Fime has become one of the test laboratories able to perform Android biometric security evaluation. A growing number and variety of Android devices rely on face and fingerprint recognition for device unlock and user authentication. All implementations must meet Android’s requirements to protect end-users. Fime is now helping smartphone OEMs, biometric component and software providers to evaluate anti-spoofing ability and achieve successful Android compliance. Secure user experiences Ste...
Suprema, a globally renowned company in access control, biometrics and time & attendance solutions, has announced that its intelligent biometric access controller, CoreStation has acquired UL 294 compliance. UL 294 compliance UL 294 is a certification designed especially to ensure the safety and reliability of access control products. The certification has significance to larger customers, like government institutions, corporations, and medical and banking verticals that value reliability...
Invixium, a globally renowned manufacturer of innovative touchless biometric solutions, is opening its new Middle East headquarters in Dubai, United Arab Emirates that will serve the Middle East, Turkey, North Africa and Pakistan regions. The new MENA headquarters has been established to best respond to the growing interest in Invixium's health-focused, temperature-based workforce management and access control biometric solutions that are in high demand as businesses reopen during COVID-19 pand...
ISC West, in collaboration with premier sponsor, the Security Industry Association (SIA), has announced breaking news and guidance regarding ISC West 2021 event. The international security event was originally slated to be held March 23-26, 2021, but after extensive internal and external consultation and monitoring of the ongoing COVID-19 virus pandemic situation, they have made the decision to reschedule ISC West 2021. Rescheduled ISC West 2021 event The ISC West 2021 security event now will...
After a year of extensive research and investment, Sargent & Greenleaf (S&G) introduces a bold new look to reflect a powerful commitment to product innovation and customer experience. This dynamic transformation embodies the company’s energetic and passionate focus to a future-forward vision of products and services, as well as a commitment to its customers’ security and success. Developing high-security solutions S&G will concentrate on enhancing the customer experien...
Last year saw vehicle thefts rise by a staggering 50% in the UK, and again by a further 20% so far this year, which is regarded to be the highest level in four years. With cases worsening during lockdown, motorists are now being warned that they face a greater risk of vehicle theft now that the nation is making fewer trips in their vehicles and spending more time at home. Countering the rise in vehicle thefts The cost of a lost or damaged vehicle can quickly mount up for any business owner, no...
Codebase Technologies has introduced a brand-new digital FinTech offering, Digibanc Digital Roshan, to empower conventional and Islamic banks in Pakistan to manage seamless, consistent, and engaging customer journeys across multiple customer touch-points and drive their digital transformations. Digibanc Digital Roshan solutions The comprehensive digital solution, Digibanc Digital Roshan aims to help banks to support overseas Pakistani customers to open their Roshan Digital Accounts effortlessly among other functions. An initiative by the Government of Pakistan, Roshan Digital Accounts is aimed at assisting millions of overseas Pakistanis in undertaking fund transfers, bill payments, and investment activities in Pakistan. As an emerging market for FinTech, customers in Pakistan are increasingly receptive to digital and innovative technologies for seamless banking processes. Growth of FinTech-led initiatives Codebase aims to be the partner of choice with new offering Digibanc, as financial institutions embrace digital innovation" Commenting on the new offering, Raheel Iqbal, Managing Partner & Global Product Head at Codebase Technologies, said, “Factors such as disruptive internet and smartphone penetration in the country, consumer preferences for social media and growing e-commerce are driving digital payments and processes in Pakistan." Raheel adds, “The government of Pakistan is also putting in place strong regulatory frameworks and laws for digital financial services, pushing the growth of FinTech-led initiatives. Roshan Digital Accounts is the latest initiative by the Pakistani government and at Codebase Technologies, we aim to be the partner of choice with our new offering Digibanc, as financial institutions embrace digital innovation.” Accelerating KYC processes remotely and digitally With the help of Codebase Technologies’ state-of-the-art and secure unified platform Digibanc Digital Roshan solutions, Pakistani banks can now accelerate their KYC processes remotely and digitally to help customers open accounts literally within minutes. With the ability to go to market in less than 45 days, banks can leverage this solution and help customers enjoy additional benefits such as digital onboarding and account services, instant access to investments, real-time 24/7 access to account services, and personalised offers to expand a larger and loyal customer base. It will also enable financial institutions to reduce costs and gain higher profitability. Enterprise-grade security solution Boasting a highly modular, scalable, and robust open technology architecture, Digibanc delivers superior performance and enterprise-grade security, adhering to the stringent and dynamic financial industry regulatory requirements. Digibanc Digital Roshan Solutions is a pioneering FinTech offering" Raheel Iqbal further stated, “Digibanc - Digital Roshan Solutions is a pioneering FinTech offering set to transform the way banks engage with customers in today’s digital landscape. Codebase Technologies brings in an extensive experience of operating in international markets. Our key strengths include specialised skillsets, broad accessibility, and an in-depth regulatory understanding across multiple geographies.” Modern API-driven solution Digibanc - Digital Roshan Solutions operates with and alongside any legacy core banking system, leveraging on an Open Architecture and modern API-driven solution, allowing banks for increased flexibility and unparalleled scalability. Key Features of Digibanc - Digital Roshan Solutions include: Digital Customer Onboarding: Digital NRP customer onboarding. Set-up an account from anywhere, anytime. State Bank Reporting: Automatic, Hassle-free, readily available and configured regulatory state bank reports with robust regulatory compliance ensured. Digital KYC Operations: Update, manage and curate customer KYC with seamless integration to NADRA and meet SBP. Payments & Transfers: Perform local and international transfers, with the ease of recurring and instant transfers. Robust Mobile Security: From pin and password to biometric login authentications for a safe and secure user experience. Equipped with mobile and remote capabilities Raheel Iqbal adds, “We truly understand the importance of electronic or digital KYC, especially in the wake of the ongoing pandemic. We are one of the few systems providers who have both, the technical know-how as well as global expertise.” “There is a distinct gap in the market which we are bridging with our FinTech offering. Digibanc - Digital Roshan Solutions is the only end-to-end digital offering equipped with mobile and remote capabilities and seamless integrations. We look forward to working closely with banks in Pakistan to unleash the complete potential of the solution and help them enhance their operations,” he concluded.
Iris ID, a pioneering provider of iris recognition technology, announced the compatibility of its iCAM M300 handheld, multi-modal biometric reader and the MozaicID iCAM M300 smartcard software credential application. This application enables the mobile device to accommodate a range of Personal Identity Verification (PIV) compatible credentials including PIV Interoperable (PIV-I) and the Transportation Worker Identification Credentials (TWIC), a smartcard used by workers requiring access to secure areas of U.S. maritime facilities and vessels. Secured identity authentication The MozaicID app uses the iCAM M300’s detachable FBI-certified Sherlock fingerprint sensor from Integrated Biometrics to authenticate workers’ identities by comparing a live fingerprint to a stored template embedded in the credential. The application will also check the trust status of the presented credential. The iCAM M300 also enables mobile enrolment of workers with its embedded camera simultaneously capturing both iris and facial modes for contactless identity authentication. Authorities statement Mohammed Murad, vice president of global sales and business development, Iris ID, said compatibility with the MozaicID app adds to the versatility of the iCAM M300. “Iris ID and MozaicID have combined best of breed technologies to create an accurate and more secure means of identifying maritime employees wherever their jobs take them,” he said. “The iCAM M300 provides an unparalleled intuitive user interface, which makes the process easier for the user and operator.” Jim Parroco, chief executive officer of MozaicID said “MozaicID is dedicated to providing effective, relevant and user-friendly security solutions. We institute intuitive and innovative technology in our software with proven results. The product offering, we have with Iris ID provides an excellent security solution in response to a specific need.” Features and benefits Supports other contact or contactless Personnel Identity Verification (PIV) smartcards such as Common Access Cards (CAC) used by military, civilian and vendor employees in controlled government spaces Commercial Identity Verification (CIV), used by commercial organisations to meet federal government access control standards Comes equipped with software development kits (SDK’s) ready to deploy a wide variety of Android-based identity application Organisations requiring remote identity verification, such as the U.S. Customs and Border Patrol and law enforcement departments, use the water- and dust-resistant iCAM M300 Provides magstripe and contactless card support, as well as an MRZ reader to verify ePassports Communications protocols include NFC, Wi-Fi, Bluetooth, GPS, 4G LTE
PACE Security, a Southern California-based security integration and systems design firm, has announced that it has added the Alcatraz Rock autonomous access control platform to its solutions portfolio. “We are excited to have PACE embrace the Alcatraz Rock and its ability to deliver access control via facial authentication,” said Alcatraz Chief Revenue Officer, Tina D’Agostin. Alcatraz Rock added to portfolio Tina adds, “PACE has already successfully delivered autonomous access control solutions to its clients with the Rock platform, including an installation they have already done for the Martin Luther King, Jr., Community Hospital in Los Angeles.” Based in Southern California, PACE Security has been delivering innovative approaches to security integration for 25 years. PACE provides complete solutions from engineering to the implementation and installation of equipment and complete customer training for seamless integration of access control, closed circuit television, and security. Two-factor authentication Adding the Alcatraz Rock to access control projects allows delivering customers a ‘level 10’ in access control security PACE Security Owner and President, Raymond (Ray) Downs said, “Adding the Alcatraz Rock to access control projects allows them to deliver customers a ‘level 10’ in access control security. Because the Rock can be used in a two-factor authentication where individuals badge in and also have to use facial authentication along with the badge that is as secure as you can get.” He adds, “It can’t be compromised if someone loses an ID badge or if it falls into the wrong hands. They also like the fact that they are not technology restricted by the Alcatraz Rock, since it works with any access control platform. The Alcatraz Rock integrates easily into nearly all access control platforms and can be used on any element at any system at any time. It’s an impressive product and we have a lot of enthusiasm about it.” Touchless and secure physical access control Alcatraz Rock offers a touchless and secure physical access control platform that works with any access control system. It replaces or augments badging as a credential with facial recognition, 3D sensing, and artificial intelligence to enable highly secure and frictionless entry into physical locations. The Rock uses passive 3D sensing, machine learning for increased security, and accurate tailgating detection, while intelligently enrolling employees as they are badging in, eliminating the headaches associated with traditional onboarding. A newly added feature provides a mask detection mode, the Mask Enforcer, to help businesses comply with post-COVID-19 government-mandated facemasks.
Advanced deep learning methods and a new face finder are contributing to substantial performance upgrades for Cognitec’s FaceVACS face recognition engine. In particular, the new version shows higher accuracy rates for facial images with masks, strong poses and extreme mouth expressions. Extensive research and development efforts to enhance the company’s face finder technology resulted in a tenfold higher detection rate for faces largely covered by facial masks. A specialised algorithm version with less memory consumption serves Linux-on-Arm and Android platforms. For this algorithm, test results showed particularly high matching accuracy for images of people wearing face masks. Cognitec is already preparing the release of the next matching algorithm, expecting a further accuracy boost for general matching tasks, and especially for comparing images with partially occluded faces. Managing Director Alfredo Herrera noted, “Cognitec’s algorithm development is responding to our customers’ critical need for accurate identification and verification products in the current pandemic environment.”
ASSA ABLOY Door Group, a unit of ASSA ABLOY Opening Solutions UK & Ireland, leads the way with its range of high-performance timber doors for the public, commercial & high-end residential market. Fire door quality Fire Door Safety Week reported 60% of local authorities experienced delays in their fire door programmes, leaving safety to chance and impacting over 16,500 fire doors recently. With local authorities still playing catch-up from these delays, it is vitally important for building managers to ensure their fire doors are safe, compliant and up to standard. High-quality doorset solution ASSA ABLOY Door Group offers complete doorset solutions from one trusted single point of contact managing the whole process from specification to maintenance. The SMARTec range of high-performance timber doors has been developed to offer a complete doorset solution of high quality, high performing doors and frames, complete with all ironmongery solutions. With Q-mark and FSC (Forest Stewardship Council) certifications across all commercial timber fire doors, architects, specifiers and contractors can rest assured that doorsets from ASSA ABLOY Door Group are both fire resistant and responsibly sourced as well as containing outstanding security and sound reduction properties. Security values are a top priority Brian Sofley, Managing Director at ASSA ABLOY Door Group, comments “Here at Door Group, we pride ourselves on delivering responsible and compliant doorsets to ensure maximum safety and performance in any suitable setting.” “We want to assure building managers that their security values are our top priority. With the capability to deliver an entire doorset solution from start to finish – we offer a full service from initial specification and manufacture, to onsite installation, after sales inspections and maintenance of our doors.” “The high performance SMARTec range aims to help set the industry standard for timber doors, encouraging stakeholders to prioritise safety and sustainability.”
With the ever-changing post coronavirus world, the ability to communicate virtually has never been more important. This is why ASSA ABLOY Opening Solutions UK & Ireland is improving its customer experience and launching the ASSA ABLOY Customer Support app. Free to download on Apple and Android mobile devices, the app enables customers to quickly and conveniently contact the right customer service team within ASSA ABLOY in the UK. The app provides customers with remote technical product support via live streaming, alongside instant access to useful product resources. The Door Hardware Group division will be the first to go live on the new app, enabling customers to contact all its renowned brands from one place. This includes UNION, ASSA, Dale Hardware, Excel Architectural Hardware, Exidor, Trimec, Adams Rite and Securitron. Virtual communication Once downloaded, customers can use the app to directly contact the right department via phone, email or the new live chat and video call features. Additionally, they can find a direct link to the technical support team, who can offer remote diagnosis and issue resolution using the new live stream contact option. With coronavirus restrictions in place, getting out to the site and supporting has been a challenge. However, the app helps overcome this with its live video stream option, which allows issues to be resolved fast and effectively. Product information and certificates To help customers navigate ASSA ABLOY’s broad range of products, the company has created a resource centre that provides customers with direct access to technical product information and certifications all in one place, at the touch of a button. Support hours are shown within the app, depending on device location, and email options are offered if out-of-hours support is required. Customers can also take a photo using their phone and attach it to emails for easier troubleshooting. Jesse James, Financial and Commercial Director of the ASSA ABLOY Door Hardware Group, said “Improving our customers’ experience is paramount to our business, especially in these challenging times. Enabling remote contact is vital in providing our customers with quick and effective information, and has improved our customer experience through the launch of our app.” Easy-to-use app “We continue to be committed to providing easier and more flexible ways to contact our business, receive technical product support, and for our customers to locate resources.” "The new app is easy-to-use and intuitive, ensuring our customers have access to fast responses in real-time. Having the flexibility to choose how to contact our customer service teams, and for us to be able to quickly support customers on-site with technical support is vitally important. The ASSA ABLOY Customer Support app allows customers to have everything they need in one place, and wherever they go.”
Recently contacted by your credit card company because of a data breach or were you a victim of identity theft? Many of us have either been affected by identity theft or know someone who has been affected. Many consumers are seeking a secure environment that is also user-friendly. Businesses are seeking the same, with absolute certainty, that only valid users can access critical data. How can your company tackle these security and usability requirements while ensuring customer satisfaction? Today's three primary biometric modalities are fingerprint, facial and iris, and each has its own strengths and weaknesses but due to the global COVID-19 pandemic, touchless is highly preferred. Any company claiming their technology is best for all applications is likely being disingenuous. The key is to first prove a biometric is required, and once decided, the following five steps will help select the best biometric modality and supplier. Today's three primary biometric modalities are fingerprint, facial and iris, and each has its own strengths and weaknessesBiometrics can provide a mechanism to tackle these issues head-on by moving from what you know (password) and have (ID card) to who you are (your biometric), which dramatically increases the level of security while also being user-friendly. But how is the best biometric modality selected for an upcoming product? User interaction Start by defining the planned customer usage model, including the typical user, normal or desired interaction, and product in-field environment and placement, as well as any strategic plans. Think through the clothing the users will wear (e.g., face masks), the height of the users, hygiene requirements and opt-in requirements. Decide how quickly the biometric must respond and test this during the POC testing. The better the enrollment image (template), the better the matching performance and overall user experience. Biometric storage Start by defining the planned customer usage model, including the typical user, normal or desired interaction, and product in-field environment and placement, as Due to the global COVID-19 pandemic, touchless is highly preferredwell as any strategic plans. Think through the clothing the users will wear (e.g., face masks), the height of the users, hygiene requirements and opt-in requirements. Decide how quickly the biometric must respond and test this during the POC testing. The better the enrollment image (template), the better the matching performance and overall user experience. Cost and security Start by selecting which product lines will use the biometric and establishing the desired price point(s). Decide how the biometric will fit into the product and get bulk pricing to understand unit costs at volume. Software is typically handled as a license fee and often negotiable. The production cost per unit decreases as volumes increase. Choose the biometric modality that best meets functional and security requirements while hitting the targeted price. The biometric security level required depends on the assets being protected and the matching usage model. A 1:1 model, such as a cellphone, may be fine with a low-security biometric application. However, in a 1:N model, such as airport security, requires a more secure biometric such as iris. To select the best biometric for the product, compare each company's false acceptance rate (FAR) and false rejection rate (FRR). FAR indicates the biometrics ability to keep intruders out, while FRR indicates the biometrics ability to allow enrolled users in. Ensure that all biometric companies being considered can provide this information at a minimum. It is better to get each company's detection error trade-off (DET) curve, which shows how FAR and FRR vary relative to each other. Criminal activity Hackers and criminals are always trying to break technology, including biometrics. Be certain each technology has robust presentation attack detection (PAD), which ideally is third-party certified. Understand what if any personally identifiable information (PII) needs to be captured, and decide how the PII will be handled, including who will manage the data (i.e., your company, the biometric supplier or another third party). Be certain that whoever controls the PII uses the latest encryption standards and employs techniques to secure this data in memory, crossing the network and in the biometric database. Understanding the European GDPR Compliance standards if applicable will also be important. Supplier consideration Each supplier being considered should be evaluated throughout the POC testing process. Ensure the supplier is trustworthy, provides good customer support and meets its commitments. Evaluate the supplier's engineering capability and support model to ensure it can support any desired design changes and support your Be certain each technology has robust presentation attack detection (PAD)engineers to deliver the best functioning product. Selecting the best biometric for your exact use case will take some time and effort, but it has the potential to grow your business and delight your customers. Do not shortchange the process and go with the cheapest solution without doing some research. As the saying goes, you get what you pay for.
One of the biggest trends in security and technology today is centered around solutions that take advantage of the wealth of connected security systems and devices powering the organisations all over the world. As the number of cloud-powered systems and sensors have massively grown in recent years, security leaders in the private and public sectors have started to look at ways to leverage the data from these devices to better the lives of employees, customers, and residents. But while the dream of creating a smarter, safer environment remains the top priority for organisations throughout the world especially as they continue to face the ramifications of the COVID-19 pandemic, a myriad of factors hold security leaders back from implementing more advanced technologies across their infrastructures. AI as a disruptor of physical security One of the main reasons being that the advent of these cloud based technologies indubitably generate massive amounts of data that hamper any practical use by security professionals and often times create cognitive overload and paralysis by analysis. A myriad of factors hold security leaders back from implementing more advanced technologies across their infrastructures Organisations face the challenge of trying to answer numerous questions using the big data generated by the various systems and technologies. How are they going to handle the influx of information that all these disparate systems generate? How can it be analysed to extract any useful information or insight? What IT security controls are put in place to safeguard the data? How can the data be effectively curated and funneled to the right people at the right time? How can we make our security footprint be more proactive rather than constantly reactive? The answer is artificial intelligence. AI is undoubtedly one of the bigger disrupters in the physical security industry and adoption is growing at a rapid rate. And it’s not just about video analytics. Rather, it is data AI, which is completely untapped by the security industry. Improving your competitive advantage Today, all divisions of an enterprise are trying to leverage AI and big data to improve their competitive advantage and bottom line, including accounting, sales and marketing, material sourcing, and research and development. We need to ensure that the physical security industry realises they can significantly benefit from better, faster, and more accurate intelligence from the now unstructured, bottomless silos of security data; only then will this result in positioning physical security from a primarily reactive business to a revolutionary new proactive environment. AI is undoubtedly one of the bigger disrupters in the physical security industry and adoption is growing at a rapid rate As an industry, we need to focus on reinventing how security personnel and safety resources are allocated in the public safety and corporate security industry. And it all has to start with intelligence derived from big data using AI. Security leaders in the physical security and law enforcement industry can combine multiple data sources with predictive and prescriptive analytics and artificial intelligence to inform and dynamically deploy personnel, assets, and technologies. This approach drives automation of their current manual processes to maximise the effectiveness and efficiency of their entire security operations. Intelligently predicting the future? Bottom line: AI can change up your security game by automatically deciphering information to predict the future using a wide range of sources and data that have been collected, whether past, present, and future. That’s right; you can look into the future. By grabbing a hold of this AI-powered crystal ball, decision-makers can perform long-term strategic planning and informed day-to-day operational decision making. And what’s more, AI powered platforms are software-based, often delivered using as-a-service business models that empower security personnel to go beyond traditional static business intelligence visualisation and reporting systems to transformative dynamic, predictive and prescriptive decision-making environments. Today’s platforms are also not your traditional, old school, expensive PSIMs; they are cost-effective, configurable to your needs and dare we say, easy to operate. Every security leader I have spoken with lately want to extend AI to their security programs. They don't always know precisely where AI will fit, but they understand the need to operationalise more of their security practices. The overall why is that we should all work collaboratively to help organisations across the globe leverage the tools available to transition away from a reactive stance and gain informed insight into the future where we are truly prepared for and one step ahead of what is coming down the road.
A total of £1.6 billion worth of goods are reported as ‘lost’ to in-store theft in supermarkets each year, with figures increasing steadily. The presence of self-checkout systems have increased in supermarkets, as well as other industry retailers. By 2021, we’re globally on track to have 468,000 self-checkout machines in operation, nearly double the 240,000 in existence since 2016. While this increase comes with such benefits as reduced wait times for customers and staff costs, it also comes with a risk of retail theft at self-checkouts. With the circumstances the world now finds itself in i.e. mass unemployment, financial uncertainty, the retail industry has seen an influx in these types of petty crimes, hitting retailers during an already turbulent period. While retailers are taking precautions to protect themselves and their patrons in this new era of in-person shopping, it’s important to ensure the business itself is protected. A popular method to combat these fears is to employ on-site security personnel, however, as we continue to adapt to new operating guidelines, retailers must begin thinking past the immediate future, and begin implementing long-term security solutions to prepare for life after lockdown such as strong CCTV systems with remote access. How has the security industry adapted its services to a post-lockdown world? Technological innovations like thermal recognition are key to adapting security systems for a post-lockdown world. Businesses which previously relied on facial recognition now must update their methods to account for shoppers wearing masks on-site and in-store. By 2021, we’re globally on track to have 468,000 self-checkout machines in operation, nearly double the 240,000 in existence since 2016 Biometric systems are now able to identify people with face masks, and thermal recognition such ADT’s Thermi-Scan system which can track human body temperature without the need for contact. Implementing these safe protocol procedures protect both employees and customers against virus outbreaks such as COVID-19. The need for these advances in video surveillance will reportedly increase the biometric facial recognition market by 14 per cent by 2027. Artificial intelligence has been hailed recently as the way forward for remote security needs, and whilst business-owners continue to navigate procedures of returning to work post-lockdown, having remote access to real-time security monitoring is essential now more than ever. What are the main measures stores can take to prevent or reduce theft? Strategically placing a multi-camera surveillance system to ensure clarity, eliminate blind spots, and deter thieves should be top priority. It’s equally essential to invest in a system which has an efficient playback programme, particularly in situations where reviewing important footage efficiently can offer vital information to the police force. Advances in video surveillance will reportedly increase the biometric facial recognition market by 14 per cent by 2027 As business-owners continue operating at reduced hours and with limited on-site staff, being able to access camera footage quickly and remotely is a key factor to consider. Whether owners opt to receive an alert on a mobile device allowing them to review notifications, or if their system is monitored by a remote security centre, it’s important to be able to access footage quickly for added efficiency and ease. Facial recognition and AI have been popular points of discussion in relation to security cameras and CCTV. While careful considerations must be taken prior to utilising any sort of facial recognition technology, including conducting a Privacy Impact Assessment, the benefits include being provided with real-time tracking of repeat offenders which immensely helps the prevention of in-store theft. Here are some key points to consider when choosing in-store surveillance: Assess your needs – To get the best out of your security system, it is essential to analyse what your requirements are for your business as they might have changed to adapt to a post-lockdown world Camera setup – With store layouts shifting to accommodate social distancing guidelines, it’s important to re-evaluate the current set-up of any security cameras. Depending on any layout updates, it might be important to consider operating multiple cameras in one area to ensure a peripheral view and eliminate any blind spots Camera positioning – For optimal performance, check that light sources are not obstructing your view such as glare from the sun. It is also worth considering the height at which cameras are installed to maximise surveillance Check the focus – It is worth testing camera lenses bi-monthly to ensure that lighting or weather hasn’t affected the focus of the lens, resulting in a blurry visual Remote access – As guidelines continue to evolve, ensure you’re able to access any necessary camera footage quickly and safely in case of emergency Will we begin to see a reduction of theft as new technology is implemented? We’re beginning to see incidents of shoplifting and theft being taken more seriously by law enforcement. In the coming months, for the first time in Britain nearly twenty shoplifters who were either caught red-handed or identified on CCTV will be appearing before magistrates. While currently these court cases are being pursued by a private police force, these actions come after a Government plea to high-level police to prosecute shoplifters stealing under £200. Retailers have long voiced concerns that forces have abandoned low-level thefts and these steps are small but show that businesses are being heard. As innovations in surveillance security continue, we’ll be seeing a move away from human involvement which will create a more reliable and efficient system able to rely on machine learning and analytics. While there have been wider strides made in utilising AI for surveillance, these are largely being used currently by local governments to alert police forces to threats of criminal activity. It’s not unreasonable to think that in the near future, these types of smart technology will be employed by private businesses to analyse suspicious behaviour or possible theft. However, as we see an increase in the advancement of security technology, we anticipate that those inclined to commit in-store theft will adapt their methods, therefore retailers should look to regularly evaluate their security needs to keep risks at bay.
Sooner or later (hopefully sooner), the novel coronavirus global pandemic will allow workplaces to reopen. But as we move into this recovery phase, there are many questions surrounding the transition. How can companies ensure facilities are in acceptable working order to reopen? How do they decide who is coming back and when? How will social distancing impact the operation of a company’s physical access control system? How can companies ensure that both visitors and employees are aware of the policy changes and extra controls? For answers to these and other salient questions, we called on Ian Lowe, Product Marketing Director of HID SAFE Identity and Access Management (IAM) solutions. “There’s no doubt about it: the global pandemic will change the way we live, work, and conduct business for some time,” says Lowe. “Over the past several weeks, we have been working with customers to enable a safe return to the workplace. We have observed that the number of challenges in the mid-to-long-term level and the associated complexity vary by location.” Lowe shares some of the proactive measures and best practices that can assist in a safe return to the workplace as we settle into a “new normal”. Challenge 1: Ensuring building readiness After being unoccupied for weeks or months, building readiness must be addressed completely before welcoming anyone inside. Even though employees may be eager to return, the workplace itself may not be ready. Companies may want to consider continuing remote work while facility operations are prepped. Challenge 2: workforce management There’s no doubt about it: the global pandemic will change the way we live, work, and conduct business for some time While it is dependent on location and industry, taking a phased approach is the best course of action when allowing employees, contractors and visitors back into facilities. First, facilities management will want to survey the property for readiness and then provide an estimate as to when employees may begin reporting back into the office. Next, it’s important to consider that office density needs are interrelated to the facility architecture. It is possible to accommodate a higher capacity of workforce in an airy, open office space than in a constrained one. A good rule of thumb is to start by introducing no more than 30% of employees back into the workplace at first. This could be a rolling group model in which the population total remains controlled and constant, but specific individuals vary from day to day. This option is good for a workforce that needs to be together in person but not necessarily all at the same time due to office density concerns. Welcoming visitors or customers into the office should be delayed as long as possible. If that’s not feasible, visitor numbers should be factored into the total density count. A cloud-based visitor management system can help with implementation. Challenge 3: Controlling access The ability to vet staff, employees, contractors and visitors before and during the return will vary greatly depending on the location. Policies should be implemented that require employees to be screened regularly — and for an extended amount of time. Look to answer the following questions: Where have you visited in the days since last entering the workplace? Have you come into contact with anyone else who has recently visited high-risk areas? Have you shown any symptoms of infection in the past xx number of days? Policies should be implemented that require employees to be screened regularly — and for an extended amount of time If there is cause for concern, refuse the visitor and/or supplement the screening process with additional steps. Temperature checking is mandatory in many organisations— often multiple times a day. This applies to interactions at delivery bays, too. A policy-based physical identity and access management solution integrated with existing physical access controls makes it possible to enforce, monitor and report this type of activity. Challenge 4: Social distancing and contact tracing plan Social distancing may continue within the office, which will impact restrictions and guidelines related to access control. The office layout may be reworked for proper distance between cubicles, workplace positions and employees. Specific entrances, exits and pathways may be designated as one-way-only. Assigning Bluetooth LE beacons to employees once they are inside the workplace will allow companies to monitor proximity to others and measure localised density in real-time by using location services, contact tracing, and surge response technologies. Challenge 5: Reduced physical touchpoints Contactless technologies can help enforce social distancing and reduce touchpoints on common surfaces Reducing the number of physical touchpoints is desirable throughout a workplace. Contactless technologies can help enforce social distancing and reduce touchpoints on common surfaces such as faucets, doorknobs, coffee pot handles, etc. While introducing additional security checks and screenings, it’s important to not increase touchpoints and further infection risks. There have been more requests for a contactless experience to secure workplace access, including automatic doors and turnstiles, contactless cards and mobile access. Challenge 6: Communicating for confidence Proactive communication is key to provide reassurance that appropriate safety measures have been taken and that both visitors and employees are aware of the policy changes and extra controls. Equally important is to communicate a policy change – and the reasoning behind it – before it happens. While there may not be an exact expiration date on these new policies, ensuring that impacted individuals will have a safer experience is universally appreciated.
Spread of the novel coronavirus has jolted awareness of hygiene as it relates to touching surfaces such as keypads. No longer in favour are contact-based modalities including use of personal identification numbers (PINs) and keypads, and the shift has been sudden and long-term. Both customers and manufacturers were taken by surprise by this aspect of the virus’s impact and are therefore scrambling for solutions. Immediate impact of the change includes suspension of time and attendance systems that are touch-based. Some two-factor authentication systems are being downgraded to RFID-only, abandoning the keypad and/or biometric components that contributed to higher security, but are now unacceptable because they involve touching. Touchless biometric systems in demand The trend has translated into a sharp decline in purchase of touch modality and a sharp increase in the demand for touchless systems, says Alex Zarrabi, President of Touchless Biometrics Systems (TBS). Biometrics solutions are being affected unequally, depending on whether they involve touch sensing, he says. Spread of the novel coronavirus has jolted awareness of hygiene as it relates to touching surfaces such as keypads “Users do not want to touch anything anymore,” says Zarrabi. “From our company’s experience, we see it as a huge catalyst for touchless suppliers. We have projects being accelerated for touchless demand and have closed a number of large contracts very fast. I’m sure it’s true for anyone who is supplying touchless solutions.” Biometric systems are also seeing the addition of thermal sensors to measure body temperature in addition to the other sensors driving the system. Fingerscans and hybrid face systems TBS offers 2D and 3D systems, including both fingerscans and hybrid face/iris systems to provide touchless identification at access control points. Contactless and hygienic, the 2D Eye system is a hybrid system that combines the convenience of facial technology with the higher security of iris recognition. The system recognises the face and then detects the iris from the face image and zeros in to scan the iris. The user experiences the system as any other face recognition system. The facial aspect quickens the process, and the iris scan heightens accuracy. TBS also offers the 2D Eye Thermo system that combines face, iris and temperature measurement using a thermal sensor module. TBS's 2D Eye Thermo system combines face, iris and temperature measurement using a thermal sensor module Another TBS system is a 3D Touchless Fingerscan system that provides accuracy and tolerance, anti-spoofing, and is resilient to water, oil, dust and dirt. The 2D+ Multispectral for fingerprints combines 2D sensing with “multispectral” subsurface identification, which is resilient to contaminants and can read fingerprints that are oily, wet, dry or damaged – or even through a latex glove. In addition, the 3D+ system by TBS provides frictionless, no-contact readings even for people going through the system in a queue. The system fills the market gap for consent-based true on-the-fly systems, says Zarrabi. The system captures properties of the hand and has applications in the COVID environment, he says. The higher accuracy and security ratings are suitable for critical infrastructure applications, and there is no contact; the system is fully hygienic. Integration with access control systems Integration of TBS biometrics with a variety of third-party access control systems is easy. A “middleware” subsystem is connected to the network. Readers are connected to the subsystem and also to the corporate access control system. An interface with the TBS subsystem coordinates with the access control system. For example, a thermal camera used as part of the biometric reader can override the green light of the access control system if a high temperature (suggesting COVID-19 infection, for example) is detected. The enrollment process is convenient and flexible and can occur at an enrollment station or at an administration desk. Remote enrollment can also be accomplished using images from a CCTV camera. All templates are encrypted. Remotely enrolled employees can have access to any location they need within minutes. The 3D+ system by TBS provides frictionless, no-contact readings even for people going through the system in a queue Although there are other touchless technologies available, they cannot effectively replace biometrics, says Zarrabi. For example, a centrally managed system that uses a Bluetooth signal from a smart phone could provide convenience, is “touchless,” and could suffice for some sites. However, the system only confirms the presence and “identity” of a smart phone – not the person who should be carrying it. “There has been a lot of curiosity about touchless, but this change is strong, and there is fear of a possible second wave of COVID-19 or a return in two or three years,” says Zarrabi. “We really are seeing customers seriously shifting to touchless.”
The next step in the journey of digital transformation, the fifth generation of wireless communications technologies (5G) will have an enormous impact on mankind, and on every industry including security. In short, 5G will disrupt the way we live and work. To discuss the changes, we presented our questions to Benoît Jouffrey, VP 5G Expertise at Thales, which is at the forefront of the transformation with an emphasis on trust and security. Following are his responses. Q: In layman's terms, what is the difference between 4G and 5G ecosystems as they relate to opportunity, flexibility and choice in networking tools? Jouffrey: Compared with largely one-size-fits-all 4G services, the 5G ecosystem will provide organisations with much greater choice and flexibility in the way they communicate over mobile networks. The network slicing capabilities of 5G means that business can have their own independent networks, with each one customised to their unique requirements and backed up by service-level agreements (SLA). Another aspect of 5G will be the ability to drive latency between UE (User Equipment) and network down to below a few milliseconds, which will massively boost the performance and scalability of enterprise applications. Q: How can these capabilities drive a company's digital operations? 5G will allow enterprises to be connected more efficiently Jouffrey: 5G will allow enterprises to be connected more efficiently: they can rely on a higher density of connected devices exchanging more information in a better timeframe. Due to these slicing capabilities, 5G networks allow for much greater personalisation than 4G networks. This means that businesses could benefit from this personalised network, tailored to their portfolio of Internet of Things (IoT) use cases, and not be necessarily expected to rely on a one-size-fits-all network. By combining the unique capabilities of 5G with the insights derived from analytics, machine learning, and artificial intelligence, enterprises will be in much better stead to run their operations efficiently and securely. Q: How might 5G impact the use of cloud systems? Jouffrey: 5G is the first communication environment that is cloud-native. As such, 5G networks will support cloud-based applications in a way that 4G, 3G and 2G can’t support. For instance, sensors (e.g. in a manufacturing plant) often have a small internal storage and rely on synced devices (e.g. gateways) to interact with the cloud. Soon, these sensors will be able to work more efficiently, interacting with the cloud via the ultra-low latency and the edge computing capabilities supported by 5G networks. Unlike current IoT services that make performance trade-offs to get the best from these existing wireless technologies, 5G networks will be designed to bring the high levels of performance needed for the increasing use of IoT. It will enable a perceived fully ubiquitous connected world, with the boosted capacity offered by 5G networks transferring exponentially more data at a much quicker rate. Q: How can one provide trustworthy 5G lifecycle management for IoT devices? Jouffrey: Trustworthy IoT lifecycle management is an end-to-end approach from the secure provisioning of keys within the devices, to the proper identification of the users, from the authentication on the network or the network slice, to the secure handling of the data either at stored or in motion. Resources need to be invested long before this to qualify the business model, in prototyping, as well as prototype testing. Most organisations don’t have the resources to counter all the security challenges of their 5G IoT deployments. Businesses will often end up choosing between navigating a risk-laden 5G environment, with inadequate or incomplete trust mechanisms, or outsourcing these requirements. When looking at outsourcing, companies must choose a provider with expertise in digital security, ensuring 5G IoT deployments have data protection and connectivity credentials built in, together with end-to-end data protection solutions such as encryption – protecting data in the device, network, and cloud at rest and in transit. Q: How can wireless modules address new 5G IoT use cases? Wireless modules can be expected to play a bigger role than in previous generations of cellular Jouffrey: As IoT considerations are integrated into the 5G ecosystem, wireless modules can be expected to play a bigger role than in previous generations of cellular. 5G modules support different characteristics to earlier generations – the 5G use cases are much more complex, varied, from high-end use cases requiring high data usage and throughput, such as for industrial routers, to low-throughput, energy consumption optimised devices, as required for some IoT sensors. At the end, compared to the largely one-size-fits-all approach that preceded it, 5G will increase the demand for vertical-tailored wireless modules. Importantly, these wireless modules need to support new data protection and security features that go well beyond conventional compliance to 3rd Generation Partnership Project (3GPP) standards. Due to the extent of personalisation within 5G networks, wireless modules must also offer providers and customers greater security as well as agility all along the device lifespan. Q: What are the new data protection challenges posed by 5G, and how can they be addressed? Jouffrey: The 5G era presents exciting opportunities, as well as security challenges. The greatest risks to enterprise data on 5G networks – including eavesdropping, man-in the middle attacks, denial of services, loss or compromisation of data – were already known in 4G. The 5G standards have looked at providing answers to these threats and come with some noticeable improvements, such as the encryption of the international mobile subscriber identity (IMSI), otherwise known as the Subscription Permanent Identifier in 5G. But what’s different with 5G is the threat surface area, due notably to the variety of devices that will be used over these 5G networks and the underlying technologies used for the deployment of the networks, such as cloud native virtualisation. On top of this, it’s the first generation of cellular to launch in an era of global cyber-crime, funded by organised crime and states alike. So, whilst enterprises should look to the ecosystem of telecom operators and cloud providers, vendors, and system operators to help understand the opportunities presented by 5G – this same ecosystem needs to guide them in countering any new risks that the 5G architecture may pose. The key to securing 5G enabled devices is to build security into devices from the outset using encryption. The key to securing 5G enabled devices is to build security into devices from the outset Q: What new roles can the 5G embedded universal integrated circuit card (eSIM) endorse in network authentication? Jouffrey: 5G is the first generation of cellular to launch in a buoyant eSIM market. The eSIM will be key in supporting network slicing authentication and security, enabling enterprises to leverage their credentials to pre-select network slices. However, to support secure authentication for mobile networks that may require the usage of different authentication algorithms over time, these 5G eSIMs must support this flexibility of usage of multiple authentication and authorisation credentials. With this capability built into these eSIMs from the start, mobile operators can remotely swap the authentication algorithm either for a dedicated primary authentication, or in a definitive way, thanks to key rotation management, thus maintaining a trusted environment.
IDEMIA, the globally renowned company in Augmented Identity, moved to its new headquarters in September 2018, in an 11-floor building located in La Défense business district, in Paris, France. The building brings together 1,300 employees out of total worldwide staff strength of close to 15,000 people. Biometric access control Due to the sensitive nature of its activities in this building, and given its position on the biometrics market, IDEMIA decided to deploy biometric access control throughout the entire building, a first in this business district and a fantastic opportunity to showcase IDEMIA’s flagship products in real life. Most employees get to the office via nearby metro and tram stations, and therefore, arrive within the same 30-minute window. This creates the need for a high throughput access control solution, for entrance and exit peak-times. Access to the six elevators serving the eleven floors is given after a first control at speed gates in the lobby area. MorphoWave Compact devices deployed IDEMIA opted for MorphoWave Compact associated to Digicon’s dFlow speedgates IDEMIA opted for MorphoWave Compact associated to Digicon’s dFlow speedgates. MorphoWave Compact devices were mounted on a special stylish stainless steel pedestal. Four dFlow lanes were installed, with readers for entry and exit. MorphoWave Compact is IDEMIA’s flagship biometric device for physical access control. It performs a 3D scan and verification of four fingerprints in less than one second, in a quick and easy touchless ‘wave’ gesture within the reader. dFlow speedgates These features make the product particularly well-suited for such high-traffic locations, with the capability to authenticate up to 50 people per minute, thanks to advanced algorithms based on Artificial Intelligence. With dFlow speedgates, Digicon introduces a new vision for access control gates, one with continuous flows and normally open doors. dFlow enables free flow, ushering new levels of comfort and security. Frictionless biometric solution The installation is highly acclaimed by employees who appreciate the frictionless use of MorphoWave Compact and its natural ‘wave’ hand gesture, as well as Digicon’s ‘always open’ dFlow concept, that enables them to get to the elevators in only a few seconds. Of course, IDEMIA was well-placed for this biometric employee access control deployment, being the provider of MorphoWave Compact. The employees were immediately convinced by the frictionless and hygienic experience it offered them. The team in charge of the security of the building found the MorphoWave Compact and dFlow combination more secure and less intrusive than other access control systems. Most importantly, what is true for a company like IDEMIA will also be true for any company in need of a high level of security delivered in a frictionless and convenient way, especially in high-traffic locations like in an HQ lobby.
The 100 Mount Street premium-grade office tower completed in May 2019, is the tallest (152m) building in North Sydney. With an innovative cross-braced exoskeleton structure and a soaring glass curtain wall, the tower celebrates Sydney‘s history of excellence in architecture and structural engineering. The 35-story office tower offers panoramic views of Sydney Harbour, Sydney Opera House and Sydney Harbour Bridge, and is occupied by some of Sydney’s best-known companies. The site also benefits from its proximity to key transport infrastructures with a train station, bus stops, ferry wharf and taxi stand all within walking distance. This high traffic location required a convenient and secure way to ensure controlled access for the 2,000 people entering the building everyday, while maintaining the aesthetics of the 8 metres-high ceiling lobby. Efficient control access to the building In order to efficiently control access to the building, the security contractor supplied top quality COMINFO EasyGate SPT entrance control gates equipped with IDEMIA’s MorphoWave™ Compact high-end biometric contactless devices. COMINFO is an experienced manufacturer of turnstiles and speed gates. EasyGate SPT models were installed, equipped with the latest MDD motor technology (Magnetic Direct Drive: no gearbox, no oil, no brush) and advanced infrared optical sensors which ensure safe passage and detect tailgating and cross-over, to ensure that only authorised people can pass through the gates. MorphoWave Compact™ is the flagship biometric device for physical access control from IDEMIA, the front-runner in Augmented Identity. The terminal performs a 3D scan and verification of 4 fingerprints in less than 1-second, in a quick and easy touchless wave gesture. Aesthetic integration The features of the product are particularly well-suited for high traffic locations with the capability to authenticate up to 50 people per minute thanks to advanced algorithms based on Artificial Intelligence. COMINFO carried out an aesthetical integration of MorphoWave™ Compact into EasyGate SPT, resulting in a powerful solution that brings the latest physical access control system using only a simple wave of a hand. The project was deployed by Centaman, COMINFO’s partner for Australia/New Zealand. First to implement biometric technology Dexus and Dexus Wholesale Property Fund who owned the building were the first to implement this biometric technology in office buildings and have now more than 2,000 people registered with their biometrics, removing the need for physical access cards or touching anything when entering or leaving the secured premises. The installation is highly acclaimed by employees who appreciate the frictionless and hygienic use of MorphoWave™ Compact and EasyGate SPT.
Sharps Pixley is a British bullion house, formed in 1957 when two historic private bullion partnerships merged. In 2015 Sharps Pixley decided to put physical gold back on the streets of London via a flagship high street presence in St James’s Street, just off Piccadilly. In this very special shop, not only can customers buy products but they can also store them on-location in new, state-of-the-art safe deposit box facilities. Sharps Pixley needed to upgrade their ageing control system for their safe deposit box service. Old biometric system They were facing a number of challenges with their old biometric system which was substantially impacting customer experience and satisfaction: Capturing fingerprints during the enrolment phase, especially with older clients, would typically take several attempts. During the verification process, the shop operator faced similar issues thus requiring multiple system restarts to get the device working correctly. The software was unstable and would often crash. New additional functionalities were also required to be able to offer the correct secure services to the clients: Two person authentication to access a single safety deposit box. Manual authentication in addition to biometric identification. Replacing the key fob with a biometric solution. Access control technology Arana Security was contracted to help. Operating in the UK and Middle East, Arana Security specialises in biometric solutions, access control technology, surveillance and monitoring systems. They set about to design a new application for Sharps Pixley, to enhance the security, authentication and usability of the system - adding new next-level security clearance and a fresh and improved enrolment of clients’ biometrics. For the important biometric part, Arana Security and Sharp Pixley selected IDEMIA’s MorphoWave Compact contactless fingerprint device to enable fast, smooth and accurate verification of clients. MorphoWave Compact performs a 3D scan and verification of four fingerprints in less than one second, in a quick, easy and hygienic touchless hand wave gesture. Thanks to advanced algorithms based on Artificial Intelligence, the accuracy is very high, even with ageing fingers. Contactless biometric devices The system provided has improved the client’s service and provided a more robust, secure and reliable solution The implementation of MorphoWave Compact contactless biometric devices meant less time wasted at the desk waiting for confirmation of IDs and less stress on both the clients and employees. The system provided has significantly improved the client’s service and provided a more robust, secure and reliable solution. Sharps Pixley’s comments: “We approached the Arana team with a particularly unique set of problems to resolve including a security system that used hardware and software originally designed for a totally different purpose. I knew what I wanted but was not sure if it was possible. I was essentially an explorer deep in the jungle with a perfect map in my own head, but with no tools or machinery to hack my way out." Provides palpable reassurance "Arana did more than just clear a path for me to get to my destination - they paved the road for me afterwards. MorphoWave Compact device from IDEMIA is the icing on the cake that makes this all possible. Used properly it is refreshingly simple and intuitive. The team here and our clientele no longer struggle to manage or use our access system. The device itself provides palpable reassurance in the technology and that has true value”, says Bruno Garcia, Sharps Pixley.
Almabani General Contractors has a long robust history which began when the founders established the company in Jeddah, Saudi Arabia, in October of 1972. They are a family-owned company that remains true to its founders’ spirit, covenants, innovation and perseverance. Almabani General Contractors For four and a half decades, Almabani have been building up their expertise to serve an ever more demanding and challenging construction need in the region. In a prosperous economy fuelled by the oil boom, the company was positioned to participate in the execution of some of the most prestigious landmark projects in the Kingdom of Saudi Arabia. They have the highest classification in all civil and electrical works with in-house capabilities to develop design and value engineer solutions to cater to the customers’ needs. They have proudly executed projects from complex infrastructure works to heavy civil engineering structures. Engaged in highly competitive turnkey projects The company is engaged in highly competitive turnkey projects worth several billion dollars The company is engaged in highly competitive turnkey projects worth several billion dollars. To this end, Almabani continues to invest in quality, value engineering, proactive and talented people, endeavoring at all times to satisfy their customer’s expectations and to best serve the welfare of the society. Replacing decentralised access control systems Almabani General Contractors was using traditional decentralised access control & time-attendance systems in which they were facing the issue of excessive manual work and inaccurate data. Because of the poor quality of the existing biometric sensors, user fingerprints weren't recognised in the first attempt and the process was annoying and time-consuming. As the company is dealing with construction work, one of the major challenges for construction workers is accurate attendance marking despite dirty/stained fingers. Moreover, due to existing software limitations, many policies of access control and time-attendance couldn’t be implemented. As the existing system was decentralised, on-field employees faced issues while marking their attendance. Only basic reports could be prepared for attendance and access whereas they needed more customised reports because of various shifts and different contract workers. Moreover, third party integration was not possible in the earlier system. And last, but not the least, they were unsatisfied with support from the past supplier. Matrix access control and time-attendance solution Matrix solutions experts collaborated with the decision heads to understand the exact requirement and provide a cost-effective solution. After a comprehensive discussion, Matrix offered a centralised solution for all the locations. With the Matrix time-attendance and access control solution, the customer has overcome all the challenges. Now, it's possible for them to get control of all the locations from a single central location. Multispectral fingerprint sensor technology To stop inaccurate attendance marking, Matrix offered multispectral fingerprint sensor technology To overcome the problem of inaccurate attendance marking due to dirty/stained fingers, Matrix provided the multispectral fingerprint sensor technology which contains information about both the surface and the subsurface features of the skin. This technology gives a high throughput. They also acquired Palm Vein Reader for contactless authentication verification for the higher authorities. The solution from Matrix is fully customised with multiple shifts and attendance policies that can be applied to individual users. The smart mobile application for attendance marking and leave applications facilitate easy operation for users. Now, the customer is able to get the report of each employee with 200 different options. Auto-push technology With the auto-push technology, there is no need to transfer the data into the server. The data is automatically transferred to the server in real-time. The customer also got flexibility in terms of connectivity with 3G and WiFi options. The system from Matrix also provided the flexibility for easy integration with the third-party payroll system. Result: Accuracy in attendance management Centralised time-attendance and access control management High possibility of third-party integration User-friendly and fast process because of good quality sensor OEM support Contactless and advanced technology Flexibility in terms of integration, connectivity and credentials Products Offered: COSEC DOOR PVR – Palm Vein based Door Controller COSEC PATH DCFE – Biometric Fingerprint + RFID based Door Controller COSEC PATH DCCE – RFID based Door Controller COSEC PANEL LITE – Site Controller for Advanced Access Control Features COSEC LE PLATFORM – For 1500 + Users COSEC LE TAM – Time-Attendance Application Module COSEC LE ACM – Access Control Module COSEC LE ESS – Employees Self Service Module (Mobile App) COSEC INTEGRATION - Integration with In-house Payroll Software
G4S is the globally renowned integrated security company with operations in approximately 85 countries. At the core of the business is G4S Integrated Security, which combines expertise, security professionals, technology and data analytics. G4S Integrated security G4S delivers integrated security around the world with the last six months having brought significant change for the company. The sale of the conventional cash business has enhanced strategic, commercial and operational focus and strengthened the company’s financial position. G4S is transforming, with an intensified focus on integrated security solutions strategy. They are winning business faster and growing stronger than ever before. Through the launch of the global G4S Academy, the organisation is offering an opportunity to share knowledge and work more collaboratively with customers. Sector specific solutions and a global approach to risk and investment in technology are delivering clear benefits to customers and differentiating G4S’s offering in the security market. Below are some examples of G4S Integrated Security delivered to customers around the world. G4S Americas In the United States, one of G4S Americas’ Security and Risk Operations Centre helps prepare for, monitor and respond to threats from one central location. The Security and Risk Operations Centre, based in Florida, provides integrated security solutions by seamlessly combining monitoring capabilities, data analytics, enterprise risk intelligence and global response services. Through actionable data and valuable insights, G4S experts are able to identify threats early and respond quickly. Their technology enabled intelligence-gathering and data analytics enable customers to know immediately when incidents occur. They also allow the organisation to support customers by optimising spend, mitigating risk and enhancing their security programmes. G4S Europe & Middle East The diverse team of highly-trained security professionals has adapted to the changing security climate At a Critical National Infrastructure site in southwest England, G4S’s connected security professionals use technology and data to assess threats, manage incidents, and keep a large workforce safe. The diverse team of highly-trained security professionals has adapted to the changing security climate and conduct automated fever screening, as people enter their site. Specially trained security professionals use the best technology, including G4S’s proprietary software RISK360, on this complex, long-term project. G4S RISK360 proprietary software G4S RISK360 proprietary software allows the team to manage incidents, instantly share information, and detect patterns and trends. The training of connected security professionals is tailored to the site. They are setting the gold standard on securing critical infrastructure. In 2019, the Singapore Government asked the industry to prioritise technology over manpower through ‘Outcome Based Contracting’. G4S won an important contract to secure 62 schools using the Threat, Vulnerability, and Risk Assessment (TVRA) Solution. Threat, Vulnerability, and Risk Assessment Solution TVRA risk-based solution combines access control, biometric time and attendance with patrol and response The TVRA (Threat, Vulnerability, and Risk Assessment) risk-based solution combines access control, visitor management systems, biometric time and attendance with patrol and response, incident reporting, and remote CCTV monitoring. G4S security professionals and Security Risk Operations Centre are in control of the situation, at all times, using cutting edge technology and data analytics. These are just some of the ways by which G4S is securing the world. G4S Africa In South Africa, G4S security integration of risk consulting, security professionals and technology, for a global FMCG brand, is underpinned by the organisation’s data analytics. G4S security professionals protect valuable goods that are delivered all over the country. From the G4S Security and Risk Operations Centre near Johannesburg, experts use G4S RISK360 proprietary software to enable secure and reliable deliveries. The security software provides critical data and analysis that is then used to monitor and deploy resources to the highest risk areas. This data is continually shared with the customer, laying the foundation for a partnership that is building a more secure future.
St. James Hospital in Dublin, Ireland, which has more than 1,000 beds, is a teaching hospital that specialises in not only treatment but health promotion and preventative services at its central location. It is also a central location for the treatment of COVID-19 patients. Tasked with keeping patients and staff safe from the threat posed by the COVID-19 pandemic, St. James Hospital needed a way to add additional screening capabilities to its facility alongside its existing access control terminals. The technology needed to bring a multi-layered approach to screening individuals entering the hospital facility who could potentially introduce a significant amount of risk to those within the facility. Access control solution integrated St. James Hospital chose the Vanderbilt ACTpro access control solution integrated with the ZKTeco Proface-X-TD Facial Recognition Terminal to address its challenges. The ACTpro solution specifically used the ACT1500 Single Door IP Controller and ACT1030 MiFare Card Reader alongside the ZKTeco system. The Proface-X-TD solution uses intelligent engineering facial recognition algorithms and the latest computer vision technology. It supports both facial and palm verification for a fully touchless experience. Coupled with the Proface-X-TD solution, ACTpro can not only grant and restrict access based on biometric functionality, but can detect mask-wearing and high temperatures as a means to grant or restrict access to the facility. As a result, better hygiene is achieved with touchless biometric authentication, skin temperature detection, and masked individual identification. Anti-spoofing algorithm If a member of the staff presents to the door with high skin temperature, that individual is routed to another location, and the door will not open to identify potential infection. The Proface-X-TD solution is also equipped with an anti-spoofing algorithm for facial recognition against almost all types of fake photos and videos. The solution is ideally suited to hospitals like St. James because of their ability to be layered as part of a comprehensive approach to screening individuals considered at-risk for infection as a means to protect patients and other staff members. Elevated temperatures detections The touchless nature of the terminals brings safety and hygiene issues to the forefront, cutting down on possible exposure to infectious disease. The device detects people with elevated temperatures who can then be further scrutinised to add extra screening processes and identify potential disease exposure. This ability, along with the visitor check-in and tracking processes integrated with the ACTpro access control system, is a critical component in today’s modern healthcare facilities to provide real-time data for security officials.
Round table discussion
A shift toward touchless devices during the coronavirus pandemic has been a boon to the biometrics sector. Another factor in the recent increase in use of biometrics is lower prices, which are a symptom of a maturing market and of new technology capabilities. Increasingly, integration of biometrics with access control and other security systems is expanding use cases and sales numbers. For additional insights, we asked this week’s Expert Panel Roundtable: What are the new trends and opportunities with biometrics (facial, fingerprint, iris and/or voice)?
The first half of 2020 has been full of surprises, to say the least, and many of them directly impacted the physical security market. The COVID-19 pandemic created endless new challenges, and the physical security market has done our part to meet those challenges by adapting technology solutions such as thermal cameras and access control systems. In the second half of 2020, we can all hope for a return to normalcy, even if it is a “new normal.” In any case, technology will continue to play a big role. We asked this week’s Expert Panel Roundtable: Which technologies have the greatest potential to disrupt the security industry in the second half of 2020?
The general public gets much of its understanding of security industry technology from watching movies and TV. However, there is a gap between reality and the fantasy world. Understanding of security technologies may also be shaped by news coverage, including expression of extreme or even exaggerated concerns about privacy. The first step in addressing any challenge is greater awareness, so we asked this week’s Expert Panel Roundtable: Which security industry technology is most misunderstood by the general public and why?