Electronic Security Expo (ESX) 2019 registration is now open for electronic security and life safety industry professionals. The joint trade show and educational conference, owned by the Electronic Security Association (ESA) and The Monitoring Association (TMA), is set for June 3-6, 2019 in Indianapolis, Indiana. ESX is designed to provide passionate professionals a unique forum in which to learn about the latest technology innovations; acquire proven business strategies; gain new insights based...
Johnson Controls announces the release of CEM Systems AC2000 v10.1, which contains a number of new features that improve functionality and the user experience and help to mitigate health and safety risks. Support for a range of new third-party products that increase the performance and scope of the CEM Systems AC2000 access control system has also been added. The Health and Safety (H&S) Induction Check application for CEM Systems emerald intelligent access terminals allows cardholders to se...
BQT Solutions, a provider of high security card and biometric readers and locks, has launched its new Orca weatherproof lock which provides industry-leading strength, unparalleled environmental durability and seamless access control integration for securing gates, roller doors, shipping containers, and any other large door or entryway. Matthew Nye-Hingston, CTO of BQT Solutions Locking division commented, “Orca is the ultimate weatherproof lock, providing the complete combination of stren...
Matrix Comsec has confirmed its participation in the 27th Convergence India 2019 event, to be held in the Pragati Maidan, New Delhi from 29th - 31st January 2019. Matrix will be showcasing its complete range of Enterprise IP-PBXs, Unified Communication Server for Modern Enterprises, IP-PBX for SMB & SME, VoIP & GSM Gateways and new portfolio of IP Communication endpoints. PARISAT VC video conferencing Matrix is well-known for its indigenous and innovative range of solutions for Unifie...
Maxxess will be at Intersec 2019 showcasing its latest advances in corporate risk reduction, improved people management and smarter hospitality access solutions - including new releases in its popular eFusion and Ambit solutions. eFusion security management The latest version of the VisitorPoint module within the eFusion security management platform will be showcased, offering a host of new streamlined functions for efficient people and visitor management. Harnessing current advances in cloud...
Neurotechnology, a provider of deep learning-based solutions and high-precision biometric identification and object recognition technologies, has announced the release of the SentiVeillance 7.0 software development kit (SDK) and the end-user oriented SentiVeillance Server solution. With SentiVeillance SDK, developers can create identification solutions that use live video streams from digital surveillance cameras. The latest version adds multiple enhancements to the biometric face recognition a...
Evolis, global provider of personalisation systems for plastic cards, announced the creation of a subsidiary in Tokyo under the name of Evolis Japan. Evolis Japan Operational since January 7, 2019, Evolis Japan will market the entire Evolis product range and offer technical support. Since 2008, Evolis has been present in Japan through a distributor. The creation of a local subsidiary aims at strengthening relations with local partners in order to accelerate the group’s business development and maximise the chances to establish a long-term presence in Japan. Card personalisation solutions Evolis Japan’s mission is to expand the traditional distribution network, develop a new network dedicated to new sectors and to strengthen its ability to reply to demands of government bodies and financial institutions. "Japan is one of the world’s leading economies with more than 125 million people. We therefore see strong potential in several key markets for card personalisation. The creation of a Japanese company will help us reinforcing our existing business relationships and facilitate the development of new partnerships" says Emmanuel Picot, president of Evolis.
Boon Edam Inc., global provider of security entrances and architectural revolving door solutions, has announced the breadth of its 2019 technical training program, including scheduled factory trainings, online webinars and roadshow trainings throughout the United States. Technical training events are free of charge to Boon Edam distributors and integrator partners and include one to three days of intensive product instruction and hands-on exercises. Boon Edam Roadshow In 2016, Boon Edam introduced the first “Roadshow” training program with the goal of bringing the success of its bi-annual factory trainings held in Lillington, NC direct to partners in their local area. Roadshow trainings are unique in that a specially-engineered, full-size security revolving door, security portal and/or optical turnstile are sent to each training location For the 2019 training program, Boon Edam’s Training Manager, Zac Ellett, has created an improved curriculum which addresses the top five issues seen in the field for each product type, in addition to general installation, service and maintenance instruction. The Roadshow will stop in at least a dozen locations this year, focusing on areas where a large number of installations are about to occur. For this reason, the Roadshow schedule for the quarter will be released at the beginning of that quarter. Roadshow trainings are unique in that a specially-engineered, full-size security revolving door, security portal and/or optical turnstile are sent to each training location. Partners have the opportunity to work together to assemble the units and troubleshoot them on-site, gaining confidence and competence that will translate to improved performance in the field. Public-use revolving doors In 2019, Boon Edam will continue to host four trainings at its factory location in Lillington, NC, with each session focusing on different product types. There will also be two AAADM A156.27 certification courses on public-use revolving doors throughout the year. Finally, Boon Edam will also provide four, free public webinars. This portable training method gives partners the convenience of learning on the road or at the office. “I’m proud to be coordinating a technical training program each year that can reach our valued partners and help them delight their customers,” said Ellett. “The response we’ve received over the past three years with our roadshow training has been overwhelmingly positive. We’ll continue to expand our training program and do all we can to support our partners.”
ADT Inc., global provider of monitored security and interactive home and business automation solutions in the United States and Canada, has announced the unveiling of its newly redesigned smart home security system – the ADT Command Panel & Control Platform (ADT Command) – as well as a suite of smart security and home automation products at the Consumer Electronic Show (CES). This year’s theme, “Real Protection,” will highlight the products ADT offers to ensure customer safety from any location. ADT Command ADT Command is a dynamic and innovative wireless panel with numerous smart home capabilities, including seamless set up and control with the ADT Control app, that allows customers to protect and automate their homes from anywhere at any time. “As home automation continues to evolve and become more accessible, we know our growing community of 3 million smart home customers want and expect a security solution that is fully integrated with the latest technology innovations,” said Don Young, ADT Chief Information Officer & Executive Vice President, Field Operations. “With ADT Command & Control, consumers get best-in-class monitoring service from the largest security network, combined with the most cutting-edge technology. The Control platform supports over 250 devices, ranging from carbon monoxide detectors to smart light bulbs, providing custom-fit solutions that provide customers with real protection.” ADT Monitoring and Emergency Response ADT Command customers receive ADT’s monitoring and emergency response, backed by 4,000 monitoring professionals across 10 monitoring centers ADT Command customers receive ADT’s monitoring and emergency response, backed by 4,000 monitoring professionals across 10 monitoring centers, providing 24/7 protection, 365 days a year. Key features include: Smart security: Know who is arriving home and when, with the 7-inch wireless, touchscreen Command panel that snaps a photo when the system is disarmed using its built-in camera. By creating dynamic scenes and rules, your smart home devices work in harmony to keep your family safe. For example, in case of a fire, the system can be connected to the thermostat, lights and doors, making it easier and safer for everyone to get outside. Connected and secure home: Keep your home connected 24/7 with the panel’s battery backup with dual path Broadband and LTE cellular communications. ADT Command features two-way encryption RF sensor technology to help reduce the potential for hacking. For increased control of your home, unique user codes and permission settings can grant access to users only on the days and times you specify. Geofencing and voice control technology: The app’s geofencing technology generates helpful automations and alerts to trigger events, with reminders such as arming the security system when you leave the house. With voice control technology, you can easily control your system simply with your voice. Remote arming and disarming of system: Use the Control app to carry out preset automations when you leave or arrive home, allowing you to remotely arm or disarm your system. No matter where you are, you can rest easy knowing your doors are locked, your lights are on or off and your home is secured. You can even watch live video and images from your mobile phone, tablet or smartwatch, so you can stay connected to your home no matter where your travels take you. ADT solutions on display at CES 2019 Located at Veronese 2504 at the Sands Expo Convention Center, ADT will be showcasing several additional products and services that bring users peace of mind and real protection irrespective of where they are. Highlights include: ADT Go: This all-in-one mobile safety app provides a companion with you wherever you go—whether you’re in the car or in a new city. Created in partnership with trusted locator and communication tool Life360, the app offers family check-in and location geo-fencing capabilities, local crime data, driving activity alerts, crash detection and response, roadside assistance, and 24/7 SOS emergency response from ADT’s trusted live monitoring agents. Available in Apple and Android app stores, ADT offers two service options to give you peace of mind that fits your family’s needs. ADT Video Doorbell: The weatherproof, high-definition video doorbell provides front door security, allowing users to receive alerts, photos and videos, when the doorbell is engaged. The doorbell can also reduce false motion events by using object detection, pairing it with other motion data to determine true events and provides superior video quality and crisp wide-angle views with de-warping features. Voice Control Integrations: ADT’s integrations with Amazon Alexa and Google Voice Assistant provides users a hands-free solution for dynamic scenes that deliver a personalised service. Customers can utilise voice commands to arm or disarm their systems, lock and unlock doors, and manage other smart devices like lights and thermostats—making the home not just smarter, but safer. Interactive Crime Map: ADT’s free, interactive crime maps provide up-to-date information on crime statistics, including assault vehicle theft, robbery, and more. This tool assists future homebuyers when considering a neighborhood and helps travelers choose the best places to stay when visiting a new city.
Gradiant’s innovation in forensics technology to detect manipulation in multimedia documents premieres at the Eureka Park TM, a specific space within the Consumer Electronics Show (CES) 2019 where the most promising companies showcase their innovative technological solutions. From January 8th to 11th, Gradiant presents at booth 52917 (Sands Expo, Level 1, Hall G) Valida, a fully automatic forensic analysis tool that detects manipulations in multimedia documents (jpeg or pdf files). Valida forensic analysis toolEvaluating the authenticity of digital documents to prevent fraud in online user verification, digital onboarding and Know Your Customer (KYC) processes is Valida's main goal Evaluating the authenticity of digital documents to prevent fraud in online user verification, digital onboarding and Know Your Customer (KYC) processes is Valida's main goal. This technology developed by Gradiant allows companies to offer an extra level of security in these operations, as it automatically analyses any type of identity document (and other digital files such as payroll, invoices, receipts, etc.) and detects possible attacks of impersonation and forgeries in the data present in these files. Gradiant is not attending CES for the first time. In 2018, the center showcased biometric signature technology in the same space. As Daniel González, director of the Multimodal Information department of Gradiant, explains "being selected for the second year in a row to participate in an event of this international importance confirms the value of Gradiant's technologies, and demonstrates the real concern of companies and society for document fraud.” "After many years working in the multimedia security field, we have developed a tool that allows us to automatically verify in a few seconds if a document has been manipulated or not", stated González, who highlights "this is an important innovation in the current digital world, where companies carry out thousands of users and files verifications each day. Besides, it is not necessary to have the original document to detect the modifications with Valida." AI-based ID authentication solution Valida is an effective solution for companies in document verification processes. This technology automatically detects digital forgeries produced in ID documents, bills or payslips, for example. With forensic techniques based on Artificial Intelligence, our tool analyses the document and show the manipulated areas, through a heat map that clearly indicates where the forgery has taken place. Valida supports all types of identity documents and nationalities: passports, identity documents, driving licences, etc. without specific adaptations. In addition, it does not require connection to external databases (e.g. identity document databases) to detect modifications and also warns if a document has been captured from a screen (and is therefore not a photograph taken of the original document). Digital Onboarding Valida allows companies to offer an extra level of security in financial operations by analysing an ID document image and detecting spoofing attacks just in a few seconds Although digital onboarding processes offer remote opening of financial products and services by identifying customers through the use of biometric technology for user recognition, thereby providing great advantages for customers and businesses such as easy shopping and customer growth, it also carries security problems like fraud or manipulations of documents and user verifications. In addition, the advancement of technology and the democratisation of multimedia publishing programs, make forgeries more and more realistic. Insurance companies and banking, for instance, with online processes, already need mechanisms to authenticate and verify the thousands of ID documents they daily receive in digital processes. Valida allows companies to offer an extra level of security in such operations by analysing an ID document image and detecting spoofing attacks just in a few seconds, thus combating fraud and avoiding losses. Multimedia security expert Gradiant has been developing for ten years technology related to the protection and identification of different types of files to provide multimedia security in different areas, such as the authenticity of printed documents with signed or the traceability of printed documentation to identify the person responsible for the custody of a document in filtration cases, with Shadow. To help companies prevent fraud, Gradiant has developed Valida, a solution based on AI-based forensic techniques that detects any modification made to identity documents, photographs or other files. At Gradiant, we believe that the key to success in development based on forensic technology is linked to three major concepts: security, convenience and availability, so we integrate these principles in all our developments.
People and vehicle access control specialist, Nortech’s technical training courses have been specially designed to make sure that installers/system integrators are equipped with the skills and knowledge needed to install, maintain and troubleshoot Nortech systems. Real-world security issues Led by highly experienced technical experts, Nortech’s courses combine hands-on practice with theoretical sessions covering real-world security issues and take place at the company’s dedicated training facility in South Wales. Nortech is committed to providing an outstanding customer experience with its products and services. As part of this commitment, it offers a range of in-depth training in access controllers, readers and ID devices, and long-range identification, ideal for those with sound knowledge and experience in people and vehicle access systems. The courses provided include Long range identification training begins with vehicle tagging and ANPR systems Nortech products overview, which focuses on Nortech’s access control products, card readers, ID devices, long range identification, vehicle counting and parking management products. Access Control: The modules cover the access control products, Norpass installation and Nortech Reader Interface installation. The final module progresses into the installation and configuration of NRI products. Long range identification training begins with vehicle tagging and ANPR systems. Other modules in the programme discuss the installation and configuration of the ANPR, uPASS and Transit ranges. Vehicle detection and parking training includes learning about Nortech’s popular Feemaster Smart and the company’s counting and count management products. The installation and configuration of the Feemaster Smart Console, entry and exit stations and an overview of the inductive loop detector operation, applications and set up of Nortech’s parking detectors are all included. Readers and ID devices installation training for each reader and ID device supported by Nortech is also available. Training is free to all existing account customers. In addition, every participant will receive a comprehensive pack of product specifications, application notes and a certificate of completion.
Matrix has announced that it will be participating in one of the world’s premier and most prestigious trade fair for security, safety & fire protection, Intersec 2019. The expo is to be held in the Dubai World Trade Center, Dubai, United Arab Emirates from 20th to 22nd January 2019. Matrix will be launching its new door controller and exhibiting its time-attendance, access control and video surveillance solutions at the event. Constantly upgrading technology Matrix is well-known for its indigenous and innovative range of solutions for IP video surveillance, access control, time-attendance and unified communications. All these solutions are specifically designed for large, multi-location enterprises, SME and SMB organisations. Matrix Comsec continuously works towards keeping abreast with the constantly upgrading technology by designing and manufacturing solutions that are equipped with the latest technology. Matrix will be presenting some of its indigenously engineered security solutions at Intersec 2019 in Dubai. Overall, Matrix is focused on new generation technologies such as video analytics, AI, deep learning, cloud, etc. COSEC ARGO next-gen door controller Matrix Comsec is going to launch COSEC ARGO – the next generation door controller with a blend of performance and aesthetics Matrix Comsec is going to launch COSEC ARGO – the next generation door controller with a blend of performance and aesthetics. The door controller is equipped with features like 3.5” IPS touchscreen LCD with gorilla glass, elegant aesthetic with full frontal glass, open connectivity with ethernet, Wi-Fi, BLE, USB, PoE, ultrafast fingerprint identification (2x fast sensor), wall and flush mount options, simple and clean installation with minimum wiring, intuitive user experience, vandal resistant enclosure with IK08, and suitable for outdoor applications with IP65. It benefits organisations with reduced user verification time, higher security, versatility, improved productivity, low IT infrastructure cost, future proof, flexibility, etc. Additionally, the device comes with higher processing speed, wall and flush mounting options, and increased fingerprint and event storage capacity, further enhancing its efficiency. Live demonstrations of COSEC VYOM and ARGO solutions Matrix will demonstrate live working of two of its unique and innovative solutions: 1) COSEC VYOM – Solution experts will discuss how it assists users in using applications, hardware and software all as a service simultaneously. 2) COSEC ARGO – Solutions experts will discuss at length its differentiating features and how they make the device the next gen door controller when it comes to access control. Matrix NETRA IP cameras and PARAM series of NVRX Matrix NETRA series of 2MP & 3MP IP cameras – They offer superior image quality along with multiple streams, video analytics and edge recording. Matrix PARAM series of NVRX – These next-gen Network Video Recorders offering high resolution recording, live viewing of multiple streams, innovative cascading, powerful investigator and instant notifications. Weighbridge Integration solution – It collects pictorial evidence of inward or outward vehicles by mapping unique numbers such as license plates, challan numbers or token numbers for further verification and auditing. Parking Management solution – It addresses the need for automated functioning of small, medium or large parking areas.
Consolidation persisted in the physical security industry in 2018, and big companies such as Motorola, Canon and UTC continued to make moves. Also among the mergers and acquisitions (M&A) news in 2018 was a high-profile bankruptcy (that ended well), continuing consolidation in the integrator market, and the creation of a new entity called “LenelS2.” Here’s a look at the Top 10 M&A stories in 2018: 1. Motorola acquires Avigilon Motorola Solutions announced in February that it had entered into a definitive agreement to acquire video surveillance provider Avigilon in an all-cash transaction that enhances Motorola Solutions’ portfolio of mission-critical communications technologies. Avigilon products are used by a range of commercial and government customers including critical infrastructure, airports, government facilities, public venues, healthcare centers and retail. The company holds more than 750 U.S. and international patents. 2. UTC Climate, Control & Security buys S2 Security UTC Climate, Controls & Security agreed in September to acquire S2 Security, a developer of unified security and video management solutions. UTC subsequently combined S2 with its Lenel brand to create LenelS2, “a global leader in advanced access control systems and services” with “complementary strengths.” 3. Costar Technologies acquires Arecont Vision after bankruptcy Arecont Vision, the provider of IP-based megapixel camera and video surveillance solutions, announced in July that the acquisition by Costar Technologies, Inc. of its assets had been approved by the bankruptcy court. After the closing of the sale, the company began operating as Arecont Vision Costar, LLC and is part of Costar, a U.S. corporation that designs, develops, manufactures, and distributes a range of products for the video surveillance and machine vision markets. 4. Allegion acquires access control company ISONAS Allegion plc, a security products and solutions provider, agreed in June to acquire ISONAS through one of its subsidiaries. ISONAS’ edge-computing technology provides access control solutions for non-residential markets. ISONAS' devices – like its integrated reader-controllers – utilise power over ethernet, making them easy to install and cost effective as they utilise existing customer infrastructures. The company is based in Boulder, Colo. 5. HID buys Crossmatch for Biometrics HID Global announced that it had acquired Crossmatch, a provider of biometric identity management and secure authentication solutions, from Francisco Partners. Crossmatch’s portfolio of products includes biometric identity management hardware and software that complement HID’s broad portfolio of trusted identity products and services. 6. BriefCam announces acquisition by Canon BriefCam, a global provider of video synopsis and deep learning solutions, announced its acquisition in May by Canon Inc., a global digital imaging solutions company. The addition of BriefCam to Canon’s network video solutions products portfolio complements the Canon Group’s previous acquisitions of Axis Communications and Milestone Systems. 7. Allied Universal acquires U.S. Security Associates Allied Universal, a security and facility services company, finalised its acquisition of U.S. Security Associates (USSA) in October, further building on its position in the security services industry. This acquisition includes Andrews International (including its Government Services Division and Consulting and Investigations and International Division) and Staff Pro. 8. Johnson Controls acquires Smartvue Corp. Johnson Controls announced in April that it had acquired Smartvue, a global IoT and video provider that empowers cloud video surveillance and IoT video services. The addition of the Smartvue cloud-based video platform will enhance Johnson Controls’ offering of an end-to-end, smart cloud-based solution that can provide superior business data and intelligence to customers and added value to partners. 9. ADT acquires Red Hawk Fire & Security (and others) ADT Inc.’s acquisition of Red Hawk Fire & Security, Boca Raton, Fla., was the latest move in ADT Commercial’s strategy to buy up security integrator firms around the country and grow their footprint. In addition to the Red Hawk acquisition, announced in mid-October, ADT has acquired more than a half-dozen security system integration firms in the last year or so. 10. Convergint Technologies continues to acquire Convergint Technologies announced in August the acquisition of New Jersey-based Access Control Technologies (ACT), bringing further electronic security systems experience to Convergint's service capabilities. Convergint has strategically grown its service footprint across the United States, Canada, Europe and Asia Pacific through strong organic growth and the completion of 18 acquisitions since early 2016. And it continues: Convergint announced acquisition of SI Technologies, Albany, N.Y., in November and Firstline Security Integration (FSI), Anaheim, Calif., in December. (And Convergint itself was acquired in February by private equity group Ares Management.)
The term Internet of Things (IoT) has almost been beaten to death at this point, as more and more security integrators, manufacturers and customers take advantage of the ability to increase connectivity between devices (and therefore take on the dangers this introduces). But the methods by which we interact with the IoT and protect its devices are still catching up, which means security manufacturers must take part in shifting their focus toward safeguarding data, engaging in vulnerability testing of products and incorporating stringent protections at every stage of the product development process. One small leak or breach on a single connected device can potentially cause significant damage across an organisation Who is responsible for IoT security? One small leak or breach on a single connected device can potentially cause significant damage across an organisation, creating a disruption within a company, affecting its assets, employees and customers. The continued question seems to be: Who is ultimately responsible for the security of IoT devices? In a recent survey from Radware, a provider of application delivery and cybersecurity solutions, there was no clear consensus among security executives when asked this question. Thirty-five percent of respondents placed responsibility on the organisation managing the network, 34 percent said the manufacturer and 21 percent chose the consumers using the devices as being primarily responsible. Several schools of thought exist for each: The Organisation It's not surprising that most people see the organisation as the main stakeholder for IoT security responsibility; after all, if a company is managing a network, one would expect it to protect the network as well. One way that the organisation can embrace this responsibility is by adopting a user-centric design with scalability, tactical data storage and access with appropriate identification and security features (for example, the use of multilevel authentication through biometrics in access control). Organisations must also use their IT team to strengthen the overall cybersecurity of the IoT by keeping up with the latest software updates, following proper data safety protocols and practicing vulnerability testing. The Manufacturer Manufacturers that provide IoT-enabled devices as part of a security system must be fully knowledgeable of the risks involved and effectively communicate them to the integrator or end user. Providing the education necessary and dedication to protecting users of its equipment makes a manufacturer more trustworthy and understanding in the eyes of an end user. Ensuring encryption between devices is a key step that manufacturers can take to work toward achieving complete protection in the IoT. The User Despite the protection delivered by the organisation and manufacturer, there's always the option for IoT security to be enhanced or possibly even diminished by the individual user. It's critical that best practices for data protection are in place every time an individual uses a device that is connected to the network. These include disabling default credentials, proper password etiquette, safe sharing of sensitive information and the instinct to avoid any suspicious activity or requests. Manufacturers that provide IoT-enabled devices as part of a security system must be fully knowledgeable of the risks involved The short answer to the responsibility question is this: everyone. Each sector has a responsibility to contribute to the protections needed for IoT-enabled devices. However, as a manufacturer, it is imperative that our teams think about each level of protection when developing products for public consumption, including how the organisation implements the technology and how the integrator engages in training with users. Organisations must also use their IT team to strengthen the overall cybersecurity of the IoT by keeping up with the latest software updates Manufacturer vulnerability testing One way that manufacturers can implement added protections against outside threats is by boosting their attention to security protocols in the product development stage. For some, this requires a different approach in the design and development of security systems. Identifying vulnerabilities is at the core of this. A security vulnerability in a product is a pattern of conditions in the design of a system that is unable to prevent an attack, resulting in weaknesses of the system such as mishandling, deleting, altering or extracting data. Increased connectivity makes these vulnerabilities more of a liability, as IP-enabled (or networked) devices are more likely to be breached by outsiders looking to permeate an organisation and collect valuable data. A security vulberability in a product is a pattern of conditions in the design of a system that is unable to prevent an attack, resulting in weaknesses of the systemWhile some of these hacks are a little more “simple” in nature — such as outsiders trying to guess a password using manufacturer-set passwords — others are more complex, such as a denial-of-service, where attackers attempt to overload the system by flooding the target with excessive demands and preventing legitimate requests from being carried out. This makes it virtually impossible to stop the attack by blocking a single source. As a result of these potential threats — and to help manufacturers deliver best-in-class products — it's imperative that vulnerability testing is done throughout a product's development, starting at phase one in the process. This includes analysis of the type of cyberattacks that can potentially attach, breach and disable a system. Many manufacturers attempt to hack their own products from within the organisation — or even go as far as hiring a third-party professional group to do it for them. Success in a volatile technology landscape This kind of development puts a product through rigorous levels of testing, and once weaknesses are exposed, they can be patched up and the cycle of attack-and-defense can take place until the product is protected fully and ready for market. Skipping this step in the development process can open manufacturers up to significant liability, so it's important for this testing to take place and corrective actions be taken to rectify gaps in security. The more extensive an organisation's security testing approaches are, the better are its chances of succeeding in an increasingly volatile technology landscape. But the testing doesn't stop in the development stage. Attacks on a system continue long after the product has been introduced to market, requiring continued updates to be made available in an effort to protect customers. Manufacturers are tasked with implementing further firmware updates to keep a product in the field readily prepared to revoke the latest critical bugs that can affect the market. What end users demand from security We're seeing a significant shift in the education and demand from a customer perspective. In the past, consumers took the advice of integrators and consultants as far as the “right” security systems to install for their needs. Today, the self-education of end users is on the rise as more and more IT departments become involved in the selection and investment of physical access control systems. We're seeing a significant shift in the education and demand from a customer perspective A larger number of end users are demanding security products that meet IT standards of network protection, and they take these considerations into account when working with integrator partners on the selection of systems to meet their needs. As a result, manufacturers are tasked with not only developing robust IoT-centric products, but also continuing to be involved on a regular basis in an effort to continuously keep organisations safe. A comprehensive security strategy from manufacturers must involve multiple levels of product selection, testing and integration — centered on the team-based approach to implementing training and protocols within an organisation. While manufacturers are stepping up their game in the development of robust products, this remains a team effort that must be addressed every week — not something you implement, then forget about. The safety of data — and the entire organisation — depends on it.
From satellite imagery to street views to indoor mapping, technology has disrupted our past world. This has left us dependent upon new ways to visualise large spaces. This new world has brought many benefits and risks. But what does that mean for the security professional or facility manager today and what technologies can be used to secure buildings and improve facility operations? A brief history of 3D technology Starting May 5, 2007 (inception 2001), Google rolled out Google Street View to augment Google Maps and Google Earth; documenting some of the most remote places on earth using a mix of sensors (Lidar/GSP/Radar/Imagery). The mission to map the world moved indoors May 2011 with Google Business Photos mapping indoor spaces with low cost 360° cameras under the Trusted Photographer program. In the earlier days, 3D scanning required a high level of specialisation, expensive hardware and unavailable computing power With the growth of 3D laser scanning from 2007 onwards, the professional world embraced scanning as effective method to create digitised building information modelling (BIM), growing fast since 2007. BIM from scanning brought tremendous control, time and cost savings through the design and construction process, where As-Built documentation offered an incredible way to manage large existing facilities while reducing costly site visits. In the earlier days, 3D scanning required a high level of specialisation, expensive hardware, unavailable computing power and knowledge of architectural software. Innovation during the past 8 year, have driven ease of use and lower pricing to encourage market adoption. Major investments in UAVs in 2014 and the commercial emergence of 360° photography began a new wave of adoption. While 3D scanners still range from $20K – $100K USD, UAVs can be purchased for under $1K USD and 360° cameras for as low as $100. UAVs and 360° cameras also offer a way to document large spaces in a fraction of the time of terrestrial laser scanners with very little technical knowledge. Access to building plans, satellite imagery, Google Street View, indoor virtual tours and aerial drone reconnaissance prove effective tools to bad actors The result over the past 10+ years of technology advancement has been a faster, lower cost, more accessible way to create virtual spaces. However, the technology advances carry a major risk of misuse by bad actors at the same time. What was once reserved to military personal is now available publicly. Access to building plans, satellite imagery, Google Street View, indoor virtual tours and aerial drone reconnaissance prove effective tools to bad actors. Al Qaeda terror threats using Google Maps, 2007 UK troops hit by terrorists in Basra, 2008 Mumbai India attacks, 2016 Pakistan Pathankot airbase attacks, ISIS attacks in Syria using UAVs, well-planned US school shootings and high casualty attacks show evidence that bad actors frequently leverage these mapping technologies to plan their attacks. The weaponization of UAVs is of particular concern to the Department of Homeland Security: "We continue to face one of the most challenging threat environments since 9/11, as foreign terrorist organisations exploit the internet to inspire, enable or direct individuals already here in the homeland to commit terrorist acts." Example comparison of reality capture on the left of BIM on the right. A $250 USD 360° camera was used for the capture in VisualPlan.net software What does this mean for the security or facility manager today? An often overlooked, but critical vulnerability to security and facility managers is relying on inaccurate drawing. Most facilities managers today work with outdated 2D plan diagrams or old blueprints which are difficult to update and share.Critical vulnerability to security and facility managers is relying on inaccurate drawing Renovations, design changes and office layout changes leave facility managers with the wrong information, and even worse is that the wrong information is shared with outside consultants who plan major projects around outdated or wrong plans. This leads to costly mistakes and increased timelines on facility projects. Example benefits of BIM There could be evidence of a suspect water value leak which using BIM could be located and then identified in the model without physical inspection; listing a part number, model, size and manufacture. Identification of vulnerabilities can dramatically help during a building emergency. First Responders rely on facilities managers to keep them updated on building plans and they must have immediate access to important building information in the event of a critical incident. Exits and entrances, suppression equipment, access control, ventilation systems, gas and explosives, hazmat, water systems, survival equipment and many other details must be at their fingertips. In an emergency situation this can be a matter of life or death. Example benefit of reality capture First Responders rely on facilities managers to keep them updated on building plans A simple 360° walk-through can help first responders with incident preparedness if shared by the facility manager. Police, fire and EMS can visually walk the building, locating all critical features they will need knowledge of in an emergency without ever visiting the building. You don’t require construction accuracy for this type of visual sharing. This is a solution and service we offer as a company today. Reality capture is rapidly becoming the benchmark for facility documentation and the basis from which a security plan can be built. Given the appropriate software, plans can be easily updated and shared. They can be used for design and implementation of equipment, training of personnel and virtual audits of systems or security assessments by outside professionals. Our brains process visual information thousands of times faster than text. Not only that, we are much more likely to remember it once we do see it. Reality capture can help reduce the need for physical inspections, walk-throughs and vendor site-visits but more importantly, it provides a way to visually communicate far more effectively and accurately than before. But be careful with this information. You must prevent critical information falling into the hands of bad actors. You must watch out for bad actors attempting to use reality capture as a threat, especially photo/video/drones or digital information and plans that are posted publicly. Have a security protocol to prevent and confront individuals taking photos or video on property or flying suspect drones near your facility and report to the authorities. Require authorisation before capturing building information and understand what the information will be used for and by who.There are a number of technologies to combat nefarious use of UAVs today Nefarious use of UAVs There are a number of technologies to combat nefarious use of UAVs today, such as radio frequency blockers and jammers, drone guns to down UAVs, detection or monitoring systems. Other biometrics technologies like facial recognition are being employed to counter the risk from UAVs by targeting the potential operators. UAVs are being used to spy and monitor for corporate espionage and stealing intellectual property. They are also used for monitoring security patrols for the purpose of burglary. UAVs have been used for transport and delivery of dangerous goods, delivering weapons and contraband and have the ability to be weaponised to carry a payload.Investigating reality capture to help with accurate planning and visualisation of facilities is well worth the time The Federal Aviation Administration has prevented UAV flights over large event stadiums, prisons and coast guard bases based on the risks they could potentially pose, but waivers do exist. Be aware that it is illegal today to use most of these technologies and downing a UAV, if you are not Department of Justice or Homeland Security, could carry hefty penalties. Facility managers must have a way to survey and monitor their buildings for threats and report suspicious UAV behaviours immediately to authorities. At the same time, it’s critical to identify various potential risks to your wider team to ensure awareness and reporting is handled effectively. Having a procedure on how identify and report is important. Investigating reality capture to help with accurate planning and visualisation of facilities is well worth the time. It can help better secure your facilities while increasing efficiencies of building operations. Reality capture can also help collaboration with first responders and outside professionals without ever having to step a foot in the door. But secure your data and have a plan for bad actors who will try to use the same technologies for nefarious goals.
There is a new event on the calendar for the security industry in 2019: The Security Event 2019, 9-11 April, at NEC, Birmingham. For additional details and a preview of the new trade show and conference, we spoke with Tristan Norman, Founding Partner and Event Director, The Security Event. Q: It seems recently that some trade shows have been on the decline in terms of exhibit size and attendance. Why does the physical security industry need another trade show? Norman: I think there are numerous factors that play into the decline of trade shows in general and not something that is limited to the security industry. Those events that are suffering are no longer serving their target market or have failed to adapt to the changes in the industry they serve. However, what we are seeing now is the rise of focused, more “evolved” trade events which fulfil a gap in the industry event calendar and provide something new and fresh to a disillusioned audience. Q: What will be unique about The Security Event, and what role will it serve in bringing together buyers and sellers in the market? Where (geographically) will attendees come from? What we are seeing is a rise of trade events which provide something fresh to a disillusioned audience Norman: The driving ethos behind The Security Event is that we are “designed by the industry, for the industry.” We were able to start with a blank canvas and take onboard all the feedback from stakeholders throughout the security buying chain and create an event that is sustainable and fit for purpose. We see the role of the event as a very important one – to truly reconnect the currently fragmented UK commercial security industry, back at the NEC in Birmingham. We had originally anticipated that this would be an almost-exclusively UK event in year one. However, we have seen significant interest from potential visitors from across the wider EMEA region who are keen to do business in the UK. We formed a strategic alliance with Security Essen to help facilitate and strengthen our reach in these regions through additional marketing and PR activities. Consequently, early registrations indicate that it will be approximately an 80% UK and 20% international split. Q: What conference programming is being planned to augment the trade show event? Norman: Content will be delivered across three focused theatres, serving the needs of our audience throughout the buying chain. Emphasis will be placed on the latest technology innovations impacting the industry, practical advice on the most pressing issues facing security technicians, and important industry updates and insights. All sessions are focused on delivering tangible benefits to ensure professionals are equipped to stay relevant and to grow their business and we’re excited to be working with key industry bodies, innovators and experts to deliver the programme. We look forward to announcing those in coming weeks. Exhibitors want to re-engage with the thousands of industry colleagues who no longer attend other events on offer Q: Comparisons to IFSEC are inevitable. How will The Security Event be different than the IFSEC Security and Fire shows? What are the advantages of locating at Birmingham NEC? Norman: Both The Security Event and The Fire Safety Event, based at the NEC are completely different to any other trade show in the UK. We pride ourselves in creating a business platform that puts the exhibitors’ needs first, by limiting the size of stands and total number of exhibitors as well as creating a comprehensive CPD accredited educational programme for the visitors. Q: Which big industry players are supporting the launch of The Security Event, and what feedback are you hearing in terms of why they signed up at the show's inception? If a global manufacturer has a footprint in both the US and Europe, any tradeshow will be managed locally Norman: Our founding partners are Assa Abloy, Avigilon, Anixter, Comelit, Dahua, Honeywell, TDSi, Texecom, Tyco and Videcon. The full list of exhibitors and supporting partners can be found on our website. The reasons why they have signed up are very simple. They all see the exact same gap in the industry event landscape as we do. We believe there is a need for a 3-day channel focused commercial security exhibition based at The NEC in Birmingham. Our exhibitors want to re-engage with the thousands of industry colleagues who no longer attend the other events on offer. Q: Your 2019 show will be the same week as ISC West in Las Vegas. Do you think the competitive calendar will be a factor? Norman: In terms of our both our audience and our exhibiting base there is very little overlap with ISC West. Generally, if a global manufacturer has a footprint in both the US and Europe, any tradeshow will be managed locally so we haven’t observed any issues so far. We do acknowledge that having two shows at the same time globally isn’t ideal and we have moved our dates in 2020 to the 28-30 April to mitigate this going forward. The Security Event 2020 will not clash with Las Vegas' ISC West 2020 as it will in 2019, says Norman Q: How will you measure success in the first year of the show? What measurements (show size, number of attendees, exhibitor feedback, etc.) will constitute a "successful" first year for the show?Security Event will continue to evolve year after year, but will intent to stay true to the event's original concept Norman: Great question – the most important barometer of success for me and the team next April is the general industry reaction, after all, this show was created for them. Furthermore, it is vital to us that our exhibitors feel they have achieved their objectives for the show, whether it be quality, quantity of leads or raising awareness of a new product launch. We’ll also be keen to understand how satisfied visitors are with the event, including their views of the content, access to new products/services, effectiveness of the out of hours networking, etc. We are anticipating 6,000 visitors over the 3 days and I believe if we achieve this goal, we will have a strong rebooking on site, laying a great foundation for our 2020 event. Q: How would you expect/hope the show would continue to evolve in coming years? Norman: I hope over the next few years The Security Event cements itself as the industry’s favourite trade show and that exhibitors and visitors alike look forward to every year for both the business opportunities at the event and the networking outside of it. The Security Event will continue to evolve year after year, but I am determined that we stay true to our original concept and the principles on which the show was founded. After all, it is this formula that has proved to be so popular to date.
More good news for exhibitors on the second day of the Global Security Exchange (GSX) in Las Vegas. Brisk attendance continued early in the day, and then slowed somewhat in the afternoon, but most comments from exhibitors were positive. Exhibitors such as Lenel were “thrilled” with the show, and noticed the steady, good traffic and lots of sales leads. Lenel’s position at the front of the hall probably helped. New developments in mobile credentialing are a big trend at GSX, and Lenel’s BlueDiamond mobile credentials are traveling on a new path, so to speak. The access control company is introducing the idea of “Pathways” as a way of automatically signaling intent to a Bluetooth-enabled smart phone to open a door. A recognisable “pathway” is programmed into the phone, based on signals from nearby readers and locks and also geolocation signals. The system recognises when a user travels along the pathway and automatically signals the correct door(s) to be opened along the way without the user having to touch his smart phone.A recognisable “pathway” is programmed into the phone, based on signals from nearby readers, locks and also geolocation signals Providing a lightweight alternative “When you trigger a pathway, it’s signalling intent to open the door,” says Greg Berry, Vice President Mobile Credentialing, Global Security Products, for United Technologies, parent company of Lenel. “Pathways are customised to a user’s needs and are the common places you are going all the time.” A user who walks the same path daily to the door of an office will find that door opens automatically. Previously using mobile credentials has been “slightly more work than using a badge,” says David Weinbach, Manager of Identity and Product Innovation for Lenel. “Now with Pathways, it’s less work than using a badge.” Specifically, a user no longer has to take out his phone and push a button to signal intent. “Rather than trying to emulate the badge, you create an experience that is better than the badge,” adds Berry. “We want to change the paradigm and turn the market on its ear.”New browser-based clients are being released with each new version of OnGuard software Other news from Lenel includes the release of more mobile and browser-based clients for OnGuard to be used for greater convenience alongside the Window-based clients. Providing a “lightweight” alternative enables some of the functionality of the Windows client in a format that is easy to access on the go. New browser-based clients are being released with each new version of OnGuard software. Cloud-hosted systems using Microsoft Azure are also among the plans for OnGuard, which ultimately will offer on-premises and cloud options. There’s not much comment from the Lenel folks about their parent company United Technologies’ plan to acquire S2 Security, which was announced days before the show. They would only say that the acquisition is waiting for regulatory approval, and that the expectation is that the two companies’ products will be complementary, given S2’s focus on the SMB (small and medium-sized business) market and Lenel’s strength at the enterprise level. The acquisition strategy is to grow both businesses. More details to come about the new combined company. Modern network infrastructure NVT Phybridge, a PoE connections company located near the back of the hall, also reported steady booth traffic on Day 2. “There are lots of customers and partners here,” said Steven Fair, Executive Vice President. “We are pleased with the quality of people, but not overwhelmed with the quantity.” FacePRO AI facial recognition is used for real-time searches of terror suspects or criminals throughout a location NVT Phybridge, which provides IP networking products for the telephony industry as well as security, is focused on networking concepts at GSX, in particular the changing requirements for network infrastructure in the age of IoT. We are pleased with the quality of people, but not overwhelmed with the quantity.” Fair uses the term “Modern LAN” to describe the new, changing requirements and in consideration of the specific networking needs of each edge device, whether cameras, sensors, or door access control devices. “Start with the edge device — what does it need from the network? What are its needs and have there been any innovations to enable you to connect to the network more economically?” asks Fair. There is also a green aspect to designing network infrastructure. Can existing equipment, such as coaxial or single twisted-pair cabling, be used, and thus save on disposal costs of the used cabling as well as lowering installation costs? Among NVT Phybridge’s offerings that can serve the changing networking needs in the IoT era is Smart Path PoE, which offers smart power, smart network access and secure connections. The CLEER family of products provides ethernet over existing coaxial cabling to enable easy transition from analogue to IP cameras. The PoLRE products supply ethernet and power to travel over a single unshielded twisted pair cable with reach over 400 metres. The products have been used recently to transition a series of cruise ships from analogue to IP video without having to replace cabling and spending only two days in dry dock for the installs. A new focus away from AI Panasonic is looking to apply AI-based capabilities to vehicle recognition in the near future, with the ability to identify vehicle characteristics Deep learning and artificial intelligence (AI) seem to be taking a lower profile at this show, perhaps signaling the end of the hype. Companies that mention AI point to specific products that use the technology and are currently available. For example, Panasonic is featuring its FacePRO AI-based facial recognition system. The system uses face images captured from video — grabbing up to 30 to 35 faces a second as video is recorded. The system saves the best of those face images, eliminating extensive duplication, as thumbnails, which are linked to the video footage where the faces appear. To find video in which a face appears, the operator merely drags-and-drops the thumbnail image and commands the system to “go fetch” video that contains that face. The system then produces a timeline showing where the face appears in the feed from each video camera on the premises, so an operator can track the movements of a suspect throughout a facility. The tool helps to simplify and shorten the workflow of locating a suspect in real-time and is affordable for a wider range of uses beyond the traditional airports or high-end applications. The FacePRO software is offered on any Panasonic camera, and works with a separate FacePRO server that is integrated with the video recorder. The system can be added easily to existing systems and is useful for such applications as real-time searches for terror suspects or other criminals throughout a location. Panasonic is also looking to apply AI-based capabilities to vehicle recognition, too, in the near future, with the ability to identify vehicle characteristics such as color, type of vehicle and direction of travel. On the VMS side, Panasonic is transitioning its Video Insight software to a modular approach, tailoring solutions for a growing range of vertical markets, such as transportation and retail, all using “plug-ins” that enhance operation of Video Insight software. No additional license fees are involved That’s just a sampling of what I saw on Day 2 of the show. I have more to share in a final show report, including what I see tomorrow on the final (shortened) day.
The Global Security Exchange (GSX) seems smaller this year, which is not surprising given the absence on the show floor of several big companies such as Hikvision and ASSA ABLOY (although their subsidiary HID Global has a big booth). A trend affecting the number of companies exhibiting at GSX 2018, and other trade shows, is industry consolidation, which is impacting the show even beyond the fewer exhibitors this year in Las Vegas. GSX is the new branding for the trade show formerly known as ASIS. There was an impressive crowd of visitors waiting for the show floor to open Tuesday morning; the conference part of the program began on Monday. After the attendees filed through the doors, the foot traffic seemed brisk throughout the morning, and was somewhat steady until the end of the first day. Exhibitors as a whole seemed pleased with the first day and cautiously optimistic about the rest of the show. Acquisitions and consolidation HID Global announced on the first day that they will acquire Crossmatch - emphasising the impact of consolidation Emphasising the impact of consolidation on the industry as a whole, and on this show, was an announcement from HID Global on the first day that they will acquire Crossmatch, a biometric identify management and secure authentication solutions provider. It’s a comparatively large acquisition for the company specialising in trusted identity solutions. Just days earlier, another acquisition also seemed to confirm the trend when UTC Climate, Controls and Security — the owner of Lenel — announced an agreement to acquire S2 Security. The fruits of another recent acquisition was on display at the GSX 2018 hall, where Isonas took its place near the front entrance as part of the Allegion booth, just three months after the global security provider acquired the ‘pure IP access control company.’ Isonas is well positioned in two of the three fastest growing segments of the access control market — IP hardware, which is growing 41 percent per year globally, and access control as a service, or ‘cloud’ technology, which is also outpacing the overall access control market. Allegion also has the third fast-growing segment, wireless locks, covered with its Schlage brand. "New avenues of growth" The early days of new ownership is opening fresh opportunities for both organisations as Allegion seeks to leverage Isonas’ intellectual property and the smaller company finds new avenues of growth in the larger organisation, says Rob Lydic, Isonas Global Vice President of Sales. Motorola joined Avigilon in a higher profile role at their booth, emphasizing consolidation in the industry Lydic sees a likelihood of additional acquisitions in the near future in the security space, given the large amount of capital currently available to be deployed, and the large number of entrepreneurial companies looking to make the leap, as Isonas did, from a small booth at the back of the hall to front-and-center as part of a big industry player. Another reflection of consolidation: Motorola Solutions is taking a much higher-profile role in the Avigilon booth. In addition to signage, ownership by Motorola is also impacting the Avigilon product offerings. For example, the Motorola Ally security incident management and communications system has been integrated with Avigilon’s analytics-based event detection, and is being positioned to serve the enterprise market. The system simplifies security operations with a single platform that allows access to critical data, including video and access control systems, directly from any web-enabled device. Another reflection of consolidation: Motorola Solutions is taking a much higher-profile role in the Avigilon booth Avigilon is displaying Motorola Solutions’ CommandCenter Aware integrated with Avigilon’s systems for use with public safety applications to provide dispatchers and intelligence analysts with video feeds, incident details, alerts, data mapping and responder location. Avigilon has also integrated its AI-driven Appearance Search technology with its Access Control Manager system, so video searches can be performed based on a badge credential. The system can automatically pull up any information, whether video or events in the access control system, based on the badge information. It can also be used to search for lost badges, or to view where a person is located in the building. Avigilon introduced an AI appliance that allows existing cameras to be integrated with Appearance Search The company introduced an AI appliance that allows existing (non-Avigilon) cameras (up to 20 two-megapixel cameras) to be integrated with Appearance Search. Also, the next generation of analytics allows detection of more things, such objects a person may be holding, or detection based on what they are wearing. The growth of the cannabis market Although attendees at GSX are generally understood to be more end users than integrators, Joe Grillo, CEO of ACRE, the parent company of Vanderbilt Industries and ComNet, says he sees little difference in attendees at GSX compared to the ISC West show in the spring. “We see all our resellers here,” he says. Grillo noticed that Day One booth traffic was “not consistently busy, but steady.” Grillo says ACRE expects to be active again soon in the mergers and acquisitions market. The company has grown through six acquisitions since its founding, and has had one divestiture (when it sold Mercury Security to HID last fall). Since selling Mercury, ACRE has been ‘back in the buying mode,’ just looking for the right opportunity, says Grillo. New markets are a theme at GSX, and one of the biggest new opportunities is the cannabis industry. Marijuana has been legalised in dozens of U.S. states, and Canada is on the verge of legalising the drug. March Networks works with multiple cannabis operators to provide video solutions, point-of-sale transaction data, and customer analytics March Networks is among the companies targeting the cannabis industry in a big way. Already across the U.S., March Networks works with multiple cannabis operators to provide video solutions, point-of-sale transaction data, and customer analytics. The business intelligence solutions also aid compliance in the highly-regulated industry. March Networks provides radio frequency identification (RFID) tag to track plants throughout the channel, and tracking is integrated with video systems to provide correlated video views. A couple of exhibitors mentioned to me the need for commercial companies to deploy a comparable level of automation as their employees are accustomed to in the smart home environment. That suggests a need for things such as smartphone integration and voice commands. One exhibitor putting its toe in the water is Hanwha Techwin, which showed an Amazon Echo device used to control a video management system (VMS) with voice commands. Could the simple integration be a preview of the future of control rooms, where security officers merely talk to their equipment rather than operating controls? We’ll be talking to more companies (and maybe a few machines) on Day Two of the show, and will be reporting what we hear.
Primark, the international retailer that offers Amazing Fashion at Amazing Prices, is using Traka’s dock door and intelligent management solutions to ensure maximum efficiency and safety across its warehouse and distribution centres. Primark operates from eight distribution centres. Its most recent opening was in Islip, Northamptonshire, UK covering 1.1 million sq. ft. of space – the equivalent of 17 football pitches. It has 13 miles of aisles and is a 24/7 operation powered by over 250 committed employees. A key part of Primark’s success is its efficient distribution of goods to store to meet growing customer demands. This is a complex operation involving the use of a wide range of technology. Traka DockSafe door dock solution To ensure effective turnaround times, Traka’s multifunctional DockSafe door dock solution was installed to stop vehicles prematurely leaving Goods Out Bays, alongside intelligent key management systems. Traka supports Primark’s distribution centres with its DockSafe solution and key management systems" David Flavell, Primark’s Operations Development Manager – Supply Chain said: “Primark’s products fly off the shelves and rails, so we need to get our products from suppliers to stores as quickly and as safely as possible. Implementing the Traka DockSafe has been critical here. Not only is it simple to use, but also provides data on driver activity and bay usage, as well as increased peace of mind thanks to the prevention of driveways. It ensures the system runs like clockwork, which is great news for our colleagues whilst working hard to deliver Amazing Fashion to our customers.” DockSafe combination with iFob technology Traka’s intelligent DockSafe solution has been exclusively designed to stop vehicles prematurely leaving the Goods Out bays of a busy distribution centre. DockSafe combines Traka’s iFob technology with a unique Susie lock to create a robust protocol where a vehicle must be immobilised prior to the loading dock door being opened. Once goods are loaded, the door must be closed and the loading bay clear of forklifts or personnel, before the vehicle can be unlocked and driven away. Steve Bumphrey, UK Sales Director added: “Traka supports Primark’s distribution centres with its DockSafe solution and key management systems. With advanced features and data reporting, it ensures its people can optimise loading bay planning for long-term efficiency and productivity, in a safe and secure working environment.”
A chain of one-stop shopping destination is one of the pioneers of discount shopping center in the UAE and Dubai. With a selected chain of suppliers, they offer the widest choices of products at very affordable prices. The products of this retail chain range from daily food items to beauty products and perfumes. Household items such as kitchenware, tableware, appliances, decors and electronics including mobile phones and computer accessories are also available here. The store offer apparels such as ladies wear, menswear, and children’s wear, in addition to shoes, bags, school and office supplies. Branches of this retail chain are located in more than eight locations with the one in Sharjah being the biggest branch till date. Easy attendance management Since branches of this retail chain are spread across UAE, managing attendance of every employee became a tedious task. Moreover, keeping track of each of their IN and OUT timings, overtime, leaves, and shift management for multiple locations from a single location was another challenge the retailer faced. Attendance management, multiple shift management and over time calculation became tricky challenges to deal with. Apart from that, they required specific type of reports to map everything department or location wise. Matrix offered its dynamic range of biometric hardware products along with the software solutions to complement the devices Matrix offered its dynamic range of biometric hardware products along with the software solutions to complement the devices. As the retail chain is an exponentially growing company building stores at several locations, Matrix offered its Time-Attendance module along with fingerprint and card based door controller, COSEC DOOR FOT. This solution assisted in easy attendance management of employees along with their shift and overtime management. Analysis of employees’ attendance The solution also allowed generation of several specific types of reports with detailed filtering options for smooth process and analysis of employees’ attendance details. Matrix People Mobility Management solution assisted the retail chain achieve following results: Centralised Attendance Management and Monitoring Easy Shift & Schedule Management Elimination of Overtime Issues Smooth HR Process with Various Precise Reports The products used for providing solutions: COSEC DOOR FOT - Fingerprint and Card based Door Controller for Time-Attendance COSEC CENTRA ME - Application Server Platform with 500 or more Users and Expandable up to 1,000 Users COSEC ME TAM - Time-Attendance Module for 500 or more Users COSEC USER100 - User license for 100 users
Traditionally, many stores have used an assortment of tags and labels on a diverse range of merchandise, most of which were designed for an entirely different set of products. As a result, many apparel retailers have recognised that in some instances merchandise and textiles are being damaged. Checkpoint Systems, renowned supplier of source-to-shopper solutions, has therefore developed an innovative new anti-theft solution to meet their specific requirements – Mini NeedleLok. Mini NeedleLok anti-theft solution Designed to protect all types of garments, including very thin fabric, the one-piece solution deters thieves while preventing damage that would usually occur on application of pinned security tags. Whilst other products on the market feature a hinged mechanism which can snag and rip textiles, Mini NeedleLok uses a needle in place of a separate pin, which separates the fibres rather than breaking through them. This allows store assistants to gently spread fabric threads on application to avoid leaving a visible hole after removal. In order to reduce time spent on in-store tagging labour, the Mini NeedleLok mechanical design allows quick and easy application, whilst the solution’s wide opening also allows freedom of placement anywhere on the garment. Minimum product damage risk The Mini NeedleLok speeds up the self-checkout process The Mini NeedleLok also speeds up the self-checkout process. It can be removed quickly and efficiently at the point-of-sale, thanks to its single-piece design and wide opening, enabling store associates to assist with other enquiries, improving the in-store customer experience. It also eliminates the risk of damage to the merchandise, or injury to the customer, as the needle is never exposed. Not only that, with 70% of purchase decisions made at the shelf, Mini NeedleLok has been designed with display in mind. Its sleek look and smart black colour ensures it doesn’t impede on the garment’s aesthetics in order to help turn a browser to a buyer. For those retailers wishing to take their visual merchandising a step further, the solution can also be customised, from adding a logo to a bespoke colourway that matches the company’s branding. Anti-theft retail solution Irene Fernandez, Product Management Europe at Checkpoint Systems, commented: “We’re more customer focused than we have ever been in our history, which is demonstrated through the diverse range of solutions that we now offer retailers across a variety of markets. With the Mini NeedleLok, we took our existing technologies and created a product that fits our apparel customers’ requirements - an effective anti-theft solution that protects merchandise, with the added benefit of being customisable. This is ideal for fashion brands where aesthetic is crucial to their identity.”
Princeton Identity Inc., provider of the fastest, simplest and most secure biometric security systems on the market, announced that Alabama’s Auburn University has updated and expanded the biometric identity system it uses to secure areas within its athletic facilities. Princeton Identity’s new IDS software and Access200 iris readers allow student athletes, coaches and other affiliated team members enrolled in the system to unlock the doors to team locker rooms by glancing at small reader panels mounted outside each entrance. As athletes and coaches rarely carry personal items with them onto the field, the Princeton Identity system eliminates the need for access control cards, fobs, or PIN codes, which can be difficult to manually enter when carrying equipment. It also increases security. Biometric credentials make it impossible for students to share cards or codes with others, while the system’s convenience factor reduces the desire for students to leave doors propped open for easier access. Integration with OnGuard access control system The new IDS software is browser based, providing greater flexibility to school administrators responsible for enrolling students and managing the systemThe new IDS software is browser based, providing greater flexibility to school administrators responsible for enrolling students and managing the system. The system’s Access200e enrolment camera is a stand-alone unit that can be plugged into any network jack without need for special software or drivers, allowing enrolment to occur from any web-enabled device, including tablets and laptops. Permissions are handled through an integration with the University’s Lenel OnGuard access control system. When students leave a team or graduate, their permissions are turned off. However, as iris signatures remain stable over time, if students or staff return to the program – even years later – there is no need for re-enrolment. Their permissions are simply reactivated. System configuration, management and monitoring of the IDS system is handled through a web-based dashboard that provides Auburn’s IT staff with access to all devices, which are spread across multiple buildings on campus. Faster processing and superior software interface The new platform offers faster processing, a superior software interface, more features and greater flexibilityThe installation of new Princeton Identity hardware and software are an upgrade to the University’s legacy Princeton Identity system, which was installed in 2011. Since that time, the system has required almost no maintenance. The new platform offers faster processing, a superior software interface, more features and greater flexibility. Older readers will still be supported, allowing the University to preserve the value of earlier investments. Jeff Steele, Associate Director of Facilities and Operations, says “Reaction to the PI system has been overwhelmingly positive. When we give campus tours to prospective students and their parents, the moms and dads are most impressed with it – especially if they are parents of a female student-athlete. They can see that it’s a much stronger system than key or card access.” Jeff Kohler, Business Development Director at Princeton Identity, says “We are honoured to have Auburn University as a long-term partner and customer. Their adoption of Princeton Identity’s technology demonstrates a team committed to offering both security and convenience to its student-athletes and staff members.”
Globally-renowned Pay on Foot parking systems manufacturer, DESIGNA, has worked with the White Rose shopping centre in Rhyl, North Wales, to update its car parking system to the company’s advanced ABACUS software and equipment. Contactless card payment The installation included new state-of-the-art entrance and exit terminals accepting tap in/tap out contactless card payment technology After many successful installations abroad, the shopping centre is the first DESIGNA site in the UK to have installed its new tap in/tap out contactless credit card technology. The installation included new state-of-the-art entrance and exit terminals accepting tap in/tap out contactless card payment technology. There are also three full pay stations, a DBS server, manual pay station and intercom. All of this helps improve the efficiency and security of the car park, which is popular with shoppers due to its seafront location. As the first part of the shopping experience, the convenience and availability of a car park is crucial to the overall service and satisfaction of a customer. DESIGNA recognised this and developed ABACUS, an advanced car park access system that intelligently integrates various elements to create the ultimate system that is highly reliable and requires less maintenance. It can also cope with large volumes of traffic while providing the highest level of monitoring to ensure a secure parking environment. ABACUS car park access system The parking system is barrier controlled and makes use of DESIGNA barcode ticket technology. In addition to the standard ticket technology, the car park offers the facility to tap in/tap out using a contactless credit card. This operates with a unique identifier from the credit/debit card as a substitute for a ticket for the duration of the stay at the car park. When the customer presents a contactless card on entry, it recognises them and by tapping again at the exit it automatically calculates the tariff and allows payment to take place at the exit. The system has three pay on foot machines which accept coins, notes and credit cards. With more than 30 stores, White Rose shopping centre, Rhyl’s number one shopping destination, has a wide range of quality stores. Located in the centre of the town, White Rose is a short walk from Rhyl’s seafront, railway station and sea aquarium, and has direct access car parking for 300 vehicles. The centre previously had a chip coin solution installed on site. Advanced ticket machines The biggest advantage of having the DESIGNA system in place is the easy payment method" Sue Nash, Centre Manager at the White Rose commented, “The biggest advantage of having the DESIGNA system in place is the easy payment method. The advanced ticket machines make it possible to pay using several means, therefore reducing the problem of queuing at the pay machines and having to pay with change. Another payment option we now have is the facility to pay through mobile devices and via contactless cards.” She continued, “The majority of people move around with credit cards rather than cash and having a versatile payment option in the car park makes for a painless process. The maintenance of the system at our local level was extremely important to avoid costly and timely engineer callouts. Simple things like ticket and coin jams, system resets are now extremely easy to resolve as is the exchange of entry tickets when required. I would certainly recommend the DESIGNA system to others and we are extremely pleased with the results.” Car parking ease and convenience Specifier Andrew Bailey, of Parking Ideas, commented, “Parking Ideas is a complete car parking and transportation consultancy that helps institutions, property owners, landlords and managing agents develop and optimise their assets. I have worked with the White Rose shopping centre for a number of years and following a competitive tender found that DESIGNA’s systems best suited the client’s requirements.” He continued, “The ABACUS system is good value, commercially viable and ticked all the right boxes for the White Rose. It is very important to have the facility to pay by card, so the payment terminals having this feature are vital to the centre and have made all the difference to the running of the car park. Parking Ideas has been in the parking industry for more than 15 years, so we have worked with DESIGNA before and are very happy with the end result.” DESIGNA ticket terminals The car park’s entrance and exit are installed with DESIGNA In+ and Out+ ticket terminals so that using the site is fast and easy The car park’s entrance and exit are installed with DESIGNA In+ and Out+ ticket terminals so that using the site is fast and easy. The advanced terminals operate on the lowest energy consumption of their class with the ability to hold more tickets than before, with the bin adapting itself to the fill quantity. Customers are greeted with excellent user-friendliness due to the simplicity of the equipment and illuminated display with clear instructions. The four-way barcode readers also ensure visitors can insert their ticket any way round into any of the pay stations around the site. DESIGNA Pay on Foot machines For payment, three of DESIGNA’s new Pay on Foot machines are in place in the car park. This allows customers to pay for their visit before returning to their car and exit the car park more quickly. The pay station is deliberately designed to allow disabled customers to pay freely without assistance. Each of the pay stations is installed with an interactive monitor that makes it easy to pay and offers several different languages. Shopping centre management has full control of the ABACUS system through the DBS server, with a manual pay station (MPS) to allow them to create or override payments. The control room also links with the ticket and payment terminals via a DESIGNA VoIP Intercom to assist customers if required. Global implementation DESIGNA has more than 15,000 systems installed globally across a wide range of car park situations DESIGNA’s parking systems are used in a number of impressive shopping centres around the world. These include the Dundrum shopping centre in Dublin, the Mid Valley Megamall in Malaysia and the Mall of Emirates in Dubai. In the UK the Belfry shopping centre in Redhill, the Woolshops shopping centre in Halifax and the Wellgate centre in Dundee have also benefited from the ABACUS system. Recognised worldwide for its high quality and intelligent systems, DESIGNA has more than 15,000 systems installed globally across a wide range of car park situations, including shopping centres, airports and hospitals. ABACUS is one of the company’s innovations and demonstrates the endless possibilities available to car park operators. The future-proof technology allows for expansions of premises or new property acquisitions by allowing additional systems to be added to the network. In its many global applications, ABACUS has proved to be an effortless system for both operators and users and is a great investment for companies looking to the future.
Comelit has worked sensitively on site at Rathview Mental Health Facility, to supply door entry solutions to ensure a therapeutic and safe environment is created for the benefit of residents, staff and visitors. Comelit door entry solutions Situated on a rural greenfield site on the outskirts of Omagh, Rathview Mental Health Facility is a new c£2.8 million, 1169m² site that contains a twelve-bed Discharge Unit and a six-bed Recovery Unit, arranged around two central courtyards. With its innovative design, the unit aims to increase the range of community-based mental health services available in Northern Ireland. Owned by The Western Health and Social Care Trust and designed by award winning Todd Architects, Comelit worked sensitively with electrical consultants on site, WYG Belfast, from the tender process to project completion, understanding the full specification requirements from the entrance through staff stations and concierge resources. Healthcare security and safety Comelit was specified through evidence of its understanding of the site requirements, along with the system being IP based, hence highly flexible and configurable" Says Gary Hewitt, Consultant at Chubb NI Ltd, who worked on Rathview Mental Health Facility: “This was an incredibly sensitive works program, where the design of the building was not just important from an aesthetic perspective, but also to ensure a positive impact on the recovery process for residents; and for staff to operate in an environment where they feel safe and secure.” “Comelit was specified through experience and evidence of its understanding of requirements on site, together with the system being IP based, hence highly flexible and configurable. These elements came together to allow for residents to experience independence in a domestic environment, with autonomous access to their accommodation.” 316 Sense panels In total, Comelit was specified for the door entry systems for all four entrance points to the facility, and a total of four 316 Sense panels installed, along with two staff stations and a concierge unit. Each of the twelve apartments were fitted with a pull cord and emergency response button, cabled into Comelit’s Mini handsfree monitors. Designed to operate through Comelit’s innovative VIP system, it utilises the Security Systems Network and allows a priority call to the concierge in case of emergency. Patients, staff and visitors’ safety Mike Campbell, Business Development Manager at Comelit Group UK concluded: “Rathview is an important development in the context of provision of mental health facilities across Northern Ireland, where every part of the site is seen as potentially having therapeutic value. We have worked in partnership with the consultants on site to create a door entry solution that can ensure a balance of a welcoming, encouraging environment, whilst maintaining the safety and security of residents, visitors and staff.”