple but reliable identity and access control authentication. These can easily be displayed on a screen or printed if necessary, giving great flexibility over the type of technology that is used in the future. Upgrading existing security systems There are strong arguments for many businesses to continue using MIFARE+ systems if they suit operations well We are steadily seeing the signs of smartphone authentication replacing the cards and tokens we have been familiar with. However, many consumers still want options rather than to just be railroaded down one path. A business that has invested in cards or tokens will want to use that technology investment fully. The changes will come when readers are updated – this is when security specifiers and installers need to promote the advantages of dual-technology readers, which offer options to include smartphone authentication into the mix. There is still considerable diversity amongst smart devices, the operating systems they use, and the security technology employed by each. Android, Apple iOS and Blackberry devices all vary with regards to the biometric authentication available, so security administrators may need to be flexible on the types of authentication they accept. Interestingly, card technology has also progressed at an astonishing speed too – with MIFARE+ proving to be a highly cost-effective, practical and secure system that can easily be integrated. There are strong arguments for many businesses to continue using these systems if they suit operations well. NFC (Near Field Communications) technology in mobile phones and smart devices has failed to be the universal success it promised Hybrid systems A hybrid approach may be the best answer for many security operators. This means those who choose to enjoy the benefits in terms of flexibility and convenience of smartphone authentication can do so, whilst those who are more hesitant can continue to use more traditional methods. A hybrid approach may be the best answer for many security operators Larger organisations may find that the swap over is a slower and more gradual process, whilst smaller start-up businesses may prefer to jump to a smartphone-based approach straight away. If security systems are well integrated but modular in their approach, then it becomes much simpler to evolve as time goes on. Embracing the benefits Using their app-based systems architecture, smartphones are ideally placed to evolve with security systems in the future. There are many benefits for the security industry and our customers, but we need to remember that this move will involve a culture change for many security operators and users. The security industry needs to be mindful and respectful of any anxiety, but also be positive and promote the considerable benefits mobile authentication offers.
When violence or a life-threatening incident occurs, hospitals and other healthcare institutions are often in the crosshairs. Hospitals increasingly face a reality of workplace violence, attacks on patients, and threats to doctors and other support staff. And even if violence happens outside a hospital – such as an active shooter at a public place – the local hospital must be prepared to respond to an influx of injured victims. When conflicts arise inside a hospital, there is an urgent need to lock the facility down quickly. Security professionals and their teams need access control options that allow lockdowns to occur at the touch of a button. Lockdown capabilities are an important aspect of safety and security for hospitals, doctor’s offices and medical facilities The need for mass notification is also growing in the healthcare environment Fire alarm public address system The need for mass notification – another aspect of responding in an emergency – is also growing in the healthcare environment. Various systems can communicate through the fire alarm public address (PA) system to notify people in an emergency, or, alternately, to use email notification, text messaging, pagers, smart phones and/or personal computers (PCs). In lockdown situations, access control systems provide an emergency button with various triggers in the system – a hospital can lockdown specific units or the entire facility. Data capture form to appear here! Jim Stankevich, Global Manager – Healthcare Security, Johnson Controls/Tyco Security Products, points out that the safety of hospital staff, particularly nurses, cannot be overlooked. In the emergency room, 55 percent of nurses are assaulted in some way each year, which is a high percentage. The safety of nurses and all hospital staff deserves more attention. Duress/emergency notification technology Stankevich says one solution is to use duress/emergency notification technology: staff can carry and wear a ‘panic button” or have a two-key combination on their computer as an alarm trigger. When the staff member hits the panic button, a direct message can be sent to security, alerting security staff about the event and requiring a response. There has been an increase in demand for the safety and security of patients, staff and visitors at healthcare institutions, as evidenced by the recent CMS (Centers for Medicare and Medicaid Services) Emergency Preparedness Rule. As of Nov. 17, 2017, healthcare institutions that participate in Medicare or Medicaid must demonstrate compliance with the rule. Emergency preparedness systems A major challenge in compliance to this rule is balancing patient safety with comfort At its core, the rule seeks to establish national emergency preparedness requirements to ensure adequate planning for both natural and man-made disasters, and coordination with federal, state, tribal, regional and local emergency preparedness systems. A major challenge in compliance to this rule is balancing patient safety with comfort. Institutions should consider two-way communication that enables leadership to disseminate targeted messages quickly and efficiently, while arming all employees with a tool that can alert the appropriate staff should an incident occur. Solutions like this enable swift communication of issues without disturbing patients and visitors unless necessary. Effective response to emergencies “Fortunately, hospitals and their security departments are generally well equipped to respond to most emergency situations”, said John M. White, president/CEO of Protection Management, a consultant who works with hospitals to address their security needs. During the Ebola scare in 2014, however, hospitals had to re-examine their plans to ensure they were prepared to meet the challenges specific to rare and deadly disease. “Hospitals are prepared for most things, but Ebola seemed to have caught the whole world off guard, so people responded in different ways,” says White, who previously was security director of two multi-campus medical facilities before becoming a consultant. Hospital security Hospitals made adjustments to their emergency programs to determine how best to handle Ebola patients" He adds, “Hospitals made adjustments to their emergency programs to determine how best to handle Ebola patients and to protect other patients and staff. It was a new threat that healthcare organisations had not specifically addressed.” A particular concern was the possibility of an infected person walking into an emergency room and infecting other people and/or requiring facility decontamination. One role the hospital security department plays in such an emergency is to control access to the facility and to control visitors’ movements once they are inside the facility, says White. If the Ebola scare had progressed to the point that a hospital would need to screen patients, security would be positioned at the front entrance to help with that screening and, if necessary, to direct patients to a specific area for quarantine. Protective equipment Security might also need to wear protective equipment to handle a patient who is resistant to treatment, for example. There are often interactions between security personnel and the general public, a scenario that becomes more complicated if Ebola or a similar infection is likely. In general, security would be tasked with maintaining order and keeping people where they need to be, freeing up the medical professionals to do their jobs more efficiently, says White. To prepare for the impact of the Ebola scare, hospitals addressed various training and equipment needs and adjusted their disaster/emergency response plans. Read parts two and three of our heathcare mini series here and here.
Gunshot detection today is part of more physical security systems than ever before, and many manufacturers are developing interfaces to the latest gunshot detection technologies. Genetec has integrated ShotSpotter gunshot detection technology into its unified IP security platform, Security Center. Thanks to this integration, police departments and security professionals will be able to receive more actionable information, gain rapid access and detailed location insights when a gunshot situation occurs. Cloud-based analysis software ShotSpotter uses wide-area acoustic surveillance that automatically gets activated when gunfire occurs ShotSpotter uses wide-area acoustic surveillance that automatically gets activated when gunfire occurs, providing comprehensive outdoor coverage on campuses and in complex urban geographies. ShotSpotter sensors and cloud-based analysis software triangulate and pinpoint the precise location of each round fired within seconds, the number of shots fired and provide an immediate gunfire alert with an audio clip. Data capture form to appear here! Detailed incident data is immediately sent to SST’s Incident Review Center (IRC), a secure data processing and alert validation facility, where acoustics experts analyse the data and qualify the incident in real-time 24/7. Once validated, an alert is sent directly into Genetec’s Security Center, all in under a minute. Once the alarm is triggered within Security Center upon gunshot detection, operators can quickly access video and other related data surrounding the location of a gunshot alert, and immediately visualise it on Security Center maps, leveraging the dynamic visualisation capabilities of the Security Center Plan Manager. Genetec has integrated ShotSpotter gunshot detection technology into its unified IP security platform Gunshot identification software Stanley Security has announced a partnership with Shooter Detection Systems LLC (SDS), gunshot detection solutions provider. As an authorised dealer, STANLEY Security is now certified to sell, install and service SDS products and services. SDS’s Guardian Indoor Active Shooter Detection System combines acoustic gunshot identification software with infrared gunfire flash detection for a fully automated gunshot detection and alerting solution. The Guardian System immediately detects gunshots and simultaneously alerts building occupants The Guardian System immediately detects gunshots and simultaneously alerts building occupants and first responders within one second and with zero false alerts. Johnson Controls has announced that its exacqVision video management system now integrates with Databuoy Corp.’s ShotPoint acoustic gunshot detection and localisation system to speed response time and heighten the decision-making process for local responders during active shooter situations. Integrated security systems Johnson Controls has also released the Detect360 Active Shooter Response (ASR) system, combining reliable gunshot detection with notification technology to provide immediate warning when a gunshot is fired within a building. By providing early notification and precise location of the shooter, the ASR system gives occupants time to find safety and allows police and security personnel to mitigate the threat up to 60 percent faster. Detect360 ASR gives first responders information as it develops at the scene, including shot location, number of shots, location of the shooter in near real-time and the ability to remotely monitor the situation through integrated security systems. It also collects forensic information that can later be used by law enforcement. The system supports multiple integration options, including video feeds from existing CCTV and intrusion systems, mass notification systems, access control systems and panic button/manual initiation systems. Detect360 ASR gives first responders information as it develops at the scene Public safety access points Listed as one of the most important new technologies debuted at CES 2019 by the Wall Street Journal and NBC News, Safe Zone also showcased its Safe Zone Gunfire Detector (GFD) at ISC West 2019. Priced at $149 per unit, the Safe Zone Gunfire Detector combines infrared and sound detection technologies with immediate cloud-based data analysis that can analyse more than 3,000 data points of each loud noise that exceeds ambient levels by a certain threshold. The system determines the location of shots fired, the number of shots, and the type Utilising the data from multiple detectors simultaneously, the system determines the location of shots fired, the number of shots, and the type and calibre of gun being used. Within 10 seconds of the trigger pull, an alert is sent to Public Safety Access Points in the appropriate dispatch center, giving local 911 dispatchers all critical information on their computers. Reseller recruitment programme Shot Tracer has launched a reseller recruitment programme with a highly attractive on-boarding proposition for qualified dealers. Qualifying resellers can receive a Gunshot Simulator Kit valued at $1,000 when they commit to becoming a Shot Tracer dealer. Shot Tracer’s Eagle Gunshot Detection System easily integrates with virtually any security, alarm, surveillance and access system via contact closure – or wirelessly via IP integration. In fact, Shot Tracer gunshot detection sensors are as easy to install as a smoke detector, so there’s virtually no learning curve for installing dealers. The new Shot Tracer Reseller Recruitment Program includes an exclusive offer for installing dealers to receive a free Gunshot Simulator Kit, valued at over $1000, which is essential for demonstrating Shot Tracer Eagle Gunshot Detection sensors. Terms and conditions apply for qualifying resellers.
Police in the United Kingdom have been testing the effectiveness of live facial recognition (LFR) for several years now, but future uses of the technology have been called into question. The Information Commissioner’s Office (ICO), an independent authority that seeks to uphold information rights in the public interest, has weighed in on issues of data privacy related to LFR, and Members of Parliament (MPs) have called for a moratorium on uses of the technology. The big question is whether the benefits of LFR outweigh its impact on privacy rights. Live facial recognition I believe that there needs to be demonstrable evidence that the technology is necessary" The House of Commons Science and Technology Committee has expressed concerns about bias, privacy and accuracy of facial recognition systems and urged the U.K. government to issue a moratorium on further live facial recognition trails until regulations are in place to address bias and data retention. According to Elizabeth Denham, U.K. Information Commissioner: “[Police trials of LFR] represent the widespread processing of biometric data of thousands of people as they go about their daily lives. And that is a potential threat to privacy that should concern us all.” Denham says live facial recognition (LFR) is a high priority area for ICO. “I believe that there needs to be demonstrable evidence that the technology is necessary, proportionate and effective considering [its] invasiveness,” she says. Potential public distrust “Any organisation using software that can recognise a face amongst a crowd and then scan large databases of people to check for a match in a matter of seconds, is processing personal data,” says Denham. General Data Protection Regulation (GDPR) wording specifies biometric data as a ‘sensitive’ category of personal information. London’s Metropolitan Police Service performed 10 trials of live facial recognition at various venues in 2016, 2017 and 2018. The London Police Ethics Panel reviewed the trials and concluded that additional use of the technology would be supported if certain conditions were met. One condition is if the “overall benefits to public safety [are] great enough to outweigh any potential public distrust in the technology.” Each deployment should be assessed and authorised as necessary and proportionate. Operators should be trained to understand associated risks and to be accountable, and there should be evidence that the technology does not promote gender or racial bias. Develop strict guidelines Met Police used NEC’s NeoFace technology to analyse images of the faces of people on a watch list The Ethics Panel also specified that both the Metro Police and Mayor’s Office for Policing and Crime should develop strict guidelines to ensure that deployments balance the benefits of the technology with the potential intrusion on the public. “We want the public to have trust and confidence in the way we operate as a police service, and we take the report’s findings seriously,” said Detective Chief Superintendent Ivan Balhatchet, who led the trials. In its 10 trials of live facial recognition, Met Police used NEC’s NeoFace technology to analyse images of the faces of people on a watch list. The system measured the structure of each face, including distance between eyes, nose, mouth and jaw to create facial data, which was used to match against the watch list. The system only kept faces matching the watch list, and only for 30 days. Non-matches are deleted immediately. More accurate identification An independent review of the trials, commissioned by the Metropolitan Police, concluded it is ‘highly possible’ that the Met’s ‘trial’ deployments would not satisfy the key legal test of being considered ‘necessary in a democratic society’ if challenged in the courts, according to U.K. human rights advocacy group Liberty. South Wales Police have partnered with NEC to formally pilot facial recognition technology. NEC’s real-time solution enables trained officers to monitor movement of people at strategic locations. “Facial recognition technology enables us to search, scan and monitor images and video of suspects against offender databases, leading to faster and more accurate identification of persons of interest,” says Assistant Chief Constable Richard Lewis. “The technology can also enhance our existing CCTV network in the future by extracting faces in real time and instantaneously matching them against a watch list of individuals, including missing people.” U.K. human rights advocacy group Liberty has taken legal action on behalf of one Cardiff resident against South Wales Police Intrusive technology “We are very cognisant of concerns about privacy, and we are building in checks and balances into our methodology to reassure the public that the approach we take is justified and proportionate,” says Lewis. U.K. human rights advocacy group Liberty has taken legal action on behalf of one Cardiff resident against South Wales Police over its use of facial recognition. “Facial recognition is an inherently intrusive technology that breaches our privacy rights,” says lawyer Megan Goulding at Liberty. “It risks fundamentally altering our public spaces, forcing us to monitor where we go and who with, seriously undermining our freedom of expression.” ICO’s Denham says any judgment resulting from the legal action will form an important part of ICO’s investigation and will be considered before ICO’s final findings are published. Information management South Wales Police offers the following assurance: “Data will only be retained as long as is necessary for a policing purpose, as per guidance within the Authorised Policing Practice on information management.” Facial recognition systems are yet to fully resolve their potential for inherent technological bias" One concern is that live facial recognition ‘discriminates’ against women and people of colour because it disproportionately misidentifies them, thus making them more likely to be subject to a police attention. ICO’s Elizabeth Denham comments: “Facial recognition systems are yet to fully resolve their potential for inherent technological bias; a bias which can see more false positive matches from certain ethnic groups.” Taking regulatory action ICO has also considered data protection ramifications of commercial companies using LFR. Denham says: “The technology is the same and the intrusion that can arise could still have a detrimental effect. In recent months, we have widened our focus to consider use of LFR in public spaces by private sector organisations, including where they are partnering with police forces. We will consider taking regulatory action where we find non-compliance with the law.” A 27-page U.K. Home Office Biometrics Strategy sets out an overarching framework within which organisations in the Home Office sector will consider and make decisions on the use and development of biometric technology. However, Biometrics Commissioner Paul Wiles says the document “doesn’t propose legislation to provide rules for the use and oversight of new biometrics, including facial images. Given that new biometrics are being rapidly deployed or trialed, this failure to set out more definitively what the future landscape will look like in terms of the use and governance of biometrics appears to be short-sighted.”
Traka’s innovative key and equipment management solutions have been installed at a new national distribution centre for a top four UK supermarket. The new distribution centre, fulfils orders for the superstore’s chain across all channels, including wholesale, online and retail. On average, it deals with 2.4 million cases per week, which can grow to 3.1 million at peak periods. Biometric locker solutions To keep up with demands, our distribution centres are constantly growing and evolving" Traka’s intelligent key management and biometric locker solutions were installed to improve efficiency and reduce the risk of asset loss. The lockers also present instant access by authorised personnel to fault reporting and audit control capability. Speaking about the need for key management, a representative of the superstore chain said: “To keep up with demands, our distribution centres are constantly growing and evolving, driving new standards in design and use of technology to ensure our products get to our customers on time, in full.” Key and asset management “For the warehouse to operate at maximum capacity, we try to make it as simple as possible for authorised colleagues to gain total control of key and asset management, with full traceability at all times. Traka added value, not only in providing a solution to meet our current needs, but also a futureproof system with an opportunity to network and build, as our operation requirements continue to grow.” Three further locker systems with biometric access have been added to enhance security On site, Traka’s L-Touch key cabinets have been installed, which are specifically designed for larger organisations with a high key turnover. Three further locker systems with biometric access have been added to enhance security and ensure only authorised ‘finger print assigned’ personnel can operate assets at any given time. As with all Traka solutions, audit control capability across key cabinets and asset locker solutions presents instant traceability and reporting. Investigating networking opportunities to integrate Morrisons teams can also benefit from fault logging against items that have been returned with access rights restricted to prevent further damage, wasted time or injury until the issue is resolved. Steve Bumphrey, UK Sales Director added: “Being and maintaining a position as one of the top four retailers in the UK places an enormous responsibility on logistics teams to perform every minute of every day, with no margin for confusion or delay." "We saw first-hand the extent of the challenge and dedication to meet customer needs. As such, we installed systems that could make an instant difference and add value, with the ability to grow and meet ongoing requirements for long-term efficiency and productivity.” Whilst systems are currently installed on a standalone basis, the logistics team at the superstore is currently investigating networking opportunities to integrate Traka technology seamlessly into everyday operations, across the extensive site for the benefit of staff and visitors.
HID Global, global provider of trusted identity solutions, has enabled BigWise, a global provider of wise solutions worldwide, to bring the security and convenience of biometrics to its retail and restaurant customers. BigWise went from concept to a pilot of its new biometric-enabled Stellar POS platform at a major customer within 30 days using the HID DigitalPersona fingerprint biometric solution. HID DigitalPersona fingerprint biometric solution HID’s fingerprint biometric solution significantly shortened our path for secure fingerprint biometric authentication" “HID’s fingerprint biometric solution significantly shortened our path for adding secure fingerprint biometric authentication services to our Stellar POS platform,” said Jose Rivas, founder and CEO, BigWise Corporation. He adds, “We were able to move very quickly to give our customers valuable new capabilities for stopping internal theft and fraud while simplifying employee access to the Point of Sale (POS) terminal. We expect our lead customer to roll out this new biometric-enabled Stellar POS solution in their operations in the very near future and are excited about the product’s broader market opportunities for us.” EikonTouch fingerprint biometric readers Taking advantage of DigitalPersona’s intuitive biometric software development tools, BigWise added fingerprint biometrics to their POS offering in a matter of weeks. The new solution allows customers the flexibility of choosing the HID Fingerprint biometric reader that meets their requirements, including the DigitalPersona 4500 and EikonTouch fingerprint readers. With the addition of fingerprint biometrics, Stellar POS gives organisations not only a more convenient way to login to their POS terminals but also allows them an effective way to stop labor hour fraud as well as POS theft due to unauthorised manager overrides and approvals. Stellar POS end-to-end solution “We are pleased to have helped BigWise complete this biometric authentication pilot and shorten time to market for its exciting new offering,” said Wladimir Alvarez, senior director of Sales LAM, Extended Access Technology Business Unit with HID Global. “In addition to securing their POS systems DigitalPersona fingerprint biometrics finally allows Bigwise customers to eliminate their dependence on insecure and costly passwords and swipe cards.” Stellar POS provides an end-to-end solution from the store floor or restaurant counter Stellar POS provides an end-to-end solution from the store floor or restaurant counterStellar POS provides an end-to-end solution from the store floor or restaurant counter through the full range of inventory, logistics and production processes and makes it easier to manage offers and promotions, loyalty programs, and accounting and treasury operations. BigWise sells the Stellar POS solution primarily in Colombia, Chile, Argentina and Peru. Identity management HID DigitalPersona biometric readers along with the DigitalPersona software development kit (SDK) solves security and identity management challenges for hundreds of millions of users around the world. To get developers off to a quick start, HID’s DigitalPersona developer kit includes hardware samples, downloadable royalty-free SDKs, sample code, documentation and membership in HID Global’s Crossmatch Developer WebPortal.
Globally renowned electronic locks manufacturer, Mul-T-Lock has announced providing Glenveagh National Park in County Donegal, Ireland with over 50 of its high-tech eCLIQ locks so as to enable them to efficiently manage access control rights across the whole estate. Spanning over 170 square kilometres in area size, Glenveagh National Park is the second largest national park in Ireland. It features a number of rugged mountains, pristine lakes, tumbling waterfalls and enchanted native oak woodlands that together make up its ecosystem. At the centre of the national park, on the edge of Lough Veagh, is Glenveagh Castle, a late 19th century castellated mansion, which was originally built as a hunting lodge. Advanced eCLIQ technology allows park managers to schedule individual access permissions for each lock eCLIQ locking system With multiple facilities located on the sprawling site, Glenveagh National Park required a high-security and fully customisable access control solution, and therefore opted for Mul-T-Lock’s advanced eCLIQ locking system. The new and advanced eCLIQ technology allows park managers to schedule individual access permissions for each lock, subsequently granting and revoking access to various areas of the estate whenever necessary. Remote access control solution Stephen Crowe, Regional Sales Manager for Mul-T-Lock, commented, “At Glenveagh National Park there is a need to restrict public access from certain areas for safety reasons, but at the same time, relevant staff should be able to access these areas whenever required”. He adds, “Our eCLIQ system proved the perfect solution for this, as administrators (those who manage the security system) can easily set-up tailored access permissions remotely via our CLIQ Remote Web Manager software. eCLIQ padlocks and cylinders Stephen further stated, “With eCLIQ, administrators also have the ability to set time-limited access – something that isn’t achievable with a mechanical system. For example, padlocks around the estate could be programmed to allow access to certain gates between Monday and Friday, from 8am to 6pm. It’s this customisation that makes our system so popular.” The Mul-T-Lock system was specified and installed by Paul Speer at JP Speer Locksmiths, who added, “We now have over 50 eCLIQ padlocks and cylinders securing gates, offices and the Visitor Centre within this impressive estate. The complete system is managed from the main office and once set up it is easily maintained, with the flexibility to change quickly whenever required.” Mul-T-Lock advanced eCLIQ technology Another great feature with eCLIQ is the way in which you can expand the system retrospectively when needed" Paul further said, “Another great feature with eCLIQ is the way in which you can expand the system retrospectively when needed. Glenveagh National Park has used mechanical systems in the past, but these haven’t been able to satisfy its access control requirements. Mul-T-Lock’s eCLIQ technology ensures that access rights are maintained for years to come.” Pat Vaughan, District Conservation Officer at Glenveagh National Park, finished by saying, “Mul-T-Lock’s eCLIQ system is the perfect fit for our Park as it has all the features that such a vast estate as ours requires. Park security He says, “During our summer season our visitor numbers quadruple and we have to employ seasonal staff to meet this demand. Having such a system as Mul-T-Lock’s eCLIQ means that we can set up temporary access for these workers, with all the relevant access rights required. The eCLIQ system also enables us to deactivate keys and revoke access at the click of a button.” Pat adds, “This is particularly helpful if any of our team accidently lose their keys, or if temporary staff forget to return keys after their time with us. We are extremely happy that we opted for the eCLIQ system to secure our beautiful estate; it will stand the test of time for years to come and has all the features we require to manage, build and secure our Park and its future.”
With 15,000 visitors per day, and a watch list of about 3,000 people, the casino faced an impossible task to recognise persons of interest in real time. Surveillance staff manually detected only 5–7 known persons per week and was looking for an automated face recognition system to support two separate requirements: Detecting voluntarily excluded patrons to promote responsible gambling and to avoid compliance fines associated with allowing these people to play Detecting banned persons or people on the lookout list for loss prevention and security. Fully managed services At peak times, the system sees 20 persons per second in front of all cameras Cognitec offers the Face VACS-VideoScan Enterprise Solution as a fully managed service that allows the casino to benefit from the technology at affordable cost and with low implementation effort. The system for this casino includes the software, installed on three redundant servers, and 29 Cognitec C5 cameras at various entrances and in walkways. Some cameras have been installed to blend into the wall design, and not disrupt the overall casino decorum. At peak times, the system sees 20 persons per second in front of all cameras. The software stores the appearances of all persons for 30 days, collecting an average of 1 million faces. After this time window, all images, videos and biometric templates are deleted. Taking optimal photos with a hand-held camera When the surveillance team receives an alert, they verify the facial match, and send the person details to the database administrator. The security team receives the confirmed alert on a mobile device to discreetly find and approach the person on the floor. For new enrolments, staff have been instructed on taking optimal photos with a hand-held camera For new enrolments, staff have been instructed on taking optimal photos with a hand-held camera. The technology has been optimised to generate a high rate of true alerts while generating the lowest possible count of false alerts. The surveillance team evaluates the image pairs in an alert within seconds, and discards the alerts with questionable match results. Face recognition services The system currently generates up to 30 correct alerts per day. Self-excluded problem gamblers are now detected at a much higher rate, resulting in a significant reduction in fine payments compared to the past with traditional detection methods. Observing such reliable system performance has convinced the client to add more cameras to the system and implement the technology at additional locations. The casino also considers to use the technology for underage detection and VIP recognition. Furthermore, the casino has the option to report visitor demographics and statistics that help planning for staff resources and casino capacities. While Cognitec continues to provide reliable, fully-managed face recognition services, the casino continuously reaps the benefits: a secure environment for customers and staff, a profitable business, and support from the community.
Kings Secure Technologies has provided high-level security and protection to one of its leading clients since 2011. Due to this successful long-term relationship, Kings was commissioned to begin a project, which started in 2019, to update the existing access control system with the latest high security card and card reader technology. With facilities working 24/7 the challenge faced was to find an easy-to-install edge technology card reader that could be configured onsite to read multiple card technologies where required and be field upgradable with any new advances in security. With these complex requirements in mind, Kings turned to Third Millennium to provide the most advanced technical solution available in the market. RX range of card readers The project also required the implementation of biometric dual authentication for the more secure areas Kings utilised Third Millennium’s RX range of card readers which incorporates the second evolution of NXP industry-leading MIFARE® DESFire® EV2 open architecture platform. Third Millennium’s PC09 Mifare DESFire EV2 cards offer superior performance, state-of- the-art security, privacy and enhanced multi-application support such as follow me printing and vending, to name just two. In addition to the RX4 and RX1K readers, the project also required the implementation of biometric dual authentication for the more secure areas. Third Millennium’s RX6 biometric reader uses a template on card application which means that there is no requirement to maintain a separate database of biometric information. The RX6 compares the finger template on the card with the finger being scanned and releases the card data if the two match. Because of the high security requirement, a custom encrypted key ties the readers to the cards thereby preventing card cloning or data bugging.
The City of Boston is known for many things – from Fenway Park to the Boston Marathon to the bar from Cheers, the city is full of iconic landmarks, events, cultural assets, education centers, and more. Boston is also recognised for its vast history, especially downtown, where hundred-year-old buildings have been preserved or restored. There is also a mixture of new property development, including 33 Congress Street, in the heart of the financial district, which combines the best of historical design with new construction. Building security 33 Congress incorporates more than 400,000 square feet of office and retail space 33 Congress incorporates more than 400,000 square feet of office and retail space, transforming the historic neighborhood and positioning the area as a dynamic downtown destination. The project was designed by Arrowstreet, an award-winning architecture and design firm, and was led by Jason King, AIA, LEED, AP, BD+C, Senior Associate for Arrowstreet. According to King, the 33 Congress Street building consisted of three different structures that were built at separate times: in 1904, 1906, and in 1922 and then all combined into one space. While the space functioned as one building, there were three separate elevator cores, sets of restrooms, sets of stairs, and more. Those entities needed to be reconfigured into one. The most striking feature of 33 Congress is a new, modern glass and steel structure, containing 6 additional floors of office space that sits on top of the original three masonry buildings. Another important project goal was to upgrade the main lobby to a modern design that allowed public access, increased security for building employees, and respected several historical aspects. Secure access control “We needed a way to get people into the new, main elevator lobby quickly due to the high volume of traffic that we were anticipating would take place after the redesign,” King said. “We also wanted to create an entrance that would create a better flow of entry from the sidewalk into the building.” The original building had an existing revolving door, but it was small and surrounded by stone. “It was dark and uninviting,” King said. “We were creating an open and airy Class A lobby space and wanted visitors to clearly see the ornate, coffered ceiling and experience the grand and historic nature of the lobby as they entered.” Crystal TQ revolving door King implemented a Boon Edam Crystal TQ manual revolving door to lead visitors in the double height lobby space King implemented a Boon Edam Crystal TQ manual revolving door to lead visitors in the double height lobby space. The Crystal TQ is constructed virtually completely from glass with only a few stainless steel accents to ensure the solidity of the revolving door. It fits seamlessly with modern glass facades but can also be a beautiful eye catcher in more traditional or classic designs. For employee access, the building’s previous design did not incorporate turnstiles to the elevator banks. “The building did have card reader access, but only at certain doors and locations,” King said. Lifeline Speedlane Swing King installed four lanes of Boon Edam Lifeline Speedlane Swing optical turnstiles and two Winglock Swing model access gates to provide secure employee access to the building’s upper floors. The Lifeline Speedlane Swing turnstile manages and channels the flow of people entering and moving around buildings. It employs sensors that detect visitors approaching, with pulsing light strips to guide the user. A sleep function saves on energy use. It can be customised with dimensional and glass choices, including corporate identity colors or other options, so that it either blends-in or stands-out from its surroundings. Boon Edam Winglock Swing The Boon Edam Winglock Swing is constructed from stainless steel and a single glass panel The Boon Edam Winglock Swing is constructed from stainless steel and a single glass panel, and is unobtrusive in nature and design. The access gate easily manages bi-directional traffic, with LED lights that signal if the gate is in use or on standby. The access gate ties into a manned security desk located near the front doors. Employees gain access to the building through either the Lifeline turnstiles, or a Winglock Swing access gate, while building visitors can receive credentials at the security desk. Entrance solution King said, “We started the process looking at Boon Edam from a security and an aesthetic standpoint. We went through multiple product options but always had a Boon Edam product as the basis of the design. We have been happy with Boon Edam entrance solutions and we are planning to use them again for future projects.”
Round table discussion
Public spaces provide soft targets and are often the sites of terrorist or active shooter attacks. Public spaces, by definition, require easy accessibility and unrestricted movement. Given that openness, what security technologies can provide real results? We asked this week’s Expert Panel Roundtable: How is technology innovation impacting the security of public spaces?
Along with the integration of security and other systems in an enterprise environment comes a need to centralise monitoring and control of the unified network. A control room is at the center of managing integrated systems, providing the focal point to collect information from a variety of sensors, analyse the data, and then respond appropriately. The technologies that drive these functions are changing and evolving, thus increasing the efficiency and efficacy of systems. We asked this week’s Expert Panel Roundtable: What’s new in command-and-control systems, and what is the impact?
The new school year is a good time to reflect on the role of security in protecting our schools. From video to access control to some newer technologies, our Expert Panel Roundtable found plenty to talk about when we asked this week’s question: How does security technology make our schools safer?