Biometric time and attendance
Global threat detection and security technologies company, Smiths Detection is showcasing for the first time an integrated checkpoint solution at inter airport Europe 2019, which harnesses biometric technology to enable risk-based screening practices. With air passenger growth predicted to double by 2037, the aviation industry will be challenged to support this capacity growth whilst providing operational efficiencies and meeting shifting passenger expectations of the airport experience. To cop...
Traka, the provider of intelligent management solutions for keys and equipment, is at the International Corrections & Prisons Association (ICPA)’s annual conference, presenting a new solution for distributing medications safely, securely and accurately within prison environments. Exhibiting in partnership with the pioneer in prison and community corrections software applications provider Unilink, Traka will be demonstrating its specialist medication distribution lockers, designed to m...
UNIONCOMMUNITY, will be launching the latest generation high performance multimodal biometric terminals and cloud-based access control platform at GITEX Technology Week 2019. UNIONCOMMUNITY, the original manufacturer of the VIRDI and NITGEN Biometric Technology Solutions will exhibit the New UBIO Series. UBio comprises of a range of high-performance multimodal biometric terminals. The UBio terminals support face, fingerprint, card, PIN, and mobile key authentication technology alongside our sec...
HID Global®, a pioneer in trusted identity solutions, will exhibit a host of new products, including biometrics at the door and new integrations, at HID booth #1503 during this week’s GSX 2019 in Chicago. As a sponsor member of the recently launched FiRa™ Consortium, HID Global will feature a demonstration of Ultra-Wideband (UWB) technology. The company will also showcase its award-winning HID Mobile Access® solution and Seos® credential technology. Visit the HID booth...
Johnson Controls has announced the release of CEM Systems AC2000 v10.2, which offers new features such as an enhanced Time & Attendance application, improved Pass Design, advanced room booking with access control and additional features that increase the performance and scope of the access control system suite. AC2000 v10.2 Time Hub CEM Systems’ AC2000 Time Hub is an enhanced Time & Attendance workstation client and web application CEM Systems’ AC2000 Time Hub is an...
Matrix Comsec, a manufacturer and provider of telecom and security solutions, is participating at PACC 2019, to be held at The Grand Hyatt, Dubai from 26th to 29th September 2019. Matrix will be showcasing its video surveillance and people mobility management solutions at the show. People Mobility Management Matrix access control and time-attendance domain will showcase its newly launched face recognition technology for authentication through IP cameras/tablet/mobile. The technology...
Matrix, globally renowned manufacturer of Telecom and Security solutions is to display its products at Securexpo East Africa, 2019. The event is organised on 24th - 26th September’19 in Nairobi, Kenya, East Africa. The event is an ideal platform for different industries to network with their peers and showcase latest products. Matrix access control solutions In the event, Matrix will showcase revolutionary technologies from the security domain. Matrix access control and time-attendance domain will showcase its newly launched Face Recognition technology and Palm Vein Reader technology for authentication. Both the devices offer contactless and highly secure solutions with precise and accurate authentication. Not only this, Matrix will also showcase another newly launched product - COSEC ARGO. The unique COSEC ARGO brings modern design to the access control market with an enhanced IPS LCD touchscreen The unique COSEC ARGO brings modern design to the access control market with an enhanced IPS LCD touchscreen for a visually splendid experience and the gorilla glass providing enhanced toughness. Apart from this, Matrix will also display high-end cloud-based time-attendance and access control solution. Mobile, being the next generation technology in the security domain, they will showcase mobile based access control solution whereby user can either scan QR code or with Bluetooth he just twists his/her phone for security authentication. Biometric Door Controllers User can mark attendance automatically using GPS or Wi-Fi through mobile application. Thus, Matrix being the front face in innovation, some extraordinary Biometric door controllers useful for time-attendance, access control, visitor management, cafeteria management and many more applications which allows users to generate 300+ customised reports will be exhibited. The other wing of Matrix, IP video surveillance, will showcase its video management solution SATATYA SAMAS, which addresses threats in a logical, sequential manner through its unique features like CREAM (Cognitive Responsive Engine with Automated Monitoring). CREAM automated monitoring solution CREAM automated monitoring system eliminates false alerts by conducting a multi-stage verification. Keeping in mind the need for automation in medium, large and multi-location enterprises, Matrix will demonstrate how SATATYA SAMAS can seamlessly automate the parallel working of various systems integrated in an organisation. Matrix will present the new range of IP cameras which sport SONY STARVIS series sensors with EXMOR technologyAlongside, they are also going to exhibit the recently launched new range of network video recorders that are equipped with characteristics like cascading, camera-wise recording retention, database level integration and plenty of other distinct features. In addition to this, Matrix will present the new range of IP cameras which sport SONY STARVIS series sensors with EXMOR technology. These cameras have an edge over others in terms of exceptional low light performance, consistent image in varying light conditions (True WDR), better bandwidth optimisation and many other features. IP video surveillance “At Securexpo 2019, we are looking forward to meeting system integrators and other business associates which can help us strengthen our base in the East African market. We expect to host numerous meetings and get a clear idea of the present market needs”, commented Jatin Desai, Marketing Manager. Matrix will be showcasing it’s wide range of security, access control and time-attendance solutions at Stand Number A3, Securexpo East Africa 2019, from 24th- 26th September 2019 Visa Oshwal Centre, Nairobi, Kenya. Visitors will get a first-hand experience of the feature-rich and high-tech security solutions on display.
Matrix will be participating in the Rail India Conference & Expo 2019 to be held at The Lalit in New Delhi on 29th – 30th August 2019. From Telecom domain, Matrix will be showcasing enterprise meeting solution - PARISAT meeting server at the event. The conferencing server is engineered for 10 video and 100 audio participants enabling police force to collaborate from different locations and solve critical situations at the earliest. At the event, Matrix will exhibit pure IP solution - PRASAR UCS that enables armed forces’ personnel to connect wirelessly from remote locations. Matrix Unified Communication Server – SARVAM UCS will also be highlighted at the event. Biometric attendance system Equipped to support radio ports and in-skin GSM connectivity, the solution enhances connectivity between field personnel, helping them manage emergency situations effectively in less time. Matrix will also showcase its GSM and VoIP Gateways that allows police and defence forces to make an easy switch to the modern network while retaining their existing infrastructure. Matrix will be presenting its other time-attendance and access control solutions at the event Matrix, from the portfolio of people mobility management solutions, will be presenting its Aadhaar enabled biometric attendance system at the event. This device allows secured attendance marking through dual authentication – biometric/RFID card and Aadhaar number. Matrix will also be presenting its other time-attendance and access control solutions at the event. Matrix will showcase its Aadhaar enabled biometric device. It is the only Linux based device available in Indian market with card and finger authentication. Time-attendance solutions The device comes with multiple connectivity options like Wi-Fi, PoE, Ethernet. This Aadhaar based authentication device is purposely designed for marking attendance of government employees and is the only embedded device available in Indian market currently. Matrix will be showcasing enterprise grade access control and time-attendance solutions engineered with features such as auto push events to server, automatic fingerprint distribution, instant notification, 300+ customised reports generation, scheduler services including backup and more. Furthermore, access control being the prime requirement in terms of security, Matrix will present its standalone access control solution with license free environment, whereby a single panel can handle up to 255 doors and 25,000 users. At Rail India, get a glimpse into the cutting-edge Matrix biometric solutions with multiple credentials such as face, fingerprint, palm vein, RFID card and PIN options at the Expo. Video management system Matrix will also be showcasing an enterprise-grade video management system designed, engineered and built specifically for growing multi-location organisations. The entire solution focuses on automating processes and enhancing efficiency of organisations. Matrix will also be showcasing a new range of audio compatible and compact professional series IP cameras powered by Sony STARVIS series sensors with Exmor technology. Matrix will be showcasing its new extreme series of Network Video Recorder (NVRX) at the event This gives the cameras an edge over others in terms of exceptional low light performance, consistent image quality during varying light conditions (True WDR), better bandwidth optimisation, video analytics such as intrusion detection, perimeter security, loitering detection and many other features. Furthermore, Matrix will be showcasing its new extreme series of Network Video Recorder (NVRX) at the event. Meeting system integrators These NVRs are equipped with 4K decoding capacity and characteristics like cascading (up to 20 NVRs), camera-wise recording retention, TCP notifications for remote locations and database level integration. Moreover, these latest NVRs are also backed with an intelligent software that helps detect threats and send instant notifications for real-time security. “We look forward to meeting system integrators and other business associates who can help us expand our business footprints at the event. We aim at using the event as a platform for hosting numerous meetings in the future and get a clear understanding of current market trends and needs”, commented Jatin Desai, Marketing Manager. Visit Matrix at stand number 6, at The Lalit in New Delhi on 29th to 30th August 2019 and learn how its enterprise grade solutions can assist in resolving communication and security issues.
Suprema Inc., a provider of biometrics and security solutions, announces that the company introduces the company's latest range of biometric security solutions at Security Exhibition & Conference 2019 in Sydney, Australia. At the show, Suprema will showcase FaceLite, its latest facial recognition terminal, 2nd generation fingerprint IP readers and enterprise access control solutions. Launched at ISC West in April this year, Suprema extends introduction of the FaceLite in Australia. The FaceLite provides the world's best facial recognition performance in terms of matching speed, operating illuminance and user capacity. In addition to the FaceLite Suprema will demonstrate its range of access control terminals, updated BioStar 2 security platform with visitor management solution. Time attendance applications The new FaceLite is designed for both the enterprise access control systems and time attendance applications by featuring Suprema's technologies and innovative features. Loaded with powerful 1.2GHz CPU and massive 8GB memory, FaceLite achieves incredible matching speed of up to 30,000 matches per second and accommodates up to 30,000 users while providing intuitive face-enrolment GUI for faster user registration. The industry's unique and the most advanced biometrics-based intelligent access controller On the optical side, the new face recognition technology overcomes possible interference from dynamic lighting conditions including sunlight and ambient light. The new technology allows greater range of operating illuminance from zero lux to 25,000 lux which covers almost every possible lighting conditions regardless of indoor or outdoor, day or night. In addition, the company also showcase CoreStation, the industry's unique and the most advanced biometrics-based intelligent access controller. Face recognition technology The new Suprema CoreStation is an intelligent door controller which provides advantages of biometric-enabled security over centralised access control systems. Designed for mid to enterprise-level systems, CoreStation handles up to 500,000 users with incredible fingerprint matching speed of up to 400,000 matches per second. By providing high-performance, biometric readiness and Ethernet communication, CoreStation is capable of offering comprehensive access control functionalities for up to 132 access points along with the company's BioStar 2 security platform. The device also provides centralised biometric template management and also interfaces with complete set of reader technologies including RS-485(OSDP) and Wiegand. Along with the new enterprise access control solution and face recognition technology, Suprema will also showcase the company's extensive range of latest biometrics and access control solutions at Security Exhibition and Conference 2019. To experience latest Suprema products and technologies, please visit Suprema stand(#A8).
Matrix, global manufacturer of enterprise-grade telecom and security solutions, is participating in the India Africa ICT Expo 2019, Kigali, Rwanda from 5th to 6th August 2019. India Africa ICT Expo is one of the best platforms to have business interactions and create strategic alliances. This year, Matrix will showcase its latest Telecom, IP video surveillance and people mobility management solutions. ETERNITY NENX communication At the event, Matrix will highlight ETERNITY NENX, newly launched unified communication platform for SOHO and SMB. Increasing number of Small and Medium organisations are migrating to leverage benefits of IP, for such applications, Matrix ETERNITY NENX is a perfect fit. Matrix telecom domain will also be showcasing its comprehensive telecom solutions which includes IP-PBX, communication endpoints, media gateways, mobile application and much more. Matrix Hospitality solution is specifically designed to enhance guest experience at hotels will also be one of the major highlights. Hotel staff can enhance guest experience and improve staff productivity with hospitality features Along with that, Matrix Hospitality solution which is specifically designed to enhance guest experience at hotels will also be one of the major highlights. Hotel staff can enhance guest experience and improve staff productivity with hospitality features, front desk, PMS integration, staff mobility extensions and voicemail with personalised greetings. Matrix access control In the event, Matrix will showcase futuristic technologies from the Security domain. Matrix access control and time-attendance domain will showcase its newly launched face recognition technology and palm vein reader technology for authentication. Both the devices offer contactless and highly secure technologies with precise and accurate authentication. Not only this, but they are also going to showcase another newly launched product - COSEC ARGO. The unique ARGO brings modern design to the access control market with an enhanced IPS LCD touchscreen for a visually splendid experience and the gorilla glass providing enhanced toughness. Apart from this, they will display our high-end cloud-based time-attendance and access control solution. Mobile being the next generation technology in the security domain, they will also showcase mobile-based access control solution whereby user can either scan QR code or with Bluetooth he just twists his/her phone for authentication. Biometric door controllers User can mark attendance automatically using GPS or Wi-Fi through mobile application. Thus, Matrix being the front face in innovation, we are going to show some extraordinary Biometric door controllers useful for applications in time-attendance, access control, visitor management, cafeteria management and many more which allows you to generate 300+ customised reports. Matrix enterprise-grade VMS Matrix will also be showcasing an enterprise-grade Video Management System built specifically for growing organisations Matrix will also be showcasing an enterprise-grade Video Management System designed, engineered and built specifically for growing multi-location organisations. The entire solution focuses on automating processes and enhancing efficiency of organisations. We will also be showcasing a new range of audio compatible and compact Professional Series IP cameras powered by SONY STARVIS series sensors with Exmor technology. This gives the cameras an edge over others in terms of exceptional low light performance, consistent image quality during varying light conditions (True WDR), better bandwidth optimisation, video analytics such as intrusion detection, perimeter security, loitering detection and many other features. Furthermore, we will be showcasing our Extreme series of Network Video Recorder (NVRX) at the event. This NVR is equipped with 4K decoding capacity and characteristics like cascading (up to 20 NVRs), camera-wise recording retention, TCP notifications for remote locations and database level integration. Moreover, these latest NVRs are also backed with an intelligent software that helps detect threats and send instant notifications for real-time security. ICT Expo “ICT Expo is an excellent opportunity to meet key decision makers of any organisation and strengthen business network. We are looking forward to meet clients and system integrators to explain them how our innovative solutions can help them improve their experience of telecom and security solutions,” said Jatin Desai, Marketing Manager.
Dahua Technology, globally renowned video-centric smart IoT solutions and service provider, has launched IVSS 2.0 (IVSS7000-I), an upgraded series of its NVR family powered by the latest AI capable of deep learning, which opens up new possibilities to smart security solutions. Upgraded IVSS 7000-I The upgraded IVSS 7000-I features scalable GPU design to meet the ever-growing project requirements. The unique Dahua Deep-Learning algorithm with GPU group enables IVSS7000-I to perform face recognition, perimeter protection and metadata with high accuracy. Offering advanced Artificial Intelligence features, it even enables danger prevention via faster video content inquiry, rapid discovery of targets as well as real-time and accurate alarm in a variety of applications, providing AI-based all-in-one surveillance solution for customers. Some major features of IVSS7000-I are detailed below. AI-powered facial recognition technology Dahua Technology’s AI-powered face recognition technology enjoys a high reputation in the industry Dahua Technology’s AI-powered face recognition technology enjoys a high reputation in the industry, as testified by multiple first prizes in international competitions. Equipped with Dahua face recognition technology, IVSS7000-I series records face by structured data and performs real-time crosscheck with reliable accuracy to figure out the face by features of the target. Supporting up to 256-channel face recognition by device and up to 256-channel face recognition by camera, IVSS7000-I can analyse up to 50 different face databases with 300,000 face pictures in total. Besides, the upgraded IVSS7000-I also supports search by face image which means users can upload face pictures to IVSS7000-I and compare them with recorded ones by similarity. VIP recognition and access control IVSS7000-I series can realise a lot of functions for users such as VIP recognition, blacklist alarm, stranger identification, attendance management, access control, etc. It divides faces detected into different categories defined by users, and acts accordingly, like notifying the manager that a VIP customer is coming or sending an alert when a persona non grata is identified. Users can choose Regular/Stranger mode to trigger kinds of alarm actions according to different applications. Focusing on people and vehicles, perimeter protection automatically filters out false alarms caused by animals, rustling leaves, bright lights, camera shaking and other irrelevant elements. It also enables system to act secondary recognition for the targets, thus significantly improving alarm accuracy with saved cost. In terms of perimeter protection, IVSS7000-I supports up to 256-channel with each channel allowing up to 10 IVS rules. Enhanced metadata Metadata is feature attribute information of a target object which can be used for data retrieval. Currently, there are mainly four types of metadata that are human face, human body, motor vehicle and non-motor vehicle. IVSS7000-I supports up to 64-channel video metadata, making it possible for operators to quickly and easily search through multiple channels and long duration to find out when and where a person/vehicle of interest appeared, which significantly enhances accuracy and efficiency. The IVSS7000-I employs optimised GUI which is easier for users to learn and use. With the same GUI working for local output and PC client, training cost of system operator is reduced. Comparable to VMS client, the new GUI design is more user-friendly for project-level customers. Remote access IVSS-I can meet variable needs of users, thus applicable to a wide range of scenes Apart from the above features, IVSS7000-I also allows independent PC client for remote access so that users will not be bothered by things like Web plug-ins and browser update. It's also worth mentioning that with a new security center to keep hackers away, IVSS7000-I series provides a safer network environment for users. Being multifunctional, IVSS-I can meet variable needs of users, thus applicable to a wide range of scenes, including entrances and exits of banks, business parks, schools, prisons and transportation centers like airports, railway stations that are sensitive to strangers and criminals; or the shopping malls that want to protect customers from petty thieves; or football stadiums that choose to ban those known hooligans for good. Intelligence and safety As a key back-end product to smart security system, IVSS7000-I brings intelligence, safety, and reliability to a new level. With a mission of Enabling a Safer Society and Smarter Living, Dahua Technology will continue to focus on “Innovation, Quality, and Service” to serve partners and customers around the world.
Iris ID, a global provider of iris recognition technology, announced its award-winning multimode iCAM M300 handheld biometric platform now offers gateless access control, time and attendance and employee mustering for both commercial and government markets. The new functions are possible with embedded XPressEntry software from Telaeris, a provider of real-time personnel tracking solutions. Also using Iris ID’s Iris Access EAC software, the iCAM M300 continues to provide an ideal portable biometric enrolment and identification solution for law enforcement, border control and national ID programs – all from the convenience of an Android mobile device. Users of the iCAM M300 can extend their door-mounted iris readers using a cloud-based mobile server that automatically syncs all users, access and activity data. Handheld solution for iris authentication It is exciting to partner with Iris ID to provide a powerful handheld solution for iris authentication"“The addition of the Telaeris XPressEntry software enables us to add important new functions for our commercial and government customers,” said Mohammed Murad, vice president global sales and business development, Iris ID. “The iCAM M300 is now ideal for virtually any use requiring mobile identity authentication.” "It is exciting to partner with Iris ID to provide a powerful handheld solution for iris authentication," said David Carta, chief executive officer, Telaeris. "Iris ID's multimodal device, combined with XPressEntry from Telaeris, allows security integrators and end users to easily integrate mobile iris identification technology into their existing physical access control infrastructure." FBI-compliant 500DPI fingerprint collection The iCAM M300 has embedded cameras for simultaneous capture of both iris and facial modes. An optional snap-on module provides for an FBI-compliant 500DPI, single fingerprint collection. Also included are magstripe and contactless card support, as well as an MRZ reader to verify ePassports. Communications protocols include NFC, Wi-Fi, Bluetooth, GPS, and 4G LTE. The Security Industry Association named the iCAM M300 the best mobile app in the 2018 New Product Showcase.
Iris recognition measures the unique patterns in the coloured portion of the eye (the iris) and compares that ‘signature’ to the one on file Since the late 1990s, iris recognition technology has been used in banks and airports as a means of identity authentication. Today, its use is widespread in government facilities, schools/research centres, correctional/judicial facilities, healthcare and others. There are a number of reasons for its rising popularity, but first, a brief overview of the technology is in order. Iris recognition measures the unique patterns in the coloured portion of the eye (the iris) and compares that ‘signature’ to the one on file in the system to verify and authenticate identity. The iris pattern has the most desirable properties for verification compared to other biometrics because of its uniqueness, stability over time and relatively easy accessibility. It also has the highest accuracy among all biometrics. Today’s iris recognition systems have been designed for ease of use and to lessen any perceived concern about the technology 1. Ease of use Today’s iris recognition systems have been designed for ease of use and to lessen any perceived concern about the technology. In fact, it’s as simple as taking a selfie. In the enrolment process a camera captures a detailed image of the iris and the system’s biometric software makes a template or 'map' of the person's iris pattern for storage in the system. To verify identity later, an individual simply looks at the iris reader from a comfortable distance, and the system compares the patterns in the individual's iris against the templates stored in the database. If there's a match, the individual’s identity is verified. 2. Cost Whether used in security or business applications, iris readers are proving cost effective – particularly from a lifecycle perspective. There are no cards to be replaced when worn out or lost; no RFID blocking sleeves are necessary to prevent hacking; and operations can be streamlined through reduced time and labour. Some systems allow scanning of up to 30 people per minute from a distance of several feet. And because no contact with the camera is required, either for enrolment or authentication, wear and tear on the cameras and contamination issues are greatly reduced. In a real sense, card-based systems are using the card as confirmation of the identity of the person carrying the card 3. Vulnerability It has been said that using lower-accuracy access systems such as cards/readers for facility access is the equivalent of locking a car door – easily compromised. Stolen cards can be duplicated or the information contained in the card can be used to hack into other areas of a facility. These vulnerabilities can lead to a less secure environment and put the safety of employees, visitors and assets at risk. Iris readers can overcome many of these concerns and help ensure a higher level of security. There are no cards to be lost, loaned or duplicated, and iris information cannot be falsified. An iris cannot be shared or stolen, and iris readers cannot be fooled by makeup, hair or clothing changes. 4. Identity authentication In common access control systems, access is authorised either by the reader/controller or by the reader/server based on presentation of a pre-programmed access card by the individual. Neither decision is dependent upon any type of identity recognition. Without physical identity verification, the reader does not have the ability to confirm that the user is in fact the individual assigned to that card. Even two-factor authentication (i.e. access card plus PIN or password) can be defeated with readily available skimmers In a real sense, card-based systems are using the card as confirmation of the identity of the person carrying the card. However, because cards can be stolen, loaned, lost or duplicated, that link is both tenuous and vulnerable. Even two-factor authentication (i.e. access card plus PIN or password) can be defeated with readily available skimmers. Iris recognition access control systems on the other hand require authenticated identification before allowing access. The individual is uniquely and permanently linked to their iris. Some readers even work in outdoor environments as well as through eyeglasses, sunglasses, and contact lenses. 5. Multiple uses As an identity management solution, iris readers have been deployed in mainstream security locations in addition to environments as diverse as federal, state and local law enforcement, correctional facilities, travel and border security, healthcare and financial services as well as sports and entertainment venues. Outside security applications, organisations that are investigating ways to update and improve business procedures are considering the efficiency and productivity gains with the use of biometrics. Examples include protecting against insurance fraud, maintaining time and attendance records, and even ensuring a patient gets the right medication in a hospital. And, because of the non-contact interface – the user simply looks into the iris reader – the technology is often selected for applications where the user is gloved, such as in pharmaceutical manufacturing or in a construction site or port, or in environments where users wear protective clothing. A benefit of iris recognition systems is the capability for integration with other security systems to improve access control security 6. Integration Another benefit of iris recognition systems is the capability for integration with other security systems to improve access control security and provide greater operational efficiencies. For example, available today are IOM Android® tablets that fuse access control readers, biometrics, keypads, intercoms, cameras and more. These iris biometric-embedded tablets combine the accuracy and convenience of iris recognition with the functionality and customisation of a mobile computing platform for increased security levels. The high functioning tablets can also be integrated with building management functions and time and attendance systems for even greater efficiencies. The high functioning tablets can also be integrated with building management functions and time and attendance systems for even greater efficiencies 7. Throughput Efficiency in system usage is critical for high volume throughput in applications such as airports/border crossings. It’s also critical in maintaining efficient throughput in facility access or at large public venues where lengthy delays could lead to user dissatisfaction and ultimately security vulnerabilities. To overcome these obstacles, new systems on the market offer high speed, making it possible for users to simply walk through a checkpoint without the need to stop and look into a reader. Iris recognition’s accuracy rates also contribute to ease of throughput. It’s extremely low FAR (False Acceptance Rates) and FRR (False Rejection Rates) are superior to those of other biometric modalities, making it better positioned for widespread usage. Iris recognition has proven to be a game changer in both physical and logical security. Its strong authentication capability also has potential for the home security market in devices such as biometric locks, Bluetooth devices and even cloud-based security. As costs come down, innovations will abound and the seven things you now know will help you navigate the future of biometric security.
It’s become a hot topic lately, but what are the real prospects for the smart home and home automation market? More specifically, what role can the security industry play in what is seen as a growth area? Earlier this year, IFSEC International in London saw the launch of a new home automation zone featuring a replica smart home, showcasing a range of interconnected devices such as intruder alarms, CCTV, biometric readers, door entry solutions and locks, as well as wireless control of blinds, lighting and heating, and 4K video and audio distribution. But despite the market entry of some big names such as Google’s Nest, Apple’s HomeKit, and telecommunications giants AT&T and Deutsche Telekom, are we really on the threshold of a home automation revolution? Not quite, according to market intelligence firm Ovum. It says growth is still limited to certain niche segments – mainly the higher end of the market and early adopters of technology. Michael Philpott, Senior Practice Leader, Consumer Services at Ovum says one of the main drivers is basic product lifecycles – if you are having a new boiler and thermostat fitted, why not get the latest ‘smart’ version? “What the market has failed to do is convince the mass-market that smart technology provides enough benefit to stimulate a purchase outside of the normal cycle.” Security and privacy There are other reasons for the measured growth in home automation. Key inhibitors to rapid growth include technology fragmentation, a lack of adequate security, products too complicated to use or install, a lack of consumer trust and concerns over reliability. “Many of the products on the market today have inadequate security and provide easy targets for hackers, not just to gain access to those devices, but the connected home in general,” says Philpott. “Privacy of data is the next [concern]. To maximise the potential of the smart home, consumers will be asked to share an increasing amount of data and personal information. Keeping control of who can access that data, however, will be essential in order to retain consumer trust.” In spite of these hurdles, Ovum sees the smart home market growing quite strongly, with worldwide revenues rising from $19 billion in 2016 to $76 billion by 2020. Breaking down that 2016 figure, connected home support accounts for around $3.6 billion, home automation is just $162 million, home security/monitoring is at $2.7 billion, and smart energy at $1.2 billion. Products like Google Nest and Sonos are making everyone aware of the benefits of smart technology and whole-house solutions So why are telecommunications companies such as AT&T and Deutsche Telekom active in the market, or at least preparing to be? “Telcos are looking for new revenue streams beyond broadband access,” says Philpott. “Operators believe that over time the smart home market will be significant and believe [that] as the owners of the networks, as well as having existing customer relations with millions of consumers, they are well positioned to play a part in the smart home.” Security industry role In terms of a service which can attract recurring revenue, the security industry can play a pivotal role in the smart home market. “Recurring revenues from home automation services are harder to develop outside of home security, where customers are already used to paying a monthly fee for a security monitoring service,” says Philpott. “There are other potential and interesting business models being explored, however, that could become significant over time. These include things like new home insurance models, appliance-as-a-service and household goods replenishment.” Does this mean the home automation market is about to take off? “One of the big mistakes many make is that they assume – based on some of the hype and big market investments – that the smart home market is set to explode,” he says. “This is not the case – growth is going to be slow and steady. Everyone needs to be realistic about that, rather than expecting some rapid ramp up simply because some big names have entered the market.” "Operators believe that over time the smart home market will be significant and believe [that] they are well positioned to play a part in the smart home" Surprisingly for what has historically been something of a grudge purchase, in the context of home automation security is seen as a solution some consumers are willing to pay for. “There is a lot of interest around home security as it is something that a certain segment of the market is willing to pay for,” says Philpott. “Everyone wants to feel safe in their homes, but that doesn’t mean everyone feels the need to invest in an electronic alarm or monitoring system. The trick therefore is to expand outside the traditional home alarm market. Other products can be monetised, but the industry needs to be more innovative in developing the business model. For example, very few people will pay $100 for a flood sensor, but they may consider installing one if it meant they somehow reduced their home insurance premiums.” High end sees growth But what’s the view from the sharp end of the market? Installation company Cyberhomes works predominantly in the high-end residential market in the UK and has seen steady growth over the last few years. As one of the firm’s directors, Andy Mack, says: “There is an increased expectation that properties of £4m value or greater will have a centralised control system for lighting, heating, AV and security. Once these systems are integrated it allows a wide range of automation options to be programmed, such as turning on lights when an intruder alarm is triggered.” Mack says an increased awareness among project designers and specifiers is a key driver. “At the high-end, architects and interior designers are more aware of the need to integrate home technology and the importance of having it professionally installed; whereas at the entry level, products like Google Nest and Sonos are making everyone aware of the benefits of smart technology and whole-house solutions.” But who is likely to benefit from the spoils of the smart home – companies like Cyberhomes or security integrators? “Many home automation specialists, Cyberhomes included, will work closely with security integrators in order to provide a seamless solution for the home owner. Security companies like Co-ordinated, who we partner with on many projects, are aware of what can be achieved by integrating intruder alarms and fire detection into a home control system; but they leave the specialist programming to us.” The lack of customer knowledge hinders the uptake of smart home technology, but that is improving Market threats The lack of customer knowledge hinders the uptake of smart home technology, but that is improving as more people understand what integrated smart home technology is capable of. As for the other threats to its adoption, Mack says: “A home automation company should be involved with the network infrastructure of a property and will ‘lock down’ as many security risks as possible. A well-designed and well-installed smart home should be extremely reliable. We are often called in to try and solve problems with an existing smart home system installed by someone else, and it is usually a poor installation that is causing many of the unreliability issues, rather than the equipment itself.” Is a fragmented market with differing technology and standards putting off potential customers? “Not in the high-end sector, as it is the responsibility of the home automation company to specify only products that they know will work correctly with the control system being installed – this can incorporate a surprisingly wide range of third-party equipment from a large number of manufacturers." “For entry level customers, there are a number of competing standards around and this can cause confusion and also limit the useful lifetime of any chosen solution. Companies like Apple are trying to simplify this with technologies like HomeKit, but that is taking a while to get any traction in the market.” Save
Workplace mobility is on the rise, which means organisations have an increasing number of employees who travel or work from home. In fact, there were 96.2 million mobile workers in 2015 and IDC predicts that mobile workers will account for nearly three quarters (72.3 percent) of the total U.S. workforce by 2020. While the growth of mobile workers is a boon to productivity both inside and outside the workplace, it also creates unique communication challenges – especially in emergency situations. One of the major worries for an organisation is the safety of its employees, whether they’re on-site, at a different office location, on-the-road, in the field or in the air. When disaster strikes, organisations need to quickly communicate with their employees in case of a location-based event (active shooter, fire, explosion, natural disaster or terrorist attack) to help protect their safety and direct them to take specific actions. For example, if there are angry protesters in the same area an employee is travelling, it is important to be able to notify that person to keep them out of harm’s way. Employer duty of care This leaves companies with a tough task – do you know where your people are at all times? How can employers fulfil their Duty of Care and ensure employees are safe in times of crisis, no matter where they are located? This is easier said than done. According to Ernst & Young’s latest Global Mobility Effectiveness Survey, only 30 percent of companies have a system in place for tracking business travellers. In addition, contractors, visitors and vendors are difficult to reach and account for when travelling in and around your facilities. But, with the help of timely location data collected from building access control systems, wifi access points, travel management systems and more, safety-conscious organisations can automatically keep employee locations current – even when employees are traveling or moving between buildings and campuses. In such instances, organisations can improve security preparedness and employee safety by harnessing location-based technologies that help them ensure they can send the right message at the right time. The increasing regularity of critical events worldwide necessitates the need to locate and alert employees of any nearby risks at a moment’s notice. Dynamic location tracking and alerting has huge potential for safeguarding the well-being of mobile workers. Many organisations have started to integrate critical communication solutions with physical security systems to rapidly identify, communicate with and account for employees during these disruptive events. Everything from modest access control systems to sophisticated biometric systems can track specific employee movements When implementing location-aware alerting systems, it’s important for organisations to keep the following best practices in mind: Aggregate location data across multiple systems The beauty of today’s digital world is that everything is connected and many of the devices and technologies we use on a daily basis transmit data instantaneously – meaning employee locations (or, at the very least, last known locations) can be automatically acquired. Everything from modest access control and badging systems to more sophisticated biometric systems that require fingerprint and facial recognition track specific employee movements between corporate buildings. Wi-Fi access points act similarly, providing location information linked to laptops, apps and other devices your employees connect to throughout your facilities. By tapping into these systems, companies can maintain a database of where their employees are and use that data for triggering automated incident communication for rostering, mustering and site evacuation purposes at the moment emergencies occur. Merge travel risk management with location alerting But what about when someone is working remotely or travelling? Corporate travel management tools, and travel security services companies like International SOS, provide specific travel details and itineraries for individual employees – so you know where they’re traveling to, how they’re getting there (airplane, bus, train), as well as where they’ll be staying once they get there. Data doesn’t exist in a silo, so a good location alerting system will aggregate and store data from as many sources as possible. This enables organisations to locate and communicate with staff during global events and emergencies and help determine if they are safe or need assistance – no matter where they are. Again, this helps you meet your Duty of Care to keep your team safe at all times. Ensure employee and building databases are accurate Location-based notification systems, from badging systems to Wi-Fi access points, need quality data that is up-to-date and accurate in order to effectively reach an organisation’s employee base. Traditional methods of importing data, including importing spreadsheets and call lists, just won’t cut it. While these sources important contact path information like landline numbers and addresses, they clearly lack the many other contact paths that employees will be most likely to notice right away while travelling, such as cellphones and email. Collecting correct and relevant contact data, such as personal or BYOD phones, can ensure that messages are received and responded to by relevant employees. The best communications systems are those that are multimodal and allow for two-way communications between the organisation and its employees Automate communication and collaboration Once location data is gathered and stored, it must be connected to an incident communications solution that can instantaneously distribute targeted alerts in the case of an emergency. The best communications systems are those that are multimodal and allow for two-way communications between the organization and its employees. When a location-based emergency occurs, the systems that can send messages to a targeted geographic region – whether that is a specific building, floor, neighborhood or zip code – instead of the entire employee directory, will be the most effective in ensuring the right messages are sent to the right people. Additionally, if recipients can acknowledge that a message was received, it allows organisations to identify who is safe – and who may still be in harm’s way and needs help. Every minute counts Let’s say a fire breaks out in a corporate building on the fifth floor and an emergency alert is sent out to all employees in the building. You know that three employees used their security badges to swipe in to that floor earlier that afternoon, but only one responded to your emergency alert. Because you have enabled two-way communications and expect responses from employees that are safe and unharmed, you now know that there is a very real possibility that the other two employees are incapacitated and could be in immediate danger. Building upon this idea, systems that enable employees to initiate communications are much more impactful in protecting their safety in location-based emergencies. If an employee finds him or herself in an active shooter situation, for example, panic button app capabilities are extremely valuable. Panic buttons have the capability of sending a message to an organisation’s security team – automatically transmitting the employee’s location, as well as any shared audio and video with just the push of a button. During critical events, man-made incidents or natural disasters, the ability to identify and reach employees with reliable, automated communications that harness geo-intelligent tools can not only protect your business assets, but can be the difference between life and death for your staff. Because every minute counts, you can’t afford to waste time searching spreadsheets, directories and schedules to notify your employees. Automated communications that utilise available location data enable organisations to connect with employees more effectively, helping to ensure their safety during critical events worldwide.
Krowd is an app that connects people together based on geography; that is, if they are at the same place at the same time. Users sign into the app using the local WiFi, identify themselves by username, and are placed immediately in a group chat comprising anyone else at the location who has signed into the app. An enhancement of the Krowd app, known as Krowdsafe, leverages the technology to achieve and promote security and safety. Specifically, Krowdsafe enables users to interact directly with security personnel at a public place to report any crimes or security infractions and to enable rapid response. Think of it as “crowdsourcing” security – the app provides more eyes and ears to keep a venue safer. In effect, it enables each of its users to be an extension of the security presence at a venue or event. Krowdsafe improves crowd resilience. “Crowdsourcing” security – the app provides more eyes and ears to keep a venue safer Krowdsafe security app Krowdsafe also opens a channel of communication for the security team to provide ad-hoc security information reminders or messages. Krowdsafe can be used at a variety of venues, including stadiums, transport hubs, office blocks, retail malls, college campus and major events organisers. The app does not access identities, violate privacy, or track the movements of users. Other app users only know the information fellow users disclose. Still, group chats, one-on-one engagement, and other social media interactions can ensue, whether about a favourite football team or the excitement of a rock concert. The system fosters digital engagement that centers around a physical space. Krowdsafe applies those capabilities to promoting better security. Enhancing crowd safety and management The elements of Krowdsafe beat out 67 competitors to win the Defence & Security Accelerator Competition to Innovate Crowd Safety, launched by the UK Home office after terror events in 2017. Key areas of interest in the competition were to improve the detection of threats from explosives and weapons within a range of crowded places with high footfall and so reduce the chance of future attacks. Krowdsafe provides a prioritised, readily accessible and simple way for members of a crowd to communicate with a security team charged with keeping them safe. The £250,000 government award has helped the product move forward commercially at a faster pace. Krowdsafe app does not access identities, violate privacy, or track the movements of users Krowdsafe users can tap a red button, prominent on the Krowd app, that says “Report.” They may then choose from a listing of common threat types – from suspicious activity or unattended activity to medical emergency or fire services. The list is configurable by venue and corresponds to any specific threat models. The list corresponds to the nature of any situation security wants to address, such as “anti-social behavior” at a football club. Users in the crowd can anonymously report racist chanting, for example. In a children’s sporting event, the app can be used to facilitate lost-and-found children. If a child gets lost, a user can share a photo with the security team, who can alert the “public” (other Krowdsafe users) and find the child within minutes or seconds. Encrypted identifier code A user taps the “Report” button, selects an issue, and an alert goes directly to the security team A user taps the “Report” button, selects an issue, and an alert goes directly to the security team, who can respond because they have the encrypted identifier code from which the message came. For that point, the security team communicates one-on-one with the user, who can then choose to share their current location with the security team to facilitate response. (The “legitimate interest” of knowing the location negates any privacy concerns.) Once location is enabled, the security team can follow the precise positioning of threats on a map, using GPS and other technologies, or even on a three-dimensional digital map of a multi-story building. Another security benefit of Krowdsafe is prevention. Event organisers and venue managers can promote the use of Krowdsafe on posters or in announcements throughout the venue. Additional eyes and ears are the equivalent of CCTV coverage on every inch of a venue and use of the system makes the environment more hostile to mischievous, malicious and/or terrorist activity. In effect, bad guys will go somewhere else. Enhancement to Krowd app Krowdsafe is an enhancement to the Krowd app, which has been around for a couple of years and is available in app stores for iOS and Android. The app approximates in the digital world the experience of being a stranger in the crowd in the real world. Users can join a conversation based on their username, and then disclose to the crowd whatever they wish (or not). Event managers/organisers can promote hashtags to help identify others in the crowd (such as #ManUnited to identify fans of the same football team). In general, users can identify themselves (voluntarily) according to common interests using hashtags. “Krowd is a group chat that connects people together at the same place at the same time in a group, but without anyone having to disclose personal information,” says Geoff Revill, Managing Director, Krowdthink Ltd. “You have a digital presence in the same place with other people at the same time.” Wireless connectivity Users connect initially into the system through WiFi, access to which serves to approximate presence at a venue Users connect initially into the system through WiFi, access to which serves to approximate presence at a venue. Once someone signs in, information about them is merely a grouping of “hash” numbers, which are used to identify them as they communicate with others in the location. However, the “hashing” cannot be hacked to find a user’s location, thus ensuring greater privacy. Because Krowd does not collect personal data (which is a revenue source for most social media companies), the company generates revenue by providing the service to venue owners who wish to interact with and manage a crowd. Data security Location data is considered sensitive under General Data Protection Regulation (GDPR), and tracking locations can help to identify where someone lives, works, who they associate with, etc. By not tracking location, Krowd avoids the related privacy issues. After initially signing in on WiFi, Krowd communications can also use 2G, 3G and other cellular networks in addition to WiFi. Addressing privacy concerns is essential to encouraging involvement in the Krowd app, and in Krowdsafe. “If you want people to participate in keeping the crowd safe, you have to get their trust and respect them, that’s a building block behind the behavioral science,” says Revill. By not tracking location, Krowd avoids the related privacy issues Privacy protection Because Krowd users remain anonymous (except for the information they choose to share), user data is not collected (and/or sold or used for future marketing purposes). Krowd’s paying customers are event venues and public places that provide the Krowd service and can promote their commercial messages or provide other information to their populations while on site. Krowdsafe can provide immediate security benefits to a venue. Even if only 25 staff members use the app in a given location, for example, that’s 25 more sets of eyes and ears to help the security department. In a retail mall, if the staffs of 200 tenant businesses use the app, that’s another 500 or so people watching out for security. Among the general public, use of the app can be promoted in customer newsletters, or by posting group discussions on big screens around a venue. Wide marketing scope It enables members of a crowd to report any broken doors, water leaks or blocked toilets Security is a secondary benefit for some Krowd users, who are drawn to the app because of marketing opportunities, such as the ability to provide discounts or promotional offers to customers while they are on site. The app also encourages social media interaction, while maintaining the venue’s ability to “manage” the crowd by moderating any discussions. The Krowd app also provides management benefits to a venue. For example, it enables members of a crowd to report any broken doors, water leaks or blocked toilets. In general, the app helps to promote a better brand experience for the customer. Incident management One of the UK government’s concerns about Krowdsafe was its possible use by terrorists or other to cause incidents in a public venue. Think of the case of Olly Murs, a U.K. singer, whose mistaken tweets about hearing gunshots caused a brief panic at a department store on a busy shopping day. Might Krowd be uses similarly by a terrorist or other evil-doer to cause chaos or a distraction? No, says Revill, who points to a higher level of control over content exchanged in Krowd versus Twitter, for example. The security team can censor content or limit its propagation. They can also disable or block a user from communicating on the app. Messages containing dangerous or troubling content, such as racist terms, can trigger alerts to enable security teams to respond quickly.
Security vigilance can be sporadic at many companies and institutions. Facilities tend to tighten security in the days after a scary event happens or makes headlines, and people are generally tolerant of the associated inconvenience – for a time. But as memory fades, so too does tolerance for being inconvenienced. We want to be safe, but we also don’t want to be bothered. We want a security system that both provides safety and is unobtrusive. Security doesn’t have to be inconvenient. That’s a core message of FST Biometrics, which leverages multiple technologies to identify people in motion, ensuring non-invasive, seamless security in a variety of environments. “In Motion Identification” FST Biometrics’ system analyses body size, gait, movement and direction as an individual approaches an entry point, and then uses facial recognition to confirm that person as someone authorised to enter a facility The approach, says FST Biometrics, is to combine facial recognition biometrics with analysis of body behaviour and characteristics. Their system analyses body size, gait, movement and direction as an individual approaches an entry point, and then uses facial recognition to confirm that person as someone authorised to enter a facility. It all happens without the individual realising it or thinking about it – in effect, tightened security is invisible and non-intrusive to the environment being protected. FST Biometrics calls it “In Motion Identification” (IMID). The benefits are obvious in a global environment where security increasingly is needed everywhere. “It’s very accurate identification that translates into security without a high visibility of security,” says Arie Melamed, CMO of FST Biometrics. “If you have security that isn’t invasive, and without changing the status quo of life, people feel safer and they will be safer.” Accuracy With a false accept rate around 3 in 10,000, the system is sufficient for all but the most secure facilities, says Melamed. If additional security is needed, the system can also implement a voice recognition element, or other multi-factor identification such as cards or smart phone credentials can be added (with resulting false accept rates around 1 in 1 million). FST Biometrics’ software includes visitor management and access control suites, too. It can also be integrated with access control platforms such as Lenel, Tyco’s C-Cure, Honeywell and others. Analysing body recognition factors FST Biometrics analyses body recognition factors as an individual approaches an entry point to narrow the field of possible identities, from which a face is confirmed at the entry point. Narrowing the possible matches from 10,000 to 500 or fewer, the system both simplifies the task of recognising the face and eliminates a majority of possible false accepts, thus improving the accuracy of the total system. Body characteristics are analysed at distances ranging 12 to 18 feet from the entry point, and the final facial recognition takes place 2 or 3 feet from the entry. The system can be used with doors, speed gates or turnstiles, or even in an open environment where a security guard is notified if a person isn’t recognised. The company claims throughput at turnstiles of 30 people per minute. “It’s very accurate identification that translates into security without a high visibility of security. If you have security that isn’t invasive, and without changing the status quo of life, people feel safer and they will be safer”, says Arie Melamed, CMO of FST Biometrics The software system works with standard hardware, including a 5 megapixel IP camera installed at the entry point, and a server. Only the facial image is enrolled in the system. Over time, the system then “learns” information about body behaviour and characteristics -- and applies the data to simplifying identification and increasing accuracy. About FST Biometrics FST Biometrics was founded in 2007 by the former head of Israel’s military intelligence. The company installed the first systems in customer facilities in 2012, and has been receiving feedback since then. In 2014, they began to focus on the enterprise market, including “open campuses” that want security but without the “feel” of security. Clients include corporate, retail, financial services, telecommunications, residential and governmental sectors. Melamed says a new $15 million investment in FST Biometrics by GMF Capital is an endorsement of the company’s approach and a statement of trust. “We know how hard they look for uniqueness [in companies they invest in],” he says. “They are looking for companies that are changing the world.” Former Israeli Prime Minister Ehud Barak will represent GMF Capital on the FST Biometrics Board of Directors. FST Biometrics has also introduced a system that uses an Android-based mobile device (such as a smart phone with a camera) to enable a security guard to recognise people without being tied to a specific location, even in an environment such as a parking garage. After the identity is confirmed, the mobile system advises whether the person can enter and may also list who is authorised to be a passenger in their car (to identify possible car-jacking scenarios).
Visiting with the youngest "old company" in the security market: One of the newest companies at this year’s ISC West show is 130 years old. Allegion launched in December 2013 as a standalone, publicly-traded company following the spinoff of the commercial and residential security businesses from Ingersoll Rand. Making its high-profile debut at ISC West in Las Vegas, Allegion sponsored the kick-off ceremony and featured a big booth full of familiar brands like Schlage and Von Duprin. I caught up with Dave Petratis, chairman, president and CEO of Allegion, for a quick interview at the company’s booth. Some in the security market may remember Petratis as chief operating officer and CEO of Schneider Electric North America from 2002 to 2008. He comes to Allegion from Quanex, a Houston-based manufacturer of engineered materials and components for building products. SourceSecurity.com: So what’s the Allegion story at the ISC West show? Petratis: We’re a brand new company with 130-year-old roots. We sponsored the ISC kick-off this morning, so that certainly got some attention. I’m really amazed by the level of foot traffic at the show. We’re a new company, deep roots. We launched Dec. 2, 2013 and we have been extremely well received by our employees, our channel partners and the financial community. We are already involved in acquisitions and joint ventures. That’s what was lacking under Ingersoll Rand. There wasn’t a lot of aggressiveness to build through mergers and acquisitions. We have the ability to do that. We have the ability to invest, the feet on the street, spec writers, new products. That’s really the message here. We’re a company that you touch every day through Schlage, Von Duprin, LCN. We’re independent and moving very quickly. SourceSecurity.com: What is your brand strategy related to the new name? Petratis: We’re a house of brands. Allegion will be the umbrella, but as we acquire, we will plug those brands into the umbrella and continue to run with our master brands, which are Schage, Von Duprin, LCN, CISA and Interflex. When you have that installed base around the world, it’s pretty powerful. We wouldn’t want to distance ourselves from that at all. As we bolt on and buy new companies, they’ll be part of Allegion. SourceSecurity.com: Have there been any residual effects from the Ingersoll Rand era? Petratis: The transformation and launch of the company have been extremely smooth. But I wouldn’t underestimate the amount of work involved. Anytime you create a brand and go out and raise $1.8 billion in capital to buy the company, IPO the company, there’s a tremendous amount of work. That work is behind us. The most exciting thing that I feel going forward after joining the company is: I have the capability to go out and touch the industry and touch our customers and think about the future. SourceSecurity.com: What will be your news a year from now? Petratis: Growth, investment, open protocols. We think having capabilities in an open environment is good for customers. Customers want to have choices and don’t want to get locked into proprietary systems. As an independent company, we have all the ability to drive that.
Amthal Fire & Security has installed a bespoke designed Keyzapp management system at its head offices, to ensure the safekeeping and accountability of client keys at all times. Electronic Fire and security company Amthal required a system to improve key management processes, especially as the business has seen significant growth with an increased number of customer keys being kept on site for property protection, maintenance and monitoring services. Audit control capability for key transactions Keyzapp was selected due to its flexible design. This enabled Amthal to create a system that was easy for authorised engineers to operate, whilst management could rely on audit control capability for all key transactions, without the need for a dedicated member of staff 24/7 manually issuing and recording them. It’s really automated our complete process and has proven to save the engineering team valuable time and resource" Says Simon Kendall, Amthal Supply Chain Leader: “Amthal has a growing network of dedicated engineers that work across the country, with varying access requirements for customer’s keys that are all kept at Amthal offices. Completing manual audits for keys taken had become increasingly time consuming to ensure awareness of allocations and traceability. “The implementation of Keyzapp’s system has made such a difference. It’s really automated our complete process and has proven to save the engineering team valuable time and resource, which they can dedicate to better serving our customers. It runs itself in the background and if there is an issue, it can be resolved quickly and efficiently.” Control to key access with smart credentials Keyzapp’s simple management solutions are designed using latest technology to decrease downtime and improve work efficiencies. The ability to further add control to key access with smart credentials and audit capability ensures full visibility of keys at any time. Tim Hill, Keyzapp Director added: “What Amthal demonstrates is the importance of attention to key control. We worked with the team to tailor our system around the business requirements for asset management, including allowing 24 / 7 access with no need for dedicated staff issuing keys. “The management side has also been scaled around ensuring instant traceability to ensure growing number of keys held on site are accounted for at all times. It’s great to see it’s made such a positive impact on a leading fire and security specialist, who prides itself on ‘protecting what’s precious,’ which includes its key customer assets!” Traceability and visibility for valuable equipment Our engineers find it simple to use, and we’ve even recorded improved site attendance times" So impressed with Keyzapp, Amthal is now working on a bespoke system to manage the specialist loan equipment being booked in and out of its office stores and warehouse, to reflect the same level of traceability and visibility for valuable equipment. Jamie Allam, Commercial Director Amthal Fire & Security concluded: “Keyzapp had an instant impact on the whole team, with improved time and operational savings. Our engineers find it simple to use, and we’ve even recorded improved site attendance times. Plus the management capability is great from our perspective to help towards the efficient, operational running of our business.” User needs for security safety and convenience Independently owned, Amthal Fire & Security is dedicated to satisfying end user needs for security safety and convenience offering design, installation, service and remote monitoring of advanced electronic fire & security solutions, including intruder, Fire, Access and CCTV systems. Amthal Fire & Security is accredited by the Security Systems and Alarm Inspection Board (SSAIB) United Kingdom Accreditation Services (UKAS) and British Approvals for Fire Equipment (BAFE.)
Abdullah A. M. Al-Khodari Sons Company is a multifaceted contracting company in Saudi Arabia. This company conducts business in diverse sectors such as civil engineering, roads and bridges, railways, buildings and infrastructure, water and waste water treatment, oil-gas and pipelines. It has 25 construction sites across Middle East. Managing time-attendance, shifts, overtime and leaves of 20,000 employees at different locations was a challenging process for them. They wanted a centralised time-attendance solution that would enable them to manage attendance data from a central location and speed up the payroll process. Project Highlights Time-attendance solution for 25 construction sites Access control solution for 25 sites Centralised attendance management for 20,000 employees Managing time-attendance data Al-Khodari is engaged in wide spread construction activities with 60 construction sites in the Middle East Al-Khodari is engaged in wide spread construction activities with 60 construction sites in the Middle East. Managing time-attendance, shifts, leaves and overtime of 20,000 employees at different locations is very time consuming and a tedious task. Previously, the customer was using Hand geometry solution, which was very time consuming. Workers also found it difficult to place their palms in the proper position. Managing time-attendance data of all employees on a central level was also becoming difficult for the company. Furthermore, the head office was using a different time-attendance solution in comparison to other sites. The head office processed the salary of employees after receiving an attendance summary from each of their branches. The process of salary calculation with respect to working hours and overtime of each employee took around 10 days. Moreover, there were chances that the attendance data was inaccurate, leading loss of efficiency and employee dissatisfaction. To overcome such challenges, the company required a centralised time-attendance and access control solution which could be managed and controlled from the head office. Faster and accurate salary calculation After discussing all of their problems and requirements Matrix offered web based COSEC CENTRA time-attendance and access control solution for their multi located branches across the Middle East. It automated all time-attendance processes right from recording entries to processing salaries. COSEC CENTRA access control solution allows controlling access on three simultaneous dimensions – user, zone and time. COSEC CENTRA server is installed at the head office to where attendance data of all locations are collected Optical fingerprint based time-attendance and access control terminal COSEC DOOR FOP was installed to mark the attendance and get access using fingerprint credentials. As per assigned access rules and time-attendance policies, access is allowed or denied, and event data would be pushed from all devices to the COSEC CENTRA server in real-time. COSEC CENTRA server is installed at the head office to where attendance data of all locations are collected centrally. Various types of time-attendance reports and charts can be generated for faster and accurate salary calculation. Error free time-attendance Time required for salary calculation reduced by 30% Productivity increased by 20% Control of all sites through a live monitoring window Error free time-attendance and overtime data Database management of all employees Centralised report generation Products installed COSEC DOOR FOP - optical fingerprint and RF card based door controller COSEC ENROLL FINGER - fingerprint enrolment station COSEC LE PLATFORM - web based application software platform COSEC LE TAM - time-attendance and leave management module COSEC LE ACM - access control module COSEC LE USER10000 - 10000 user license for LE platform
Kings Secure Technologies has provided high-level security and protection to one of its leading clients since 2011. Due to this successful long-term relationship, Kings was commissioned to begin a project, which started in 2019, to update the existing access control system with the latest high security card and card reader technology. With facilities working 24/7 the challenge faced was to find an easy-to-install edge technology card reader that could be configured onsite to read multiple card technologies where required and be field upgradable with any new advances in security. With these complex requirements in mind, Kings turned to Third Millennium to provide the most advanced technical solution available in the market. RX range of card readers The project also required the implementation of biometric dual authentication for the more secure areas Kings utilised Third Millennium’s RX range of card readers which incorporates the second evolution of NXP industry-leading MIFARE® DESFire® EV2 open architecture platform. Third Millennium’s PC09 Mifare DESFire EV2 cards offer superior performance, state-of- the-art security, privacy and enhanced multi-application support such as follow me printing and vending, to name just two. In addition to the RX4 and RX1K readers, the project also required the implementation of biometric dual authentication for the more secure areas. Third Millennium’s RX6 biometric reader uses a template on card application which means that there is no requirement to maintain a separate database of biometric information. The RX6 compares the finger template on the card with the finger being scanned and releases the card data if the two match. Because of the high security requirement, a custom encrypted key ties the readers to the cards thereby preventing card cloning or data bugging.
The Tata Institute of Social Sciences (TISS) was established in 1936, as the Sir Dorabji Tata Graduate School of Social Work in Mumbai. It is the first graduate school of social work in India. It has subsequently influenced the direction of social work, education and social research in India. Later in 1944, it was renamed as the Tata Institute of Social Sciences. Managing time-attendance Tata Institute of Social Sciences wanted to manage time-attendance of more than 2,000 students and 300 employees at their Mumbai location. Initially, they were using traditional methods for attendance marking. As a result, they were facing many problems in maintaining records for the same. Hence, they required an efficient system for maintaining and recording accurate attendance data of students and staff. They needed biometric hardware solution with battery backup along with software compatibility. They wanted a solution that would mark in punch and out punch of students in every lecture and an automated system that would send data to the server. Additionally, TISS also wanted a solution, which can be integrated with third party payroll system for timely salary payment of their staff. Fingerprint plus RFID card based terminals Matrix has installed 54 fingerprint plus RFID Card based terminals with battery backup at the Mumbai campusAfter having a detailed discussion with the TISS team, Matrix offered a comprehensive Time-Attendance solution for students and staff members. Matrix has installed 54 fingerprint plus RFID Card based terminals with battery backup (COSEC VEGA BBU) at the Mumbai campus. All these devices are connected via LAN with the COSEC CENTRA server installed at TISS, Mumbai. HR/Admin can track attendance of all the employees and generate different reports for timely salary payment. Similarly, all the faculty members can generate monthly and semester-wise attendance reports of the students. Results after the installation Efficient Time-Attendance Management Fraudulent Time Keeping Eliminated Accurate Time-Attendance Data of Students SMS Notification to Parents Timely and Accurate Salary of Employees Increased Productivity Customised Reports as per Requirement Products installed at TISS COSEC VEGA FAX - Optical Fingerprint and Card based Time-Attendance Terminal COSEC VEGA BBU - Battery Backup for VEGA Series Door Controller COSEC LE CENTRA – Application Server for 1000 Users COSEC LE TAM - Time-Attendance and Leave Management Module
A supplier of global technology services, Bosch chose to partner with Gallagher and KW Corporation to help streamline its North American security operations. Operational efficiency Bosch required a comprehensive yet flexible security solution that could be tailored to solve their specific requirements and challenges. Presently 22 Bosch locations are on the Gallagher platform with a cardholder database of approximately 6,000. A key area of focus for Bosch was improving operational efficiency. Command Centre, Gallagher’s powerful access control solution, offered Bosch a range of reporting functions to help streamline operations. Manager of Bosch’s corporate Security, Frederick Fung, says “The user friendliness of Command Centre and the ability to automate reporting means our operations now run more smoothly. Administration time has been reduced, creating significant cost savings.” Having the ability to pick up the phone and call technical support is critical to securing our sites" Centralised system Bosch selected Gallagher as the solution that could best meet its needs, including a centralised system to secure multiple sites. “Having the ability to pick up the phone and call technical support is critical to securing our sites,” explains Fung. “Many of our security staff have multiple responsibilities, so the Gallagher and KW Corporation services are invaluable.” Gallagher also offers customers the same training courses that it conducts for certified channel partners, providing staff with the capability to be first responders and giving them the confidence to handle certain security issues themselves. Command Centre Like many businesses, theft of physical and intellectual property is a big concern. With the support of Gallagher and KW Corporation, Command Centre manages access control, Bosch surveillance, and intrusion systems. Selecting Gallagher provided Bosch with: Video management system integration (BVMS), for safety precautions and oversight CCTV integration, image and video event audit trail Peace of mind through the use of the latest continually evolving software technologies and cyber security counter measures, eliminating the fear of hacking and site down-time Integrated intrusion detection system allowing full situational awareness Flexible and scalable solutions Fung explains, “The key differentiator for Gallagher is the company’s unmatched support, system user-friendliness, and cost savings in both short and long-term.” Gallagher solutions are flexible and scalable, creating the potential for future growth across Bosch locations. “Integration with Gallagher Command Centre has had a positive impact across our sites, improving safety, security, and operational efficiencies,” says Fung. “Gallagher supports us in providing a safe and secure working environment, improving the quality of life for our associates and visitors.”
IndiaNivesh is one of the leading financial services conglomerate in India. IndiaNivesh is into various aspects of investment banking and consulting business. It plans to emerge as a dynamic, customer-centric, and progressive financial group in the country with PAN India presence. Having its head office in Mumbai, IndiaNivesh is growing with eight regional offices and 29 branch offices across India. Project specifics Application: Time-Attendance and Access Control Locations: 32 (PAN India) Users: 500 Units Installed: 60 Readers: Fingerprint and RFID Card IndiaNivesh being widely involved in financial services business with 29 branch offices and 8 regional offices across India, required eradication of forged attendance data and manual attendance process, as security is a crucial aspect for them. To streamline and manage attendance data of all employees accurately and perform calculation of error-free salary has been a tedious task. It has been challenging to integrate their existing payroll software with the time-attendance software. COSEC time-attendance solution Matrix offered COSEC time-attendance solution helped in connecting all its regional and branch offices to their head office in Mumbai Matrix offered COSEC time-attendance solution which has web-based architecture and helped in connecting all its regional and branch offices to their head office in Mumbai. Implemented automatic salary calculation as Matrix COSEC time-attendance software got easily integrated with existing payroll software. Result Real-time attendance of all employees at a centralised location Integration with its existing payroll software Ease of Implementation using the existing infrastructure Fraudulent timekeeping is completely eliminated Accurate In/Out time of each employee recorded Live monitoring of In/Out timing Generation of time-attendance and access control reports and charts for all branches Improved overall productivity of the organisation Continuous operations with excellent service support Biometric access control solutions COSEC DOOR FOP - Optical fingerprint-based door controller for access control and time-attendance COSEC DOOR CAS – Card-based door controller for access control and time-attendance COSEC PANEL - Site controller to manage multiple door controllers and advanced access control Features COSEC LE PLATFORM - Application server platform for 1000 users and expandable up to one million users COSEC LE TAM - Comprehensive time-attendance and leave management module for COSEC LE platform COSEC LE ACM - Comprehensive access control module for COSEC LE platform
Round table discussion
The concept of how security systems can contribute to the broader business goals of a company is not new. It seems we have been talking about benefits of security systems beyond “just” security for more than a decade. Given the expanding role of technologies in the market, including video and access control, at what point is the term “security” too restrictive to accurately describe what our industry does? We asked the Expert Panel Roundtable for their responses to this premise: Is the description “security technology” too narrow given the broader application possibilities of today’s systems? Why?
Big data is a buzzword, and data – presumably of all sizes – is a driving force in the physical security market. As systems become more sophisticated and expand their capabilities, the result is more data; in some cases, a lot more data. But a key question is: What do we do with the data? How do we use it to provide value? How do we interpret it, and transform it into useful information and/or intelligence? We presented the topic of data to our Expert Panel Roundtable and came away with a range of thoughts on its changing – and expanding – role in the physical security market (and beyond). We asked this week’s Expert Panel Roundtable: How is a greater emphasis on data changing the physical security market?
A clear image is the desired end-result of video systems – or is it? In a growing number of applications, it’s not the image itself, but rather what information can be gained from the image, that is most important. We asked this week’s Expert Panel Roundtable to comment on some of the ways information from video is valuable to end users. Specifically, we asked: In what applications does information derived from video images provide more value than the images themselves?