Sargent and Greenleaf (S&G), renowned manufacturer of high-quality mechanical and electronic locks, has announced the release of its Digital Vault Lock solution. Through a secure online interface and user-friendly software, this static code, electronic time lock allows for increased flexibility and security for convenient vault access. Digital Vault Lock Combining an attack-resistant lock case and enhanced features to protect against a variety of threats – vibration, bouncing a...
GET Group North America, global provider of end-to-end solutions for secure credentials with over 20 years of experience in identity management, has announced a partnership with Secure Planet, an I3 affiliated company, which provides facial recognition-based solutions of the highest overall quality, security, and value to U.S. Government, industry and commercial clients. Under the terms of the agreement, Secure Planet’s cutting-edge facial recognition technology will be incorporated in sel...
emaratech, a technology and management consulting company which is part of the Investment Corporation Dubai (ICD), is capitalising on its strong participation in the 2019 edition of Airport Show to showcase its collection of cutting-edge technology products, with the key highlight being the Smart Corridor, a first of its kind in the world product that is helping authorities in effective border control and ensuring seamless passenger experience at airports. As the pressure to effectively handle...
In the past, biometrics solutions for access control were often deployed with reduced security thresholds because their imaging technology, which routinely yielded false fingerprint rejections, resulted in long authentication lines at the door. HID Global, a global provider of trusted identity solutions, announced its new fingerprint reader that merges credential excellence with HID’s globally-patented multispectral imaging technology to address this issue and fuel broad adoption of biome...
Matrix, a manufacturer and provider of telecom and security solutions, is conducting Matrix Insight 2019 Jeddah and Riyadh on 18th and 22nd April respectively from 09:00 AM to 12:30 PM. Matrix welcomes everyone in the telecom and security industry from new prospects, strategic partners to existing customers and suppliers. At the event, Matrix will highlight ETERNITY NENX, newly launched unified communication platform for SOHO and SMB. Increasing number of small and medium organisations are migr...
Senstar, global company that offers perimeter protection and VMS solutions, is slated to showcase latest access control and intrusion detection solutions, including next-gen Senstar Symphony Access Control (AC) and the FiberPatrol FP400 zone-based intrusion detection systems for fence applications at ISC West 2019. Symphony AC access control Symphony AC is an open software solution designed to support the industry’s most trusted brands of access control and intrusion hardware. Available...
Linx International Group, the global provider of security, risk management, consultancy and training services, has announced the appointment of Group Marketing Manager, Jerry Alfandari and Marketing Coordinator, Victoria Carter. Video production experts Fluent in both English and German, Jerry Alfandari has a proven track record managing international marketing campaigns, including social and digital content strategies. He is joined by Victoria Carter, who brings her expertise in social media, public relations and video production to the team. Jerry comments on his appointment: “I am excited to be part of a team that is working with security practitioners at all levels around the world, to develop and launch new courses, along with innovative training methods.” Victoria adds: “Training and education has always been central to my own career progression, so I am excited to be joining a company that shares my ethos and is committed to professionalism across the security sector.” Linx International training centre Led by Director of Sales and Marketing, Sarah Hayward-Turton, the marketing team will promote the Linx International Group brand and the work of its companies - Tavcom Training (including the CTSP Register) PerpetuityARC Training and Linx Consultancy. Hayward-Turton, states: “It is an exciting time to be part of the Linx International Group. We are bringing new talent into the organisation, as well as nurturing and developing the skills of those that have been with us for many years.” Jerry and Victoria are based at the Linx International Group training centre in Bishops Waltham, Hampshire.
Interlogix, a global leader in security and life-safety solutions, introduces Simon XTi-5i, a self-contained, wireless security system for heightened residential security and convenience. An update to the Simon XTi-5 system, the new platform supports 80 wireless zones, features a 5-inch color LCD touchscreen and is compatible with a wide range of devices through leading service providers. Interlogix is a part of Carrier, a leading global provider of innovative heating, ventilating and air conditioning (HVAC), refrigeration, fire, security and building automation technologies. Simon XTi-5 wireless security system “The latest version of the Simon XTi-5 system helps synchronise homes to keep families connected, protected and a whole lot more,” said Cooper Briscoe, residential solutions product leader, North America, Interlogix. “The devices and accessories available through Interlogix and Alarm.com interactive services make it easy to customise systems that meet each family’s specific needs and priorities whether in a house, apartment or condominium.” When paired with an LTE modem from leading active home services provider Alarm.com, Simon panels can be used as a comfort management and automation system enabling local and remote control of Z-Wave devices such as wireless lighting controls, thermostats, door locks, garage doors and more. Home security and automation solutions The intuitive touch screen panel is easy to operate, making it ideal for users of all ages The new system features a selectable user interface that matches the Alarm.com interactive services mobile application in color, style and icons – simplifying the user experience. At-a-glance system status provides a complete view of home security and automation systems, indoor temperature and outdoor weather. The panel comes standard with support for up to 80 wireless zones and a built-in battery backup keeps the system running in case of power failures. Paired with an LTE modem from Alarm.com, the Simon XTi-5i panel enables other home security and automation features including: Real-time look-ins and review of recorded snapshots for visual verification of alarms by using the Interlogix Image Sensor Voice, email and text message reports Two-way emergency communication with monitoring station personnel using the panel’s built-in microphone Menu-based system programming and testing for fast and accurate installation of the panel and supported devices. The intuitive touch screen panel is easy to operate, making it ideal for users of all ages.
GlobalPlatform, the standard for secure digital services and devices, will bring its device security workshop to Washington DC on Thursday June 6, 2019. The day will demonstrate how GlobalPlatform specifications serve as a framework to build a secure connected world and are relevant to those involved in the development, deployment and use of trustworthy devices, with emphasis on their use in the government sector. Enterprise ID and IoT technologies Delegates joining the free workshop will gain an understanding of GlobalPlatform’s collaboration with key players within the ecosystem, including industry partners, government agencies and solution providers. In addition, delegates will learn about the nuanced cybersecurity requirements of key use cases such as IoT and enterprise ID. The expert speakers will explore how key GlobalPlatform technologies and frameworks – including Root of Trust, Device Trust Architecture and secure components – can be used to safeguard these increasingly connected ecosystems but also to drive awareness to device manufacturers starting their journey to the cyber world. We look forward to welcoming delegates involved with government device development and deployment" “As everyday devices take on increasingly significant roles in our personal and business lives, we as an industry must ensure they are up to the task,” comments Kevin Gillick, Executive Director of GlobalPlatform. “With sensitive personal, business and government data being accessed and managed on these devices, a security-by-design mindset is essential. And the technology is already available to make this a reality. We therefore look forward to welcoming delegates involved with government device development and deployment, or with interest in device security, to join us in Washington DC in June.” G+D Mobile Security The workshop – GlobalPlatform: A Framework to Build a Secure Connected World – will be hosted by G+D Mobile Security, the day after the Secure Technology Alliance’s ‘Securing Federal Identity’ conference. It is open to representatives of member and non-member organisations – including program / project managers, security experts, product suppliers, technical consultants and systems integrators – and seating is limited.
ProdataKey (PDK), an innovator of cloud-based networked and wireless access control products and services, has announced the introduction of “touch io”, a new Bluetooth reader and credentialing option for smartphones designed for use with the company’s cloud-based access control solution, pdk io. Touch io Bluetooth reader touch io does not require the user to unlock the phone in order to gain access through a protected door Touch io brings new levels of convenience and security for the communication between smart phones and access control door readers, eliminating the need for cards or fobs. Unlike other systems, touch io does not require the user to unlock the phone, or to even remove it from pocket or purse, in order to gain access through a protected door. The individual’s identity is validated through communication directly between his/her credentialed device and the reader, via Bluetooth, bypassing the need for internet or cellular connectivity. This can occur from distances as far as 30 feet away, as defined by the customer. By the time the user reaches the door and indicates an intent to enter, by simply touching or tapping a hand to the reader, door activation is immediate and seamless. A combination of machine-learning algorithms that learn door opening patterns, combined with directional antennae placed on each side of controlled doorways, ensure that credentials are not inadvertently validated when employees pass in proximity to the doors from the unlocked side. Superior security Compared to traditional RFID proximity cards, as well as to more high-tech 13MHz contactless smart cards, PDK’s mobile credentials offer superior security on many fronts. Touch io credentials are impossible to clone, each possessing a randomly-generated, unique ID, are authenticated by the Bluetooth reader at each use, and employ a session-unique encryption key for communication with the reader. Furthermore, if a phone is lost or stolen, its owner can immediately deactivate the credential by remotely wiping the phone with a tool like “Find My Phone,” a precaution he or she is likely to take out of concern for other personal data also stored on the device. By contrast, if a wallet or keys are lost that contain a card or fob, the credential remains active until the company’s system administrator is notified of the loss – which may sometimes take days. Cloud-based access control We are making the use of smartphones both more convenient and more secure than traditional methods" The touch io reader is compatible with legacy systems, capable of reading traditional proximity cards. Mobile credentialing is available as part of the pdk io affordable system licensing plan, offering users an unlimited number of credentials for a low, per reader, annual subscription. System administrator can easily generate and assign these to employees with just a few clicks from within the pdk io software management interface. Josh Perry, Chief Technology Officer at PDK, explains, “Until now, the access control market has been filled with Bluetooth mobile credentialing options that offer an inferior customer experience to traditional RFID cards which are, quite frankly, reliable and convenient. With PDK’s touch io, we are redefining the category, making the use of smartphones both more convenient and more secure than traditional methods. It’s the latest example of how our corporate commitment to innovation is bringing a litany of tangible benefits to the security professionals, system administrators and the employees who use our systems every day.”
Matrix, global manufacturer and provider of telecom and security solutions, is participating in the Secutech India 2019, to be held at the Bombay Convention & Exhibition Centre (BEC) in Mumbai from the 25th to the 27th of April 2019. Matrix will be showcasing its high-tech range of IP video surveillance and access control solutions at the event. IP cameras with SONY STARVIS series sensors The entire solution focuses on automating processes and enhancing efficiency Matrix will be showcasing an enterprise-grade video management solution (VMS) designed, engineered and built specifically for growing multi-location organisations. The entire solution focuses on automating processes and enhancing efficiency of organisations. We will also be showcasing a new range of Audio compatible and compact Professional Series IP cameras powered by SONY STARVIS series sensors with EXMOR technology. This gives the cameras an edge over others in terms of exceptional low light performance, consistent image quality during varying light conditions (True WDR), better bandwidth optimisation and many other features. Furthermore, we will be showcasing our new Extreme series of network video recorders (NVRX) at the event. This NVR is equipped with 4K decoding capacity and characteristics like cascading (up to 20 NVRs), camera-wise recording retention and database level integration. Moreover, these latest NVRs are also backed with an intelligent software that helps detect threats and send instant notifications for real-time security. COSEC ARGO door controller Matrix is known for offering technology driven, innovative, futuristic solutions catering to diverse and complex deployments especially for the SMB, SME and large enterprises. At this event, Matrix Comsec is going to unveil COSEC ARGO – the next generation door controller with a blend of performance and aesthetics. The door controller is equipped with features like 3.5” IPS touchscreen LCD with Gorilla Glass The new door controller is equipped with features like 3.5” IPS touchscreen LCD with Gorilla Glass, powerful processor for ultra-fast user identification, intuitive user experience, vandal resistance (IK08). Our solution experts will be demonstrating the standalone access control solution and exhibiting the Aadhaar-enabled biometric attendance system. Or solution experts will also showcase some extraordinary biometric door controllers useful for applications in time-attendance, access control, visitor management, cafeteria management and more. PARISAT MS100 video conferencing solution Matrix Telecom domain will be showcasing its enterprise meeting server – PARISAT. An enterprise-grade video conferencing solution, PARISAT MS100 can conduct meetings between people spread across multiple locations and time zones. It brings all the participants face-to-face in a virtual conference. This makes their presence, communication and information sharing as good and as easy as if they all were physically present in a real conference room. With 12-party HD video conferencing, PARISAT brings meetings to life. At the event, Matrix will also highlight ETERNITY NENX, newly launched unified communication platform for SOHO and SMB. Increasing number of small and medium organisations are migrating to leverage benefits of IP, for such applications, Matrix ETERNITY NENX is a perfect fit.
Leading lock specialist Pickersgill-Kaye (Kaye), a brand under ASSA ABLOY’s High Security & Safety Group, is encouraging those responsible for critical infrastructure sites to consider servicing contracts to help minimise the risk of costly breaches of security. Perimeter protection With terrorism posing a serious threat to the UK’s interests, perimeter fencing, doors and their locks are the first line of defence against potential intruders at installations such as chemical and power plants, gas terminals, oil refineries, utilities, transport, hospitals, research facilities and other major areas which need controlled access.Kaye offers facility managers preventative measures that can reduce deterioration of operational parts and identify faults Safeguarding these vital facilities has become significantly more complex and an essential challenge for all major industries. Enlisting the services of security experts like Kaye offers facility managers preventative measures that can reduce deterioration of operational parts and identify faults before they become a potential problem. Electronic and mechanical locks Locks, which are the heart of any integrated security system, can take a pounding from human intervention and environmental conditions. Regular maintenance checks and rapid repairs of doors and locks can nip in the bud risks of unauthorised access to a secure site’s operations. The High Security & Safety Group, a division of ASSA ABLOY Opening Solutions UK and Ireland, employs a team of qualified engineers that hold high level security clearance. They can provide a quick response throughout the country, including emergency call-outs, to resolve issues, repairing and replacing not only the locks but the high security doors as well, irrespective of the type or original manufacture. High-security doors Behind this support in the field is a 24-hour service hotline, a first-time fix policy – a service that is unique to the High Security & Safety Group, and planned, customised maintenance contracts to give total peace of mind that high security doors and their components are continuing to be fully fit for purpose. Simon Teagle, Managing Director, High Security & Safety Group, said: “Our fully trained and qualified engineers are able to service doors and components from other manufacturers, as well as ASSA ABLOY Group products, to maintain maximum operations on a high security installation. We believe that we offer the most reliable and robust solutions for essential services to ensure the long life of equipment designed to protect infrastructure and deter unwanted visitors.” Training on security systems The company also provides consultancy and training for end users of its locks and high security systems The company also provides consultancy and training for end users of its locks and high security systems, either at its UK manufacturing facility or the customer’s site. Training is tailored to all levels of personnel and include supply of extensive documentation. Locks supplied by Kaye can be seamlessly integrated with third party systems, have been rigorously tested to the highest standards and are recognised throughout the world for their reliability, robustness and longevity. These products can be supported by a proactive, maintenance regime to extend their lifetime and cover exceptional circumstances such as abuse and attack, which can lead to operational issues. High-tech locks and doors Trouble-free locks and doors are an integral factor to the smooth running of any secure facility and regular servicing will help diagnose and eliminate potential weak links in the defence of essential services. It is recognised that long-term reliability gives greater value than short term fixes.
The industry faces numerous challenges in the coming year. Physical and cyber security threats continue to become more complex, and organisations are struggling to manage both physical and digital credentials as well as a rapidly growing number of connected endpoints in the Internet of Things (IoT). We are witnessing the collision of the enterprise with the IoT, and organisations now must establish trust and validate the identity of people as well as ‘things’ in an environment of increasingly stringent safety and data privacy regulations. Meanwhile, demand grows for smarter and more data-driven workplaces, a risk-based approach to threat protection, improved productivity and seamless, more convenient access to the enterprise and its physical and digital assets and services. Using smartphone apps to open doors Cloud technologies give people access through their mobile phones and other devices to many new, high-value experiencesEnterprise customers increasingly want to create trusted environments within which they can deliver valuable new user experiences. A major driver is growing demand for the ‘digital cohesion’ of being able to use smartphone apps to open doors, authenticate to enterprise data resources or access a building’s applications and services. Cloud technologies are a key piece of the solution. They give people access through their mobile phones and other devices to many new, high-value experiences. At the same time, they help fuel smarter, more data-driven workplace environments. With the arrival of today’s identity- and location-aware building systems that recognise people and use deep learning analytics to customise their office environment, the workplace is undergoing dramatic change. Improved fingerprint solutions Cloud-based platforms and application programming interfaces (APIs) will help bridge biometrics and access control in the enterprise, overcoming previous integration hurdles while providing a trusted platform that meets the concerns of accessibility and data protection in a connected environment. At the same time, the next generation of fingerprint solutions will deliver higher matching speed, better image capture quality and improved performance. The next generation of fingerprint solutions will deliver higher matching speed, better image capture quality and improved performance Liveness detection will ensure that captured data is from a living person. Biometrics authentication will also gain traction beyond access control in immigration and border control, law enforcement, military, defence and other public section use cases where higher security is needed. Flexible subscription models Access control solutions based on cloud platforms will also change how solutions are deployed. Siloed security and workplace optimisation solutions will be replaced with mobile apps that can be downloaded anywhere across a global ecosystem of millions of compatible and connected physical access control system endpoints. These connections will also facilitate new, more flexible subscription models for access control services. As an example, users will be able to more easily replenish mobile IDs if their smartphones are lost or must be replaced. Generating valuable insights with machine learning Machine learning analytics will be used to generate valuable insights from today’s access control solutionsEducation, finance, healthcare, enterprise, and other niche markets such as commercial real-estate and enterprises focussed on co-working spaces will benefit from a cloud-connected access control hardware foundation. There will be a faster path from design to deployment since developers will no longer have to create an entire vertically integrated solution. They will simply add an app experience to the existing access control infrastructure. New players will be drawn to the market resulting in a richer, more vibrant development community and accelerated innovation. Data analytics will be a rapidly growing area of interest. Machine learning analytics will be used to generate valuable insights from today’s access control solutions. Devices, access control systems, IoT applications, digital certificates and location services solutions, which are all connected to the cloud, will collectively deliver robust data with which to apply advanced analytics and risk-based intelligence. As organisations incorporate this type of analytics engine into their access control systems, they will improve security and personalise the user experience while driving better business decisions.
The access control industry tends to be more conservative when it comes to the adoption of new technology and services for end users, but that doesn't mean that 2019 won't provide a significant amount of progress through emerging trends taking shape in the industry. In addition to the increased adoption and acceptance of the cloud, mobile credentials and biometrics are becoming more mainstream, and integrations between manufacturers will take centre stage. Here, we take a look at these and other trends helping to shape the coming year. Cloud-based products We're continuing to see a demand by end-user customers for customised responses to certain actions within an access control system For many access control manufacturers, the core of the business is in more traditional products, with a high percentage of installs continuing to be these kinds of projects. However, over the last couple of years, cloud-based products have emerged as a viable option for customers. We've seen more of a willingness for end-user customers to inquire whether this is an option for them, citing ease of use, remote management, cybersecurity and more as part of their foray into this branch of access control. The cloud has established its reputation as being quicker to install, more flexible for customers to access and manage both their access points as well as the video associated with these doors, and placing less pressure on internal (or in some cases, non-existent) IT teams to help set up and manage an access control system. Mobile credentials applications We're continuing to see a demand by end-user customers for customised responses to certain actions within an access control system. For example, if there's an alarm set off during the day along a perimeter, the ability to automatically execute a lockdown and simultaneous email or message to everyone within the building alerting them to the issue is critical. The desire for this kind of flexibility within a system is prompting manufacturers to build new simple to use graphical tools into their systems that allow customised action responses that are proportional to the level of alarm. There's a strong desire by many of today's companies to be able to use mobile phones for access control and as such, manufacturers are either developing their own mobile credentials applications or integrating their systems with these kinds of products. Over the last couple of years, cloud-based products have emerged as a viable option for customers Future of biometrics As companies start to ask about whether their facilities are safe enough, they're often more willing to consider access control that takes security to a new level, such as the implementation of biometric readers. Biometrics is getting more usage in professional security applications and many customers want to move away from using physical cards for access control. Manufacturers that don't currently have biometric hardware in place are starting to integrate with readers designed to offer this functionality in an effort to meet the demands of customers. The dramatic rise in facial recognition biometrics is something that will likely shape the future of biometrics as costs start to decrease. While the access control industry is highly fragmented, we're seeing a trend toward increased partnerships and open-platform technology that helps end users achieve the kind of comprehensive security that they desire. Video management platforms We're seeing a trend toward increased partnerships and open-platform technology that helps end users achieve the kind of comprehensive security that they desire For example, there are a number of access control providers that are providing paths toward full integration with lock manufacturers and vice versa in an effort to meet the needs of clients who may have purchased locks but a high powered access control system to properly manage them. There's also a large shift toward full integration with video management platforms and access control systems to fully integrate the two into a single, user-friendly experience and give end users more control over both. Additionally, manufacturers are looking to provide customers with a single system that meets the needs they have with regards to video, intrusion and access control. Right now, I don't think there's a system that can fully deliver on the promise of being exceptional at all three, so integrations and partnerships remain important to achieve that end goal. Access control world An increasing number of end users are realising the holes in the current Wiegand protocols that have been in place since the 1980s, along with the large number of ‘off the shelf’ equipment that's now available to allow outsiders access through readers that operate under these protocols. As a result, in the last decade or so, OSDP has come onto the scene and is growing in popularity. One of the most important steps for access control manufacturers in 2019 will be to listen to customers who are concerned with this vulnerability and work toward fully supporting OSDP in an effort to protect these access control systems. It's an exciting time to be a part of the access control world, as we finally see results from all of the hype centred around the cloud, biometrics, mobile credentials, hacking protection and strong partnerships come to fruition. As 2019 begins, look for these trends to grow in popularity and for manufacturers to really listen to the end-user customer they serve and respond in kind.
Public spaces in cities and suburbs are important places for community development and promoting outdoor recreation. These areas may include main streets, parks, promenades, band shells and fields. Such locations are often utilised by public event planners for community activities, including summer festivals, wintertime ice skating rink installations, music concerts and art fairs. As the year drew to a close, holiday and Christmas markets as well as major New Year’s Eve events, presented cities with constant public event security needs. The public nature of these events increases risks of incidents with high-speed vehicles that put attendees in danger. Fortunately, there are three ways for public space managers to prevent casualty-causing collisions and further promote the use of local public areas. Developing an effective action plan When strategising how to react to an alert, think about what time of the year and time of day the event is occurring It is important to have a plan developed before an incident or accident occurs. Warning systems, utilising doppler radar and digital loop technologies, alert guards to abnormal vehicle velocity changes in the surrounding area. Managers of public areas should organise a meeting with public safety authorities and local agencies to discuss what must immediately occur when a high-speed vehicle is approaching a public event. When strategising how to react to an alert, think about what time of the year and time of day the event is occurring. Having such a reaction plan in place combines technology and strategic planning to ensure everyone is on the same page to effectively target a threat and promote overall event safety. Securing public areas Ideally, there will be no need to implement a well-conceived action plan. After all, taking preventive measures to secure public areas where events take place is important to keep people safe from accidental vehicle collisions and intentional attacks. Protect attendees by clearly separating pedestrian and vehicle locations using security devices such as – Barricades Portable barriers Bollards Install guard booths Avoid the risk of vandalism and theft, making sure people are safe when walking back to the cars at night by keeping parking areas illuminated with flood lights. Install guard booths with employees who monitor activity in the parking area and who are prepared to react if an alert is triggered. Furthermore, prevent accidental collisions by clearly marking the parking area with informative warning signs and using barricades to direct traffic. These three tips can be used by public area managers to promote security at the next community event. Additionally, the technologies used to secure an event can also be used as infrastructure for year-round security. Installing gates that shut when the public space is closed or using aesthetically pleasing bollards are steps any public area manager can take to promote community safety.
Recent technology advances – from the cloud to artificial intelligence, from mobile credentials to robotics – will have a high profile at the upcoming ISC West exhibition hall. Several of these technologies were recently designated by the Security Industry Association as the Top 8 security technologies for security and public safety. Some of them will also be a focus at the ISC West conference program, SIA Education@ISC, April 9-11 at the Sands Expo Center. This article will highlight some of those conference sessions. Topic: Cloud Systems and Video Surveillance as a Service (VSaaS) Managed Video Services are saving TD Bank $500K annually, April 9, 2:45 to 3:45 p.m. Why TD Bank decided to roll out a managed services solution, what it took to deploy and how the bank is saving an astounding $500,000 annually. IT 4.0 and Video Surveillance: A Guide to the New Terminology and What It Means to You and Your Customers, April 11, 1:15 to 2:15 p.m. How IT 4.0 can enhance or change video surveillance, and consequently deliver additional value to customers, including explanations of terms such as cloud data centers, personal clouds, the edge, IoT sensors and data analytics. One of the sessions to cover how IT 4.0 can enhance or change video surveillance, and consequently deliver additional value to customers Topic: Artificial Intelligence (AI) In Video and Other Systems The Challenges and Opportunities of AI in Physical Security, April 10, 3:45 to 4:45 p.m. Looking toward what the future may hold for AI in physical security; the challenges and opportunities the technology has created; and how participants can leverage AI and machine learning with existing customers to grow their business. Deep Learning Demystified: Next-Generation AI Applied to Video, April 11, 9:45 to 10:45 a.m. Dispelling the myths of the terms “deep learning” and “artificial intelligence,” and what the technologies can do in practical terms. Modern cameras find and identify faces and vehicles, analyse behavior and organise and control assets Neural Processing and Smart Cameras, April 9, 8:30 to 10 a.m. Deep learning-capable hardware is evolving at a frantic pace, and GPU and NPU (neural processing unit) co-processors are commonly embedded in cameras and video management systems. Modern cameras find and identify faces and vehicles, analyse behavior and organise and control assets. Analytics in the Video Central Station: Proper Deployment, Programming and Configuration to optimise operational and cost efficiencies, April 11, 3:45 to 4:45 p.m. How analytics plays a critical role in reducing alarm traffic in a central station environment, allowing them to save money and realise other operational and performance efficiencies. Topic: Robotics and Autonomous Devices Robotic Aerial Security – Growth Trends and Best Practices, April 10, 11 a.m. to noon The lion’s share of growth in the robotic aerial security sector will come from autonomous systems and changing FAA regulations will soon allow companies to monitor and secure remote facilities with no human guards present. Racing drones are difficult to detect as they do not use GPS or radio frequency signals to identify the location of other devices How to Adapt to Address Drone Security, April 11, 1:15 to 2:15 p.m. Drone industry professionals and a physical security design engineer will cover the realistic applications of drone systems and counter-drone solutions that can protect organisations and facilities. Next Generation Threat: Racing Drones, April 11, 2:30 to 3:30 p.m. Racing drones are difficult to detect as they do not use GPS or radio frequency signals to identify the location of other devices. This session will identify the potential risks these drones can pose to facilities, special events, and critical infrastructure. Establishing a Corporate Drone Program, April 10, 9:45 to 10:45 p.m. Is a corporate drone program an appropriate addition to an existing security program? How to understand and navigate the regulatory challenges and processes associated with starting up a commercial-use drone program. The Rise of Intelligence in Physical Security, April 11, 9:45 to 10:45 a.m. “Intelligence” incorporates a variety of subdomains from artificial intelligence to machine learning and contextual analysis. It is rapidly becoming a focus in the realm of IT security – and increasingly in the realm of physical security, too. Changing FAA regulations will soon allow companies to monitor and secure remote facilities with no human guards present Topic: Mobile Credentials Finding Their Place in Access Control How Biometrics Are Enabling the Convergence of Physical and Information Security, April 10, 1:45 to 2:45 p.m. At the center of convergence is one crucial building block: strong irrefutable identity powered by biometrics. Driving the Future: How Interoperability Standards in Access Control Can Enable Smart Building Success, April 9, 1:30 to 2:30 p.m. Growing user demand is driving new open platform approaches and the adoption of interoperability standards Growing user demand for unfettered and unlimited third-party integrations is now driving new open platform approaches and the adoption of interoperability standards. They are changing the dynamic of access control and its role within the smart building environment. Topic: Facial Biometrics in Professional Solutions How Biometrics Are Enabling the Convergence of Physical and Information Security, April 10, 1:45 to 2:45 p.m. Securing workstations, virtual desktops, turnstiles, front doors, mobile devices and more, biometric authentication is helping enterprises and governments worldwide to realise a more secure future. Topic: Voice Control in the Smart Home Environment Delivering the Smart Home of the Future, April 11, 3:45 to 4:45 p.m. With the proliferation of connected smart devices, including voice control devices, consumers have a growing array of options for defining what their Smart Home experience could be.
A futuristic alternative to plastic cards for access control and other applications is being considered by some corporate users in Sweden and the United Kingdom. The idea involves using a microchip device implanted into a user’s hand. About the size of a grain of rice and provided by Swedish company Biohax, the tiny device employs passive near field communication (NFC) to interface with a user’s digital environment. Access control is just one application for the device, which can be deployed in lieu of a smart card in numerous uses. Biohax says more than 4,000 individuals have implanted the device. Using the device for corporate employees Every user is given plenty of information to make an informed decision whether they want to use the deviceCurrently Biohax is having dialogue with curious corporate customers about using the device for their employees. “It’s a dialogue, not Big Brother planning to chip every employee they have,” says Jowan Österlund, CEO at Biohax. Every user is given plenty of information to make an informed decision whether they want to use the device. Data capture form to appear here! “Proof of concept” demonstrations have been conducted at several companies, including Tui, a travel company in Sweden that uses the device for access management, ID management, printing, gym access and self-checkout in the cafeteria. Biohax is also having dialogue with some big companies in the United Kingdom, including legal and financial firms. Österlund aims to have a full working system in place in the next year or so. A Swedish rail company accepts the implanted chip in lieu of a paper train ticket. They accept existing implants but are not offering to implant the chips. Österlund says his company currently has no plans to enter the U.S. market. The device is large enough to locate easily and extract if needed, and small enough to be unobtrusive Access control credential The device is inserted/injected below the skin between the index finger and the thumb. The circuitry has a 10-year lifespan. The device is large enough to locate easily and extract if needed, and small enough to be unobtrusive. The only risk is the possibility of infection, which is true anytime the skin is pierced, and the risk is mitigated by employing health professionals to inject the chip. Use of the device as an access control credential or any other function is offered as a voluntary option; any requirement by an employer to inject the device would be illegal, says Österlund. It’s a convenient choice that is made “based on a well-informed decision by the customer.” Aversion to needles, for example, would make some users squeamish to implant the device. More education of users helps to allay any concerns: Some 10% of employees typically would agree quickly to the system, but a larger group of 50% to 60% are likely to agree over time as they get more comfortable with the idea and understand the convenience, says Österlund. Protection of information The passive device does not actively send out any signals as you walk. It is only powered up by a reader if a user has access rightsIn terms of privacy concerns, information contained on the device is in physical form and is protected. The passive device does not actively send out any signals as you walk. There is no battery. It is only powered up by a reader if a user has access rights. With use of the device being discussed in the United Kingdom, there has been some backlash. For example, Frances O’Grady, general secretary of the Trades Union Congress (TUC), has said: “Microchipping would give bosses even more power and control over their workers.” A big misconception is that the chip is a tracking device, says Österlund. It isn’t. “We love people to get informed,” says Österlund. “If they’re scared or apprehensive, they can just read up. It’s not used to control you – it’s used to give you control.”
There is a new event on the calendar for the security industry in 2019: The Security Event 2019, 9-11 April, at NEC, Birmingham. For additional details and a preview of the new trade show and conference, we spoke with Tristan Norman, Founding Partner and Event Director, The Security Event. Q: It seems recently that some trade shows have been on the decline in terms of exhibit size and attendance. Why does the physical security industry need another trade show? Norman: I think there are numerous factors that play into the decline of trade shows in general and not something that is limited to the security industry. Those events that are suffering are no longer serving their target market or have failed to adapt to the changes in the industry they serve. However, what we are seeing now is the rise of focused, more “evolved” trade events which fulfil a gap in the industry event calendar and provide something new and fresh to a disillusioned audience. Q: What will be unique about The Security Event, and what role will it serve in bringing together buyers and sellers in the market? Where (geographically) will attendees come from? What we are seeing is a rise of trade events which provide something fresh to a disillusioned audience Norman: The driving ethos behind The Security Event is that we are “designed by the industry, for the industry.” We were able to start with a blank canvas and take onboard all the feedback from stakeholders throughout the security buying chain and create an event that is sustainable and fit for purpose. We see the role of the event as a very important one – to truly reconnect the currently fragmented UK commercial security industry, back at the NEC in Birmingham. We had originally anticipated that this would be an almost-exclusively UK event in year one. However, we have seen significant interest from potential visitors from across the wider EMEA region who are keen to do business in the UK. We formed a strategic alliance with Security Essen to help facilitate and strengthen our reach in these regions through additional marketing and PR activities. Consequently, early registrations indicate that it will be approximately an 80% UK and 20% international split. Q: What conference programming is being planned to augment the trade show event? Norman: Content will be delivered across three focused theatres, serving the needs of our audience throughout the buying chain. Emphasis will be placed on the latest technology innovations impacting the industry, practical advice on the most pressing issues facing security technicians, and important industry updates and insights. All sessions are focused on delivering tangible benefits to ensure professionals are equipped to stay relevant and to grow their business and we’re excited to be working with key industry bodies, innovators and experts to deliver the programme. We look forward to announcing those in coming weeks. Exhibitors want to re-engage with the thousands of industry colleagues who no longer attend other events on offer Q: Comparisons to IFSEC are inevitable. How will The Security Event be different than the IFSEC Security and Fire shows? What are the advantages of locating at Birmingham NEC? Norman: Both The Security Event and The Fire Safety Event, based at the NEC are completely different to any other trade show in the UK. We pride ourselves in creating a business platform that puts the exhibitors’ needs first, by limiting the size of stands and total number of exhibitors as well as creating a comprehensive CPD accredited educational programme for the visitors. Q: Which big industry players are supporting the launch of The Security Event, and what feedback are you hearing in terms of why they signed up at the show's inception? If a global manufacturer has a footprint in both the US and Europe, any tradeshow will be managed locally Norman: Our founding partners are Assa Abloy, Avigilon, Anixter, Comelit, Dahua, Honeywell, TDSi, Texecom, Tyco and Videcon. The full list of exhibitors and supporting partners can be found on our website. The reasons why they have signed up are very simple. They all see the exact same gap in the industry event landscape as we do. We believe there is a need for a 3-day channel focused commercial security exhibition based at The NEC in Birmingham. Our exhibitors want to re-engage with the thousands of industry colleagues who no longer attend the other events on offer. Q: Your 2019 show will be the same week as ISC West in Las Vegas. Do you think the competitive calendar will be a factor? Norman: In terms of our both our audience and our exhibiting base there is very little overlap with ISC West. Generally, if a global manufacturer has a footprint in both the US and Europe, any tradeshow will be managed locally so we haven’t observed any issues so far. We do acknowledge that having two shows at the same time globally isn’t ideal and we have moved our dates in 2020 to the 28-30 April to mitigate this going forward. The Security Event 2020 will not clash with Las Vegas' ISC West 2020 as it will in 2019, says Norman Q: How will you measure success in the first year of the show? What measurements (show size, number of attendees, exhibitor feedback, etc.) will constitute a "successful" first year for the show?Security Event will continue to evolve year after year, but will intent to stay true to the event's original concept Norman: Great question – the most important barometer of success for me and the team next April is the general industry reaction, after all, this show was created for them. Furthermore, it is vital to us that our exhibitors feel they have achieved their objectives for the show, whether it be quality, quantity of leads or raising awareness of a new product launch. We’ll also be keen to understand how satisfied visitors are with the event, including their views of the content, access to new products/services, effectiveness of the out of hours networking, etc. We are anticipating 6,000 visitors over the 3 days and I believe if we achieve this goal, we will have a strong rebooking on site, laying a great foundation for our 2020 event. Q: How would you expect/hope the show would continue to evolve in coming years? Norman: I hope over the next few years The Security Event cements itself as the industry’s favourite trade show and that exhibitors and visitors alike look forward to every year for both the business opportunities at the event and the networking outside of it. The Security Event will continue to evolve year after year, but I am determined that we stay true to our original concept and the principles on which the show was founded. After all, it is this formula that has proved to be so popular to date.
Serving a large geographical area of the North Island of New Zealand, the Waikato District Health Board (Waikato DHB) provides hospital and community-based health services to a population of nearly 400,000 people. With a wide range of security needs that include protecting staff and patients, securing high-risk facilities, restricting unauthorised access to medication and medical equipment, and streamlining contractor and car park management, Waikato DHB required a security solution that could be applied to both high and low security areas. The system al so needed to provide a comprehensive audit trail and detailed reporting, to identify access movements by employees and help meet legal requirements around the safe and secure storage of medication and equipment. Gallagher single access card control system Gallagher’s access control solution for Waikato DHB utilises a single access-card system that simply and instantly updates access permissions Gallagher’s access control solution for Waikato DHB utilises a single access-card system that simply and instantly updates access permissions, as well as streamlining car parking services. Where high-level security is needed, Gallagher’s system offers Waikato DHB the ability to lock-down areas of the hospital when required, isolating areas and restricting access. Gallagher’s Command Centre Mobile application also delivers duress notifications from buttons located around the hospital directly to a guard's mobile device. Electronic Tag Boards allow contractors to easily sign on and off of the site, ensuring Waikato DHB meets health and safety requirements. In an environment where access profiles change on a daily basis as staff move between different departments, Gallagher’s access control system and Command Centre central management platform ensure staff can approach doors with the confidence that they can enter or leave areas as necessary. The access card system has also reduced the risks associated with handling keys, along with providing detailed reports to meet comprehensive auditing requirements, saving time and cost. 'Security Ward Standard' Waikato DHB's experience with Gallagher products ultimately led them to develop a 'Security Ward Standard' detailing the minimum-security equipment required for new buildings, greatly reducing time spent producing specification documents and gathering approvals. As Waikato DHB's security requirements continue to evolve, Gallagher’s systems provide future-proofing with a software maintenance agreement ensuring they operate the very latest software available. Fast facts about the project Industry: Healthcare Business type: Hospital Number of employees: 6,500 Site Size: 18 hectares with 176,000 sq.metres of buildings Number of doors: Over 730 access-controlled doors; 40 alarmed and monitored refrigerators/freezers; 15 carpark barrier arms; 1 gate. Gallagher solutions and technology utilised: Command Centre Controller 6000 T-Series readers Tag Boards Car park Management
As increasing digital engagement powers forward in the hospitality industry, SALTO Systems has joined forces with the KeezApp technology platform to offer hotels an unrivalled guest experience. Property management systems The KeezApp platform provides a range of solutions for any property that hosts guests and is able to integrate with most PMS (Property Management Systems) on the market. Guests can check in from anywhere, receiving a virtual key straight to their smart phone and getting an alert when their room is ready for occupation. The front desk is then alerted when the guest has used the mobile key to enter their room even for doors equipped with offline electronic locks. The virtual app provides for access to all permitted areas of the hotel during their stay and when the time comes to check out, guests can again use KeezApp removing the need to queue at reception. KeezApp – SALTO software integration KeezApp has implemented JustIN Mobile key access technology and interfaced it with SALTO front desk management software ProAccess SPACE Additional tools include live chat with the front desk. This provides a better, more efficient way for guests to talk and interact with the front desk whether they are in the hotel or out and about. Guests can also choose different departments to contact such as reception, concierge, housekeeping or room service depending on their needs. KeezApp has implemented JustIN Mobile key access technology and interfaced it with SALTO front desk management software ProAccess SPACE. SALTO Hospitality add-ons include functionalities such as mobile keys (BLE), group check-in; real-time re-rooming and real-time extended stay. These plus other key hotel features make it easy to control all the offline and online rooms and back-of-house doors from different front desk guest workstations. SALTO electronic locks Both companies are driven by the opportunity for hotels to provide a superior guest experience to their clients, whether by offering mobile functionalities or superior management standards like quick check-in and check-out, online billing, live chat with reception, housekeeping and concierge or auto Wi-Fi connection for guests. SALTO welcomes new partnerships with industry leaders like KeezApp that will result in improved hospitality management and the guest experience. SALTO also continuously adds integrations with other technology providers so that those in the hospitality industry have a choice when it comes to which platform, they use to control SALTO’s robust line of electronic locks and supporting products.
Digital Barriers, edge-based IoT surveillance and security technologies solutions provider, has announced that its cutting-edge facial recognition technology was successfully deployed at The O2 in London to enhance security at both The BRIT Awards (“BRITs”) in February and the National Television Awards (“NTAs”) in January this year. The technology was used to screen guests at multiple entrances at both events, which had a combined television audience of more than 10 million viewers. “After a series of demonstrations with facial recognition providers, we selected Digital Barriers for our live trials. Their holistic approach, analytic technology and partnership with human verification worked perfectly in a real-world deployment,” said Stefan Thompson. Digital Barriers – SRI partnership At the O2, Digital Barriers partnered with Super-Recognisers International (SRI), whose trained staff identify faces in crowds, enabling them to respond quickly to any matches on the system. Digital Barriers provides mobile apps linked to its facial recognition system, enabling face-to-face secondary verification and the super recognisers were fully trained in this technology. Digital Barriers has the best facial recognition technology of any I’ve seen, and I’m excited to join" Digital Barriers has also announced that following this successful partnership, Kenny Long, SRI’s co-founder and COO, has joined Digital Barriers. “As an expert in people identification I’ve seen every solution on the market,” he said. “Digital Barriers has the best facial recognition technology of any I’ve seen, and I’m excited to join.” Facial recognition system at O2 Arena Digital Barriers and SRI have agreed to partner together wherever there is a requirement to combine facial recognition and specialist operators. “This is a unique offering anywhere in the world,” Kenny Long explained, “and I look forward to working with my former colleagues.” “The O2 is the world’s most popular music and entertainment venue, we’re continually reviewing our security measures. The use of facial recognition is proving to be a valuable enhancement to the security and safety of the venue, its guests and staff. The trials with Digital Barriers have been successful and we’re committed to creating a safe and secure venue for all our fans, staff and performers,” said Paul Williams, Senior Security Manager at The O2. “There are multiple companies in the facial recognition field making claims as to what their technologies can do in the real-world – most have never deployed at scale successfully and rely instead on exaggerated marketing,” said Zak Doffman, CEO of Digital Barriers. “We work with government agencies around the world. Our technology is field-proven in the hardest operating environments. We are delighted with the successful deployments at The O2 and that Kenny Long is joining us. Both attest to the world-class quality of our technology.”
Jumbo Ten Brink Food introduced the face server into their store environment in March 2017 after discovering that almost 80% of shoplifting took place via large shopping bags. Since then, Jumbo has installed 80 Panasonic cameras in-store, helping them to win the award. Previously recognised by the National Institute of Standards Technology (NIST) as the most accurate on the market, Panasonic’s face server uses deep learning technology which maximises the performance of the core engine to achieve accurate and reliable recognition. The technology identifies faces that are ordinarily difficult to recognise with conventional techniques, such as those taken from an angle of up to 45 degrees to the left or right or 30 degrees up or down. It also maintains a 90% accuracy rate when detecting faces that are partially hidden by sunglasses or face masks. With this improved accuracy, security protection is enhanced and the system allows matches even when images are 10 years old Enhanced security protection If people are caught stealing, their image remains on the database. The face server provides a real-time processing capacity of up to 20 cameras per server and can execute high-speed searches of up to 30,000 registered reference faces. With this improved accuracy, security protection is enhanced and the system allows matches even when images are 10 years old. “The moment that a known shoplifter attempts to re-enter the store, an internal alarm is triggered, and we can take the best suitable action,” explains Edwin ten Brink, founder of Jumbo Ten Brink Food stores. “Thanks to the Panasonic face matching server, Jumbo has been proclaimed the safest store in the Netherlands." Karen Sangha, Panasonic’s Security Solutions Regional Marketing Manager says, “We are pleased to see that our customers are winning awards as a result of implementing our technology. We firmly believe that our face server is industry-leading and Jumbo Ten Brink Food’s success is testament to that.”
Integrity Security Group is using SmartTask’s SmartForms to gain added visibility and dramatically cut down on its administrative burden. Having adopted the employee scheduling and mobile workforce management software last year for the provision of proof of attendance, control room management and staff rostering, the company is now using its electronic data capture functionality to streamline a range of operational processes. Initially, SmartForms are being used for vacant property and mobile patrol inspections as well as daily vehicle checks, already saving more than 15 hours of admin a month. SmartTask SmartForms The SmartForms replace previous paper-based processes that were increasingly difficult to manage by the office-based admin team “We are now using the SmartTask SmartForms to help reduce administration, capture critical work data and enforce health and safety procedures,” explains James Chittil, General Manager at Integrity Security Group. “We are constantly looking at clever ways to take advantage of the software’s rich functionality, so we can continue to simplify and enhance the way we operate.” The SmartForms replace previous paper-based processes that were increasingly difficult to manage by the office-based admin team. All reporting for vacant property and mobile patrol inspections – for both scheduled patrols and alarm activations – are now completed using a SmartTask-enabled smartphone. By electronically capturing all relevant information, including photo evidence, Integrity can quickly provide customers with a status update and details of all undertaken work as well as respond to any identified issues. Vehicle checks and fleet management Meanwhile, daily vehicle checks for Integrity’s fleet of vans are now completed using a specially-developed SmartForm, so the company can instantly see if drivers are complying with this health and safety procedure. Any vehicle-related problems or damage can be raised by the driver and actioned immediately by the admin team to mitigate fleet risk. Mileage data is also captured through the software, enabling maintenance requirements to be tracked and scheduled at appropriate intervals. “The SmartForms are enabling us to dramatically reduce paperwork and remove manual processes. This is making it much simpler for both our security officers in the field and our office-based admin team to capture, collate and communicate essential operational data. This is not only helping us make better use of our valuable resources, but also enhance the service we are providing to customers,” added James Chittil. Paul Ridden, CEO of SmartTask commented: “Our experience within the security sector means we are continually developing new functionality that overcome real-world problems for our customers. This is the reason we are working in partnership with a growing number of security businesses who recognise the value they can gain and the benefits they can achieve from using the SmartTask software.” Integrity selected SmartTask to replace an outdated time and attendance system, enabling it to effectively monitor the whereabouts and welfare of staff Lone worker protection Integrity selected SmartTask to replace an outdated time and attendance system, enabling it to effectively monitor the whereabouts and welfare of staff as part of its commitment to lone worker protection. The company is also using the intelligent rostering functionality to streamline internal planning processes, while the interactive dashboard supported the launch of a dedicated, out-of-hours control room operation by providing a live view of all scheduled shifts and expected or missed check calls. SmartTask is an advanced and simple-to-use employee scheduling and mobile workforce management solution that enables security companies to better plan and manage their workers, so they are at the right place, at the right time. The cloud-based software solution combines intelligent rostering, live monitoring and integrated proof of attendance across both static and mobile teams, making it the ideal tool to improve operational control, enhance customer satisfaction, and support duty of care to staff.
Losing keys is a given. It’s just something that happens at some point. One study in the UK estimated around 10,000 annually end up just in the refuse, by mistake*. At CROUS Montpellier student accommodation block in southern France, they sought a solution to lost keys and the other hassles of managing an outdated mechanical master-key system for a large facility with a transient population. Aperio wireless locking devices CROUS Montpellier fixed lost key problems by exchanging their mechanical locks for Aperio cylinders. Aperio wireless locking devices with built-in RFID readers are already trusted at universities all over Europe to protect staff, students and assets against burglary and unauthorised intruders. Easy-to-fit Aperio locks have transformed facility management for the accommodation block. To date, 1,500 wireless Aperio cylinders are seamlessly integrated online with their ARD security system, which gives facility managers an overview of block security in real time. Aperio cylinders integrated with ARD security system Now, when a student loses their key-card, it’s simple for a site manager to cancel the old credential and issue a new one. There is no need to engage a locksmith to replace physical locks, saving everyone’s time and CROUS money. A constant drain on resources has been eliminated. Aperio easily integrates with payment and other smart-card systems, as well as access control Because Aperio integration at CROUS is online, managers block lost credentials quickly using the software, without visiting the door. It is just as easy to de-authorise credentials for students who leave, even if they forget to return their smart-card. An operator simply removes them from the system database, and they are locked out. Aperio-access control system integration Aperio easily integrates with payment and other smart-card systems, as well as access control. “Aperio provides a comfortable access solution. Our students can access their accommodation, use the printer and pay in the canteen with the same card,” explains Cyril Combacal at CROUS Montpellier. Because Aperio is easily scalable and can expand any security system when needs change, investments in new wireless locking can be rolled out over time. It has made logistics and budgeting much easier for CROUS. Refurbishment at CROUS Montpellier is ongoing: up to 500 new Aperio cylinders are installed efficiently and wirelessly every year.
Round table discussion
The new year 2019 is brimming with possibilities for the physical security industry, but will those possibilities prove to be good news or bad news for our market? Inevitably, it will be a combination of good and bad, but how much good and how bad? We wanted to check the temperature of the industry as it relates to expectations for the new year, so we asked this week’s Expert Panel Roundtable: How optimistic is your outlook for the physical security industry in 2019? Why?
The physical security industry is embracing the cloud in a big way. Cloud-based systems – which involve accessing a shared pool of information technology resources via the Internet – are much higher-profile in the video and access control markets, and large and small companies are getting on the cloud bandwagon. We asked this week's Expert Panel Roundtable: What factors are contributing to growth in cloud systems in the security market?
The reviews are in, and ISC West was another hit. Brisk attendance and a comprehensive lineup of the industry’s top companies and products contributed to another successful show for Reed Exhibitions. Our Expert Panel Roundtable, who have attended many such events, added their own reflections to the industry’s post-ISC glow. We asked this week’s Expert Panel Roundtable: How successful was ISC West 2018 for security industry exhibitors and visitors?