Biometric time and attendance
Suprema, globally renowned provider of security and biometrics, has announced that 2020 marks the company’s 20th anniversary. Suprema was founded in 2000 and the company has built a worldwide sales network in over 140 countries and number of users with Suprema technologies surpassed one billion. Access control systems major Suprema’s extensive range of portfolio includes access control systems, time & attendance solutions, mobile access solutions and fingerprint live scanners....
UNION COMMUNITY Co. Ltd., a globally renowned biometrics technology company listed on KOSDAQ, has announced that the contactless biometric products such as the face and iris recognition have increased its export rates since the COVID-19 spreading rapidly around the world. More specifically, UNION COMMUNITY said both inquiries and sales of face and iris recognition products had been rapidly increased significantly in the export area of the Middle East since February. Contactless security system...
Hikvision, a globally renowned provider of innovative security products and solutions, announced its new access control and time attendance offerings, the MinMoe Face Recognition Terminals, promising a new era of face recognition access control is coming. To meet a multitude of real-world scenarios and customer needs, the MinMoe Face Recognition Terminals lineup features four total series: Value Series, Pro Series, Ultra Series, and Face Recognition Modules for Turnstile. With powerful function...
HID Global, a worldwide provider of trusted identity solutions, announced the launch of HID® Signo, its signature line of readers that creates a new industry benchmark for the most adaptable, interoperable and secure approach to access control. The new readers dramatically simplify system deployment and management, meet the advanced security requirements of today’s dynamic environments and set organisations up for smarter, more connected access control. Access control systems “...
Namib Property Patrols Ltd, the Oxfordshire-based security and protection company, is using employee scheduling and mobile workforce management software SmartTask to streamline operational processes, saving both time and money. The company is using the software for proof of attendance and guard monitoring across its mobile patrol and alarm response operations, which has helped reduce in administration by more than 15-hours a month, while enhancing service delivery to customers. Credible and tra...
Matrix, global manufacturer and pioneer in Telecom and Security solutions, is participating at INDIA ELECTRONICS EXPO & INDIASOFT, Hyderabad, India, from 3rd to 4th March 2020. They will be exhibiting their state-of-the-art video surveillance solutions, people mobility management and telecom solutions at the event. 5MP IP Cameras Matrix will be showcasing their latest 5MP IP Cameras as well at the event. Matrix’s next-gen range of IP Cameras deliver exceptional quality images, and th...
So often, one’s focus in security and access control zeroes in on the hardware. Its latest functionality or compatibility with emerging technologies grabs the headlines. Yet it is the access control software which knits a system together — and the signs are, this is finally getting the attention it deserves in security procurement. Supported integrations “Today, access control software is more accessible to a wider variety of actors,” writes Bryan Montany, a research analyst at IHS Technology, “providing end-users with broader and more comprehensive data relating to patterns in building occupancy.” “Software has also supported integrations with other security systems, enabling security managers to respond in real time to emerging incidents and potential security breaches.” Software solutions In other words, one can escape the limiting functionality of outmoded access management with a new generation of software solutions. They can fix everyday access irritants and below are seven. Freedom from the access management terminal Multi-seat management should be a given. One’s intuitive, customised dashboard could have a personalised login screen configuration for every administrator. Software should offer flexible management options, including secure system administration from anywhere and multi-timezone capability options. An access management “terminal” should be tied to the person — not the other way around. Maximum flexibility, whatever the legacy system Access control software puts in the hard yards when it bends the existing system or setup to new needs. It can integrate across several databases, making workflows easier and less error prone. One may even wish to manage any existing mechanical locks from the same interface as the electronic or electromechanical locks. The right access control software handles that for the person. Tailored access for every site user and visitor Streamlining access rights management for staff, contractors and visitors can boost business efficiency. The access control software should filter access to specific locks according to the precise security needs of the site and users. For any system, one should be able to create individual schedules for key-holders, doors or audit trails. In a few clicks one can require users to revalidate keys regularly, making it safer to issue a contractor with time-limited access. Smarter, more effective building management Smart buildings need intelligent software. Is it known who uses which doors at the site, and when? Is one planning an office expansion and weighing up appropriate security for each type of room use? A properly configured software control panel should accurately track user movement around the site. It feeds back the data needed to make better business decisions. Saving security budgets with a Software as a Service (SaaS) option Ideally, one would want to spend the security budget on actually securing people and assets. In the real world, IT costs and contingency budgeting eat up much of it. When one runs access management software with a reliable SaaS provider, security infrastructure budgeting becomes more predictable. The data enjoys complete redundancy and is therefore more secure. And the company’s software is always, automatically up to date — critical for cyber security resilience. Mobile solutions for the modern mobile workforce Are mobile workers and contractors returning to base — or the nearest credential updater — to redefine or revalidate their access rights? Access control software can (and should) be mobile. So, instead of updaters, workers update credentials on the go, wherever they are, via an app and its encrypted Bluetooth connection. All business process software in one place Multiple systems create double or triple the work. Duplicating data entry increases the chance of errors. With access control powered by the CLIQ Web Manager, for example, one can integrate powerful access management features with the existing business process software. One hub for everything. Thanks to the CLIQ Web Manager’s open architecture, one can build a single interface to control all “live” workflows. Manage HR, support ticketing, financial reporting and more, alongside daily access control tasks like validating and revalidating credentials, cancelling lost keys and ordering automated audit trails for locks or users.
Vanderbilt is pleased to announce a new partnership with Dutch-based company, Logitime International. Logitime provides a complete and integrated solution for access control, time and attendance, and shop floor data collection. The Vanderbilt partnership centers around the integration of Vanderbilt’s VR40 OSDP Readers with Logitime’s Time and Attendance (T&A), Access Control, and Shop Floor Data Collection software solution. Logitime’s T&A software Logitime solutions' primary function is to deliver a fully customisable and interactive access control product to their customers. As such, Vanderbilt’s VR40 Readers, which are supported by OSDP, fit perfectly into this customer-first model. Using Logitime as a solution, the company in question was able to customise their access control Logitime’s T&A software is designed to be a fully integrated program. This enables Logitime to provide a tailored solution for each unique customer. An applied example of this is how Logitime’s software solved a business’ office car park problems. The car park was located near a commercial shopping center. Often employees would use the car park on their time off to go shopping. This led to employees who were scheduled to work, not being able to find parking due to the limited places available in the parking lot. Vanderbilt’s VR40 Readers Using Logitime as a solution, the company in question was able to customise their access control. Access to the parking lot was granted using the T&A work schedules instead of fixed access profiles. An incidental change of shift, an irregular shift pattern, or planned absences like holidays had a direct effect on the access control rights. Vanderbilt’s VR40 Readers fit into this mix by complementing Logitime’s goal of being interactive and customisable. This is because the VR40 Readers come with a display screen that allows Logitime to integrate and customise the messaging being displayed to their intended audiences on a customer-by-customer basis. Suitable for highly technological environments Speaking on the integration, Alexandre Prinsen, Senior Consultant at Logitime, explains: “At Logitime, our interactive technology is a crucial component for us. Therefore, being able to work with Vanderbilt’s VR40 OSDP Readers and customise our messaging in their display screens is, of course, an excellent match for us. Using the VR40 Readers, Logitime’s software can deny access to un-credentialed users “With our software solutions, we’re always thinking about solutions, and we want to be focused on being a customer-first company. You can calculate anything in our software and the VR40 Readers are a great gateway to communicate these customizable messages to the end user within one-tenth of a second. “The Vanderbilt VR Readers are very suitable for highly technological environments that need or want the feedback within their access control systems. We can even use them as T&A readers,” Prinsen concludes. High-risk security zone For example, take a high-risk security zone. If using the VR40 Readers, Logitime’s software can deny access to un-credentialed users and explain to them the reason why through the VR40 display screen with messages such as, “High-security zone – safety training needs renewal,” or “Credential needs to be validated - not allowed into high-risk area.” This is just one example of the endless applications possible. Multiple access control functionalities require interactive feedback such as: “Maximum pin code attempts,” “Anti-pass back,” “Security guards random search required,” “Maximum amount of people allowed in the area,” “Remote access granted,” etc.VR40 readers have three indicator LEDs and a multi-tone buzzer for audio verification" OLED display to simplify installation Commenting on the partnership from Vanderbilt was Nick Pegtol, Country Manager for Benelux at the company. “As well as being attractive and robust, Vanderbilt's VR40 OSDP Readers introduce dynamic features and an OLED display to simplify installation and in-service functionality. “Our VR40 readers have three indicator LEDs and a multi-tone buzzer for audio verification. A multi-colour light frame enforces access status information. This can be configured to follow the indicator LEDs or any number of different options. Display brilliance is set automatically by an inbuilt light sensor. “Aesthetics aside, one of the key features of our VR40 Readers is the inclusion of the highly secure OSDP (Open Supervised Device Protocol) to help combat people hacking communications. OSDP ensures that sniffing devices cannot be installed behind the reader or along the communications path, which we also believe strongly aligns with Logitime’s goal of producing customer-orientated solutions,” Pegtol summarises.
Matrix Comsec has announced that it will be attending the International Security, Safety and Fire Exhibition in Spain - Sicur. The exhibition will commence from 25th of February 2020 and last for 3 days up till February 28, 2020, and is organised by the IFEMA held at Feria de Madrid in Madrid, Spain. Matrix is all set to participate in the event to evince the ability of its products and solutions. Designed to meet the complete security requirements of any organisation, the products are of par excellence. Matrix Comsec stays at the forefront by designing and manufacturing solutions that are equipped with the latest technology. Matrix will be presenting some of its comprehensive range of Time-Attendance and Access-Solutions at Sicur 2020. COSEC range of Access Control Solutions Matrix Access Control Solutions offer comprehensive three-dimensional Access Control policy Matrix Access Control Solutions offer comprehensive three-dimensional Access Control policy that aims at having the right people, in the right place at the right point of time. Furthermore, it offers 25+ enterprise-grade access control features meeting all industry-specific access control and compliance needs, including instant SMS and email notifications and a plethora of industry-standard reports. Matrix COSEC range of Access Control Solutions is specifically designed for modern organisations offering robust security, flexibility, simplicity, scalability and ease of use. In addition to this, the Matrix COSEC range for modern Access Control solution is equipped with 25+ advanced access control features. Matrix Palm Vein Recognition and Time-Attendance Solution Matrix will do a live demonstration of two of its unique and innovative solutions: Matrix Palm Vein Recognition is a state-of-the-art biometric that uses the infrared light to map the unique vein structure of the palm, capturing over millions of data points. Eventually, offering the highest point of security which makes it arguably the most advanced biometric on the market. Matrix Time-Attendance Solution is a one-stop solution for managing and controlling the attendance data. It is designed to meet the diverse requirements of any organisation by offering a superlative range of flexibility in attendance policies, configuration, integration and report generation. Additionally, it offers features like automatic calculation of overtime and much more.
Matrix COSEC Time-Attendance Solution promotes a smart and productive workplace. It is a one-stop solution for managing and controlling the attendance data. Time-attendance solution The Time-Attendance Solution is designed to meet the diverse requirements of any organisation by offering a superlative range of flexibility in attendance policies, configuration, integration and report generation. Additionally, it offers features like automatic calculation of overtime and much more! Key Features of the Matrix COSEC Time-Attendance Solution include: Multiple Credentials - Mobile, Biometric, RFID Cards Real-time Monitoring Comprehensive Reports Real-time Alerts and Notifications Seamless Integration with Payroll, ERP or HRM Software Security and Telecom solutions expert Established in 1991, Matrix is a globally renowned company in the field of Security and Telecom solutions for modern businesses and enterprises. As an innovative, technology driven and customer focused organisation, the company is committed to keep pace with the revolutions in the Security and Telecom industries. With around 40% of its human resources dedicated to the development of new products, Matrix has launched cutting-edge products like Video Surveillance Systems - Video Management System, Network Video Recorder and IP Camera, Access Control and Time-Attendance Systems as well as Telecom Solutions such as Unified Communications, IP-PBX, Universal Gateways, VoIP and GSM Gateways and Communication Endpoints.
ASSA ABLOY has acquired Biosite Systems, a globally renowned solutions provider of biometric access control to the UK construction industry. "I am very pleased to welcome Biosite and their employees into the ASSA ABLOY Group. Biosite is a strategic technological addition to the ASSA ABLOY Group. The company will reinforce our current offering within solutions for access control and will provide complementary growth opportunities,” says Nico Delvaux, President and CEO of ASSA ABLOY. Biometric access management solutions expert “Biosite offers biometric access- and workforce management solutions to the construction sector; maximising security and safety whilst providing full visibility to material-, design plans- and people flow on the construction site. Combining hardware, software and services the company is a very good fit with ASSA ABLOY Global Solutions,” says Christophe Sut, Executive Vice President and Head of Global Technologies business unit Global Solutions, ASSA ABLOY. Biosite was founded in 2010, has some 140 employees and the main office is located in Solihull, United Kingdom. Sales in 2019 amounted to about GBP 14 million (approx. SEK 175 million) and the acquisition will be dilutive to EPS from start.
Matrix has announced its presence in the prestigious trade fair for Security, Safety & Fire Protection - Secura 2020. Organised in North Africa, SECURA is the first international fire, safety & security expo organised in Algeria. With an ambitious regional visibility plan, the expo will be held in Safex - Foire d'Alger, Mohammadia from 11th to 13th February 2020. Matrix aims at exhibiting their indigenous and innovative range of solutions for IP Video Surveillance, Access Control, Time-Attendance and Unified Communications. IP Video Surveillance The solutions are specifically designed for large, multi-located enterprises, SME and SMB organisations. Matrix Comsec continuously works towards keeping abreast with the constantly upgrading technology by designing and manufacturing solutions that are equipped with the latest technology. Matrix will be presenting some of its comprehensive range of Telecom and Security solutions at Secura 2020. Matrix 5 MP IP Cameras - Higher Resolution for Better Surveillance Available in Dome and Bullet variants, Matrix 5MP IP Cameras are best suited for Enterprises With the continued demand for IP Video Surveillance in Small and Medium-scale Enterprises, new solutions that produce better image quality in the most challenging conditions are needed. To meet the growing needs of SMBs, Matrix offers 5MP IP Cameras along with the range of 2MP and 3MP IP Cameras. Owing to the high 5MP resolution, these cameras provide sharper and brighter images with even more details. Exceptional low light performance Equipped with Sony STARVIS series sensors, our 5 MP IP Camera delivers a true, 104-degree Horizontal field-of-view (FOV) and exceptional low light performance in light as low as 0.01 lux. Available in Dome and Bullet variants, Matrix 5MP IP Cameras are best suited for Enterprises and are ideal for both indoor and outdoor applications. Key Features: Better Quality Images - with 5 MP Resolution Larger Field-of-View (FOV) – 104 degrees HFOV Exceptional low light performance in light as low as 0.01 lux IP67 and IK10 Protection Latest H.265 Compression technology True WDR – to deliver consistent images in varying light conditions Next-gen door controller Matrix will do a live demonstration of two of its unique and innovative solutions: COSEC ARGO – Solution experts will discuss at length its differentiating features and how they make the device the next-gen door controller when it comes to Access Control. Products and Solutions: Matrix NETRA series of 5MP, 3MP, and 2MP IP Cameras – Offer superior image quality along with True WDR, Intelligent Video Analytics and Edge Recording. Matrix PARAM series of NVR – Network Video Recorders offer High-Resolution Recording, Live View of Multiple Streams, Centralised Monitoring without a server, Powerful Investigator and Instant Notifications. Deep learning technology Weighbridge Integration - Collects pictorial evidence of inward or outward vehicles by mapping unique numbers such as License Plates, Challan Numbers or Token Numbers for further verification and auditing. Parking Management - Addresses the need for automated functioning of small, medium or large parking areas. Matrix Face Recognition – It is based on innovative and deep learning technology with a powerful user identification algorithm that identifies users accurately within no time. Visitor Management Solution Matrix Visitor Management Solution - It is designed to assist organisations in streamlining the day-to-day guest visits without compromising the security, hospitality or productivity of the organisation. Matrix PRASAR UCS - It proves to be a complete solution for inter-branch office collaboration and communications. Dispersed branches can be tied together over the IP network, with PRASAR UCS located at the Head Office. Matrix ANANT UCS – This is a powerful Unified Communication solution that provides enterprises with integrated mobility and unified messaging. It helps to improve collaboration (video calling, chat, presence sharing, voicemail to email, conference, etc.) among all their employees, irrespective of its size and geographic location.
Iris recognition measures the unique patterns in the coloured portion of the eye (the iris) and compares that ‘signature’ to the one on file Since the late 1990s, iris recognition technology has been used in banks and airports as a means of identity authentication. Today, its use is widespread in government facilities, schools/research centres, correctional/judicial facilities, healthcare and others. There are a number of reasons for its rising popularity, but first, a brief overview of the technology is in order. Iris recognition measures the unique patterns in the coloured portion of the eye (the iris) and compares that ‘signature’ to the one on file in the system to verify and authenticate identity. The iris pattern has the most desirable properties for verification compared to other biometrics because of its uniqueness, stability over time and relatively easy accessibility. It also has the highest accuracy among all biometrics. Today’s iris recognition systems have been designed for ease of use and to lessen any perceived concern about the technology 1. Ease of use Today’s iris recognition systems have been designed for ease of use and to lessen any perceived concern about the technology. In fact, it’s as simple as taking a selfie. In the enrolment process a camera captures a detailed image of the iris and the system’s biometric software makes a template or 'map' of the person's iris pattern for storage in the system. To verify identity later, an individual simply looks at the iris reader from a comfortable distance, and the system compares the patterns in the individual's iris against the templates stored in the database. If there's a match, the individual’s identity is verified. 2. Cost Whether used in security or business applications, iris readers are proving cost effective – particularly from a lifecycle perspective. There are no cards to be replaced when worn out or lost; no RFID blocking sleeves are necessary to prevent hacking; and operations can be streamlined through reduced time and labour. Some systems allow scanning of up to 30 people per minute from a distance of several feet. And because no contact with the camera is required, either for enrolment or authentication, wear and tear on the cameras and contamination issues are greatly reduced. In a real sense, card-based systems are using the card as confirmation of the identity of the person carrying the card 3. Vulnerability It has been said that using lower-accuracy access systems such as cards/readers for facility access is the equivalent of locking a car door – easily compromised. Stolen cards can be duplicated or the information contained in the card can be used to hack into other areas of a facility. These vulnerabilities can lead to a less secure environment and put the safety of employees, visitors and assets at risk. Iris readers can overcome many of these concerns and help ensure a higher level of security. There are no cards to be lost, loaned or duplicated, and iris information cannot be falsified. An iris cannot be shared or stolen, and iris readers cannot be fooled by makeup, hair or clothing changes. 4. Identity authentication In common access control systems, access is authorised either by the reader/controller or by the reader/server based on presentation of a pre-programmed access card by the individual. Neither decision is dependent upon any type of identity recognition. Without physical identity verification, the reader does not have the ability to confirm that the user is in fact the individual assigned to that card. Even two-factor authentication (i.e. access card plus PIN or password) can be defeated with readily available skimmers In a real sense, card-based systems are using the card as confirmation of the identity of the person carrying the card. However, because cards can be stolen, loaned, lost or duplicated, that link is both tenuous and vulnerable. Even two-factor authentication (i.e. access card plus PIN or password) can be defeated with readily available skimmers. Iris recognition access control systems on the other hand require authenticated identification before allowing access. The individual is uniquely and permanently linked to their iris. Some readers even work in outdoor environments as well as through eyeglasses, sunglasses, and contact lenses. 5. Multiple uses As an identity management solution, iris readers have been deployed in mainstream security locations in addition to environments as diverse as federal, state and local law enforcement, correctional facilities, travel and border security, healthcare and financial services as well as sports and entertainment venues. Outside security applications, organisations that are investigating ways to update and improve business procedures are considering the efficiency and productivity gains with the use of biometrics. Examples include protecting against insurance fraud, maintaining time and attendance records, and even ensuring a patient gets the right medication in a hospital. And, because of the non-contact interface – the user simply looks into the iris reader – the technology is often selected for applications where the user is gloved, such as in pharmaceutical manufacturing or in a construction site or port, or in environments where users wear protective clothing. A benefit of iris recognition systems is the capability for integration with other security systems to improve access control security 6. Integration Another benefit of iris recognition systems is the capability for integration with other security systems to improve access control security and provide greater operational efficiencies. For example, available today are IOM Android® tablets that fuse access control readers, biometrics, keypads, intercoms, cameras and more. These iris biometric-embedded tablets combine the accuracy and convenience of iris recognition with the functionality and customisation of a mobile computing platform for increased security levels. The high functioning tablets can also be integrated with building management functions and time and attendance systems for even greater efficiencies. The high functioning tablets can also be integrated with building management functions and time and attendance systems for even greater efficiencies 7. Throughput Efficiency in system usage is critical for high volume throughput in applications such as airports/border crossings. It’s also critical in maintaining efficient throughput in facility access or at large public venues where lengthy delays could lead to user dissatisfaction and ultimately security vulnerabilities. To overcome these obstacles, new systems on the market offer high speed, making it possible for users to simply walk through a checkpoint without the need to stop and look into a reader. Iris recognition’s accuracy rates also contribute to ease of throughput. It’s extremely low FAR (False Acceptance Rates) and FRR (False Rejection Rates) are superior to those of other biometric modalities, making it better positioned for widespread usage. Iris recognition has proven to be a game changer in both physical and logical security. Its strong authentication capability also has potential for the home security market in devices such as biometric locks, Bluetooth devices and even cloud-based security. As costs come down, innovations will abound and the seven things you now know will help you navigate the future of biometric security.
It’s become a hot topic lately, but what are the real prospects for the smart home and home automation market? More specifically, what role can the security industry play in what is seen as a growth area? Earlier this year, IFSEC International in London saw the launch of a new home automation zone featuring a replica smart home, showcasing a range of interconnected devices such as intruder alarms, CCTV, biometric readers, door entry solutions and locks, as well as wireless control of blinds, lighting and heating, and 4K video and audio distribution. But despite the market entry of some big names such as Google’s Nest, Apple’s HomeKit, and telecommunications giants AT&T and Deutsche Telekom, are we really on the threshold of a home automation revolution? Not quite, according to market intelligence firm Ovum. It says growth is still limited to certain niche segments – mainly the higher end of the market and early adopters of technology. Michael Philpott, Senior Practice Leader, Consumer Services at Ovum says one of the main drivers is basic product lifecycles – if you are having a new boiler and thermostat fitted, why not get the latest ‘smart’ version? “What the market has failed to do is convince the mass-market that smart technology provides enough benefit to stimulate a purchase outside of the normal cycle.” Security and privacy There are other reasons for the measured growth in home automation. Key inhibitors to rapid growth include technology fragmentation, a lack of adequate security, products too complicated to use or install, a lack of consumer trust and concerns over reliability. “Many of the products on the market today have inadequate security and provide easy targets for hackers, not just to gain access to those devices, but the connected home in general,” says Philpott. “Privacy of data is the next [concern]. To maximise the potential of the smart home, consumers will be asked to share an increasing amount of data and personal information. Keeping control of who can access that data, however, will be essential in order to retain consumer trust.” In spite of these hurdles, Ovum sees the smart home market growing quite strongly, with worldwide revenues rising from $19 billion in 2016 to $76 billion by 2020. Breaking down that 2016 figure, connected home support accounts for around $3.6 billion, home automation is just $162 million, home security/monitoring is at $2.7 billion, and smart energy at $1.2 billion. Products like Google Nest and Sonos are making everyone aware of the benefits of smart technology and whole-house solutions So why are telecommunications companies such as AT&T and Deutsche Telekom active in the market, or at least preparing to be? “Telcos are looking for new revenue streams beyond broadband access,” says Philpott. “Operators believe that over time the smart home market will be significant and believe [that] as the owners of the networks, as well as having existing customer relations with millions of consumers, they are well positioned to play a part in the smart home.” Security industry role In terms of a service which can attract recurring revenue, the security industry can play a pivotal role in the smart home market. “Recurring revenues from home automation services are harder to develop outside of home security, where customers are already used to paying a monthly fee for a security monitoring service,” says Philpott. “There are other potential and interesting business models being explored, however, that could become significant over time. These include things like new home insurance models, appliance-as-a-service and household goods replenishment.” Does this mean the home automation market is about to take off? “One of the big mistakes many make is that they assume – based on some of the hype and big market investments – that the smart home market is set to explode,” he says. “This is not the case – growth is going to be slow and steady. Everyone needs to be realistic about that, rather than expecting some rapid ramp up simply because some big names have entered the market.” "Operators believe that over time the smart home market will be significant and believe [that] they are well positioned to play a part in the smart home" Surprisingly for what has historically been something of a grudge purchase, in the context of home automation security is seen as a solution some consumers are willing to pay for. “There is a lot of interest around home security as it is something that a certain segment of the market is willing to pay for,” says Philpott. “Everyone wants to feel safe in their homes, but that doesn’t mean everyone feels the need to invest in an electronic alarm or monitoring system. The trick therefore is to expand outside the traditional home alarm market. Other products can be monetised, but the industry needs to be more innovative in developing the business model. For example, very few people will pay $100 for a flood sensor, but they may consider installing one if it meant they somehow reduced their home insurance premiums.” High end sees growth But what’s the view from the sharp end of the market? Installation company Cyberhomes works predominantly in the high-end residential market in the UK and has seen steady growth over the last few years. As one of the firm’s directors, Andy Mack, says: “There is an increased expectation that properties of £4m value or greater will have a centralised control system for lighting, heating, AV and security. Once these systems are integrated it allows a wide range of automation options to be programmed, such as turning on lights when an intruder alarm is triggered.” Mack says an increased awareness among project designers and specifiers is a key driver. “At the high-end, architects and interior designers are more aware of the need to integrate home technology and the importance of having it professionally installed; whereas at the entry level, products like Google Nest and Sonos are making everyone aware of the benefits of smart technology and whole-house solutions.” But who is likely to benefit from the spoils of the smart home – companies like Cyberhomes or security integrators? “Many home automation specialists, Cyberhomes included, will work closely with security integrators in order to provide a seamless solution for the home owner. Security companies like Co-ordinated, who we partner with on many projects, are aware of what can be achieved by integrating intruder alarms and fire detection into a home control system; but they leave the specialist programming to us.” The lack of customer knowledge hinders the uptake of smart home technology, but that is improving Market threats The lack of customer knowledge hinders the uptake of smart home technology, but that is improving as more people understand what integrated smart home technology is capable of. As for the other threats to its adoption, Mack says: “A home automation company should be involved with the network infrastructure of a property and will ‘lock down’ as many security risks as possible. A well-designed and well-installed smart home should be extremely reliable. We are often called in to try and solve problems with an existing smart home system installed by someone else, and it is usually a poor installation that is causing many of the unreliability issues, rather than the equipment itself.” Is a fragmented market with differing technology and standards putting off potential customers? “Not in the high-end sector, as it is the responsibility of the home automation company to specify only products that they know will work correctly with the control system being installed – this can incorporate a surprisingly wide range of third-party equipment from a large number of manufacturers." “For entry level customers, there are a number of competing standards around and this can cause confusion and also limit the useful lifetime of any chosen solution. Companies like Apple are trying to simplify this with technologies like HomeKit, but that is taking a while to get any traction in the market.” Save
Workplace mobility is on the rise, which means organisations have an increasing number of employees who travel or work from home. In fact, there were 96.2 million mobile workers in 2015 and IDC predicts that mobile workers will account for nearly three quarters (72.3 percent) of the total U.S. workforce by 2020. While the growth of mobile workers is a boon to productivity both inside and outside the workplace, it also creates unique communication challenges – especially in emergency situations. One of the major worries for an organisation is the safety of its employees, whether they’re on-site, at a different office location, on-the-road, in the field or in the air. When disaster strikes, organisations need to quickly communicate with their employees in case of a location-based event (active shooter, fire, explosion, natural disaster or terrorist attack) to help protect their safety and direct them to take specific actions. For example, if there are angry protesters in the same area an employee is travelling, it is important to be able to notify that person to keep them out of harm’s way. Employer duty of care This leaves companies with a tough task – do you know where your people are at all times? How can employers fulfil their Duty of Care and ensure employees are safe in times of crisis, no matter where they are located? This is easier said than done. According to Ernst & Young’s latest Global Mobility Effectiveness Survey, only 30 percent of companies have a system in place for tracking business travellers. In addition, contractors, visitors and vendors are difficult to reach and account for when travelling in and around your facilities. But, with the help of timely location data collected from building access control systems, wifi access points, travel management systems and more, safety-conscious organisations can automatically keep employee locations current – even when employees are traveling or moving between buildings and campuses. In such instances, organisations can improve security preparedness and employee safety by harnessing location-based technologies that help them ensure they can send the right message at the right time. The increasing regularity of critical events worldwide necessitates the need to locate and alert employees of any nearby risks at a moment’s notice. Dynamic location tracking and alerting has huge potential for safeguarding the well-being of mobile workers. Many organisations have started to integrate critical communication solutions with physical security systems to rapidly identify, communicate with and account for employees during these disruptive events. Everything from modest access control systems to sophisticated biometric systems can track specific employee movements When implementing location-aware alerting systems, it’s important for organisations to keep the following best practices in mind: Aggregate location data across multiple systems The beauty of today’s digital world is that everything is connected and many of the devices and technologies we use on a daily basis transmit data instantaneously – meaning employee locations (or, at the very least, last known locations) can be automatically acquired. Everything from modest access control and badging systems to more sophisticated biometric systems that require fingerprint and facial recognition track specific employee movements between corporate buildings. Wi-Fi access points act similarly, providing location information linked to laptops, apps and other devices your employees connect to throughout your facilities. By tapping into these systems, companies can maintain a database of where their employees are and use that data for triggering automated incident communication for rostering, mustering and site evacuation purposes at the moment emergencies occur. Merge travel risk management with location alerting But what about when someone is working remotely or travelling? Corporate travel management tools, and travel security services companies like International SOS, provide specific travel details and itineraries for individual employees – so you know where they’re traveling to, how they’re getting there (airplane, bus, train), as well as where they’ll be staying once they get there. Data doesn’t exist in a silo, so a good location alerting system will aggregate and store data from as many sources as possible. This enables organisations to locate and communicate with staff during global events and emergencies and help determine if they are safe or need assistance – no matter where they are. Again, this helps you meet your Duty of Care to keep your team safe at all times. Ensure employee and building databases are accurate Location-based notification systems, from badging systems to Wi-Fi access points, need quality data that is up-to-date and accurate in order to effectively reach an organisation’s employee base. Traditional methods of importing data, including importing spreadsheets and call lists, just won’t cut it. While these sources important contact path information like landline numbers and addresses, they clearly lack the many other contact paths that employees will be most likely to notice right away while travelling, such as cellphones and email. Collecting correct and relevant contact data, such as personal or BYOD phones, can ensure that messages are received and responded to by relevant employees. The best communications systems are those that are multimodal and allow for two-way communications between the organisation and its employees Automate communication and collaboration Once location data is gathered and stored, it must be connected to an incident communications solution that can instantaneously distribute targeted alerts in the case of an emergency. The best communications systems are those that are multimodal and allow for two-way communications between the organization and its employees. When a location-based emergency occurs, the systems that can send messages to a targeted geographic region – whether that is a specific building, floor, neighborhood or zip code – instead of the entire employee directory, will be the most effective in ensuring the right messages are sent to the right people. Additionally, if recipients can acknowledge that a message was received, it allows organisations to identify who is safe – and who may still be in harm’s way and needs help. Every minute counts Let’s say a fire breaks out in a corporate building on the fifth floor and an emergency alert is sent out to all employees in the building. You know that three employees used their security badges to swipe in to that floor earlier that afternoon, but only one responded to your emergency alert. Because you have enabled two-way communications and expect responses from employees that are safe and unharmed, you now know that there is a very real possibility that the other two employees are incapacitated and could be in immediate danger. Building upon this idea, systems that enable employees to initiate communications are much more impactful in protecting their safety in location-based emergencies. If an employee finds him or herself in an active shooter situation, for example, panic button app capabilities are extremely valuable. Panic buttons have the capability of sending a message to an organisation’s security team – automatically transmitting the employee’s location, as well as any shared audio and video with just the push of a button. During critical events, man-made incidents or natural disasters, the ability to identify and reach employees with reliable, automated communications that harness geo-intelligent tools can not only protect your business assets, but can be the difference between life and death for your staff. Because every minute counts, you can’t afford to waste time searching spreadsheets, directories and schedules to notify your employees. Automated communications that utilise available location data enable organisations to connect with employees more effectively, helping to ensure their safety during critical events worldwide.
Krowd is an app that connects people together based on geography; that is, if they are at the same place at the same time. Users sign into the app using the local WiFi, identify themselves by username, and are placed immediately in a group chat comprising anyone else at the location who has signed into the app. An enhancement of the Krowd app, known as Krowdsafe, leverages the technology to achieve and promote security and safety. Specifically, Krowdsafe enables users to interact directly with security personnel at a public place to report any crimes or security infractions and to enable rapid response. Think of it as “crowdsourcing” security – the app provides more eyes and ears to keep a venue safer. In effect, it enables each of its users to be an extension of the security presence at a venue or event. Krowdsafe improves crowd resilience. “Crowdsourcing” security – the app provides more eyes and ears to keep a venue safer Krowdsafe security app Krowdsafe also opens a channel of communication for the security team to provide ad-hoc security information reminders or messages. Krowdsafe can be used at a variety of venues, including stadiums, transport hubs, office blocks, retail malls, college campus and major events organisers. The app does not access identities, violate privacy, or track the movements of users. Other app users only know the information fellow users disclose. Still, group chats, one-on-one engagement, and other social media interactions can ensue, whether about a favourite football team or the excitement of a rock concert. The system fosters digital engagement that centers around a physical space. Krowdsafe applies those capabilities to promoting better security. Enhancing crowd safety and management The elements of Krowdsafe beat out 67 competitors to win the Defence & Security Accelerator Competition to Innovate Crowd Safety, launched by the UK Home office after terror events in 2017. Key areas of interest in the competition were to improve the detection of threats from explosives and weapons within a range of crowded places with high footfall and so reduce the chance of future attacks. Krowdsafe provides a prioritised, readily accessible and simple way for members of a crowd to communicate with a security team charged with keeping them safe. The £250,000 government award has helped the product move forward commercially at a faster pace. Krowdsafe app does not access identities, violate privacy, or track the movements of users Krowdsafe users can tap a red button, prominent on the Krowd app, that says “Report.” They may then choose from a listing of common threat types – from suspicious activity or unattended activity to medical emergency or fire services. The list is configurable by venue and corresponds to any specific threat models. The list corresponds to the nature of any situation security wants to address, such as “anti-social behavior” at a football club. Users in the crowd can anonymously report racist chanting, for example. In a children’s sporting event, the app can be used to facilitate lost-and-found children. If a child gets lost, a user can share a photo with the security team, who can alert the “public” (other Krowdsafe users) and find the child within minutes or seconds. Encrypted identifier code A user taps the “Report” button, selects an issue, and an alert goes directly to the security team A user taps the “Report” button, selects an issue, and an alert goes directly to the security team, who can respond because they have the encrypted identifier code from which the message came. For that point, the security team communicates one-on-one with the user, who can then choose to share their current location with the security team to facilitate response. (The “legitimate interest” of knowing the location negates any privacy concerns.) Once location is enabled, the security team can follow the precise positioning of threats on a map, using GPS and other technologies, or even on a three-dimensional digital map of a multi-story building. Another security benefit of Krowdsafe is prevention. Event organisers and venue managers can promote the use of Krowdsafe on posters or in announcements throughout the venue. Additional eyes and ears are the equivalent of CCTV coverage on every inch of a venue and use of the system makes the environment more hostile to mischievous, malicious and/or terrorist activity. In effect, bad guys will go somewhere else. Enhancement to Krowd app Krowdsafe is an enhancement to the Krowd app, which has been around for a couple of years and is available in app stores for iOS and Android. The app approximates in the digital world the experience of being a stranger in the crowd in the real world. Users can join a conversation based on their username, and then disclose to the crowd whatever they wish (or not). Event managers/organisers can promote hashtags to help identify others in the crowd (such as #ManUnited to identify fans of the same football team). In general, users can identify themselves (voluntarily) according to common interests using hashtags. “Krowd is a group chat that connects people together at the same place at the same time in a group, but without anyone having to disclose personal information,” says Geoff Revill, Managing Director, Krowdthink Ltd. “You have a digital presence in the same place with other people at the same time.” Wireless connectivity Users connect initially into the system through WiFi, access to which serves to approximate presence at a venue Users connect initially into the system through WiFi, access to which serves to approximate presence at a venue. Once someone signs in, information about them is merely a grouping of “hash” numbers, which are used to identify them as they communicate with others in the location. However, the “hashing” cannot be hacked to find a user’s location, thus ensuring greater privacy. Because Krowd does not collect personal data (which is a revenue source for most social media companies), the company generates revenue by providing the service to venue owners who wish to interact with and manage a crowd. Data security Location data is considered sensitive under General Data Protection Regulation (GDPR), and tracking locations can help to identify where someone lives, works, who they associate with, etc. By not tracking location, Krowd avoids the related privacy issues. After initially signing in on WiFi, Krowd communications can also use 2G, 3G and other cellular networks in addition to WiFi. Addressing privacy concerns is essential to encouraging involvement in the Krowd app, and in Krowdsafe. “If you want people to participate in keeping the crowd safe, you have to get their trust and respect them, that’s a building block behind the behavioral science,” says Revill. By not tracking location, Krowd avoids the related privacy issues Privacy protection Because Krowd users remain anonymous (except for the information they choose to share), user data is not collected (and/or sold or used for future marketing purposes). Krowd’s paying customers are event venues and public places that provide the Krowd service and can promote their commercial messages or provide other information to their populations while on site. Krowdsafe can provide immediate security benefits to a venue. Even if only 25 staff members use the app in a given location, for example, that’s 25 more sets of eyes and ears to help the security department. In a retail mall, if the staffs of 200 tenant businesses use the app, that’s another 500 or so people watching out for security. Among the general public, use of the app can be promoted in customer newsletters, or by posting group discussions on big screens around a venue. Wide marketing scope It enables members of a crowd to report any broken doors, water leaks or blocked toilets Security is a secondary benefit for some Krowd users, who are drawn to the app because of marketing opportunities, such as the ability to provide discounts or promotional offers to customers while they are on site. The app also encourages social media interaction, while maintaining the venue’s ability to “manage” the crowd by moderating any discussions. The Krowd app also provides management benefits to a venue. For example, it enables members of a crowd to report any broken doors, water leaks or blocked toilets. In general, the app helps to promote a better brand experience for the customer. Incident management One of the UK government’s concerns about Krowdsafe was its possible use by terrorists or other to cause incidents in a public venue. Think of the case of Olly Murs, a U.K. singer, whose mistaken tweets about hearing gunshots caused a brief panic at a department store on a busy shopping day. Might Krowd be uses similarly by a terrorist or other evil-doer to cause chaos or a distraction? No, says Revill, who points to a higher level of control over content exchanged in Krowd versus Twitter, for example. The security team can censor content or limit its propagation. They can also disable or block a user from communicating on the app. Messages containing dangerous or troubling content, such as racist terms, can trigger alerts to enable security teams to respond quickly.
Security vigilance can be sporadic at many companies and institutions. Facilities tend to tighten security in the days after a scary event happens or makes headlines, and people are generally tolerant of the associated inconvenience – for a time. But as memory fades, so too does tolerance for being inconvenienced. We want to be safe, but we also don’t want to be bothered. We want a security system that both provides safety and is unobtrusive. Security doesn’t have to be inconvenient. That’s a core message of FST Biometrics, which leverages multiple technologies to identify people in motion, ensuring non-invasive, seamless security in a variety of environments. “In Motion Identification” FST Biometrics’ system analyses body size, gait, movement and direction as an individual approaches an entry point, and then uses facial recognition to confirm that person as someone authorised to enter a facility The approach, says FST Biometrics, is to combine facial recognition biometrics with analysis of body behaviour and characteristics. Their system analyses body size, gait, movement and direction as an individual approaches an entry point, and then uses facial recognition to confirm that person as someone authorised to enter a facility. It all happens without the individual realising it or thinking about it – in effect, tightened security is invisible and non-intrusive to the environment being protected. FST Biometrics calls it “In Motion Identification” (IMID). The benefits are obvious in a global environment where security increasingly is needed everywhere. “It’s very accurate identification that translates into security without a high visibility of security,” says Arie Melamed, CMO of FST Biometrics. “If you have security that isn’t invasive, and without changing the status quo of life, people feel safer and they will be safer.” Accuracy With a false accept rate around 3 in 10,000, the system is sufficient for all but the most secure facilities, says Melamed. If additional security is needed, the system can also implement a voice recognition element, or other multi-factor identification such as cards or smart phone credentials can be added (with resulting false accept rates around 1 in 1 million). FST Biometrics’ software includes visitor management and access control suites, too. It can also be integrated with access control platforms such as Lenel, Tyco’s C-Cure, Honeywell and others. Analysing body recognition factors FST Biometrics analyses body recognition factors as an individual approaches an entry point to narrow the field of possible identities, from which a face is confirmed at the entry point. Narrowing the possible matches from 10,000 to 500 or fewer, the system both simplifies the task of recognising the face and eliminates a majority of possible false accepts, thus improving the accuracy of the total system. Body characteristics are analysed at distances ranging 12 to 18 feet from the entry point, and the final facial recognition takes place 2 or 3 feet from the entry. The system can be used with doors, speed gates or turnstiles, or even in an open environment where a security guard is notified if a person isn’t recognised. The company claims throughput at turnstiles of 30 people per minute. “It’s very accurate identification that translates into security without a high visibility of security. If you have security that isn’t invasive, and without changing the status quo of life, people feel safer and they will be safer”, says Arie Melamed, CMO of FST Biometrics The software system works with standard hardware, including a 5 megapixel IP camera installed at the entry point, and a server. Only the facial image is enrolled in the system. Over time, the system then “learns” information about body behaviour and characteristics -- and applies the data to simplifying identification and increasing accuracy. About FST Biometrics FST Biometrics was founded in 2007 by the former head of Israel’s military intelligence. The company installed the first systems in customer facilities in 2012, and has been receiving feedback since then. In 2014, they began to focus on the enterprise market, including “open campuses” that want security but without the “feel” of security. Clients include corporate, retail, financial services, telecommunications, residential and governmental sectors. Melamed says a new $15 million investment in FST Biometrics by GMF Capital is an endorsement of the company’s approach and a statement of trust. “We know how hard they look for uniqueness [in companies they invest in],” he says. “They are looking for companies that are changing the world.” Former Israeli Prime Minister Ehud Barak will represent GMF Capital on the FST Biometrics Board of Directors. FST Biometrics has also introduced a system that uses an Android-based mobile device (such as a smart phone with a camera) to enable a security guard to recognise people without being tied to a specific location, even in an environment such as a parking garage. After the identity is confirmed, the mobile system advises whether the person can enter and may also list who is authorised to be a passenger in their car (to identify possible car-jacking scenarios).
Visiting with the youngest "old company" in the security market: One of the newest companies at this year’s ISC West show is 130 years old. Allegion launched in December 2013 as a standalone, publicly-traded company following the spinoff of the commercial and residential security businesses from Ingersoll Rand. Making its high-profile debut at ISC West in Las Vegas, Allegion sponsored the kick-off ceremony and featured a big booth full of familiar brands like Schlage and Von Duprin. I caught up with Dave Petratis, chairman, president and CEO of Allegion, for a quick interview at the company’s booth. Some in the security market may remember Petratis as chief operating officer and CEO of Schneider Electric North America from 2002 to 2008. He comes to Allegion from Quanex, a Houston-based manufacturer of engineered materials and components for building products. SourceSecurity.com: So what’s the Allegion story at the ISC West show? Petratis: We’re a brand new company with 130-year-old roots. We sponsored the ISC kick-off this morning, so that certainly got some attention. I’m really amazed by the level of foot traffic at the show. We’re a new company, deep roots. We launched Dec. 2, 2013 and we have been extremely well received by our employees, our channel partners and the financial community. We are already involved in acquisitions and joint ventures. That’s what was lacking under Ingersoll Rand. There wasn’t a lot of aggressiveness to build through mergers and acquisitions. We have the ability to do that. We have the ability to invest, the feet on the street, spec writers, new products. That’s really the message here. We’re a company that you touch every day through Schlage, Von Duprin, LCN. We’re independent and moving very quickly. SourceSecurity.com: What is your brand strategy related to the new name? Petratis: We’re a house of brands. Allegion will be the umbrella, but as we acquire, we will plug those brands into the umbrella and continue to run with our master brands, which are Schage, Von Duprin, LCN, CISA and Interflex. When you have that installed base around the world, it’s pretty powerful. We wouldn’t want to distance ourselves from that at all. As we bolt on and buy new companies, they’ll be part of Allegion. SourceSecurity.com: Have there been any residual effects from the Ingersoll Rand era? Petratis: The transformation and launch of the company have been extremely smooth. But I wouldn’t underestimate the amount of work involved. Anytime you create a brand and go out and raise $1.8 billion in capital to buy the company, IPO the company, there’s a tremendous amount of work. That work is behind us. The most exciting thing that I feel going forward after joining the company is: I have the capability to go out and touch the industry and touch our customers and think about the future. SourceSecurity.com: What will be your news a year from now? Petratis: Growth, investment, open protocols. We think having capabilities in an open environment is good for customers. Customers want to have choices and don’t want to get locked into proprietary systems. As an independent company, we have all the ability to drive that.
National Bank of Umm Al Qaiwain (the Bank) is a Public Shareholding Company incorporated in Umm Al Qaiwain by Amiri Decree Number (1) on January 5, 1982, issued by His Highness, the Ruler of Umm Al Qaiwain and commenced its operations with effect from August 1, 1982. The Local government of Umm Al Qaiwain is the largest shareholder and promoter of the bank. The bank is engaged in providing retail and corporate banking services through a network of 14 branches in U.A.E. The Bank carries out Islamic banking operations through Islamic Banking window established in 2005 across its branch network. They were searching for a fool-proof solution that would help them in managing the Time-Attendance and overtime calculation. With offices spread over 14 locations in UAE, management of attendance data was a daunting task. Centralised attendance data management All manual work for report generation was eliminated outrightly, simplifying the salary procedure Thus, centralised attendance data management and maintaining a complete record of their employees were a part of their key requirements. Moreover, their payroll processing deployed a software - RAMCO, wherein the attendance data was manually entered. After a comprehensive discussion with the customer, Matrix offered a centralised platform - COSEC CENTRA, to manage all the data centrally. Door controllers - COSEC VEGA FAX installed in all the office entrances. These door controllers are integrated with the central platform that pushes the event data to the server. Furthermore, the Matrix platform is integrated with the payroll system - RAMCO. All manual work for report generation was eliminated outrightly, simplifying the salary procedure. After implementing Matrix solutions, NBQ witnessed drastic changes while following their processes. Customised attendance policy formation Effortless attendance management of multiple locations from the Head Office was prominently one of them. The shift allocation and shift correction processes were streamlined. Their solution included some advanced features like customised attendance policy formation and real item alert on attendance related event & auto-scheduled reporting. This, in turn, ensured efficient employee database management improving productivity. Products and solutions offered: COSEC VEGA FAX A complete Time-Attendance and Access Control solution with a blend of aesthetics, size, connectivity, reliability and ease-of-use. Designed for large enterprises with multi-location organisations. COSEC CENTRA PLT A web-enabled application server that controls the entire system from anywhere in the world. It is the heart of the entire solution and acts as a bridge between applications and the devices. COSEC CENTRA TAM An enterprise-grade solution, designed for organisations the Time-Attendance and Leave Management processes like recording entries and exits, salary processing, etc.
Pulse Secure, globally renowned provider of software-defined Secure Access solutions, has announced the delivery of a successful project at Warrington Borough Council (WBC), designed to help deliver taxpayer value and workforce flexibility through Secure Network Access. Warrington Borough Council is a unitary authority in the north west of England serving approximately 200,000 citizens across 22 wards. WBC provides a full range of local government services including council tax billing, libraries, social services, the processing of planning applications, waste collection and disposal and more, that are delivered through its own staff and third-party partners supporting council operations. This approach makes remote access to relevant areas of the network increasingly important for communication and productivity. Juniper VPN technology and RSA two-factor authentication WBC’s existing Juniper VPN technology and RSA two-factor authentication were up for replacement, prompting the council to put out a tender invitation for vendors to propose new technology to deliver secure, selective access to its network for third party associates. The tender required a secure access platform that could initially support 100 licenses, with the potential to scale to meet changing demand while offering easy ongoing management. WBC objectively tested the proposed solution before selecting Pulse Secure as the best fit for its needs with DXC, a Pulse Secure Elite partner selected as the solution provider including a three-year contract with built-in software and service support. Reliable, secure VPN access DXC team transitioned the council’s network from Juniper SAs to Pulse PSAs in on-site implementation project The DXC team seamlessly transitioned the council’s network from Juniper SAs to Pulse PSAs in a two-day, on-site implementation project with minimal interruption to user services. Now, the council can provide reliable and secure VPN access for its entire direct and indirect workforce, making remote and mobile working easier. “[I was] really impressed with how DXC were able to implement our remote access solution, no impact to our customers, and no complaints either,” said David Gallear, Technical Lead (Network), Resources and Strategic Commissioning Directorate at Warrington Borough Council. Remote and mobile access The council has gained a fully secure network and can grant selective access to third party partners as needed, with simple ongoing management keeping costs low. Giving third-party associates remote and mobile access has also helped the council to promote a better work/life balance for its entire workforce. The new solution also helps WBC provide a more responsive, streamlined and efficient service to customers. With secure remote access, productivity has remained high even during bad weather or travel disruption that would previously prevent staff from coming into the office.
Navata Road Transport, a road logistics service provider, established in the year 1982, by founder Late Parvataneni Subhas Chandra Bose, now occupies a place of pride among the leading Road Transport Organisations in South India. Navata is spread across a network of 672 branches across India. Warehouses and distribution centers are an integral part of a hub and spoke operations at Navata. HR people at the Navata Road Transport had to manage and do manual work for time-attendance and overtime data. With manual work, data are prone to error. With error-prone data, it was difficult for them to proceed for salary payment. Not only this, but centralised monitoring of time-attendance data of employees of 20 locations across Andhra Pradesh was a difficult task for them. Time-attendance systems As they already had their inhouse application, communication/integration of the time-attendance devices with that inhouse application was the biggest question for them. To communicate with the Linux Server and devices, they required a third party application interface which was not feasible. Established in 1991, Matrix is a provider of Security and Telecom solutions for modern businesses and enterprises. Matrix Door Controller comes with built-in API for system integration As an innovative, technology driven and customer focused organisation, the company is committed to keeping pace with the revolutions in the Security and Telecom industries. With around 40% of its human resources dedicated to the development of new products, Matrix has launched cutting-edge products like Video Surveillance Systems - Video Management System, Network Video Recorder and IP Camera, Access Control and Time-Attendance systems as well as Telecom solutions such as Unified Communications, IP-PBX, Universal Gateways, VoIP and GSM Gateways and Communication Endpoints. Built-in API for system integration These solutions are feature-rich, reliable and conform to international standards. Having global footprints in Asia, Europe, North America, South America, and Africa through an extensive network of more than 2,500 channel partners, Matrix ensures that the products serve the needs of its customers faster and longer. Matrix has gained trust and admiration of customers representing the entire spectrum of industries. Matrix has won many international awards for its innovative products. With extensive analysis of the existing system and Navata’s requirements, Matrix came up with the solution to provide Door Controllers. Matrix Door Controller comes with built-in API for system integration. It directly pushes all the entry and exit records to the company’s Linux server. In addition to that, the customer can command and control the devices now through the inhouse Attendance Management and Payroll Application which was not possible earlier. Additional dedicated server Elimination of the errors has been possible in the data of Time-Attendance and overtime So, there is no requirement of any additional dedicated server for the interface with Matrix’s Door Controllers. Ultimately, these Door Controllers have overcome the challenge of communication with the company’s Linux server. By overcoming the challenges of the entire system, the customer enhanced the productivity of the employees and can effectively use the resources. After acquiring the solution from Matrix Comsec, Navata got the efficiency in Time-Attendance management. Elimination of the errors has been possible in the data of Time-Attendance and overtime. Now, employees get an accurate and timely salary at Navata Road Transport after the atomisation of Time-Attendance record and calculation. This increased the productivity of the employees because of the accurate data. This also made the HR work smooth and hassle free. Through live monitoring, centralised control of all the 20 sites has been taken. Reduces installation and maintenance cost Product Offered: COSEC DOOR FOT A Door Controller with higher storage capacity and touch sense keypad. It identifies the user in less than one second. With multiple connectivity options like 3G/4G/LTE it gives flexibilities with the customer’s existing system and therefore, reduces installation and maintenance cost.
Often spread over large premises, housing expensive equipment and with a high number of visitors accessing the site every day, care homes face numerous threats. Care home safety and security is a big issue, and ensuring the safety of patients, staff, visitors and assets is a top priority but also a challenge, so by installing access control systems workers are able to easily manage areas around a building. Access control systems can also carry out functions such as time and attendance, staffing level management and parking management. “Access control systems are increasingly being used to enhance safety and security in residential care homes by restricting and monitoring the movement of staff, residents and visitors without impacting on the residents’ everyday lives,” say access control specialists, Nortech. “Installing an effective access control system not only provides a flexible form of security but also one that is bespoke to each individual site.” Importance of access control systems Access control can be anything from hard copy visitor books through to identity cards for doors, gates and vehicle barriers Access control allows staff to manage, control, monitor and restrict the movement of people or vehicles in, out and around an individual site. Access control can be anything from hard copy visitor books through to identity cards for doors, gates and vehicle barriers. Access control systems can be easily installed to ensure that only authorised persons can access specific areas. In more sophisticated facilities, systems can also be used to restrict access to areas that need to be kept separate for the safety of other patients, such as isolation rooms. Access control solutions in care homes Care homes are known to be targets for criminals because they hold valuable goods such as computers and IT equipment and sensitive patient data as well as the personal possessions of staff, visitors and patients. To combat this and deter thieves, a growing number of premises are now installing access control systems to offer instant, flexible protection. One system Nortech can offer is a hands-free access control solution which is both secure and user-friendly. This Nortech system uses Nedap’s uPASS access readers which offer both convenience and security. UHF ID badges and uPASS access readers Each member of staff is issued with a long-range (UHF) electronic ID badge that they carry on a lanyard or clip. The UHF ID badges are automatically read by the uPASS readers at a distance of up to 2m allowing staff access though doors without the need to physically present their ID card to the reader. Two advantages of this hands-free system are that it allows staff to push trolleys or wheelchairs or to carry equipment easily around a care home whilst also avoiding the spread of germs or viruses through constant contact with door handles. Integrating access control system with security solutions Access control systems can work on a small scale for just one door or used as part of a wider security system The ease of integrating access control with other security measures is another reason why the system is so appealing, as access control software enables hospitals and care homes to provide even tougher protection for their sites. The systems are often effectively linked to the likes of CCTV, property marking, perimeter protection or intruder alarms. Access control systems can also work on a small scale for just one door, as well as being used as part of a wider security system. They provide users with a great deal of flexibility according to individual requirements. Enhancing security of hospitals, residential care homes By using access control as a method of security, different authorisation levels can be easily set, thereby preventing people from accessing areas they do not have clearance for. New photo ID cards can also be created instantly for new staff or if a replacement is required. Electronic access control systems are increasingly being used to enhance safety and security in hospitals and residential care homes. In these environments, staff often needs to gain access through doors while escorting patients in wheelchairs or beds or when carrying sterile equipment, etc. so hands-free access is the ideal solution. Card-based access control systems Managers, trained staff, ancillary staff, residents and visitors can all be assigned a pass card that will allow them access around the building appropriate to their status. Nortech has supplied products and solutions to the security industry for over 25 years as an independent British company. The company uses extensive experience and expertise to create new security products to fit their clients’ needs and designs everything with the customer in mind.
TCIEXPRESS, a customer-oriented, multi-technology transport system in the Indian and International markets, has announced using Matrix Time-Attendance solution for increasing productivity and streamlining salary processing. This high-tech transport system pursuit value-based policies to satisfy the aspirations of society, customers, vendors, employees, shareholders and the transport industry. Speed is the essence of all the services of TCIEXPRESS whether through land or air, anywhere in India and the world. TCIEXPRESS multi-technology transport system TCIEXPRESS is actively engaged at 500 locations across India. To manage entire attendance, diverse shifts and leave policies for the various locations and numerous workers at a central place was a very tedious task for them. Moreover, this leads to complex computation for salary based on the absent-present report. So, their requirement of timely and error-free payroll processing was arisen to improve overall productivity. Ultimately, they were facing challenges over various matters like manual paperwork, lack of productivity and discipline, remote access of all the locations for Time-Attendance and payment process. Matrix offered COSEC VYOM for people mobility management for TCIEXPRESS's 3000 employees at 500 locations COSEC VYOM cloud-based system After a comprehensive discussion regarding problems and requirements, Matrix has offered COSEC VYOM for people mobility management for their 3000 employees at 500 different locations. COSEC VYOM is a cloud-based Time-Attendance system that addresses solutions to the outlined issues of productivity and efficiency. It provides ubiquitous, cost-effective, secure and on-demand network access. Moreover, Matrix Time-Attendance solution is integrated with HR1 and HRMS software for easy salary processing and speedy HR process of TCIEXPRESS. COSEC VYOM cloud-enabled Time-Attendance system provides the following results - Quick salary processing Improves productivity Reduce paperwork Secure and on-demand network access Eliminates server cost, infrastructure cost, and maintenance cost Products Offered: COSEC DOOR FOT
There are many matters that must be taken into account when organising a casino. A top priority is the security of the entire workforce and clientele. An access control system that is reliable and easy to operate provides the basis for that. Casino Baden-Baden is open 358 days a year. In addition to various different pay scale groups and work-time models, a variety of bonuses need to be assigned. Pay may therefore be partly exempt of tax or liable to tax, with holiday bonuses and weekend pay. Recording staff work timings Intensive workshops and consultations were conducted to establish the specific requirements of the casino, so that the best possible solution could be developed. The main focus was on recording work times and transmitting that data to the casino's own specially developed shift schedule program. Given the various different work time models and wage types in numerous variants, complex manual procedures must be automated in future. IF-4735, IF-810, and IF-800 access control terminals Employees can use their passes for cashless payment in the cafeteria and at the vending machines In 1991, a solution for physical access control and time recording was implemented in the form of the IF-5020 software. Since 1998, the IF-6020 software solution has been in use. The hardware terminals IF-4735, IF-810, and IF-800 ensure smooth recording of work times and grant authorised employees access to the various separate areas. Also, the employees can use their passes for cashless payment in the cafeteria and at the vending machines. The system solution from Interflex, with its hardware and software components, now brings employees and administrators substantial time savings and a great deal of convenience. Central access control system All access permissions and work times are now recorded and controlled in one central system, eliminating the disruption of transferring from one system to another, such as to the program for pay and shift planning. This has brought considerable improvement in transparency and in the freshness of data, and paper has been completely banished from work time control.
Round table discussion
The concept of how security systems can contribute to the broader business goals of a company is not new. It seems we have been talking about benefits of security systems beyond “just” security for more than a decade. Given the expanding role of technologies in the market, including video and access control, at what point is the term “security” too restrictive to accurately describe what our industry does? We asked the Expert Panel Roundtable for their responses to this premise: Is the description “security technology” too narrow given the broader application possibilities of today’s systems? Why?
Big data is a buzzword, and data – presumably of all sizes – is a driving force in the physical security market. As systems become more sophisticated and expand their capabilities, the result is more data; in some cases, a lot more data. But a key question is: What do we do with the data? How do we use it to provide value? How do we interpret it, and transform it into useful information and/or intelligence? We presented the topic of data to our Expert Panel Roundtable and came away with a range of thoughts on its changing – and expanding – role in the physical security market (and beyond). We asked this week’s Expert Panel Roundtable: How is a greater emphasis on data changing the physical security market?
A clear image is the desired end-result of video systems – or is it? In a growing number of applications, it’s not the image itself, but rather what information can be gained from the image, that is most important. We asked this week’s Expert Panel Roundtable to comment on some of the ways information from video is valuable to end users. Specifically, we asked: In what applications does information derived from video images provide more value than the images themselves?
Reducing the cost of video surveillance system deployment and operationDownload
RFID and smartphone readers in physical access controlDownload
Access control & intelligent vehicle screeningDownload
Genetec to host its first virtual tradeshow Connect’DX 2020 to connect with physical security professionals