Iris ID, a provider of iris recognition technology, announces its iCAM R100 solution now integrates with KeyTracer key management cabinets and AssetTracer Smart Lockers from Real Time Networks. The two management systems – using Iris ID’s biometric identity solution – will be showcased Sept. 25-27 at the Global Security Exchange (GSX) in Las Vegas. Real Time Networks’ modular key management cabinets and electronic asset lockers employ custom modular designs to protect ke...
Newly modernised halls with lots of daylight will house hundreds of exhibitions and conference events at the upcoming Security Essen 2018 at Messe Essen, Germany. A new layout and hall numbering system will be unfamiliar to past attendees but promises to simplify the experience as it brings together attendees and exhibitors. European physical security market Security Essen is an international trade fair, but the emphasis is more on German, Austrian and Swiss companies. In all, Security Essen w...
LOCKEN was established in 2003, combining the knowledge and expertise of its three founders, Arnaud Flecchia, Roland de la Chapelle and Stéphane Conreux. Well established within the telecom and IT world, this threesome has transformed the business of access control: thanks to breakthrough technology, based on intelligent keys and user-friendly software, they brought to the market a solution that required no wiring or maintenance. This was a remarkable leap forward that has fully benefited...
NEC Corporation (TSE: 6701) announced an investment in Tascent, Inc., a U.S.-based biometric system company, with the aim of accelerating the global expansion of its safety business. The amount of the investment is not disclosed. Recently, the demand for multimodal biometric identification to further bolster security is rapidly growing. Within this environment, the iris identification market is expected to experience significant growth. NEC has been developing biometric identification technolog...
Convergint Technologies, globally renowned service-based systems integration company, has announced the acquisition of Altel. With 28 years of systems integration experience, Altel develops sophisticated, intelligent electronic security solutions for customers across many vertical markets. "Altel brings us strong integration capabilities and deeply experienced colleagues," said Ken Lochiatto, CEO of Convergint Technologies. "They will further enhance our reach and service offering, enabling us...
Matrix, manufacturer and believer of ‘Made in India’ Telecom and Security solutions, has been a host of a number of its maiden event Insight. This event has been conducted and used as a platform to spread the company’s reach in different markets, getting in touch with partners and prospective system integrators. Matrix Insight Indonesia 2018 Matrix is all set for yet another Insight event in Indonesia. The event will be hosted at the Shangri-La Hotel, Kota BNI, Jln. Jend. Sud...
Secutech Vietnam 2018 reached new heights as it closed its doors, having seen visitor numbers shoot up to an estimated 13,800+ (2017: 12,097). Positive feedback from buyers and exhibitors alike also cemented the fair’s position as the ideal shop window into the regional security industry. Secutech Vietnam 2018 The new Smart Home and Smart Building zone was added to the show floor this year alongside the returning Security zone and the Fire & Safety zone The enlarged show occupied the entirety of Hall A at the Saigon Exhibition & Convention Center and was categorised into three separate zones that accommodated buyers from different sectors. Of particular note was the new Smart Home and Smart Building zone, which was added to the show floor this year alongside the returning Security zone and the Fire & Safety zone. The addition of the new zone contributed to an uptick in exhibitor numbers at the show, which rose 16% from last year’s total to reach 310 exhibitors from 20 countries and regions (2017: 270). The knock-on effect of this increase was an 11% rise in exhibition space, which reached 10,000 sqm (2017: 9,000 sqm). Speaking about the driving forces behind these impressive numbers, Ms. Regina Tsai, Deputy General Manager of Messe Frankfurt New Era Business Media Ltd said: “The high number of government and commercial sector development projects in Vietnam has translated into significant demand for surveillance, access control, biometric recognition and other related security and fire safety solutions. With this in mind, I am delighted that buyers are increasingly recognising Secutech Vietnam as the place to source these products and cross paths with major international and domestic suppliers.” Smart Home and Smart Building solutions A large number of suppliers were present at the Smart Home and Smart Building zone, which was a hive of activity during the fair. Astec, Dahua, Phuong Viet, Samsung, Smart Z and a blend of related companies displayed products at the zone, with solutions that stretched from home automation and controls, to intelligent building and energy saving devices. The addition of these technologies to the show floor contributed to making the 2018 edition of Secutech Vietnam the most comprehensive to date. One notable debutant at Secutech Vietnam was hosted at the new zone in the form of the Z-Wave Pavilion. The flourishing residential property sector helped to attract system integrators, distributors and end users of home automation technologies to the pavilion, which housed smart lock manufacturers Saykey and Kaadas. Meanwhile, SMAhome also made its first appearance at Secutech Vietnam with a host of IoT enabled technologies for Smart Home. Fire and Safety solutions Two other pavilions to experience high footfall during the show were the Korea Fire Institute (KFI) and UL Pavilions at the Fire & Safety zone Two other pavilions to experience high footfall during the show were the Korea Fire Institute (KFI) and UL Pavilions at the Fire & Safety zone. A host of Korean companies and associations were present at the KFI Pavilion to showcase fire extinguishers, fire alarms, fire hoses, alarm control units, firefighting suits, escape chutes, valves, and related equipment. Meanwhile, the UL Pavilion was home to UL certified fire safety products from brands such as CSJ, HD Fire, NM Fire, Newage Fire, PCJ, UL and WEFLO. Plenty of attention and positive feedback also surrounded the new Singapore Pavilion. Led by the Association of Small and Medium Enterprises, the pavilion featured modular control platforms, key management systems, facial recognition systems, and surveillance solutions with applications for Vietnam’s growing smart city market. Smart Solutions Vietnam Forum To supplement the exhibition portion of Secutech Vietnam, a fringe programme of concurrent events was organised to promote information exchange. One highlight was the new Smart Solutions Vietnam Forum which allowed speakers from high profile companies Bosch, Kedacom, ICP DAS, Samsung, Seagate, and Western Digital to deliver presentations about their latest innovations as well as future industry trends. The well-received forum, which was followed by a business networking party, focused on new and upcoming solutions for the six vertical markets of smart transportation, smart storage, smart factory, smart building, smart enterprise, and smart city. Fire & Safety Rescue Seminar Further opportunities for learning and information exchange were on offer at the Fire & Safety Rescue Seminar Meanwhile, further opportunities for learning and information exchange were on offer at the Fire & Safety Rescue Seminar which returned again this year with a host of informative presentations, such as “Fire Safety Applications for Industrial Revolution 4.0”. Among the speakers were members of the Korea Fire Institute and UL pavilions, who discussed solutions for factory, building and personal safety.
Kwikset brand of Spectrum Brands, Inc., Hardware and Home Improvement Division, global provider of residential security systems, announces a new Control4 version of its Signature Series Deadbolt with Home Connect. Utilising the popular Kwikset single-cylinder deadbolt as its foundation, this keypad-less lock is ideal for homeowners seeking the safety and peace of mind of a Home Connect solution who are already using or are considering a Control4 Smart Home. Control4 Signature Series Deadbolt Kwikset will be showing the Control4 version of its Signature Series Deadbolt with Home Connect at the Control4 Pavilion at CEDIA 2018 in San Diego, CA, September 6-8. As a Connects with Control4 certified partner, the new version for Control4 enables true remote locking and unlocking, allowing homeowners to access and control the lock from anywhere in the world, using the Control4 OS or Control4 App on a smartphone, tablet or internet connected device. As a result, they can lock a door while traveling for work or vacation and can also remotely provide access to their home to service providers, guests or other family members. Users can also receive notifications of the lock’s activity, as well as creating customised scenes within the home. The Control4-ready Kwikset Signature Series Deadbolt is ideal for consumers uncomfortable with keypad entry Remote locking and unlocking A new, discreet way to connect to the home, the Control4-ready Kwikset Signature Series Deadbolt is ideal for consumers uncomfortable with keypad entry or who prefer the aesthetics of a traditional deadbolt. Besides its use as a highly secure front-door lock, it can also be a great solution for extending connectivity to side and back doors. A unique feature of the Control4-ready is the two installation possibilities available to homeowners: SmartKey Security Replace the Entire Deadbolt: Users can change out both the interior and exterior of their current door lock to gain a smart lock. In this mode, the lock provides Kwikset’s patented SmartKey Security, which protects against advanced break-in techniques. It also allows homeowners to re-key the lock themselves in seconds. Traditional key functionality as a backup is also available. Convert Installation Application: Users can replace just the interior of the current door lock to convert it into a smart lock, maintaining the aesthetics of the current lock exterior. In this mode it is compatible with select, single-cylinder deadbolts including Kwikset, Weiser, Schlage, and Baldwin. Smart Home Solutions The Signature Series Deadbolt has become an extremely popular, affordable lock that brings homeowners the convenience of remote locking and unlocking from anywhere in the world" Keith Brandon, Kwikset’s Divisional Vice President – Residential Access Solutions (RAS) Sales and Marketing, noted that this new version for Control4 is a natural extension of one of the company’s most popular locks. “The Signature Series Deadbolt has become an extremely popular, affordable lock that brings homeowners the convenience of remote locking and unlocking from anywhere in the world,” he said. “It made perfect sense to bring this convenience and security to the users of Control4, a well-established smart home platform that is experiencing its own level of significant growth.” Encryption security The Signature Series Deadbolt with Home Connect also features: BHMA Grade 2 Certification, ensuring top quality durability; UL Certification with a 20-minute fire rating; and full 128-bit encryption security. In addition, the lock’s revolutionary tapered deadbolt design enables misaligned doors to lock without pulling and pushing a door shut. Remarkably easy to install, the new deadbolts require just a screwdriver, need no hard wiring, and operate on 4 AA batteries that will last for approximately one year.
Considering how much the modern smartphone has become a common everyday tool and cultural icon, it’s hard to believe it has only been with us for a relatively short space of time. The first Apple iPhone was launched in 2007 and yet in a little over a decade the smartphone has become as essential as our keys or wallet. From its conception as a multi-faceted communications device, it has morphed into something far more integrated in our daily lives. Services such as Apple Pay, Android Pay and PayPal have seen the smartphone become a credible replacement for cash and cash cards, but equally, it is possible to replace access cards and keys as well.Smartphones can easily receive authentication credentials remotely and access can be confirmed or denied instantly The ability to accurately authenticate an individual and the applications this offers for security purposes, is something that the security industry needs to continue to embrace and further promote to our customers. Considerable advantages Most security professionals understand the potential benefits of using mobile device authentication, with flexibility being the key advantage. Smartphones can easily receive authentication credentials remotely and access can be confirmed or denied instantly. Equally, smartphones already contain many secure options to ensure they are only used by the authorised user – fingerprint and face recognition, as well as pattern authentication and PIN, being prime examples. Unfortunately, there is still a lack of awareness amongst some security operators, customers and the public of these exciting benefits. Potentially there may also be some reluctance, in certain quarters, to trusting a mobile device with physical security. A lack of trust in seemingly ‘unproven’ technology is not unusual, but the security industry needs to demonstrate reliability along with the considerable security and convenience benefits of using it. Trusted part of security network Many smart devices already securely bind the mobile device with the right person by using 2-factor authenticationMobile device security needs to earn its trust, in much the same way as any other new ground-breaking application. In fairness to the doubters, it’s not hard to imagine how much of a risk a badly protected mobile device could be to any secure network! There are two key obstacles that smartphones need to clear before they can become a trusted part of the security network though. Firstly, that they are secure enough to be trusted as part of a security network, and secondly that they can reliably identify an authorised user in a real-world environment. Many smart devices already securely bind the mobile device with the right person by using 2-factor authentication. For example, this could combine a PIN code with the fingerprint or face of the authorised individual. In areas with particularly high security, you could also implement a wall-mounted biometric reader (fingerprint, facial recognition or iris scan) to add a further level of protection and ensure there is no wrongful use of the mobile device. Security tokens or access cards are typically rigid in their programming, only allowing access to certain areas Security by location With its many and varied functions, undoubtedly one of the most useful systems on any smartphone is its GPS location tracking. It’s also a perfect tool to assist with security systems interaction.A benefit of using smart device authentication is the cost savings over operating traditional tokens Consider any secure facility – it will feature different levels of access. This can vary from a humble canteen and break-out areas, right through to secured doors around potentially dangerous or highly sensitive areas - such as plant rooms, or even a nuclear facility! Security tokens or access cards are typically rigid in their programming, only allowing access to certain areas. A smartphone, however, can be granted or denied access depending on the location of the request by the individual – GPS literally adds a level of extra intelligence to security. Personal items Using QR codes seem to be a simple but reliable identity and access control authentication option Mobile devices tend to be guarded and protected with the same concern as your money or your keys. Many of us literally carry our mobile device everywhere with us, so they are relatively unlikely to be misplaced or lost – certainly in comparison to a key card for example. Also, think about how often you use or hold your smartphone – some estimates suggest 2,600 times each day! With that level of interaction, you’ll be aware very quickly if it’s been misplaced, not least because of the inconvenience and cost to replace it. This level of personal connection makes it perfect for use with security systems. Cost savings Another obvious benefit of using smart device authentication is the cost savings over operating traditional tokens. No more plastic badges, access cards, lanyards, printers and consumables used to administer security. This is something the security industry really needs to shout about! It will come as no surprise to hear that smartphones are exceptionally common too. Figures suggest that in 2015 there were nearly 41m in use in the UK and this is predicted to rise to 54m by 2022. With the UK population being just over 65m, that is a very high percentage of people already carrying this technology. Using a resource that people already have, and which is highly secure, makes unquestionable financial as well as practical sense. GPS location tracking is a perfect tool to assist with security systems interaction Integrated technology Agreeing on common and shared open protocols has unfortunately been one of the stumbling blocks for the security industry in adapting to a predominantly smartphone authentication approach. NFC (Near Field Communications) technology in mobile phones and smart devices has failed to be the universal success it promised.Not everyone has an iPhone, but it is such an important segment of the market for customers Mobile technology trends have dictated to the systems that use it. Apple’s earlier (Pre iOS 11) decision to restrict the use of NFC to Apple Pay on its devices has had a profound effect on the implementation of NFC in other applications too. Not everyone has an iPhone, but it is such an important segment of the market that other manufacturers are wary of how customers will be able to use any new technology. We have seen a much bigger focus on using Bluetooth Low Energy technology on mobile devices instead. With providers such as HID Global, STid in France and Nedap in the Netherlands now concentrating on developing Bluetooth Low Energy readers and mobile credential applications, this seems like a highly credible alternative. Along with NFC and Bluetooth Low Energy options, there also seems to be a lot of interest in using QR codes as simple but reliable identity and access control authentication. These can easily be displayed on a screen or printed if necessary, giving great flexibility over the type of technology that is used in the future. Upgrading existing security systems There are strong arguments for many businesses to continue using MIFARE+ systems if they suit operations well We are steadily seeing the signs of smartphone authentication replacing the cards and tokens we have been familiar with. However, many consumers still want options rather than to just be railroaded down one path. A business that has invested in cards or tokens will want to use that technology investment fully. The changes will come when readers are updated – this is when security specifiers and installers need to promote the advantages of dual-technology readers, which offer options to include smartphone authentication into the mix. There is still considerable diversity amongst smart devices, the operating systems they use, and the security technology employed by each. Android, Apple iOS and Blackberry devices all vary with regards to the biometric authentication available, so security administrators may need to be flexible on the types of authentication they accept. Interestingly, card technology has also progressed at an astonishing speed too – with MIFARE+ proving to be a highly cost-effective, practical and secure system that can easily be integrated. There are strong arguments for many businesses to continue using these systems if they suit operations well. NFC (Near Field Communications) technology in mobile phones and smart devices has failed to be the universal success it promised Hybrid systems A hybrid approach may be the best answer for many security operators. This means those who choose to enjoy the benefits in terms of flexibility and convenience of smartphone authentication can do so, whilst those who are more hesitant can continue to use more traditional methods. A hybrid approach may be the best answer for many security operators Larger organisations may find that the swap over is a slower and more gradual process, whilst smaller start-up businesses may prefer to jump to a smartphone-based approach straight away. If security systems are well integrated but modular in their approach, then it becomes much simpler to evolve as time goes on. Embracing the benefits Using their app-based systems architecture, smartphones are ideally placed to evolve with security systems in the future. There are many benefits for the security industry and our customers, but we need to remember that this move will involve a culture change for many security operators and users. The security industry needs to be mindful and respectful of any anxiety, but also be positive and promote the considerable benefits mobile authentication offers.
Over the past few years, biometrics has rapidly expanded into consumer applications, like the financial market for customer authentication, to payment services and withdrawing cash from ATMs in high-fraud markets. However, its adoption as an additional authentication factor for physical access control systems (PACS) and other enterprise applications, hasn’t been as rapid. But this is changing. Biometrics offers numerous benefits at the door and throughout the enterprise. With the advent of new anti-spoofing capabilities, and its integration into secure trust platforms that protect privacy and support a variety of RFID credential technologies, biometric authentication is poised to deliver a much higher matching speed and better overall performance. This will dramatically improve an organisation's security, whilst enhancing user convenience.Newer solutions are overcoming security and convenience hurdles to help realise the full potential of biometrics Challenges for biometric authentication Biometrics fuses convenience and security while validating “true identity” versus identity that is associated to the possession of an ID card. As an example, biometrics prevents a user from taking someone else’s card and obtaining access to privileged resources. This adds the human element to traditional methods of authentication, strengthening security by combining something the user “is” with something the user “has” or “knows.” According to the firm ABI Research in its May 2018 study, Biometric Technologies and Applications, the total fingerprint sensor shipments for the entire consumer market is “estimated to reach 1.2 billion worldwide for 2018, thus ensuring its market dominance.”It has been far too easy for fraudsters to create a fake fingerprint and present it to a reader Despite the benefits of fingerprint authentication in numerous consumer applications, there have been impediments to its broader adoption in the enterprise. While price has been one big roadblock, there have also historically been other reasons for its slower-than-expected growth. First, many technologies are still vulnerable to spoofs and hacking. It has been far too easy for fraudsters to create a fake fingerprint and present it to a reader. Equally troublesome, older products have not been able to move users through the doors as fast as a simple ID card and reader. In general, all fingerprint capture technologies are not equal amongst older products, and there can be significant differences in performance. Developing Technology Performance Newer solutions are overcoming these security and convenience hurdles to help realise the full potential of biometrics. Their development has focused on three key areas: How fingerprint images are captured – if the image can’t be properly captured, the rest of the process fails The implementation of liveness detection to enhance trust – even in the case when the image is properly captured, if it is fake the system cannot be trusted Optimising performance through a combination of new technology and algorithms, whilst ensuring interoperability so the performance can be trusted. The skin is illuminated at different depths to deliver much richer data about the surface and sub-surface features of the fingerprint Optimising capture The quality of the captured image is critical, across all types of fingerprints and environments. Many customers choose sensors that use multispectral imaging because it collects information from inside the finger to augment available surface fingerprint data. The skin is illuminated at different depths to deliver much richer data about the surface and sub-surface features of the fingerprint The skin is illuminated at different depths to deliver much richer data about the surface and sub-surface features of the fingerprint. Additionally, the sensor collects data from the finger even if the skin has poor contact with the sensor, because of environmental conditions such as water or finger contamination. Multispectral sensors work for the broadest range of people with normal, wet, dry or damaged fingers, across the widest range of usage conditions – from lotions or grease to sunlight to wet or cold conditions. The sensors also resist damage from harsh cleaning products and contamination from dirt and sunlight. Liveness detection Liveness detection is the ability to determine that the biometric data captured by the fingerprint reader is from a real living person, not a plastic fake or other artificial copy. An increasingly visible dimension of biometric performance in commercial applications, liveness detection is critical for preserving trust in the integrity of biometrics authentication. At the same time, it must not impede performance or result in excessive false user rejections.While liveness detection optimises performance, it is also important to ensure that this performance can be trusted The most trusted multispectral imaging fingerprint sensors with liveness detection provide a real-time determination that the biometric captures are genuine and are being presented by the legitimate owner, rather than someone impersonating them. This capability leverages the image-capture approach of using different colors or spectrum of light to measure the surface and subsurface data within a fingerprint. In addition to this optical system, the biometrics sensor features several core components, including an embedded processor that analyses the raw imaging data to ensure that the sample being imaged is a genuine human finger rather than an artificial or spoof material. Advanced machine learning techniques are used so the solution can adapt and respond to new threats and spoofs as they are identified. While liveness detection and the underlying capture technology optimises performance, it is also important to ensure that this performance can be trusted. This requires adequate testing to ensure interoperability with template matching algorithms. The first requirement for incorporating biometrics into a physical access control solution is a secure trust platform Trusted performance The top-performing solutions capture usable biometric data on the first attempt for every user. They also speed the process of determining that the biometric data is not a fake, and they quickly perform template matching to reject impostors and match legitimate users.The card/mobile plus finger mode is one of the fastest-growing two-factor authentication use cases for securing access to both physical and digital places To trust this performance, though, the focus must be elsewhere: on interoperability with template-matching algorithms. Extensive interoperability testing must be performed by skilled and independent third parties like the National Institute of Standards and Technology (NIST) so that performance data can actually be trusted in all template-matching modes, and not simply a vendor claim. Template matching modes Template-on-card and card/mobile + finger modes using “1:1” template-matching profiles authenticates a person’s identity by comparing the person’s captured biometric template with one that is pre-stored in a database. Template-on-device mode for finger-only authentication using “1:N” matching compares the person’s captured biometric template against all stored biometric templates in the system). The card/mobile plus finger mode is one of the fastest-growing two-factor authentication use cases for securing access to both physical and digital places.Cryptography prevents any man-in-the-middle attacks while also protecting the biometric database As an example of how to deliver trusted performance, HID Global uses the top-ranked NIST certified MINEX III minutia algorithm to ensure interoperability with industry-standard fingerprint template databases. This interoperability ensures that today’s systems, which are based on much more powerful hardware than in the past, will perform accurate 1:N identification of a full database in less than a second. Physical access control integration The first requirement for incorporating biometrics into a physical access control solution is a secure trust platform designed to meet the concerns of accessibility and data protection in a connected environment. The platform should leverage credential technology that employs encryption and a software-based infrastructure to secure trusted identities on any form factor for physical access control, access to IT networks and beyond. Cryptography prevents any man-in-the-middle attacks while also protecting the biometric database. This system also must encompass remote management of all readers and users, spanning all onboarding as well as template loading and enrolment activities for supported authentication modes. Properly implemented, biometrics solutions with liveness detection also protect privacy – if you can’t use a fake finger, it is meaningless Other important focus areas include configuration and administration, plus all logs, reports and monitoring.New system architectures and data models have been created to protect personal information and maintain user privacy It should be possible to manage biometric readers as groups or individually over the network, and tools should be available to allow system administrators to manage all configuration settings from time and data to language, security and synchronisation. The system should enable continuous live monitoring of authentication, alerts and system health, and provide a rich set of associated reporting tools. There are also backend implementation decisions to be made, including how a biometric authentication system will be seamlessly integrated into third-party systems. This is another major pain point of biometric technology. To simplify deployment, application programming interfaces (APIs) should be available for direct integration of the biometrics authentication solution with the access control infrastructure. Privacy considerations Properly implemented, biometrics solutions with liveness detection also protect privacy – if you can’t use a fake finger, then even if you did obtain someone’s fingerprint data, it is meaningless. Strong and updatable liveness protection is critical if biometrics are to eliminate the need to use PINs or passwords.Strong and updatable liveness protection is critical if biometrics are to eliminate the need to use PINs or passwords Biometrics data must be handled like all sensitive and identifying information, and properly architected system designs will always consider and protect against both internal and external threats and attacks. New system architectures and data models have been created to protect personal information and maintain user privacy. Beyond the encryption of the data itself, there are now many good alternatives available for building highly secure and well protected systems, including the use of multi-factor and even multi-modal authentication to maintain security even if some identifying data is compromised. Today’s modern fingerprint authentication solutions are on a fast track to deliver a unique combination of ease of use, availability and convenience and higher security to physical access control systems. With their latest improvements in liveness detection, system architectures, performance and ability to be easily incorporated into access control solutions, they seamlessly combine security and convenience to make them a viable option when accessing a facility, networks and services. These solutions deliver a higher confidence of “who” is being admitted through the building’s front door, where it really matters.
Allied Universal, global security and facility services company, announced that it has reached an agreement to acquire U.S. Security Associates (USSA) from Goldman Sachs Merchant Banking Division (GSMBD), further building on its position as a major global player in the security services industry. This transaction includes the acquisition of Andrews International, the global arm of USSA. USSA has operations in the United States and internationally, with revenues in excess of $1.5 billion and more than 50,000 employees Allied Universal takes over USSA Based in Roswell, Georgia, USSA has operations in the United States and internationally, with revenues in excess of $1.5 billion and more than 50,000 employees. This acquisition is expected to increase Allied Universal’s national presence and customer service capabilities and will also enhance Allied Universal’s presence in Canada, as well as expand its footprint to Central America and the United Kingdom. USSA also provides Allied Universal with a sizable consulting and investigative division and event staffing business, StaffPro. The combined organisation will provide unparalleled and comprehensive security solutions to its customer base around the globe. “I am excited to welcome the USSA team to the Allied Universal family,” said Steve Jones, Chief Executive Officer of Allied Universal. “USSA has evolved into one of the leaders in the security industry over the years and provides a unique suite of security solutions to a wide array of clients across industry verticals. This transaction aligns with our long-term growth strategy of acquiring scalable businesses with significant potential when combined with the Allied Universal platform. I look forward to collaborating with the USSA team to maximize the value that together we will bring to our customers and in identifying new ideas in the security space,” said Jones. Allied-USSA business integration The transaction further bolsters Allied Universal’s position as a leading provider of security officer services" Richard Wyckoff, President and Chief Executive Officer of USSA, praised his team and embraces the partnership. “This merger with Allied Universal is a testament to the hard work and dedication of the men and women of USSA. We have focused on world-class customer service by providing innovative manpower and technological solutions to our clients. The industry has taken notice. I am very proud of what our team has accomplished and very excited that integrating our business with another industry leader will mean more growth opportunities and career advancement potential for our associates,” said Wyckoff. “This transaction further bolsters Allied Universal’s position as a leading provider of security officer services. We have been proud to support the Allied Universal team as they have grown the business organically and through strategic and transformative acquisitions such as this one,” said Chandler Joel Reedy, Managing Director of Warburg Pincus, a principal shareholder of Allied Universal. “We are excited to combine USSA with Allied Universal, which has a large and diverse portfolio of customers both in the U.S and internationally. Allied Universal will be exceptionally well positioned to continue to deliver unmatched service to its thousands of clients.” As one of the two principal shareholders of Allied Universal, Wendel is supporting the company’s continued growth as the industry continues to evolve" Wendel North America Wendel North America CEO David Darmon said, “As one of the two principal shareholders of Allied Universal, Wendel is supporting the company’s continued growth as the industry continues to evolve. This is consistent with our original investment thesis and we think will further enhance the company’s leadership position.” The transaction is expected to close by late third quarter of 2018, subject to customary regulatory approvals. Financial advisors to Allied Universal for the transaction included Barclays, Citi, Credit Suisse, Deutsche Bank, HSBC, Moelis, Morgan Stanley and Societe Generale. Cleary Gottlieb Steen & Hamilton LLP provided legal counsel to Allied Universal. Financial advisors to U.S. Security Associates included Goldman Sachs and KeyBank. Fried, Frank, Harris, Shriver & Jacobson LLP provided legal counsel to U.S. Security Associates. Terms of the deal were not disclosed.
Last month saw Pyronix showcase both current and conceptual technologies at IFSEC 2018 at the ExCeL London. The key theme for us at the show was ‘Advancing Integration, Delivering Change’ and this was very well received. “It was a fantastic show and one that allowed us to show exactly how integrated our solutions are becoming,” Pyronix Marketing Manager, Laurence Kenny, said. Integrated solutions We would like to say a huge thank you to absolutely everyone that visited us on stand D300, as we provided live demonstrations and presentations of our technologies and how they can be integrated to enable users to See, Speak and Listen to security. “We were able to demonstrate both the now and the future of security; showcasing how our solutions are integrating intrusion, HD video monitoring and automation, to differentiate their offerings,” Laurence said. HD video monitoring He continues: “By integrating and entering new markets; delivering the desired systems that engages their end users’ senses like never before, our installers maintain a competitive advantage.” The stand offered two Pyronix areas, one showcasing how solutions can be delivered for large commercial installations and another demonstrating more residential configurations, with three boards collectively demonstrating the total solution; incorporating See, Speak and Listen. Facial recognition and HD Wi-Fi cameras Each area provided the here, now and future of security Within each presentation zone was a multitude of technologies, including facial recognition panels, infrared beams for outdoor detection, Alexa integration, HD Wi-Fi cameras, including a Wi-Fi doorbell, our soon to be released Enforcer 64 and PCX 78 panels, as well as integrated security and camera solutions with ProControl+. Each area provided the here, now and future of security, with offerings that are available, as well as soon to be available; delivering an experience that truly engaged our customers and provided a clear direction of Pyonix. Intrusion detection “The stand presented the reality and conceptual future of the intrusion industry and it was brilliant to engage with the customer and gather their feedback,” Laurence said. He continues: “Overall the show was very positive, and I think our customers took a lot from it, as everything we showcased is either available or in the last stages of development for the International and UK markets.”
Ask a student, or pretty much anyone, what they think about “access control” and you’ll get a shrug. Conversely, all of us are enthusiastic about security and convenience. Students across Europe are discovering SMARTair wireless access control gives them both. Adding SMARTair access control to a door involves just replacing a standard cylinder or escutcheon with a digital, smartphone- or smart-card–operated electronic lock. It’s hassle-free to make the switch to SMARTair. And with a system design focused on user experience, SMARTair takes some of the everyday pain out of student life. Wherever you fit SMARTair, it’s easy to configure access cards to enable payments in the canteen or at vending machines; for changing room locker locks; and for the photocopier or library loans. You can’t do that with a metal key. MIFARE RFID cards At Madrid’s prestigious Colegio Universitario de Estudios Financieros (CUNEF) students now open doors with smart MIFARE RFID cards instead of keys At Madrid’s prestigious Colegio Universitario de Estudios Financieros (CUNEF) students now open doors with smart MIFARE RFID cards instead of keys. CUNEF fitted escutcheons to monitor and ease access to different areas of the university for 1,600 students, without the need for expensive wired door locks. If a student loses their card, there’s no threat to campus security. A manager issues a new credential which automatically cancels the lost card — much faster than changing a lock. When Mezzino took ownership of Rialto Court — apartments for students attending Durham University and Teesside University — they replaced a mechanical master key system with SMARTair. From the company’s point of view, the high annual tenant turnover and a need for scheduled cleaning and summer shutdown were becoming difficult to manage with physical keys. Students also reaped the benefits of their new, user-friendly access system. They have the confidence no previous resident of their flat has copied a physical key. At Funway Academic Resort in Madrid, student rooms are also locked with SMARTair escutcheons. Energy-saving wall devices inside rooms regulate electricity use, and students each have their own safe locked with a SMARTair cabinet lock. The Funway gym, study rooms, games rooms, swimming pool and changing rooms, spa and staff areas are also locked with SMARTair escutcheons — and open with the same smart-card. SMARTair Openow solution The recent launch of the SMARTair Openow solution puts credentials on a mobile phoneThere’s more to come from SMARTair. The recent launch of the SMARTair Openow solution puts credentials on a mobile phone. With SMARTair and the Openow app, students can open their rooms and authorised doors with a smartphone. If you have your phone, you’re already carrying your keys. Student services or facilities managers issue virtual keys over-the-air — and can revoke them whenever they choose — so there’s no need for a key-card handover meeting, at the beginning or end of term. A time-limited virtual key arrives ahead of the first day and automatically expires when it’s time to vacate your halls. Mobile credentials Mobile credentials will be a big hit. Student life goes on inside the handset, as much as IRL (“In Real Life”, for the uninitiated). Last year’s Deloitte Mobile Consumer Survey found a fifth of 18- to 24-year-olds even check their phone for messages in the middle of the night*. From a security standpoint, phone-based credentials have another advantage. Checking our phones is “habitual”, “unconscious” and “repetitive”, according to one study**. We know very quickly if it is missing. How soon would you notice a missing plastic card, especially if you were enjoying yourself on a night out? Biometric security Plus, a virtual key on every student’s smartphone potentially provides an extra layer of biometric protection for every controlled university door Plus, a virtual key on every student’s smartphone potentially provides an extra layer of biometric protection for every controlled university door. Fingerprint, and even face and iris, scanners are commonplace on smartphones. ”Generation Z students were raised as digital natives,” says Felix Moran, SMARTair Product Manager at ASSA ABLOY. ”They expect convenience as a standard feature, not a mechanical solution used in Ancient Egypt. In Europe’s increasingly international, marketized higher education ecosystem, attracting these tech-savvy students is critical, as is keeping them satisfied with the campus experience.” SMARTair TS1000 software The complete SMARTair solution includes wireless escutcheons, cylinders, wall readers, locker locks and more; the intuitive SMARTair TS1000 software; and the enhanced new Openow app functionality. It works out the box and is easy to install — and even easier to operate.
Varsity Management is an innovative education system focused on learning and leadership. Varsity offers well-designed courses plans that are in sync with the state and national board curricula. Based on the re-engineered learning patterns, these plans help teachers provide multisensory learning and develop social and thinking skills in students. Varsity Management is empowering 3,85,000+ students annually with its presence across 465+ schools, PAN India. Recording accurate attendance data The main requirement of the organisation was to bring its time-attendance under the same network umbrella. Varsity Management Pvt Ltd wanted to manage time-attendance of more than 15,000 employees at 100+ locations across India. Initially, they were using traditional methods for attendance marking. As a result, they were facing many problems in maintaining records of the same. Hence, they required an efficient system for maintaining and recording accurate attendance data of staff members. They required a biometric hardware solution that could precisely capture employees’ attendance. Moreover, they needed instant SMS notifications for certain events like missing in/out punch, attendance summary, etc. Matrix meticulously studied the needs of Varsity Management along with its regional partner Vigilant Technologies Time-attendance management solution Matrix meticulously studied the needs of the institute along with its regional partner Vigilant Technologies. Having discussed in depth with Varsity’s team, Matrix offered its comprehensive Time-Attendance solution for managing and tracking staff movement from a single place. Matrix has installed 130 COSEC DOOR FOT V3 biometric time-attendance terminals at 100 locations across India. HR/Admin could easily track attendance of all employees and generate different types of reports for timely salary payment. Now users are updated instantly on different events like missing in/out punch, attendance summary, etc. when it occurs. Benefits of biometric time-attendance terminal Centralised Monitoring and Control Efficient Time-Attendance Management Quick and Easy Salary Calculations Improved Productivity Customised Reports
HID Global, a global provider of trusted identity solutions, has announced that HID is the world’s first ticketing solution provider to be certified to deliver more secure, lower cost, faster contactless tickets based on an open standard called Calypso Light Application (CLAP). CLAP-certified SOMA Atlas Public transportation authorities around the world no longer need to accept lower security, incompatibility and slower speeds or be locked into a proprietary low-end ticket system. HID’s CLAP-certified solution, SOMA Atlas, is now recognised by the Calypso Networks Association (CNA) as providing interoperability and greater flexibility to transportation operators. “HID Global is bringing a new level of trust to low-cost contactless tickets for public transportation by supporting an open standard that will overtake the proprietary memory cards commonly used for low-end tickets, such as single trip tickets,” said Cesare Paciello, Vice President, Ticketing & Transport with HID Global. “Being the first ticket provider in the world to achieve Calypso Light Application certification positions HID strongly to lead the way to enable mid-sized and smaller public transportation networks to do next-generation automated fare collection.” Contactless CLAP ticketing Recognised widely and deployed in many countries for secure, fast and flexible ticketing, Calypso is an open standard of contactless ticketing, suitable for multiple applications, especially public transportation in which Calypso cards and NFC mobile phones are used. To extend the success of the Calypso standard and help solve the incompatibility of low-cost tickets, a worldwide group of transport operators in the Calypso Networks Association, a not-for-profit standards body, ratified a set of specifications for the Calypso Light Application standard. CLAP tickets have the same security as high-end tickets, such as sports season tickets, but at a lower cost CLAP tickets have the same security as high-end tickets, such as sports season tickets, but at a lower cost than typical Calypso tickets. CLAP is also simple to deploy because, unlike proprietary memory cards, the use of CLAP tickets does not require development work to be integrated into an Automated Fare Collection (AFC) System. Automated Fare Collection System To become the first ticketing solution provider to receive the CLAP certification, HID had to pass the technical evaluation that was conducted by Elitt, a CNA-accredited laboratory. HID has been working with Calypso technology since 2014, resulting in the development of the SOMA Atlas, an OS architecture that combines the multi-application capabilities of the KIAT operating system with the Calypso 3.1 standard. HID achieved its first Calypso certification in July 2016 with SOMA Atlas V1, which proved to be one of the fastest products of its kind. RFID, key management and smart card tokens As the next logical step in its evolution of an open standards-based approach, HID’s ticketing and transportation team in Italy developed the CLAP-certified SOMA Atlas OS architecture to broaden the customer acceptance of more secure ticketing by small to mid-sized transportation operators. Known as the ticketing solution provider that delivered millions of tickets for the 2018 FIFA World Cup, HID provides end-to-end ticketing solutions, including transportation ticketing terminals, data capturing software, key management capabilities, RFID paper tickets, smart card tokens, smart wristbands, among other components. Its multi-application operating systems can be integrated with existing hardware.
Safety is at the forefront of hospitals across the nation. According to a landmark report To Err is Human (2000) by The Institute of Medicine (IOM), between 44,000 and 98,000 patients die a year in the U.S. due to preventable medical errors including wrongful administration of medication. Beyond the cost of human life, these errors cost the healthcare industry as much as $29 million per year. This figure takes into account the expenses associated with additional care, loss of income and disability so as to reduce medication administration errors, hospitals are modifying their current medical dispensing systems in operation to prevent and eliminate these errors. Based in Portsmouth, Ohio, Southern Ohio Medical Center (SOMC) is one such hospital that is addressing this concern. A 222-bed hospital that provides emergency and surgical care, as well as a wide range of other health-care services, SOMC employs 2,200 full and part-time doctors and volunteers. SOMC has a medical staff of more than 140 board-certified or board-eligible physicians and specialists and is supported by more than 800 volunteers. WALLaroo 2000 wall station The WALLaroo 2000 wall station featured a cabinet mounted outside each patient’s room to temporarily stock the non-narcotic medications prior to dispensing One of the “Best Practices” outlined in the IOM report calls for the healthcare industry to utilise technology, such as bed side bar coding, to improve patient identification. To meet these standards, SOMC quickly modernised their process from relying heavily on a two-cart dispensing system that included laptops on wheels (LOW’s) and pharmacy carts, to a system that was more efficient and accurate. The new solution, the WALLaroo 2000 wall station, featured a cabinet mounted outside each patient’s room to temporarily stock the non-narcotic medications prior to dispensing. SOMC’s IT department was tasked with finding a way to integrate the wall stations with a state-of-the-art access control system that was equipped with an access-controlled lock and reader. By implementing this solution, SOMC has been able to strictly adhere to their patient’s rights as they pertain to medication dispensing, which includes: the right patient, the right medication, the right dose, the right time and the right route of administration. Centrally networked access control system “When we started our quest for an access-control solution, we looked for two things,” said Dennis Ward, information services and applications manager for SOMC. “First SOMC needed a solution that would be centrally networked with the current eMAR system, as well as have a main power source. Additionally, we needed to replace the magnetic strip on employee badges with a more effective technology.” Ward consulted with several companies within the security industry, including Accu-Tech, SecuriCo, Microman and HID Global, before finding the optimal solution- SecuriCo’s Securus Web software solution. The solution operates with a HID EdgeReader coupled with iCLASS 2K (37-bit) smart cards and Rutherford Controls 3513 Lock. SecurusWeb software solution SOMC project requirements indicated that both a Web-based software solution and an IP PoE Access Control solution were required" “SOMC project requirements indicated that both a Web-based software solution and an IP PoE Access Control solution were required,” said Jim Andrews, president of SecuriCo, Inc. “After Dennis and I reviewed the project requirements and discussed the design options with AccuTech and Microman, everyone agreed that the SecurusWeb software solution with a pre-configured HID EdgeReader and iCLASS 2K (37-bit) smart cards were the perfect fit for the hospital’s unique access control needs.” According to Ward, “As I conducted product research in the security information space, I noted that most available solutions were based on HID technology. This was important since the hospital was growing, and our security needs would grow, too. HID Global has a great industry reputation so it was a natural and easy decision to select the company’s solutions and OEM partner, SecuriCo, Inc.” Installing WALLaroo wall stations and HID EdgeReader Since Ward had never implemented a project like this before, he obtained samples of one of the WALLaroo wall stations, a HID EdgeReader and evaluation software from SecuriCo. Using the samples, he created a prototype that would fit all his access control needs and serve SOMC in the best possible way. Installed by Microman, these pre-programmed wall units have the SOMC specifications that Ward devised. While physical access control is delivered through the HID EdgeReader and iCLASS cards, the control of the hardware is provided through SecuriCo’s Securus Web software. The software controls which individuals are granted access to each station based upon a preset access level, which includes the day and time access is allowed. In addition, the application also records how access is added and removed. This innovative solution also enables pharmacy technicians to deliver barcoded, 24-hour scheduled, non-narcotic medications to the secured wall mounted stations. Using their authorised HID iCLASS cards, the nursing staff is then able to access and administer the medication. SecurusWeb and HID Global’s Edge IP access solutions SecurusWeb and HID Global’s Edge IP access solutions can make it easier to meet the unique and demanding needs of healthcare applications, as experienced by SOMC Thinking outside the box and using innovative products like SecurusWeb and HID Global’s Edge IP access solutions can make it easier to meet the unique and demanding needs of healthcare applications, as experienced by SOMC. Accuracy for patient medication dispensing has improved significantly thanks to the new solution. Workflow is also more efficient because the amount of time it previously took nurses to go to the medication room and retrieve new medications has been significantly reduced. Additionally, medication is secure and located where the staff expects it to be, while eliminating the need for medication carts, making the hospital hallways accessible and less cluttered. With the original installation of 73 of HID’s EdgeReaders being such a great success, SOMC ordered and installed an additional102 EdgeReaders in the hospital’s new North Tower, including 12 on the first floor Heart Care Unit (HCU), 30 on the second floor in the Surgical-Vascular Care Unit (SVCU), 30 on the third floor in the Medical-Surgical Care Unit (MSCU), and 30 more that are located on the fourth floor in the Progressive Care Unit (PCU).
Blue Cross/ Blue Shield of Rhode Island (BCBSRI) has played a significant role in both the health and economy of the state of Rhode Island since 1939. More than one out of two Rhode Islanders have chosen BCBSRI. The organisation’s mission is to provide its members with peace of mind and improved health by representing them in their pursuit of affordable, high-quality healthcare. Secure and efficient security system BCBSRI needed to upgrade its workplace to a more efficient, secure, effective and sustainable environment. An in-depth analysis compared the feasibility of renovating several older buildings to constructing a new building. A benefit for the new building was the opportunity to install a completely new state-of-the-art system to dramatically increase security. Having a secure work environment is a major issue for a health insurance company in meeting HIPAA requirements, and can involve access control, visitor management and video surveillance. Barium Ferrite technology BCBSRI used Barium Ferrite technology for security in its old buildings BCBSRI used Barium Ferrite technology for security in its old buildings. This older technology is based on sandwiching a flexible magnetised material between two PVC layers and encoding spots on a polarised magnetic field, which is then electrically injected into the barium ferrite. These magnetically encoded areas activate sensors when a card is inserted into the reader. While Barium Ferrite is cost effective, the technology is highly susceptible to duplication and the cards themselves have a short shelf life. Therefore, this security technology was not a consideration for BCBSRI’s access control system in the new headquarters. Security integration in new access system To meet both HIPAA requirements and to create a streamlined work environment, the company was looking for a multi-function, high-security and user-friendly solution. Erecting an entirely new structure made for a seamless upgrade to state-of-the-art security technology that integrated easily with other cutting-edge systems in the new building. Another goal in this transition was to create an environmentally friendly and sustainable workplace. One aspect of this was to install multi-function printers (MFPs), something BCBSRI had been considering for some time. It was critical to have a security system that enabled the move to MFPs. Single card access control In addition, BCBSRI wanted an elevated level of security in restricted areas, so a system enabling biometrics was also desirable The company also wanted a one-card solution that allowed them to do more than open the door. They wanted the same card to be enabled for use with services such as cashless vending in the cafeteria, as well as for access control in the company gym and parking structures. In addition, BCBSRI wanted an elevated level of security in restricted areas, so a system enabling biometrics was also desirable. The security systems integrator, Team AVS, had been working with BCBSRI for 10 years, so it was a natural decision for them to install the new building’s security system and make recommendations for complementary technology. Eric Caruso, business development manager, and his team presented a HID Global portfolio as the core of the access-control solution. “We’ve been a HID Global partner for more than 15 years, so we know we can count on them,” said Eric Caruso. “Not only are the products reliable and come with a lifetime warranty, we also know that the local support our clients get reflects well on us.” iCLASS R40 readers and iCLASS smart cards Team AVS recommended Genuine HID products – iCLASS R40 readers and iCLASS smart cards – for their customisation and flexibility that enables them to work with the multiple applications required by BCBSRI. With Genuine HID, customers also get the most-trusted, fully interoperable, secure identity solutions on the market, the industry’s first lifetime warranty, and the strongest delivery and response platform available. This ensures optimisation of the company’s security investment for years to come. HID Identity on Demand (IoD) services Team AVS also recommended using HID Identity on Demand (IoD) services to produce the new badges Team AVS also recommended using HID Identity on Demand (IoD) services to produce the new badges, thus simplifying the re-badging project and reducing the strain on company resources during the move. In moving to the new building, BCBSRI downsized from 600 units for printing, faxing and copying to 100 MFPs. In doing so, they saved paper and ink, reduced their carbon production by using fewer devices, and increased document security utilising “secure print.” HID secure-access cards In the past, BCBSRI managed document security by having locally dedicated desktop printers, accessible only by staff near to the printer. Since the new MFPs were centrally located among groups of employees, multi-function, secure-access cards provided the security, and at a much higher level. Now, when an employee sends a job to print, it sits in the cloud until they arrive at the printer, scan their HID multipurpose smart card, and request their specific job to output. “If we didn’t have the HID cards, we couldn’t have had the multifunction devices,” said Tom Bovis, assistant vice president, Corporate Real Estate/ Administrative Services. “The easy integration of iCLASS made the company greener.” BCBSRI completed full analysis of potential vendors and selected Konica/ Minolta Business Solutions to provide the MFPs. Since Konica/Minolta is an official HID Connect partner and an integrator of Genuine HID Technology, Team AVS could be ensured that everything would work together seamlessly. One-Card Solution Freedom Pay is a HID Connect Premier Partner and integrates Genuine HID Technology In the old buildings, BCBSRI employees had a separate card for the cashless vending system – Freedom Pay. The company was pleased with their service and preferred to keep them. Freedom Pay is a HID Connect Premier Partner and integrates Genuine HID Technology. This made the transition simple and successful. Now employees carry only one card for secure access and cashless vending. That same card also works for parking, gym membership and, as mentioned above, printing, copying and faxing using the MFPs. Biometrics and card swipe access solutions As required by HIPAA, the cards also display the employee’s photo. For those needing access to restricted areas, including the data center and cash processing, their cards also contain biometrics. Following the card swipe these employees also enter a PIN to gain access to the most secure areas. “People are happy with the system,” says Bovis. “They’re impressed with how easy it is to use while still providing state-of-the-art security.” Simple Integration/Transition Migrating employees to the new smart cards was easily accomplished in the move process since BCBSRI used HID Identity on Demand services (IoD). Although BCBSRI had its own badge printer that would work with iCLASS, to print a large quantity of cards all at once would be a strain on staff and equipment. Instead, a dedicated IoD project-management team gathered the necessary information and handled card production, leaving BCBSRI security staff free to focus on other issues. iCLASS smart cards IoD was able to use the photos and information in BCBSRI’s existing database for the new cards, saving significant time and resources for the company IoD was able to use the photos and information in BCBSRI’s existing database for the new cards, saving significant time and resources for the company. IoD’s graphics team created custom card designs for various populations, such as employees and contractors. All 1,200 multi-function, photo-ID, iCLASS smart cards were printed and delivered in the time frame requested, in advance of the move. Every other weekend, 250 employees moved from the old buildings to the new. The department head simply picked up their employees’ badges and handed them out prior to moving day. When the cards first arrived, Bovis and a colleague, Jim Keay, tested the cards with all the applications. “The iCLASS cards worked great,” said Bovis. “We didn’t experience any bugs or glitches.” Enhanced security Enhanced security was just one component in the decision to build a new headquarters for BCBSRI. However, in a regulated industry that deals constantly in confidential, personal information, it was an important one. By choosing Genuine HID, BCBSRI has a trusted, reliable system that meets their needs today and is scalable for future growth and technology advancement. “The decision to go with HID was easy,” says Bovis. The result is a more secure physical environment, safer document handling, a one-card solution for all access and cashless vending needs, and a more environmentally friendly workplace with an 80 percent reduction in output devices. By rebuilding rather than renovating, the company will also save $25 million over the next 23 years. The new BCBSRI headquarters will also be the first Gold LEED-certified commercial building in Providence.
The Lagoon Amusement Park in Farmington, Utah, likes things fast, too. For more than 100 years, it has offered exhilarating thrill rides as part of its entertainment package. The park’s Fire Dragon Double-Loop Rollercoaster hits speeds of 90 kilometers per hour, and its Lagoon-A-Beach Waterpark promises 550,000 gallons of liquid fun. Identification cards Like many other parks, Lagoon provides identification cards to its employees and offers season passes (called Season Passports) with identification cards to its guests. But the equipment formerly used to print the cards was not keeping up with the pace of the park. “As the public demand for Season Passports increased, it was becoming more difficult to keep up with the desired pace,” said Nic Young, ticketing manager. “We used to take Polaroid pictures and laminate them onto pre-printed cards but matching the pictures with the cards was tricky. It was easy to put the wrong picture on someone’s card.”Lagoon now is able to satisfy the needs of its employees and guests with the updated card printing technology The multi-step process also was slow and cumbersome – not a minor concern with 2,500 employee ID badges and more than 30,000 season passes issued every year. Lagoon now is able to satisfy the needs of its employees and guests with the updated card printing technology, bringing the park back to its desired speed. ID badges and card-printing technology “These printers are extremely fast,” said Young, “which is especially important during our busy months of May and June. I also like the one-step printing process and the fact that the printers are easy to maintain and keep clean.” The Employee Services department uses colored ribbons when printing employee ID cards, identifying employees 15 years of age or younger by printing those names in red on the employee’s card. The Ticketing department uses standard black ribbons for its season passes. With five computer stations in the Season Passport photo area, ticketers can issue passes to large groups of people at the same time. Barcode technology Both employee and Season Passport ID cards use barcode technologyBoth employee and Season Passport ID cards use barcode technology. For employees, the barcodes specify the level of park access and also bring up full-sized pictures of the employees to be viewed by Lagoon security. For Season Passport holders, barcodes record when a passport has been used or restrict passport usage on specified dates (such as during Lagoon’s July Fun Pass). Now that the Lagoon Amusement Park has established its current system, computer stations at the gates can track Season Passport access information and provide valuable marketing information. “We’re trying to increase our per person usage through promotions such as our Season Passport Holder coupon books,” Young said. “Our ID card system allows us to record our progress.” The bottom line, however, is speed. “There are no more long lines,” Young said. “We’re able to operate at full capacity all day long, allowing our guests to get their Season Passports quickly and proceed directly to the fun.”