Biometric time and attendance
Matrix will be participating in the Rail India Conference & Expo 2019 to be held at The Lalit in New Delhi on 29th – 30th August 2019. From Telecom domain, Matrix will be showcasing enterprise meeting solution - PARISAT meeting server at the event. The conferencing server is engineered for 10 video and 100 audio participants enabling police force to collaborate from different locations and solve critical situations at the earliest. At the event, Matrix will exhibit pure IP solution -...
Suprema Inc., a provider of biometrics and security solutions, announces that the company introduces the company's latest range of biometric security solutions at Security Exhibition & Conference 2019 in Sydney, Australia. At the show, Suprema will showcase FaceLite, its latest facial recognition terminal, 2nd generation fingerprint IP readers and enterprise access control solutions. Launched at ISC West in April this year, Suprema extends introduction of the FaceLite in Australia. The Face...
Matrix, global manufacturer of enterprise-grade telecom and security solutions, is participating in the India Africa ICT Expo 2019, Kigali, Rwanda from 5th to 6th August 2019. India Africa ICT Expo is one of the best platforms to have business interactions and create strategic alliances. This year, Matrix will showcase its latest Telecom, IP video surveillance and people mobility management solutions. ETERNITY NENX communication At the event, Matrix will highlight ETERNITY NENX, newly launched...
Dahua Technology, globally renowned video-centric smart IoT solutions and service provider, has launched IVSS 2.0 (IVSS7000-I), an upgraded series of its NVR family powered by the latest AI capable of deep learning, which opens up new possibilities to smart security solutions. Upgraded IVSS 7000-I The upgraded IVSS 7000-I features scalable GPU design to meet the ever-growing project requirements. The unique Dahua Deep-Learning algorithm with GPU group enables IVSS7000-I to perform face recogni...
Iris ID, a global provider of iris recognition technology, announced its award-winning multimode iCAM M300 handheld biometric platform now offers gateless access control, time and attendance and employee mustering for both commercial and government markets. The new functions are possible with embedded XPressEntry software from Telaeris, a provider of real-time personnel tracking solutions. Also using Iris ID’s Iris Access EAC software, the iCAM M300 continues to provide an ideal portable...
Krowd is an app that connects people together based on geography; that is, if they are at the same place at the same time. Users sign into the app using the local WiFi, identify themselves by username, and are placed immediately in a group chat comprising anyone else at the location who has signed into the app. An enhancement of the Krowd app, known as Krowdsafe, leverages the technology to achieve and promote security and safety. Specifically, Krowdsafe enables users to interact directly with...
Suprema, global provider of biometrics and access control solutions, has announced that it will showcase new-generation mobile solution and latest facial recognition biometrics at IFSEC 2019 in London on June 18. Suprema mobile credential service Suprema's new mobile credential service provides the end-to-end solution including a cloud-based portal services, a mobile app, BLE readers, open API and in-app SDK for 3rd party support. The new service provides users with easier mobile card administration, enhanced level of security, extensive choice of card types, and cost-efficient pricing plans. We are excited to introduce our new mobile credential service at IFSEC 2019" "We are excited to introduce our new mobile credential service at IFSEC 2019. The new service has been designed to improve overall user experience and enhance interoperability with 3rd party systems, readers and apps," said Hanchul Kim, Director of Global Business at Suprema. XPass 2 RFID access readers To fulfill the new mobile solution, Suprema will also launch XPass 2 readers, a series of access readers supporting BLE, NFC and various types of RFID standards. Comes in both gang box and mullion form factors, the new XPass 2 readers are intelligent edge controllers fully support BioStar 2 and mobile authentication. FaceLite facial recognition terminal In addition, Suprema will also demonstrate the new FaceLite, the company's latest facial recognition terminal for the first time in UK and EU market. Launched in April 2019, the new FaceLite is designed for both the enterprise access control systems and time attendance applications by featuring Suprema's industry-leading technologies and innovative features. Loaded with powerful 1.2GHz CPU and massive 8GB memory, FaceLite achieves incredible matching speed of up to 30,000 matches per second and accommodates up to 30,000 users while providing intuitive face-enrollment GUI for faster user registration. On the optical side, the new face recognition technology overcomes possible interference from dynamic lighting conditions including sunlight and ambient light. The new technology allows greater range of operating illuminance from zero lux to 25,000 lux which covers almost every possible lighting condition regardless of indoor or outdoor, day or night. Biometrics and access control Along with new mobile credential service and face recognition technology, Suprema will also showcase the company's extensive range of latest biometrics and access control solutions at IFSEC 2019.
Matrix aims at increasing the networking opportunities by explaining decision makers the application of latest telecom and security solutions at the International Police Expo. The event organised on 19th and 20th July’19 gathers high level professionals of defence forces and gives them an overview of technologically advanced solutions. From telecom domain, Matrix will be showcasing enterprise meeting solution - PARISAT meeting server at the event. The conferencing server is engineered for 15 video and 150 audio participants enabling police force to collaborate from different locations and solve critical situations at the earliest. At the event, Matrix will exhibit pure IP Solution - PRASAR UCS that enables armed forces’ personnel to connect wirelessly from remote locations. Multiple connectivity options Matrix will showcase its aadhaar enabled biometric device Matrix Unified Communication Server – SARVAM UCS will also be highlighted at the event. Equipped to support radio ports and in-skin GSM connectivity, the solution enhances connectivity between field personnel helping them manage emergency situations effectively in less period of time. Matrix will also showcase its GSM and VoIP gateways that allows police and defence forces to make an easy switch to the modern network while retaining their existing infrastructure. Matrix will showcase its aadhaar enabled biometric device. It’s the only Linux based device available in Indian market with card and finger authentication. The device comes with multiple connectivity options like Wi-Fi, PoE, Ethernet and i.e. our Aadhaar based authentication device is purposely designed for marking attendance of government employees and is the only embedded device available in Indian market currently. Time-attendance solutions Matrix will be showcasing enterprise grade access control and time-attendance solutions engineered with features such as auto push events to server, automatic fingerprint distribution, instant notification, 300+ customised reports generation, scheduler services including backup and more. Furthermore, access control being the prime requirement in terms of security, Matrix will present its standalone access control solution with license free environment, whereby a single panel can handle up to 255 doors and 25,000 users. Get a glimpse into the cutting-edge Matrix biometric solutions with multiple credentials such as face, fingerprint, palm vein, RFID card and PIN options at International Police Expo. Matrix will also be showcasing an enterprise-grade video management system designed, engineered and built specifically for growing multi-location organisations. The entire solution focuses on automating processes and enhancing efficiency of organisations. Real-time security Matrix will be showcasing its new extreme series of Network Video Recorder (NVRX) at the event Matrix will also be showcasing a new range of audio compatible and compact professional series IP cameras powered by SONY STARVIS series sensors with EXMOR technology. This gives the cameras an edge over others in terms of exceptional low light performance, consistent image quality during varying light conditions (True WDR), better bandwidth optimisation, video analytics such as intrusion detection, perimeter security, loitering detection and many other features. Furthermore, Matrix will be showcasing its new extreme series of Network Video Recorder (NVRX) at the event. This NVR is equipped with 4K decoding capacity and characteristics like cascading (up to 20 NVRs), camera-wise recording retention, TCP notifications for remote locations and database level integration. Moreover, these latest NVRs are also backed with an intelligent software that helps detect threats and send instant notifications for real-time security. Products’ features and applications “We are enthusiastic about explaining our latest products’ features and applications to the key people of the defence industry. We will give brief insight on how our solutions can help the armed forces serve the society in a better way”, said Jatin Desai, Marketing Manager. Matrix cordially invites everyone to visit them at Stall Number: 21, International Police Expo 2019, Pragati Maidan Delhi on 19th and 20th July to have a sneak peek at the future of Telecom and Security solutions.
Genetec Inc., a provider of unified security, public safety, operations, and business intelligence solutions, announces it will display its flagship security platform, Security Centre 5.8, and its comprehensive suite of new features whilst exhibiting at IFSEC International 2019. This will be the first time the new functionality will have been displayed in Europe, taking place at ExCeL London from 18-20 June (Stand IF710). The unified platform has undergone a significant update recently, providing customisable live dashboards, enhanced privacy protection features, a brand-new mobile app, and new functionalities that help users monitor the health of their security system and ensure compliance with cybersecurity best practices. Version 5.8’s new features will also ensure that operators can optimise their physical security environment while benefiting from greater visibility into their operations. Monitor security system Security Center 5.8 enables operators to create user-friendly, highly customisable dashboards, presenting critical information, including real-time data from the scene of an ongoing incident. These dashboards show live video feeds from the exact locations where an alarm may have been triggered and provides users with insightful reports and charts depending on their interest area. This app allows users to record incidents, access nearby video and access control A key new feature of the Security Center interface is the ability to monitor a security system while on the go - through a mobile app which gives operators a valuable new asset in the security environment. This app allows users to record incidents, access nearby video and access control, as well as sharing video from their phones to Security Center. This provides the user with actionable information, that can be shared across the whole security team – allowing them to respond effectively to any situation that might occur. Increase local awareness Security Center 5.8 also provides a wide range of other valuable features: Video (live and recorded playback, PTZ controls, bookmarking, time - and event-based reports); Access control (check door status, lock/unlock doors, override schedule, set maintenance mode etc.); ALPR (live reads/hits, plate reports, and access hotlists); Interactive maps that increase local awareness and put critical information much closer to the operators, enabling them to easily visualise their environment and respond quickly. Built-in messaging allows for instantaneous sharing of information between operators and personnel in the field. This extends to sharing live or recorded video clips, text messages and other security information.
ELATEC is pleased to announce its recent hire of Ron J. Fiedler, who joins the ELATEC team as Vice President of Strategic Alliances. In this role, Fiedler will expand ELATEC’s global presence through business development, strategic partnerships, and penetration of new markets. ELATEC RFID readers ELATEC designs and manufactures unique radio frequency identification (RFID) readers for user authentication and access control applications. ELATEC readers recognise and decode over 60 RFID transponder technologies and are certified for use in as many as 110 countries worldwide. The readers are widely used for secure printing and other applications such as industrial vending, fleet management, time and attendance and single sign-on for computers and other devices. ELATEC designs and manufactures unique radio frequency identification (RFID) readers for access control applications "I was attracted by the company’s international footprint and exceptional 30% year-over-year growth in sales,” Fiedler said. “Most importantly, the demand is growing for RFID card and mobile ID convenience, efficiency and security, which ELATEC’s superior technology is uniquely positioned to capitalise on." RFID technology and security expert Fiedler is a Security industry veteran of nearly 20 years and a subject matter expert on RF credentials. He comes to ELATEC from RF IDeas, Inc, where for the past 15 years he served as Director of Business Development. There, he was instrumental in growing the organisation from a start-up to an Inc. 500 ‘5000 fastest growing private company’ to eventual acquisition by Roper Technologies. “We’re very pleased that Ron has joined ELATEC to lead the establishment of strategic industry alliances across our many industries and markets,” said Stefan Haertel, CEO of ELATEC. “As we enter our next phase of growth, Ron’s knowledge, experience, long list of achievements and the respect he’s garnered over his career in the industry will be valued additions to our team—and to our customers as ELATEC technology brings added value like no other.”
Matrix, a manufacturer and provider of Telecom and Security Solutions, to showcase its solutions at Indelex Smart Home Expo in collaboration with PowerTech Electronics. Matrix will be showcasing an enterprise-grade IP video surveillance solution designed, engineered and built specifically for growing multi-location organisations. The entire solution focuses on automating processes, easy integration with access control and enhancing efficiency of organisations. They will also be showcasing a range of audio compatible and compact Professional and Project Series IP cameras powered by SONY STARVIS series sensors with Exmor technology. This gives the cameras an edge over others in terms of exceptional low light performance, consistent image quality during varying light conditions (True WDR), better bandwidth optimisation and many other features. We will also be showcasing our PTZ Cameras for 360° security. Showcasing Extreme series of NVRs These latest NVRs are backed with an intelligent software that helps detect threats and send instant notificationsFurthermore, they will be displaying their new Extreme series of Network Video Recorder (NVRX) at the event. This NVR is equipped with 4K decoding capacity and characteristics like Cascading (up to 20 NVRs), Camera-wise Recording Retention and Database Level Integration. Moreover, these latest NVRs are also backed with an intelligent software that helps detect threats and send instant notifications for real-time security. In the event, Matrix will showcase futuristic technologies from the security domain. Matrix Access Control and Time-Attendance domain will showcase its newly launched Face Recognition technology for authentication through IP Cameras/Tablet/Mobile. The technology enables contactless authentication with precise and accurate authentication. Apart from this, they will display their high-end cloud-based Time-Attendance and Access Control solution. Mobile based access control solution Mobile being the next generation technology in the security domain, they will showcase mobile based access control solution whereby user can either scan QR code or just twist his/her phone for authentication. User can mark attendance automatically using GPS or Wi-Fi through mobile application. Thus, Matrix being the front face in innovation, they are going to show some extraordinary biometric door controllers useful for applications in Time-Attendance, Access Control, Visitor Management, Cafeteria Management and many more. Furthermore, access control being the prime requirement in terms of security, Matrix will present its Standalone Access Control solution with License Free Environment, whereby a single panel can handle up to 255 doors and 25,000 users. Get a glimpse into the cutting-edge Matrix biometric solutions with multiple credentials such as face, fingerprint, palm vein, RF card and PIN options. Unified Communication Platform Matrix will highlight ETERNITY NENX, their newly launched Unified Communication Platform for SOHO and SMBAt the event, Matrix will highlight ETERNITY NENX, their newly launched Unified Communication Platform for SOHO and SMB. Increasing number of small and medium organisations are migrating to leverage benefits of IP. For such applications, Matrix ETERNITY NENX is a perfect fit. Matrix Telecom domain will also be showcasing its comprehensive telecom solutions which includes IP-PBX, Communication Endpoints, Media Gateways, Mobile Application and much more. Along with that, Matrix Hospitality solution, which is specifically designed to enhance guest experience at hotels, will also be one of the major highlights. Hotel staff can enhance guest experience and improve staff productivity with hospitality features, front desk, PMS integration, staff mobility extensions and voicemail with personalised greetings. “With a portfolio of innovative Security and Telecom products, Matrix can cater a wide spectrum of industries. We are looking forward to meeting our existing and prospect end customers at Indelex Smart Home Expo,” said Jatin Desai, Marketing Manager.
People and vehicle access control specialist Nortech will be exhibiting at Elevate 2019, the meeting place for UK’s growing physical activity sectors at London’s ExCel on the 8-9 May to introduce its innovative products to the market. 2019 is Nortech’s first time at the show and they will be demonstrating the flexibility of the Norpass access control solution, which provides a wide range of features that are ideally suited to the leisure sector. Access control sector With Norpass, access control can be provided at all access points to gyms, fitness studios, health clubs and more to ensure that only authorised members and staff can enter the premises. Nortech recommends the use of its Mifare readers and smartcards that have a dedicated secure access control sector. Norpass3, the licence free software at the heart of the access control system, can run on any standard specification PC The benefits of using smartcards with a dedicated access control sector is greatly improved security plus the ability to issue sequentially numbered cards to members, facilitating easier card management. In addition, the same cards can be used for other Mifare enabled facilities such as vending machines and fitness management systems. Norpass3, the licence free software at the heart of the access control system, can run on any standard specification PC (Windows 7 onwards) and is quick and easy to set up using the built-in setup wizard. Time limited access It includes many features that are ideal for leisure centre membership access control including - Picture Pop-up - This enables staff to monitor people entering through a turnstile to ensure that the person entering is the valid cardholder. When an ID card is presented to the reader, the cardholder’s photo automatically appears on the screen of the operator/administration terminal. Time Limited Access - A feature that automatically enforces time limited access to certain areas (for example where a member is allowed the use of the facility for a fixed number of hours each week). Once a member has used up their weekly allocated time, they will not be allowed access until the start of the next week or until a staff member has granted an extension. Count Groups and Reporting - This feature can be used to ensure that the number of members of a particular category present within a restricted area does not exceed a preassigned limit (e.g.for health and safety reasons), and to make sure that the appropriate level of supervision is available. Whenever the numbers exceed the limit, an alarm will be raised to alert staff to take action. Automatic Digital Video Recorder Activation - Individual ID cards can be registered on the system so their use can be monitored in real time. For example, if a card has been reported as lost or stolen, its record can be set to automatically activate a video recording of the person using that card when it is used to gain access through a certain turnstile. Vehicle access management Nortech will also be demonstrating the Nedap ANPR (Automatic Number Plate Recognition) solution for vehicle access management. The ANPR is fully compatible with Norpass so that it can provide a fully integrated vehicle access management system for staff and members. Nortech has supplied products and solutions to the security industry for over 25 years as an independent British company. The company uses extensive experience and expertise to create new security products to fit their clients’ needs and designs everything with the customer in mind. Visit Nortech at Elevate 2019 on 8-9 May at London‘s ExCel to find out more about the many systems available and how they can benefit the future of people and vehicle control solutions.
Iris recognition measures the unique patterns in the coloured portion of the eye (the iris) and compares that ‘signature’ to the one on file Since the late 1990s, iris recognition technology has been used in banks and airports as a means of identity authentication. Today, its use is widespread in government facilities, schools/research centres, correctional/judicial facilities, healthcare and others. There are a number of reasons for its rising popularity, but first, a brief overview of the technology is in order. Iris recognition measures the unique patterns in the coloured portion of the eye (the iris) and compares that ‘signature’ to the one on file in the system to verify and authenticate identity. The iris pattern has the most desirable properties for verification compared to other biometrics because of its uniqueness, stability over time and relatively easy accessibility. It also has the highest accuracy among all biometrics. Today’s iris recognition systems have been designed for ease of use and to lessen any perceived concern about the technology 1. Ease of use Today’s iris recognition systems have been designed for ease of use and to lessen any perceived concern about the technology. In fact, it’s as simple as taking a selfie. In the enrolment process a camera captures a detailed image of the iris and the system’s biometric software makes a template or 'map' of the person's iris pattern for storage in the system. To verify identity later, an individual simply looks at the iris reader from a comfortable distance, and the system compares the patterns in the individual's iris against the templates stored in the database. If there's a match, the individual’s identity is verified. 2. Cost Whether used in security or business applications, iris readers are proving cost effective – particularly from a lifecycle perspective. There are no cards to be replaced when worn out or lost; no RFID blocking sleeves are necessary to prevent hacking; and operations can be streamlined through reduced time and labour. Some systems allow scanning of up to 30 people per minute from a distance of several feet. And because no contact with the camera is required, either for enrolment or authentication, wear and tear on the cameras and contamination issues are greatly reduced. In a real sense, card-based systems are using the card as confirmation of the identity of the person carrying the card 3. Vulnerability It has been said that using lower-accuracy access systems such as cards/readers for facility access is the equivalent of locking a car door – easily compromised. Stolen cards can be duplicated or the information contained in the card can be used to hack into other areas of a facility. These vulnerabilities can lead to a less secure environment and put the safety of employees, visitors and assets at risk. Iris readers can overcome many of these concerns and help ensure a higher level of security. There are no cards to be lost, loaned or duplicated, and iris information cannot be falsified. An iris cannot be shared or stolen, and iris readers cannot be fooled by makeup, hair or clothing changes. 4. Identity authentication In common access control systems, access is authorised either by the reader/controller or by the reader/server based on presentation of a pre-programmed access card by the individual. Neither decision is dependent upon any type of identity recognition. Without physical identity verification, the reader does not have the ability to confirm that the user is in fact the individual assigned to that card. Even two-factor authentication (i.e. access card plus PIN or password) can be defeated with readily available skimmers In a real sense, card-based systems are using the card as confirmation of the identity of the person carrying the card. However, because cards can be stolen, loaned, lost or duplicated, that link is both tenuous and vulnerable. Even two-factor authentication (i.e. access card plus PIN or password) can be defeated with readily available skimmers. Iris recognition access control systems on the other hand require authenticated identification before allowing access. The individual is uniquely and permanently linked to their iris. Some readers even work in outdoor environments as well as through eyeglasses, sunglasses, and contact lenses. 5. Multiple uses As an identity management solution, iris readers have been deployed in mainstream security locations in addition to environments as diverse as federal, state and local law enforcement, correctional facilities, travel and border security, healthcare and financial services as well as sports and entertainment venues. Outside security applications, organisations that are investigating ways to update and improve business procedures are considering the efficiency and productivity gains with the use of biometrics. Examples include protecting against insurance fraud, maintaining time and attendance records, and even ensuring a patient gets the right medication in a hospital. And, because of the non-contact interface – the user simply looks into the iris reader – the technology is often selected for applications where the user is gloved, such as in pharmaceutical manufacturing or in a construction site or port, or in environments where users wear protective clothing. A benefit of iris recognition systems is the capability for integration with other security systems to improve access control security 6. Integration Another benefit of iris recognition systems is the capability for integration with other security systems to improve access control security and provide greater operational efficiencies. For example, available today are IOM Android® tablets that fuse access control readers, biometrics, keypads, intercoms, cameras and more. These iris biometric-embedded tablets combine the accuracy and convenience of iris recognition with the functionality and customisation of a mobile computing platform for increased security levels. The high functioning tablets can also be integrated with building management functions and time and attendance systems for even greater efficiencies. The high functioning tablets can also be integrated with building management functions and time and attendance systems for even greater efficiencies 7. Throughput Efficiency in system usage is critical for high volume throughput in applications such as airports/border crossings. It’s also critical in maintaining efficient throughput in facility access or at large public venues where lengthy delays could lead to user dissatisfaction and ultimately security vulnerabilities. To overcome these obstacles, new systems on the market offer high speed, making it possible for users to simply walk through a checkpoint without the need to stop and look into a reader. Iris recognition’s accuracy rates also contribute to ease of throughput. It’s extremely low FAR (False Acceptance Rates) and FRR (False Rejection Rates) are superior to those of other biometric modalities, making it better positioned for widespread usage. Iris recognition has proven to be a game changer in both physical and logical security. Its strong authentication capability also has potential for the home security market in devices such as biometric locks, Bluetooth devices and even cloud-based security. As costs come down, innovations will abound and the seven things you now know will help you navigate the future of biometric security.
It’s become a hot topic lately, but what are the real prospects for the smart home and home automation market? More specifically, what role can the security industry play in what is seen as a growth area? Earlier this year, IFSEC International in London saw the launch of a new home automation zone featuring a replica smart home, showcasing a range of interconnected devices such as intruder alarms, CCTV, biometric readers, door entry solutions and locks, as well as wireless control of blinds, lighting and heating, and 4K video and audio distribution. But despite the market entry of some big names such as Google’s Nest, Apple’s HomeKit, and telecommunications giants AT&T and Deutsche Telekom, are we really on the threshold of a home automation revolution? Not quite, according to market intelligence firm Ovum. It says growth is still limited to certain niche segments – mainly the higher end of the market and early adopters of technology. Michael Philpott, Senior Practice Leader, Consumer Services at Ovum says one of the main drivers is basic product lifecycles – if you are having a new boiler and thermostat fitted, why not get the latest ‘smart’ version? “What the market has failed to do is convince the mass-market that smart technology provides enough benefit to stimulate a purchase outside of the normal cycle.” Security and privacy There are other reasons for the measured growth in home automation. Key inhibitors to rapid growth include technology fragmentation, a lack of adequate security, products too complicated to use or install, a lack of consumer trust and concerns over reliability. “Many of the products on the market today have inadequate security and provide easy targets for hackers, not just to gain access to those devices, but the connected home in general,” says Philpott. “Privacy of data is the next [concern]. To maximise the potential of the smart home, consumers will be asked to share an increasing amount of data and personal information. Keeping control of who can access that data, however, will be essential in order to retain consumer trust.” In spite of these hurdles, Ovum sees the smart home market growing quite strongly, with worldwide revenues rising from $19 billion in 2016 to $76 billion by 2020. Breaking down that 2016 figure, connected home support accounts for around $3.6 billion, home automation is just $162 million, home security/monitoring is at $2.7 billion, and smart energy at $1.2 billion. Products like Google Nest and Sonos are making everyone aware of the benefits of smart technology and whole-house solutions So why are telecommunications companies such as AT&T and Deutsche Telekom active in the market, or at least preparing to be? “Telcos are looking for new revenue streams beyond broadband access,” says Philpott. “Operators believe that over time the smart home market will be significant and believe [that] as the owners of the networks, as well as having existing customer relations with millions of consumers, they are well positioned to play a part in the smart home.” Security industry role In terms of a service which can attract recurring revenue, the security industry can play a pivotal role in the smart home market. “Recurring revenues from home automation services are harder to develop outside of home security, where customers are already used to paying a monthly fee for a security monitoring service,” says Philpott. “There are other potential and interesting business models being explored, however, that could become significant over time. These include things like new home insurance models, appliance-as-a-service and household goods replenishment.” Does this mean the home automation market is about to take off? “One of the big mistakes many make is that they assume – based on some of the hype and big market investments – that the smart home market is set to explode,” he says. “This is not the case – growth is going to be slow and steady. Everyone needs to be realistic about that, rather than expecting some rapid ramp up simply because some big names have entered the market.” "Operators believe that over time the smart home market will be significant and believe [that] they are well positioned to play a part in the smart home" Surprisingly for what has historically been something of a grudge purchase, in the context of home automation security is seen as a solution some consumers are willing to pay for. “There is a lot of interest around home security as it is something that a certain segment of the market is willing to pay for,” says Philpott. “Everyone wants to feel safe in their homes, but that doesn’t mean everyone feels the need to invest in an electronic alarm or monitoring system. The trick therefore is to expand outside the traditional home alarm market. Other products can be monetised, but the industry needs to be more innovative in developing the business model. For example, very few people will pay $100 for a flood sensor, but they may consider installing one if it meant they somehow reduced their home insurance premiums.” High end sees growth But what’s the view from the sharp end of the market? Installation company Cyberhomes works predominantly in the high-end residential market in the UK and has seen steady growth over the last few years. As one of the firm’s directors, Andy Mack, says: “There is an increased expectation that properties of £4m value or greater will have a centralised control system for lighting, heating, AV and security. Once these systems are integrated it allows a wide range of automation options to be programmed, such as turning on lights when an intruder alarm is triggered.” Mack says an increased awareness among project designers and specifiers is a key driver. “At the high-end, architects and interior designers are more aware of the need to integrate home technology and the importance of having it professionally installed; whereas at the entry level, products like Google Nest and Sonos are making everyone aware of the benefits of smart technology and whole-house solutions.” But who is likely to benefit from the spoils of the smart home – companies like Cyberhomes or security integrators? “Many home automation specialists, Cyberhomes included, will work closely with security integrators in order to provide a seamless solution for the home owner. Security companies like Co-ordinated, who we partner with on many projects, are aware of what can be achieved by integrating intruder alarms and fire detection into a home control system; but they leave the specialist programming to us.” The lack of customer knowledge hinders the uptake of smart home technology, but that is improving Market threats The lack of customer knowledge hinders the uptake of smart home technology, but that is improving as more people understand what integrated smart home technology is capable of. As for the other threats to its adoption, Mack says: “A home automation company should be involved with the network infrastructure of a property and will ‘lock down’ as many security risks as possible. A well-designed and well-installed smart home should be extremely reliable. We are often called in to try and solve problems with an existing smart home system installed by someone else, and it is usually a poor installation that is causing many of the unreliability issues, rather than the equipment itself.” Is a fragmented market with differing technology and standards putting off potential customers? “Not in the high-end sector, as it is the responsibility of the home automation company to specify only products that they know will work correctly with the control system being installed – this can incorporate a surprisingly wide range of third-party equipment from a large number of manufacturers." “For entry level customers, there are a number of competing standards around and this can cause confusion and also limit the useful lifetime of any chosen solution. Companies like Apple are trying to simplify this with technologies like HomeKit, but that is taking a while to get any traction in the market.” Save
Workplace mobility is on the rise, which means organisations have an increasing number of employees who travel or work from home. In fact, there were 96.2 million mobile workers in 2015 and IDC predicts that mobile workers will account for nearly three quarters (72.3 percent) of the total U.S. workforce by 2020. While the growth of mobile workers is a boon to productivity both inside and outside the workplace, it also creates unique communication challenges – especially in emergency situations. One of the major worries for an organisation is the safety of its employees, whether they’re on-site, at a different office location, on-the-road, in the field or in the air. When disaster strikes, organisations need to quickly communicate with their employees in case of a location-based event (active shooter, fire, explosion, natural disaster or terrorist attack) to help protect their safety and direct them to take specific actions. For example, if there are angry protesters in the same area an employee is travelling, it is important to be able to notify that person to keep them out of harm’s way. Employer duty of care This leaves companies with a tough task – do you know where your people are at all times? How can employers fulfil their Duty of Care and ensure employees are safe in times of crisis, no matter where they are located? This is easier said than done. According to Ernst & Young’s latest Global Mobility Effectiveness Survey, only 30 percent of companies have a system in place for tracking business travellers. In addition, contractors, visitors and vendors are difficult to reach and account for when travelling in and around your facilities. But, with the help of timely location data collected from building access control systems, wifi access points, travel management systems and more, safety-conscious organisations can automatically keep employee locations current – even when employees are traveling or moving between buildings and campuses. In such instances, organisations can improve security preparedness and employee safety by harnessing location-based technologies that help them ensure they can send the right message at the right time. The increasing regularity of critical events worldwide necessitates the need to locate and alert employees of any nearby risks at a moment’s notice. Dynamic location tracking and alerting has huge potential for safeguarding the well-being of mobile workers. Many organisations have started to integrate critical communication solutions with physical security systems to rapidly identify, communicate with and account for employees during these disruptive events. Everything from modest access control systems to sophisticated biometric systems can track specific employee movements When implementing location-aware alerting systems, it’s important for organisations to keep the following best practices in mind: Aggregate location data across multiple systems The beauty of today’s digital world is that everything is connected and many of the devices and technologies we use on a daily basis transmit data instantaneously – meaning employee locations (or, at the very least, last known locations) can be automatically acquired. Everything from modest access control and badging systems to more sophisticated biometric systems that require fingerprint and facial recognition track specific employee movements between corporate buildings. Wi-Fi access points act similarly, providing location information linked to laptops, apps and other devices your employees connect to throughout your facilities. By tapping into these systems, companies can maintain a database of where their employees are and use that data for triggering automated incident communication for rostering, mustering and site evacuation purposes at the moment emergencies occur. Merge travel risk management with location alerting But what about when someone is working remotely or travelling? Corporate travel management tools, and travel security services companies like International SOS, provide specific travel details and itineraries for individual employees – so you know where they’re traveling to, how they’re getting there (airplane, bus, train), as well as where they’ll be staying once they get there. Data doesn’t exist in a silo, so a good location alerting system will aggregate and store data from as many sources as possible. This enables organisations to locate and communicate with staff during global events and emergencies and help determine if they are safe or need assistance – no matter where they are. Again, this helps you meet your Duty of Care to keep your team safe at all times. Ensure employee and building databases are accurate Location-based notification systems, from badging systems to Wi-Fi access points, need quality data that is up-to-date and accurate in order to effectively reach an organisation’s employee base. Traditional methods of importing data, including importing spreadsheets and call lists, just won’t cut it. While these sources important contact path information like landline numbers and addresses, they clearly lack the many other contact paths that employees will be most likely to notice right away while travelling, such as cellphones and email. Collecting correct and relevant contact data, such as personal or BYOD phones, can ensure that messages are received and responded to by relevant employees. The best communications systems are those that are multimodal and allow for two-way communications between the organisation and its employees Automate communication and collaboration Once location data is gathered and stored, it must be connected to an incident communications solution that can instantaneously distribute targeted alerts in the case of an emergency. The best communications systems are those that are multimodal and allow for two-way communications between the organization and its employees. When a location-based emergency occurs, the systems that can send messages to a targeted geographic region – whether that is a specific building, floor, neighborhood or zip code – instead of the entire employee directory, will be the most effective in ensuring the right messages are sent to the right people. Additionally, if recipients can acknowledge that a message was received, it allows organisations to identify who is safe – and who may still be in harm’s way and needs help. Every minute counts Let’s say a fire breaks out in a corporate building on the fifth floor and an emergency alert is sent out to all employees in the building. You know that three employees used their security badges to swipe in to that floor earlier that afternoon, but only one responded to your emergency alert. Because you have enabled two-way communications and expect responses from employees that are safe and unharmed, you now know that there is a very real possibility that the other two employees are incapacitated and could be in immediate danger. Building upon this idea, systems that enable employees to initiate communications are much more impactful in protecting their safety in location-based emergencies. If an employee finds him or herself in an active shooter situation, for example, panic button app capabilities are extremely valuable. Panic buttons have the capability of sending a message to an organisation’s security team – automatically transmitting the employee’s location, as well as any shared audio and video with just the push of a button. During critical events, man-made incidents or natural disasters, the ability to identify and reach employees with reliable, automated communications that harness geo-intelligent tools can not only protect your business assets, but can be the difference between life and death for your staff. Because every minute counts, you can’t afford to waste time searching spreadsheets, directories and schedules to notify your employees. Automated communications that utilise available location data enable organisations to connect with employees more effectively, helping to ensure their safety during critical events worldwide.
Security vigilance can be sporadic at many companies and institutions. Facilities tend to tighten security in the days after a scary event happens or makes headlines, and people are generally tolerant of the associated inconvenience – for a time. But as memory fades, so too does tolerance for being inconvenienced. We want to be safe, but we also don’t want to be bothered. We want a security system that both provides safety and is unobtrusive. Security doesn’t have to be inconvenient. That’s a core message of FST Biometrics, which leverages multiple technologies to identify people in motion, ensuring non-invasive, seamless security in a variety of environments. “In Motion Identification” FST Biometrics’ system analyses body size, gait, movement and direction as an individual approaches an entry point, and then uses facial recognition to confirm that person as someone authorised to enter a facility The approach, says FST Biometrics, is to combine facial recognition biometrics with analysis of body behaviour and characteristics. Their system analyses body size, gait, movement and direction as an individual approaches an entry point, and then uses facial recognition to confirm that person as someone authorised to enter a facility. It all happens without the individual realising it or thinking about it – in effect, tightened security is invisible and non-intrusive to the environment being protected. FST Biometrics calls it “In Motion Identification” (IMID). The benefits are obvious in a global environment where security increasingly is needed everywhere. “It’s very accurate identification that translates into security without a high visibility of security,” says Arie Melamed, CMO of FST Biometrics. “If you have security that isn’t invasive, and without changing the status quo of life, people feel safer and they will be safer.” Accuracy With a false accept rate around 3 in 10,000, the system is sufficient for all but the most secure facilities, says Melamed. If additional security is needed, the system can also implement a voice recognition element, or other multi-factor identification such as cards or smart phone credentials can be added (with resulting false accept rates around 1 in 1 million). FST Biometrics’ software includes visitor management and access control suites, too. It can also be integrated with access control platforms such as Lenel, Tyco’s C-Cure, Honeywell and others. Analysing body recognition factors FST Biometrics analyses body recognition factors as an individual approaches an entry point to narrow the field of possible identities, from which a face is confirmed at the entry point. Narrowing the possible matches from 10,000 to 500 or fewer, the system both simplifies the task of recognising the face and eliminates a majority of possible false accepts, thus improving the accuracy of the total system. Body characteristics are analysed at distances ranging 12 to 18 feet from the entry point, and the final facial recognition takes place 2 or 3 feet from the entry. The system can be used with doors, speed gates or turnstiles, or even in an open environment where a security guard is notified if a person isn’t recognised. The company claims throughput at turnstiles of 30 people per minute. “It’s very accurate identification that translates into security without a high visibility of security. If you have security that isn’t invasive, and without changing the status quo of life, people feel safer and they will be safer”, says Arie Melamed, CMO of FST Biometrics The software system works with standard hardware, including a 5 megapixel IP camera installed at the entry point, and a server. Only the facial image is enrolled in the system. Over time, the system then “learns” information about body behaviour and characteristics -- and applies the data to simplifying identification and increasing accuracy. About FST Biometrics FST Biometrics was founded in 2007 by the former head of Israel’s military intelligence. The company installed the first systems in customer facilities in 2012, and has been receiving feedback since then. In 2014, they began to focus on the enterprise market, including “open campuses” that want security but without the “feel” of security. Clients include corporate, retail, financial services, telecommunications, residential and governmental sectors. Melamed says a new $15 million investment in FST Biometrics by GMF Capital is an endorsement of the company’s approach and a statement of trust. “We know how hard they look for uniqueness [in companies they invest in],” he says. “They are looking for companies that are changing the world.” Former Israeli Prime Minister Ehud Barak will represent GMF Capital on the FST Biometrics Board of Directors. FST Biometrics has also introduced a system that uses an Android-based mobile device (such as a smart phone with a camera) to enable a security guard to recognise people without being tied to a specific location, even in an environment such as a parking garage. After the identity is confirmed, the mobile system advises whether the person can enter and may also list who is authorised to be a passenger in their car (to identify possible car-jacking scenarios).
Visiting with the youngest "old company" in the security market: One of the newest companies at this year’s ISC West show is 130 years old. Allegion launched in December 2013 as a standalone, publicly-traded company following the spinoff of the commercial and residential security businesses from Ingersoll Rand. Making its high-profile debut at ISC West in Las Vegas, Allegion sponsored the kick-off ceremony and featured a big booth full of familiar brands like Schlage and Von Duprin. I caught up with Dave Petratis, chairman, president and CEO of Allegion, for a quick interview at the company’s booth. Some in the security market may remember Petratis as chief operating officer and CEO of Schneider Electric North America from 2002 to 2008. He comes to Allegion from Quanex, a Houston-based manufacturer of engineered materials and components for building products. SourceSecurity.com: So what’s the Allegion story at the ISC West show? Petratis: We’re a brand new company with 130-year-old roots. We sponsored the ISC kick-off this morning, so that certainly got some attention. I’m really amazed by the level of foot traffic at the show. We’re a new company, deep roots. We launched Dec. 2, 2013 and we have been extremely well received by our employees, our channel partners and the financial community. We are already involved in acquisitions and joint ventures. That’s what was lacking under Ingersoll Rand. There wasn’t a lot of aggressiveness to build through mergers and acquisitions. We have the ability to do that. We have the ability to invest, the feet on the street, spec writers, new products. That’s really the message here. We’re a company that you touch every day through Schlage, Von Duprin, LCN. We’re independent and moving very quickly. SourceSecurity.com: What is your brand strategy related to the new name? Petratis: We’re a house of brands. Allegion will be the umbrella, but as we acquire, we will plug those brands into the umbrella and continue to run with our master brands, which are Schage, Von Duprin, LCN, CISA and Interflex. When you have that installed base around the world, it’s pretty powerful. We wouldn’t want to distance ourselves from that at all. As we bolt on and buy new companies, they’ll be part of Allegion. SourceSecurity.com: Have there been any residual effects from the Ingersoll Rand era? Petratis: The transformation and launch of the company have been extremely smooth. But I wouldn’t underestimate the amount of work involved. Anytime you create a brand and go out and raise $1.8 billion in capital to buy the company, IPO the company, there’s a tremendous amount of work. That work is behind us. The most exciting thing that I feel going forward after joining the company is: I have the capability to go out and touch the industry and touch our customers and think about the future. SourceSecurity.com: What will be your news a year from now? Petratis: Growth, investment, open protocols. We think having capabilities in an open environment is good for customers. Customers want to have choices and don’t want to get locked into proprietary systems. As an independent company, we have all the ability to drive that.
“These are children. There is no reason to scan a kid. Just because the government can do this is no reason the government should be doing this.” The impassioned argument, quoted by The Florida Current, comes from a Florida state legislator who introduced a bill aimed at stopping public school systems from collecting biometric data on children. The ominous-sounding practice actually has a practical side – use of a fingerprint or palm scan can enable a school system to get thousands of students through a lunch line in a short period of time. The schools have found a quick fingerprint scan is faster, and more secure, than use of an identity card or PIN number. The system has been used in 83 schools for several years in one district and reflects an investment of $300,000, according to the newspaper. The system could also be used to identify parents, employees and volunteers, which could help to prevent strangers from sneaking into a school function. It may fall to those in the security market who understand the technology to provide the needed information to defuse concerns The proposed bill, which is “pending reference review,” would provide for parental notification of data collected on students by schools. (It also would require the school to phase out Social Security numbers, replaced by a unique ID number developed by the state Department of Education.) I'm not sure exactly what the problem is with “scanning a kid,” as long as there are no adverse health effects, a concern I am sure has been addressed (and in any case was not an argument presented in Florida against the technology). I don't have a problem with parental notification; it's the underlying attitude toward technology implied in the bill that I find troubling. As I understand it, the intent of biometric systems is to confirm an identity. A student enrols in the system with a fingerprint or palm print scan, and the system stores only data points from that scan, which are compared with data points when the individual uses the system again. The system doesn't actually store a complete fingerprint, and there is no massive centralized database of children's fingerprints that could be stolen or otherwise compromised. If I'm wrong, someone correct me – please. Too often, negative responses to technology are based on misunderstanding. Emotions can get in the way of information. It may fall to those in the security market who understand the technology to provide the needed information to defuse concerns. UPDATE: Florida’s Senate Bill 188, which imposes a blanket prohibition on the use of biometric identification technology within the Florida public school system, was signed into law by Gov. Rick Scott on May 12, 2014. This despite a letter from the Security Industry Association opposing the bill. SIA’s letter read in part: “While SIA understands the legislature’s concern for protecting the privacy of Florida students, we are troubled that widespread misperceptions about the nature and use of biometrics technology has enabled passage of the bill without a thorough debate examining the student safety and local economic implications — and despite any reported cases of identity theft or misuse of information collected by such systems.”
The Tata Institute of Social Sciences (TISS) was established in 1936, as the Sir Dorabji Tata Graduate School of Social Work in Mumbai. It is the first graduate school of social work in India. It has subsequently influenced the direction of social work, education and social research in India. Later in 1944, it was renamed as the Tata Institute of Social Sciences. Managing time-attendance Tata Institute of Social Sciences wanted to manage time-attendance of more than 2,000 students and 300 employees at their Mumbai location. Initially, they were using traditional methods for attendance marking. As a result, they were facing many problems in maintaining records for the same. Hence, they required an efficient system for maintaining and recording accurate attendance data of students and staff. They needed biometric hardware solution with battery backup along with software compatibility. They wanted a solution that would mark in punch and out punch of students in every lecture and an automated system that would send data to the server. Additionally, TISS also wanted a solution, which can be integrated with third party payroll system for timely salary payment of their staff. Fingerprint plus RFID card based terminals Matrix has installed 54 fingerprint plus RFID Card based terminals with battery backup at the Mumbai campusAfter having a detailed discussion with the TISS team, Matrix offered a comprehensive Time-Attendance solution for students and staff members. Matrix has installed 54 fingerprint plus RFID Card based terminals with battery backup (COSEC VEGA BBU) at the Mumbai campus. All these devices are connected via LAN with the COSEC CENTRA server installed at TISS, Mumbai. HR/Admin can track attendance of all the employees and generate different reports for timely salary payment. Similarly, all the faculty members can generate monthly and semester-wise attendance reports of the students. Results after the installation Efficient Time-Attendance Management Fraudulent Time Keeping Eliminated Accurate Time-Attendance Data of Students SMS Notification to Parents Timely and Accurate Salary of Employees Increased Productivity Customised Reports as per Requirement Products installed at TISS COSEC VEGA FAX - Optical Fingerprint and Card based Time-Attendance Terminal COSEC VEGA BBU - Battery Backup for VEGA Series Door Controller COSEC LE CENTRA – Application Server for 1000 Users COSEC LE TAM - Time-Attendance and Leave Management Module
A supplier of global technology services, Bosch chose to partner with Gallagher and KW Corporation to help streamline its North American security operations. Operational efficiency Bosch required a comprehensive yet flexible security solution that could be tailored to solve their specific requirements and challenges. Presently 22 Bosch locations are on the Gallagher platform with a cardholder database of approximately 6,000. A key area of focus for Bosch was improving operational efficiency. Command Centre, Gallagher’s powerful access control solution, offered Bosch a range of reporting functions to help streamline operations. Manager of Bosch’s corporate Security, Frederick Fung, says “The user friendliness of Command Centre and the ability to automate reporting means our operations now run more smoothly. Administration time has been reduced, creating significant cost savings.” Having the ability to pick up the phone and call technical support is critical to securing our sites" Centralised system Bosch selected Gallagher as the solution that could best meet its needs, including a centralised system to secure multiple sites. “Having the ability to pick up the phone and call technical support is critical to securing our sites,” explains Fung. “Many of our security staff have multiple responsibilities, so the Gallagher and KW Corporation services are invaluable.” Gallagher also offers customers the same training courses that it conducts for certified channel partners, providing staff with the capability to be first responders and giving them the confidence to handle certain security issues themselves. Command Centre Like many businesses, theft of physical and intellectual property is a big concern. With the support of Gallagher and KW Corporation, Command Centre manages access control, Bosch surveillance, and intrusion systems. Selecting Gallagher provided Bosch with: Video management system integration (BVMS), for safety precautions and oversight CCTV integration, image and video event audit trail Peace of mind through the use of the latest continually evolving software technologies and cyber security counter measures, eliminating the fear of hacking and site down-time Integrated intrusion detection system allowing full situational awareness Flexible and scalable solutions Fung explains, “The key differentiator for Gallagher is the company’s unmatched support, system user-friendliness, and cost savings in both short and long-term.” Gallagher solutions are flexible and scalable, creating the potential for future growth across Bosch locations. “Integration with Gallagher Command Centre has had a positive impact across our sites, improving safety, security, and operational efficiencies,” says Fung. “Gallagher supports us in providing a safe and secure working environment, improving the quality of life for our associates and visitors.”
IndiaNivesh is one of the leading financial services conglomerate in India. IndiaNivesh is into various aspects of investment banking and consulting business. It plans to emerge as a dynamic, customer-centric, and progressive financial group in the country with PAN India presence. Having its head office in Mumbai, IndiaNivesh is growing with eight regional offices and 29 branch offices across India. Project specifics Application: Time-Attendance and Access Control Locations: 32 (PAN India) Users: 500 Units Installed: 60 Readers: Fingerprint and RFID Card IndiaNivesh being widely involved in financial services business with 29 branch offices and 8 regional offices across India, required eradication of forged attendance data and manual attendance process, as security is a crucial aspect for them. To streamline and manage attendance data of all employees accurately and perform calculation of error-free salary has been a tedious task. It has been challenging to integrate their existing payroll software with the time-attendance software. COSEC time-attendance solution Matrix offered COSEC time-attendance solution helped in connecting all its regional and branch offices to their head office in Mumbai Matrix offered COSEC time-attendance solution which has web-based architecture and helped in connecting all its regional and branch offices to their head office in Mumbai. Implemented automatic salary calculation as Matrix COSEC time-attendance software got easily integrated with existing payroll software. Result Real-time attendance of all employees at a centralised location Integration with its existing payroll software Ease of Implementation using the existing infrastructure Fraudulent timekeeping is completely eliminated Accurate In/Out time of each employee recorded Live monitoring of In/Out timing Generation of time-attendance and access control reports and charts for all branches Improved overall productivity of the organisation Continuous operations with excellent service support Biometric access control solutions COSEC DOOR FOP - Optical fingerprint-based door controller for access control and time-attendance COSEC DOOR CAS – Card-based door controller for access control and time-attendance COSEC PANEL - Site controller to manage multiple door controllers and advanced access control Features COSEC LE PLATFORM - Application server platform for 1000 users and expandable up to one million users COSEC LE TAM - Comprehensive time-attendance and leave management module for COSEC LE platform COSEC LE ACM - Comprehensive access control module for COSEC LE platform
Prama Hikvision partnered with the Sanjivani Group of Institutes to offer latest surveillance and security solutions. For the first time that Artificial Intelligence was offered, and enabled face recognition terminals in India’s education sector. Sanjivani Group of Institutes situated at Kopargaon, Ahmednagar is a premier institute for Engineering, Pharmacy, Nursing and Diploma in Ahmednagar District. Sanjivani took its names and inspiration from the famous epic of Ramayana where ‘Sanjivani buty’ was brought for revival of life. The Sanjivani Rural Education Society (SRES), was established by Honorable Shri. Shankarrao Genuji Kolhe in 1983, at Kopargaon, rural domain in Ahmednagar district of Maharashtra, India. Identify unauthorised person The entire campus of the Sanjivani Group of Institutes is spread out in more than 100 acres land As the educational scenario changed with time, SRES understood the need and added a number of courses under the umbrella of the Sanjivani Rural Education Society (SRES) and consequently it gave birth of the Sanjivani College of Pharmaceutical Education and Research, Sanjivani Senior and Junior College, Sanjivani Academy, a CBSE school and Sanjivani International school. The entire campus of the Sanjivani Group of Institutes is spread out in more than 100 acres land. There are different departments in various buildings, playgrounds, hostels and staff quarters. Due to vast area and huge numbers of students, it’s very difficult for management to identify unauthorised person inside the campus. In the past, many instances of bullying, robbery, theft, ragging and pick-pocketing were reported. Up-to-date surveillance solution With the expansion of the Sanjivani Group, there were many challenges faced by students and staff in terms of safety and security. “Consequently, we took our first step towards it by installing Hikvision IP CCTV surveillance in all our campus areas for monitoring. The clarity and the quality of the camera is appreciable and satisfying,” said Amit N Kolhe, Managing Trustee, Sanjivani Rural Education Society (SRES). He further added, “Presently the security technology has changed a lot. While understanding the need of safety and security of the students, we decided to go for an up-to-date surveillance solution. We contacted Prama Hikvision team and their system integration partner Om Agency for an advanced solution. After understanding our requirements, they introduced some of the latest technologies related to security surveillance.” Facial recognition devices The same software can be used by seamless integration for time attendance, access control and surveillance" He further elaborated, “After this we finalised the key areas by conducting the security survey in the campus. We got many advanced solutions implemented with help of SI partner and Prama Hikvision team. The solutions included, ANPR cameras for number plate recognition of cars and bikes at entry and exit gates, facial recognition devices for time attendance and access control of students & staff members.” “The advantage of Hikvision security and surveillance products is that things can be monitored through a single software platform, i.e. IVMS 5200E, which comes as all in one software. The same software can be used by seamless integration for time attendance, access control and surveillance,” concluded Amit N. Kolhe. Access control systems By visiting Sanjivani Group of Institutes along with System Integration Partner Om agency, the following solutions based on the latest technology and products were adopted: Automatic Number Plate Recognition (ANPR) cameras Tripod turnstile integrated with face recognition panels HD IP cameras A broadcasting solution for the seminar rooms Face recognition based access control systems Hikvision solutions delivered results: ANPR Cameras helped the institute to identify unauthorised vehicles at entry gates, through which they stopped many outsiders in getting entry into campus area. Face recognition panels and access control panels helped institute in getting entry and exit record of students as well as visitors. Through the large number of cameras installed at various locations, the management is able to keep an eye on the entire campus. One-stop solution We are proud to execute this project with support of Prama Hikvision" “Implementing IP Surveillance project for Sanjivani Group of Institutes, Kopargaon was a great learning experience. We have built a strong relationship with Prama Hikvision over the past 10 years. They work with vendor partners to deliver solutions that suit the requirements. The efficient professionals and quality of service is appreciated.” said Mr. Hemant Rokade – Director Sales, OM Agency. “We are proud to execute this project with support of Prama Hikvision. It was a huge challenge to execute the project of such gigantic proportions. While implementing the project, Prama Hikvision helped us through the project at every step. We appreciate the level of details and accountability, which Prama Hikvision has demonstrated in this project. This reaffirms our faith that Hikvision is the one stop solution for all security and surveillance solutions,” said Mr. Pravin Rokade – Director Operations, OM Agency.
Iris ID, a global provider of iris recognition technology, has partnered with Africa’s leading manufacturing conglomerate, Dangote Group, to provide a time and attendance solution for more than 30,000 employees working at Dangote Cement manufacturing plants in five countries. The Dangote Group is a Nigerian multinational industrial conglomerate, founded by Aliko Dangote. It is the largest conglomerate in West Africa and one of the largest on the African continent. The group employs about 35,000 people, generating revenue in excess of US$4.1 billion in 2017. Contactless facial recognition system Prasanna Burri, group chief Information officer, Dangote, Group, said the company wanted a biometric solution that provided greater accuracy than a facial recognition system previously used at the company’s cement manufacturing plants in Nigeria, Ethiopia, Senegal, Sierra Leone and Congo. The new system also had to be contactless to reduce the chances of spreading colds, flu and other diseases. The Iris ID readers provide us with a secure time and attendance solution" “Iris-based technology is not only contactless and more accurate but also faster than our previous system,” he said. “The Iris ID readers provide us with a secure time and attendance solution, deployed in Dangote Group’s public cloud that integrates seamlessly with the enterprise resource planning system at our Nigerian headquarters.” Early success Burri said the system’s early success has Dangote considering expanding it to more of its African operations. Mohammed Murad, vice president global sales and business development, Iris ID, said the iris-based solution was ideal for use in the Dangote cement manufacturing operations. “Our contactless readers work well in a dusty environment and are unaffected by employees wearing safety glasses and other protective gear,” he said. “Dangote is the largest indigenous industrial conglomerate in sub-Saharan Africa, helping to drive the continent’s growth. We’re happy to play a part.” Time and attendance system Initial installation of the time and attendance system was completed by Maxut Consulting Ltd. Of Lagos, Nigeria. Iris ID technology is used in several African nations providing identity authentication for national ID, voter registration and other public and private programs.
Serving a large geographical area of the North Island of New Zealand, the Waikato District Health Board (Waikato DHB) provides hospital and community-based health services to a population of nearly 400,000 people. With a wide range of security needs that include protecting staff and patients, securing high-risk facilities, restricting unauthorised access to medication and medical equipment, and streamlining contractor and car park management, Waikato DHB required a security solution that could be applied to both high and low security areas. The system al so needed to provide a comprehensive audit trail and detailed reporting, to identify access movements by employees and help meet legal requirements around the safe and secure storage of medication and equipment. Gallagher single access card control system Gallagher’s access control solution for Waikato DHB utilises a single access-card system that simply and instantly updates access permissions Gallagher’s access control solution for Waikato DHB utilises a single access-card system that simply and instantly updates access permissions, as well as streamlining car parking services. Where high-level security is needed, Gallagher’s system offers Waikato DHB the ability to lock-down areas of the hospital when required, isolating areas and restricting access. Gallagher’s Command Centre Mobile application also delivers duress notifications from buttons located around the hospital directly to a guard's mobile device. Electronic Tag Boards allow contractors to easily sign on and off of the site, ensuring Waikato DHB meets health and safety requirements. In an environment where access profiles change on a daily basis as staff move between different departments, Gallagher’s access control system and Command Centre central management platform ensure staff can approach doors with the confidence that they can enter or leave areas as necessary. The access card system has also reduced the risks associated with handling keys, along with providing detailed reports to meet comprehensive auditing requirements, saving time and cost. 'Security Ward Standard' Waikato DHB's experience with Gallagher products ultimately led them to develop a 'Security Ward Standard' detailing the minimum-security equipment required for new buildings, greatly reducing time spent producing specification documents and gathering approvals. As Waikato DHB's security requirements continue to evolve, Gallagher’s systems provide future-proofing with a software maintenance agreement ensuring they operate the very latest software available. Fast facts about the project Industry: Healthcare Business type: Hospital Number of employees: 6,500 Site Size: 18 hectares with 176,000 sq.metres of buildings Number of doors: Over 730 access-controlled doors; 40 alarmed and monitored refrigerators/freezers; 15 carpark barrier arms; 1 gate. Gallagher solutions and technology utilised: Command Centre Controller 6000 T-Series readers Tag Boards Car park Management
Round table discussion
The concept of how security systems can contribute to the broader business goals of a company is not new. It seems we have been talking about benefits of security systems beyond “just” security for more than a decade. Given the expanding role of technologies in the market, including video and access control, at what point is the term “security” too restrictive to accurately describe what our industry does? We asked the Expert Panel Roundtable for their responses to this premise: Is the description “security technology” too narrow given the broader application possibilities of today’s systems? Why?
Big data is a buzzword, and data – presumably of all sizes – is a driving force in the physical security market. As systems become more sophisticated and expand their capabilities, the result is more data; in some cases, a lot more data. But a key question is: What do we do with the data? How do we use it to provide value? How do we interpret it, and transform it into useful information and/or intelligence? We presented the topic of data to our Expert Panel Roundtable and came away with a range of thoughts on its changing – and expanding – role in the physical security market (and beyond). We asked this week’s Expert Panel Roundtable: How is a greater emphasis on data changing the physical security market?
A clear image is the desired end-result of video systems – or is it? In a growing number of applications, it’s not the image itself, but rather what information can be gained from the image, that is most important. We asked this week’s Expert Panel Roundtable to comment on some of the ways information from video is valuable to end users. Specifically, we asked: In what applications does information derived from video images provide more value than the images themselves?