Commercial security system
The Security Leadership Research Institute (SLRI) has released the results of its 2021 corporate security organisational structures, cost of services, and staffing benchmark. Highlights 41% of respondents operated at the Director level The average security budget reported was $13,254,850 On average, respondents reported one security employee for every 93 employees Security leaders have used the budget, title, and reporting data provided by this benchmark to avoid budget reductions and s...
ONVIF, the global standardisation initiative for IP-based physical security products, has announced that it will end its support for Profile Q early next year since it contains certain specifications that are no longer consistent with current cyber security best practices. Profile Q Profile Q was developed to provide an easy setup of a conformant device on an IP network. It requires a Profile Q conformant device to allow anonymous access to all ONVIF commands, during the setup process in the f...
Comelit Group, as a founder partner to The Security Event, is excited to return to exhibit with the launch of the latest integrated solutions, comprising an array of smart security and fire safety systems for residential and commercial premises. On stand 3a/B10, Comelit will be presenting its new Logifire addressable panel, which has been designed to offer a simple to install, fire safety solution that is compliant with to latest standards. It is complemented with a new range of detectors, offe...
Integrated security manufacturer TDSi announces its forthcoming appearance at The Security Event, the major UK commercial, enterprise, and domestic security event which takes place from 7th-9th September at the NEC Birmingham. As one of the first major UK security sector events since the pandemic, TDSi will be showcasing its latest products - including the newly enhanced TDSi GARDiS range of hardware and software systems. Benefits of GARDiS range Looking ahead to Th...
Aqua Security, the pure-play cloud-native security solutions company, has announced the availability of its new Aqua Platform, with a unified console to ease the journey from scanning and visibility to workload protection in cloud-native environments. Aqua Platform The new Aqua platform reduces administrative burden and allows security teams to start with scanning and cloud security posture management (CSPM) capabilities, then add in sandboxing capabilities and workload protection as needed. T...
Introducing Ensenso S, camera manufacturer IDS Imaging Development Systems shows that the use of industrial-grade 3D technology does not have to be expensive. The 3D camera is particularly suitable for 3D applications that require budget-friendly, easy-to-integrate, and industrial-grade camera technology. The new Ensenso S10 has an ultra-compact, IP65/67-protected housing and generates 3D data using laser point triangulation, supported by artificial intelligence. This makes the camera suitable...
Secure Logiq is joining forces with 360 Vision Technology, AMG Systems, Cortech Developments, Harper Chalice and Suprema, to present a free webinar dedicated to Critical National Infrastructure (CNI) security technologies. CNI security technologies webinar The 1-hour session will take place on Wednesday 28th July at 10am BST (05.00 EDT, 09.00 UTC, 11.00 CEST, 13.00 GST 17.00 SGT) and has been created to offer practical support for those responsible for safety and/or security in the utilities, power, prisons and nuclear CNI sectors, including consultants and installers. The security of Critical National Infrastructure has never been more important or more under threat" “The security of Critical National Infrastructure has never been more important or more under threat,” said Secure Logiq’s Robin Hughes, adding “By partnering with these like-minded manufacturers who offer complementing solutions in the CNI space we will use this webinar to deliver a complete system overview. Our hope is to provide an informative and entertaining discussion around the subject with expert insights from across the solutions space.” Covering asset protection and risk management Named CNI Security Technologies - Optimising Risk Management and Asset Protection in the CNI sector, the webinar will cover how effective risk management and mitigation, asset protection, regulatory compliance and cost reduction can be achieved, via the use of innovative technologies. Thanks to the combined expertise of the manufacturers involved, a state-of-the-art, end-to-end solution, which is specifically designed for CNI security applications, will be presented to attendees. Cyber secure optical, thermal and radar camera systems Topics being covered will include cyber secure optical, thermal and radar camera systems, effective and innovative perimeter detection (PIDS), secure network backbone design for large infrastructures, flexible biometric access control with multi-factor and differentiating authentication, and optimised server and storage solutions that can provide a modular and scalable core platform for unrivalled interoperability of third-party security systems, via a centralised single platform hub. “Our aim is for this webinar to be an educational experience for professionals in the CNI sector,” concludes Robin Hughes, adding “We want to create an open discussion around cutting edge technology for Critical National Infrastructure rather than just a dry presentation, and with the additional Q&A session, we want to make this as interactive as possible.”
ASSA ABLOY Opening Solutions UK & Ireland has welcomed the new Building Safety Bill, which will drastically overhaul building regulations in England and Wales. Introduced in the House of Commons on 5 July, the bill is the next step in ground-breaking reforms that will create lasting generational change and set out a clear pathway for how high-rise residential buildings should be constructed, maintained and made safe. Considerations such as inclusive design and fire door safety maintenance will come to the fore as part of the new bill, which are issues that ASSA ABLOY Opening Solutions UK & Ireland has always passionately advocated for. Managing safety risks The safety measures outlined in the new bill address the concerns raised in the Hackitt Report, in response to the Grenfell Tower tragedy. Building owners will be required to manage safety risks, with clear lines of responsibility for safety during design, construction, completion, and occupation of high-rise buildings. They will also need to demonstrate that they have effective, proportionate measures in place to manage safety risks. Those who do not meet these obligations may face criminal charges. Building safety Regulator A new Building Safety Regulator will oversee a new, stricter safety regime for high-rise residential homes Under the bill, a new Building Safety Regulator will oversee a new, stricter safety regime for high-rise residential homes. These developments will require Principal Designers and Principal Contractors responsible for safety, as well as ‘gateway points’ when risks to health and safety will be considered. The bill will now have to pass through the House of Commons and House of Lords to pass into law. Safety standards Eryl Jones, Managing Director of the ASSA ABLOY Door Hardware Group, said, “This bill marks an important step in ensuring building regulations are right for the future while establishing new safety standards for the built environment.” “ The correct specification of door hardware, which meets essential health and safety demands, should be a non-negotiable. We are pleased that the new bill will help shine a light on some of these key issues.” Fire safety measures “First of all, while fire safety has always been critical, incidents such as the Grenfell tragedy have highlighted how this issue can no longer afford to be an afterthought. Fire doors are one of the most important safety features in a building, and regular inspections and maintenance regimes are critical.” “Secondly, inclusive design and accessibility is an issue that we feel incredibly passionate about. Building owners and developers should be demanding solutions, including door opening products, that meet these needs every single time.” “People must be able to access, use, and exit buildings easily and independently, and those designing, constructing, specifying products for, and maintaining these buildings have a duty of care to make sure this is the case.” Educating the stakeholders One measure we have taken to help educate key stakeholders in the supply chain is a comprehensive white paper “One measure we have taken to help educate key stakeholders in the supply chain is a comprehensive white paper, demystifying what the guidelines governing inclusive design state while making clear why this is an issue that building owners and developers should care about.” “It also covers how decision-makers can ensure products that meet the necessary fire safety standards are specified too.” “We believe the Building Safety Bill will play a landmark role in changing building regulations for high-rise structures for the better, placing health and safety at the heart of these environments. Furthermore, we’d hope that these changes and focus filters throughout the construction industry as a whole, making all buildings safer.”
Vector Flow has announced that it has received LenelS2 factory certification and joined the LenelS2 OpenAccess Alliance Program (OAAP). Vector Flow’s AI-enabled physical security automation platform interfaces with the OnGuard access control system, to strengthen customers’ security programmes, with integrated identity governance and improved compliance, across their entire cyber-physical security infrastructure. LenelS2 factory certification “Vector Flow has completed required factory testing at LenelS2 to validate the functionality of its interface to the OnGuard system. This interface actively monitors identity provisioning changes, such as on-boarding, off-boarding and location or responsibility changes and triggers Vector Flow to automatically adjust and provision the correct access levels in the OnGuard system,” said John Marchioli, OAAP Product Management at LenelS2, adding “We look forward to their continued involvement in the LenelS2 OpenAccess Alliance Program.” “The integration of the Vector Flow advanced physical security platform with the LenelS2 OnGuard system, provides organisations a single source of truth for identity management, while also leveraging the power of AI with data-driven automation to provide significant security and operational benefits,” said Ajay Jain, Founder and CEO of Vector Flow. Vector Flow – LenelS2 partnership Vector Flow empowers organisations to manage all types of identities and their physical access in the OnGuard system Ajay Jain adds, “We are extremely pleased to be working with LenelS2 and look forward to future certifications for new security and business intelligence applications.” Vector Flow empowers organisations with the capability to manage all types of identities and their physical access in the OnGuard system while automating policies for return to work, synchronised on/off-boarding, visitor management, enforcement of access compliance controls, background checks & training pre-requisites, cyber-physical risks, occupancy management, contract tracing and much more. Data-driven physical security platform Vector Flow’s innovative data-driven physical security platform is built on a foundation of advanced AI algorithms capable of processing and analysing vast amounts of data from otherwise disparate security systems and applying automation playbooks to reduce cost and risk. The innovative solution simplifies and improves physical security operations while delivering tangible ROI and lowering TCO, enabling new levels of Security Orchestration, Automation and Response (SOAR) for physical security. Vector Flow unifies PIAM, surveillance and security systems with alarms, event management and automated ‘playbook’ workflows in real-time, to deliver actionable insights.
Mouser Electronics, Inc., the industry's New Product Introduction (NPI) distributor with the widest selection of semiconductors and electronic components, stocks a wide selection of automotive motor control solutions from Infineon Technologies. Suitable for environmental requirements Products in Infineon's array of automotive motor control solutions are suitable for the environment and application requirements of the automotive industry. The requirements have influenced the replacement of mechanical solutions with electrical motors. High-priority factors, such as CO2 reduction, have increased the need for smart, electrically controlled motors. The number of electrical motors in cars is growing steadily for classical combustion engines and electrical cars. Infineon is constantly expanding its portfolio of semiconductors for smart, state-of-the-art DC and brushless DC (BLDC) motor control applications. This broad portfolio of intelligent motor control ICs is complemented by microcontrollers, sensors, transceivers, and supply products for end-to-end solutions. Certified products As a global authorised distributor, Mouser offers the world's widest selection of the newest semiconductors and electronic components in stock and ready to ship. Mouser's customers can expect 100% certified, genuine products that are fully traceable from each of its manufacturer partners. To help speed up the design process for customers, Mouser's website hosts an extensive library of technical resources, including a Technical Resource Centre, along with product data sheets, supplier-specific reference designs, application notes, technical design information, engineering tools, and other helpful information.
Mouser Electronics, Inc., the industry’s New Product Introduction (NPI) distributor with the widest selection of semiconductors and electronic components, has signed a global distribution agreement with Fingerprint Cards (Fingerprints), a biometrics company. Through the agreement, Mouser will offer customers Fingerprints’ BM-Lite module and development kit to help design biometric access devices. Biometric fingerprint solution The Fingerprints BM-Lite module is a complete biometric fingerprint solution that contains the hardware, software, and algorithm necessary for use right out of the box. Combining high-quality components with exceptional biometric performance, the IPX7-rated BM-Lite module offers a comprehensive embedded solution for both increased security and enhanced ease of use. The 15 mm × 15 mm × 2.8 mm module uses simple serial commands to enroll and verify, and the device’s embedded standalone fingerprint verification system offers low power consumption for use in battery-powered applications. The BM-Lite development kit features all the hardware necessary to develop security and access control solutions, including locks, safes, USB tokens, and POS terminals. The BM-Lite development kit includes a BM-Lite module and adapter flex cable, FPC5832, and FPC5924 adapter board. Certified products As a global authorised distributor, Mouser offers the world's widest selection of the newest semiconductors and electronic components in stock and ready to ship. Mouser's customers can expect 100% certified, genuine products that are fully traceable from each of its manufacturer partners. To help speed up the design process for customers, Mouser's website hosts an extensive library of technical resources, including a Technical Resource Centre, along with product data sheets, supplier-specific reference designs, application notes, technical design information, engineering tools, and other helpful information.
A disruptor platform that aims to revolutionise the electrical security industry has launched a scathing attack on big business “dinosaurs”, accusing them of ripping off customers and refusing to change antiquated working practices. instaENG is an electronic security bid platform and allows customers to post jobs in specialities such as CCTV, intruder alarms, and fire systems which businesses or sole traders can then bid for directly, democratising the process of awarding work and making it leaner, more efficient, and transparent. The entirely online platform, which has already attracted several blue-chip brands since launching in January, says the rest of the industry is being left behind by refusing to evolve. Eliminating supply chains Co-founder David Stubbs said the success of instaENG has helped eliminate opaque supply chains in the sector and ensures engineers receive a higher income, while customers pay a lower price. But he said the largest firms in the industry were still routinely marking up jobs by 30 percent to outsource to sub-contractors and applying extra charges for unnecessary specification visits. Purchasing in the electrical industry “The electrical security industry is the most technologically advanced in our sector but the purchasing procedures have not changed at all,” David said. “It is an antiquated, closed-shop process where the industry dinosaurs are holding on to a margin which virtually every other sector has let go of. We can confidently say we are an alternative to the dinosaurs of this industry.” “We have to ask the question, ‘why is it the prehistoric large security firms haven’t developed their purchasing procedures for the electronic security sector?’. The answer is simple – they’re making far too much money to consider doing it.” Providing alternatives The message to customers is simple – we know you are not happy with the status quo and there is an alternative " “Do buyers really trust the internal ‘helpdesk’ of an external supplier which is financially rewarded for delivering against their specifications? We’re confident they don’t.” “Our message to customers is simple – we know you are not happy with the status quo and there is an alternative.” SaaS platform The software as a service (SaaS) platform has been working with Travis Perkins and its associated brands Toolstation, Keyline, and Benchmarx since its launch and is processing hundreds of jobs on its behalf every month. David said the success of the platform with companies of this standing should alert the procurement departments of similar blue-chip businesses. He added, “instaENG is a unique offering which eliminates the margin from the dominant security providers. We are sure that a platform which is working for the likes of Travis Perkins and Toolstation will have equal appeal for other blue-chip brands in the UK.” instaENG is attending the Retail Risk event in London on Thursday (July 22) to demonstrate the platform, which includes a new smartphone app developed for Android and iOS.
The UK Government has set out an ambitious ten-point plan, known as the green industrial revolution, with an aim “to forge ahead with eradicating its contribution to climate change by 2050.” This makes our government the first major economy to embrace such a legal obligation. Green recovery Acknowledging climate change and meeting net-zero is a demanding challenge especially for those affected by the pandemic. But the UK Government, with the launch of its aspiring strategy, is investing everything in its power to promote a ‘green recovery.’ Here, Reece Paprotny, Commercial Manager and Sustainability Champion at Amthal, highlights how the fire and security industry has an opportunity to use the current recovery period to explore its own sustainable journey and embrace the significance of environment, economic and social collaboration, transparency, and accountability. Employing sustainable technologies Pressure is mounting on construction to find ways to reduce emissions and help meet net-zero targets The perception is that COVID-19 presents a once-in-a-lifetime opportunity to re-write the existing rulebook. This is riding on the significance of changing public support for more environmentally friendly living opportunities, with associated cost savings, efficiencies, and cleaner industries. Innovative sustainable technologies are the key to kickstart this route to success. Nowhere can this be seen more than in the built environment, which currently contributes to 40% of the UK's carbon footprint. Pressure is mounting on construction to find ways to reduce emissions and help meet net-zero targets. This is through the entire life cycle of a building, to reduce their impact on the environment from planning stages, through build and demolition. Building the right environment By creating the right policy environment, incentives for innovation and infrastructure, the Government can encourage companies to seize the sustainable opportunities of new technologies and value chains linked to green sectors. They can accelerate the shift of current carbon-intensive economic and industrial structures onto greener trajectories, enabling the UK to meet global climate and development goals under the Paris Agreement on climate change and the 2030 Agenda for Sustainable Development. Transparent working practices Each industry sector is expected to engage and pledge its support to achieve the significant deadlines. Every company can make a difference, even with small steps towards a sustainable future. So whilst elements such as safety and security represent just one component of building the right sustainable environment, it paves the way to opening up our sector to greater efficiencies, transparent working practices, and encourages collaborative use of resources. Sustainability in security The security sector has a significant opportunity to incorporate ‘going green’ into its practices In fact, the security sector has a significant opportunity to incorporate ‘going green’ into their processes, and practices. This is right from product lifecycles to more environmentally friendly work practices when it comes to maintenance and monitoring services. When integrating environmentally friendly practices, starts with the manufacturing and production of the wide variety of systems in operation for the security sector. And some certifications and guidelines can be achieved, such as the ISO 14000 which looks into eliminating hazardous materials being used which in turn will reduce carbon footprint. Upgrading supply chain process Observing the complete supply chain and working with partners to reduce unnecessary travel, shipments, and transportation of products, can all contribute and create sustainable processes. In the maintenance and monitoring of products, it is essential installers and security specialists consider their own environmental impacts. Simple changes such as switching company vehicles to electric options for site visits can make a significant difference to climate change and improving air quality. Presenting sustainable ways of disposing of products at the end of their natural lifecycle is key to change in our sector. This is especially in the security industry where many customers will need a complete overhaul of outdated solutions or need systems upgrading due to changing threat levels. Sustainable evolution Progress is being made, specifically in the fire and security industry, in its sustainable evolution. Businesses are trying to develop a reputation for “sustainability” or “good corporate citizenship.” And it has gone well beyond the theory to the practical, where companies recognise activities have an impact on the environment and are also reviewing the social and economic influences. Three pillars of sustainability In a recent interview, Inge Huijbrechts, the Global Senior Vice President for safety and security and Responsible Business at Radisson Hotel Groups sees her vision to combine safety, security, and sustainability. Inge focuses on three pillars, namely, Think People, Think Community, and Think Planet. Think People means that we “always care for the people in our hotels and our supply chain.” So, in outwards communications, safety and security were always part of the Think People focus area. Think Community is caring and contributing in a meaningful way to communities where we operate. Finally, Think Planet makes sure that “our footprint on the environment is as light as it can be in terms of energy, water, waste, and carbon, and making sure that we incorporate sustainability into our value proposition.” Moving forward Apprenticeship schemes are integral to ‘think people’ and have a role to play in the social impact on the security industry There are immediate actions that can be taken by companies in the security industry to support sustainable development, working right from within a company to supporting industry-wide initiatives. From a social perspective, at a foundation level, “Think People’ can see the Living Wage Foundation as an example of a commitment to a team. This is for businesses that choose to go further and pay a real Living wage based on the cost of living, not just the Government minimum. Apprenticeship schemes are also integral to ‘think people’ and have a pivotal role to play on the social impact on the security industry. It addresses the sector-wide issue of finding employees with the right mix of skills to collaborate and meet discerning consumer demands for increasingly smart security solutions for homes and businesses. Impact of the full lifecycle of products From an environmental view, or ‘think planet,’ we need to collectively look at all elements of our industry, with a desire to analyse the impact of ingredients used, supply chain, or manufacturing alone, and also consider the full lifecycle of our selected products from creation to end of life. As Jamie Allam, CEO Amthal summarises, “This is a long-term, sustainable investment in our people, our products, and our business based on our values.” “When put together, a social team which feels empowers and operates in environmental optimum working conditions is in a position to provide a great experience to our customers, creating an economic positive difference. It forms the basis of a sustainable sector vision for the security industry-wide to adopt.” Taking action Amthal is taking action based on the ready-made universally agreed UN 17 Sustainable Development Goals. Also known as Global Goals, these are at the heart of the 2030 Agenda for Sustainable Development, adopted by all United Nations Member states. This agenda is a plan of action for people, the planet, and prosperity. By being an early adopter, we believe we can engage with customers, partners, and suppliers on these issues and generate opportunities to innovate for mutual and industry sector benefit. Together, we can contribute to building a more sustainable security sector and future, and contribute to the UK Government’s green industrial revolution.
Prices and delivery times for essential components in CCTV systems are being driven up as demand soars from other industries. Secure Logiq’s Robin Hughes explains the current state of the market. Challenges Component shortages and supply chain challenges are a hot topic in just about every industry based on semi-conductors and silicon chips right now, and security is no exception. It’s common knowledge that the global Covid lockdown caused a shutdown in the mining of silicon and spherites as large industries such as motor manufacturing cancelled or postponed their chip orders – this has caused a supply gap that every industry is feeling. However, there is a second challenge that is hitting the security sector particularly hard, and it may not be one you are expecting – cryptocurrencies. Cryptocurrencies and security When people discuss cryptocurrencies and security, thoughts often turn to cybersecurity and ransomware payment tracking. But the issue for the majority of the security industry comes from crypto mining. When it comes to cryptocurrencies, GPUs are intrinsic for ‘proof of work’ mining GPUs (Graphics Processing Units) are a key component in CCTV, they decode images and display them onto screens. With the increase of video analytics, these have also become key to running the complicated algorithms required for creating the metadata and presenting it in a meaningful way for end-users. However, when it comes to cryptocurrencies, GPUs are intrinsic for ‘proof of work’ mining. Demand for GPUs When Bitcoin prices were relatively low, it was hard to justify the cost of a GPU and the associated power consumption for Bitcoin mining applications. But as the price of Bitcoin has increased exponentially, demand for GPUs to do the number-crunching has grown dramatically causing a major shortage and huge price hikes. This rise in prices is not correlated with an increase in technological performance on the new GPUs, it is entirely a case of demand outstripping supply and a resulting bidding war. To put this in context, cards are currently going new for around twice the original price and manufacturers simply cannot keep up with the demand. Chia On top of this, there is a new cryptocurrency creating a new threat to a different part of the CCTV industry. A new ‘environmental’ cryptocurrency called Chia has dispensed with the processing power and electricity demands of traditional GPU mining, instead of utilising the spare storage space on hard drives (HDD) to verify blockchain transactions (‘proof of space’). The demand for this particular cryptocurrency has to date called on 30 Exabytes of storage since May this year – that’s 30 Billion Gigabytes of data, and it’s not just HDDs, high-capacity SSDs are also in demand. This is causing massive hard drive supply issues globally, thus rocketing prices for those that are available. HDD consumption The security industry sits comfortably in the ‘Big data’ category and with storage retention times running from 30 days to 6 months Of course, this has a particularly large knock-on for the CCTV market. There is nothing more data-intensive than video, other than multiple streams of HD video. With this in mind, the security industry sits comfortably in the ‘Big data’ category and with storage retention times running from 30 days typically up to 6 months and longer in some regions/applications, the CCTV market consumes more HDDs than many other markets. Growth of data centres While you would think that this would make security an important area for HDD manufacturers, our market is a relatively small player. IT vendors will always focus on their core customers, and the rise of the gaming market, as well as the growth of data centres due to remote working in the pandemic, has created a more important sector to serve – and these customers will always come first. Imagine the daily storage space required if 5 Billion people uploaded just one image a day to ‘the cloud’! Component manufacturers These factors combined with the lack of raw materials leading to longer lead times for component manufacturers mean that the prices for hard drives and GPUs are likely to remain inflated well into 2022 while factories play catch up on the backlog. The market for IT hardware is currently strong enough to continue even with the increase in component prices and the extended lead times for products. If you can get your hands on any HDDs, the delivery times from most distributors are around 6-8 weeks. Increased delivery times All of this has had a serious impact on the security industry. CCTV projects are now facing the combined issue of increased delivery times and higher costs. Many manufacturers, integrators, and distributors are doing their best to absorb the price increases where they can, but this is unsustainable over the long term. So what can be done? Second-hand applications Some people are getting more creative by purchasing from the second-hand market Some people are getting more creative by purchasing from the second-hand market. However, it is unlikely that commercial applications will be willing to risk potential downtime or data losses by using second-hand components that have been pushed hard for months on end mining cryptocurrencies. Making early purchases While I can’t comment on what other manufacturers have done, at Secure Logiq we have been watching this market trend closely. We always try to keep a close eye on anything that has the potential to significantly impact our manufacturing capabilities and try to offset any potential challenges with early purchases before the impact is fully felt. As such, we have been able to secure enough products to continue manufacturing as normal for more than six months. Increased demand as a challenge While we have this existing stock to meet current and anticipated orders, we continue to scour the market for any available stock to make sure we are at the top of the list when any fresh products come on the market. This has meant that throughout our 10-year history we have never failed to deliver a customer order within 7-10 working days. The delays with component manufacture and the ongoing increased demand will continue to present a huge challenge to the CCTV and wider security industry. However, good planning and intelligent design will allow projects to remain on track. Security technology manufacturers are not alone in this challenge, but the dual-threat is perhaps unique. It will take a while for this threat to be overcome, but with robust planning and by paying close attention to the market forward-thinking CCTV manufacturers can still deliver projects for their clients.
Whenever you say the word “security” in today’s world of digitalisation and technology, minds immediately jump to online security. Encryption, passwords, and website security are all common areas of concern for today’s security teams – so much so that we often pass over physical security installations entirely. But we shouldn’t, because contrary to popular belief, security doors aren’t just for banks and safes. High-security doors are deployed and used across everything from home spaces to offices, venues, communal entrances, and more – offering an extra level of safety designed to keep unwanted guests out and keep the people inside safe. In this blog, we will be uncovering some of the benefits of installing high-security doors besides the obvious – offering a high level of security. Benefits of high-security doors When you start telling someone about high-security doors, they often immediately think of thick steel doors with unbreakable locks. But modern security doors are nothing like that, with the marketplace filled with different options including ventilated louvre doors, reinforced hammer glass doors, and classic metal doors. And with each style comes a different set of benefits. 1) High-security doors keep businesses and properties safe If anything is going to put burglars off and keep your inside space safe, it’s high-security doors. High-security doors not only help keep burglars away but also saves on the cost of investing in expensive home security systems With such a wide array of options on the market, from double or triple glazing through to top-level security doors for industrial properties and homes, customers can choose the weight of their door and its finish – meaning that they have a choice between making their high-security decision obvious or concealing it for the benefit of aesthetics. This not only helps keep burglars away from your home or office space and reduces the crime rate, but also saves on the cost of investing in expensive alarms and home security systems. 2) Dual purpose benefits from top-level manufacturers Modern high-security doors from retailers like Premier SSL not only provide industrial-strength but are also classed as fire doors – meaning that they keep people inside safe on two accounts. On top of that, high-security doors no longer look like the entrance to a bank – in fact, most manufacturers now work with materials that deliver an aesthetically pleasing finish that can complement your building or inside space. This means you can benefit from everything from a wood effect finish to a decorative trim and more. 3) Cut costs in Winter and Summer Managing bills at home often mean juggling the art of keeping the house cool enough in summer and warm enough in winter. On one hand, with high-security doors which are effective fire doors and are made to measure and tailored to your home, the heat and warm air inside your home are trapped inside during the winter to keep your home cozy. This helps to cut the cost of heating and ensures your family is protected during the winter months. Mesh layered security Meanwhile, for those who opt for the mesh layered security doors or Louvre doors, in summer you can keep your home or inside space cool and filled with fresh air even while the doors are closed and secured. This ensures adequate ventilation and is a popular choice with homeowners today as it cuts the cost of bills and expensive air conditioning and helps prevent issues like mould which can occur in damp spaces with little airflow. Louvre security doors also help to retain the same level of privacy as a solid door but with a high level of airflow – making them ideal for communal areas and spaces with a high footfall. 4) Keep pets and children safe A security door is enough to deter a burglar to keep your little ones and pets safe and contained inside the house A security door is enough to deter a burglar – so is certainly more than sufficient to keep your little ones and pets safe and contained inside the house. Preventing access to dangerous situations such as being outdoors on their own and entering the kitchen on their own is a benefit that many families revel in – with a range of options including the mesh-covered security doors to retain ventilation and natural light and create more of a homely feel. 5) Feeling safe and secure in your own space This one may seem obvious but it’s one of the biggest benefits – feeling safe even when on your own. Security doors mean that you can rest easy in your own space, in complete control of the locking mechanism and the entry of anyone besides yourself. Most of the security doors recognised by modern standards can withstand ballistics and crowbar tampering – even those with ventilation breaks. On top of that, they have a certain degree of water tightness and resistance to wind, meaning that they also keep you safe from home or building damage. 6) Versatility The vast array of security doors on the market right now means that versatility is possible – in the way that doors are locked, the way that they look, and the additional features they provide. Many of the high-security doors we and other retailers offer also provide complete sound ventilation and are ideally suited to everything from a modern new build to something more traditional in its feel and aesthetics. Uses of security doors High-security doors are a popular addition to modern homes and office spaces, as well as communal spaces and venues As previously touched on, security doors are no longer just for banks and high-security institutes. High-security doors are a popular addition to modern homes and office spaces, as well as communal spaces and venues. The versatility presented by the locking mechanism and access tools means that users can select everything from an entry fob to a code and a traditional key as a means of getting inside. The Takeaway High-security doors are an increasingly popular solution for nurturing safety both in commercial spaces and private homes. With options from solid steel doors to louver doors, triple and double glazed doors, and fire doors available on the market for every space and with made to measure manufacturing options, it has never been easier to equip your home against intruders and keep your family or work team safe and comfortable. Best of all for the modern homeowner, high-security doors no longer create an eyesore – instead, reflecting the same design aesthetic focus as you might expect from an interior company.
BIM (building information modeling) provides a process for creating and managing information during the building lifecycle and beyond. BIM is often equated with 3D modeling of construction projects, but the visual component is just part of the value of BIM. Additional data, such as specifications and other documentation, is also part of the process, underlying the visual aspects, helping to drive decision making and providing immediate access to detailed information about all facets of the building process. Incorporating BIM systems For the last six years, ASSA ABLOY Opening Solutions has worked with specification writers and architects in Europe, the Middle East, and Africa (EMEA) to make it easy to incorporate ASSA ABLOY Opening Solutions doors, hardware, and security solutions into BIM systems. Everyone on a project can work together in the interactive and information-rich BIM environment. BIM tools are also used by contractors, distributors, facility owners, and security consultants. BIM software BIM information relating to doors, hardware, and security solutions is available in the cloud BIM information relating to doors, hardware, and security solutions is available in the cloud with the company’s Openings Studio BIM software. This improves the process of door scheduling and visualisation and enables customers to focus on the design, installation, and management of openings. “If you have up-to-date information inside the BIM model, you can reduce mistakes and misunderstanding in the building industry,” says Marc Ameryckx, ASSA ABLOY Opening Solutions’ BIM Manager for the EMEIA region. “It helps to eliminate mistakes before they happen or as early as possible in the building process. The earlier, the less it costs. We provide data as soon as possible in the process.” (ASSA ABLOY Opening Solutions also has comparable systems available in other regions of the global company.) Centralised data in BIM 3D model Expanding the data available in BIM provides additional value compared to merely providing “BIM objects” that can be incorporated into a BIM 3D model. The combination of BIM modeling and the underlying specifications boosts the quality of the project and its key to success, says Marc Ameryckx. Even after the building is complete, the BIM model is still valuable, providing a repository of “as-built” information that can be used by building managers and security professionals tasked with operating and maintaining the building. For example, if a lock needs to be replaced, retrofitting is simpler because all the information about the lock and existing installation is available in a centralised data file. Revit and ArchiCAD A widely used BIM software is Revit from Autodesk, a program that brings architecture, engineering, and construction disciplines into a unified modeling environment to drive more efficient and cost-effective projects. Another BIM software program is ArchiCAD, developed by the Hungarian company Graphisoft. Openings Studio™ added a plugin for ArchiCAD this year, in addition to Revit. Tailor-made information security solutions We provide tailor-made information security solutions with various hardware on projects with more doors" “We can provide tailor-made information security solutions with various hardware on projects with more doors, adding more flexibility,” says Marc Ameryckx. “Customers do not need to be the experts on the products because we provide expertise as part of our specifications.” For example, how often do building mistakes occur because of a misunderstanding about the electrical needs of a lock and the wrong cabling is installed? The problem is especially expensive if it is discovered only after the walls are complete. Providing complete data about the electrical lock as part of a BIM system avoids the snafu. Another example is the specification of a deadbolt lock on a door that operates with an electric strike. The deadbolt undermines the intended operation of the electric strike and can interfere with escape routes in case of an emergency. The mistake becomes obvious in the BIM environment and can be rectified before consequences impact the real world. Data addition to Opening Suites site ASSA ABLOY Opening Solutions is continuously expanding the data it provides at the Opening Suites site, covering additional functionality and more components including the door, cabling, and electrical connections. Hardware sets are linked to specific doors in the BIM models, including all the details of various components, including article numbers, technical sheets, electrical requirements, all depending on customer expectations. Physical equipment includes QR codes that can be scanned by a smartphone to provide information on the door (A mobile app is in development). More details and more data Experienced BIM consultants work with the Openings Studio software on projects ranging from single doors to large buildings with many doors. Data will be more and more important, and there will be more data inside BIM models Adding more data and detail to the BIM process at the level of each door expands the usefulness of BIM, which has historically been focused on broader issues such as structural work and HVAC. “Openings Studio™ provides all the data to integrate doors and security in the BIM process,” says Marc Ameryckx. The higher level of detail may be a new aspect even for customers who already use BIM software. “Data will be more and more important, and there will be more data inside BIM models,” says Marc Ameryckx. In the future, the use of “digital twins” could expand the capabilities even further; for example, the software could simulate escape routes in case of fire. More data makes more things possible.
Many employers faced a need to ramp up hiring of drivers to meet a higher demand for product deliveries and transportation logistics during the COVID-19 pandemic. To meet the demand for drivers, employers had to make quick hiring decisions while also ensuring products were still being delivered in a timely fashion. Safe work environment Businesses have a duty of care to provide a safe working environment for their employees and contractors. It is therefore important to limit exposing drivers to risk, to put in place proper safety and security protocols, and to clearly outline them in company policies. Whether an employee or contractor, these drivers represent the brand they work for. If they do not adhere to company-mandated safety and security rules, because the business did not make them aware or they intentionally did not comply by acting with malice, this can put the drivers, other employees, customers and the company at risk financially, legally and with regard to their reputation. Adherence to safety protocols Operating in haste typically results in forced errors and mistakes within the business" “This need to hire drivers quickly resulted in many businesses lowering their standards and accepting certain risks to meet the increased demand. Operating in haste typically results in forced errors and mistakes within the business, potentially leading to harmful events and a damaged brand reputation,” stated Thomas Kopecky, Chief Strategy Officer and Co-Founder, Ontic Technologies (Ontic), a unified protective intelligence software platform. In the conversation presented below, Kopecky outlines the safety and compliance requirements needed to manage the risks while meeting the demand for drivers. Q: What risks do employers face as they ramp up hiring to meet higher demand for drivers? Thomas Kopecky: There have been instances in which a transportation contractor with multiple violations has simply established the business under a new name but continues to operate dangerously. Hastily hiring such a firm without proper enhanced vetting increases the risk from a safety, as well as a business continuity standpoint. Having to terminate a contract and replace a contractor midway can also have significant financial repercussions. In addition to problems created by executing too quickly, employers are now required both to mitigate their own general liability risks and to manage the perceived risk they may create due to the pandemic. For example, if a delivery driver tests positive for COVID-19, there is the potential they have also exposed customers. Employers must consider contactless delivery or other methods and protocols to mitigate this presumed risk of the pandemic. Q: What are the elements of safety and compliance involved in onboarding new drivers? Thomas Kopecky: When onboarding new drivers, corporations must think about more than clean background checks and adequate infrastructure. Whether employees or contractors, organisations must focus on what other risks the drivers bring with them. As part of this review, an open source scrub should be conducted at the outset to discover the driver’s online activity. Through this exercise, a whole host of questions can be addressed including, for example, whether their morals and values align with those of the company. Are they involved with fringe or radical interest groups? Do their actions conflict with the culture of the organisation, and could they have a negative impact? These are all questions that employers should be considering when hiring new drivers or contracting a new company. Q: What tools are available to help companies vet their driver fleets and how can these tools make a difference? Employers should also consider State Business Records for potential red flags Thomas Kopecky: To vet their driver fleets, corporations can use several tools and resources that will strengthen the organisation’s overall security. Ideally this is a software platform that brings all this information into one place so vetting, real-time data and concerning activities are not siloed but can be connected in order to assess potential risks and threats. Logically, businesses should consider reviewing Department of Transportation Records, which allow organisations to check whether drivers are licenced and appropriately insured. Employers should also consider State Business Records for potential red flags, such as whether an organisation is delinquent or no longer functioning in a given state. Finally, it’s beneficial to review civil records as these can highlight any active or past cases associated with an organisation. This includes fraud, bankruptcy, poor business practices, and more. Q: What should be the standard methodology to investigate and collect data on new driver programs? Thomas Kopecky: Corporate culture and company policies impact the level of vetting required (determined by company policy), which varies from business to business. Quite often, most valuable investigative content is associated with an actual fleet company owner and not a recently created business entity so it behooves corporations to research this information first. Then verify the information provided is correct, and whether any other conflicting information exists. As previously noted, employers should review civil and criminal records at the state level and cases at the federal level, as it is often the fleet company or owner involved in litigation that could reflect negatively on a brand. Media coverage and consumer complaints are another critical source for negative mentions that may not always appear in public records. You should also ask if the Department of Transportation (DOT) regulates this contract or driver; and if they were once a provider and are now re-applying, is it under a new name? If the answer is yes to either question, it will be necessary to check DOT records for adequate licencing or insurance coverage to ensure providers applying under a new name aren’t trying to circumvent the vetting process. Q: What are the privacy concerns, and how can potential employers ensure they do not violate issues of privacy as they vet drivers (and/or other employees)? Businesses must conduct their operations in a fair, lawful, and transparent manner Thomas Kopecky: Businesses must conduct their operations in a fair, lawful, and transparent manner. Employers often dictate their own guidelines and requirements from company to company. Companies must ensure they follow the law and handle data used for vetting driver fleets in a manner compliant with General Data Protection Regulation (GDPR), Health Information Portability and Accountability Act (HIPAA), and the Fair Credit Reporting Act (FCRA). When utilising software platforms, those that aggregate public record data in real-time and efficiently to provide actionable insights will be key for protecting corporate driver fleets and businesses overall. Q: How is addressing these issues different in the case of a contracted service versus a company employee? Thomas Kopecky: Addressing these issues will vary from company to company, but it will be important for clients' legal counsel to help interpret the law in the respective state they operate in and make this final determination. This will help shape policy and the employer’s compliance requirements in the area of operation. In some jurisdictions, contractors are vetted and treated like employees who are protected by FCRA. In contrast, there are more broad interpretations of what level of vetting and continuous monitoring can take place on contractors versus employees in other jurisdictions. Q: What is at risk if companies fail to address these issues? Thomas Kopecky: If companies fail to address security issues with managing their driver fleets, they risk major liability, business continuity and brand reputation. Every employee and contractor is in essence an ambassador of the brand, and in many instances, they are the only customer-facing representative for the enterprise. Imagine you are a contractor driving for a major delivery service. If you were to get into an accident and tragically kill someone driving their branded truck, the repercussions of that accident would harm the brand as opposed to the small contracting company by which you are employed. This can have a disastrous impact on the enterprise, both from a reputation and financial standpoint. When proactive steps are not taken to evaluate fleet companies or their owners, this can be viewed as negligence. Consider another example: A brand hires a driver company that has committed fraud while operating under another company’s name. What is the brand’s cost to conduct an initial onboarding assessment of this company versus the cost of investigating an issue, terminating the contract, and dealing with any potential litigation that might follow? The latter is clearly the financial burden. Corporations must proactively address risk associated with their driver fleets to mitigate risk before it occurs. Q: What is the biggest misconception (in the industry and/or the public at large) about employee vetting requirements? Enhanced vetting today often includes looking into a contractor’s background or its company Thomas Kopecky: We have passed the days where everything is all about criminal background checks and instant alerts when a driver receives a DUI. We are entering a world where business continuity and resiliency are necessary. Companies are so reliant on contracted services or seasonal employee pools that if that roster of operators were found to be unsuitable, the business itself would not meet the demands of its customers. Before the digital age, people only understood the driver vetting process to be based around a search of felony convictions. Enhanced vetting today often includes looking into a contractor’s background or its company from a different vantage point. Employers must begin to think about litigation history, negative media coverage and vocal social platforms, history of poor business practices or fraud, and more. These are factors that need to be considered for a business to mitigate risk and maintain continuity of service in an era where timeliness and instant gratification are highly valued.
Honeywell Commercial Security is among the companies working to develop security systems that are more proactive than reactive. “Our biggest opportunity moving forward is the ability to have security solutions that do a better job of detecting and predicting threats,” says Tim Baker, Global Marketing Director, Honeywell Commercial Security. Greater use of analytics and intelligence can reduce human error and simplify processes by providing a more unified view for greater situational awareness. Artificial intelligence and deep learning “We’re reaching a maturity level in terms of algorithms and hardware to drive new capabilities in a cost-effective way,” he says. Baker sees a continuing interest in artificial intelligence (AI) and deep learning in the physical security market, used in video analytics and also for intrusion and access control. "We have challenged ourselves to move from reactive solutions to develop a set of proactive solutions that determine potential security threats before they happen,” he says. An overarching theme is the need to focus operator attention on “what matters” rather than requiring operators to keep track of the growing number of sensors in newer systems. A remaining hurdle is to streamline the deployment of analytics systems, which can require expensive customisation during the commissioning phase. Credential-enabled access control reader The reader can support any card format and also enables “frictionless” access control That’s where Honeywell is investing and focusing its attention, seeking when possible to “pre-teach” algorithms based on data gleaned from a large installed base. Fortunately, there will be plenty of data from a growing variety of sites to build from. Honeywell offers a full ecosystem built around enterprise security needs and a second ecosystem built around the needs of small- and medium-sized businesses (SMBs). In the enterprise space, the trend is toward smarter edge devices, such as Honeywell’s OmniAssure Touch, a mobile credential-enabled access control reader. The reader can support any card format and also enables “frictionless” access control. A user can gain access by touching the reader, with no need to take his or her smart phone (which has the credential) out of their pocket. The reader is fully backwards compatible, which is a Honeywell hallmark. Honeywell’s OmniAssure Touch can support any card format and also enables “frictionless” access control. Designed to be cloud-enabled On the enterprise software side, Honeywell has invested in further development of their Pro-Watch access control system and MAXPRO VMS (video management system), tying them together into a single security console, along with intrusion and other systems such as human resources (HR) data. For the SMB market, Honeywell is building and expanding their MAXPRO Cloud system. As existing hardware has evolved to be cloud-enabled, the company has also been introducing new control products that are designed from the ground up to be cloud-enabled. Honeywell’s biggest vertical markets include banking, healthcare, gaming, energy infrastructure and airports The new MAXPRO Intrusion system, which can be configured over the cloud, will be introduced in the first quarter. MAXPRO Access, to be introduced in late November, can be deployed using an embedded web interface, a cloud interface, or as an on-premise solution. On the NVR side, an embedded NVR works alongside Honeywell’s new 30 Series video cameras, providing secure and encrypted end-to-end connection. Networked security system A challenge for Honeywell is to keep up with broader trends happening in the industry, whether geopolitical (e.g., relations between China and the United States) or regulatory such as General Data Protection Regulation (GDPR). Baker acknowledges an industry-wide increase in awareness about cyber security, driven largely by the enterprise market. IT departments are getting more involved in the purchasing decision; indeed, the chief information officer (CIO) is often the ultimate decision-maker. In response, Honeywell is emphasising “cyber security by design” from the beginning to the end of a project. Also, they are using white-hat hackers to test products before they are released into a live environment. “We are doing everything we can to make sure products are cyber secure,” says Baker. Honeywell’s biggest vertical markets include banking, pharmaceutical, healthcare, gaming, energy infrastructure and airports. NDAA-compliant video cameras Compliance is a common thread throughout the verticals. Honeywell sells to the government mostly in the access control and intrusion space and built around their Vindicator networked security system. (They also introduced the line of NDAA-compliant video cameras, made in Taiwan, at the recent GSX show.)
Collins Aerospace has completed deployment of its ARINC SelfPass™ biometrics solution at Haneda Airport, one of the busiest airports in Asia, streamlining passenger processing through reduced physical interactions and bottlenecks at multiple passenger touchpoints. Collins Aerospace is a Raytheon Technologies business. “Our ‘Face Express’ system will allow passengers to efficiently proceed through procedures at the airport (baggage drop, security checkpoint entrance, boarding gate) utilising facial recognition, eliminating the hassle of showing their passport and boarding pass,” said Shoichi Ohashi, Tokyo International Air Terminal Corporation’s senior manager for the Facility Department. “We worked closely with Collins Aerospace to achieve this and enhance passenger convenience at Tokyo Haneda airport.” SelfPass biometrics solution Rakan Khaled, vice president, Airport Systems for Collins said, “Our ARINC SelfPass biometrics solution at Tokyo Haneda Airport streamlines passenger processing while improving airport efficiency and security. Despite the challenging pandemic environment, we were able to manage staffing and suppliers to ensure smooth delivery of the solution.” This project includes the installation of 98 Self-Service Check-In Kiosks, 30 biometric enrollment kiosks, 104 biometric devices for Self-Bag Drop, 17 biometric Automated Security Gates, and 42 biometric Automated Self-Boarding Gates.
Hanwha Techwin a global supplier of IP and analog video surveillance solutions announced that We-Ko-Pa Casino Resort has selected Hanwha cameras for its new state-of-the-art video surveillance system. First established as a bingo-hall style building by the Fort McDowell Yavapai Nation in the early 1990s, the facility received approval to be revamped into a fully-fledged gaming facility in 2017. To ensure the safety of staff and visitors, this also included a new video surveillance system. Quality cameras When it came time to build the new facility, the Tribal Regulatory Agency, having learned from its earlier attempts, knew they had to find a vendor that wouldn’t let them down. Explains Lee Brown, Lead Surveillance Technician for the Fort McDowell Tribal Regulatory Agency, “We were looking for a manufacturer that had a variety of camera offerings to give us what we wanted and that also had a good reputation for quality.” They found what they were looking for with Hanwha Techwin. Camera coverage The cameras available from Hanwha Techwin enabled them to choose the right camera for every situation The number of cameras available from Hanwha Techwin was a key differentiator for the We-Ko-Pa Resort as it enabled them to choose the right camera for every situation. The range of options was especially important when it came time to design camera coverage for the slot floor in the new facility. This area proved to be challenging in part because it was designed to be flexible and modular. The new design allows the Casino to be dynamic in terms of where they place machines. The challenge then was how to ensure coverage of every machine even as they move around daily. Flexible 4k cameras They initially considered attaching cameras to the ‘cloud’ ceiling so that they could be moved as the configuration changed. But, because it floats below a concrete ceiling, this was not possible. The Casino decided instead to use the higher resolution P series 4K cameras and place them strategically throughout the space. Says Brown, “We had to give very careful consideration to where we placed our cameras. We wanted high quality and flexibility to avoid having to reconfigure and reinstall cameras all the time. The image quality with the Hanwha Techwin cameras gave us the edge we needed to work within our ceiling constraints.” WDR technology The new Casino has over 800 Hanwha Techwin cameras, including the XNV-8080R, PNV-9080R, and PNF-9010R models The new Casino has over 800 Hanwha Techwin cameras, including the XNV-8080R, PNV-9080R, and PNF-9010R models. According to Brown, their favorite feature is the quality they deliver at low bitrates. He says, “The majority of our cameras face intense and volatile lighting changes against a backdrop of complex scenery with many moving objects. Hanwha Techwin cameras and their advanced WDR (Wide Dynamic Range) technology can easily be configured to accommodate these conditions without sacrificing quality or producing obnoxious data streams.” Wisenet wave VMS While part of the interest in Hanwha Techwin was based on the build and image quality of the cameras and variety of the offerings, the Casino was also drawn to the Wisenet WAVE VMS (Video Management System). Says Brown, “We were attracted to the WAVE VMS because our virtualised server and client operating systems are 100% Linux based, and the WAVE client and server applications are well supported on Linux. It works exceptionally well with the Hanwha Techwin cameras and other devices, like HDMI encoders and third-party cameras.” Live central monitoring WAVE also helps operators with live monitoring. As part of their daily routines, operators at the Casino have to actively watch a variety of events and occurrences, including deliveries and vendors on site. Says Brown, “The layout system in WAVE makes it easy for us to organise our cameras into groups. So, when an operator follows someone through the Casino, rather than thinking in terms of which camera covers which machine or specific area, they think more in terms of the geography of the location.” Motion detection To reduce the storage requirements for video surveillance footage, they use motion-based high/low recording Every casino must comply with strict retention requirements in part because forensic examination and maintaining a clear chain of custody are extremely important. At the We-Ko-Pa Resort, they have a one-week minimum retention rate with some cameras keeping video for 30 days. Currently, We-Ko-Pa has 500 terabytes (TB) of redundant ZFS-based network storage. To reduce the storage requirements for video surveillance footage, they use motion-based high/low recording. Explains Brown, “We use motion detection to save on storage. If no motion is detected in a frame, the camera is set up to record at very low quality and low frame rate. If the camera detects motion, then the recording automatically shifts to high-quality mode.” Video surveillance system Moving forward, the Casino is excited about future possibilities for their system, including people counting and using their WAVE VMS to make data-driven decisions. The Casino and Tribal Regulatory Agency aren’t the only ones who recognise the outstanding features and functionality of their new Hanwha Techwin system. The Arizona Department of Gaming, which provides specific mandates for gaming operators in the state, is also impressed. According to Brown, “We have even received compliments for our video surveillance system from the state inspector who was quite impressed with the image quality and the smoothness of the recordings.”
Exeter Science Park is a business park developed by the Exeter Science Park Company, a partnership between Devon County Council, the University of Exeter, the Exeter City Council, and the East Devon District Council. It is a 26-hectare site located on the outskirts of the city of Exeter next to junction 29 of the M5 motorway. Sustainable solution The site has 2 entry lanes and 3 exit lanes. A vehicle access control solution was required to resolve problems at these entry and exit points. It was necessary to reduce staff involvement in barrier control, relieve congestion at the barriers, and improve reporting data using a sustainable solution that has low maintenance costs. Long-range tag reader Upon approach to the entry barrier, the uPass reader senses the RFID tag Each entry and exit lane has been fitted with a barrier, an HD ANPR camera, and an uPass long-range tag reader. The tag reader is used as the primary method of access control. Staff members will attach their RFID tags to their windscreens. Upon approach to the entry barrier, the uPass reader senses the RFID tag. The uPass Reader passes the information the barrier control, which opens the barrier. The whole process takes approximately 3 seconds. The same procedure is used on the exit barriers. HD ANPR cameras For staff that don’t have RFID tags and visitors, a secondary system using HD ANPR cameras provides access control. This removes the need for any ticket issue/chip coin at entry, avoiding human involvement and resulting in a faster throughput on entry and exit. Further staff and tenants can be added to a limitless categorised white list using the vehicle number plate as the ID. The white list can be used to allow automatic entry of visitors without the driver having to press the intercom button. Benefits Cost-effective and reliable hands-free access control Windscreen tags are read at up to 5 metres Prevents unauthorised vehicle access Allows vehicles to be tracked “The uPass long-range tag reader has allowed a quicker throughput through the barrier, whilst improving security on vehicle access. We are extremely happy with the positive impact the product has had on our client,” said Mustafe Omar, Business Development Manager, Newpark Solutions.
HID Global, a pioneer in trusted identity solutions announced that the Arcos Bosques Torre 1 (Tower 1) has deployed its access control solutions to heighten security and better manage visitor entry. Located in the Bosques de las Lomas neighborhood of Mexico City, the center is comprised of six buildings. The complex includes two skyscrapers and is home to high-profile law firms, industrial, mining, media, and technology companies, and one of the city’s most recognised shopping centers. HID readers and smart card technologies With the help of system integrator Logen, Arcos Bosques Corporate Center chose HID Mobile Access® solutions as well as HID readers and smart card technologies for tenants and visitors to securely pass through its 16 turnstiles and use the 32 elevators that lead to their offices. The HID solutions also give tenants the choice of using their mobile devices or physical smart cards for entry. Touchless and safe entry HID’s mobile access solution enables administrators to remotely manage credentials by cloud-based infrastructure “Accessing the building by simply presenting a mobile phone makes a lot of sense as we look for ways to eliminate touching things during the global pandemic,” said Santiago Morett, Project Manager at Servicon, facilities manager for Arcos Bosques. “HID Mobile Access has given us touchless entry and safer building security, which is more important than ever for our tenants.” Mobile access solution HID’s mobile access solution also enables administrators to remotely create, issue, manage and revoke credentials through the cloud-based infrastructure. Servicon, the facility management company for Arcos Bosques, now has continuous building access visibility through a unified, up-to-the-minute database of the tower’s tenant names, affiliated companies, and work locations. "Building security today extends not only to who has access but also to how individuals can enter a facility,” said Harm Radstaak, Senior Vice President and Head of Physical Access Control Solutions with HID Global. “HID’s access control solutions provide the foundation for optimal oversight and control while also keeping people healthy and safe.”
London’s renowned landmark skyscraper, 30 St Mary Axe, more famously known as The Gherkin, has selected Forge, powered by Yardi, to provide an enhanced and efficient visitor management solution for the building. The Gherkin, located in London’s primary financial district, welcomes over 2,000 visitors per week, including restaurant-goers who dine at the noted top-floor situated Helix Restaurant, which is managed by Searcy’s. Forge Bluepoint Cloud-based software solution, Forge Bluepoint also provides real-time data on visitors expected To manage the experience of the visitors, The Gherkin will adopt Forge Bluepoint to provide fast check-in and check-out, and the ability to scan access cards or mobile QR codes in speed lanes for secure admission, to their designated meeting floor. Cloud-based software solution, Forge Bluepoint also provides real-time data on visitors expected and allows for seamless integration with other building management technology solutions. Efficient visitor management “30 St Mary Axe has a number of different tenants who require a journey for their visitors that fits their needs and culture,” said Clare Jackaman, the Operations Manager at The Gherkin. Clare Jackaman adds, “The Forge Bluepoint technology will provide our reception and security staff with an efficient solution, to provide the right level of service and ensure people in the building are visiting safely.” Enhanced security of visitors “We’re excited to add The Gherkin to the growing list of Forge Bluepoint buildings across London,” said Paul Speariett, the Regional Director at Yardi, adding “Working in partnership with The Gherkin team, we have built visitor journeys that provide them with the experience, security and efficiency they need.”
Euromac, a global company in the design and manufacture of punching and bending machines, is benefitting from NSK ball screws, linear guides, and bearings in two high-profile recent projects. In fact, Euromac has been taking advantage of NSK motion control technology since 1995 as part of a long-standing and highly successful partnership. Produces advanced and competitive products From its headquarters in Italy, Euromac tailors’ machines to meet demanding customer requirements; the combination of state-of-the-art technologies and unique concepts assures users of advanced, productive, and competitive products at all times. Continuous improvement and innovation is a core company ethos and represents the reason why Euromac has been able to expand its worldwide presence and achieve impressive growth since its formation in 1986. Major Supplier Among the latest Euromac machines to benefit from NSK motion control technologies is the FX Bend 2550 new-generation electric press brake with 50 or 60-tonne press force, 2550 mm bend length, and six-axis back-gauge; and the new-generation XT punching machine (hydraulic, hybrid, or electric) with 1500 x 3000 mm capacity and a newly reinforced frame. In both applications, NSK is the main supplier of ball screws, linear guides, and bearings. Euromac XT Euromac XT sets the bar in the punching machine arena by being available in hydraulic, hybrid, and electric variants The Euromac XT sets the bar for innovation in the punching machine arena by being available in hydraulic, hybrid, and electric variants. In each type, Euromac uses a different way of moving the main punching axis. In the electric version, for example, the technology holds its own patent. Here, acceleration of 90 m/s2 and stroke of sometimes less than 10 mm, means that impact load is a constant issue. High-performance and robust products With this thought in mind, there is a clear need for high-performance, robust, and reliable linear motion products. For the main punching axis on the electric Euromac XT, NSK, therefore, proposed its HTF SRD series ball screw with S1 ball spacers featuring grease-retaining attributes. These ball screws also make use of a special material named Tough Steel. Providing the perfect complement to the HTF SRD ball screw is the RA series linear guide with high acceleration capability. Ensures high productivity HTF SRD ball screws take advantage of an innovative end deflector recirculation system to achieve ultra-high speeds of up to 3 m/s, offering shorter cycle times and higher productivity to end-users. Importantly, this high-load ball screw ensures good rotational balance, with no run-out of recirculation components, while the optimised (smooth) ball circulation methodology reduces noise by half compared with conventional systems. Accuracy and uniformity The carefully matched spacing and restraint technology of the roller bodies produce a very high uniformity NSK’s RA series of low-friction, high-load capacity roller guides provide high rigidity to deliver the traverse and repeat accuracy necessary in machine tools such as the Euromac XT. This capability results from, among other things, special restraining and deflecting components, as well as the use of rollers with the largest possible diameter and a slightly crowned surface to minimise vibration during rotation. The carefully matched spacing and restraint technology of the roller bodies also produce a very high uniformity of the displacement forces that occur. After a year of comprehensive and successful testing, Euromac recently commenced volume production of its XT punching machines, exemplifying how the performance and quality of NSK linear motion products, together with proven technical support, can benefit innovative machine tool builders. Products The new Euromac XT punching machine uses high-performance, robust, and reliable linear motion solutions from The Euromac FX Bend 2550 new-generation electric press brake also benefits from NSK motion control NSK HTF SRD ball screws take advantage of an innovative end deflector recirculation system to achieve ultra-high NSK’s RA series of low-friction, high-load capacity roller guides provide the high rigidity necessary in machine tools such as the Euromac
Round table discussion
The idea of touchless systems has gained new levels of prominence during the last year, driven by the global COVID-19 pandemic. Contactless systems have been part of the industry’s toolbox for decades, while technologies like facial and iris recognition are finding new uses every day. We asked this week’s Expert Panel Roundtable: Which security markets are embracing touchless, contactless systems and why?
Adoption of General Data Protection Regulation (GDPR) by the European Union in 2016 set a new standard for data privacy. But adherence to GDPR is only one element, among many privacy concerns sweeping the global security community and leaving almost no product category untouched, from access control to video to biometrics. Because privacy concerns are more prevalent than ever, we asked this week’s Expert Panel Roundtable: What is the impact on the physical security market?
Many of us take critical infrastructure for granted in our everyday lives. We turn on a tap, flip a switch, push a button, and water, light, and heat are all readily available. But it is important to remember that computerised systems manage critical infrastructure facilities, making them vulnerable to cyber-attacks. The recent ransomware attack on the Colonial Pipeline is an example of the new types of threats. In addition, any number of physical attacks is also possibilities. We asked this week’s Expert Panel Roundtable: What are the security challenges of protecting critical infrastructure?