Commercial security system
Dahua Technology, the globally renowned video-centric smart IoT solutions and services provider, announced that the company successfully held the online Dahua Technology Partner Day 2020 event on December 1, 2020 with 26 technology partners. IoT and security solutions Dahua showcased its ecosystem in the EMEA region, while the partners brought solutions in the field of security and IoT, taking interoperability to the next level. Openness and cooperation is always Dahua's core values. Together...
Interphone has published a security system and building technology whitepaper to help developers, contractors, installers and managing agents better understand their responsibilities regarding the General Data Protection Regulation (GDPR). The in-depth report, titled A guide to GDPR compliance for the commercial residential marketplace, has been produced jointly with legal training specialist Woolven and Brown to provide an industry-specific look at the data protection and privacy law. GDPR an...
To say that the security industry draws people in and demonstrates its value in terms of relationship building with the caliber of people who comprise the industry is an understatement, as Bart Williams, President of Security Solutions and Communications, Inc. (Security Solutions) found out. Founder of Security Solutions Williams chose to become an engineer as his profession, but he began dabbling in the security industry part time, soon to discover it would lead him on the path to becoming St...
Suprema, a globally renowned company in access control, biometrics and time & attendance solutions, has announced that its intelligent biometric access controller, CoreStation has acquired UL 294 compliance. UL 294 compliance UL 294 is a certification designed especially to ensure the safety and reliability of access control products. The certification has significance to larger customers, like government institutions, corporations, and medical and banking verticals that value reliability...
PSA, a large consortium of professional systems integrators, announced the addition of Qumulex, to its Managed Security Service Provider Program (MSSP). Qumulex offers a cloud-based, unified access control and video surveillance solution for physical security integrators that serve commercial markets. Modern progressive web app “Qumulex designs products that make the transition from legacy systems to the cloud, easier and more manageable,” said Tim Brooks, Vice President...
ComNet, Communication Networks of Danbury, Connecticut, a USA-based manufacturer of fibre optic transmission and networking equipment and an ACRE brand, announced that ACRE has acquired Razberi Technologies and the product line will be added to and sold under the ComNet brand and portfolio of products. ComNet will now be selling Razberi products through its established channels. Intelligent video appliances The Razberi product line of intelligent video appliances, automated security software,...
Briefcam, the industry’s renowned provider of Video Content Analytics and Video Synopsis solutions, has announced that its advanced video analytics software platform will serve as the analytics engine for Verizon’s Intelligent Video solution. Intelligent Video solution The comprehensive monitoring service from Verizon helps law enforcement and security teams keep public and private facilities secure with near real-time, actionable data from video content. The combined solution enhances the ability for these organisations to protect lives and property in remote locations and in the city centres - equally. This includes critical infrastructure from dams and power plants to oil refineries and transportation systems. Advanced video analytics The full solution leveraging BriefCam provides advanced video analytics, including near real-time and forensic video analysis, and trends in data through dashboard visualisation, enabling rapid acceleration of video investigations. “Leveraging its renowned network, Verizon is creating a best-in-class solution to enable the protection of all facilities in a community whether in the city center or on the edge of town,” said Gili Rom, Vice President of Strategic Initiatives, BriefCam. Gili adds, “Bringing together Verizon’s wireless infrastructure with our advanced video analytics and other industry leading technologies allows security professionals to remotely optimise situational awareness while reducing time and resource investments.” Leveraging robust analytics software The solution was built to provide advanced analytics and benefits for an improved experience Verizon Intelligent Video leveraging BriefCam’s robust analytics software offers a comprehensive, bundled video management solution for cloud or wireless access that includes software licencing, installation, administration, training, and support. The solution was built to provide advanced analytics and benefits for an improved experience. BriefCam delivers the ability to monitor and analyse multiple sites remotely from a single interface and the insights needed to fully prevent or investigate and resolve issues. Automated video analysis Verizon Intelligent Video automates video analysis with an easy-to-use interface so that users can quickly drill down, and filtre objects based on a wide range of object classifications, attributes, and behaviours. This accelerates investigations and helps users attain situational awareness sooner, to derive operational intelligence from video. The powerful solution makes it possible to do more with fewer monitoring, intelligence, and investigative resources.
Already established as a renowned provider of high-quality door closers, UNION has further strengthened its range with the launch of three dynamic new solutions. Innovative and properly certified, the three new door closers all bring incredible value to the market, by solving a number of critical challenges faced by installers to meet the needs of their customers. With the launch of the CE26V, SC-CE3F and CE4F-E, UNION now meets almost every door closer requirement - whether for light or heavy closing, concealed closing, or the ability to choose between hold-open and free-swing settings. With the new SC-CE3F door closer, style comes to the fore. A concealed solution, it helps maintain the aesthetics of an environment by being hidden from view. Residential and commercial applications This allows buildings to benefit from the advantages of a fixed power size 3 door closer without compromising on aesthetics, making the SC-CE3F the perfect choice for high-end residential and commercial applications. Its concealed nature also protects it from vandalism, particularly in spaces such as university halls of residence, where this can be a problem. The new CE26V rack and pinion door closer is an easy-to-fit solution that can be set to any power size between 2 and 6 Compliant with the demands of BS 8300 for creating an inclusive environment, the SC-CE3F is also more compact than comparable products, reducing the amount of material needed to be removed from the door leaf. The new CE26V rack and pinion door closer is an easy-to-fit solution that can be set to any power size between 2 and 6, in line with the EN 1154 standard governing the requirements of controlled door closing devices. Providing assured protection As a result, the CE26V offers outstanding flexibility, making it suitable for anything from lighter doors of 20kg to heavier doors up to 120kg. The CE26V ensures it is possible to meet almost any EN power size demands from a single product. Due to this flexibility, it’s ideally suited for new projects or retrofit applications. The CE26V is also CE and Certifire tested for 120 minutes on timber doors in all three fixing positions, providing assured protection in the event of a fire. The new CE4F-E electromagnetic door closer is a dual-function solution that can be set to one of two modes: hold-open or free swing. When in hold-open mode, the CE4F-E allows people to walk through the doorway without opening the door, offering the ultimate barrier-free solution. This makes it ideal for hospitals, hotels, theatres and other high-traffic public areas. Smoke alarm system The CE4F-E complies with the demands of BS EN 1155 by connecting to a building’s fire or smoke alarm system By removing the need for physical contact, it also reduces the spread of germs - a consideration that is increasingly in demand following the outbreak of COVID-19. Alternatively, in free-swing mode, the door operates as though no closer is fitted. This allows the door to swing freely with little force required to open it; suitable for the needs of residential bedroom doors in care homes, for example. Both modes provide assured fire safety, should an incident arise. The CE4F-E complies with the demands of BS EN 1155 by connecting to a building’s fire or smoke alarm system. In the event of a fire, power is cut to the unit, allowing it to automatically close and stop the spread of fire and smoke. Fire alarm sounds “We’re extremely excited to have launched the CE26V, SC-CE3F and CE4F-E door closers, which strengthen our range and allow us to offer a comprehensive offering that meets all door closer needs,” comments Richard Wilson, Product Category Manager at UNION. “Whether you’re after versatility in terms of door weight, concealment for aesthetic reasons, or the choice between hold-open and free-swing, UNION has got you covered." "The new solutions join other tried and trusted UNION products, to ensure you can turn to us whatever your door closer needs might be. This includes Door Sense, a safe, simple and legal retrofit device that holds fire doors open but automatically closes if a fire alarm sounds, and Retro V, an easy way of replacing old door closers without risking a fire door’s certification.”
ISC West, in collaboration with premier sponsor, the Security Industry Association (SIA), has announced breaking news and guidance regarding ISC West 2021 event. The international security event was originally slated to be held March 23-26, 2021, but after extensive internal and external consultation and monitoring of the ongoing COVID-19 virus pandemic situation, they have made the decision to reschedule ISC West 2021. Rescheduled ISC West 2021 event The ISC West 2021 security event now will take place from July 19 to July 21, 2020, at The Venetian Resort and Sands Expo & Convention Center, in Las Vegas, Nevada. The organisers thank The Venetian Resort for their leadership, partnership and ongoing dedication to bringing the event back safely. They’re pleased to have a plan in place to host ISC West in 2021, and after a long respite, the ISC and SIA teams look forward to welcoming customers back to Las Vegas for strong education, demos, product announcements, awards ceremonies, networking opportunities, special events, and more. Now more than ever, the security industry’s integrators, installers, dealers, consultants and end-user practitioners have an essential services role, with heightened responsibility for protecting companies, employees, customers and the public. The 2021 event will further accelerate the convergence of security, public safety and health tech solutions, and chart the course for expanded levels of public-private sector cooperation and results. 2021 SIA Education@ISC West program The curriculum will include a new track on health and safety best practices in response to the COVID-19 pandemic The 2021 SIA Education@ISC West program will include an extensive schedule of physical security and converged security content, while also adding in key new topics. The curriculum will include a new track on health and safety best practices in response to the COVID-19 pandemic, including case studies and technology solutions that address employee/customer wellness and access control, business continuity, and facilities management. Plus, the 2021 event model will also offer a hybrid format, with both face-to-face conference pass and virtual conference pass options available, in order to serve the wide-reaching ISC community. The security and public safety community by nature is very face-to-face, with physical presence and engagement being the foundation of the business, solutions and professional diligence. Adherence to health and safety protocols To ensure that ISC West is the safest environment for a live event, the Reed Exhibitions Health & Safety Task Force, along with the expert team at the Sands Expo venue, will be ensuring that all key health and safety protocols and systems are in place for enhanced hygiene and cleaning, air conditioning and ventilation, physical distancing, PPE, health tech and health services. ISC West Topline Schedule: July 19-21, 2021: Monday, July 19: morning Keynote, Day 1 of SIA Education@ISC West, and Day 1 of the Expo Tuesday, July 20: morning Keynote, Day 2 of SIA Education@ISC West, and Day 2 of the Expo Wednesday, July 21: Women in Security/Diversity & Inclusion Breakfast and Keynote, Day 3 of SIA Education@ISC West, Day 3 of the Expo, plus a high-profile closing Keynote general session to wrap up the event
Last year saw vehicle thefts rise by a staggering 50% in the UK, and again by a further 20% so far this year, which is regarded to be the highest level in four years. With cases worsening during lockdown, motorists are now being warned that they face a greater risk of vehicle theft now that the nation is making fewer trips in their vehicles and spending more time at home. Countering the rise in vehicle thefts The cost of a lost or damaged vehicle can quickly mount up for any business owner, not only due to the replacement of the vehicle, but also the effect of doing business with a reduced fleet. With thefts on the rise, business owners are quickly realising that securing their fleet and its contents can be imperative to the operational stability of their businesses. Yet the RAC reported that only 42% of new vans are produced with an alarm fitted as standard, with 5.5% not even having the capability to have one fitted. Importance of automotive locksmiths Automotive locksmiths are specialists in their field, possessing the knowledge on how to utilise, adapt and develop the right products on the market to maximise security for both commercial and private vehicles. From on-board diagnostic (OBD) port protectors to anti-scan wallets, there are a number of solutions available to create strong sales opportunities for locksmiths who work in this field. Thatcham slam locks, deadlocks, camlocks, and padlocks Mul-T-Lock offers an extensive range of advanced products that provide protection to commercial and private vehicles In support of this, Mul-T-Lock offers an extensive range of advanced products that provide protection to commercial and private vehicles of all varieties. These include lock cases, Thatcham accredited slam locks, deadlocks, euro cylinders, camlocks, and padlocks. Mul-T-Lock’s solutions for commercial applications have been specifically designed for durability, robustness and ease-of-use to allow motorists to access their equipment and goods without any hassle. Enhancing automotive security protection Quality is also of paramount importance when it comes to automotive security protection. Many factors, such as wet weather and road gritting, during the icy months can get into vehicle locking mechanisms causing rusting, damage and failure, but Mul-T-Lock products are developed to withstand these conditions. Designed and manufactured to the highest specification and quality, each product is typically adapted to suit the market’s needs, having evolved into heavy-duty commercial offerings, Mul-T-Lock’s locking solutions range allows users to ‘fit and forget’, allowing them to focus on the job at hand. ArmaDLock locking solution Mul-T-Lock’s ArmaDLock was designed to fortify the security of commercial vehicles, in particular, those carrying goods and equipment. Simple to use and install, ArmaDLock fits almost any type of vehicle door, both rear and sliding. With these darker evenings, now is the time for automotive locksmiths to get fully stocked for the busy period ahead. From domestic customers to commercial and fleet clients, there is no doubt that vehicle crime is affecting all markets and is set to rise over the winter months.
Safetrust, the globally renowned company in virtual credential solutions, has released touchless mobile access and WiFi options for the millions of HID iCLASS SE and multiCLASS SE readers deployed globally with their new SABRE MODULE. The 30-second plug-in makes the SABRE MODULE the fastest way to enable touchless mobile access at the door, turnstile or elevator, while using existing readers. SABRE MODULE touchless mobile access The SABRE MODULE enables hands-free authentication from a configurable distance As organisations transition back to the workplace, eliminating community touchpoints of legacy door readers is paramount for employee safety. Unlike traditional cards and keyfobs that in practice are touched at the reader, the SABRE MODULE enables hands-free authentication from a configurable distance. With dynamic credential management, administrators can instantly issue and reissue a secure mobile credential to employees or visitors with the click of a button, removing the need for face-to-face onboarding and handling cards. IoT technology integration with readers “Lifetime warranty should mean for a lifetime,” said Jason Hart, the Chief Executive Officer of Safetrust, adding “We independently developed the SABRE MODULE to extend the useful life of existing HID iCLASS SE and multiCLASS SE readers by adding the connectivity and sensor features that were missing.” Jason further stated, “By adding IoT technology to the reader, organisations can augment their traditional physical access solution and utilise the readers as network-connected sensors for touchless access, presence detection and remote management, in addition to being forward capable as industry standards evolve.” WiFi-enabled and full remote management The SABRE MODULE is WiFi-enabled and supports digital certificate 802.1x authentication, MQTT and SIA OSDP, allowing full remote management of the traditional RFID reader, no matter the reader’s current wiring configuration. The module is made in the USA and comes with a lifetime warranty.
Dell Technologies has announced the release of their new Dell EMC PowerProtect DP series integrated appliances and PowerProtect Data Manager Software advancements to help businesses and customers protect, manage and recover data from traditional and modern applications, across core data centers, edge locations and public clouds. PowerProtect Cyber Recovery Dell, the industry renowned company in data protection appliances and software, also announces the release of PowerProtect Cyber Recovery, the first data vaulting solution endorsed by Sheltered Harbor to enhance cyber resiliency in the financial sector. The rise of multi-cloud strategies and modern applications creates new challenges" "Companies are managing almost 40% more data than last year according to this year's Dell Technologies Global Data Protection Index Snapshot. Along with exponential data growth, the rise of multi-cloud strategies and modern applications creates new challenges," said Jeff Boudreau, President and General Manager for Infrastructure Solutions Group at Dell Technologies. Jeff adds, "Data protection is not a one-size-fits-all proposition. Dell Technologies continues to advance our target and integrated appliances portfolio and software-defined data protection offerings, helping customers manage today's challenges while keeping an eye on what lies ahead." Modern integrated data protection PowerProtect DP series is Dell's next generation integrated data protection appliance, offering complete backup, recovery, replication, de-duplication, cloud readiness with disaster recovery, and long-term retention to the public cloud. PowerProtect DP series appliances help customers manage explosive data growth, lower costs and simplify increasing complexities with an all-in-one solution, offering: Extreme performance: Delivers up to 38% faster backups and up to 45% faster restores. PowerProtect DP also offers instant access and restore of up to 50% greater IOPS3 (Input/Output operations per second), compared to the previous generation, allowing customers to quickly and easily recover critical data. Greater efficiency: Provides up to one petabyte of usable capacity with 30% more logical capacity4, with up to 65:1 data reduction, enabling customers to store more data in the same space with more cost-effective systems. Energy savings: Consumes up to 23% less power than previous generation, delivering significant energy and cost-savings. Multi-cloud strategies and data protection Dell EMC PowerProtect portfolio provides customers with a range of simple, efficient and agile data protection options "The rise of modern applications, multi-cloud strategies and the sheer amount of data created present data protection challenges our company faces every day," said Clifton Dorsey, Vice President, Warrell Corporation, adding "The PowerProtect portfolio, including the new PowerProtect DP series capabilities, help us address these changing IT and data protection requirements." "The Dell EMC PowerProtect portfolio provides customers with a wide variety of simple, efficient and agile data protection options, so that they can choose the approach that best fits their IT strategy," said Steven Ayoub, President, AHEAD, adding "Dell Technologies is a very strong partner, and new offerings like the PowerProtect DP series are changing the game in data protection." Dell EMC PowerProtect Cyber Recovery Dell Technologies announces that Dell EMC PowerProtect Cyber Recovery is the first on-premises turnkey data vaulting solution to receive a Sheltered Harbor endorsement. Sheltered Harbor is the not-for-profit, industry-led initiative dedicated to enhancing the stability and resiliency of the financial sector in the wake of increased cyber-attacks. PowerProtect Cyber Recovery protects customers from cyber threats ranging from ransomware to insider attacks. The solution's CyberSense analytics and machine learning capabilities allow customers to monitor data integrity, ensuring the continued quality of their data. Forensic tools allow customers to discover, diagnose and remediate ongoing attacks. With this endorsement, U.S. financial institutions can easily deploy an endorsed vaulting solution to protect critical customer data from cyber threats. PowerProtect Data Manager PowerProtect Data Manager delivers new value to PowerProtect appliance customers that have cloud, VMware and Kubernetes environments. Data Manager now protects in-cloud workloads in Microsoft Azure and AWS, offering customers greater choice and flexibility in deploying the software. PowerProtect Data Manager now supports the VMware Tanzu portfolio to protect customers' modern applications. New integrations make it the first solution to provide native vCenter Storage Policy Based Management integration for VM protection. Enhanced Kubernetes and cloud data protection Data Manager offers a VMware-certified solution to protect the VMware Cloud Foundation infrastructure layer Customers can save time and better protect their VMs by using well-known workflows from within their VMware vSphere environment to assign data protection policies. Data Manager now also offers a VMware-certified solution to protect the VMware Cloud Foundation infrastructure layer. Data Manager also offers comprehensive protection for containerised modern applications with agentless, application-consistent protection of open source databases, including PostgreSQL and Apache Cassandra, in Kubernetes environments. Customers now can protect Amazon Elastic Kubernetes Service (EKS) and Azure Kubernetes Service (AKS) to back up Kubernetes cluster-level resources. "As companies embrace modern IT, they also must adopt data protection solutions that can handle today's challenges without losing sight of what lies ahead," said Phil Goodwin, Research Director, Enterprise Infrastructure Practice, IDC, adding "With these updates to the PowerProtect portfolio, Dell is simultaneously simplifying its portfolio and expanding its capabilities to protect both existing and emerging workload requirements." Dell Technologies On Demand With Dell Technologies On Demand, PowerProtect Data Manager customers can choose how to pay for, consume and manage their appliances. With fully managed services, customers can leave their ongoing data protection operations to Dell experts to monitor, operate and optimise their environment, saving valuable time and reducing the risk factor. Flexible payment solutions enable customers to more effectively budget for IT spending and only pay for technology and services as needed. Availability Dell EMC PowerProtect DP series appliances – DP4400, DP5400, DP5900 and DP8900 – will be available globally in December 2020. PowerProtect Data Manager enhancements are globally available now.
Indoor positioning is, in many ways, an inside version of the satellite-navigation apps we rely on for outdoor navigation, but with an added twist – it can also be used to help locate people and things. Let’s say you’re at home and misplaced your car keys, or you’re in a grocery store and can’t find your favorite brand of coffee. Or maybe you’re working in a factory and need a particular tool from a storage bin, or you’re a site manager dealing with an emergency and need to make sure everyone’s exited the building. Indoor positioning helps in all these situations, because it can locate items and guide you to where they are. The importance of “where” Knowing where an asset is located in real time is useful in many ways. In industrial settings, it improves item utilisation rates and saves time spent searching for things. It opens the door for a new level of “just in time” efficiency on factory floors, and for inventory management in warehouses and retail environments. Safety is another benefit of accurate location, because knowing where people, automatic guided vehicles, and robots are in real time can help prevent accidents and keep people out of harm’s way. Accurate location in real time also enables contextual decision-making, so your smart house adjusts your stereo automatically as you move from to room or lets you control objects by simply pointing at them. Lets you control objects by simply pointing at them Security authorisations based on location is another possibility. Precise real-time location is something that can be hard to fake, so it can be used to restrict access to an area or used to add protections based on where an asset sits, where a piece of data resides, or the origination point of a communication. Getting the technology right Developing an effective technology for indoor positioning requires several things. To begin with, location readings needs to be very precise, with accuracy down to as small an area as possible. The technology has to be secure, because location often needs to be kept private. The technology has to be reliable, even in harsh environments, and easily scalable, too, so it can address the thousands of people and assets in large venues. It has to be low power and affordable, so it can be embedded in everything from high-end, complex devices like smartphones to low-end, simple devices like asset tags. And, of course, the technology has to have latency low enough that it can track movement in real time. Various wireless technologies, including Bluetooth and Wi-Fi, are already used for indoor positioning, but they don’t deliver on the full set of requirements, especially in terms of accuracy. A different kind of wireless, called Ultra-Wideband (UWB) checks all the boxes. It has the potential to change the way we do all kinds of everyday tasks. What is UWB? UWB is based on the IEEE standard 802.15.4a/z, which has been optimized for micro-location and secure communication. UWB is highly accurate. It can pinpoint people and things to within just a few centimeters, making it 100 times more accurate than the current implementations of Bluetooth Low Energy (BLE) and Wi-Fi. UWB is reliable because it has high immunity to various types of interference, including multipath, which is when a wave from a transmitter traveling to a receiver by two or more paths causes interference. UWB also offers very low latency, with update rates of up to 1000 times per second and readings that are as much as 50 times faster than satellite navigation. UWB is also implemented using mainstream technology, so it’s both affordable and optimised for low power. Lastly, UWB leverages distance-bounding techniques defined by the IEEE to provide a level of security that makes it extremely difficult to hack. Ultra-Wideband (UWB) checks all the boxes How is all this possible? Physics! UWB out-performs other location technology because, unlike Bluetooth and Wi-Fi, which transmit narrowband signals and use Received Signal Strength Indicator (RSSI) to determine location, UWB transmits wideband signals (500 MHz) and uses Time-of-Flight to determine location. Already in 40+ verticals UWB is already bringing value to products and services in more than forty verticals covering the consumer, automotive, industrial, and commercial market segments. For example, it brings operational visibility to manufacturing and logistics, helps businesses protect workers, and reduces safety-management costs. UWB also lets robots and drones self-navigate, and enables secure, hands-free access to cars, front doors, and other secure locations. It even helps with contact tracing and social distancing in the fight against COVID-19. Now in smartphones Recent adoption in smartphones means UWB is ready to grow quickly. Developers are using UWB as part of new services, with an eye toward making various everyday activities more convenient and safer. With UWB as part of smartphone apps, purchases will be more secure, accessing your car will be possible without a key fob, and misplaced items won’t stay hidden for long. Retail outlets will use location for targeted marketing, and finding things on store shelves will be easier than ever. Home automation will become seamless, and friends and family will be easy to find even if they’re in a crowd. The question of interoperability Having UWB in smartphones is an important first step Having UWB in smartphones is an important first step toward making UWB an everyday part of life, but interoperability is another key factor, since smartphones have to interact with a wide range of other devices and services. That’s where the FiRa Consortium comes in. Launched just over a year ago, the FiRa Consortium is a member-driven organisation of market leaders from the consumer, mobile, industrial, enterprise, and semiconductor industries. FiRa members work collectively to define the future standards that will make interoperability across UWB products a reality. With FiRa making it possible for developers to use UWB in all kinds of new ways, the future of indoor location is really only limited by the developer’s imagination.
In recent years, multinational corporations such as Cathay Pacific, Facebook, Uber and numerous others have been heavily fined due to security and data protection violations. This period has seen data protection laws increase as more and more information is gathered and shared online. As such, it becomes crucial to account for security capabilities when choosing an embedded device that touches potentially sensitive data. RFID readers very much belong to the ecosystem wherein personal or user identification data is transmitted either to a host system such as a PC or to an endpoint such as a Human Machine Interface (HMI). A passive RFID transponder, soft credential such as a mobile phone app using BLE/NFC or smart cards and other contact-based credentials all can carry sensitive data or personal information. In the case of smart card or contact-based credentials, the storage of personal information such as name, address or date of birth is more prevalent compared to contactless credential where an identification number may be used. Security as a concept RFID media may directly lead to a compromise in your intended application’s security In general, security as a concept is always related to the entire system that includes RFID media (contact/contactless credentials), RFID reader, the host system and any database or cloud server. While accounting for security across a system is needed it is more important to consider the application or use case that is in question. One should carefully evaluate the consequences of any security breaches and if there is any sensitive information being exchanged from the RFID media to the host. As an example, the simple choice of RFID media may directly lead to a compromise in your intended application’s security. There are numerous references on security vulnerabilities related to Low Frequency (125KHz) contactless transponder types. The references focus on using interceptors to access unprotected static card information. The adversaries may then clone this credential that may be used for triggering action such as granting access to a facility or unlocking a computer. Some references also highlight vulnerabilities in the Wiegand interface about intercepting the data signals to capture card value. Therefore, some older RFID transponders and communication interfaces that may be based on the aforementioned technology or have been subject to vulnerability hacks are now considered fundamentally compromised. As mentioned previously, the overall security depends on every component of the system that includes the RFID reader. This article will mainly focus on some of the basic security considerations that need to be accounted for when choosing an RFID reader but also whether or not your application requires these abilities. Some of the key security considerations are as follows: Does your application require encryption capabilities? If so, does the reader have the capability to execute cryptographic algorithms? In every application where RFID technologies are involved, there is a need to first assess whether encryption is required and if so, determine the exact channel where this needs to be enforced. It could be that the host interface requires the exchange of encrypted data or the air interface needs to transfer protected data. Once the requirements are established, one may then evaluate the strength of this security. Furthermore, many types of contactless transponders can store data within their memory segments and encrypt or lock these segments with cryptographic keys. An apt card reader is one that can not only decrypt the memory segments and access the data but also provides an easy means for the end-user to carry out this operation. In many instances, the end-users have their own customised cryptographic keys for their credentials and are unwilling to share these keys with the card reader provider. Therefore, having the capability to load custom keys by someone other than the card reader manufacturer becomes essential. This can be facilitated in multiple ways, such as implementing high-level APIs and allowing the user to write applications for the card reader, or it could be enabling the customer with agraphical user interface to enter keys used to access data sectors. Many types of contactless transponders can store data within their memory segments Do you require encrypted data exchange? If so, where and can the card reader support this? In a typical scenario, the card reader behaves as a medium to facilitate data collection and transfer between the contactless or contact-based transponder and the host system. The host system can either be an endpoint that locally validates the credential presented to it or it can be a microcontroller that sends data over the network to the cloud or a database for validation and authentication. As mentioned previously, assessing whether the need for encryption is between the RFID media and the reader or from the reader to the host is important. If the former, the appropriate credentials are required. Depending on this factor you may then consider choosing an appropriate RFID reader. There are use cases wherein personal information such as name, address, date of birth or biometric data can be stored within the credential, eg: smart cards or passports as credentials. Therefore, encrypting the exchange of such data both between the credential and the reader as well as the reader and the host becomes critical. Moreover, encryption algorithm engines such as AES, DES, 3DES, or the capability to implement custom algorithms, need to be present on the card reader as this enables ease of integration. In cases where smartcards or contact-based credentials are used, the host system typically drives the communication in its entirety. So, the card reader must also have: Software capabilities such as Personal Computer Smart Card (PCSC) or Chip Card Interface Device (CCID) mode of communication. The availability of drivers to facilitate communication with the host also enables easy software integration. Hardware support for communication standards such as ISO7816 and the presence of Secure Access Modules(SAM) slots and other contact-based interfaces. Does your application require MUTUAL authentication with Secure Access Modules (SAM) and RFID media? If so, does the reader support This? A Secure Access Module is a type of smart card that follows a contact-based communication standard to interact with a card reader. These modules ensure the protection of security keys as well as facilitate cryptographic operations. Typically, SAMs are used to generate application keys based on a specific master key or to generate session keys. They also enable secure messaging between the RFID media, the reader and the host system. Many contactless credentials hold memory segments/applications that are encrypted with cryptographic keys. These keys are often stored in SAMs and supplied to card reader manufacturers. This not only ensures the security of the keys but adds a step in the authentication process. The card reader in this case should first perform authentication operations with the SAM and then carry out a series of cryptographic and bit manipulation operations between the contactless card and the SAM. This can be further secured by adding a key diversification step. The card reader must be able to support such a scenario both in the hardware as well as in the software. Many end-users require the card reader to natively support such a scenario and have the ability to provide high-level API’s to help in their implementation. In addition to this, high-security applications demand the transfer of data in an encrypted format. One can ensure end-to-end encryption/security with the help of SAMs. In such an architecture, the reader facilitates mutual authentication with the RFID media and the SAM, thus transferring protected data over a Radio-Link and also ensuring the security of encryption keys. The reader can also transfer data encrypted by the SAM to the host system maintaining a high level of security across the system. Appropriate precautions are to be put in place to improve the overall security Note that the safety of distributing SAMs as well as administering the installation process within the reader should be treated as a separate issue and tackled accordingly. There is also an issue of the readers being stolen or the SAM modules being dismounted from the reader. The security considerations here do not indulge in these topics and appropriate precautions are to be put in place to improve the overall security of the system. Does the card reader have communication interfaces other than Wiegand such as RS485 or RS232? The Wiegand card as well as the Wiegand interface for data transmission is a 40-year old technology that originates from the Wiegand effect discovered by John R. Wiegand in the early 1970s. While the Wiegand cards are still in production, they have been largely replaced by newer and cheaper forms of access cards. However, these cards are still based on the Wiegand data format that is susceptible to interception as the data are available in plain text. Also, the Wiegand interface introduced in the 1980s remains prevalent across the logical access as well as the physical access control industry despite various security vulnerabilities. This technology no longer conforms to the current security standards. It is therefore important for integrators to choose a communication interface that can offer higher security from interception and support encrypted data exchange. Do you require tamper detection technologies? If so, can the reader meet this requirement? The need for tamper detection largely varies from one application to another so it is more important to consider whether this level of security is suitable for your respective use case. As an example, card readers attached to multi-function printers (MFPs) for releasing print jobs in an enterprise environment can be considered less critical since tampering with the reader can ultimately lead to the downtime of the printers but will not compromise the safety of your documents. Typically, in such scenarios, the card reader works hand in hand with the MFP and a print management solution that ensures the release of print jobs. Therefore, if the card reader is sabotaged or tampered with, the MFP or the solution simply prevents the release of any information. On the other hand, high-security environments such as data centers certainly need greater protection. One must thoroughly evaluate the consequences of any attempts directed towards compromising the device integrity or the data associated with the device. These topics need to be considered separately and are outside the scope of this article. In conclusion, depending on the application, the credentials involved as well as the data that is being exchanged with the card reader and eventually the host, tamper detection technologies can improve the security of the device. There are several technologies in the market such as mechanical and optical tamper detectors that can be embedded directly on the card reader for superior protection against threats. Do you require the reader's ronfiguration or firmware to be securely shared or loaded on the card reader? If so, can the reader meet this requirement? We are all aware of system and application software updates as at some point our phones have received security patches or app upgrades over the network. In the case of card readers, the process is quite similar except here the software or configuration updates might require encryption based on your use case. For example, if an end customer is reading static card numbers from an RFID media or isn’t using data protected by encryption keys this does not require the firmware or the configuration to be encryption for a simple reason that these files do not carry any sensitive information. The need to encrypt configuration/firmware files arises if the data that is being read by the reader contains any personal information or is part of a proprietary corporate format that is confidential, or should a customer wish to move to a higher security credential encrypted with keys. This means that either their existing card readers or new card readers must have a configuration that holds these keys. Configuration or firmware must also be encrypted since it holds sensitive information In such a scenario, the configuration or firmware must also be encrypted since it holds sensitive information. If the configuration or the firmware is encrypted, the file will no longer pose a security risk and can be shared with customers to perform updates to the existing readers or with the card reader manufacturers to load new readers with the configuration of firmware updates. This not only secures the sharing process but also the update process since the reader is now receiving an already encrypted file. After all, it is essential to choose a card reader that can carry out the aforementioned security considerations but more importantly the security features that are chosen need to be appropriate to the requirement of the customer. Any integrator first and foremost should thoroughly evaluate the respective application. They should work with subject matter experts in the field and establish requirements and objectives. After developing the concept, system architecture, data flow as well as various secure channels, only then can one begin to account for the security features needed. This process not only helps cement the end system’s overall security view but also elucidates the exact security requirements that correspond to the resulting application. In conclusion, choosing an RFID product that not only has the above security features but also has a flexible system design capable of accommodating future adaptions will prove to be the right choice for OEM’s and system integrators.
The security industry knows the value of recurring revenue, as it’s the foundation of the residential security monitoring market. Commercial systems integrators have traditionally taken a different approach, focused on one-time commodity-based sales that lack the financial benefits provided through long-term serviced-based agreements. Cash flow is one of the biggest challenges faced by security systems integrators. And the truth is, during economic uncertainty, businesses will find that companies that have adopted and implemented a sales model that incorporates a monthly-based service program will be more financially secure. Technology solutions TAMCO was founded in 1994 by Jack Thompson who had a unique background that included technology integration, finance, and sales. With this knowledge, he set out to build a company that would introduce a finance offering and business model that addressed the pitfalls within cash and traditional lease procurement methods. The design of this finance offering was under the premise that most technology solutions are non-revenue generating assets. Most technology solutions are non-revenue generating assets The goal was to give the end-user customer a better way to pay with more control and flexibility as they entered in and out of technology lifecycles. At the same time, this new offering would give integrators easier ways to sell services with those technologies while shortening the selling cycle. With changes in telecommunication solutions several years ago, we noticed typical voice integrator partners attempting to diversify their technology solution offerings. We explored providing payment options for these additional technologies and found several areas with significant interest in our approach. About two years ago we saw increasing interest from within the security industry and this is now one of our top growth sectors today. Being in control Historically integrators have done a great job of getting customers accustomed to cash purchase transactions. While owning technology solutions may have felt like a way to be in control, customers have begun to realize that ownership is really not a necessity. It is the use of the technology and what they can do with the use of the technology that is truly meaningful. Now add to that the fact that technology continues to change more quickly than ever and I think it makes sense that customers are looking for better ways to pay for and manage their technology needs. Integrators have begun to express an overwhelming interest in creating recurring revenue At the same time, integrators have begun to express an overwhelming interest in creating recurring revenue. They are looking for ways to complement their one-time project-based revenue business or shift to a model that is focused on a regular stream of revenue. However, many integrators are not sure how to implement this new approach. As-a-service is just another way of saying a subscription service. At the consumer level, we are all very familiar with subscription services, such as Netflix or Birchbox. Small to medium-size businesses and enterprise-level commercial customers are also familiar with equivalent type technology services from their hosted phone service subscriptions or software-as-a-service (SaaS) solutions. As-a-service security If an integrator can package their technology solution in the form of an as-a-service solution, they will have a much better chance of developing recurring revenue. A majority of as-a-service models involve the customer paying for hardware equipment upfront and then having a monthly payment only for monitoring or support services. Or, to avoid a large upfront capital outlay, the integrator may arrange for a traditional lease payment that gives the illusion of as-a-service but still results in the customer owning dated equipment at the end of the term. TAMCO takes a different approach because we help integrators create a very comprehensive and logical solution under a single, use-based monthly payment. The integrator still designs, configures, and recommends the technology solution appropriate for the customer. But TAMCO will take the cash sale price of hardware, software, installation, manufacturer warranty, multi-year maintenance and support, and convert all of that to a single all-inclusive monthly payment which the integrator can present to their customer. In addition, this as-a-service monthly payment also provides the customer with exclusive protection against technology obsolescence. Integrators have really been excited to learn of this approach and to convert to selling this way. Integrators can remove themselves from being a commodity sale and thereby maintain margins Integrators can remove themselves from being a commodity sale and thereby maintain margins. They become much more successful at selling multi-year maintenance and support agreements, thereby building recurring revenue which is valuable to help weather slow periods of sales activities and economic downturns. And following the market currents of subscription-based solutions helps create long term customer relationships. Whether an organisation works with TAMCO or not, there are certain foundational elements they need to embrace in order to build and adopt a successful as-a-service sales model. Some form of payment alternative like we discussed is certainly one of those elements, but it is not necessarily the most important. The technical expertise to deliver on support has to be there for the customer. While sales training, mindset shift, and supporting marketing materials are all critical as well.
Honeywell Commercial Security is among the companies working to develop security systems that are more proactive than reactive. “Our biggest opportunity moving forward is the ability to have security solutions that do a better job of detecting and predicting threats,” says Tim Baker, Global Marketing Director, Honeywell Commercial Security. Greater use of analytics and intelligence can reduce human error and simplify processes by providing a more unified view for greater situational awareness. Artificial intelligence and deep learning “We’re reaching a maturity level in terms of algorithms and hardware to drive new capabilities in a cost-effective way,” he says. Baker sees a continuing interest in artificial intelligence (AI) and deep learning in the physical security market, used in video analytics and also for intrusion and access control. "We have challenged ourselves to move from reactive solutions to develop a set of proactive solutions that determine potential security threats before they happen,” he says. An overarching theme is the need to focus operator attention on “what matters” rather than requiring operators to keep track of the growing number of sensors in newer systems. A remaining hurdle is to streamline the deployment of analytics systems, which can require expensive customisation during the commissioning phase. Credential-enabled access control reader The reader can support any card format and also enables “frictionless” access control That’s where Honeywell is investing and focusing its attention, seeking when possible to “pre-teach” algorithms based on data gleaned from a large installed base. Fortunately, there will be plenty of data from a growing variety of sites to build from. Honeywell offers a full ecosystem built around enterprise security needs and a second ecosystem built around the needs of small- and medium-sized businesses (SMBs). In the enterprise space, the trend is toward smarter edge devices, such as Honeywell’s OmniAssure Touch, a mobile credential-enabled access control reader. The reader can support any card format and also enables “frictionless” access control. A user can gain access by touching the reader, with no need to take his or her smart phone (which has the credential) out of their pocket. The reader is fully backwards compatible, which is a Honeywell hallmark. Honeywell’s OmniAssure Touch can support any card format and also enables “frictionless” access control. Designed to be cloud-enabled On the enterprise software side, Honeywell has invested in further development of their Pro-Watch access control system and MAXPRO VMS (video management system), tying them together into a single security console, along with intrusion and other systems such as human resources (HR) data. For the SMB market, Honeywell is building and expanding their MAXPRO Cloud system. As existing hardware has evolved to be cloud-enabled, the company has also been introducing new control products that are designed from the ground up to be cloud-enabled. Honeywell’s biggest vertical markets include banking, healthcare, gaming, energy infrastructure and airports The new MAXPRO Intrusion system, which can be configured over the cloud, will be introduced in the first quarter. MAXPRO Access, to be introduced in late November, can be deployed using an embedded web interface, a cloud interface, or as an on-premise solution. On the NVR side, an embedded NVR works alongside Honeywell’s new 30 Series video cameras, providing secure and encrypted end-to-end connection. Networked security system A challenge for Honeywell is to keep up with broader trends happening in the industry, whether geopolitical (e.g., relations between China and the United States) or regulatory such as General Data Protection Regulation (GDPR). Baker acknowledges an industry-wide increase in awareness about cyber security, driven largely by the enterprise market. IT departments are getting more involved in the purchasing decision; indeed, the chief information officer (CIO) is often the ultimate decision-maker. In response, Honeywell is emphasising “cyber security by design” from the beginning to the end of a project. Also, they are using white-hat hackers to test products before they are released into a live environment. “We are doing everything we can to make sure products are cyber secure,” says Baker. Honeywell’s biggest vertical markets include banking, pharmaceutical, healthcare, gaming, energy infrastructure and airports. NDAA-compliant video cameras Compliance is a common thread throughout the verticals. Honeywell sells to the government mostly in the access control and intrusion space and built around their Vindicator networked security system. (They also introduced the line of NDAA-compliant video cameras, made in Taiwan, at the recent GSX show.)
Unmanned aerial vehicles (UAVs), or drones, present a range of threats, from the careless and clueless to the criminal. While many incidents may seem harmless, the threat to any location at any time depends on a range of factors. Drones are inexpensive for criminals to buy or make, and there are continuously improving battery, airspeed, and payload capabilities. UAVs can also fly without an RF signal to jam or hack. Fortunately, sensor technologies including radar are available for security agencies and personnel to protect assets and the public. Radio-wave signals Radar works as a deterrent by sending out a radio-wave signal using a transmitter antenna, and a small portion of that signal reflects off objects in its path and returns to a receiver antenna. The highest performing radars use an antenna technology called Active Electronically Scanning Array (AESA), which enables all-electronic reconfiguration of the antennas. When an AESA radar detects an object, it can ‘focus’ its antennas to track the object, in much the same way as the zoom on a camera does. Multiple objects can be tracked while continuing to scan. Kirkland, Washington-based Echodyne offers a radar product that brings these ESA capabilities to non-military security applications at commercial price points. Combining proprietary hardware with intelligent software, Echodyne produces a compact, solid-state, electronically scanning array Echodyne’s ESA radar Echodyne says they are reinventing radar price-performance for security applications in the ground (people, vehicles) or air (counter-UAS) domains. Combining proprietary hardware with intelligent software, Echodyne produces a compact, solid-state, electronically scanning array (ESA) radar that is affordable for commercial, law enforcement, and governmental customers. The company is backed by high profile investors, including Bill Gates, Madrona Venture Group, Vulcan Capital, NEA, and Lux Capital. “Radar is a sensor,” says Leo McCloskey, Echodyne VP Marketing. “It is most applicable when security professionals can both understand its capabilities and define risk assessment and deployment requirements that call for those capabilities. Our customers are primarily security system integrators and consultancies, which integrate the performance of radar into a sensor array that meets mission requirements.” Radar technology for border surveillance Echodyne was selected by the Science and Technology Directorate of the Department of Homeland Security (DHS) for its Silicon Valley Innovation Program (SVIP) to demonstrate the performance of its radar technology for border surveillance applications. The radar was deployed both in fixed remote surveillance towers and as a lightweight rapid deployment kit for field agents. Able to surveil ground and air domains, the radar combines versatility and commercial price with surveillance capabilities. “We set out to build the world’s best compact, solid-state ESA radar sensor, and we are demonstrating that we’ve reached that objective,” says McCloskey. “We’re excited to introduce these capabilities for other security applications.” Able to surveil ground and air domains, the radar combines versatility and commercial price with surveillance capabilities MESA technology Echodyne’s proprietary technology provides a small true electronically scanning array (ESA) radar. Unlike expensive Active ESA (AESA) phased array radars, MESA requires no physical phase shifters, thus reducing the cost, size, weight, and power by several orders of magnitude while maintaining all the benefits of fast ESA radar. Echodyne combines its MESA technology with an intelligent software suite, Acuity, to produce a configurable, software-defined radar for commercial, law enforcement, and governmental security applications. The capability is also useful for temporary events such as rallies and marathons, and many other market applications “Technology seems to make everything more available to more people over time,” says McCloskey. “What is a retail product today will be a purchased self-assembly kit tomorrow and an improvised self-made drone the following day. The Federal Aviation Administration (FAA) is diligently at work on creating rules for safe UAV operation, though any final rules remain some distance off. As drone volumes increase, delineating friend from foe in the airspace requires clear legal and regulatory frameworks, which are nascent but would help distinguish the threat of nuisance flyers from illegal overflight.” Radar sensor for security applications “Detecting and tracking airspace objects of interest is imperative for airports, chemical plants, oil and gas installations, refineries, water and energy utilities, stadiums and other public spaces”, says McCloskey. The capability is also useful for temporary events such as rallies and marathons, and many other market applications. “As with any product, our applicability will depend on variables like location, terrain, risk assessment, and existing security technologies,” says McCloskey. “Our mission is to deliver the very best radar sensor for security applications.”
There are many new technologies at ISC West this year. There are also some tried-and-true solutions on display. More mature products have the benefit of being fully vetted and battle-tested, which may make them a more comfortable choice for security customers. I had a couple of discussions on Day 2 of the show about the advantages, and possible drawbacks, of new products. “To a security director, when you say ‘new,’ he translates that into ‘risk,’” says Bill Spence, VP of Sales, U.S., Canada and Western Europe for HID Global’s Lumidigm biometrics brand. “Anytime you say new, there is a probability of risk. The key is to educate. Education quantifies risk, and an educated customer can make an intelligent decision about risk versus reward.” “We have to take customers from where they are to help them understand new technologies,” says Spence. “We must give them a bridge to that understanding, and education is the bridge.” Lumidigm biometrics integrations An app provides graphics that take installers step-by-step through the installation process HID Global is incorporating Lumidigm biometrics into the new iClass SE RB25F fingerprint reader being highlighted at the show. Two-factor authentication can use either a card or mobile credential along with biometrics; there is no latency; and templates can be stored on a card. Another new offering at the HID Global booth is an augmented reality tool to simplify installation of newer systems that incorporate the more secure OSDP protocol. An app provides graphics that take installers step-by-step through the installation process. Also highlighted at the HID Global booth — and at the booths of turnstile manufacturers throughout the show — are embedded readers that provide tested and certified mobile access control for turnstiles. IClass SE technology is embedded in the iRox-T Turnstile Reader from Essex Electronics. Innovative security technologies There’s a delicate balance at any trade show between creating excitement about new products and educating customers to be comfortable with new technologies. There is some of both at ISC West 2019. In the future, hardware will be a delivery device, not the core of systems “We are on the cusp of change in the industry, and it’s closer than ever,” says Jennifer Doctor, Johnson Controls’ Senior Director, Project Management - Intrusion. “We will see the impact of promised technologies that will come from other industries, such as artificial intelligence. The very definition of security is changing. We are an industry that needs to be risk-averse, and we need to prove out the technology. There is innovation, but we just need to make sure technologies are what the market wants and expects.” “In the future, hardware will be a delivery device, not the core of systems, which will come from intelligence in the software and from services,” she adds. “The products we deliver will enable that.” Have 30 percent of service companies in the U.S. security market jumped into the cloud? PowerSeries Pro intrusion portfolio Johnson Controls is highlighting the commercial PowerSeries Pro intrusion portfolio, which features PowerG encrypted technology that enables wireless systems that are cyber-secure. The cloud is coming on strong, and one company finding success in cloud systems is Eagle Eye Networks, which has seen 93% compounded annual growth over the past three years. Economies of scale have enabled them to lower subscription prices by 35%, with an extra 10% decrease for customers that pay annually. Ken Francis, President of Eagle Eye Networks, says they are signing up 50 new dealers a month for the cloud video offering. Francis estimates that 30 percent of service companies in the U.S. security market have jumped into the cloud “It’s really heating up,” says Francis. “The general cloud is driving increases in the surveillance cloud.” Jumping to cloud Embracing the cloud and recurring monthly revenue (RMR) requires that dealers transform their businesses to ensure success. Francis says dealers should dedicate sales resources to cloud offerings rather than expect everyone to sell the cloud, and there should be a base commission plan on RMR services in lieu of upfront project fees. March Networks is also showing integration of video with the Shopify cloud-based point-of-sale (POS) system “Talk to professionals about your cash flow and understand how to capitalise on financing partners to ensure cash flow while investing in the RMR stream,” he adds. “And look for ways to reduce your costs to serve the customer base as your RMR increases.” For example, use of remote site diagnostics, configuration and support can avoid the need for expensive “truck rolls” that can undermine profitability. Francis estimates that 30 percent of service companies in the U.S. security market have jumped into the cloud. Alarm companies, which are accustomed to the RMR model, are generally ahead of the curve, while traditional security integrators are lagging. “It’s a requirement to change or die,” he notes. Insight hosted managed service Also, in the area of managed services, March Networks is highlighting its Insight hosted managed service that can provide instant information on video systems located at remote sites, including visibility into firmware versions, camera warranty information, and cybersecurity status of systems. The ability to dive deeply into system status empowers a new recurring revenue stream for integrators. Color-coded icons summarise system status and show pending issues and clicking on the icons provides detailed workflow information. The system can also be offered for smaller systems such as those at convenience stores and quick-serve restaurants. March Networks is also showing integration of video with the Shopify cloud-based point-of-sale (POS) system. The integration enables managers to evaluate POS information, especially anomalies, to determine possible employee theft and other shrinkage issues.
Hanwha Techwin America, a global supplier of IP and analogue video surveillance solutions, has announced that Olymbec, globally renowned privately owned industrial real estate holder on the US East Coast and Canada, has chosen Hanwha cameras to help secure its properties and improve rentability. Managing upwards of 300 properties in Quebec, Canada and 15 different states in the US, Olymbec owns more than 30 million square feet of property. Managing this much real estate means that Olymbec has to balance a variety of concerns, including providing positive tenant experiences, generating revenue, and protecting assets. Countering growing cases of theft and vandalism Olymbec’s existing analog-based camera systems were not meeting the company’s needs When it comes to security, the company is faced with everything from accidental damage and theft to vandalism and refuse dumping both inside and outside their buildings. However, Olymbec’s existing analog-based camera systems were not meeting the company’s needs. After looking at a number of different options, the company chose Hanwha Techwin because of the range of products, the modularity of the solutions the excellent training and customer support, and the cost, which allows Olymbec to add components easily. Hanwha Techwin cameras deployed Olymbec has deployed over 700 operational cameras and carries stock for both replacement purposes and new systems. The deployed cameras are connected to either a Wisenet WAVE VMS system in their larger installations or to NVRs in their smaller installations. Through their VPN, everyone at Olymbec, from the Chief Technology Officer (CTO) to security personnel and property managers, can access video footage from every security camera remotely from their smartphones and tablets. Remote video footage access This allows security administrators to view footage from anywhere, at any time and gives them the flexibility to react quickly and appropriately, when an incident occurs. Hanwha cameras have the capability to trigger alerts and alert security personnel, based on a variety of rules such as detecting motion after hours. Olymbec has spent approximately three-fourth of a million dollars on equipment from Hanwha Techwin to deploy its new security infrastructure. The result is a robust, homogenous environment that makes it easy to manage and add new camera systems to the company’s various properties. Multi-sensor, multi-directional cameras installed Hanwha Techwin cameras are used as deterrent or after-the-fact security devices for investigative purposes The Hanwha Techwin cameras are used as deterrent or after-the-fact security devices for investigative purposes. This means that Olymbec relies heavily on the quality of the video feed. To capture the best possible video, Olymbec decided to go with multi-sensor, multi-directional cameras, which are deployed across the company’s properties allowing them to cover a very wide area with just a single device. The multi-sensor cameras also work very well when the time comes to pull the video footage for investigation. This is especially helpful because Olymbec’s security department receives video requests from law enforcement at least 4-5 times a month. Reliable and flexible video security system “Using our new security system, we are able to ensure the integrity of our video evidence. This is important when local law enforcement asks us for footage to help with an investigation,” said Jack Ross, Chief Technology Officer (CTO) at Olymbec USA & Canada. The company, Olymbec has stated that they remain enthusiastic about their decision to install more number of Hanwha Techwin cameras across their various properties in the US and Canada. “It was important for us to choose a platform that is both complex enough to meet our needs and reliable enough to set up and simply let run. When it comes to reliability, as well as flexibility and ease-of-use, I think Hanwha Techwin really shines,” concludes Jack Ross.
Car theft is a huge risk for car sales offices, and this is especially an issue for the premium brands. Luxury car giant Eden Auto Premium BMW built a new site in Bordeaux, France, where they house and sell new and second-hand cars, as well as having a car park for customers. That amounts to a lot of cars that need protecting. They researched and compared different technologies and selected Hikvision products to meet their needs. These were then ably installed by reseller Faurie Telecom (Group Convergence), with Hikvision’s help, and the help of French distributor ITESA. The BMW reseller wanted a standalone system to streamline their security operation. Originally they used a night security agent, which was a costly solution. They needed to be able to integrate the security solution into a third party monitoring system, managed by Securitas, in order to reduce manpower costs. Perimeter protection systems The site posed a number of technical challenges. The team also needed to counter some crafty thinking from intruders, who were even resorting to hiding underneath cars during the day, when they can slip in unnoticed. They then could wander around the closed garage, avoiding detection by perimeter protection systems activated only at night. This meant the solution needed to focus on providing real-time, active image at night. With a lot of flags flying on the site, false alarms were a particular issue - these would set them off regularly With a lot of flags flying on the site, false alarms were a particular issue - these would set them off regularly. The complexity of the site also gave a lot of potential for false alarms, which needed to be minimised to reduce overall costs. The solution was made up from Hikvision products, providing a converged system, with seamless monitoring. Central to the system was Hikvision’s Security Radar (DS-PR1-60) for intrusion detection at night. Speed dome PTZ camera The Radar has a large coverage area, and performs excellently at night, whatever the weather. This means that false alarms are kept to a minimum. Radar has the added benefit that it can position humans and vehicles on a map, making it very useful for tracking purposes. This is where the DarkFighter IR Network Speed Dome PTZ camera (DS-2DF8225IX-AEL) comes in. The radar cameras are linked with this for auto tracking. If an event is detected, the control center automatically receives an alarm and can use the PTZ’s auto-tracking function to track any intruders. DarkFighter cameras are also designed to excel at night, so are ideal for this solution. Although radar has promising accuracy rates, the team needed to carefully configure it. The site environment proved a complex installation, with a lot of metal that can cause false alarms for the radar. Seamless security solution We were very satisfied with the innovative products and onsite service provided by the Hikvision team" The local team drafted in expertise from Hikvision HQ’s R&D and technical teams to complete the installation to a high quality and low false alarm rate. The system is coordinated using a AcuSensecamera (DS-2CD2686G2-IZS AcuSense 4K NVR (DS-7716NXI-I4) and a POE Switch (DS-3E0510P-E). Finally, HikCentral provides a user-friendly VMS experience, designed especially to integrate all the different Hikvision products, to make a seamless security solution. Christophe Chamand, from Faurie Telecom, says: “We were very satisfied with the innovative products and onsite service provided by the Hikvision team. From presales and order to technical support and aftersales service, Hikvision has been with us throughout the process, ensuring a successful installation and a happy customer.” With an innovative, converged security solution, BMW has been able to streamline its security, even at night. So intruders sneaking in and hiding during the day are out of luck.
The Headquarters Business Park developed by Adeem Al-Watania is a 52 storey office building located on the coast site of Jeddah, Saudi Arabia. When completed in 2012, it became the tallest building in Jeddah and is served by a large 11-storey parking garage. Nedap’s Long-Range Identification solutions provide seamless vehicle access to employees and long-term tenants. The devices were successful installed and integrated with Lenel access control system OnGuard by Idex Services. The Headquarters Business Park Tower This tallest skyscraper, towering above Jeddah’s North Corniche and with a unique “Sail of a dhow” design, is an iconic structure in the commercial hub of Saudi Arabia. The iconic business park consists of offices, clinics, restaurants, entertainment facilities and a luxurious hotel. It has three main sections, the West tower housing 52 floors, East tower housing a luxurious hotel with 16 floors and a mid-section with 11 storey parking facility comprising of 2.000 parking spots which connects the West and East towers. Need for hands-free vehicle access With the exemplary design of the tower, there was a need for an all-in-one innovative vehicle and driver access control solution which can provide seamless integration with best performance which is in line with the state-of-art services to tenants in one of the most sophisticated buildings in Jeddah. Multiple entry and exit points to the vehicle parking facility had to be provided with an automated system, for convenient, hands-free access to authorised vehicles of office employees and long-term tenants. An efficient solution was identified, with a combination of Automatic Number Plate Recognition and Long-Range RFID (Radiofrequency Identification for Automatic Vehicle Identification). Touchless vehicle access to employees Nedap’s uPASS Reach, based on passive UHF technology read-range up to 5 metres in combination with UHF Windshield tags Nedap’s uPASS Reach, based on passive UHF technology read-range up to 5 metres in combination with UHF Windshield tags is used to provide convenient vehicle access to employees. UHF Tags, which are thin, flexible, tamper resistant and maintenance free are assigned to vehicles of employees who work in the 256 office units. When the registered vehicle with UHF tag installed approaches the long-range UHF RFID reader installed near the barrier, the vehicle is automatically identified and access is granted for authorised vehicles to the parking facility. Parking access to tenants based on LPR The iconic tower with sea-view includes a luxurious hotel and it is observed that tenants stay for a longer duration or prefer coming back on regular basis. To provide a seamless experience to tenants and ensure smooth flow of vehicles and drivers into the parking facility, there was a need for a solution which could grant tenant vehicles access temporarily or incidentally. Nedap’s ANPR series – Licence plate recognition camera with an accurate read-range at several metres – ensures tenant number plates are registered and required access rights can be easily granted in the backend application. Securing the 11 floor parking facility With the parking facility being the main entry point to both the West and East tower, it was very necessary to meet high-security standards and control the flow of vehicles. The proposed solution required to have seamless integration with the existing Lenel access control system OnGuard. The open architecture of Lenel and Nedap supporting variety of industry-standard communication interfaces, enabled seamless integration and successful implementation of the products by Idex services. Customised reports with the required log were easily accessible after the successful integration.
Union Wharf is a community of 249 apartments to rent, based on the banks of Deptford Creek in Greenwich. Completed in September 2019, it comprises two towers. The first is a 23-storey tower designed for a varied community of renters. The second is a smaller 12-storey tower that’s intended specifically for families. Across both buildings all residents benefit from free access to a variety of shared spaces as well as services such as a 24-hour on-site residents’ team. Essential Living was also keen to ensure the development encouraged a sustainable lifestyle, with features including bicycle storage facilities, gym, green areas and a roof terrace. Working with Comelit from initial specification, for each stylish apartment on site, a combination bespoke door entry and energy monitoring system was created, using its Icona Manager IP solution for each apartment. Reducing carbon footprint We have worked with Comelit on a number of developments and know them to be capable of fulfilling our mission" Says Juey Thanyakittikul, Senior Project Manager of Essential Living: “From the outset, sustainability, reducing carbon footprint and stylish living has been the foundation of our vision for Union Wharf. And with a focus on the rented community, we wanted to continue these key features right into the finishing details for all our residents to benefit. We have worked with Comelit on a number of developments and know them to be capable of fulfilling our mission when it comes to customised door entry." "The advantage of presenting smart credentials, including resident’s ability to answer video calls from a mobile or tablet, only adds to the premium lifestyle on offer.” Fire and security system Richard Slee, Managing Director at Security Systems Design Limited, which completed the installation as part of the overall fire and security system works for Gloster MEP Limited added: “The integration of energy monitoring and door entry in Comelit’s stylish one Icona Manager IP receiver, presents as one multifunctional solution that sits on the building’s CAT6 structured wiring and LAN system, removing the need for separate cabling." "The slim line white Icona Manager finish adds to the aesthetics of each apartment, and reduces the number of control devices for residents, all without compromising on the smart technology enabled. For residents, it ultimately means door entry can be answered from the external systems, with video in their own home, or even via a mobile phone or tablet from wherever they are.” Combined energy monitoring This trend is only likely to rise as we become more dependent on our homes for work and personal requirements" Comelit’s ViP system includes Comelit’s colour Icona Manager Monitors fitted in each apartment, presenting the opportunity for video and audio communication with visitors at ground level, as well as two-way audio communication with the on-site residents’ team. The combined energy monitoring provides instant information and feedback for residents, to encourage more sustainable living. Dan Wood, Southern Sales Manager at Comelit UK concludes: “Whilst the Code for Sustainable Homes is no longer mandatory, demand for more sustainable living is growing among consumers. This trend is only likely to rise as we become more dependent on our homes for work and personal requirements. Working closely with Essential Living right from the initial design phase of Union Wharf, enabled us to create a bespoke tailored solution using our stylish Icona Manager Monitors." Targeted renters market "The flexible nature of the systems presents ideally for the targeted renters market, which continues to put in a strong performance despite challenges in other parts of the property market. Developments such as this, only goes to support how the perception of the Build to Rent sector is changing for the better. We are already working on the next scheme for Essential Living due for installation in 2021.”
Located 40 kilometres outside the Russian capital, the new Mercedes-Benz passenger car factory is a showcase for Industry 4.0 automotive manufacturing. To ensure the safety of more than 1,000 employees at the massive facility, Bosch provided a fire alarm and security system, replete with voice evacuation capabilities to meet the specific safety needs of modern-day car factories. Future of car manufacturing Walking into the main manufacturing hall of the new Mercedes-Benz Cars plant in the Moscow region is to see the future of automotive production. Amid glass walls and high ceilings, robots and humans work side-by side to assemble the company’s most popular limousines for the Russian market. From chassis welding to windshield installation to painting, the plant combines all production steps in the same building as part of a ‘one-roof concept’. But from a fire safety perspective, the ‘one-roof concept’ with its tall factory ceilings and open floorplan poses challenges. The reason: Conventional, point-type fire detectors exceed their performance limit when it comes to detecting smoke particles inside such a vast, air-conditioned space. Working closely with the client, experts of Ateksis, the system integrator who lead this project, realised that early fire detection would take a solution just as innovative as the futuristic car factory itself. Safety for automotive factories They can detect fires in the beginning stages (called the “smoldering” phase) even before visible smoke is released Additionally, Mercedes-Benz required a centrally controlled combination of intrusion alarm and video security to guard the entire perimeter of the 85-hectare facility with its total of seven buildings. And could the solution be ready within a few weeks for the plant’s grand opening featuring international dignitaries? Working on a tight timeline, the team of Bosch and Ateksis experts selected a fitting smoke detection technology: aspirating smoke detectors. Perfectly suited for large warehouses, the detection units are located within a pipe system that constantly ‘inhales’ samples of air, which are checked for smoke particles via intelligent signal processing technology. As a result, the light-based detectors achieve smoke sensitivities as precise as 0.05%. They can detect fires in the beginning stages (called the “smoldering” phase) even before visible smoke is released. Electrical interference for reliability Aspirating detectors also pinpoint the exact location of fires, thus reliably preventing major damage in most cases. The system also suppresses environmental factors that typically cause false alarms in car factories, including dust, flying sparks and electrical interference for maximum reliability. “The Mercedes-Benz project is an important reference for us. It shows the level of integration and customer focus made possible by Bosch solutions. Our system has succeeded in meeting the specific needs of automobile manufacturers in the next generation of car production facilities”, said Ivan Konukhin, Bosch Security and Safety Systems Russia. Audio sound quality The ceiling loudspeakers are equipped with a metal fire dome to adapt to the in-air handling spaces Amid the acoustic conditions inside the vast production plant, a total of 650 horn and ceiling loudspeakers from Bosch deliver sufficient volume and intelligibility. The horn speakers offer a wide opening angle to broadcast sound across factory floors while offering protection from water and dust, as well as the corrosive effects of industrial environments. What’s more, the ceiling loudspeakers are equipped with a metal fire dome to adapt to the in-air handling spaces of the automotive plant. The cabinet loudspeakers are certified according to the fire evacuation EN54-24 standard for reliable performance under emergency conditions. Overall, this level of audio sound quality directly serves to keep workers secure and informed, especially if evacuation becomes necessary. Automatic fire detectors In the bigger picture, the total of 248 aspirating detectors inside the main production hall are centrally networked via Modular Fire Panels 5000 series and connected to more than 2,500 automatic fire detectors installed throughout six additional administrative buildings on the premises. For maximum employee safety, clear voice and audio alarm is provided by the PRAESIDEO Digital Public Address and Voice Alarm System. With Smart Safety Link, the interfaced fire and voice alarm system offers a full control in case of emergency, including the customisation of the fire verification time and the automatic process that can ensure a safe phased evacuation. To ensure full visibility of the premises and around-the-clock safety, the video security solution consists of 112 high-definition cameras from Bosch. While bullet and moving cameras secure the perimeter, dome cameras monitor inside spaces. Video management system Integrated on the Bosch Video Management System, all cameras can be controlled by the on-site security team Integrated on the Bosch Video Management System (BVMS), all cameras can be controlled centrally by the on-site security team inside the control room. Bringing security full-circle, the video system has a direct interface with intrusion alarm system containing over 200 detectors. This seamless integration of all solutions on the Building Integration System (BIS) from Bosch enables a host of additional functions: for instance, the system alerts the control room when a fire detector is triggered and sends live images from the nearest camera for full situational awareness. Aspiration smoke detector As Ivan Konukhin at the Regional Representative Center North-West and South Russia at Bosch Security Systems explains: “The cooperative functionalities between BIS and BVMS components were programmed according to customer requirements in an uncomplicated manner via macros, which also supported a timely installation.” Bosch Security System’s solution consists of: FPA-5000 Modular Fire Panel Solution Smart Safety Link Licence key for voice alarm Aspiration smoke detector 2 pipe systems AVENAR detector 4000 PRAESIDEO Digital Public Address and Voice Alarm System Metal Fire Dome Cabinet loudspeaker, metal, rectangular Horn loudspeaker, 10W, 6x10" Ceiling loudspeaker, 6W, ABS MAP 5000 family IP4000i, 5000i and 6000 cameras AUTODOME IP Cameras Access Control System Bosch Video Management System Building Integration System
When Swinkels Family Brewers wanted to unify its access control internationally, it chose Nedap Security Management’s AEOS access control system, which enabled this producer of world-famous Bavaria beer to design a system around the people using it. AEOS access control system The facts & figures - 6 breweries 27 brands 130 countries 1,800+ employees Increase security, yet maintain openness Swinkels Family Brewers wanted a system that would match its people-first approach Swinkels Family Brewers had grown quickly and needed to review its security and apply more stringent measures. It was using two access control systems and wanted to unite everything on one platform. Most importantly, Swinkels Family Brewers wanted a system that would match its people-first approach, and provide the flexibility to adapt and scale in the future. First people, then technology Initially, Swinkels Family Brewers established a cross-department project group, which developed a new security policy. With that in place, the project group identified AEOS as the system to meet its long and growing list of requirements. During the planning stages, they consulted department managers on their needs. And before AEOS was implemented they ensured their people knew what to expect and why the change was happening. Key benefits: The system is designed around the people using it. Security is stronger but there’s a welcoming sense of warmth and openness. One unified system fulfils all access control needs. Several systems are linked to AEOS and updates transfer automatically. Flexibility to easily add new functionality, such as video monitoring, or scale the system. Scalable, robust access control solution Stefan Fehlhaber, Facility Manager at Swinkels stated, “We’re very impressed with the scalability, stability and robustness of AEOS. It’s very practical to use in daily life and is easy for our security people to operate. It’s also very convenient for our employees to be able to use one badge at different locations.”
Round table discussion
Should security spending be a one-time capital expense or as an ongoing operating expense? At first glance, the question appears to be an accounting issue with little impact on the actual equipment or systems involved. However, as security professionals seek to cost-justify new systems, the question may be central to providing the “best security for the money” and a system that fits the company’s continuing needs. We asked this week’s Expert Panel Roundtable: Should security be a capital expense (CAPEX) or an operating expense (OPEX)? Is the trend shifting and what is the impact?
Traditionally, security industry professionals have often come from backgrounds in law enforcement or the military. However, the industry is changing, and today’s security professionals can benefit from a variety of backgrounds and educational disciplines. The industry’s emphasis on technology solutions suggests a need for more students of computer science, engineering and other technology fields. The closer integration of security with related disciplines within the enterprise suggests a need to prepare through a broad array of educational pursuits. We asked this week’s Expert Panel Roundtable: What is the role of higher education to create the next generation of physical security leaders?
Serving customer needs is the goal of most commerce in the physical security market. Understanding those needs requires communication and nuance, and there are sometimes surprises along the way. But in every surprising revelation – and in every customer interaction – there is opportunity to learn something valuable that can help to serve the next customer’s needs more effectively. We asked this week’s Expert Panel Roundtable: what was the best lesson you ever learned from a security end user customer?