Biometric time and attendance
Fime has become one of the test laboratories able to perform Android biometric security evaluation. A growing number and variety of Android devices rely on face and fingerprint recognition for device unlock and user authentication. All implementations must meet Android’s requirements to protect end-users. Fime is now helping smartphone OEMs, biometric component and software providers to evaluate anti-spoofing ability and achieve successful Android compliance. Secure user experiences Ste...
Iris ID, a pioneering provider of iris recognition technology, announced the compatibility of its iCAM M300 handheld, multi-modal biometric reader and the MozaicID iCAM M300 smartcard software credential application. This application enables the mobile device to accommodate a range of Personal Identity Verification (PIV) compatible credentials including PIV Interoperable (PIV-I) and the Transportation Worker Identification Credentials (TWIC), a smartcard used by workers requiring access to secu...
Suprema, a globally renowned company in access control, biometrics and time & attendance solutions, has announced its new partnership with DVS Ltd., a security solutions distributor in the United Kingdom. Suprema – DVS partnership DVS is a well-established distributor of video surveillance products in the UK. By becoming DVS’s first dedicated access control and biometric partner, Suprema aims to expand its customer base, providing UK customers with comprehensive security soluti...
Vision-Box a global provider of biometrics seamless travel, automated border management and electronic identity management solutions dedicated to improving the quality and security in government services, travel and border control - announced a regional strategic partnership with AirAsia Group, to implement pioneering, identity management technology across its network of 152 airports. As a provider and pioneer of new seamless digital identification technologies throughout the travel ecosystem,...
HID Global, a pioneer in trusted identity solutions, announces HID FARGO INK1000 printer and encoder, the industry’s first thermal inkjet solution that brings secure, personalised credential issuance to entry- and mid-level markets. HID’s latest printer innovation is the first to offer inkjet technology to the global desktop card printer market, enabling cost effective, high-quality credentials and eliminating the need for specialised card media. “Until now, small and medium-s...
LocoMobi World introduces PassagePass powered by LPR Express, the next generation of parking payments. Parking facility owners and managers can secure their revenue and differentiate their lots/garages by offering the simplest and most convenient parking experience. LPR Express allows customers to opt-in to LPR Express on the PassagePay app. When a customer drives to a LPR Express powered parking lot, the gate scans their licence plate and allows them access - no tickets, fobs, or QR codes requ...
Iris ID, the global renowned provider of iris recognition technology solutions, announced that it has begun shipping IrisTime, a new biometric time and attendance platform that offers a fully customisable and accurate solution, to meet the pioneering workforce management needs of small businesses to enterprise organisations worldwide. IrisTime IrisTime also offers a new recognition technique for authenticating employee identity that uses a fusion of iris and face recognition to increase accuracy and convenience of use. IrisTime’s open Android-based platform accommodates hundreds of current time and attendance applications while also enabling independent software vendors (ISVs) to create custom software solutions meeting specific organisational needs. The platform is shipped with a standard app, which is capable of meeting the needs of many organisations of varying size. Iris ID’s IrisTime platform is contactless, an essential consideration during the COVID-19 pandemic" “Furthermore, Iris ID’s IrisTime platform is contactless, an essential consideration during the COVID-19 pandemic,” said Mohammed Murad, Vice President, Global Sales and Business Development, Iris ID. Enhanced accuracy and convenience IrisTime biometric time and attendance platform is unaffected by employees wearing personal protective equipment (PPE), such as gloves, masks and goggles. A recent study by a federal agency showed that systems using only facial recognition technology could be up to 50% less accurate, especially when people wore masks or face coverings. “IrisTime biometric platform uses fast auto-focus to quickly and conveniently authenticate employees’ identity, at distances up to 24 inches,” said Murad, adding “Also, IrisTime’s accuracy is unsurpassed as it is the first time and attendance platform that combines identifying characteristics from both an employee’s iris and face.” Seamless integration with payroll software Murad further stated, “That accuracy, along with seamless integration with payroll software, helps the platform eliminate potential errors while calculating hours worked, as well as benefits such as disability and accrued vacation time.” Using IrisTime, employee authentication takes less than a second, a vital consideration during busy shift changes. While clocking in, the IrisTime screen displays an employee’s name, company I.D. number and photo, along with the time and date of the activity. Biometric technology authentication Biometric technology authenticates identity with no need for employees to present a card Biometric technology authenticates identity with no need for employees to present a card or remember a personal identification number to clock in or out. However, IrisTime integrates with card-based access control systems to create multi-factor authentication at mission-critical sites. The companies that are currently using Iris ID platforms for time and attendance or access control have no need to re-enroll employees in order to use IrisTime software. For any size company, IrisTime provides a high return on investment by eliminating costs associated with administering and managing punch, barcode, magnetic swipe or proximity cards and PINs. The accuracy of the biometric technology ensures the identity of an employee, eliminating the ability of employees to clock in for each other in a costly payroll fraud known as buddy punching. Iris-based authentication systems “Fraud, along with inaccurate or outdated payroll technologies, may cost a business thousands of dollars annually,” said Mohammad Murad, VP of Global Sales & Development at Iris ID. Iris ID currently provides iris-based authentication systems for the world’s top workforce management solution suppliers, such as Paychex and SimplyWork, as well as for many global enterprise customers. Murad adds, “For more than 20 years, Iris ID has been the globally renowned innovator of flexible and reliable iris authentication solutions. Now, we are revolutionising the time and attendance function with a biometric platform, which is aimed at meeting many of the unprecedented challenges facing employers today. IrisTime is the time clock for the modern workforce.”
Matrix is gearing up for participation in the 2nd Edition of, IFSEC Virtual Expo 2020 to be held on 17 and 18 September 2020. Matrix will be launching its latest Time-Attendance and Access Control device COSEC ARGO FR along with its People Mobility Management and Video Surveillance solutions. Matrix is well-known for its indigenous and innovative range of solutions for Unified Communications, IP Video Surveillance, Access Control, and Time-Attendance. Each of the solutions is specifically designed for large, multi-location enterprises, SME and SMB organisations. Matrix continuously works towards keeping abreast of the constantly upgrading technology by designing and manufacturing solutions that are equipped with the latest technology. Matrix will be presenting some of its indigenously engineered Security and Telecom solutions at the Virtual event. Event Highlight ARGO FR is a performance, design, and engineering wonder, equipped with an enhanced IPS LCD touchscreen At IFSEC Virtual Expo, they will be launching COSEC ARGO FR. It supports multiple contactless credentials such as face, smart cards, PIN, mobile phone using BLE. ARGO FR is a performance, design, and engineering wonder, equipped with an enhanced IPS LCD touchscreen for a visually splendid experience. The addition of Gorilla glass calls for enhanced toughness. This device has higher processing speed, wall and flush mounting options, and increased fingerprint and event storage capacity. It is specifically designed for serious Time-Attendance and Access Control applications. This device offers connectivity options like Bluetooth, Wi-Fi, PoE, and USB. Furthermore, IP65 and IK08 certifications make it suitable for challenging and outdoor installations. Temperature Screening Matrix’s solution experts will be demonstrating the touchless and auto temperature measurement solution In the wake of a pandemic, organisations are forced to navigate some attention on safety and hygiene. So, Matrix’s solution experts will be demonstrating the touchless and auto temperature measurement solution, User Temperature Screening. This eliminates the manual temperature reading process and replaces it with an advanced and much safer one. This setup notifies the authorities in case of exceptions. The other thing which is going to be shown in this exhibition is Time-Attendance and Access Control with contactless credentials. At IFSEC Virtual Expo, Matrix would be demonstrating their product range from the SATATYA family of security solutions which involves the 8MP Project Series Bullet Camera, SATATYA Network Video Recorders and SATATYA SAMAS. Bullet Camera The 8MP Project Series Bullet Camera is designed to meet the needs of large organisations To begin with, the 8MP Project Series Bullet Camera is designed to meet the needs of large organisations and demanding project applications. Powered by smart processors with Deep Learning Algorithms these IP cameras are an example of superior image quality and performance. To emphasise on the image quality, the cameras are equipped with SONY STARVIS back-illuminated sensors which give exceptional image quality in low lighting conditions. Besides this, the 4K cameras are equipped with intelligent video and audio analytics like motion detection, intrusion detection, tripwire, gunshot detection, scream detection and many more. Also, they are robust devices that can be installed in all kinds of environments. Network Video Recorders SATATYA Network Video Recorders are designed for serious video surveillance deployments To add to this, the SATATYA Network Video Recorders are high performance, power-packed workhorses which are designed for serious video surveillance deployments. In addition to high-resolution recording and live view of multiple streams, they offer innovative cascading, powerful investigators and instant notifications. Not to miss, the device has a 512Mbps throughput capacity with 4K Decoding. All in all, these flexible and reliable NVRs are ideal for modern organisations looking for proficient, persistent and preventive security. Lastly, the string that binds the video surveillance solutions and the devices together, SATATYA SAMAS is the solution that is designed to combat the security needs of modern organisations. Designed on pillars like optimising cost and providing proactive security the solution is one's one-stop solution for diverse security needs. Intelligent video analytics Not to forget, the solution gives real-time security with the help of intelligent video analytics like Missing Object Detection, Motion Detection, No Motion Detection, etc. Apart from this, it can be integrated with other third-party security systems like Access Control, Fire Alarm, Parking Management System, etc. “IFSEC Virtual Expo is South Asia’s largest security, civil protection and fire safety show, which in turn provides us with a platform to expand our ties with industry experts and system integrators. The event also serves as a great stage for highlighting our well-engineered solutions. We aim to use this opportunity to expand our network and spread word about our technologically advanced Security solutions,” Kaushal Kadakia, Marketing Manager Matrix Comsec.
Suprema, a globally renowned provider of access control, biometrics and time and attendance solutions, invites industry members to the “Fusion Face Recognition” live session scheduled on September 17th, where it will introduce the new FaceStation F2 Fusion Multimodal Terminal. The live session is part of Suprema Connect 2020, Suprema’s first virtual event, designed to compensate for traditional security conferences, most of which were cancelled due to COVID-19. At the Fusion Face Recognition live sessions, which will be held twice on the 17th (at 12AM and 4PM GMT+9) to accommodate for time difference, a Suprema expert will go over the features and technology of FaceStation F2 in detail. FaceStation F2 is Suprema’s 3rd generation face recognition terminal that provides exceptional authentication accuracy and anti-spoofing performance by combining visual and IR face recognition technology. Mask and temperature detection These live sessions, which will also be held twice each day, will introduce Suprema’s relevant solutions in detail It is equipped with untact photo enrollment feature as well as mask and temperature detection, meeting the needs of the post-pandemic world. On September 22nd and 24th, more live sessions are planned on the topics of “Mobile Access Solution” and “Access Control Solution.” These live sessions, which will also be held twice each day, will introduce Suprema’s relevant solutions in detail. Hosts will open up the floor for Q&A and discussions at the end and Suprema will select participants with the best questions to award Suprema Airfob Patches with credits. In-depth technical trainings In addition to the live sessions, over thirty on-demand videos on customer applications and in-depth technical trainings will be available on Suprema Connect 2020 website from the opening day (Septmeber 15th) for one month until the end of the event. Suprema encourages everyone to sign up on the Suprema Connect 2020 website to view the detailed schedule and receive updates and reminders about the event.
Suprema, a globally renowned company in access control, time and attendance and biometric solutions, has announced the introduction of the FaceStation F2 Fusion Multimodal Terminal. The new multimodal biometric solution delivers exceptional authentication accuracy and anti-spoofing performance by the fusion of visual and infrared face recognition technology. FaceStation F2 Fusion Multimodal Terminal The FaceStation F2 can also be combined with Suprema Thermal Camera to detect users with high skin temperature, and features mask detection capabilities to help prevent the spread of infectious viruses such as COVID-19. “Suprema continues to develop new and innovative identification and authentication solutions that address emerging challenges affecting the overall security and health of personnel and business operations,” said Young S. Moon, Chief Executive Officer (CEO) of Suprema Inc., adding “Our new FaceStation F2 provides the mission critical identity management, and health and safety capabilities that organisations need today to get employees back to workplaces.” Optimises IR and visual face recognition FaceStation F2 Fusion Multimodal Terminal optimises IR and visual face recognition FaceStation F2 Fusion Multimodal Terminal optimises IR and visual face recognition to produce exceptional authentication results, achieving extremely low false acceptance rate (FAR) of 1 in 10 billion. FaceStation F2’s unique deep-learning fusion algorithm provides industry-renowned face recognition and anti-spoofing performance, regardless of user ethnicity and face changes. The innovative multimodal solution offers various means of authentication including contactless facial recognition, mobile credential, fingerprint and card. The new Fusion Multimodal Terminal also supports Access-on-Card feature that enables identification with biometric data saved on cards. With massive memory capacity, FaceStation F2 can register up to 100,000 users’ fingerprints or 50,000 users’ face data. Integration with Suprema Thermal Camera To meet the increasing global demand for hygiene safety and protection, FaceStation F2 can be combined with Suprema’s Thermal Camera to detect and identify individuals with elevated skin temperature. The unit’s on-board analytics can also automatically screen and notify when an individual is not wearing a mask in areas where facial masks are mandatory. This screening feature can be used in conjunction with face recognition as FaceStation F2 is able to recognise faces with masks without sacrificing accuracy. FaceStation F2 also offers remote enrollment that allows user registration by uploading profile photos, reducing physical contact, improving convenience and safety. The new FaceStation F2 is built on the highly secure Android platform and encrypts all biometric credentials to help best protect individual’s personal information from cyber theft.
VisionPass, the ultimate face recognition device for physical access and time and attendance control, was introduced earlier this year and extends IDEMIA’s range of contactless devices for access control. Designed according to the company’s partners’ and end-users’ needs and requirements, VisionPass offers a unique experience: being identified on-the-move in less than 1 second thanks to powerful algorithms. For more user comfort, VisionPass works in all light conditions from complete darkness to bright sunlight, with all face types and with various vertical and horizontal angles to cope with users of different heights (1.20- 2.00 meters / 3ft 11” – 6ft 6”). And as VisionPass was designed for access control and security, it can counter spoofing attempts by image, video or 3D masks. Frictionless biometric systems Like IDEMIA’s other frictionless biometric systems such as MorphoWave Compact, VisionPass is fully integrated with the company’s MorphoManager device management platform and is already “plug & play” with most physical access control systems. With VisionPass (facial recognition) and MorphoWave Compact (fingerprints), IDEMIA confirms its expertise in contactless biometrics for secure, convenient and hygienic access control. “The world’s way of living has been drastically impacted during the last few weeks and months, creating completely new requirements for a contactless approach when it comes to accessing public or private spaces. The company’s contactless devices for access control answer these new requirements by offering both a hygienic and frictionless experience to users”, says Yves Portalier, Executive Vice President of the Biometric Devices & Automotive Business Unit at IDEMIA.
Suprema, a globally renowned provider of access control, time and attendance and biometric solutions, has announced the introduction of the FaceStation F2 Fusion Multimodal Terminal. The new multimodal biometric solution delivers exceptional authentication accuracy and anti-spoofing performance by the fusion of visual and infrared face recognition technology. The FaceStation F2 can also be combined with Suprema Thermal Camera to detect users with high skin temperature, and features mask detection capabilities to help prevent the spread of infectious viruses, such as COVID-19. Mission critical identity management solution “Suprema continues to develop new and innovative identification and authentication solutions that address emerging challenges affecting the overall security and health of personnel and business operations,” said Young S. Moon, Chief Executive Officer (CEO) of Suprema Inc. Young adds, “Our new FaceStation F2 provides the mission critical identity management, and health and safety capabilities that organisations need today to get employees back to workplaces.” FaceStation F2 Fusion Multimodal Terminal FaceStation F2 Fusion Multimodal Terminal optimises IR and visual face recognition to produce exceptional authentication FaceStation F2 Fusion Multimodal Terminal optimises IR and visual face recognition to produce exceptional authentication results, achieving extremely low false acceptance rate (FAR) of 1 in 10 billion. FaceStation F2’s unique deep-learning fusion algorithm provides industry-renowned facial recognition and anti-spoofing performance, regardless of user ethnicity and face changes. The innovative multimodal solution offers various means of authentication including contactless facial recognition, mobile credential, fingerprint and card. The new Fusion Multimodal Terminal also supports Access-on-Card feature that enables identification with biometric data saved on cards. With massive memory capacity, FaceStation F2 can register up to 100,000 users’ fingerprints or 50,000 users’ face data. Integration with Suprema Thermal Camera To meet the increasing global demand for hygiene safety and protection, FaceStation F2 can be combined with Suprema’s Thermal Camera to detect and identify individuals with elevated skin temperature. The unit’s on-board analytics can also automatically screen and notify when an individual is not wearing a mask in areas where facial masks are mandatory. This screening feature can be used in conjunction with face recognition as FaceStation F2 is able to recognise faces with masks without sacrificing accuracy. FaceStation F2 also offers remote enrollment that allows user registration by uploading profile photos, reducing physical contact, and improving convenience and safety. The new FaceStation F2 is built on the highly secure Android platform and encrypts all biometric credentials to help best protect individual’s personal information from cyber theft.
The modern working world has evolved dramatically over the last few decades - from how and when we work, to the places we work from. Widespread internet connection advances, alongside the growth of cloud-based shared working platforms, have not only created the possibility for increasingly flexible working arrangements, but also fuelled a desire to do so – particularly among millennials. The preference for flexible working has now created a widespread need for more agile workforces, saddling IT departments around the world with the task to maintain ‘business as usual’ without compromising corporate privacy. With flexible working forecasted to stay for the long haul and passwords increasingly under scrutiny, evaluating alternative secure authentication methods to keep companies’ data and networks safe is important to protect these ‘new normal’ ways of working. The end of the humble password? A recent report by Raconteur found that the most common method of authentication for securing the digital aspects of workplaces is passwords. Unfortunately, however, between phishing, hacking and simple guesswork, passwords are easily compromised – a problem that is only getting worse, with IT professionals reporting an increase in phishing attacks in the last few years. Once compromised, passwords can be used to enter untrusted apps or websites and, worst and most commonly of all, give rise to even greater data breaches. Between phishing, hacking and simple guesswork, passwords are easily compromised Alongside security concerns, 6 in 10 people worry about forgetting their passwords and, according to a recent Balbix study, 99% of people reuse the same password across different work accounts. This, undoubtedly, is a side effect of the increasingly complex character requirements implemented by many enterprises. This stress and effort leads to frustrated employees, but, more worryingly, forgotten passwords can also cost IT departments millions of dollars a year. In our flexible, hyper-connected world, it is clear then that the humble password is no longer effective. Additional or alternative layers of authentication are needed to help enterprises maintain their workplace security in a more convenient and cost-effective way. Smarter workplace authentication with biometrics Often, hacking incidents involve the use of stolen credentials. One authentication solution that could bring an end to these large-scale hacking attacks is biometrics, as unique biological traits are extremely hard to steal and spoof. In addition to being a more secure method to authenticate users and prevent fraud in companies’ networks, it is also possible to layer biometric modalities to create a highly convenient and secure multi-modal authentication solution for sensitive areas or information. Spoofing two biometric modalities, such as fingerprint and iris, in the same attack is virtually impossible, but that doesn’t mean this level of security needs to impair the UX. After all, you can put your finger on a touch sensor, while at the same time glancing at a sensor. For businesses, biometrics can be used in a wide variety of use cases, from securing laptops and applications to authenticating employees at secured access and entry points. It can also be used to add frictionless layers of additional security to any aspect of current security systems, such as key fobs or USB sticks, or to access personalized settings or employee accounts when using shared devices, such as a printer system. This way, beyond playing a role in securing the modern workplace, biometrics can also give employees greater flexibility and convenience over how, when and where they work. Privacy and biometrics - explained Many employers and employees worry about safeguarding privacy in the workplace. Considering biometric data is highly personal, it is no wonder, then, that many are concerned about collecting this data for the purpose of workplace security and what liabilities this may expose them to. For businesses, biometrics can be used in a wide variety of use cases, from securing laptops and applications to authenticating employees Employers must adhere to the relevant workplace privacy laws, such Europe’s GDPR, and this duty extends to biometrics, of course. But, providing biometrics is implemented in line with best practice, it can actually protect employees’ privacy far more effectively than its predecessor, passwords. When employers use an on-device approach, their employees can rest assured no one will be able to access or steal their biometric data, as all biometric data is stored and processed on the device - whether that is a laptop, smartphone, USB stick or key fob. Removing the need for data to ever enter the cloud, this also removes the technical and legal complexities of managing a biometric database and, if a key fob is lost for example, all parties can rest assured there is no chance of anyone else being able to use it. A win-win. Precisely because biometric data is so difficult to steal and spoof, adding biometric authentication to end-point devices can considerably reduce data breaches to keep both sensitive employee and corporate data safe and secure. Reimagining workplace security As people work more flexibly, systems are shared more frequently, and attacks get smarter, it is clear to see that passwords alone are no longer enough to secure the modern-day workplace. Adding biometric authentication to end-point devices can considerably reduce data breaches Now is the time to reassess the physical and logical access control infrastructure. To keep personal and corporate data safe, it is crucial to add new and additional authentication methods to the security infrastructure. Luckily, the benefits of biometrics are often far simpler to realize than many enterprises imagine. The beauty of biometrics is its combination of both security and convenience. Compared to other forms of authentication, biometrics offers considerably stronger protection and an enhanced UX that can easily be integrated into existing enterprise security infrastructure – without the need for huge biometric databases to manage or fear. So, whether to replace outdated passwords or as part of a multi-modal authentication system, biometrics can play an important role in pushing workplace security into a new era for both physical and logical access control.
Iris recognition measures the unique patterns in the coloured portion of the eye (the iris) and compares that ‘signature’ to the one on file Since the late 1990s, iris recognition technology has been used in banks and airports as a means of identity authentication. Today, its use is widespread in government facilities, schools/research centres, correctional/judicial facilities, healthcare and others. There are a number of reasons for its rising popularity, but first, a brief overview of the technology is in order. Iris recognition measures the unique patterns in the coloured portion of the eye (the iris) and compares that ‘signature’ to the one on file in the system to verify and authenticate identity. The iris pattern has the most desirable properties for verification compared to other biometrics because of its uniqueness, stability over time and relatively easy accessibility. It also has the highest accuracy among all biometrics. Today’s iris recognition systems have been designed for ease of use and to lessen any perceived concern about the technology 1. Ease of use Today’s iris recognition systems have been designed for ease of use and to lessen any perceived concern about the technology. In fact, it’s as simple as taking a selfie. In the enrolment process a camera captures a detailed image of the iris and the system’s biometric software makes a template or 'map' of the person's iris pattern for storage in the system. To verify identity later, an individual simply looks at the iris reader from a comfortable distance, and the system compares the patterns in the individual's iris against the templates stored in the database. If there's a match, the individual’s identity is verified. 2. Cost Whether used in security or business applications, iris readers are proving cost effective – particularly from a lifecycle perspective. There are no cards to be replaced when worn out or lost; no RFID blocking sleeves are necessary to prevent hacking; and operations can be streamlined through reduced time and labour. Some systems allow scanning of up to 30 people per minute from a distance of several feet. And because no contact with the camera is required, either for enrolment or authentication, wear and tear on the cameras and contamination issues are greatly reduced. In a real sense, card-based systems are using the card as confirmation of the identity of the person carrying the card 3. Vulnerability It has been said that using lower-accuracy access systems such as cards/readers for facility access is the equivalent of locking a car door – easily compromised. Stolen cards can be duplicated or the information contained in the card can be used to hack into other areas of a facility. These vulnerabilities can lead to a less secure environment and put the safety of employees, visitors and assets at risk. Iris readers can overcome many of these concerns and help ensure a higher level of security. There are no cards to be lost, loaned or duplicated, and iris information cannot be falsified. An iris cannot be shared or stolen, and iris readers cannot be fooled by makeup, hair or clothing changes. 4. Identity authentication In common access control systems, access is authorised either by the reader/controller or by the reader/server based on presentation of a pre-programmed access card by the individual. Neither decision is dependent upon any type of identity recognition. Without physical identity verification, the reader does not have the ability to confirm that the user is in fact the individual assigned to that card. Even two-factor authentication (i.e. access card plus PIN or password) can be defeated with readily available skimmers In a real sense, card-based systems are using the card as confirmation of the identity of the person carrying the card. However, because cards can be stolen, loaned, lost or duplicated, that link is both tenuous and vulnerable. Even two-factor authentication (i.e. access card plus PIN or password) can be defeated with readily available skimmers. Iris recognition access control systems on the other hand require authenticated identification before allowing access. The individual is uniquely and permanently linked to their iris. Some readers even work in outdoor environments as well as through eyeglasses, sunglasses, and contact lenses. 5. Multiple uses As an identity management solution, iris readers have been deployed in mainstream security locations in addition to environments as diverse as federal, state and local law enforcement, correctional facilities, travel and border security, healthcare and financial services as well as sports and entertainment venues. Outside security applications, organisations that are investigating ways to update and improve business procedures are considering the efficiency and productivity gains with the use of biometrics. Examples include protecting against insurance fraud, maintaining time and attendance records, and even ensuring a patient gets the right medication in a hospital. And, because of the non-contact interface – the user simply looks into the iris reader – the technology is often selected for applications where the user is gloved, such as in pharmaceutical manufacturing or in a construction site or port, or in environments where users wear protective clothing. A benefit of iris recognition systems is the capability for integration with other security systems to improve access control security 6. Integration Another benefit of iris recognition systems is the capability for integration with other security systems to improve access control security and provide greater operational efficiencies. For example, available today are IOM Android® tablets that fuse access control readers, biometrics, keypads, intercoms, cameras and more. These iris biometric-embedded tablets combine the accuracy and convenience of iris recognition with the functionality and customisation of a mobile computing platform for increased security levels. The high functioning tablets can also be integrated with building management functions and time and attendance systems for even greater efficiencies. The high functioning tablets can also be integrated with building management functions and time and attendance systems for even greater efficiencies 7. Throughput Efficiency in system usage is critical for high volume throughput in applications such as airports/border crossings. It’s also critical in maintaining efficient throughput in facility access or at large public venues where lengthy delays could lead to user dissatisfaction and ultimately security vulnerabilities. To overcome these obstacles, new systems on the market offer high speed, making it possible for users to simply walk through a checkpoint without the need to stop and look into a reader. Iris recognition’s accuracy rates also contribute to ease of throughput. It’s extremely low FAR (False Acceptance Rates) and FRR (False Rejection Rates) are superior to those of other biometric modalities, making it better positioned for widespread usage. Iris recognition has proven to be a game changer in both physical and logical security. Its strong authentication capability also has potential for the home security market in devices such as biometric locks, Bluetooth devices and even cloud-based security. As costs come down, innovations will abound and the seven things you now know will help you navigate the future of biometric security.
It’s become a hot topic lately, but what are the real prospects for the smart home and home automation market? More specifically, what role can the security industry play in what is seen as a growth area? Earlier this year, IFSEC International in London saw the launch of a new home automation zone featuring a replica smart home, showcasing a range of interconnected devices such as intruder alarms, CCTV, biometric readers, door entry solutions and locks, as well as wireless control of blinds, lighting and heating, and 4K video and audio distribution. But despite the market entry of some big names such as Google’s Nest, Apple’s HomeKit, and telecommunications giants AT&T and Deutsche Telekom, are we really on the threshold of a home automation revolution? Not quite, according to market intelligence firm Ovum. It says growth is still limited to certain niche segments – mainly the higher end of the market and early adopters of technology. Michael Philpott, Senior Practice Leader, Consumer Services at Ovum says one of the main drivers is basic product lifecycles – if you are having a new boiler and thermostat fitted, why not get the latest ‘smart’ version? “What the market has failed to do is convince the mass-market that smart technology provides enough benefit to stimulate a purchase outside of the normal cycle.” Security and privacy There are other reasons for the measured growth in home automation. Key inhibitors to rapid growth include technology fragmentation, a lack of adequate security, products too complicated to use or install, a lack of consumer trust and concerns over reliability. “Many of the products on the market today have inadequate security and provide easy targets for hackers, not just to gain access to those devices, but the connected home in general,” says Philpott. “Privacy of data is the next [concern]. To maximise the potential of the smart home, consumers will be asked to share an increasing amount of data and personal information. Keeping control of who can access that data, however, will be essential in order to retain consumer trust.” In spite of these hurdles, Ovum sees the smart home market growing quite strongly, with worldwide revenues rising from $19 billion in 2016 to $76 billion by 2020. Breaking down that 2016 figure, connected home support accounts for around $3.6 billion, home automation is just $162 million, home security/monitoring is at $2.7 billion, and smart energy at $1.2 billion. Products like Google Nest and Sonos are making everyone aware of the benefits of smart technology and whole-house solutions So why are telecommunications companies such as AT&T and Deutsche Telekom active in the market, or at least preparing to be? “Telcos are looking for new revenue streams beyond broadband access,” says Philpott. “Operators believe that over time the smart home market will be significant and believe [that] as the owners of the networks, as well as having existing customer relations with millions of consumers, they are well positioned to play a part in the smart home.” Security industry role In terms of a service which can attract recurring revenue, the security industry can play a pivotal role in the smart home market. “Recurring revenues from home automation services are harder to develop outside of home security, where customers are already used to paying a monthly fee for a security monitoring service,” says Philpott. “There are other potential and interesting business models being explored, however, that could become significant over time. These include things like new home insurance models, appliance-as-a-service and household goods replenishment.” Does this mean the home automation market is about to take off? “One of the big mistakes many make is that they assume – based on some of the hype and big market investments – that the smart home market is set to explode,” he says. “This is not the case – growth is going to be slow and steady. Everyone needs to be realistic about that, rather than expecting some rapid ramp up simply because some big names have entered the market.” "Operators believe that over time the smart home market will be significant and believe [that] they are well positioned to play a part in the smart home" Surprisingly for what has historically been something of a grudge purchase, in the context of home automation security is seen as a solution some consumers are willing to pay for. “There is a lot of interest around home security as it is something that a certain segment of the market is willing to pay for,” says Philpott. “Everyone wants to feel safe in their homes, but that doesn’t mean everyone feels the need to invest in an electronic alarm or monitoring system. The trick therefore is to expand outside the traditional home alarm market. Other products can be monetised, but the industry needs to be more innovative in developing the business model. For example, very few people will pay $100 for a flood sensor, but they may consider installing one if it meant they somehow reduced their home insurance premiums.” High end sees growth But what’s the view from the sharp end of the market? Installation company Cyberhomes works predominantly in the high-end residential market in the UK and has seen steady growth over the last few years. As one of the firm’s directors, Andy Mack, says: “There is an increased expectation that properties of £4m value or greater will have a centralised control system for lighting, heating, AV and security. Once these systems are integrated it allows a wide range of automation options to be programmed, such as turning on lights when an intruder alarm is triggered.” Mack says an increased awareness among project designers and specifiers is a key driver. “At the high-end, architects and interior designers are more aware of the need to integrate home technology and the importance of having it professionally installed; whereas at the entry level, products like Google Nest and Sonos are making everyone aware of the benefits of smart technology and whole-house solutions.” But who is likely to benefit from the spoils of the smart home – companies like Cyberhomes or security integrators? “Many home automation specialists, Cyberhomes included, will work closely with security integrators in order to provide a seamless solution for the home owner. Security companies like Co-ordinated, who we partner with on many projects, are aware of what can be achieved by integrating intruder alarms and fire detection into a home control system; but they leave the specialist programming to us.” The lack of customer knowledge hinders the uptake of smart home technology, but that is improving Market threats The lack of customer knowledge hinders the uptake of smart home technology, but that is improving as more people understand what integrated smart home technology is capable of. As for the other threats to its adoption, Mack says: “A home automation company should be involved with the network infrastructure of a property and will ‘lock down’ as many security risks as possible. A well-designed and well-installed smart home should be extremely reliable. We are often called in to try and solve problems with an existing smart home system installed by someone else, and it is usually a poor installation that is causing many of the unreliability issues, rather than the equipment itself.” Is a fragmented market with differing technology and standards putting off potential customers? “Not in the high-end sector, as it is the responsibility of the home automation company to specify only products that they know will work correctly with the control system being installed – this can incorporate a surprisingly wide range of third-party equipment from a large number of manufacturers." “For entry level customers, there are a number of competing standards around and this can cause confusion and also limit the useful lifetime of any chosen solution. Companies like Apple are trying to simplify this with technologies like HomeKit, but that is taking a while to get any traction in the market.” Save
Krowd is an app that connects people together based on geography; that is, if they are at the same place at the same time. Users sign into the app using the local WiFi, identify themselves by username, and are placed immediately in a group chat comprising anyone else at the location who has signed into the app. An enhancement of the Krowd app, known as Krowdsafe, leverages the technology to achieve and promote security and safety. Specifically, Krowdsafe enables users to interact directly with security personnel at a public place to report any crimes or security infractions and to enable rapid response. Think of it as “crowdsourcing” security – the app provides more eyes and ears to keep a venue safer. In effect, it enables each of its users to be an extension of the security presence at a venue or event. Krowdsafe improves crowd resilience. “Crowdsourcing” security – the app provides more eyes and ears to keep a venue safer Krowdsafe security app Krowdsafe also opens a channel of communication for the security team to provide ad-hoc security information reminders or messages. Krowdsafe can be used at a variety of venues, including stadiums, transport hubs, office blocks, retail malls, college campus and major events organisers. The app does not access identities, violate privacy, or track the movements of users. Other app users only know the information fellow users disclose. Still, group chats, one-on-one engagement, and other social media interactions can ensue, whether about a favourite football team or the excitement of a rock concert. The system fosters digital engagement that centers around a physical space. Krowdsafe applies those capabilities to promoting better security. Enhancing crowd safety and management The elements of Krowdsafe beat out 67 competitors to win the Defence & Security Accelerator Competition to Innovate Crowd Safety, launched by the UK Home office after terror events in 2017. Key areas of interest in the competition were to improve the detection of threats from explosives and weapons within a range of crowded places with high footfall and so reduce the chance of future attacks. Krowdsafe provides a prioritised, readily accessible and simple way for members of a crowd to communicate with a security team charged with keeping them safe. The £250,000 government award has helped the product move forward commercially at a faster pace. Krowdsafe app does not access identities, violate privacy, or track the movements of users Krowdsafe users can tap a red button, prominent on the Krowd app, that says “Report.” They may then choose from a listing of common threat types – from suspicious activity or unattended activity to medical emergency or fire services. The list is configurable by venue and corresponds to any specific threat models. The list corresponds to the nature of any situation security wants to address, such as “anti-social behavior” at a football club. Users in the crowd can anonymously report racist chanting, for example. In a children’s sporting event, the app can be used to facilitate lost-and-found children. If a child gets lost, a user can share a photo with the security team, who can alert the “public” (other Krowdsafe users) and find the child within minutes or seconds. Encrypted identifier code A user taps the “Report” button, selects an issue, and an alert goes directly to the security team A user taps the “Report” button, selects an issue, and an alert goes directly to the security team, who can respond because they have the encrypted identifier code from which the message came. For that point, the security team communicates one-on-one with the user, who can then choose to share their current location with the security team to facilitate response. (The “legitimate interest” of knowing the location negates any privacy concerns.) Once location is enabled, the security team can follow the precise positioning of threats on a map, using GPS and other technologies, or even on a three-dimensional digital map of a multi-story building. Another security benefit of Krowdsafe is prevention. Event organisers and venue managers can promote the use of Krowdsafe on posters or in announcements throughout the venue. Additional eyes and ears are the equivalent of CCTV coverage on every inch of a venue and use of the system makes the environment more hostile to mischievous, malicious and/or terrorist activity. In effect, bad guys will go somewhere else. Enhancement to Krowd app Krowdsafe is an enhancement to the Krowd app, which has been around for a couple of years and is available in app stores for iOS and Android. The app approximates in the digital world the experience of being a stranger in the crowd in the real world. Users can join a conversation based on their username, and then disclose to the crowd whatever they wish (or not). Event managers/organisers can promote hashtags to help identify others in the crowd (such as #ManUnited to identify fans of the same football team). In general, users can identify themselves (voluntarily) according to common interests using hashtags. “Krowd is a group chat that connects people together at the same place at the same time in a group, but without anyone having to disclose personal information,” says Geoff Revill, Managing Director, Krowdthink Ltd. “You have a digital presence in the same place with other people at the same time.” Wireless connectivity Users connect initially into the system through WiFi, access to which serves to approximate presence at a venue Users connect initially into the system through WiFi, access to which serves to approximate presence at a venue. Once someone signs in, information about them is merely a grouping of “hash” numbers, which are used to identify them as they communicate with others in the location. However, the “hashing” cannot be hacked to find a user’s location, thus ensuring greater privacy. Because Krowd does not collect personal data (which is a revenue source for most social media companies), the company generates revenue by providing the service to venue owners who wish to interact with and manage a crowd. Data security Location data is considered sensitive under General Data Protection Regulation (GDPR), and tracking locations can help to identify where someone lives, works, who they associate with, etc. By not tracking location, Krowd avoids the related privacy issues. After initially signing in on WiFi, Krowd communications can also use 2G, 3G and other cellular networks in addition to WiFi. Addressing privacy concerns is essential to encouraging involvement in the Krowd app, and in Krowdsafe. “If you want people to participate in keeping the crowd safe, you have to get their trust and respect them, that’s a building block behind the behavioral science,” says Revill. By not tracking location, Krowd avoids the related privacy issues Privacy protection Because Krowd users remain anonymous (except for the information they choose to share), user data is not collected (and/or sold or used for future marketing purposes). Krowd’s paying customers are event venues and public places that provide the Krowd service and can promote their commercial messages or provide other information to their populations while on site. Krowdsafe can provide immediate security benefits to a venue. Even if only 25 staff members use the app in a given location, for example, that’s 25 more sets of eyes and ears to help the security department. In a retail mall, if the staffs of 200 tenant businesses use the app, that’s another 500 or so people watching out for security. Among the general public, use of the app can be promoted in customer newsletters, or by posting group discussions on big screens around a venue. Wide marketing scope It enables members of a crowd to report any broken doors, water leaks or blocked toilets Security is a secondary benefit for some Krowd users, who are drawn to the app because of marketing opportunities, such as the ability to provide discounts or promotional offers to customers while they are on site. The app also encourages social media interaction, while maintaining the venue’s ability to “manage” the crowd by moderating any discussions. The Krowd app also provides management benefits to a venue. For example, it enables members of a crowd to report any broken doors, water leaks or blocked toilets. In general, the app helps to promote a better brand experience for the customer. Incident management One of the UK government’s concerns about Krowdsafe was its possible use by terrorists or other to cause incidents in a public venue. Think of the case of Olly Murs, a U.K. singer, whose mistaken tweets about hearing gunshots caused a brief panic at a department store on a busy shopping day. Might Krowd be uses similarly by a terrorist or other evil-doer to cause chaos or a distraction? No, says Revill, who points to a higher level of control over content exchanged in Krowd versus Twitter, for example. The security team can censor content or limit its propagation. They can also disable or block a user from communicating on the app. Messages containing dangerous or troubling content, such as racist terms, can trigger alerts to enable security teams to respond quickly.
Security vigilance can be sporadic at many companies and institutions. Facilities tend to tighten security in the days after a scary event happens or makes headlines, and people are generally tolerant of the associated inconvenience – for a time. But as memory fades, so too does tolerance for being inconvenienced. We want to be safe, but we also don’t want to be bothered. We want a security system that both provides safety and is unobtrusive. Security doesn’t have to be inconvenient. That’s a core message of FST Biometrics, which leverages multiple technologies to identify people in motion, ensuring non-invasive, seamless security in a variety of environments. “In Motion Identification” FST Biometrics’ system analyses body size, gait, movement and direction as an individual approaches an entry point, and then uses facial recognition to confirm that person as someone authorised to enter a facility The approach, says FST Biometrics, is to combine facial recognition biometrics with analysis of body behaviour and characteristics. Their system analyses body size, gait, movement and direction as an individual approaches an entry point, and then uses facial recognition to confirm that person as someone authorised to enter a facility. It all happens without the individual realising it or thinking about it – in effect, tightened security is invisible and non-intrusive to the environment being protected. FST Biometrics calls it “In Motion Identification” (IMID). The benefits are obvious in a global environment where security increasingly is needed everywhere. “It’s very accurate identification that translates into security without a high visibility of security,” says Arie Melamed, CMO of FST Biometrics. “If you have security that isn’t invasive, and without changing the status quo of life, people feel safer and they will be safer.” Accuracy With a false accept rate around 3 in 10,000, the system is sufficient for all but the most secure facilities, says Melamed. If additional security is needed, the system can also implement a voice recognition element, or other multi-factor identification such as cards or smart phone credentials can be added (with resulting false accept rates around 1 in 1 million). FST Biometrics’ software includes visitor management and access control suites, too. It can also be integrated with access control platforms such as Lenel, Tyco’s C-Cure, Honeywell and others. Analysing body recognition factors FST Biometrics analyses body recognition factors as an individual approaches an entry point to narrow the field of possible identities, from which a face is confirmed at the entry point. Narrowing the possible matches from 10,000 to 500 or fewer, the system both simplifies the task of recognising the face and eliminates a majority of possible false accepts, thus improving the accuracy of the total system. Body characteristics are analysed at distances ranging 12 to 18 feet from the entry point, and the final facial recognition takes place 2 or 3 feet from the entry. The system can be used with doors, speed gates or turnstiles, or even in an open environment where a security guard is notified if a person isn’t recognised. The company claims throughput at turnstiles of 30 people per minute. “It’s very accurate identification that translates into security without a high visibility of security. If you have security that isn’t invasive, and without changing the status quo of life, people feel safer and they will be safer”, says Arie Melamed, CMO of FST Biometrics The software system works with standard hardware, including a 5 megapixel IP camera installed at the entry point, and a server. Only the facial image is enrolled in the system. Over time, the system then “learns” information about body behaviour and characteristics -- and applies the data to simplifying identification and increasing accuracy. About FST Biometrics FST Biometrics was founded in 2007 by the former head of Israel’s military intelligence. The company installed the first systems in customer facilities in 2012, and has been receiving feedback since then. In 2014, they began to focus on the enterprise market, including “open campuses” that want security but without the “feel” of security. Clients include corporate, retail, financial services, telecommunications, residential and governmental sectors. Melamed says a new $15 million investment in FST Biometrics by GMF Capital is an endorsement of the company’s approach and a statement of trust. “We know how hard they look for uniqueness [in companies they invest in],” he says. “They are looking for companies that are changing the world.” Former Israeli Prime Minister Ehud Barak will represent GMF Capital on the FST Biometrics Board of Directors. FST Biometrics has also introduced a system that uses an Android-based mobile device (such as a smart phone with a camera) to enable a security guard to recognise people without being tied to a specific location, even in an environment such as a parking garage. After the identity is confirmed, the mobile system advises whether the person can enter and may also list who is authorised to be a passenger in their car (to identify possible car-jacking scenarios).
Visiting with the youngest "old company" in the security market: One of the newest companies at this year’s ISC West show is 130 years old. Allegion launched in December 2013 as a standalone, publicly-traded company following the spinoff of the commercial and residential security businesses from Ingersoll Rand. Making its high-profile debut at ISC West in Las Vegas, Allegion sponsored the kick-off ceremony and featured a big booth full of familiar brands like Schlage and Von Duprin. I caught up with Dave Petratis, chairman, president and CEO of Allegion, for a quick interview at the company’s booth. Some in the security market may remember Petratis as chief operating officer and CEO of Schneider Electric North America from 2002 to 2008. He comes to Allegion from Quanex, a Houston-based manufacturer of engineered materials and components for building products. SourceSecurity.com: So what’s the Allegion story at the ISC West show? Petratis: We’re a brand new company with 130-year-old roots. We sponsored the ISC kick-off this morning, so that certainly got some attention. I’m really amazed by the level of foot traffic at the show. We’re a new company, deep roots. We launched Dec. 2, 2013 and we have been extremely well received by our employees, our channel partners and the financial community. We are already involved in acquisitions and joint ventures. That’s what was lacking under Ingersoll Rand. There wasn’t a lot of aggressiveness to build through mergers and acquisitions. We have the ability to do that. We have the ability to invest, the feet on the street, spec writers, new products. That’s really the message here. We’re a company that you touch every day through Schlage, Von Duprin, LCN. We’re independent and moving very quickly. SourceSecurity.com: What is your brand strategy related to the new name? Petratis: We’re a house of brands. Allegion will be the umbrella, but as we acquire, we will plug those brands into the umbrella and continue to run with our master brands, which are Schage, Von Duprin, LCN, CISA and Interflex. When you have that installed base around the world, it’s pretty powerful. We wouldn’t want to distance ourselves from that at all. As we bolt on and buy new companies, they’ll be part of Allegion. SourceSecurity.com: Have there been any residual effects from the Ingersoll Rand era? Petratis: The transformation and launch of the company have been extremely smooth. But I wouldn’t underestimate the amount of work involved. Anytime you create a brand and go out and raise $1.8 billion in capital to buy the company, IPO the company, there’s a tremendous amount of work. That work is behind us. The most exciting thing that I feel going forward after joining the company is: I have the capability to go out and touch the industry and touch our customers and think about the future. SourceSecurity.com: What will be your news a year from now? Petratis: Growth, investment, open protocols. We think having capabilities in an open environment is good for customers. Customers want to have choices and don’t want to get locked into proprietary systems. As an independent company, we have all the ability to drive that.
Almabani General Contractors has a long robust history which began when the founders established the company in Jeddah, Saudi Arabia, in October of 1972. They are a family-owned company that remains true to its founders’ spirit, covenants, innovation and perseverance. Almabani General Contractors For four and a half decades, Almabani have been building up their expertise to serve an ever more demanding and challenging construction need in the region. In a prosperous economy fuelled by the oil boom, the company was positioned to participate in the execution of some of the most prestigious landmark projects in the Kingdom of Saudi Arabia. They have the highest classification in all civil and electrical works with in-house capabilities to develop design and value engineer solutions to cater to the customers’ needs. They have proudly executed projects from complex infrastructure works to heavy civil engineering structures. Engaged in highly competitive turnkey projects The company is engaged in highly competitive turnkey projects worth several billion dollars The company is engaged in highly competitive turnkey projects worth several billion dollars. To this end, Almabani continues to invest in quality, value engineering, proactive and talented people, endeavoring at all times to satisfy their customer’s expectations and to best serve the welfare of the society. Replacing decentralised access control systems Almabani General Contractors was using traditional decentralised access control & time-attendance systems in which they were facing the issue of excessive manual work and inaccurate data. Because of the poor quality of the existing biometric sensors, user fingerprints weren't recognised in the first attempt and the process was annoying and time-consuming. As the company is dealing with construction work, one of the major challenges for construction workers is accurate attendance marking despite dirty/stained fingers. Moreover, due to existing software limitations, many policies of access control and time-attendance couldn’t be implemented. As the existing system was decentralised, on-field employees faced issues while marking their attendance. Only basic reports could be prepared for attendance and access whereas they needed more customised reports because of various shifts and different contract workers. Moreover, third party integration was not possible in the earlier system. And last, but not the least, they were unsatisfied with support from the past supplier. Matrix access control and time-attendance solution Matrix solutions experts collaborated with the decision heads to understand the exact requirement and provide a cost-effective solution. After a comprehensive discussion, Matrix offered a centralised solution for all the locations. With the Matrix time-attendance and access control solution, the customer has overcome all the challenges. Now, it's possible for them to get control of all the locations from a single central location. Multispectral fingerprint sensor technology To stop inaccurate attendance marking, Matrix offered multispectral fingerprint sensor technology To overcome the problem of inaccurate attendance marking due to dirty/stained fingers, Matrix provided the multispectral fingerprint sensor technology which contains information about both the surface and the subsurface features of the skin. This technology gives a high throughput. They also acquired Palm Vein Reader for contactless authentication verification for the higher authorities. The solution from Matrix is fully customised with multiple shifts and attendance policies that can be applied to individual users. The smart mobile application for attendance marking and leave applications facilitate easy operation for users. Now, the customer is able to get the report of each employee with 200 different options. Auto-push technology With the auto-push technology, there is no need to transfer the data into the server. The data is automatically transferred to the server in real-time. The customer also got flexibility in terms of connectivity with 3G and WiFi options. The system from Matrix also provided the flexibility for easy integration with the third-party payroll system. Result: Accuracy in attendance management Centralised time-attendance and access control management High possibility of third-party integration User-friendly and fast process because of good quality sensor OEM support Contactless and advanced technology Flexibility in terms of integration, connectivity and credentials Products Offered: COSEC DOOR PVR – Palm Vein based Door Controller COSEC PATH DCFE – Biometric Fingerprint + RFID based Door Controller COSEC PATH DCCE – RFID based Door Controller COSEC PANEL LITE – Site Controller for Advanced Access Control Features COSEC LE PLATFORM – For 1500 + Users COSEC LE TAM – Time-Attendance Application Module COSEC LE ACM – Access Control Module COSEC LE ESS – Employees Self Service Module (Mobile App) COSEC INTEGRATION - Integration with In-house Payroll Software
G4S is the globally renowned integrated security company with operations in approximately 85 countries. At the core of the business is G4S Integrated Security, which combines expertise, security professionals, technology and data analytics. G4S Integrated security G4S delivers integrated security around the world with the last six months having brought significant change for the company. The sale of the conventional cash business has enhanced strategic, commercial and operational focus and strengthened the company’s financial position. G4S is transforming, with an intensified focus on integrated security solutions strategy. They are winning business faster and growing stronger than ever before. Through the launch of the global G4S Academy, the organisation is offering an opportunity to share knowledge and work more collaboratively with customers. Sector specific solutions and a global approach to risk and investment in technology are delivering clear benefits to customers and differentiating G4S’s offering in the security market. Below are some examples of G4S Integrated Security delivered to customers around the world. G4S Americas In the United States, one of G4S Americas’ Security and Risk Operations Centre helps prepare for, monitor and respond to threats from one central location. The Security and Risk Operations Centre, based in Florida, provides integrated security solutions by seamlessly combining monitoring capabilities, data analytics, enterprise risk intelligence and global response services. Through actionable data and valuable insights, G4S experts are able to identify threats early and respond quickly. Their technology enabled intelligence-gathering and data analytics enable customers to know immediately when incidents occur. They also allow the organisation to support customers by optimising spend, mitigating risk and enhancing their security programmes. G4S Europe & Middle East The diverse team of highly-trained security professionals has adapted to the changing security climate At a Critical National Infrastructure site in southwest England, G4S’s connected security professionals use technology and data to assess threats, manage incidents, and keep a large workforce safe. The diverse team of highly-trained security professionals has adapted to the changing security climate and conduct automated fever screening, as people enter their site. Specially trained security professionals use the best technology, including G4S’s proprietary software RISK360, on this complex, long-term project. G4S RISK360 proprietary software G4S RISK360 proprietary software allows the team to manage incidents, instantly share information, and detect patterns and trends. The training of connected security professionals is tailored to the site. They are setting the gold standard on securing critical infrastructure. In 2019, the Singapore Government asked the industry to prioritise technology over manpower through ‘Outcome Based Contracting’. G4S won an important contract to secure 62 schools using the Threat, Vulnerability, and Risk Assessment (TVRA) Solution. Threat, Vulnerability, and Risk Assessment Solution TVRA risk-based solution combines access control, biometric time and attendance with patrol and response The TVRA (Threat, Vulnerability, and Risk Assessment) risk-based solution combines access control, visitor management systems, biometric time and attendance with patrol and response, incident reporting, and remote CCTV monitoring. G4S security professionals and Security Risk Operations Centre are in control of the situation, at all times, using cutting edge technology and data analytics. These are just some of the ways by which G4S is securing the world. G4S Africa In South Africa, G4S security integration of risk consulting, security professionals and technology, for a global FMCG brand, is underpinned by the organisation’s data analytics. G4S security professionals protect valuable goods that are delivered all over the country. From the G4S Security and Risk Operations Centre near Johannesburg, experts use G4S RISK360 proprietary software to enable secure and reliable deliveries. The security software provides critical data and analysis that is then used to monitor and deploy resources to the highest risk areas. This data is continually shared with the customer, laying the foundation for a partnership that is building a more secure future.
Iris ID, a provider of iris recognition technology, announced its contactless IrisAccess® biometric technology is being used for employee time and attendance at hotels in Iraq which are part of Millennium & Copthorne Hotels, a London-based hotel company that manages and operates 135 luxury hotels in 80 locations worldwide. The Millennium hotels – the Millennium Kurdistan, the Copthorne Hotel Baranan and Millennium Kurdistan Hotel and Spa – are located in the Sulaymaniyah province in the country’s Kurdistan region. Biometric readers The process takes a second to complete and is highly intuitive, requiring virtually no employee training to use" Mohammed Murad, vice president, global sales and business development, Iris ID, said iCAM 7S series biometric readers provide a quick and accurate way to record the time employees work each day. “The process takes a second to complete and is highly intuitive, requiring virtually no employee training to use,” he said. “The iCAM 7S platform automatically tilts to locate a person’s face and iris patterns. Also, it’s important in the COVID-19 era, that the technology is contactless and not impacted by employees wearing personal protective equipment such as gloves, masks and goggles.” Integrate with the payroll management system The iCAM 7S time and attendance units integrate with the hotels’ payroll management system to ensure accurate reporting of hours worked without any manual processes. Iris ID’s highly accurate identity verification technology eliminates a costly payroll fraud scheme known as buddy punching – when one employee signs in or out for another. InfoMet Technologies, an Istanbul, Turkey-based integrator of security and building management systems, installed the Iris ID system in the three Iraqi hotels.
Rural communities have struggled for a long time to maintain access to quality healthcare services. There is a lack or limited number of clinics in rural areas. Ziqitza Health Care Limited signed to implement "Madhya Pradesh Emergency Medical Ambulance and Healthcare Services" for the government. This mobile clinic would travel in rural areas, covering every small village. These are called Madhya Pradesh Mobile Units (MMU). As the ambulance is on move all the time, attendance capturing of doctors and nurses was a problem. Above that, vibrations from a moving vehicle led to difficulty in installation of an attendance marking device. Furthermore, provision of LAN connection not being possible in a moving vehicle, device connectivity posed as another problem. Moreover, keeping track of 144 ambulances all together with their doctors and nurses was a difficult task for the government of Madhya Pradesh. Real-time data transfer These devices also allow keeping track of each of these ambulances having more than 700 users After comprehensive discussion, Matrix offered flexible and reliable devices and software to the government of Madhya Pradesh for MMU (Madhya Pradesh Mobile Units) in rural areas. Around 144 devices were installed in the ambulance in a way that they could withstand the vibrations of a moving vehicle. Matrix Time-Attendance solution enabled them to capture accurate attendance of doctors and nurses. These devices also allow keeping track of each of these ambulances having more than 700 users. These products have auto push technology which transfers data to the server in real-time. For real-time data transfer, they used a USB data dongle with 3G/4G connectivity. The result was the improved efficiency through real-time attendance data. Products offered COSEC DOOR FOT (144 units) - Fingerprint and card based door controller for Time-Attendance application COSEC CENTRA ME (1 units) - Application Server Platform with 500 users and expandable up to 1,000 users COSEC ME TAM (1 unit) - Time-Attendance Software COSEC USER1OO (3 units) - 100 Users Licence
Invixium, a global provider of innovative touchless biometric solutions, has been contracted by Fine Hygienic Holding (FHH), one of the provider Wellness Groups and manufacturer of hygienic paper products, to deploy IXM TITAN devices and integrate Invixium’s workforce management solution with FHH’s Oracle HR cloud as part of its corporate digital transformation initiative. Businesses like FHH that have many operating locations require a workforce management solution where data from all facilities is readily available. Invixium’s IXM WEB is a web-based, cloud-ready biometric access control and workforce management software that the TITAN devices installed at FHH’s sites in Jordan, the UAE, Saudi Arabia, and Egypt constantly share data with. This data, including time tracking, is visualised in IXM WEB’s playful interface through interactive dashboards and intuitive reports showing employee data and the overall health of the biometric system. Payroll and employee time management FHH’s existing ORACLE Fusion time management system created a unique challenge for all stakeholders, including Invixium and their partner ElectroSec, from an implementation and support perspective to cover all FHH’s operations across the MENA region. For the TITAN installation to be effective, employee clock-ins (i.e. punches) needed to be immediately exported to ORACLE Fusion, where FHH’s Human Resources could manage payroll and employee time. Invixium’s team of experts worked with FHH and ORACLE to bridge IXM WEB with Fusion, allowing TITAN to seamlessly share data with FHH’s existing human capital cloud. After three consecutive pay periods with 100% time accuracy, Invixium and FHH share that this custom digital transformation implementation was a complete success. Zero human intervention “We had very tight timelines in 2019 to ensure we go live in 2020 for all our Phase 1 Cloud transformation programmes, where the core focus was on Human Resource processes, technology and improvements. Working with Invixium, Oracle, FHH’s technical team, supported by the HR team, we were able to implement a system that is 100% accurate on employee records for Time and Attendance and then integrated it into the Oracle platform. This leaves very little room for fraud and zero human intervention, and provides FHH with a foundation for the future for all HR related systems and processes," said FHH’s CIO Yahyah Pandor. “Invixium is very proud of what we accomplished with Fine Hygienic Holding,” said Shiraz Kapadia, President and CEO of Invixium. “Our products are made to be highly customisable, so we accepted this challenge knowing that TITAN and IXM WEB were the right fit for FHH’s unique needs. IXM WEB especially is designed with the end-user in mind; we want our customers to have the freedom to build their system around their business needs. Our engineers worked tirelessly with FHH and ORACLE to make this digital transformation happen, and the results have been incredibly positive.”
Kingfisher Sec, a West London-based security specialist, has adopted SmartTask to support the rapid growth of the business by streamlining and automating critical business processes. The company will use the cloud-based software to handle employee scheduling, proof of attendance and operational reporting across a team of up to 50 security guards. As a result, Kingfisher Sec has already reduced administration by around 17.5 hours a month, with further improvements expected moving forward. “We wanted an employee scheduling and workforce that would mitigate any growing pains we experience as the business continues to expand as well as helping us achieve our aim of creating a paperless operation,” explains Filipi Nascimento, Operations Manager at Kingfisher Sec. “SmartTask is allowing us to automate many of our manual processes in a phased approach to maximise benefit realisation, without losing focus on our core operational priorities.” Electronic communication tool SmartTask was selected following a tender process based on its feature-rich and easy-to-use functionality. Kingfisher Sec is using the software to provide a simple tool to the company’s team of security guards, via a smartphone app, so they can simply book on and off shifts, accept schedules and book holidays. Meanwhile, the advanced rostering system allows Kingfisher Sec to quickly create monthly work plans and communicate them direct to staff for electronic confirmation. Kingfisher Sec is also looking to replace a paper-based DOB system at around 40 customer sites with SmartTask’s Daily Occurrence Log (DOL). The electronic communication tool will enable security guards to quickly create entries and upload details regarding any on-site occurrence, providing online visibility of all incident data and supporting photo evidence. Capturing accurate data The software is capturing accurate data about the performance of our team and the business" As well as reducing the administrative burden, both on-site and centrally, the DOL will also remove the cost of providing, distributing and archiving a paper-based log. “SmartTask is streamlining our business and operational procedures, so we can save both time and money while providing a better service to our customers. The software is capturing accurate data about the performance of our team and the business, which we simply did not have access to previously. This is allowing us to better manage staff, eliminate human error and quickly respond to any issues,” adds Nascimento. Cloud-based software Paul Ridden, CEO of SmartTask commented: “Our cloud-based software is a highly-advanced and easy-to-use guard management, monitoring and reporting solution that typically reduces costs and improves efficiency by 30 per cent. As a result, a growing range of security businesses are using SmartTask to plan, manage, conduct and measure workforce activities more effectively.”
Round table discussion
The general public gets much of its understanding of security industry technology from watching movies and TV. However, there is a gap between reality and the fantasy world. Understanding of security technologies may also be shaped by news coverage, including expression of extreme or even exaggerated concerns about privacy. The first step in addressing any challenge is greater awareness, so we asked this week’s Expert Panel Roundtable: Which security industry technology is most misunderstood by the general public and why?
The concept of how security systems can contribute to the broader business goals of a company is not new. It seems we have been talking about benefits of security systems beyond “just” security for more than a decade. Given the expanding role of technologies in the market, including video and access control, at what point is the term “security” too restrictive to accurately describe what our industry does? We asked the Expert Panel Roundtable for their responses to this premise: Is the description “security technology” too narrow given the broader application possibilities of today’s systems? Why?
Big data is a buzzword, and data – presumably of all sizes – is a driving force in the physical security market. As systems become more sophisticated and expand their capabilities, the result is more data; in some cases, a lot more data. But a key question is: What do we do with the data? How do we use it to provide value? How do we interpret it, and transform it into useful information and/or intelligence? We presented the topic of data to our Expert Panel Roundtable and came away with a range of thoughts on its changing – and expanding – role in the physical security market (and beyond). We asked this week’s Expert Panel Roundtable: How is a greater emphasis on data changing the physical security market?