AMAG Technology, global provider of unified solutions that help organisations mitigate risk, introduces its Symmetry GUEST visitor management family of interactive touch screen kiosks. Symmetry GUEST kiosks Symmetry GUEST improves the visitor experience by automating all processes associated with the lifecycle of a visitor, streamlining the journey through the reception area, enforcing compliance and reducing operating costs. Eliminate paper logbooks and create an audit trail to properly manag...
Matrix, global manufacturer of enterprise-grade telecom and security solutions, is participating in the India Africa ICT Expo 2019, Kigali, Rwanda from 5th to 6th August 2019. India Africa ICT Expo is one of the best platforms to have business interactions and create strategic alliances. This year, Matrix will showcase its latest Telecom, IP video surveillance and people mobility management solutions. ETERNITY NENX communication At the event, Matrix will highlight ETERNITY NENX, newly launched...
Smarter Security, the intelligent entrance controls company, has announced new optical technology that reduces the risk of “sidegating” when two people attempt unauthorised side-by-side entry through a turnstile. Layered security strategy Jeff Brown, Chief Executive Officer at Smarter Security, says “Security teams must approach insider threats and collusion with a layered security strategy that starts at the front lobby. This innovative optical turnstile technology available...
The Kwikset brand of Spectrum Brands, Inc. – Hardware & Home Improvement Division, announces the launch of SmartCode 955. Functioning as a commercial grade electronic lever, SmartCode 955 provides advanced security, strength and durability. It is the first commercial grade electronic lever from Kwikset - U.S. door hardware manufacturer - designed to serve the security needs of facility managers, residential and commercial property owners, and small business owners. SmartCode 955 elect...
Whether it is video analytic platforms to monitor traffic patterns or cameras deployed to help law enforcement ensure public safety, many cities are looking at advancements in video technology. Upgrade costs and technology compatibility issues are often front-and-centre when it comes to blending new technology with existing infrastructure. For example, if the city law enforcement officials want to improve video camera image quality, which can improve the evidentiary value of footage in prosecu...
Sargent and Greenleaf, Inc. (S&G), a global manufacturer of high-security locks and locking systems for safes, vaults and high-security cabinets, has appointed Mark LeMire to Chief Executive Officer. LeMire comes to Sargent and Greenleaf with over 25 years of experience in executive management, new product development and engineering. Most recently, LeMire held leadership positions at Loma Systems and Buehler, both divisions of Illinois Tool Works (ITW). As a Global Director of Marketing a...
Traka is making its debut at Security Expo 2019 in Sydney, Australia to demonstrate its local capability to offer innovative, sector specific solutions for key and equipment management, backed with a global support network. Traka, globally renowned intelligent management solutions provider for keys and equipment, acquired Secure Edge early in February 2019, to increase the ability to support its global and regional customer base. Endorsed key control system Traka will unveil its latest systems, including its specialist IntrepidTM SCEC Endorsed key control concept During Security Expo on stand G38, Traka will unveil its latest systems, including its specialist IntrepidTM SCEC Endorsed key control concept. Designed exclusively for Australian Government departments, agencies and suppliers, Traka’s innovative IntrepidTM design provides a scalable solution to secure, control, distribute and audit sensitive, often critical, keys and assets. Traka will be able to demonstrate to visitors its key management portfolio, including its innovative V-Touch together with its scalable L-Touch, S-Touch and M-Touch solutions. Each are presented to operate standalone or fully networked, as part of a centralised system and offer simple ways to control keys and manage different facilities, with full and compliant audit trail capability. Key control management solutions Says Martin Woodhouse, Head of APACMEA for Traka: “Security Expo 2019 is the perfect platform for Traka to demonstrate our international growth, with the most recent acquisition in Australia enabling us to present our bespoke local solutions and our ability to respond to the regional needs. This includes our powerful Traka IntrepidTM SCEC Endorsed Key Control management system, dedicated to presenting high security functionality for the Australian Government.” “Traka’s direct presence here is backed by a global network of technical services and design skills. We look forward to meeting visitors on our stand to discuss their requirements for intelligent key and equipment management solutions and demonstrate how Traka can assist end users to increase efficiency, reduce downtime and enhance safety while maintaining compliance and meeting operational requirements. All these provide a tangible return on investment for our customers.” Locker systems Live demonstrations of Traka’s key management solutions will include faulty item exchange Traka’s dedicated locker systems will also be on display, featuring their ability to charge equipment whilst stored, ensuring the most charged device is always handed out first for equipment optimisation and increased productivity. On the stand, live demonstrations of Traka’s key management solutions will include faulty item exchange, email notifications and random return capability. Integration with Gallagher security platforms Traka will also be demonstrating the power of integrated solutions by showcasing how Gallagher’s Command Centre and Genetec access control platforms work seamlessly with its key and equipment management systems. All solutions on display, will be fitted with HID readers to present secure authorised access. Oceania Regional Director, Rod Barden concluded: “Our team is really excited to be at Security Expo 2019 and to press ahead with our ambitious growth plans for the region, all based on our ability to be ‘local when you need us, global when it counts.’ We look forward to seeing you there!” Traka’s product portfolio of intelligent key and asset management solutions will be on display on stand G38 at Security Expo 2019, taking place between 24 – 26 July 2019 at ICC Sydney.
Cognitec is working with RDW, the Netherlands Vehicle Authority, to provide a digital application platform for the renewal of drivers’ licenses. The platform is now operational in 15 municipalities, growing to 30 municipalities during 2019, for almost 25% of Dutch residents. In 2020, the Ministry of Infrastructure and Water Management will evaluate the system to decide on a national service that eliminates the mandatory visit at the city hall for driver’s license renewal. Cognitec facial recognition tech As an additional check during the application process, RDW uses Cognitec’s technology to establish the applicant’s identity by comparing the newly submitted photo against the last image stored for this person in the Central Driving License Register. RDW uses Cognitec’s technology to establish the applicant’s identity Cognitec’s trusted face recognition technology not only performs the image comparisons, it also checks the new image to ensure it satisfies the ISO/IEC standard for biometric photos. In addition, the project involves an initial deduplication of the image database, enrolling about 12 million images and comparing them against each other to find duplicate records and clerical errors. Future-proof ID management system “We have been using face recognition for more than a year to increase the overall quality of the license renewal process and have just begun to apply the deduplication capabilities of the Cognitec system. This extensive N: N matching process takes time, and needs to be monitored carefully, but it ensures the quality of our database, and prevents false matching errors during future application processes,” says Gert Jan de Nijs, Senior Project Manager at RDW. “We are excited to move toward a fully secure, convenient digital process that provides our citizens with a future-proof ID management system.”
Tyco, the security products division of Johnson Controls, has announced the opening of its new state-of-the-art interactive showroom and training facility in Ireland. ACVS solutions Located in the Ballymount area of Dublin, the new showroom facility provides the opportunity for system integrators and their end-user clients to see live demonstrations of the innovative features and groundbreaking technology built-into the latest generation of Access Control and Video Surveillance (ACVS) solutions supplied under the Tyco umbrella. “In addition to in-depth demonstrations of specific products or software, we are now also able to show how easy it is for users to benefit from a totally integrated security solution via an interactive operational system,” said Colm O’Brien, Tyco’s ACVS Business Manager in Ireland. Unified video management He adds, “As an example, we are able to demonstrate the full capabilities of victor, our Unified Video Management application, which seamlessly synchronises video surveillance with access control, fire, BMS, Drone Detection and mitigation, Radar, Gate Automation, intrusion and other systems, into one powerful, intuitive interface.” The new facility also has a fully equipped training room with hands-on workstations to enable system integrators to learn how to offer their end-user clients maximum value from a wide range of solutions, including American Dynamics Victor & VideoEdge Video platforms, Exacq Video Management Software, Illustra cameras, Software House CCure Access Control, CEM Access Control Systems and Kantech Access Control platforms.
Dahua Technology, globally renowned video-centric smart IoT solutions and service provider, has launched IVSS 2.0 (IVSS7000-I), an upgraded series of its NVR family powered by the latest AI capable of deep learning, which opens up new possibilities to smart security solutions. Upgraded IVSS 7000-I The upgraded IVSS 7000-I features scalable GPU design to meet the ever-growing project requirements. The unique Dahua Deep-Learning algorithm with GPU group enables IVSS7000-I to perform face recognition, perimeter protection and metadata with high accuracy. Offering advanced Artificial Intelligence features, it even enables danger prevention via faster video content inquiry, rapid discovery of targets as well as real-time and accurate alarm in a variety of applications, providing AI-based all-in-one surveillance solution for customers. Some major features of IVSS7000-I are detailed below. AI-powered facial recognition technology Dahua Technology’s AI-powered face recognition technology enjoys a high reputation in the industry Dahua Technology’s AI-powered face recognition technology enjoys a high reputation in the industry, as testified by multiple first prizes in international competitions. Equipped with Dahua face recognition technology, IVSS7000-I series records face by structured data and performs real-time crosscheck with reliable accuracy to figure out the face by features of the target. Supporting up to 256-channel face recognition by device and up to 256-channel face recognition by camera, IVSS7000-I can analyse up to 50 different face databases with 300,000 face pictures in total. Besides, the upgraded IVSS7000-I also supports search by face image which means users can upload face pictures to IVSS7000-I and compare them with recorded ones by similarity. VIP recognition and access control IVSS7000-I series can realise a lot of functions for users such as VIP recognition, blacklist alarm, stranger identification, attendance management, access control, etc. It divides faces detected into different categories defined by users, and acts accordingly, like notifying the manager that a VIP customer is coming or sending an alert when a persona non grata is identified. Users can choose Regular/Stranger mode to trigger kinds of alarm actions according to different applications. Focusing on people and vehicles, perimeter protection automatically filters out false alarms caused by animals, rustling leaves, bright lights, camera shaking and other irrelevant elements. It also enables system to act secondary recognition for the targets, thus significantly improving alarm accuracy with saved cost. In terms of perimeter protection, IVSS7000-I supports up to 256-channel with each channel allowing up to 10 IVS rules. Enhanced metadata Metadata is feature attribute information of a target object which can be used for data retrieval. Currently, there are mainly four types of metadata that are human face, human body, motor vehicle and non-motor vehicle. IVSS7000-I supports up to 64-channel video metadata, making it possible for operators to quickly and easily search through multiple channels and long duration to find out when and where a person/vehicle of interest appeared, which significantly enhances accuracy and efficiency. The IVSS7000-I employs optimised GUI which is easier for users to learn and use. With the same GUI working for local output and PC client, training cost of system operator is reduced. Comparable to VMS client, the new GUI design is more user-friendly for project-level customers. Remote access IVSS-I can meet variable needs of users, thus applicable to a wide range of scenes Apart from the above features, IVSS7000-I also allows independent PC client for remote access so that users will not be bothered by things like Web plug-ins and browser update. It's also worth mentioning that with a new security center to keep hackers away, IVSS7000-I series provides a safer network environment for users. Being multifunctional, IVSS-I can meet variable needs of users, thus applicable to a wide range of scenes, including entrances and exits of banks, business parks, schools, prisons and transportation centers like airports, railway stations that are sensitive to strangers and criminals; or the shopping malls that want to protect customers from petty thieves; or football stadiums that choose to ban those known hooligans for good. Intelligence and safety As a key back-end product to smart security system, IVSS7000-I brings intelligence, safety, and reliability to a new level. With a mission of Enabling a Safer Society and Smarter Living, Dahua Technology will continue to focus on “Innovation, Quality, and Service” to serve partners and customers around the world.
In business and at home, the smartphone is a remote control for our lives. It’s a calendar and a credit card. We book holidays and do our daily banking. With video calling technology, we can even be in two places at once (or make it seem that way). Could there be untapped potential in using mobile phones for access control, too? According to official EU data, by 2016 94% of European large businesses were issuing their workers with some sort of connected mobile device. We seem to use our smartphones for everything. Yet mobile phones are under utilised when it comes to building security and access management. Mobile access Evolving technologies now enable us to manage access rights via mobile phone apps Evolving technologies now enable us to manage access rights via mobile phone apps, open a door with a virtual key credential, and much more. An estimated 44 million mobile credentials will be downloaded by 2021, according to a recent IHS Markit forecast. Smartphones enable wireless access control: Convenience: Part of the reason Apple Pay, Instagram and many more mobile services succeed is for the simple reason, we like to carry less stuff. With secure credentials on your phone, there’s no more need for a fob, a plastic smart-card or anything similar. Security: A screen-lock adds an extra layer of PIN, swipe passcode or fingerprint security. With phones, multi-factor authentication is baked into the credential. And how quickly would you notice if a plastic key-card went missing? Nowhere near as fast as you’d spot your smart phone was gone. Flexibility: Security and facility managers can do things with virtual keys that are impossible with a plastic credential. They can issue, revoke or amend them instantly and from anywhere with secure cloud access via a mobile phone. However briefly a temporary visitor needs to enter your building, the easiest way to let them in is with their phone. Efficiency: Scrap the queues at reception waiting for temporary visitor permits, waste fewer hours in plastic key-card handover meetings and spend less of your budget replacing lost and damaged credentials. Phone-based access control saves businesses time and money. Compatibility: Mobile phones are machines built for connectivity, including with your existing RFID locks. Bluetooth and NFC radio technology are already inside most modern smartphones. Every future viable wireless and contactless technology will be there, too. Another recent analyst report suggested as many as 20% of organisations would use smartphones for access, in place of plastic smart-cards, by 2020. The move to mobile access control seems inevitable. “Other highly security-aware industries like banking demonstrate the advantages of the smartphone,” says Thomas Schulz, Director Marketing & Communications Digital and Access Solutions at ASSA ABLOY EMEA. “Similarly, we see fast-growing interest in unlocking doors and other openings with mobile credentials, and in facility managers administering access rights via their smartphone.” SMARTair Openow solution “To take one example from our portfolio of mobile access solutions, security managers using our new SMARTair Openow solution manage all users’ virtual keys inside a secure app. If an administrator cancels a virtual key, it vanishes immediately from a user’s Openow app.” Schulz points to the new Arkansas State University campus in Mexico, where students and staff have no access cards to collect or validate. Every site user installs and validates their own Openow app and collects keys virtually. Wireless access control Smartphones add convenience and functionality right across our wireless access control product" “Smartphones add convenience and functionality right across our wireless access control product and solutions portfolio,” said Schulz. “Users can unlock our Aperio wireless locks with a Seos mobile credential. Small and medium-sized business managers can run their own access control with no specialist knowledge, using just the CLIQ Go app and their phone.” He further adds, “For companies with a remote workforce, the CLIQ Connect app updates access rights of programmable keys with just a secure Bluetooth connection. Access control from your mobile phone offers so many efficiency advantages. I’d encourage everyone involved in managing access control to take a look.”
Ping Identity, the provider of Identity Defined Security, announces updates to its multi-factor authentication (MFA) solution, PingID, providing new methods to mitigate risk and strengthen security for enterprises. PingID’s new features include ways to evaluate user and device risk before access is granted, as well as support for Fast Identity Online (FIDO) standards to increase resistance to advanced phishing attacks. With phishing resistant and user-friendly authentication methods—including biometric authenticators, such as facial recognition and fingerprint matching—enterprises are able to create policies to enforce MFA only when warranted by an increased level of risk. Risk-based security Risk-based security is especially critical to maintain employee productivity Verizon’s 2019 Data Breach Investigations Report found that 32% of breaches involved phishing and 29% of breaches involved the use of stolen credentials. For this reason, enterprises can benefit from an MFA solution that evaluates user and device risk to provide an extra layer of protection against phished and stolen credentials. Risk-based security is especially critical to maintain employee productivity and seamless online customer experiences. As a result, MFA has become more highly recommended by security frameworks like Zero Trust, those promoted by the National Institute of Standards and Technology and the International Organisation for Standardisation, as well as regulations like the PCI Data Security Standard. Leveraging facial recognition PingID further improves the balance of security and convenience provided to end users through multi-factor authentication as follows: Generally available in the next month, PingID support for Windows Hello and Mac Touch ID will support FIDO-compliant authentication methods. This will help users leveraging facial recognition and fingerprint matching on their devices. These capabilities help to securely access web applications that have implemented the FIDO standard. Additionally, PingID integration with FIDO-compliant security keys, such as Yubikeys, can be leveraged for web authentication and Windows login. Becoming generally available in the same time period, hardware OATH compliant tokens will be able to be used as an authentication factor when users are unable to use a mobile device. Virtual private network PingID will have the ability to support a quick and easy way to implement MFA PingID can now configure the number of attempts consumers logging in to a provider’s website have to enter a one-time passcode (delivered by SMS or Email), as well as set the amount of time they are locked out of their accounts if failing to provide the right one-time passcode. Additionally, generally available in the next month, PingID will have the ability to support a quick and easy way to implement MFA for Virtual Private Network access when users are working remotely, simplifying deployment of MFA for enterprise administrators. Corporate Resources PingID is now offering features in private preview that evaluate the location where a user requests access to corporate resources, and compares it to the location of the previous request. If the distance between the two geographies exceeds the threshold of what is possible by human travel, access can be automatically denied. Also in private preview, PingID assesses the reputation of the IP address from which a user requests access. Organisations can mandate specific MFA methods when the malicious activity-based risk score associated with an IP address exceeds a certain benchmark. Multi-factor authentication Hackers are evolving their tactics to access accounts and steal data every single day" “Hackers are evolving their tactics to access accounts and steal data every single day, and it’s our responsibility as an enterprise security provider to come up with innovative and reliable ways to assess risk before access is granted, and block access when warranted,” said Steve Shoaff, chief product officer, Ping Identity. “PingID is a core product that enterprises have been using for years, and its new features make it stronger and smarter than ever.” Organisations interested in securing their enterprise with multi-factor authentication can sign up for a free trial of PingID. Also, be sure to check out the blog titled ‘Five Preventable Breaches Make the Case for MFA Everywhere’ to learn more about attacks that can be prevented with multi-factor authentication.
The industry faces numerous challenges in the coming year. Physical and cyber security threats continue to become more complex, and organisations are struggling to manage both physical and digital credentials as well as a rapidly growing number of connected endpoints in the Internet of Things (IoT). We are witnessing the collision of the enterprise with the IoT, and organisations now must establish trust and validate the identity of people as well as ‘things’ in an environment of increasingly stringent safety and data privacy regulations. Meanwhile, demand grows for smarter and more data-driven workplaces, a risk-based approach to threat protection, improved productivity and seamless, more convenient access to the enterprise and its physical and digital assets and services. Using smartphone apps to open doors Cloud technologies give people access through their mobile phones and other devices to many new, high-value experiencesEnterprise customers increasingly want to create trusted environments within which they can deliver valuable new user experiences. A major driver is growing demand for the ‘digital cohesion’ of being able to use smartphone apps to open doors, authenticate to enterprise data resources or access a building’s applications and services. Cloud technologies are a key piece of the solution. They give people access through their mobile phones and other devices to many new, high-value experiences. At the same time, they help fuel smarter, more data-driven workplace environments. With the arrival of today’s identity- and location-aware building systems that recognise people and use deep learning analytics to customise their office environment, the workplace is undergoing dramatic change. Improved fingerprint solutions Cloud-based platforms and application programming interfaces (APIs) will help bridge biometrics and access control in the enterprise, overcoming previous integration hurdles while providing a trusted platform that meets the concerns of accessibility and data protection in a connected environment. At the same time, the next generation of fingerprint solutions will deliver higher matching speed, better image capture quality and improved performance. The next generation of fingerprint solutions will deliver higher matching speed, better image capture quality and improved performance Liveness detection will ensure that captured data is from a living person. Biometrics authentication will also gain traction beyond access control in immigration and border control, law enforcement, military, defence and other public section use cases where higher security is needed. Flexible subscription models Access control solutions based on cloud platforms will also change how solutions are deployed. Siloed security and workplace optimisation solutions will be replaced with mobile apps that can be downloaded anywhere across a global ecosystem of millions of compatible and connected physical access control system endpoints. These connections will also facilitate new, more flexible subscription models for access control services. As an example, users will be able to more easily replenish mobile IDs if their smartphones are lost or must be replaced. Generating valuable insights with machine learning Machine learning analytics will be used to generate valuable insights from today’s access control solutionsEducation, finance, healthcare, enterprise, and other niche markets such as commercial real-estate and enterprises focussed on co-working spaces will benefit from a cloud-connected access control hardware foundation. There will be a faster path from design to deployment since developers will no longer have to create an entire vertically integrated solution. They will simply add an app experience to the existing access control infrastructure. New players will be drawn to the market resulting in a richer, more vibrant development community and accelerated innovation. Data analytics will be a rapidly growing area of interest. Machine learning analytics will be used to generate valuable insights from today’s access control solutions. Devices, access control systems, IoT applications, digital certificates and location services solutions, which are all connected to the cloud, will collectively deliver robust data with which to apply advanced analytics and risk-based intelligence. As organisations incorporate this type of analytics engine into their access control systems, they will improve security and personalise the user experience while driving better business decisions.
The access control industry tends to be more conservative when it comes to the adoption of new technology and services for end users, but that doesn't mean that 2019 won't provide a significant amount of progress through emerging trends taking shape in the industry. In addition to the increased adoption and acceptance of the cloud, mobile credentials and biometrics are becoming more mainstream, and integrations between manufacturers will take centre stage. Here, we take a look at these and other trends helping to shape the coming year. Cloud-based products We're continuing to see a demand by end-user customers for customised responses to certain actions within an access control system For many access control manufacturers, the core of the business is in more traditional products, with a high percentage of installs continuing to be these kinds of projects. However, over the last couple of years, cloud-based products have emerged as a viable option for customers. We've seen more of a willingness for end-user customers to inquire whether this is an option for them, citing ease of use, remote management, cybersecurity and more as part of their foray into this branch of access control. The cloud has established its reputation as being quicker to install, more flexible for customers to access and manage both their access points as well as the video associated with these doors, and placing less pressure on internal (or in some cases, non-existent) IT teams to help set up and manage an access control system. Mobile credentials applications We're continuing to see a demand by end-user customers for customised responses to certain actions within an access control system. For example, if there's an alarm set off during the day along a perimeter, the ability to automatically execute a lockdown and simultaneous email or message to everyone within the building alerting them to the issue is critical. The desire for this kind of flexibility within a system is prompting manufacturers to build new simple to use graphical tools into their systems that allow customised action responses that are proportional to the level of alarm. There's a strong desire by many of today's companies to be able to use mobile phones for access control and as such, manufacturers are either developing their own mobile credentials applications or integrating their systems with these kinds of products. Over the last couple of years, cloud-based products have emerged as a viable option for customers Future of biometrics As companies start to ask about whether their facilities are safe enough, they're often more willing to consider access control that takes security to a new level, such as the implementation of biometric readers. Biometrics is getting more usage in professional security applications and many customers want to move away from using physical cards for access control. Manufacturers that don't currently have biometric hardware in place are starting to integrate with readers designed to offer this functionality in an effort to meet the demands of customers. The dramatic rise in facial recognition biometrics is something that will likely shape the future of biometrics as costs start to decrease. While the access control industry is highly fragmented, we're seeing a trend toward increased partnerships and open-platform technology that helps end users achieve the kind of comprehensive security that they desire. Video management platforms We're seeing a trend toward increased partnerships and open-platform technology that helps end users achieve the kind of comprehensive security that they desire For example, there are a number of access control providers that are providing paths toward full integration with lock manufacturers and vice versa in an effort to meet the needs of clients who may have purchased locks but a high powered access control system to properly manage them. There's also a large shift toward full integration with video management platforms and access control systems to fully integrate the two into a single, user-friendly experience and give end users more control over both. Additionally, manufacturers are looking to provide customers with a single system that meets the needs they have with regards to video, intrusion and access control. Right now, I don't think there's a system that can fully deliver on the promise of being exceptional at all three, so integrations and partnerships remain important to achieve that end goal. Access control world An increasing number of end users are realising the holes in the current Wiegand protocols that have been in place since the 1980s, along with the large number of ‘off the shelf’ equipment that's now available to allow outsiders access through readers that operate under these protocols. As a result, in the last decade or so, OSDP has come onto the scene and is growing in popularity. One of the most important steps for access control manufacturers in 2019 will be to listen to customers who are concerned with this vulnerability and work toward fully supporting OSDP in an effort to protect these access control systems. It's an exciting time to be a part of the access control world, as we finally see results from all of the hype centred around the cloud, biometrics, mobile credentials, hacking protection and strong partnerships come to fruition. As 2019 begins, look for these trends to grow in popularity and for manufacturers to really listen to the end-user customer they serve and respond in kind.
Public spaces in cities and suburbs are important places for community development and promoting outdoor recreation. These areas may include main streets, parks, promenades, band shells and fields. Such locations are often utilised by public event planners for community activities, including summer festivals, wintertime ice skating rink installations, music concerts and art fairs. As the year drew to a close, holiday and Christmas markets as well as major New Year’s Eve events, presented cities with constant public event security needs. The public nature of these events increases risks of incidents with high-speed vehicles that put attendees in danger. Fortunately, there are three ways for public space managers to prevent casualty-causing collisions and further promote the use of local public areas. Developing an effective action plan When strategising how to react to an alert, think about what time of the year and time of day the event is occurring It is important to have a plan developed before an incident or accident occurs. Warning systems, utilising doppler radar and digital loop technologies, alert guards to abnormal vehicle velocity changes in the surrounding area. Managers of public areas should organise a meeting with public safety authorities and local agencies to discuss what must immediately occur when a high-speed vehicle is approaching a public event. When strategising how to react to an alert, think about what time of the year and time of day the event is occurring. Having such a reaction plan in place combines technology and strategic planning to ensure everyone is on the same page to effectively target a threat and promote overall event safety. Securing public areas Ideally, there will be no need to implement a well-conceived action plan. After all, taking preventive measures to secure public areas where events take place is important to keep people safe from accidental vehicle collisions and intentional attacks. Protect attendees by clearly separating pedestrian and vehicle locations using security devices such as – Barricades Portable barriers Bollards Install guard booths Avoid the risk of vandalism and theft, making sure people are safe when walking back to the cars at night by keeping parking areas illuminated with flood lights. Install guard booths with employees who monitor activity in the parking area and who are prepared to react if an alert is triggered. Furthermore, prevent accidental collisions by clearly marking the parking area with informative warning signs and using barricades to direct traffic. These three tips can be used by public area managers to promote security at the next community event. Additionally, the technologies used to secure an event can also be used as infrastructure for year-round security. Installing gates that shut when the public space is closed or using aesthetically pleasing bollards are steps any public area manager can take to promote community safety.
The Physical Security Interoperability Alliance (PSIA) was founded in 2008 with a goal of creating ‘plug-and-play interoperability’ among physical security devices, systems and services. Since then, the organisation’s mission has both expanded to include logical security and focused more narrowly on identity, a critical aspect of security today. In recent years, PSIA has concentrated on its PLAI (Physical Logical Access Interoperability) specification, which provides a means to enable disparate physical access control systems (PACS) to communicate to each other and share employee identity data. This is especially important for companies who have made acquisitions and inherited different incompatible PACS systems. “PLAI can unify a security environment through one trusted source, even if there are multiple PACS systems,” says David Bunzel, Executive Director of the Physical Security Interoperability Alliance (PSIA). Bridge between disparate PACS The PLAI specification provides a bridge between disparate PACS, allowing a single trusted source for identity management. Leading PACS vendors including JCI (Software House), Lenel, and Kastle Systems and biometric vendors including Eyelock, Idemia, and Princeton Identity, have each implemented PLAI adapters, supporting this specification. AMAG will have their adapter in the coming months, and Honeywell and Siemens have it on their road maps. At ISC West last April, PSIA was able to demonstrate five of these vendors sharing records and the ability to add and terminate an employee and have it updated across each PACS and biometric system. PSIA was able to demonstrate five of these vendors sharing records at ISC West last April The Physical Security Interoperability Alliance (PSIA) has evolved from supporting physical security to also integrating logical security. Access to facilities and secure areas of buildings is increasingly dependent on software and hardware systems which can validate a person’s identity. “The PSIA has chosen to focus on interoperability between identity management systems and access control devices,” says Bunzel. “We have successfully demonstrated the technology, and it is now being specified by consultants, integrators and enterprise customers in actual security systems. We expect to see some large companies announcing PLAI implementations in the next quarter.” Open standards processes PSIA relies on an open standards process, with collaboration among leaders in the various parts of the security industry. Specifications are architected, discussed, drafted, and reviewed by members of the organisation in technical committees. The process is dynamic, with periodic updates added, which will improve and enhance the specifications as appropriate. The PSIA has focused on identity management for enterprise customers, says Bunzel. “We have active members who make devices that support access hardware (for example, locks and biometric systems) who by design complement PACS vendors and HR management systems.” PLAI also enables a variety of services for enterprise customers that may rely on a security credential" “We continue to add more PACS and biometrics vendors to the PLAI ecosystem, expanding the value of the specification in the market,” says Bunzel. “PLAI also enables a variety of services for enterprise customers that may rely on a security credential, including printing services, parking, and facility management. In the near future, the PSIA expects to extend PLAI into elevators. There are other identity management capabilities, and the PSIA will evaluate opportunities as the market demands them,” says Bunzel. In addition to PLAI, PSIA has several ‘legacy’ specs, but they are not actively working on further iterations. PSIA could always consider new development on legacy specs if the market demanded it. Some legacy specs address video, and security cameras often work with access control systems. However, PSIA currently is leaving video to ONVIF. The near-term direction and plan for the PSIA is to focus on PLAI and its commercialisation.
Krowd is an app that connects people together based on geography; that is, if they are at the same place at the same time. Users sign into the app using the local WiFi, identify themselves by username, and are placed immediately in a group chat comprising anyone else at the location who has signed into the app. An enhancement of the Krowd app, known as Krowdsafe, leverages the technology to achieve and promote security and safety. Specifically, Krowdsafe enables users to interact directly with security personnel at a public place to report any crimes or security infractions and to enable rapid response. Think of it as “crowdsourcing” security – the app provides more eyes and ears to keep a venue safer. In effect, it enables each of its users to be an extension of the security presence at a venue or event. Krowdsafe improves crowd resilience. “Crowdsourcing” security – the app provides more eyes and ears to keep a venue safer Krowdsafe security app Krowdsafe also opens a channel of communication for the security team to provide ad-hoc security information reminders or messages. Krowdsafe can be used at a variety of venues, including stadiums, transport hubs, office blocks, retail malls, college campus and major events organisers. The app does not access identities, violate privacy, or track the movements of users. Other app users only know the information fellow users disclose. Still, group chats, one-on-one engagement, and other social media interactions can ensue, whether about a favourite football team or the excitement of a rock concert. The system fosters digital engagement that centers around a physical space. Krowdsafe applies those capabilities to promoting better security. Enhancing crowd safety and management The elements of Krowdsafe beat out 67 competitors to win the Defence & Security Accelerator Competition to Innovate Crowd Safety, launched by the UK Home office after terror events in 2017. Key areas of interest in the competition were to improve the detection of threats from explosives and weapons within a range of crowded places with high footfall and so reduce the chance of future attacks. Krowdsafe provides a prioritised, readily accessible and simple way for members of a crowd to communicate with a security team charged with keeping them safe. The £250,000 government award has helped the product move forward commercially at a faster pace. Krowdsafe app does not access identities, violate privacy, or track the movements of users Krowdsafe users can tap a red button, prominent on the Krowd app, that says “Report.” They may then choose from a listing of common threat types – from suspicious activity or unattended activity to medical emergency or fire services. The list is configurable by venue and corresponds to any specific threat models. The list corresponds to the nature of any situation security wants to address, such as “anti-social behavior” at a football club. Users in the crowd can anonymously report racist chanting, for example. In a children’s sporting event, the app can be used to facilitate lost-and-found children. If a child gets lost, a user can share a photo with the security team, who can alert the “public” (other Krowdsafe users) and find the child within minutes or seconds. Encrypted identifier code A user taps the “Report” button, selects an issue, and an alert goes directly to the security team A user taps the “Report” button, selects an issue, and an alert goes directly to the security team, who can respond because they have the encrypted identifier code from which the message came. For that point, the security team communicates one-on-one with the user, who can then choose to share their current location with the security team to facilitate response. (The “legitimate interest” of knowing the location negates any privacy concerns.) Once location is enabled, the security team can follow the precise positioning of threats on a map, using GPS and other technologies, or even on a three-dimensional digital map of a multi-story building. Another security benefit of Krowdsafe is prevention. Event organisers and venue managers can promote the use of Krowdsafe on posters or in announcements throughout the venue. Additional eyes and ears are the equivalent of CCTV coverage on every inch of a venue and use of the system makes the environment more hostile to mischievous, malicious and/or terrorist activity. In effect, bad guys will go somewhere else. Enhancement to Krowd app Krowdsafe is an enhancement to the Krowd app, which has been around for a couple of years and is available in app stores for iOS and Android. The app approximates in the digital world the experience of being a stranger in the crowd in the real world. Users can join a conversation based on their username, and then disclose to the crowd whatever they wish (or not). Event managers/organisers can promote hashtags to help identify others in the crowd (such as #ManUnited to identify fans of the same football team). In general, users can identify themselves (voluntarily) according to common interests using hashtags. “Krowd is a group chat that connects people together at the same place at the same time in a group, but without anyone having to disclose personal information,” says Geoff Revill, Managing Director, Krowdthink Ltd. “You have a digital presence in the same place with other people at the same time.” Wireless connectivity Users connect initially into the system through WiFi, access to which serves to approximate presence at a venue Users connect initially into the system through WiFi, access to which serves to approximate presence at a venue. Once someone signs in, information about them is merely a grouping of “hash” numbers, which are used to identify them as they communicate with others in the location. However, the “hashing” cannot be hacked to find a user’s location, thus ensuring greater privacy. Because Krowd does not collect personal data (which is a revenue source for most social media companies), the company generates revenue by providing the service to venue owners who wish to interact with and manage a crowd. Data security Location data is considered sensitive under General Data Protection Regulation (GDPR), and tracking locations can help to identify where someone lives, works, who they associate with, etc. By not tracking location, Krowd avoids the related privacy issues. After initially signing in on WiFi, Krowd communications can also use 2G, 3G and other cellular networks in addition to WiFi. Addressing privacy concerns is essential to encouraging involvement in the Krowd app, and in Krowdsafe. “If you want people to participate in keeping the crowd safe, you have to get their trust and respect them, that’s a building block behind the behavioral science,” says Revill. By not tracking location, Krowd avoids the related privacy issues Privacy protection Because Krowd users remain anonymous (except for the information they choose to share), user data is not collected (and/or sold or used for future marketing purposes). Krowd’s paying customers are event venues and public places that provide the Krowd service and can promote their commercial messages or provide other information to their populations while on site. Krowdsafe can provide immediate security benefits to a venue. Even if only 25 staff members use the app in a given location, for example, that’s 25 more sets of eyes and ears to help the security department. In a retail mall, if the staffs of 200 tenant businesses use the app, that’s another 500 or so people watching out for security. Among the general public, use of the app can be promoted in customer newsletters, or by posting group discussions on big screens around a venue. Wide marketing scope It enables members of a crowd to report any broken doors, water leaks or blocked toilets Security is a secondary benefit for some Krowd users, who are drawn to the app because of marketing opportunities, such as the ability to provide discounts or promotional offers to customers while they are on site. The app also encourages social media interaction, while maintaining the venue’s ability to “manage” the crowd by moderating any discussions. The Krowd app also provides management benefits to a venue. For example, it enables members of a crowd to report any broken doors, water leaks or blocked toilets. In general, the app helps to promote a better brand experience for the customer. Incident management One of the UK government’s concerns about Krowdsafe was its possible use by terrorists or other to cause incidents in a public venue. Think of the case of Olly Murs, a U.K. singer, whose mistaken tweets about hearing gunshots caused a brief panic at a department store on a busy shopping day. Might Krowd be uses similarly by a terrorist or other evil-doer to cause chaos or a distraction? No, says Revill, who points to a higher level of control over content exchanged in Krowd versus Twitter, for example. The security team can censor content or limit its propagation. They can also disable or block a user from communicating on the app. Messages containing dangerous or troubling content, such as racist terms, can trigger alerts to enable security teams to respond quickly.
Attendees strolling the exhibit hall at IFSEC International, 18-20 June, 2019, at ExCel London, will be hearing a lot about artificial intelligence, convergence and GDPR. These industry hot topics are representative of major trends in the industry, from new technologies to new ways of designing systems to new privacy requirements. The education sessions at IFSEC International will also address these timely subjects – and provide a welcome chance to sit down and consider the ‘bigger picture.’ Here are some sessions to consider: Artificial Intelligence The session will examine the ‘connectionism’ aspect of AI with reference to machine learning and neural networks A session on artificial intelligence asks: ‘Will AI change the face of the Electronic Security Industry?’ The session will examine the ‘connectionism’ aspect of AI with reference to machine learning and neural networks. Connectionism, or neuronlike computing, developed out of our understanding of how the human brain works at the neural level. Each neuron in the brain is akin to a simple digital processor, and the brain as a whole is like a computing machine. Has the time come for artificial intelligence and machine learning for security? That’s the focus of another session that will explore where AI is headed and if it can help move security practice from prevention to real-time threat detection. Is AI a technology looking for a problem to solve? Is it mature enough for mainstream usage in security scenarios? Does AI present a ‘double-edged risk’ (i.e., because enterprises and attackers have access to the same tools)? Convergence A combined security approach – unifying physical security and cybersecurity – is a real and immediate need in today’s high-risk and high-threat environment. By leveraging disparate sources of data, organisations can effectively manage a situation in real-time without having to go to multiple individual subsystems to get the job done. A panel session at IFSEC will discuss the concept, reality, and evolution of both physical and cybersecurity teams collaborating in the same Security Operations Centre. Here are some other sessions related to convergence of physical and cybersecurity: How converged security centres respond in real-time to physical and online threats How converged technologies ease prevention and response to unauthorised physical/logical access to corporate facilities and networks How chief security officers can benefit from data analytics and converged platforms to understand the complex physical and cyber risks posed to transport systems. GDPR Whilst the regulations provide a more comprehensive basis in law for the management of personal data The introduction in 2018 of the EU General Data Protection Regulations (GDPR) and Data Protection Act 2018 have elevated compliance requirements for video surveillance systems. That’s the subject of the session ‘GDPR – Video Surveillance: Balancing Privacy and Security.’ Whilst the regulations provide a more comprehensive basis in law for the management of personal data, they are part of a wider legal consideration for security technologies. Transparency, accountability and impacts on privacy must be actively integrated into security systems from the outset to retain the trust of those they affect. The work of the Information Commissioner (ICO) and the Surveillance Camera Commissioner (SCC) with their respective Codes of Practice provide a bedrock for effective governance. The 2018 Biometrics Strategy for the Home Office and their partners addresses the need for clear and transparent arrangements to ensure risks to privacy are weigh alongside the benefits. The session will examine these complexities and look at what owners and operators of security systems must consider when striving to balance privacy and security.
The University of Birmingham educates over 30,000 students, with more than 6,000 doors providing access to student accommodation. Gallagher’s integrated access control solution is responsible for providing operational continuity and creating a safe and secure environment for residents. The University recently completed its new state-of-the-art student accommodation development, Chamberlain, which consists of a 19-storey tower and three low-rise blocks. An essential requirement was an integrated access control system, reducing the need for keys. Timothy Owen, General Manager of Student Accommodation at the University says, “We wanted to move away from using keys as students are prone to losing them and trying to manage thousands of locks and associated keys was a constant administration and financial drain.” In order to minimise the complexity of managing a new system, the University required a solution that integrated with, or was an extension of, their existing campus access control and accommodation management systems. “We need to maintain control over access to our buildings, while ensuring a duty of care to our residents and staff so that they can go about their business as required,” says Timothy. “Fundamentally, we needed a system that gives both us and our resident’s confidence in the security of the accommodation.” Gallagher Command Centre, together with the Aperio wireless locking technology, was selected as the University’s choice Aperio wireless locking technology A large and complex estate with buildings of different construction and age, the University needed a solution that was flexible enough to accommodate their unique requirements. Gallagher Command Centre, together with the Aperio wireless locking technology by ASSA ABLOY Access Control, was selected as the University’s preferred choice, meeting their security needs in a cost effective way while still delivering to the overall specification. Timothy says, “The completion of our new state of the art Chamberlain development was extremely close to the date of the first student arrival, so the team had to be dedicated and work flexibly to ensure it was ready in time – which it was.” Gallagher Command Centre integration The Gallagher Command Centre integration allows for the access key and student ID to be combined into one card, offering a number of benefits to both students and staff. Previously the accommodation arrival process required students to arrive at the University with their contracts and queue up so that a member of staff could sign them in manually and hand them the keys to their accommodation. From there students could head to their room. “Arrivals is always a busy time but with the help of the Gallagher solution we’ve not only improved the student experience but also the administration process,” says Timothy. “Now the student ID and accommodation key is encoded on to one card so it can be posted out in advance and access to the room automatically granted via the accommodation management system. Students no longer need to queue for keys, can get to their rooms instantly, and spend more time enjoying their arrival experience.” Secure, authorised access control The simple act of swiping an access card automatically checks the student in and an attendance report can be instantly generated The simple act of swiping an access card automatically checks the student in and a report can be generated to show who has arrived and who hasn’t, allowing staff to follow up accordingly. If the room is no longer required it can be quickly and easily re-allocated to another student, resulting in improved occupancy rates. Using Gallagher Command Centre together with the University’s accommodation management system allows staff to check on the well-being of students by monitoring the use of their access card. Student security and tracking The University also houses students under the age of 18, and one of the safeguarding requirements is that the University can monitor their whereabouts on a daily basis. Timothy adds, “This can be difficult to achieve with many students to track, but Gallagher Command Centre can easily confirm the time and location of our resident’s last door access, providing peace of mind that students who may be uncontactable are in fact on site.” University staff are also seeing positive improvements since the installation of the new system – particularly at the start of the year. The arrivals process is now less congested and more relaxed. The team have far fewer issues than with physical keys, enabling them to spend more time on the overall student experience. Since the installation of the first 800 bedrooms at Chamberlain, the University has already extended the system by a further 900 at Mason, with plans in place for an additional 1500 bedrooms this summer. Combined access and student ID card “Replacing keys with a combined access and student ID card has reduced our operational costs as we now have far fewer keys to purchase and store,” explains Timothy. “The student experience has improved and staff are now free to deal with urgent matters and offer a more personal service. We can easily create reports to help us audit access and have generally provided a much more modern and secure place to live and work.”
King’s College London, based in the centre of London in UK, is a world-leading university and a founding college of the renowned University of London. One of the oldest universities in England, it was established by King George IV and the Duke of Wellington in 1829, receiving its Royal Charter in the same year. Campus security and access control King’s College London had been using a variety of access control products to control and manage security across its multiple campuses. Its key requirement was a standardised access control system that could operate college-wide and be scaled to include new buildings and establishments. Also, considering the college campus is based in the heart of London, the threat of terrorism and active shooter incidents is a major concern for KCL, especially in more recent times where attacks have taken place extremely close to college buildings and campus. With thousands of students and employees to protect, the need to adopt the latest security features is essential in order for the college to keep all areas secure, in particular student accommodation, high security labs and research facilities. Gallagher access control solution Gallagher’s access control products were easily integrated with King’s College’s existing systems With Gallagher technology already successfully deployed in isolation at the university’s Guy’s and Strand campuses, it made sense to select Gallagher as the access control platform of choice for the entire college. Gallagher’s access control products were easily integrated with King’s College’s existing systems, including staff and student databases, and sources for cardholder information. This included the college’s enterprise Identity Management system, called FIM, which provides daily updates on joiners, movers and leavers to allow accurate decision-making by the security team. Additionally, Gallagher products were integrated to work alongside SITS, the college’s student management system, providing rapid updates of new students so that individual ID cards can be issued once the registration process is complete. Gallagher Mobile Connect app KCL has also invested in new mobile technology, with Gallagher readers that can be accessed via a mobile phone using the Gallagher Mobile Connect app. This will allow students and staff to conveniently access designated areas, control lighting, visitor access, and more. While it is still early days for the college using this technology, the system is adaptable and provides the ability to add features that meet future requirements. The overall benefits of the Gallagher security solution deployed at King’s have proved significant. Nick O’Donnell, Director of Estates and Facilities at King’s College London, says the Gallagher solution “improves service to King’s College’s facility users, especially its students, and reduces the college’s reputational risk by removing technical barriers to comprehensive security management.” Streamlining multiple security systems Streamlining the differing security systems used by individual campuses by introducing a college-wide standardised system has highlighted many additional advantages, including a considerable reduction in costs for training, special projects and operator skills. Gallagher integrations allow extra security features to connect to Gallagher Command Centre Gallagher integrations allow extra security features to connect to Gallagher Command Centre, creating a central administration system that keeps things simple to manage. Integrating with Aperio, for example, ensures doors are locked when people leave the room – providing peace of mind that rooms won’t be accidentally left open over night or during the weekend. Student and staff ID management Gallagher’s proven technology has boosted King’s College’s confidence in its electronic system. When there are alerts, the university’s security services can consult a single system and react quickly. Card holders are also now registered on one system, allowing tighter management of passes. Overall, the college reports fewer system failures, with better decision-making between its numerous estates and libraries, while multi-site students, staff and visitors have experienced easier card management.
Resort World Casino New York City, (RWNYC) is the only legalised gaming casino in New York City. Its location near JFK International Airport meets New York State gaming regulations regarding geographical requirements, in order to protect visitors, patrons, and the casino’s assets. With approximately 400 million dollars channeled through its facility each week, the casino’s concerns include security across multiple points of entry, vendor offices, cashier cages, count room areas, and high limit rooms. The casino has an average of 15,000 guests per day, approximately 1,000 employees and 6,500 parking spaces. The requirement to accurately monitor and protect Resort World’s guests, facility, and personnel, demanded a state-of-the-art solution that could meet its complex security needs. Comprehensive security and surveillance program Gallagher worked closely with Resort World to understand their unique challenges In order to create and maintain a safe and secure environment for all, Gallagher worked closely with Resort World to understand their unique challenges. A comprehensive security and surveillance program were implemented to seamlessly integrate people, processes, and technology. This program included: Integration with iTrak System, providing up-to-date information on personnel and incident reports from all departments. Synectics VMS Integration (with more than 2,000 HD cameras), to control doors, acknowledge alarms, link cameras to alarms, and alter the mood of the monitor room by changing the color of the lighting. If an alarm is activated the monitor room lighting turns red. Open Process Control Integration, to automatically generate VMS alerts. These alerts convert to a WAV (audio) file that announces the location of the alert and then directs cameras to the specific area of interest. Interface and automatic export of the Employee Dining Buffet record to payroll weekly. Scalable security solution Director of Surveillance at Resort World New York City, Jason Arnett, and his team have completed the Gallagher Access Technician Training Course and are qualified as first responders. A+ Technology & Security in Bay Shore, New York is Gallagher’s Certified Channel Partner and service provider for RWNY. “Security of the property is key to the success of our business,” says Jason. “Having a system that is capable of numerous customisations, while being scalable to the constant demand for growth, proves it is an all-around solid security system for our environment.” Customer inspired Resort World Casino New York City identified a need for a solution that would disable employee access cards at the end of their shift. Employees were required to pass through a security checkpoint at the start of their day to reactivate their access card. To streamline this process, Resort World selected Gallagher’s Action on Access integration. Jason explains, “This significantly enhanced the security of the property by taking fear out of the equation.” Gallagher Action on Access integration ID badges are no longer active while off property, activation of the ID is done in the presence of security ID badges are no longer active while off property, activation of the ID is done in the presence of security, meaning unauthorised access to the property due to a lost ID badge is no longer a concern. Additionally, in the event of an emergency, a report can be run producing an accurate account of who is in the building. Lastly, it requires staff to enter and exit the property though one particular entrance, limiting the possibility of internal theft. Ultimately, Action on Access delivers a two-fold protection plan. Cardholder selection is regulated by the state to ensure that no individual has full capability to create a complete cardholder credential or select access for the cardholder. In order to maintain compliance with state regulations, RWNYC utilises features included with Gallagher Command Centre such as dual access point authorisation, interlocks, and security alarms tied-in with output to control lights, as well as additional device notifications. Authorised and secure access control In order to provide enhanced protection and authorised access control, several mantraps were positioned in critical areas of the facility. These mantraps allow RWNYC staff to know who is on duty. This step, in conjunction with Action on Access, provides a significant safety measure as it allows for the enabling and disabling of card access with time restraints, in the event a card is lost or compromised.The Gallagher system is fully customisable to meet and exceed gaming regulations for this property" “With Gallagher’s latest software update, we’ve been creating more customised views for our staff to better monitor particular areas,” says Jason. Email alert notifications are used to inform Player Development that an invited guest is entering the private gaming space, allowing a greeter to welcome them and provide best in class customer service. Gallagher security system Gallagher’s security solution affords RWNYC a reduction of five to eight hours of labor per week by utilising Command Centre’s reporting and auditing capabilities. “The Gallagher system is fully customisable to meet and exceed gaming regulations for this property. It is modular and can be divided into multi-tenant features. Gallagher’s functionality and flexibility are only limited by your imagination,” Jason summarised. Gallagher Command Centre is at the center of Resort World Casino New York City’s thorough and complex security program, helping protect their world class entertainment facility by safeguarding physical property, minimising risk, and reducing operational costs.
People’s Choice Credit Union is one of Australia’s largest Credit Unions, with 365,000 members and 44 locations across South Australia, Northern Territory, Victoria, Western Australia, and Australian Capital Territory. People’s Choice Credit Union (People’s Choice) has earned a reputation as a forward-thinking and highly innovative company that is radically changing the banking experience for its members and employees. From their head-office to their branches throughout Australia, People’s Choice is utilising new technology to improve service to members, be more efficient, reduce costs, and decrease their environmental footprint. Smarter workspaces Operating an innovative, modern working environment that utilises flexible workspaces in place of traditional desks, People’s Choice staff are not allocated a specific desk but instead choose where they wish to sit each day. They can even choose whether they wish to sit or stand, by having desks that can be raised or lowered to suit personal preference. Flexible work environments are proving popular for large corporate companies due to the ability to increase company-wide communication, support project work, improve productivity, reduce clutter, and save costs. “With a large staff, there is always a number of people out of the office, whether it’s on sick or annual leave, or working on business outside of the office.” said Mike Humphrey, Manager of Property Services at People’s Choice Credit Union. “By implementing a flexible workspace model, we have been able to save approximately 3,000 square meters of office space which equates to thousands of dollars each year in building costs” said Mike. Multi-technology smartcard T20 and T10 readers Using Gallagher’s smartcard T20 and T10 readers on each locker bank, staff badge their access card to open their allocated locker To facilitate the operation of a flexible work environment and provide employees with storage for their personal effects (work-related material is stored elsewhere), People’s Choice uses banks of brightly coloured lockers that are managed by electronic access control. Using Gallagher’s smartcard, multi-technology T20 and T10 readers on each locker bank, staff badge their access card to open their allocated locker. With the readers communicating with Gallagher’s Command Centre software management platform, People’s Choice has a simple to operate, customisable system that enables staff to carry just one card on site. “We’re all about putting people first. As an organisation we’re not afraid to try new ways of doing things, and as a result we’re seeing significant improvements for our members and staff.” Mike Humphrey, Manager of Property Services, People’s Choice Credit Union. Command Centre Mobile App Utilising Gallagher’s innovative Command Centre Mobile App, key facilities management personnel are able to manage access remotely using their mobile phone. “Occasionally staff forget their access card and I’ll get a phone call to open their locker for them. Being able to access the platform and administer overrides using my phone, from wherever I am at the time, is huge for me” said Mike “and it speeds things up considerably for the employee”. With people working in different areas at different times, People’s Choice needed a printing solution that simply and easily enabled staff to retrieve printed documents from the nearest printer. People’s Choice was also looking for a solution that helped to cut down on unnecessary waste. Follow-Me Printing solution To meet both of these needs, People’s Choice installed Follow-Me Printing. This printing solution stores print jobs electronically until a user badges their Gallagher access card at a printer to retrieve their files. At this point, the user can terminate any print jobs they no longer need, cutting down on waste. The solution further reduces waste through a configuration that deletes any printing jobs that haven’t been actioned within a 24 hour period. “One of the truly efficient things about our set-up is that our printing integrates with our access control solution.” said Mike. “It means that staff only have one card for all of their access needs on site; they can access the various office floors, lockers, and printers all with a single card, instead of also having keys and pin numbers to manage.” Temperature management solution Any change in temperature beyond the set limits, triggers an alarm notification Through a Gallagher Bacnet integration, People’s Choice has implemented an automated, continuous temperature management solution for the large data centre located at their head office. With temperature sensors communicating directly with Command Centre, any change in temperature beyond the set limits, triggers an alarm notification to be sent directly to Mike’s phone. According to Mike “The capability for Gallagher’s platform to send critical information, like the potential overheating of a server room, straight to my phone was a big selling point for us. It provides a simple mobile solution to mitigate a considerable business risk.” Visitor management To support efficiency at their head office reception area, People’s Choice chose Gallagher’s Visitor Management Client and Self-Registration Kiosk. The self-registration kiosk serves as an ideal “extra lane” during particularly busy periods, ensuring that visitors are able to register their arrival quickly and effortlessly without delay. The integration between Gallagher’s visitor management solution and Command Centre, ensures that a comprehensive audit trail of all visitor management events, including visitor pre-registration, escort, host, and visitor actions, is securely stored and can be easily retrieved to produce reports.
The American University of the Middle East (AUM) in Egaila is the largest private university in Kuwait. Its extensive campus is spread over 261,190 square meters of beautiful grounds, including academic buildings, technical labs, AUM library, AUM Sports Center, outdoor sports playgrounds including a FIFA certified football field, AUM Opera House, AUM Conference Center, parking areas, administrative and service areas. The American College of the Middle East (ACM) is also hosted within the campus. With sizeable grounds and multiple institutes of learning operating on site, AUM’s access control requirements were complex. The popularity of the campus with not only AUM students but also Kuwaiti youth in general meant AUM needed to ensure the right access was provided to the right people at multiple points on campus. AUM’s Director of IT highlights the challenge the administration faced in efficiently identifying, authenticating and providing access for more than 800 employees and over 10,000 students. “The campus needed to be secure, but at the same time easy to use, causing no inconvenience to students and staff.” Gallagher Command Centre AUM needed a dynamic solution that met their access control requirements AUM needed a dynamic solution that met their access control requirements, could integrate with their core enterprise resource planning (ERP) solution, and was scalable to accommodate future growth. Gallagher’s access control solution, featuring Gallagher Command Centre and a range of integrations, was selected as the university’s preferred choice, meeting its requirements in the best possible way. MIFARE contactless smart cards Student and staff ID cards became part of the access control system with MIFARE contactless smart cards provided to students, faculty and staff. Turnstiles installed at the entrances to AUM and intelligent integrations with existing systems provided total control of movement within the campus. AUM uses learning software and automated systems widely across its campus. Extensive integration with the Gallagher solution has significantly reduced operational costs, creating efficiencies for staff and students and enhancing the overall security system. “Gallagher gives us the best option to fulfill our requirements, with a total solution,” says the university’s Director of IT. Integration with CCTV system Exam control rooms at AUM need to be fully secure. Command Centre integrates with the CCTV system to ensure that when movement is detected, or someone tries to open the door, the CCTV is triggered, and a photo attached to the security report. Within the campus, access permissions need to be well defined for different groups. Access to the gymnasium, library and sports center is defined by male and female, staff and students. Command Centre allows AUM to define these access controls in the directory, ensuring they happen automatically. Fully automated access control Fully automated access control gives us confidence in the system" “Fully automated access control gives us confidence in the system,” says the university’s Director of IT. “We don’t have to worry about it.” The reporting capabilities of Command Centre provide AUM with greater control and audit information. The university is governed by a council, that regularly conducts audits. “The Gallagher solution helps us easily produce daily reports to meet those reporting requirements. It’s a fantastic solution, no doubt." The integrated booking system in the library controls access to study rooms, giving entry only to those who are included in the room booking. Staff and students no longer have to manage who is in the rooms, allowing them to get on with their work and study. The university’s Director of IT says in the past, monitoring and reviewing this information would take a person two or three days. “With this small integration from Gallagher, turnaround time has improved to within half a day for the same task.” Restricted access He adds, “Campus access for dismissed students has been prevented. Their access is automatically restricted by the admin department. Student’s whose access has been prevented can visit the admin department to rectify their enrollment status. The integration with the Gallagher solution is amazing. Our operational costs have been reduced wherever it is used.” With new construction underway and increasing popularity with students, AUM is a growing university. The Gallagher solution is growing alongside it, providing regular updates and new innovations. “Gallagher often contacts us about new initiatives and things they are introducing,” says AUM’s Director of IT. “We will implement them, because of the success of the current solution. We try at every point to take full advantage of the features offered to keep reducing operational costs. From an industry perspective, it’s a beautiful solution.”
It is essential that governments be able to issue identification credentials so citizens can exercise their civic rights and duties, access programs and services, and travel freely to and from other countries. HID Global, globally renowned trusted identity solutions, has enabled numerous African countries to issue millions of these credentials as the company helps to propel a variety of initiatives across the continent aimed at providing “identity for all.” Secure ID card issuance “Secure issuance is a key part of our identity portfolio that is helping nations in Africa and other emerging economies close a big gap between citizens who have a legal way to identify themselves and those who don’t,” said Craig Sandness, Vice President & Managing Director – Secure Issuance with HID Global. We are also actively involved in designing programs for civil servants to securely access government buildings" He adds, “Our successes in Africa range from Angola’s voter ID card program to deployments in multiple countries that enable governments to issue national IDs, driver’s licenses, health cards, work permits and refugee identification credentials. We are also actively involved in designing programs for civil servants to securely access government buildings and government assets such as PCs or server rooms.” HID Global identification program For many countries, an e-Passport is the building block of democracy and cornerstone of citizenship as their first step to launching an identification program. HID Global’s secure issuance offering spans all aspects of creating and managing these and other credentials and issuing them wherever citizens are located. Notable deployments in Africa include: Resident, Healthcare and other National IDs: Eight African countries have either deployed or are developing one or more of these ID card programs using HID Global printers. Several are also in the early stages of deploying systems for issuing government employee ID cards for use by members of their military and police forces. Voter IDs: Angola used HID FARGO DTC5500LMX printers to roll out a voter ID program in over 200 municipalities and cities across the country. Over 650 systems were deployed in Angola to issue over 8 million cards in less than 8 months. ePassports: Several countries in Africa are using HID Global’s ID personalisation systems for ePassports that provide successful identification and an easier travel experience for citizens. Driver’s Licenses: HID Global’s decentralised driver’s license issuance solution is being used by several African governments. Noticeably, one country is using these solutions to speed program deployment for over 25 million citizens. The company is also supplying pre-printed smart cards that include various overt and covert security features. The cards are then personalised locally with photo, variables data, custom holographic laminate and owner biometrics using FARGO HDP5000 printers. Refugee Identification: HID Global is working with international organisations to help connect African refugees with vital resources in multiple countries. HID FARGO HDP8500 and HDP5000 printers are being deployed at refugee camps to issue the necessary credentials for accessing food, water, shelter, financial aid and educational and other services. Student IDs: The West African Examinations Council (WAEC) is using HID FARGO Direct-to-Card ID card printers/encoders to improve the efficiency, accuracy and integrity of its educational testing program for more than 2 million students annually. HID FARGO Connect solution HID FARGO Connect solution enables ID cards to be issued from anywhere and any device via a web interface The latest additions to HID Global’s portfolio address the challenges African nations face in issuing credentials to remote locations while also serving high-volume needs of large metropolitan areas. The company’s HID FARGO Connect solution enables ID cards to be issued from anywhere and any device via a web interface in a trusted environment, changing the paradigm for governments whose citizens live in distant, hard-to-reach locations with limited infrastructure. For governments that need to meet the needs of large metropolitan populations, the new HID FARGO HDP6600 printer offers the world’s fastest retransfer throughput for ID card personalisation.
Round table discussion
The definition of a standard is “an authoritative principle or rule that usually implies a model or pattern for guidance, by comparison with which the quantity, excellence, correctness, etc., of other things may be determined.” In technology markets, such as physical security, standards are agreed-upon language, specifications or processes that are used across the board by multiple stakeholders to enable easier interconnectivity and smoother operation of systems. We asked this week’s Expert Panel Roundtable: How are standards shaping change in the physical security market?
Statistically speaking, incidents of terrorism are unlikely to impact most businesses and institutions. However, the mere possibility of worst-case-scenario attacks is enough to keep security professionals awake at night. Compounding the collective anxiety is the minute-by-minute media coverage when an attack does occur. The immediacy of the shared experience of global tragedy impacts us all – including security system decision-makers. We asked this week’s Expert Panel Roundtable: How is the rise in terrorism impacting the physical security market?
The new year 2019 is brimming with possibilities for the physical security industry, but will those possibilities prove to be good news or bad news for our market? Inevitably, it will be a combination of good and bad, but how much good and how bad? We wanted to check the temperature of the industry as it relates to expectations for the new year, so we asked this week’s Expert Panel Roundtable: How optimistic is your outlook for the physical security industry in 2019? Why?
Biometrics: Manufacturers & Suppliers
- HID Biometrics
- IDTECK Biometrics
- Honeywell Security Biometrics
- BQT Solutions Biometrics
- Gallagher Biometrics
- Vanderbilt Biometrics
- Linear Biometrics
- CyberLock Biometrics
- Touchless Biometric Systems (TBS) Biometrics
- Suprema Biometrics
- Bioscrypt Biometrics
- TDSi Biometrics
- AMAG Biometrics
- Hirsch Electronics Biometrics
- Geoffrey Biometrics
- Paxton Access Biometrics
- Anviz Biometrics
- Lenel Biometrics
- Kingston Biometrics Biometrics
- Kantech Biometrics