S.A.F.E., the Safety Alerts for Education Foundation, announced that it is donating the Safety Alerts for Education (S.A.F.E.) emergency mobile alerts platform to all schools, colleges and Universities across the US for free and in perpetuity. This is the exact same, fully featured system that has been in use by The Department of Homeland Security (DHS) and The Massachusetts Emergency Management Agency (MEMA) and other Federal, state and local agencies, and police departments across the country...
At Secutech this year, on stand C6, Veracity will be demonstrating VIEWSCAPE, the integrated command and control solution developed to meet the needs of complex security applications. VIEWSCAPE is a real success story, now used in many smart cities, retail and critical infrastructure sites. VIEWSCAPE delivers a modular, advanced Command and Control platform with integration to multiple elements of CCTV and security, including video, access control, fire & intruder systems, intercom, buildin...
Johnson Controls recently unveiled the findings of its 2018 Energy Efficiency Indicator (EEI) survey that examined the current and planned investments and key drivers to improve energy efficiency and building systems integration in facilities. Systems integration was identified as one of the top technologies expected to have the biggest impact on the implementation in smart buildings over the next five years, with respondents planning to invest in security, fire and life-safety integrations mo...
Honeywell announced a technology integration with Intel that will enable new artificial intelligence (AI) capabilities in its MAXPRO® connected security platform. The new security platform, which will support MAXPRO Network Video Recorders (NVR) and Video Management Systems (VMS), will incorporate Intel® Vision products that enable advanced analytics, deep learning and facial recognition capabilities. These greatly enhanced security solutions will drive cost and time savings by significa...
Johnson Controls announces that its PowerSeries Pro is the first ever commercial grade security system to harness the long-range communication technology of PowerG and is designed to handle large-scale installations. The system offers the highest level of cyber protection features and encryption technology without the need for a wired communication path. PowerSeries Pro is developed for commercial use and can support up to 248 zones, making it an ideal solution for warehouses, office buildings,...
Dahua Technology, a video-centric smart IoT solution and service provider, showcases a wide range of competitive product portfolios and smart solutions to top security professionals during the International Security Conference and Expo (ISC West) at booth #14039 from April 10th to 12th. Dahua will also celebrate the fifth anniversary of its USA subsidiary on Wednesday evening, showing strong commitment to the local markets. Running with the theme ‘Empowering through Technology’, the...
LenelS2, a provider in advanced security systems, and Milestone Systems, an international open platform developer of networked video management software (VMS), announces a 10-year agreement for LenelS2 to distribute Milestone products globally. The companies had a previous agreement for North America. LenelS2 is a part of Carrier, a global provider of innovative heating, ventilating and air conditioning (HVAC), refrigeration, fire, security and building automation technologies. Founded in 1998, Milestone is a stand-alone company in the Canon Group. Seamless user experience The joint offering of LenelS2 OnGuard access control and Milestone XProtect video management software through the LenelS2 channel lowers the total cost of ownership for end users and integrators by offering reduced licensing fees and efficient pre- and post-sales support. This integration, which has been successful through the LenelS2 OpenAccess Alliance Program (OAAP) and Milestone Certified Solution, provides customers with tight, efficient interoperability between the OnGuard and Milestone XProtect systems. We’re excited to expand this proven, integrated access-video offering to customers globally" “We’re excited to expand this proven, integrated access-video offering to customers globally,” said Jeff Stanek, president, LenelS2. “This strategic integration will provide our partners the benefit of an offering from the VMS and access control solution providers in the global security industry. This integration includes a seamless user experience and specific interface enhancements across our systems, a direct outcome of the collaborative effort.” Leverage the momentum “Customers have reacted very well to our collaboration,” said Kenneth Hune Petersen, chief sales & marketing officer, Milestone Systems. “Rather than being locked into a single provider, customers can work with two companies that have real synergies. As security threats become more sophisticated, continuous innovations with strong interfaces between industry pioneers are in demand. That’s what this alliance delivers.” “We are excited that this agreement has been expanded into a global partnership,” said Stephane Baudena, managing director, Fire & Security Products, EMEA, LenelS2. “This will allow us to leverage the momentum and proven success achieved by the North American team.” LenelS2 and Milestone Systems have a combined 40 years of industry experience in providing customers with proven security solution technologies. Both companies offer open platform solutions that provide customers flexibility to select the optimal security systems to meet their needs. Milestone Systems has been a member of the LenelS2 OAAP since 2012.
RS2 Technologies, globally renowned security and access control systems provider firm, has been named as a new Strategic Alliance Partner in the United States by Zenitel Group, the global provider of Intelligent Communication solutions. Integrated systems “Zenitel’s continued innovative approach to simple but powerful integrated systems provides a complete unified solution to customers of all sizes”, said Dave Barnard, Director of Dealer Development for RS2. “Zenitel has been established as the industry leader in integrated intelligent communications. Our companies have had a long-standing relationship where integration was valued, but we believe it is now time to go beyond simple integration to providing a full-service solution.” According to Barnard, RS2 Technologies has a reputation as a “one-stop” solution for the access management needs of customers in a wide variety of applications. RS2 delivers cost-effective access management solutions to customers in industries as diverse as ship-building, energy, hospitals, education, defense, banking, government (federal, state and municipal), museums, and a variety of diverse manufacturing companies. From small office buildings to large industrial facilities, RS2 has the products to meet the needs of business and industry. RS2 is known for having a rich feature set, continuous integrations, and the lowest total cost of ownership Intelligent Communication “The Intelligent Communication market is targeted to exceed $150 billion by 2021”, said Jim Hoffpauir, President, Zenitel Americas. “To continue to provide innovative solutions that exceed our customers’ expectations, we are creating new strategic partnerships with complimentary technology leaders in the security industry. With our recent release of the new IC-Edge system, partnering with RS2 provides Zenitel with sales channel alignment to emphasise smaller system sales, providing organisations of all sizes an easily accessible and cost-effective solution for highly intelligible audio.”
Openpath, a pioneer in workplace technology and security, unveils at ISC West 2019 its new Elevator Board and Partner Portal to provide channel partners, property managers and tenants with even more comprehensive and convenient office security systems. Elevator Board enables Openpath to connect commercial spaces under a single, streamlined and secure mobile access system. And now, with Partner Portal, integrators can access best-in-class training and education online, enabling them to easily implement the best possible solutions for customers. Top-notch technology for system integrators While many mobile access systems rely on only Wi-Fi, Bluetooth or LTE, Openpath’s proprietary Triple Unlock technology utilises all three methodsAlex Kazerani, Openpath’s co-founder and CEO, said: “We are excited to provide our partners with the elevator solution they have been asking for. By bringing Openpath’s signature convenience and ease of use to the elevator, we ensure every single interaction tenants have with an Openpath-equipped building is frictionless, from the parking garage to their desk. “The tandem release of Elevator Board and Partner Portal highlights our continued dedication to providing system integrators with both the top-notch technology that their customers want and the resources they need to easily and efficiently install our solutions.” The market demand for highly reliable, convenient and secure access control solutions continues to expand as integrators and customers seek mobile access solutions that actually work. While many mobile access systems rely on only Wi-Fi, Bluetooth or LTE, Openpath’s proprietary Triple Unlock technology utilises all three methods, exclusively guaranteeing the system remains online at all times and providing users with the most reliable, seamless experience every time they use the Openpath solution. Ability to handle mobile credentials Openpath’s unique ability to handle smartphone-based credentials, and the Elevator Board’s offerings, are especially exciting"Tully Zipkin, President at Global Integrated Technologies, Inc. said: “We recently showed the Openpath system, including its Elevator Board, to one of our long-term clients. Prior to completing the demonstration, the client noted that Openpath’s offerings were ‘exactly what they’d been looking for,’ and decided they would purchase the solution.” Regarding Openpath’s solutions, Mr. Zipkin states, “Over the past 30 years working in the access control industry, I have witnessed the market evolve and customers’ needs change. The Openpath product provides exciting features which, in today’s IT-centric environment, are desirable. In particular, Openpath’s unique ability to handle smartphone-based credentials, and the Elevator Board’s offerings, are especially exciting. “Having now installed multiple systems, Global’s technician’s integrators and clients are very impressed with Openpath’s technical support, training, and overall willingness to assist to ensure a smooth delivery. The speed and ease with which both Global and our clients have been able to implement the Openpath solution is impressive.” Openpath Elevator Board Elevator Board’s features include touch access for fast and convenient, hands-free, keyless entryElevator Board brings Openpath’s award-winning mobile access technology to the elevator. With the addition of Elevator Board to the Openpath product lineup, a single credential - a smartphone - can be used to access an office’s parking garage, building entrance, elevator and office door. Elevator Board’s features include: Smaller form factor with and easier installation process resulting in less downtime Easy wiring with removable connector blocks USB ports for streamlined product updates Touch access for fast and convenient, hands-free, keyless entry More efficient performance with customisable user permissions and the ability to place elevators on a schedule Proprietary Triple Unlock Technology Support for up to 16 floors and two Openpath Smart Readers Partner Portal learning platform Partner Portal is an online learning platform that enables system integrators to complete technical and sales training, as well as earn, manage and maintain their Openpath Certified Integrator certifications virtually and at their own pace. Some of the valuable features system integrators can access via Partner Portal include: Lead distribution Co-branded digital sales collateral Exclusive online training and certification Resource library Certified Installer Assets Opportunity registration Openpath will be displaying its new Elevator Board at ISC West April 10 - 12 at the Sands Expo Center, booth #23051.
Thailand’s leading business hub for security solutions, Secutech Thailand, is set to return from 28 – 31 October 2019 alongside Thailand Lighting Fair, Thailand Building Fair, and Digital Thailand Big Bang. Under the banner of ‘Smart City Solution Week 2019’, the four fairs together will serve as a one stop shop for smart city professionals to source all of the latest security, building automation, lighting and digital infrastructure solutions. “The Thai government aims to establish 100 smart cities over the next two decades,” said Ms Regina Tsai, the Deputy General Manager of Messe Frankfurt New Era Business Media Ltd. “Within this context, ‘Smart City Solution Week’ delivers a win-win for Thailand’s smart city stakeholders. The arrangement will not only create visitor synergies amongst the four fairs, but it will also help to build even more momentum for Thailand’s smart city sector.” Secutech Thailand – Security + AI Ms Tsai said that she expects to see an increase on last year’s visitor numbers during Smart City Solution Week 2019 Secutech Thailand has embraced the smart city concept since the first edition in 2011, and under its new theme of ‘Secutech Thailand – Security + AI – Empowers Sustainable City Development’, the fair will deliver all of the latest AI and IoT security innovations for the smart city sector. The 2018 edition of the fair featured a record 250 exhibitors (2017: 150) and attracted 8,420 visitors to 7,000 sqm of exhibition space. Ms Tsai said that she expects to see an increase on last year’s visitor numbers during Smart City Solution Week 2019: “Many of the distributors and system integrators that visit Secutech Thailand also have business interests in the lighting, building automation and digital infrastructure sectors. By running Secutech Thailand alongside Thailand lighting Fair, Thailand Building Fair, and Digital Thailand Big Bang, we will create a convenient one-stop sourcing platform that will draw in even more buyers to Secutech Thailand.” Sustainability, the key theme at Smart City Week 2019 All four fairs will be held at the Bangkok International Trade and Exhibition Center, and in keeping with the modern push towards sustainable living, each fair offers a unique sustainability theme. The Thailand Lighting Fair is set to be held under the theme of ‘IoT + City: A Sustainable and Livable Future’ The Thailand Lighting Fair, for example, is set to be held under the theme of ‘IoT + City: A Sustainable and Livable Future’. Jointly organised by Messe Frankfurt New Era Business Media Ltd and The ExhibiZ Co., Ltd, the fair is a home for exhibitors to showcase their unique lighting accessories and electronic components; as well as smart and sustainable lighting solutions for cities and commercial environments. Sustainable solutions Sustainable solutions will also be on display throughout the halls of the Thailand Building Fair. Run by the same organisers as the Thailand Lighting Fair, the show is a regional hub for building automation and electrical engineering solutions which include products that promote energy efficiency and facilitate smart living. Meanwhile, established in 2017, Digital Thailand Big Bang is a B2C platform that receives government backing to promote digital technologies. The fair is organised by the Digital Economy Promotion Agency (DEPA) to showcase the ways that big data can be used to transform society and improve urban living standards. Just a few of the solutions that can be found at the fair include city management systems, cloud computing, fintech products, and digital infrastructure such as submarine cables and satellites. Smart Police and Smart Transportation Zones In line with the smart city theme, the 2019 edition of Secutech Thailand will feature four zones, each of which will display products for different smart city sectors. A key element of smart cities – smart transportation, will be served at the ‘Smart Transportation zone’ The ‘Smart Police zone’, will host IoT technologies that assist smart policing, such as real-time crime mapping systems, body-worn cameras, crowd management systems, gunshot detection systems, predictive policing systems and more. Another key element of smart cities – smart transportation, will be served at the ‘Smart Transportation zone’. Here, trade visitors will find smart surveillance systems, vehicle monitoring systems, as well as traffic and security control centers. Safe Factory and Smart Campus Zones Elsewhere, the ‘Safe Factory’ and ‘Smart Campus’ zones will deliver the latest early warning disaster systems, emergency response systems, personal alert applications, and products capable of providing real-time air quality information. In addition to this, Thailand’s fire safety fraternity will be able to locate all of the latest fire extinguishers, alarms and emergency equipment at the concurrent ‘Fire & Safety Thailand’ event; whilst three further events: ‘SMALiving’, ‘SMACity Solution’, and ‘Info Security Thailand’, will host all of the latest advances in their related sectors.
PACOM, which designs, develops, and manufactures security platforms for enterprise multi-site and campus environments announces the company’s line-up of new solutions to be showcased at the upcoming ISC West tradeshow in Las Vegas, 10-12 April, 2019. Joining together with 3xLOGIC for the first time at the 2019 show, PACOM is pioneering with its most recent innovation, VIGIL Video Integration. PACOM can now intelligently leverage the full range of VIGIL video products for the purpose of alarm verification. This offers customers the opportunity to install a completely integrated solution providing access control, intrusion detection, and video verification all in one elegant solution. Security management platform This new offering is highly suitable for access control applications that require seamlessly-integrated intrusion detection and video verification. Other PACOM product highlights on display include, GMS Multi-Site Security Management Software. GMS meets end user demands for a multi-site security system with multiple integrations GMS is the perfect multi-site security management platform, providing integration between access control, intrusion, video, intercom, and virtually any building management or security solution. Designed to manage thousands of locations simultaneously through a single interface, while providing industry availability and redundancy. GMS meets end user demands for a multi-site security system with multiple integrations, which can be managed through a single interface simultaneously for an unlimited number of locations. Access control applications 8003 Hybrid Access and Intrusion Controller is an intelligent, IP-enabled hybrid security controller designed for advanced access control and full intrusion detection. The 8003 can support up to 8 doors/16 readers and 96 supervised inputs. Combined with dual-channel reporting and distributed intelligence, it is the perfect choice for advanced access control applications requiring a full intrusion detection system. 8603 Intelligent IP Card Reader Interface is an IP-based two door controller providing unparalleled security and flexibility for access control systems. This PACOM solution meets the demand for access control applications that require IP connectivity and the use of high-security OSDP-compliant readers. To view the full range of PACOM and 3xLOGIC solutions and to receive any one of many available product demonstrations, please visit the 3xLOGIC/PACOM booth #30064 during ISC West, April 10-12, 2019, at the Sands Expo, Las Vegas, NV. ISC West is the largest converged security industry trade show in the US, with over 30,000 security professionals in attendance and more than 1,000 Exhibitors and Brands.
Turnstile manufacturers increasingly recognise the value of integrating mobile devices into their lobby security strategy to create more convenient, connected and secure experiences for building occupants and visitors. HID Global, a global provider of trusted identity solutions, announced that it has teamed up with six of the world’s top turnstile manufacturers who have tested and certified HID’s Mobile Access as part of their commitment to a mobile future. Major turnstile manufactures exhibiting at this year’s ISC West exhibition are Alvarado, Automatic Systems, Boon Edam, Gunnebo, Orion Entrance Control and Smarter Security, who have integrated the new Essex Electronics iROX-T with embedded iCLASS SE technology from HID. Each company will showcase mobile access in their booths to illustrate how mobile is upping the convenience factor at the turnstile. Solving the challenge of turnstile security “Leveraging mobile and cloud technologies at every access point, from turnstiles and elevators to doors, is a crucial part of creating a truly connected security experience in today’s smart building,” said Michael Chaudoin, Vice President of Product Management and Marketing, Extended Access Technologies business unit with HID Global. The Essex Electronics iROX-T reader with HID’s embedded iCLASS SE technology supports BLE and NFC for mobile access “HID Global and Essex Electronics are making this vision real by solving the challenge of increasing turnstile security with a solution that enables secure access using credentials provisioned to a user’s mobile phone. This will help people move more efficiently through the hustle and bustle of busy building lobbies.” Supports BLE and NFC for mobile access Already certified with the six turnstile manufacturers, the Essex Electronics iROX-T reader with HID’s embedded iCLASS SE technology supports Bluetooth Low Energy (BLE) and Near Field Communications (NFC) for mobile access and optional OSDP for secure communications. It is also interoperable with smart cards, HID’s 13.56MHz Seos credentials, iCLASS SE, iCLASS, and other high frequency formats. Garrett Kaufman, President of Essex Electronics, added, “Building on our successful launch of the iRox-T, the latest integration of BLE, NFC and OSDP illustrates the reader’s ability to streamline upgrades in order to meet the demands of today’s mixed credential environment that is increasingly incorporating mobile IDs on smartphones.” Live demonstration at ISC West Visit HID Global in Booth #11063 and the following turnstile manufacturers to see live demonstrations of HID Mobile Access at ISC West from April 10-12, 2019 at the Sands Expo in Las Vegas. Alvarado Booth #12101 Automatic Systems Booth #2065 Boon Edam Booth #8037 Gunnebo Booth #4077 Orion Entrance Control Booth #5065 Smarter Security Booth #21117
In the wake of 9/11, the Federal Government’s secure-the-fort, big idea was to create an identity credential for all federal employees and contractors. Homeland Security Presidential Directive (HSPD)-12 set it all in motion. Today, we know the smartcard-based credential that arose from HSPD-12 as the Personal Identity Verification (PIV) card. The PIV card is meant to give employees/contractors physical access to federal facilities and logical access to federal information systems. While using a PIV card for logical access has been largely successful and compliant with HSPD-12, implementing PIV-based, physical access control systems (PACS) has been much more difficult to conquer. As a result, HSPD-12 compliance for PACS has largely eluded the Federal Government. The noncompliance reasons are many, but there is now hope for fully achieving HSPD-12’s mandates. Interoperability with any agency’s PIV Beyond Passports, PIV cards represent the only other open-standards-based, multi-vendor-supported, identity credential program on the planetAll Executive Branch employees and long-term contractors, including the entire Department of Defense, have been issued PIV cards. This has been true since 2013. Beyond Passports, PIV cards represent the only other open-standards-based, multi-vendor-supported, identity credential program on the planet. It seems so simple, where employees/contractors previously used their proximity card to open a federal facility door or go through a turnstile, they should now be able to use their PIV card. However, HSPD-12 took the PIV requirement one step further – compliant PACS must be interoperable with any agency’s PIV. This introduced an entire magnitude of additional complexity. A compliant, interoperable, PIV-based PACS should work like this: an authorised employee (or contractor) presents a PIV card (contact or contactless) to a card reader to enter whichever federal agency building they have reason to be. Over the last 14 years, in all but a very few cases, the lack of PACS’ HSPD-12 compliance has prevented this from happening. Secure credential policy Today, less than 1% of the Federal Government’s PACS are HSPD-12-compliant. At most federal facilities, especially those outside the National Capitol Region, a noncompliant PACS works like this: an authorised employee (or contractor) presents a proximity (‘prox’) badge to a proximity card reader to enter his or her agency’s facility. At the fraction of federal facilities with upgraded PACS that work with PIV cards, virtually all such PACS fail to properly use a minimum number of PIV security features before granting access – let alone interoperate with a PIV card from any other agency. Active government solicitations are issued for new, non-compliant, proximity-based systems that perpetuate the delay to HSPD-12 complianceNew federal initiatives frequently suffer from having no policy to enforce their roll-out. That isn’t the case with PACS compliance. Policies have been in place for so long that newer policies like Office of Management and Budget (OMB) M-11-11 (February 3, 2011) remind everyone what the policies said in 2004 and 2006. This year, OMB publicised its proposed OMB M-18-XX (Draft), which will replace M-11-11. OMB M-18-XX’s (Draft) main PACS thrust is, once again, to ensure that everyone understands what the Federal Government’s secure credential policy is. It hasn’t changed since 2004. It would be tempting to say that PACS technology isn’t mature, but that isn’t the case. In 2013, the Federal Government revamped the PACS portion of the FIPS 201 Evaluation Program and, since that time, all PACS on the General Services Administration’s (GSA) Approved Products List are 100% compliant and interoperable. Yet, on any given day, active government solicitations are issued for new, non-compliant, proximity-based systems that perpetuate the delay to HSPD-12 compliance. The usual suspects, policy and technology, are not the culprits for this epic delay. An authorised employee presents a PIV card to a card reader to enter whichever federal agency building they have reason to be Difficulties in adopting HPSP-12 compliance for PACS Standards – The Federal Government’s approach to standards is to avoid a great deal of specificity. It’s an unspoken tenet that federal standards must be flexible, promote innovation and avoid disadvantaging any participating market segment. The opposite is true if your goal is interoperability: nearly every detail must be specified. Consider the standards-based success story of chip-based credit cards. When was the last time you used a credit card and it didn’t work? Interoperability failures are nearly unheard of. If you look at the hundreds of volumes of technical specifications that cover minute aspects of every component in credit cards and payment terminals, you quickly realise why it works so well. Nothing is left to chance, nothing is a variable, and there is no optionality. The Good News: Work to increase viability through deep scrutiny has progressed in recent years. The GSA APL PACS Testing Lab, set up in 2013, annually tests credentials from all PIV issuers against all GSA-approved PACS. This testing has significantly reduced interoperability failures at federal facilities. Collaboration – In the past, physical access practitioners from federal agencies rarely collaborated, unlike their logical access counterparts. This is also true for PACS procurement decision-makers across agencies and facilities. The Good News: In 2018, an agency trend has emerged where finally physical access, physical security and IT practitioners have begun sitting down to discuss their shared responsibilities. We have already begun to see coordinated budget requests between IT and Security with enterprise architectures positioning PACS as an enterprise service on the network. Scale – The Federal Government owns so many buildings that they can’t be counted. Google doesn’t know how many there are and neither does any one government official. Variability – A significant percentage of facilities have unique aspects making a one-size-fits-all approach infeasible. The Good News: Mature consulting services can now help agencies marry federal requirements with their unique environments to develop robust PACS enterprise architectures. As we see this occurring more and more frequently, a repeatable, achievable, systems-based upgrade of all PACS may be on the horizon. The GSA APL PACS Testing Lab annually tests credentials from all PIV issuers against all GSA-approved PACS Provenance – In many cases, different groups own different parts of a single facility, not all of whom might be subject to, or wish to interoperate with, a high-assurance compliant PACS. For example, GSA manages facilities for Legislative and Judicial tenants who aren’t subject to HSPD-12. Policy dictates that GSA manage the PACS for the front doors of these facilities should be HSPD-12-compliant, despite the fact that these tenants likely don’t have credentials that work with this technology. Sure, these tenants could commercially obtain a PIV-I credential, but almost none have. Economics – It’s difficult for agencies to create their annual security budget requests when HPSD-12 PACS upgrades are in scope, because so many unknowns exist at each facility. To assess the cost, the time to complete, and the facility’s existing equipment inventory, it would be logical for an agency to hire a contractor with PACS expertise to perform a site assessment. Having to do capital planning for an assessment phase in advance of making the annual budget request for the PACS upgrade creates a never-ending cycle of delay. Especially at agencies with multi-year capital planning requirements. Many agencies, trying to avoid this delay cycle, have fallen prey to doing site assessments themselves. This results in their integrators doing their walk-throughs after the contract is awarded. This is the leading cause of PACS upgrade cost overruns. Dependence on the agency’s IT department – Historically, PACS have been deployed on dedicated networks and are rarely ever connected to the enterprise, let alone the Internet. High-assurance PACS that validate credentials from other agencies must now communicate with many different systems on an enterprise network and over the Internet – so much so that the Federal Government reclassified PACS as IT systems. The Good News: With collaboration increasing between Physical Security Officers (PSOs) and Chief Information Officer (CIOs), we expect this to improve in due course. Resistance to change – This is a classic human factors challenge, and it’s a big one. PSOs have spent decades achieving their positions. PIV-based PACS could not be more different from the technologies that proceeded it, and such radical change is often resisted. When the value proposition is clear, change is adopted more readily. But security value isn’t easily measured or observed. It is often said that the best performance review for a PSO is to note that nothing happened. And when something does happen, it is necessarily kept quiet so the risk can be remediated without calling attention to the vulnerability in the interim. To date, the value proposition of moving to PIV-based PACS has been entirely based on policy (without corresponding funding in most cases) and through the shock value of white hat hackers, showing how easily most proximity badges can be cloned. This is not the stuff of change agents. PIV-based PACS could not be more different from the technologies that proceeded it, and such radical change is often resisted Are these challenges a unique situation? No, these PACS challenges are not unique. Cybersecurity initially faced many of the same challenges that federal PACS face today. By 2000, the Federal Government recognised its urgent need to improve cybersecurity practices across its computing infrastructure and issued many policies that required agencies to improve. Improvement was sparse and inconsistent. GSA Schedules were set up to help agencies buy approved products and services to assist them, but this too produced lacklustre results. The Federal Government found that the best cybersecurity results occurred when enforced at the time an agency commissioned a system Congress enacted the Federal Information Security Management Act of 2002 (FISMA) (now amended by the Federal Information Security Modernization Action of 2014). FISMA mandates an Authority To Operate (ATO) accreditation process for all information systems. The Federal Government found that the best cybersecurity results occurred when enforced at the time an agency commissioned (vs. purchased) a system. FISMA and ATO accreditation has been highly successful when implementing new systems. These cybersecurity requirements are the closest thing that the Federal Government has to the ‘PIV Police’ today. However, the PIV requirements in FISMA and ATOs currently apply to only logical access for information systems. The proposed OMB M-18-XX (Draft) mentions that a FISMA PACS overlay to NIST SP 800-53 is forthcoming. The intent of the PACS overlay is to use the army of ATO accrediting officials in the Federal Government and enable them to assess implemented PACS as fit for purpose. This is the first time an enforcement approach has been brought forward that could reasonably succeed. How long for HSPD-12 compliance? We know that it won’t take another 14 years to achieve HSPD-12 compliance. Pockets of compliance are popping up. Compliant procurements do exist, and the state of PACS across the Federal Government is better in 2018 than in any previous year. Progress to date has been at a constant rate. The question is: what would take for progress to occur at an exponential rate instead? A major attack or compromise involving PACS would certainly hasten upgrades, but let’s hope that’s not the solution. The energy distribution sector has been riding a wave of security upgrade demands to retrofit their facilities across the U.S. The energy distribution sector, under nearly constant Advanced Persistent Threat attacks, has been riding a wave of security upgrade demands to retrofit their facilities across the U.S. The potential threat exists for Federal Government facilities as well. Looking into the federal PACS-compliance crystal ball, we’re beginning to see the faint outline of a multi-faceted campaign of education, budgetary oversight and accreditation of PACS that will ultimately see us past the tipping point. Consider though, at the current rate of PACS enablement, a 50% compliance rate is still far in the future. When that day arrives, the PIV card form factor may no longer be the key that fits that future lock. (Are you already using a mobile device’s Bluetooth interface to open the door to your office building?) Taking decades to perform a technology upgrade is the aging elephant in the room no one talks about. By the time critical mass is achieved with an upgrade facing these many challenges, there are typically compelling reasons to start over again with the next generation of technology. That cycle may well prove to be the Federal Government’s biggest PACS challenge of all.
As the world continues to become more connected, it’s becoming increasingly important to adjust security and safety procedures in the workplace. But today’s ever-evolving office environment can present unique safety and preparedness challenges. No two businesses are exactly alike, with some located in numerous buildings or spread out across campuses, while others have employees that frequently journey from different locations, work remotely or travel internationally. With this shifting environment, Rave Mobile Safety’s recent Workplace Safety and Preparedness survey asked over 500 full-time employees in various industries across the United States about their views on safety at work and emergency preparedness. Preferred safety measures Only 57 percent of respondents indicated that their workplace currently had preparedness drills in place for critical situationsThe survey looked at how employees and companies respond to various workplace emergencies: workplace violence, active shooter, medical emergency, fire, hazmat incidents, weather events and cyberattacks/system outages. Respondents provided insight on the current state of safety in their workplace, as well as how they want to be contacted when an emergency occurs. Though opinions on the preferred safety measures differed between generations and also between on-site and offsite workers, one fact remains consistent: there is much to be done to instil a better sense of safety in the workplace. While the findings show that employees feel safe in their workplace, only 57 percent of respondents indicated that their workplace currently had preparedness drills in place for critical situations. Quick thinking Of the plans currently in place, excluding fire, 57 percent of the other major emergency plans were rarely or never tested. With so few drills in place, employees are left not knowing the best ways to respond to emergencies like weather events or hazmat incidents or if their employer recommends a certain response to situations like medical emergencies. Testing these plans is essential so that all employees, whether they are new to the company or not Even if plans are in place to begin with, not ensuring your employees understand and are comfortable with how to react to certain situations, can put the organisation in harm’s way. Testing these plans is essential so that all employees, whether they are new to the company or not, have the appropriate response top of mind and their actions become second nature during a situation that will likely require quick thinking. Workplace violence Instilling regular practices will only further ensure that responses will happen seamlessly, regardless of the emergency. Beyond the general awareness of drills and practices, most surprising in the responses was the fact that 34 percent of female respondents were unaware of workplace violence emergency plans. This is particularly shocking because workplace violence is the second leading cause of death for women in the workplace, according to the U.S. Bureau of Labour Statistics. This shows an obvious lack of preparedness from organisations. It’s immensely important that employees to understand the relevant dangers of the workplace, especially when alternative could have a fatal result. The differences between baby boomers and millennials in the workplace is a common barometer showing how the workplace is continuing to change. Emergency plans Workplace violence is the second leading cause of death for women in the workplace, according to the U.S. Bureau of Labour StatisticsWhat may have worked for previous generations must be reworked and adjusted so every generation is made aware of and understands the plans and procedures in place. These changes can help make workplace safety plans fresh and continuously relevant. With that in mind, millennials currently represent the largest segment of employees unaware of emergency plans for major workplace emergencies. 38 percent of this age group are unaware of existing emergency plans, compared to just a 28 percent average of employees over the age of 35. This could be associated with the fact that some organisations are not communicating plans with newer employees or even that organisations that employ a significant number of millennials might not have plans in place at all. Affecting everyday work If the newest generation is unaware of these plans, then it is only a matter of time before Generation Z enters the workforce and is in even worse position when it comes to emergency awareness. The survey results showed that on average, workplaces use two methods of communication for emergencies Feeling safe and secure at work should not be something that workers need to focus on, however more than a quarter of respondents that work remotely said that worrying about safety is exactly what is affecting their everyday work. With that in mind, it’s even more concerning to see that there seems to be a clear divide between current methods and preferred methods of communication during an emergency. The survey results showed that on average, workplaces use two methods of communication for emergencies, with the top two being intercom system announcement/building alarm (27 percent) and email (22 percent). Mass text messages At first, these methods seem to cover both remote and in-office employees, but survey results actually showed that both groups preferred and would be better reached during other methods. While email is the second most common emergency method currently in place by organisations, it actually ranks as the fourth most preferred method at a mere 11 percent. Even with a clear preference towards communication via mass text messages by respondents (39 percent of remote workers prefer this method), less than 20 percent of companies actually take advantage of this technology. This clear disconnect shows that organisations must find what works best for their employees instead of using methods that were previously established or that are just currently being used. Preparedness plans What remains important for organisations, regardless of size or industry, is to keep emergency preparedness plans ever evolving Communication can not only be essential to alert employees to everyday situations, like office closures, but it is also imperative in preventing emergencies to escalate when they do occur. Although this survey discusses the current state of safety in the workplace, it’s that the disconnect between employee perceptions and employer polices that’s the most concerning. Companies need to take steps to understand how their employees would like to be reached during an emergency, as well as how employees would also like to reach out to management to report their own concerns. What remains important for organisations, regardless of size or industry, is to keep emergency preparedness plans ever evolving and well communicated, so your employees are confident in the emergency plans in place. By proactively planning and practicing for emergency events through table top exercises and drills, employers can demonstrate their commitment to employee safety and preparedness and build employee confidence.
As buildings become more complex and smarter, the age-old traditional maintenance methods that are based mostly on hands-on human monitoring are becoming more and more inadequate. Instead, the world is fast adopting building automation as a key component of smarter and more proactive maintenance strategies. The aim is to free up maintenance staff and give them time to focus on other tasks while machines monitor the different systems that work together to make the facility functional. Specifically, Internet of Things - or, IoT - enablement appears set to transform the way facility managers deliver service to building occupants. The trends are many and the possibilities are almost mind-boggling, from inventory management, to work scheduling and energy efficiency, the list goes on and on. Below, we look at a few ways in which IoT is being used for Facility Management and Security. Revolutionise maintenance through condition-based maintenance For years now, the norm among maintenance professionals has been a time-based approach, or in simpler terms, performing maintenance operations after a set period of time. But a major flaw of this system is that components were being replaced periodically whether the parts were actually worn out or not. Of course, that meant some of these maintenance activities simply weren’t cost-effective. To avoid this waste from continuing, a subset of IoT known as IIoT can now be used to optimise the maintenance process. IIoT works as a centralised network of connected systems and devices that can talk to one another and generate and relay data Rather than changing parts on a time-based schedule, IIoT works as a centralised network of connected systems and devices that can talk to one another and generate and relay data. Selected equipment are fitted with sensors that monitor specific operational parameters and let maintenance professionals know how the machines under supervision are working, understand their current condition, and then pinpoint the optimum time they need to be maintained. The information generated this way is vital as it allows maintenance staff to intervene just in time to avoid costly downtime and other associated inconveniences. This is, in a nutshell, the basics of predictive maintenance and condition-based maintenance. These days, by implementing condition-based maintenance, IIoT is being used to effectively monitor a wide range of systems such as lighting, HVAC, fire suppression, security, etc. The applications are numerous and so are the benefits. On page 52 of this guide by the US Department of Energy, they state that a functional predictive maintenance program could yield up to 10 times ROI, reduce maintenance costs by 25% to 30%, and reduce downtime by 35% to 45% Along with fire suppression, IIoT is effectively monitoring a wide range of systems such as lighting, HVAC and security Remote monitoring of facilities Physical inspections have been a critical condition for the success of conventional maintenance programs, even in hazardous environments. But, with the increasing emphasis on personnel safety, organisations want alternative solutions that allow staff to examine assets without being physically present. Facility managers and their team working in industries like manufacturing, oil and gas, and mining can relate with these constraints. And these industries can benefit greatly from deploying predictive maintenance solutions. For example, in the oil and gas industry, IIoT sensors can be used to monitor remote and highly critical assets. These sensors can be used on pipelines to detect anomalies (especially corrosion) and pass that information to supervisors for necessary action. By doing this, potential failures are quickly predicted to avoid often disastrous incidents. Managing energy consumption Sensors are also being embedded in building components and devices like HVAC systems, lights, doors, windows to understand energy consumption and proactively manage it. Facilities that use this technology could achieve substantial energy savings. In a press release by IT research and advisory company, Gartner, they stated that IoT can help reduce the cost of energy - as well as spatial management and building maintenance - by up to 30%. Looking at HVAC systems very closely, we see that they are a major source of energy usage in any building These sensors work by monitoring different conditions in the building and causing a power-saving action based on the data received. For instance, occupancy sensors can order lights to turn on when it senses motion in a room and then turn off the same lights when there is no presence there. That way, there is no need to wait for someone to remember to switch off the lights when they are not needed. Another very common use is in HVAC monitoring. Looking at HVAC systems very closely, we see that they are a major source of energy usage in any building. So, the issue is how can one use IIoT to manage HVAC and possibly reduce their energy usage? Well, in its most common form, IoT-enabled HVAC works as a connection of sensors and thermostats that monitor factors like indoor air quality, temperature, and environmental changes then communicate with the rest of the HVAC equipment and make needed adjustments for occupants’ comfort. Not only that. IoT-enabled HVAC works as a connection of sensors and thermostats that monitor factors like indoor air quality, temperature, and environmental changes The technology can be configured to: Track energy consumption at different distribution points throughout the building. Track usage from the power source right down to the consumption point. Detect sudden voltage drops or spikes (usually an indication of some fault). These are essential benefits because HVAC units are notorious for consuming large amounts of energy when they are working inefficiently. Security and access control Smart surveillance is another important area of application for IoT in facilities management. It takes several forms such as the monitoring of life-saving systems like intruder or fire alarms, invisible barriers, and other safety installations. Facility managers are using IoT across different industries to obtain live information about potential emergency situations with a view to responding before the issue escalates. In such cases, quick detection of any strange activity is key because many of these installations have tangible negative effects when they fail or when they are intentionally sabotaged.Smart surveillance is another important area of application for IoT in facilities management Fortunately, the surveillance equipment can also be setup to send alerts to mobile phones to aid emergency response or evacuation as the case may be. Smart surveillance is also priceless for monitoring the situation in partially or fully automated remote facilities (especially oil and gas installations and mines), and in hostile environments with critical equipment where humans cannot work for extended periods of time. If you are not yet using IoT in your facility, you may be wondering where to start from. To avoid getting overwhelmed, a good place to start would be to try a small-scale deployment of this technology then review its ROI and impact on your operations before adopting a more widespread IoT implementation. This way you can gradually scale up as you and your staff come to understand and adapt and to this new way of doing things.
Recent technology advances – from the cloud to artificial intelligence, from mobile credentials to robotics – will have a high profile at the upcoming ISC West exhibition hall. Several of these technologies were recently designated by the Security Industry Association as the Top 8 security technologies for security and public safety. Some of them will also be a focus at the ISC West conference program, SIA Education@ISC, April 9-11 at the Sands Expo Center. This article will highlight some of those conference sessions. Topic: Cloud Systems and Video Surveillance as a Service (VSaaS) Managed Video Services are saving TD Bank $500K annually, April 9, 2:45 to 3:45 p.m. Why TD Bank decided to roll out a managed services solution, what it took to deploy and how the bank is saving an astounding $500,000 annually. IT 4.0 and Video Surveillance: A Guide to the New Terminology and What It Means to You and Your Customers, April 11, 1:15 to 2:15 p.m. How IT 4.0 can enhance or change video surveillance, and consequently deliver additional value to customers, including explanations of terms such as cloud data centers, personal clouds, the edge, IoT sensors and data analytics. One of the sessions to cover how IT 4.0 can enhance or change video surveillance, and consequently deliver additional value to customers Topic: Artificial Intelligence (AI) In Video and Other Systems The Challenges and Opportunities of AI in Physical Security, April 10, 3:45 to 4:45 p.m. Looking toward what the future may hold for AI in physical security; the challenges and opportunities the technology has created; and how participants can leverage AI and machine learning with existing customers to grow their business. Deep Learning Demystified: Next-Generation AI Applied to Video, April 11, 9:45 to 10:45 a.m. Dispelling the myths of the terms “deep learning” and “artificial intelligence,” and what the technologies can do in practical terms. Modern cameras find and identify faces and vehicles, analyse behavior and organise and control assets Neural Processing and Smart Cameras, April 9, 8:30 to 10 a.m. Deep learning-capable hardware is evolving at a frantic pace, and GPU and NPU (neural processing unit) co-processors are commonly embedded in cameras and video management systems. Modern cameras find and identify faces and vehicles, analyse behavior and organise and control assets. Analytics in the Video Central Station: Proper Deployment, Programming and Configuration to optimise operational and cost efficiencies, April 11, 3:45 to 4:45 p.m. How analytics plays a critical role in reducing alarm traffic in a central station environment, allowing them to save money and realise other operational and performance efficiencies. Topic: Robotics and Autonomous Devices Robotic Aerial Security – Growth Trends and Best Practices, April 10, 11 a.m. to noon The lion’s share of growth in the robotic aerial security sector will come from autonomous systems and changing FAA regulations will soon allow companies to monitor and secure remote facilities with no human guards present. Racing drones are difficult to detect as they do not use GPS or radio frequency signals to identify the location of other devices How to Adapt to Address Drone Security, April 11, 1:15 to 2:15 p.m. Drone industry professionals and a physical security design engineer will cover the realistic applications of drone systems and counter-drone solutions that can protect organisations and facilities. Next Generation Threat: Racing Drones, April 11, 2:30 to 3:30 p.m. Racing drones are difficult to detect as they do not use GPS or radio frequency signals to identify the location of other devices. This session will identify the potential risks these drones can pose to facilities, special events, and critical infrastructure. Establishing a Corporate Drone Program, April 10, 9:45 to 10:45 p.m. Is a corporate drone program an appropriate addition to an existing security program? How to understand and navigate the regulatory challenges and processes associated with starting up a commercial-use drone program. The Rise of Intelligence in Physical Security, April 11, 9:45 to 10:45 a.m. “Intelligence” incorporates a variety of subdomains from artificial intelligence to machine learning and contextual analysis. It is rapidly becoming a focus in the realm of IT security – and increasingly in the realm of physical security, too. Changing FAA regulations will soon allow companies to monitor and secure remote facilities with no human guards present Topic: Mobile Credentials Finding Their Place in Access Control How Biometrics Are Enabling the Convergence of Physical and Information Security, April 10, 1:45 to 2:45 p.m. At the center of convergence is one crucial building block: strong irrefutable identity powered by biometrics. Driving the Future: How Interoperability Standards in Access Control Can Enable Smart Building Success, April 9, 1:30 to 2:30 p.m. Growing user demand is driving new open platform approaches and the adoption of interoperability standards Growing user demand for unfettered and unlimited third-party integrations is now driving new open platform approaches and the adoption of interoperability standards. They are changing the dynamic of access control and its role within the smart building environment. Topic: Facial Biometrics in Professional Solutions How Biometrics Are Enabling the Convergence of Physical and Information Security, April 10, 1:45 to 2:45 p.m. Securing workstations, virtual desktops, turnstiles, front doors, mobile devices and more, biometric authentication is helping enterprises and governments worldwide to realise a more secure future. Topic: Voice Control in the Smart Home Environment Delivering the Smart Home of the Future, April 11, 3:45 to 4:45 p.m. With the proliferation of connected smart devices, including voice control devices, consumers have a growing array of options for defining what their Smart Home experience could be.
ISC West in Las Vegas is the first of several major security trade shows planned for 2019 as part of the Reed Exhibitions ISC Security Events portfolio. Next up will be Expo Seguridad México in May in Mexico City, followed in June by ISC Brasil in Sao Paolo, and ISC East this fall in New York. Expo Seguridad México, May 7-9, will serve the important Mexican market for security goods and services. In Mexico City alone, a large population translates into plenty of buildings and facilities that need protection; security is a big concern and a large market. Concerns about information security, cybersecurity and convergence are also dominant topics. Benefitting from a revised trade agreement with the United States, Mexico offers a favourable business climate and low costs. In addition to video and other hardware products familiar at the U.S. show, Expo Seguridad also includes a large public safety/police component, a workplace, environmental and industrial safety sector, and fire products, offering a broad range of additional product categories. Developing knowledge of attendees The FISSE (Innovation and Solutions of Security) conference room will have cybersecurity and electronic security speakersOn the exhibition floor will be the VIII International Conference for the Administration of Security and Law Enforcement, which will bring together renowned specialists in the security and public safety sector. Free conference track rooms will be provided on the exhibition floor to develop knowledge of attendees in various business areas. The FISSE (Innovation and Solutions of Security) conference room will have cybersecurity and electronic security speakers. Manufacturers, distributors, integrators, and national and international end users have come together at Expo Seguridad since 2002 to interact and exchange knowledge during the three days dedicated to the security industry. Expo Securidad México provides access to more than 350 exhibitors and the opportunity to interact, connect and develop face-to-face relationships with more than 16,300 security and public safety decision-makers. This year, Daniel Linskey, former Boston police chief, will provide a welcome speech at the opening ceremony and will share his experience and thoughts about the 2013 Boston Marathon bombing. Exhibition of public safety equipment The exhibit encompasses a selection of public safety equipment and vehicles, body armour, and counter-terrorism solutionsISC Brasil, June 25-27, offers a combination of physical security and emerging information and cybersecurity elements. An Infosecurity pavilion on the show floor and related conference track sessions highlight growing concerns in the marketplace. A large meeting of Brasil’s law enforcement commanders is collocated with ISC Brasil, and the exhibit encompasses a selection of public safety equipment and vehicles, body armour, and counter-terrorism solutions. A strong VIP attendee program ensures attendance by high-level decision-makers with money to spend. The ISC Brasil Congress is an educational program for continuing professional education and technical training for corporate end users, police commanders, distributors, integrators, law enforcement officials, security consultants, IT and public safety managers. Of the expected 18,000 attendees, some 53% come from corporate end users in several vertical industries. Some 21% of attendees are commercial system integrators, with 9% central monitoring systems and 5% law enforcement and public authorities’ safety. Security for oil and gas companies Brasil’s economy has been improving steadily after a rough patch, and the ISC Brasil show has seen an uptick for the last two yearsBrasil’s economy has been improving steadily after a rough patch, and the ISC Brasil show has seen an uptick for the last two years. Brasil’s huge economy includes big industries that need lots of security – oil and gas companies, and automotive production are among the contributors to economic growth. Attendee and exhibitor satisfaction is strong for ISC Brasil, and the show is on a new growth path as the economic situation in Brasil continues to improve under a new president. Large exhibitors at ISC Brasil include Bosch, Genetec, Hikvision, Dahua, HID Global, Honda, Yamaha, and Microsoft. Large Reed Exhibition offices in Mexico City and São Paulo manage the Latin American events and work with local partners, marketing organisations and clients. Emerging Technology Zone ISC East in New York, Nov. 20-21, continues to build momentum in 2019 after a successful 2018 show that saw double-digit growth both in exhibition space and attendance. Reed Exhibitions’ Infosecurity/ISACA North America Expo and Conference will again be collocated with ISC East, expanding information security and cybersecurity horizons for attendees. (ISACA is an international professional association focussed on IT governance.) New at ISC East in 2019 will be an Emerging Technology Zone, providing a high profile for emerging technology companies at the show New at ISC East in 2019 will be an Emerging Technology Zone comparable to the one at ISC West, providing a high profile for emerging technology companies at the show. The Unmanned Security Expo, a big success last year, will be even bigger in 2019 with more exhibits than ever. There are good signs on the horizon for greater use of drones and robotics. Protection for enterprises ISC East has traditionally focussed on the ‘tri-state’ area around New York City – New York, New Jersey and Connecticut – an area rich in end user companies, especially in financial services, retail, entertainment and the media. In New York City alone, there are almost endless numbers of big enterprises that need protection, so a localised show is a natural, and doesn’t require the large pool of potential customers to travel away from their businesses. New York also has a large and active law enforcement community, and there are many large systems integrators that operate in and around the New York area. ISC East is a growing show that serves a large, unique audience. Growth of ISC East also suggests it is becoming more of a ‘super-regional’ event, drawing good attendance from the Southeast and Midwest in addition to the tri-state area.
Constantly optimising deep learning algorithms yields better video analytics performance, even in complex applications such as facial recognition or in scenarios with variable lighting, angles, postures, expressions, accessories, resolution, etc. Deep learning, a form of artificial intelligence (AI), holds the potential to enable video analytics to deliver on long-promised, but not often delivered performance. Our AI series continues here with part 2. Adapting existing hardware Today, low-cost system-on-chip (SoC) camera components enable deep neural network (DNN) processing for the next generation of intelligent cameras, thus expanding the availability of AI processing to a broader market. AI software can even add learning capabilities by adapting existing hardware to AI applications AI software can even add learning capabilities by adapting existing hardware to AI applications. Today’s smartphones include cameras, gyroscopes and accelerometers to provide sufficient data to drive AI applications. Software can adapt existing hardware to transform them into AI devices capable of continuous learning in the field. Inside a video camera, real-time deep learning processing can be used to detect discarded objects, issue loitering alarms and detect people or objects entering a pre-defined field. Data capture form to appear here! Detect anomalous data Additional capabilities are applicable to demanding environments and mission-critical applications, such as the perimeter protection of airports, critical infrastructures and government buildings, border patrol, ship-tracking and traffic-monitoring (e.g. wrong-way detection, traffic-counts and monitoring roadsides for parked cars: all vital video security solutions). IoT is transforming the lowly security camera from a device that simply captures images, into an intelligent sensor that plays an integral role in gathering the kind of vital business data that can be used to improve commercial operations in areas beyond security. For example, cities are transitioning into smart cities. Deep learning enables systems to search surveillance footage, to detect anomalous data, and to shift surveillance from post-incident response to providing alerts during, or even before, an event. The ability of deep learning for video analytics is much more sophisticated and accurate Make critical decisions Deep learning can eliminate previous video analytics limitations such as dependence on a scene’s background. Deep learning is also more adept than humans at discerning subtle changes in an image. The ability of deep learning for video analytics is much more sophisticated – and accurate – than the programmed approaches previously employed to identify targets. AI is a timely solution in an age when there is more video surveillance than ever. There are too many cameras and too much recorded video for security operators to keep pace with. On top of that, people have short attention spans. AI is a technology that doesn’t get bored and can analyse more video data than humans. Systems are designed to bring the most important events and insight to users’ attention, freeing them to do what they do best: make critical decisions. Multiple camera streams AI can reduce information overload to enable humans to work with the data more efficiently The video benefits reflect the larger goal of AI to amplify human skills. AI can reduce information overload to enable humans to work with the data more efficiently. Another benefit is faster search, and new systems make searching video as easy as searching the internet. AI enables specific people or cameras to be located quickly across all the cameras at a site. Searching can be directed by a reference images or by physical descriptors such as gender or clothing colour. Consider a scenario of a child missing from a crowded shopping mall: Every second can seem like hours, and artificial intelligence and neural networks can enable a rapid search among multiple camera streams using only one photo of the child. The photo does not have to be a full-frontal passport-type photos; it could be a selfie from a party as long as the face is there. Intrusion detection scenario AI can find her and match her face from among hundreds of thousands of faces captured from video, in nearly real time. AI can also continuously analyse video streams from the surveillance cameras in its network, distinguishing human faces from non-human objects such as statues and animals. Privacy concerns are minimal as there is no ID or personal information on the photo, and the image can be erased after use. And there is no database of stored images. In a perimeter security/intrusion detection scenario, an AI-driven video system can avoid false alarms by easily distinguishing different types of people and objects, e.g., in a region set up to detect people, a car driving by, a cat walking by, or a person’s shadow will not trigger the alarm. Part three coming soon. If you missed part one, see it here.
Access control has become a central component for the safety and security strategies of today's schools, and due to the complicated threats and challenges these facilities face, a school's access control technology must be innovative and intelligent enough to ensure comprehensive protection. The education sector is a gateway to the future for young people all over the world. But to assure this passage, schools must guarantee their students safety as well as their education. One such example of Vanderbilt solutions at work in the education sector is at a Study Abroad University in London that hosts students from the USA. Enabling campus security Live and recorded footage can be viewed remotely, and footage can be used in evidence The university wanted a security system to protect their student accommodation; in particular, a keyless system that would grant 24/7 access to its students while also enabling campus security to monitor these activities remotely. Vanderbilt’s ACT365 keeps audit trails of who is in the student accommodation by monitoring and recording fob activity. Additionally, the system produces diagnostic reports on door status and can investigate situations such as door forced, door ajar and break glass activation either locally or remotely. If an incident arises in the student accommodation, ACT365 can link events at doors through video footage so campus security can quickly identify and react. Live and recorded footage can be viewed remotely, and footage can be used in evidence. Real-time list In further protecting students’ safety, campus security can provide pin codes, access fobs, and cards to students. These credentials can be remotely enabled or disabled if required. This can be managed on desktops, laptops tablet, or smartphone device. In the event of a fire or other emergency, ACT365 automatically unlocks all doors allowing students to reach safety. The ACT365 muster report gives security campus a real-time list of all students in the campus The ACT365 muster report gives security campus a real-time list of all students in the campus accommodation building. When students exit their accommodation and swipe out, the muster report automatically updates. If someone is missing, campus security can check cameras and call them directly by clicking on their name in the dashboard. Safeguarding foundations Security in education is a crucial issue. It requires thoughtful attention and procedure while allowing room for agility, adaptability, and dependability moving forward – flagship traits of the Vanderbilt brand. Students want to attain a higher education in a safe and secure environment while enjoying their first step into varied careers. Vanderbilt’s solutions respond to these expectations and enable active safeguarding foundations to be laid.
Kunsthalle Mannheim is a museum in Germany which contains a major collection of important art. Reliable technology, integrated in a networked solution from Bosch, ensures all-round protection on a total of 3,600 square meters of exhibition and storage space. A special focus of this is optimally safeguarding people and property without interfering with visitors’ encounters with priceless works of art. Customised security solution and integration Since its inauguration in 1909 over a century ago, Kunsthalle Mannheim has acquired a global reputation as a very special place to experience modern art. The complex comprises a building in Art Nouveau style dating from 1907, underground storage rooms, a main building, and the newer Hector Building, completed in 2018. Coinciding with the opening of the Hector Building, a customised security solution installed and integrated by Bosch experts also debuted. The system’s components are almost invisibly connected with the various exhibition areas. The modular alarm system UGM 2040 and around 260 state-of-the-art video cameras monitor the interiors of Kunsthalle Mannheim as well as the open areas around. Fire protection All of the security equipment is controlled by the Building Integration System from Bosch Comprehensive fire protection is provided by a fire alarm system spanning 700 detection points. There are 330 speakers in case it should ever be necessary to evacuate visitors and employees. All of the security equipment is controlled by the Building Integration System from Bosch. Modular alarm system Thanks to this new solution, Kunsthalle Mannheim is facing the future with confidence. The modularity of the alarm system UGM 2040 allows fast, cost-effective implementation of modifications and extensions. Professional service technicians from Bosch regularly maintain it and perform any required repairs to ensure highly reliable operation and low overhead.
Boon Edam Inc., a global provider of security entrances and architectural revolving doors, announced that Utrecht University in The Netherlands has installed a custom-made, TQM manual revolving door at the entrance to the school’s newest addition, the Viktor J. Koningsberger building, dedicated to the faculties of Geosciences, Science and Medicine. Renowned Rotterdam-based architects, Ectory Hoogstad, were asked to create a building at Utrecht University that would serve as an addition to two other existing buildings: the Minnaert building and the Buys Ballot building. The new entrance had to be functional and recognisable, but also belong to the story of the building as a whole"Joost Ector, Director and Project Architect, explains, "All buildings had to be combined into one educational centre for the science faculties. We solved that very simply by making a kind of 'loop' on the first floor; a circuit that runs through all the buildings. A new building has been added on the corner, and that is what has become the Koningsberger building. Through the 'walk', all buildings are now connected, and the students can easily walk from one building to another.” Functional and aesthetic entrance The central themes in the design of this iconic building are lightness, openness and transparency. These properties are reflected in the façade and play an important role at the main entrance. "Of course, we want you to be able to enter the cluster of buildings from all sides of the campus easily,” says Ector. “So the new entrance had to be functional and recognisable, but also belong to the story of the building as a whole. You walk down to the building, make that little turn through the entrance and then you suddenly see that the big atrium going up a hundred times. We just love that!" TQM manual revolving door Once we decided to go with a manual revolving door, there was obviously only one name that stood out - and that was Boon Edam"When it came to selecting the entrance to the new building addition, Ector said his choice for the revolving door came naturally. “Once we decided to go with a manual revolving door, there was obviously only one name that stood out - and that was Boon Edam. We knew that Boon Edam made premium products and was capable of doing what we needed when it comes to these kinds of custom-made solutions. We came to our final solution after close consultation with their experts." The TQM manual revolving door installed at the Koningsberger building is nine meters (29-1/2 feet) high and is constructed almost entirely of glass. Nine-meter high rotating parts were not desirable, so a different solution was chosen. Installing illuminated cylinder A special tall, illuminated cylinder was installed above the revolving door for an impressive and recognisable appearance. "Our inspiration were old houses, such as canal houses,” explains Ector. “There is sometimes a kind of 'lantern' incorporated in the skylight above the front door in these old-fashioned homes. We utilised this in the TQM revolving door. “The cylinder was pulled upwards, and an illuminated element was manufactured. This constructed feature can be seen from both the outside and inside and serves as a beacon of light in the evening to help guide and locate the entrance.”
Comprising a large tertiary and secondary hospital, along with three rural hospitals, Waikato DHB is a substantial healthcare operator which employs approximately 6,000 staff throughout the region. With security needs that include protecting staff from verbal and physical abuse, safely securing high-dependency patients in dementia wards, restricting unauthorised access to medication and medical equipment, and protecting high-risk facilities such as newborn intensive care units, Waikato DHB required security systems that could be applied to both high and low security areas and found the solution in Gallagher’s range of innovative security products. Serving a large geographical area of the North Island of New Zealand, the Waikato District Health Board (Waikato DHB) provides hospital and community-based health services to a population of nearly 400,000 people. Controlling access areas within hospital Gallagher’s system enables us to make changes quickly and push that information out to the card readers instantly"Gallagher’s access control system and Command Centre central management platform provide Waikato DHB with control over access in and out of areas within the hospital. With access profiles that change on a daily basis, as medical staff – predominantly nurses – move between different departments on different days, it’s vital that the system can be updated simply and efficiently. “Gallagher’s system enables us to make changes quickly and push that information out to the card readers instantly, ensuring that staff can approach doors with the confidence that they can enter or leave areas as necessary,” said David Wilson, Manager of Security and Parking for Waikato DHB. The safe and secure storage of medication and medical equipment, ranging from syringes and surgical tools, to large expensive machinery, is a legal requirement of all hospitals in New Zealand. Single access card system Gallagher’s access control solution forms a part of the security system that delivers this for Waikato DHB facilities. Utilising a single access card system where permissions can be set to allow different access ensures the efficient movement of staff, reduces the risks associated with handling keys, and provides a comprehensive audit trail that identifies access movements by employee. Utilising a single access card system where permissions can be set to allow different access ensures the efficient movement of staff Waikato DHB is proud to put people at the centre of what they do, and strives to ensure staff and patient safety at all times. A number of Waikato DHB’s wards require high-level security either for the protection of the patients – as in the case of dementia facilities – or staff. Duress buttons located throughout the hospital and its high-risk areas automatically notify security staff of the exact location where a duress alarm has been activated. Lock-down system Gallagher’s Command Centre Mobile application delivers these duress notifications directly to a guard’s mobile device – speeding up the delivery of urgent information directly to security personnel. The ability to lock-down areas of the hospital for safety reasons is paramount. “Command Centre gives us the ability to isolate areas and restrict access. This is a critical requirement for us and the reliability of that lock-down system is hugely important,” said Wilson. With so many visitors and staff coming and going from the hospital, carpark management is an important aspect of facilities administration for Waikato DHB. In choosing a solution, the DHB selected Gallagher’s Carkpark Management system - an optional licence feature. Streamlined parking processes Through an integration with Gallagher’s Command Centre security management software, staff are able to badge their access card at one of the many staff and public carparks on site, and have their parking fee deducted from their pre-paid account. The programme has in-built intelligence including the ability for staff to exit and re-enter during a set period without being recharged The programme has in-built intelligence including the ability for staff to exit and re-enter during a set period without being recharged. This system has streamlined parking processes, particularly for part-time and shift-work staff who have irregular parking requirements. According to Wilson, “One of the real strengths of this system is the reporting. By managing the pre-paid carpark system through Command Centre and linking it to staff access cards, we are able to effortlessly extract detailed reports.” Electronic Tag Boards Waikato DHB’s facilities are continually expanding and this means a large number of contractors may be present on site within a 24 hour period. By utilising another Gallagher licence feature - electronic Tag Boards - contractors can easily sign on and off of the site. A key driver for this was health and safety, “It’s really important for us to know who is on site in case of an emergency,” said Wilson. “Making this process as simple as possible for contractors is the best way to ensure it is used.” A number of other system integrations appear across the site, including CCTV. Waikato DHB’s largest hospital facility, Waikato Hospital, has over 250 CCTV cameras connected to Gallagher’s Command Centre platform. As Waikato DHB’s requirements continue to evolve, Gallagher’s systems expand alongside them. Security Ward Standard The Security Ward Standard details the minimum security equipment required for new buildings, including access control, duress alarms, and camerasTo remain at the forefront of technology, Waikato DHB has a software maintenance agreement with Gallagher, to ensure they operate the very latest software available. “Any advancement in technology will make life easier, that’s a straightforward investment for us,” said Wilson. Through Waikato DHB’s experience with Gallagher products, the team developed a ‘Security Ward Standard’. This standard details the minimum security equipment required for new buildings, including access control, duress alarms, and cameras. The Security Ward Standard has greatly reduced the time involved by Waikato DHB staff in producing specification documents and gathering approvals. “Gallagher gives us a complete and total security package that is expandable and easy to manage,” said Wilson. “We are confident that a high-standard of security is being consistently applied across our sites for the safety of our staff, patients, and visitors.”
Control and instrumentation specialist, CMR Philippines, has won undisclosed contract to supply and install advanced building management, CCTV and fire detection and alarm systems at one of the South East Asia’s pharmaceutical manufacturers. The work, undertaken at Unilab Pharmaceuticals’ new oral medicines and capsules Delta Amherst plant production plant in Laguna, Binan, sees the design and installation by CMR of facility-wide Siemens Apogee BMS, Siemens Cerberus FDAS and Hikvision CCTV systems. Comprehensive package The advanced computer-based BMS system will be used to control and monitor the 22,000 sq. ft plant’s mechanical and electrical installations and equipment such as ventilation, lighting and power systems. CMR is also providing engineering and testing services as part of a comprehensive package of technical support CMR is also providing engineering and testing services as part of a comprehensive package of technical support, which covers the installation, programming and commissioning of advanced CCTV and FDAS capabilities. The systems will provide improved safety and security for Unilab employees working at Laguna as the manufacturer looks to expand its capabilities through new investment in state-of-the-art manufacturing and production facilities. Critical operational requirements Unilab produces a wide range of prescription and consumer health products covering all major therapeutic segments. Many of these products are sector brands across the Philippines, Indonesia, Thailand, Malaysia, Singapore, Hong Kong, Vietnam, and Myanmar. Rojel Rivera, general manager at CMR PH, said: “We are a valued and trusted supplier to Unilab and other regional manufacturers, providing cost effective and precision engineered system-based solutions.” “We are building a strong reputation as a first-class supplier to customers such as Unilab, who are looking for technologies to meet critical operational requirements, alongside high levels of reliability and performance in demanding production environments.”
Interphone, the security systems and building technology integrator, completes an advanced project for Ardmore Construction at the high-profile Sutton Point development, a vibrant new community at the heart of the London Borough of Sutton. The company was appointed to design and install the integrated security systems, which includes fibre infrastructure, BPT door entry, PAC access control, IP-networked CCTV and an IRS communal aerial system with SKY Q. The installation has been recognised by the UK Outstanding Security Performance Awards (OSPAs) with Interphone nominated as a 2019 finalist in the Outstanding Security Installer category. Fibre backbone network The Interphone project team took the decision to move to fibre infrastructure to improve performance “Through the effort and commitment of our team the project was successfully completed on-time, within budget, and to the highest possible standards notwithstanding design changes in the building along the way, which required modification to our own design and approach to aspects of the installation,” explained Albert Dwek, Sales Manager at Interphone Limited. In particular, the Interphone project team took the decision to move to fibre infrastructure to improve performance and ensure it could deliver a high-specification security system. As a result, the company created a fibre backbone network, which allows CCTV images to be viewed in true 1080p/4k without compromising any other components of the system. Responsive working relationships Interphone worked closely with services engineers QuinnRoss Consultants Limited throughout the project. Michael Keenleyside, Electrical Engineer at Quinn Ross commented: “We pride ourselves on our ability to deliver the best possible service and solution for each of our clients, so it is essential to have highly responsive working relationships in place with key technology partners.” “Interphone was flexible and adaptive throughout the design and installation phases of the development, which ensure that any changes to system requirements were handled quickly and efficiently. Their team’s knowledge, understanding and commitment was essential to the success of the project.” The sophisticated CCTV solution incorporates a site-wide, IP-networked camera system and full-perimeter PTZ (Pan Tilt and zoom) camera system from HIKvision. Greater compression The full-perimeter system runs in real-time over three towers, three remote stations and two virtual concierge points with interlock ability The full-perimeter system runs in real-time over three towers, three remote stations and two virtual concierge points with interlock ability. The external PTZ camera images, recorded onsite, are also shared with the local police. This means the management company can keep the site secure for its residents, while allowing the police to protect the area in and around the development against crime. The PAC access control system enables all management tasks related to the tenants and staff to be administered from the central computer as and when required, ensuring the highest level of security around the site and added peace of mind. Meanwhile, BPT’s XIP door entry system offers significantly greater compression, providing the clearest and highest quality AV currently available, even with the significant background noise. Building communications The added PCS concierge facility also has improved switchboard software performance, delivering full control of building communications at two desks, so the system will never be engaged and never miss a visitor call. The primary focus when designing this project was the delivery of a system that could expand to meet changing requirements" “The primary focus when designing this project was the delivery of a system that could expand to meet changing requirements. As a result, we have implemented a system that not only uses the most up-to-date technology, but by its design, has been future proofed with the ability to grow. Therefore, the developer can meet all its internal requirements and ensure high levels of security for residents, visitors and members of the public,” commented Dwek. Technical capabilities David Dobouny, Operations Director at Interphone Limited added: “We are committed to the highest levels of service delivery. This project was selected to demonstrate our technical capabilities covering access control and CCTV systems for our NSI accreditation. We achieved a grade A rating, with zero faults and no negative comments regarding on-and off-site documentation, design and installation. This is a fantastic achievement for everyone involved, especially considering the size of the project.” Sutton Point is a large-scale mixed-use scheme located close to the town centre. The high-profile development included the full demolition of an existing tower, and the design and construction of 332 one-and two-bedroom apartments, prime three-bedroom penthouses, 21,000 square feet of retail space, 18,000 square feet of office space and an 80-bedroom hotel.
Round table discussion
When security topics become a part of current events, it is usually in a negative light. Security generally only becomes news when it fails, sometimes in a dramatic, high profile and tragic way. However, security failures can also shed light on lessons learned and opportunities to improve. Working toward better security can translate into the purchase of more goods and equipment supplied by our market. For additional insights into the intersection of security and current events, we asked this week’s Expert Panel Roundtable: Good news or bad news? How do news reports and/or current events influence the general public’s opinion of physical security?
The new year 2019 is brimming with possibilities for the physical security industry, but will those possibilities prove to be good news or bad news for our market? Inevitably, it will be a combination of good and bad, but how much good and how bad? We wanted to check the temperature of the industry as it relates to expectations for the new year, so we asked this week’s Expert Panel Roundtable: How optimistic is your outlook for the physical security industry in 2019? Why?
Employee turnover is a problem for many companies, especially among younger employees who have not developed the philosophy of employer loyalty that was common in previous generations. Nowadays, changing jobs is the norm. The idea of spending decades working for a single employer seems almost quaint in today’s economy. However, excessive employee turnover can be expensive for employers, who are looking for ways to keep their brightest and best employees happily toiling away as long as possible. We asked this week’s Expert Panel Roundtable: How can the physical security market promote better employee retention in a competitive employment environment?