ASSA ABLOY Group brands Corbin Russwin and SARGENT released a new status indicator for, respectively, the ML2000 Series and 8200 Series mortice locks. Featuring the largest viewing window available on the market, a reflective coating for improved clarity in low light conditions and a patent-pending curved design, these mortice lock status indicators combine emergency preparedness and enhanced privacy to meet the needs of any type of facility. “Schools, offices and all types of commercial...
Traka is the key management solution of choice for leading multi-sector business protection management company, Guarding UK, ensuring compliant key holding services and integrated audit control capability. Guarding UK manages nearly 1,500 sites across the UK, protecting in the region of £40bn worth of assets at commercial, corporate and residential sites across industry sectors including central London premier sites, retailers, property owners and management agents, together with airports...
Crossword Cybersecurity Plc the technology commercialisation company focused solely on cyber security and risk, is pleased to announce that it has signed a Memorandum of Understanding (MoU) with Leonardo MW Ltd, a global high-tech Aerospace Defence and Security company. Crossword is rapidly becoming a pioneer player in the provision of risk assurance systems. Rizikon Assurance allows organisations to assess, assure, visualise and, ultimately, control third party risk. Risk assessment and manag...
Helping retailers to improve store planning and the flow of footfall, Checkpoint Systems, globally renowned provider of shopper security solutions, has launched an innovative solution, the One Way Surveillance Sensor. One Way Surveillance Sensor Store layouts are critical, designed to influence customer behaviour and improve store flow while highlighting key promotions and merchandise. Developed to monitor directional changes of customer movements in-store, Checkpoint’s One Way Surveilla...
After eight years as an Engineer in the Royal Australian Army, I briefly worked at Telstra before joining Honeywell Australia. In 2000 I moved with Honeywell to Europe, and in 2010 took a position at ASSA ABLOY. My current role is global CTO for the ASSA ABLOY Group. During my career I have developed extensive knowledge of the global residential and commercial security industry, and of all aspects of building automation. I have had responsibility for sales leadership, project and product manage...
Bates Security, LLC, a commercial and residential security company based in Kentucky with a branch in Jacksonville, is happy to announce the recent acquisition of Absolute Protection Team from Roger and Karen Marcil of Vero Beach, Florida. Bates Security will be maintaining that location as its second in the state and fourth company branch overall. With the acquisition, Bates will be adding over 2,000 customers to its customer base. "Roger and Karen built a nice and successful company and we are...
Allegion UK, a pioneer in safety and security, has added the 286DL locking handle to its established range of Brio dual point locks for exterior folding applications. It is ideal for both residential and commercial facilities, joining other Brio accessories for the 286 dual point lock used on Weatherfold 4s and 5c. Designed to ‘suite’ with Brio 288 lever furniture, the 286DL locking handle has been specifically design engineered to secure timber and aluminium folding panels. The single action handle is a stylish alternative to two flush bolts. The product also enables the doors to fold flat. The intelligent security-conscious design of the 286DL is discreetly hidden inside the aluminium stile or edge of a timber panel with minimal machining and quick fixing points thanks to the patented hinge blocks. A variety of keepers allow for neat dressing and accurate alignment of the throw and panel, which improves the performance of perimeter weather seals. This new addition allows joinery manufacturers to offer a lock and handle for access doors that can be used with a cylinder of choice. The new locking handle is stylish and secure – the perfect accompaniment for our folding door systems” Sliding door hardware systems David Newton, Brio UK general manager, explains: “We routinely research and review the marketplace for folding and sliding door hardware systems, to see where Brio can add value for customers. The 286 dual point lock was developed as an alternative to using flush bolts on panels. "The lock is less intrusive than flush bolts, and also has the very considerable advantage of eliminating any bending-down or reaching-up to lock or unlock the door which is the downside of flush bolts. This makes it very friendly with regards to disabled access, as wheelchair users will not have to rely on help to open doors. The new locking handle is stylish, secure and simple – the perfect accompaniment for our folding door systems.”, he adds. Added to the design and manufacturing excellence is the company’s rigorous product testing and quality assurance. The 286DL locking handle is cycle tested in excess of 100,000 operations and comes with a 10-year warranty. It’s available in a variety of finishes for matching flexibility, including stainless steel for coastal areas.
ADT Inc., the smart home security provider serving residential and business customers, announced that it has entered into a definitive agreement to sell ADT Security Services Canada, Inc. (“ADT Canada”), to TELUS Corporation (“TELUS”) for approximately CAD $700 million in cash, subject to certain adjustments. The transaction comprises all of ADT Canada’s operations and assets. “Opportunities continue to develop for ADT in the areas of smart home integration, the expansion of the home security business into new demographics and ADT’s growth in commercial security,” said Jim DeVries, President and CEO, ADT. “The sale of our more capital intensive Canadian operations enables us to sharpen our focus on the exciting growth and higher margin opportunities in the U.S., where we can more efficiently invest our time and resources. Importantly, these emerging opportunities are ideal for leveraging the trusted ADT brand as we continue generating strong free cash flow to drive shareholder value over the long term.” One-time special dividend The Company also announced that its Board of Directors authorised a one-time special dividend (“Special Dividend”) of up to $550 million and plans to set the dividend at $0.70 per share. The Special Dividend is conditioned upon the closing of the transaction and is subject to subsequent corporate action, and therefore may not be in that amount, or occur at all.ADT plans to continue to execute on its previously disclosed capital allocation framework Details of the Special Dividend, including the record date for shareholders eligible to receive the Special Dividend and the payment date of the Special Dividend, will be provided in conjunction with the closing of the transaction. Opportunistic bolt-on M&A opportunities The Company expects to incur a non-cash charge in the third quarter in connection with the transaction, which may be material to ADT’s earnings. ADT plans to continue to execute on its previously disclosed capital allocation framework, which balances organic investments in the business, opportunistic bolt-on M&A opportunities, returning capital to shareholders and de-levering over time. For the fiscal year ended December 31, 2018, ADT Canada generated revenue of USD $229 million. The transaction is expected to close in the fourth quarter of 2019, subject to customary closing conditions and other business requirements, including approval of the transaction by the Canadian Competition Bureau. RBC Capital Markets and Barclays are serving as financial advisors to ADT and Osler, Hoskin & Harcourt, LLP is serving as legal advisor.
Genetec Inc., a technology provider of unified security, public safety, operations, and business intelligence solutions, announced that it will unveil new headquarters in the City of London, in the autumn of 2019. The announcement follows a period of accelerated growth for Genetec in the United Kingdom, with a significant and sustained increase in EMEA revenues over the last five years. Some of the company’s flagship customers in the UK include the Royal Borough of Windsor and Maidenhead, Twickenham Stadium and the University of Hull. Paul Dodds, Country Manager, UK & Ireland, commented: “At a time when Brexit has seen many organisations reconsider their presence, Genetec is unequivocal about the role of the United Kingdom as a critically important part of the global economy. As such, we’re delighted to be opening a central London headquarters to better meet the needs of our channel partners, end users, and prospects.” Public safety applications We work with local partners to provide training, compelling educational experiences, and state-of-the-art support The new headquarters will incorporate an expanded state-of-the-art training facility, and a new ‘Genetec Experience Center’ housing innovative solutions from Genetec and its large ecosystem of technology partners. Furthermore, the office will house a dedicated research and development team focused on justice and public safety applications for law enforcement, emergency responders and local government. Michel Chalouhi, VP of Global Sales, added: “The new London headquarters will give us the perfect platform to continue to execute our UK strategy and sustain the excellent year-on-year growth that we’ve achieved globally over the past years. The security market is growing and changing rapidly. We are constantly facing new challenges, so we need to ensure we work with our local partners to provide up-to-date training, compelling educational experiences, and state-of-the-art support. Our base in London will help us do that, thanks to its fantastic location, facilities, and links.”
Professionals from varied spheres in the security, safety and fire protection industry gathered for the second edition of the Intersec Awards during a gala event to celebrate their achievements in the global fire safety and security industry. The ceremony which was hosted by Messe Frankfurt Middle East, the organisers of Intersec – was held at Dubai’s Habtoor Palace Ballroom and saw more than 250 guests attend. Commercial security and fire protection The awards saw 130 entrants across nine categories, with entries received from companies across the globe, including the UAE, Saudi Arabia, Lebanon, Mozambique, Germany, Canada and Singapore. The Intersec Security, Safety & Fire Protection Awards celebrate innovation, excellence and teamwork" Simon Mellor, CEO of Messe Frankfurt Middle East, said, “The Intersec Security, Safety & Fire Protection Awards are a celebration of innovation, excellence, perseverance, teamwork, and of the dedication by the entire commercial security and fire protection community that continuously keep our societies safe and secure.” Intersec awards Spread across five security and four fire categories, entries went through a rigorous judging process which took place over two days and required shortlisted nominees to present their projects and products and attend a question and answer interview in front of an independent panel. The panel of judges including industry leaders and experts from companies such as Khalifa University, the Security Industry Regulatory Agency (SIRA), Dubai Civil Defence and EMAAR. Axis Communications - 'Video Surveillance/Camera System of the Year' winner Swedish manufacturer Axis Communications won the Video Surveillance / Camera System of the Year, for its AXIS Q6215-LE PTZ Network Camera. Philippe Kubbinga, Regional Director - Middle East & Africa, Axis Communications, said: “We are immensely proud of this recognition. It is a testament of the hard work, vision and excellent engineering of our teams. “With the AXIS Q6215-LE PTZ Network Camera, we have once again gone beyond the status quo and delivered a product that we believe will bring great value to our focus industry segments which are Critical Infrastructure, Transportation and Smart & Safe Cities. We look forward to continue innovating for a smarter and safer world.” Ejadah - ‘Security Project of the Year’ winner Ejadah was the only company to win across two categories on the night, walking away with the ‘Security Project of the Year’ and ‘Innovative Security Product of the Year’ awards. The UAE-based provider of community solutions for real estate assets was awarded for its work on upgrading the CCTVs across Jumeirah Beach Residences and their Security Robotic Service, respectively. Zainab Al Rahma, Marketing and Communications Manager for EJADAH, said, “Our robots will now offer the security industry and our customers the opportunity to purchase or rent assets that will enhance and improve the standard and quality of security services provided. They are an excellent example of utilising the latest technology that can be easily integrated into any existing security systems. Once integrated these products will certainly compliment any of our customers’ security plans for their developments.” Engineering firm, WSP added to its two award wins from 2018, taking home the ‘Fire Project of the Year’ award Engineering firm, WSP added to its two award wins from 2018, taking home the ‘Fire Project of the Year’ award for its work on The Wharf in Bluewaters Island. Alexander Castellanos, a consultant from WSP, said, “This project is a change from the super and mega high rises and posed unique fire and life safety strategy elements which had to be considered. Life safety solutions “With the project being focused on delivering a pedestrian experience and its low-rise nature, the fire strategy took advantage of this design element in order to address life safety elements such as fire service access, phased evacuation, and evacuation discharge as an integral part of the design and allowing for efficiencies while maintaining a high standard of safety.” In addition to returning award categories, the ceremony saw the introduction of new categories such as the ‘Humanitarian Project Award’, won by Sicuro Group for their Mozambique Crisis Response & Operation Strategy. Maxxess – ‘System Integrator of the Year’ award Provider of security management systems, Maxxess, took home another of the newly introduced award categories, the ‘System Integrator of the Year’, for its work on Bluewaters Island. “The eFusion security management platform was chosen by Bluewaters, and it uses versatile, open-technology software without the need for complex or bespoke integration,” said Lee Copland, Managing Director EMEA, Maxxess. “This project benefited from the cost advantage of a modular, building block approach that gives maximum freedom to integrate, customise and adapt security systems to meet both current needs and emerging risks." Off-the-shelf, plug-and-play integration Off-the-shelf, plug-and-play integration is much less expensive than a customised solution" Lee adds, “The reduced costs therefore apply not just to the present implementation, but also to future adaptations which will also be achieved much more easily. Off-the-shelf, plug-and-play integration is much less expensive than a customised solution, and eFusion already integrates with more than 60 leading security technologies, with more being added continuously.” The 22nd edition of Intersec will take place from 19-21 January 2020 at the Dubai World Trade Centre, featuring more than 1,300 exhibitors from 59 countries, covering the seven key show sections of Commercial Security, Fire & Rescue, Homeland Security & Policing, Physical & Perimeter Security, Safety & Health, Cyber Security, and Smart Home & building Automation. Intersec 2019 Awards winners Fire safety categories Fire project of the Year: WSP, Bluewaters Island - The Wharf Fire Alarm Detection of the Year: RPMANETWORKS, Hassantuk Smart Fire Solution Fire Suppression System of the Year: NAFFCO, NAFFCO Inert Gas System (IG01, IG41, IG55, IG100) Innovative Fire Protection Product of the Year: Waterfall Pumps Manufacturing, WF Fire Pump House (Pre-packaged Fire Systems) Security categories Security Project of the Year: Ejadah, Jumeirah Beach Residences CCTV Upgrade Access Control Product of the Year: Uhlmann and Zacher, Access solution with Bluetooth Video Surveillance / Camera System of the Year: Axis Communications, AXIS Q6215-LE PTZ Network Camera Innovative Security Product of the Year: Ejadah, Security Robotic Service System Integrator of the Year: Maxxess Systems, A Sustainable and Future-proof Integrated Maxxess Solution at Bluewaters Island Humanitarian Project Award: Sicuro Group, Mozambique Crisis Response & Operation Continuity Strategy
A survey of UK GDPR decision-makers conducted on behalf of Egress, the provider of people-centric data security solutions, reveals that 52% of businesses are not fully compliant with the regulation, more than a year after its implementation. The survey also found that 37% of respondents had reported an incident to the ICO in the past 12 months, with 17% having done so more than once. Interestingly, the results showed that over half (53%) of mid-size companies had reported data breaches to the ICO in the past 12 months, compared with 36% of small companies and only 23% of enterprise organisations. Handling of sensitive data These figures indicate an evident gap in compliance performance among mid-size companies Similarly, a notably lower percentage (39.5%) of mid-sized companies reported full GDPR compliance compared with 56% of large and 51% of small companies. Taken together, these figures indicate an evident gap in compliance performance among mid-size companies. Other key survey findings include: Only half of decision-makers (48%) reported that their business was fully compliant 42% rated their organisation as ‘mostly compliant’ Over one-third (35%) said GDPR has become less of a priority for their organisation in the last 12 months Implementing new processes around the handling of sensitive data has been the greatest area for compliance investment in the last 12 months, cited by 28% of those surveyed Compliance investment priorities were then split across better auditing of what data is collected and why (18%), employment of a Data Protection Officer or other compliance personnel (18%), and new technology (17%). 7% said user education and training had been their biggest area of investment. Making GDPR a top priority We now appear to be seeing an ‘almost compliant is close enough’ attitude towards GDPR" A significant proportion (35%) of GDPR decision-makers said that the majority of compliance activity had taken place in the lead up to the May 2018 deadline and had since dropped down the priority list and remained less important. Only 6% said that the ICO’s recent high-profile announcements of its intention to fine British Airways and Marriott had subsequently shocked the business back towards greater awareness. While 70% of decision-makers surveyed said that their organisation felt very positively about GDPR, less than two thirds (62%) said their business had made GDPR a top priority over the past year. Tony Pepper, CEO, Egress comments: “Since the rush to meet last May’s deadline, we now appear to be seeing an ‘almost compliant is close enough’ attitude towards GDPR, with a significant percentage of decision-makers indicating that focus has waned in the past 12 months.” Taking necessary steps towards protecting data “The wait of more than a year between implementation and the first action taken by the ICO under GDPR seemed to lead to a perception outside the security industry that the regulation was ‘all bark and no bite’. Although the authority’s announcement that it intends to fine British Airways and Marriott such staggering sums sent shockwaves through the security community, it is concerning only 6% of organisations have taken action to avoid the full potential of the legislation. These announcements should definitely have acted as a clearer warning that organisations cannot risk compliance complacency.” “This is important for businesses in the small and mid-market segments, where our survey found lower compliance levels being reported. Although the ICO’s action to date has focused on two well-known enterprise organisations, GDPR demands compliance from businesses of all sizes and they need to take all necessary steps towards protecting data.” End-user education and training When asked about their single greatest area of compliance investments, decision-makers chose: Implementing new processes around the handling of sensitive data (28%) Better auditing around what data we collect and for what reasons (18%) Employment of a Data Protection Officer or other additional compliance staff (18%) New technology (17%) Implementing new procedures around incident reporting (8%) End-user education and training (7%) Security-related personal data breach incidents Over one-third of respondents (37%) have reported at least one incident to the ICO in the last 12 months Yet despite these investments, over one-third of respondents (37%) have reported at least one incident to the ICO in the last 12 months. According to analysis of ICO data, 60% of security-related personal data breach incidents in the first six months of 2019 were caused by human error. Pepper adds: “The majority of respondents (96%) acknowledged their organisation has made investments in GDPR compliance in the last 12 months, with implementing new processes the most common top priority. Yet despite this, we continue to see data breach incidents being reported and we know from the ICO that the primary cause is human error – so clearly strategies need to shift if we are going to turn the tide against data breaches.” Latest advances in security and DLP technology “Reliance on people to follow processes and protect data is only going to get organisations so far: people are always going to make mistakes or behave unexpectedly, and more must be done to provide a safety net that protects sensitive information.” GDPR is here to stay, and we’re only going to see more companies penalised for data breaches" “It’s positive to see that almost one-fifth (17%) of respondents are looking to technology as a way to mitigate breaches, but they must ensure these solutions tackle human error as the root causes of many of these incidents.” “They must look to the latest advances in security and DLP technology that can map a user’s behaviour to prevent the array of mistakes that put data at risk – from falling for phishing attacks that can lead to malware or stolen credentials, to misdirecting emails or attaching the wrong documents. GDPR is here to stay, and we’re only going to see more companies penalised for data breaches unless we’re able to overcome these issues.”
OPTEX, the sensor manufacturer, has now launched in the UK and other English-speaking countries the VXI-CMOD – a new 180° day/night Wi-Fi camera module that can be easily integrated with its outdoor VX Infinity (VXI) sensor to create an app-based visual verification solution. The VXI series provides highly reliable outdoor detection with a range of up 12m and a 90° field of view. It is used for both residential and commercial applications, detecting intrusions in courtyards, gardens, driveways and secured car parks. The VXI-CMOD, Wi-Fi connected camera module can be retro-fitted onto any existing wired VXI models (VXI-ST, AM, DAM), fitting snugly on top, creating a single unit visual verification system that can be added to an existing alarm panel or be used as a standalone solution. Built-in infrared LEDs for enhanced night vision When the sensor detects an intruder, the integrated camera module is activated: it records the event and sends a notification to the owners’ paired mobile phone(s) (iOS or Android). The notification is made through an app called OPTEX Vision and the event can be accessed by up to three users simultaneously. By opening the app, the recipients can access the VXI-CMOD’s live view, and the stored two-second pre-alarm and 28-second post-alarm recording of the event for verification. The camera module’s live view can be accessed anytime through the OPTEX Vision app. VXI-CMOD features a 180° panoramic view at 1080P HD, with infrared LEDs for enhanced visionThe VXI-CMOD features a 180° panoramic view at 1080P HD, with built-in infrared LEDs for enhanced vision at night. VXI-CMOD is also equipped with a microphone. Via the app, the owners can access the camera’s live view and audio at any time. As the solution is led by the sensor which is truly pet-tolerant and features sensing analytics to perform in any weather condition, it will only send a notification when a person or vehicle has been detected. Solving the problem of false alarms Masaya Kida, Managing Director of OPTEX EMEA says the new camera module adds visual verification to the VXI series technology: “This solution helps to solve two problems – one is to see what or who has triggered the alarm so immediate action can be taken; the second is to be notified only when needed and not receive nuisance alarm every time the cat or dog is out. “As well as being used for security reasons, the application can be used for everyday convenience, such as being notified when a delivery has arrived, or members of family have returned home. We believe this solution will help to address the skepticism over the reliability of outdoor PIR sensors in the UK.”
The industry faces numerous challenges in the coming year. Physical and cyber security threats continue to become more complex, and organisations are struggling to manage both physical and digital credentials as well as a rapidly growing number of connected endpoints in the Internet of Things (IoT). We are witnessing the collision of the enterprise with the IoT, and organisations now must establish trust and validate the identity of people as well as ‘things’ in an environment of increasingly stringent safety and data privacy regulations. Meanwhile, demand grows for smarter and more data-driven workplaces, a risk-based approach to threat protection, improved productivity and seamless, more convenient access to the enterprise and its physical and digital assets and services. Using smartphone apps to open doors Cloud technologies give people access through their mobile phones and other devices to many new, high-value experiencesEnterprise customers increasingly want to create trusted environments within which they can deliver valuable new user experiences. A major driver is growing demand for the ‘digital cohesion’ of being able to use smartphone apps to open doors, authenticate to enterprise data resources or access a building’s applications and services. Cloud technologies are a key piece of the solution. They give people access through their mobile phones and other devices to many new, high-value experiences. At the same time, they help fuel smarter, more data-driven workplace environments. With the arrival of today’s identity- and location-aware building systems that recognise people and use deep learning analytics to customise their office environment, the workplace is undergoing dramatic change. Improved fingerprint solutions Cloud-based platforms and application programming interfaces (APIs) will help bridge biometrics and access control in the enterprise, overcoming previous integration hurdles while providing a trusted platform that meets the concerns of accessibility and data protection in a connected environment. At the same time, the next generation of fingerprint solutions will deliver higher matching speed, better image capture quality and improved performance. The next generation of fingerprint solutions will deliver higher matching speed, better image capture quality and improved performance Liveness detection will ensure that captured data is from a living person. Biometrics authentication will also gain traction beyond access control in immigration and border control, law enforcement, military, defence and other public section use cases where higher security is needed. Flexible subscription models Access control solutions based on cloud platforms will also change how solutions are deployed. Siloed security and workplace optimisation solutions will be replaced with mobile apps that can be downloaded anywhere across a global ecosystem of millions of compatible and connected physical access control system endpoints. These connections will also facilitate new, more flexible subscription models for access control services. As an example, users will be able to more easily replenish mobile IDs if their smartphones are lost or must be replaced. Generating valuable insights with machine learning Machine learning analytics will be used to generate valuable insights from today’s access control solutionsEducation, finance, healthcare, enterprise, and other niche markets such as commercial real-estate and enterprises focussed on co-working spaces will benefit from a cloud-connected access control hardware foundation. There will be a faster path from design to deployment since developers will no longer have to create an entire vertically integrated solution. They will simply add an app experience to the existing access control infrastructure. New players will be drawn to the market resulting in a richer, more vibrant development community and accelerated innovation. Data analytics will be a rapidly growing area of interest. Machine learning analytics will be used to generate valuable insights from today’s access control solutions. Devices, access control systems, IoT applications, digital certificates and location services solutions, which are all connected to the cloud, will collectively deliver robust data with which to apply advanced analytics and risk-based intelligence. As organisations incorporate this type of analytics engine into their access control systems, they will improve security and personalise the user experience while driving better business decisions.
Should ‘Made in China’ be seen as a negative in security systems and products? It’s an important and complex issue that merits a more detailed response than my recent comment in the Expert Panel Roundtable. For me, there are two sides of the answer to this question: Buying products that have certain negative attributes that are not in alignment with some part of a belief system or company mandate. Buying products that do not perform as advertised or do something that is unacceptable. For integrators and end users making the buying decisions, the drive to purchase products may not be based on either aspect and instead on the product that can do the best job for their business. But for others, a greater emphasis on the ethical implications of purchasing decisions drives decision-making. What is ethical consumption? Ethical consumption is a type of consumer activism that is based on the concept of ‘positive buying’ in that ethical products are favouredEthical consumption — often called ethical consumerism — is a type of consumer activism that is based on the concept of ‘positive buying’ in that ethical products are favoured, and products that are ethically questionable may be met with a ‘moral boycott’. This can be as simple as only buying organic produce or as complex as boycotting products made in a totalitarian regime that doesn't offer its citizens the same freedoms that we enjoy in the United States. Consider the goals of the Boston Tea Party or the National Consumers League (NCL), which was formed to protect and promote social and economic justice for consumers and workers in the United States and abroad. Some examples of considerations behind ethical consumption include fair trade, treatment of workers, genetic modification, locally made and processed goods, union-made products and services, humane animal treatment, and in general, labour issues and manufacturing practices that take these factors into account. Increase in ethical consumption The numbers show that ethical consumption is on the rise. In a 2017 study by Unilever, 33 percent of consumers reported choosing to buy and support brands that they believe are doing social or environmental good. In the same study, 53 percent of shoppers in the United Kingdom and 78 percent in the United States said they feel better when they buy products that are ‘sustainably’ produced. There’s clear evidence that products from some Chinese companies suffer from cybersecurity vulnerabilities Though the aforementioned question that sparked this conversation centres around concerns with products made in China, there are many other countries where, for example, governments/dictators are extremely repressive to all or parts of their populations, whose products, such as oil, diamonds, minerals, etc., we happily consume. There are also a number of countries that are a threat in terms of cybersecurity. It may be naive and simplistic to single out Chinese manufacturers. Impact on physical security products Product buying decisions based on factors other than product functionality, quality and price are also starting to permeate the security marketplace. While this hasn't been a large focus area from the business-to-business consumption side, it's something that should be considered for commercial security products for a variety of reasons. Hardware hacks are more difficult to pull off and potentially more devastating" There’s clear evidence that products from some Chinese companies suffer from cybersecurity vulnerabilities. Last fall, 30 U.S. companies, including Apple and Amazon, were potentially compromised when it was discovered that a tiny microchip in the motherboard of servers built in China that weren't a part of the original specification. According to a Bloomberg report, “This attack was something graver than the software-based incidents the world has grown accustomed to seeing. Hardware hacks are more difficult to pull off and potentially more devastating, promising the kind of long-term, stealth access that spy agencies are willing to invest millions of dollars and many years to get.” This, along with many other incidents, are changing the considerations behind purchasing decisions even in the physical security industry. Given that physical security products in general have been lax on cybersecurity, this is a welcome change. Combating tech-specific threats In early January, members of the U.S. Senate introduced bipartisan legislation to help combat tech-specific threats to national security posed by foreign actors and ensure U.S. technological supremacy by improving interagency coordination across the U.S. government. The bill creates the Office of Critical Technologies & Security at the White House, an indication that this issue is of critical importance to a number of players across the tech sector. Members of the U.S. Senate introduced bipartisan legislation to help combat tech-specific threats to national security posed by foreign actors To address a significant number of concerns around ethical production, there are certifications such as ISO 26000 which provides guidance on social responsibility by addressing accountability, transparency, ethical behaviour, respect for stakeholder interests, respect for rule of law, respect for international norms of behaviour and respect for human rights. While still emerging within physical security, companies that adhere to these and other standards do exist in the marketplace. Not buying products vulnerable to cyberattacks It may be counter-productive, even irresponsible, to brand all products from an entire country as unfit for purchasing. Some manufacturers’ products may be ethically questionable, or more vulnerable to cyberattacks than others; so not buying products made by those companies would make sense. The physical security industry might be playing a bit of catch up on this front, but I think we're beginning to see a shift toward this kind of responsible buying behaviour.
Last week, the Schedule 84 Suppliers Research Panel participated in reviewing the 2018 contracting year with the GSA Schedule 84 leadership team. Our panel group consists of experienced contractors and consultants meeting for a monthly conference call. Schedule 84 is the GSA Schedules Contract for Total Solutions for Law Enforcement, Security, Facilities Management, Fire and Rescue. Our opinions are part of a research programme to provide valuable feedback to the GSA Schedule 84 programme and on to the GSA central office. The director of GSA Region 7 Schedules Program, the Schedule 84 Branch Chief and the Category Manager Subject Matter Expert who manages our suppliers' panel gave us their full attention as we discussed the successes of the programme, hot topics, problems and the future. We determined 2018 under the Schedule 84 team to be a year of innovative thoughts, cooperative effort and renewed enthusiasm Innovative review team We determined 2018 under the Schedule 84 team to be a year of innovative thoughts, cooperative effort, renewed enthusiasm and productive changes building upon the successes of 2017. There was high praise for the accessibility to the Schedule 84 staff. Their consistent quick response to questions and concerns, thinking outside the box and supporting the programme by partnering with their contractors was much appreciated. There has been a renewed spirit of partnering to cooperatively bring the best to agency customers. It seems to be working as per the Centre Director sales are growing for GSA Schedule 84. Advocating for the security industry In my experience, business development starts with the Administrator from Region 7 in Ft. Worth, TX. As the annual Schedule 84 Industry Day at the SSAC begins he is shaking every hand and passing out his cards looking folks right in the eye asking, “how can I help you?” They have the best practices and most organised paperwork. The SSAC director has chosen well in her staff and is hands-on in every endeavour to direct things along when challenges occur or to improve the programme. The new 84 Branch Chief is knowledgeable, innovative, tireless and has been heavily involved in advocating for the security industry It continues with the centre’s CASE Manager encouraging the contractors at events, visiting agency customers and promoting the GSA Schedules Program by helping coordinate the partnering. The new 84 Branch Chief is knowledgeable, innovative, tireless and has been heavily involved in advocating for the security industry for adding new technology, meeting with industry associations, understanding the complexity and challenges of Homeland Security Presidential Directive 12 (HSPD12) and advocating for the purchasing Physical Access Control Systems (PACS) utilising the appropriate standards and the GSA Program among other innovations. As far as the supplier panel, we gave our GSA Schedule 84 team and leaders high praise for 2018. GSA also added new categories or SINs for clearly identifying Physical Access Control Products that appear on GSA’s Approved Product List Changes in the GSA programme Some changes this year in certain GSA programmes included the creation of a new category of products/services Special Item Number (SIN) for Order Level Materials (OLM) developed to assist with solution procurements. This new SIN was added to Schedules 03FAC, 56, 70, 71, 00Corp, 738X and 84. Under Schedule 84 it is SIN 84-500. GSA Schedule 84 consolidated many Special Items Numbers (SINs) to make finding products and services less complex Essentially this SIN allows agencies procuring under the aforementioned GSA Schedules’ programmes to purchase and the contractor to add items and services not known prior to the task as a Contract Line Item Number (CLIN) not to exceed 33% of the order. For more information and FAQs on OLMs go to www.gsa.gov/olm. This is not to take the place of “Open Market” items for adding products only that are not listed on a company’s GSA Contract. Physical access control products Previously, GSA Schedule 84 consolidated many Special Items Numbers (SINs) to make finding products and services less complex for the agencies. GSA also added new categories or SINs for clearly identifying Physical Access Control Products that appear on GSA’s Approved Product List according to the standards created under FIPS201. These products appear under SIN 246 35-7 after being tested and approved by GSA. To be qualified to install these products under the GSA Program at least one individual from the GSA Contractor company must complete the class and be CSEIP certified before applying for labour SIN 246 60-5. Additionally, the company must demonstrate certain qualifications and have past performance for this type of work. The Security Technology Alliance offers the training class and certification. Certified individuals and approved products are listed at www.idmanagement.gov. Companies listed with SIN 246-35 7 and SIN 246-60 5 may be found by searching at www.gsaelibrary.gsa.gov. Updates to guidance for procurement Updates to guidance for procurement of PACS will continue to be posted to the GSA PACS Ordering Guide Updates to guidance for procurement of PACS will continue to be posted to the GSA PACS Ordering Guide. The ordering guide posted at www.gsa.gov/firesecurity is a valuable support tool created to assist agencies with understanding the requirements of FIPS201 and procuring a PACS. The guide includes relevant regulations, FAQs, sample systems designs, sample statements of work, a list of key points of contract for additional help and questions. In partnership with GSA and guided by the GSA Ombudsman group, the Security Industry Association and the Security Technology Alliance members and their contractor companies participated in a GSA Reverse Industry PACS Training Day on September 17, 2018. We presented from an industry perspective important fact on PACS system requirements, procurement planning, providing information on resources and further educating with panel discussions, individual presentations and amusing skits to over 300 Government agency staff and acquisition specialists. You can find some of the unedited recording of the PACS Reverse Industry Day Training on YouTube. Some changes included the creation of a new category of products/services Special Item Number (SIN) for Order Level Materials (OLM) GSA Schedules Program A hot topic about the GSA programme for 2018 was also an issue for the prior year. The GSA Schedules Program is a streamlined contracting vehicle incorporating specific Federal Acquisition Regulations for more efficiently purchasing commercial items. Companies may apply per a continuous open season for a 5-year contract with three 5-year options to renew. Contractors are vetted for past performance, corporate experience and financial capability. Products and services are considered for offering to Federal, State and Local customers (for Schedule 84) with pricing that is determined to be fair and reasonable through negotiations with GSA. To make the determination for fair and reasonable pricing GSA carefully reviews the commercial practices of the contractor To make the determination for fair and reasonable pricing GSA carefully reviews the commercial practices of the contractor as well as the competition of identical or similar item pricing. The most vocal complaint of concern from the contractors was regarding the consideration of competitor contractors offering identical items with out-of-date pricing or holding a Letter of Supply not authorised by the manufacturer. GSA pricing tool Since the GSA utilises a pricing tool to determine if the pricing offered is competitive, a rogue competitor can cause a pricing action to possibly be rejected due to out of date information even as the manufacturer offers an update of the product. This is an issue on all GSA Contracts that the supplier panel hopes will be reconsidered by GSA policymakers at the central office. Most of us believe the Letters of Supply should only be issued by the manufacturer or with documented specific permission of the manufacturer to a reseller. Manufacturers may want to have a better understanding of the Letter of Supply, how it is considered by GSA and more carefully choose their Government partners for experience and compliance. Another challenge for the security community is regarding the lack of accessibility of participating dealers to GSA eBuy Overcoming challenges for the security community Contractors may only see RFQs which are posted under the Special items Number(s) that were awarded to their GSA Contract Another challenge for the security community is regarding the lack of accessibility of participating dealers to GSA eBuy. GSA eBuy is an online Request for Quotation (RFQ) programme that is for GSA Contract holders only. Agencies will post their requirements by Special Item Number for at a minimum 48 hours. Contractors may only see RFQs which are posted under the Special items Number(s) that were awarded to their GSA Contract. GSA Participating Dealers may take orders on behalf of a manufacturer if they are authorised under the manufacturer’s GSA Contract. They may also have an online PO Portal to receive orders. But they have no access to GSA eBuy to response to RFQs. Usually, under these arrangements, the manufacturers do not respond directly, so there is a problem using GSA eBuy for opportunities as their GSA Participating Dealers have no access to respond. GSA Schedule 84 leadership In some instances, a contracting officer may allow an emailed quotation. However, with the use of the electronic ordering system, this has become a common problem we hope to bring to the attention of policymakers. Some changes to the programmes may make the presentation of documentation more effective going forwardThe GSA Schedule 84 leadership has been helpful to explain the challenges to the agencies to try and resolve such issues. So, what’s up for 2019? GSA modernisation is coming. There will be improvements to their tools and more consolidations of SINs and more. There have been discussions of a revival of the GSA Expo. The Expo offered training for contracting staff both Government and private industry. Valuable tools for vendor training Equally important is the networking, meetings and the exhibits of the contractors. Expos have been discontinued since 2012 but smaller events have been growing as well as online webinar training. Webinars are valuable tools for GSA and vendor training, but they do not take the place of being able to meet your customers face-to-face. GSA online eOffer and eMod programme have made processing actions more efficient. Some changes to the programmes may make the presentation of documentation more effective going forward. The GSA online website for viewing the items on the GSA Contract and for purchasing items, GSA Advantage could definitely use an update as it has been basically the same for 20 years. Keep an eye on GSA Interact for the latest happenings with GSA.
According to the reports of not-for-profit organisation Gun Violence Archive, the year 2018 saw 323 mass shooting incidents as of November. This number is 346 for the year 2017 and 382 for 2016, with ‘mass shooting’ defined as cases where four or more people are shot or killed in the same time period and location. A variety of gunfire detection solutions and other technology approaches seek to address the problem. ShotSpotter SiteSecure and ShotSpotter SecureCampus provide critical outdoor infrastructure protection against active shooter attacks. SiteSecure delivers critical information such as the number of shots fired, a detailed map of the airport or transportation facility, with the shooting location clearly identified. SiteSecure also provides law enforcement and transportation facility management with real-time information that can be useful to identify and address false alarms and reduce mass panic. Gunfire detection and precise shooter location Designed for college campuses and K-12 schools, ShotSpotter SecureCampus provides gunfire detectionShotSpotter SecureCampus is a gunfire detection system designed to provide outdoor coverage at university and school campuses. Designed for college campuses and K-12 schools, SST SecureCampus provides gunfire detection, precise location, and number of shooters to first responders and school personnel, enabling faster response to an incident. Data capture form to appear here! Gunshot detection can offer tremendous benefits in mitigating active shooting incidents occurring in a public facility or commercial environment. Data shows that active shooter attacks often begin outside a building and then progress indoors. Thus, the first line of defence for security professionals lies outside a facility, in a zone of protection surrounding it or comprising the entire outdoor area of a larger facility of many buildings. Audio solutions for perimeter security Video cameras are effective surveillance tools in the event of a shooting incident, but they are not able to capture everything. Deploying audio solutions can automatically flag incidents not caught on camera, as well as alert central station guards of what surveillance zones need to be closely monitored. Audio analytics solutions for aggression and gunshot detection are some of the best security tools in the security market when it comes to detection, intervention and deterrence. They are the next generation of monitoring; equipping security teams with critical information and enhancing perimeter security. End users can identify high-risk situations in real-time and prevent acts of physical aggression before they happen Aggression detectors are capable of accurately recognising duress in a person’s voice. The software automatically and objectively detects the presence of rising human aggression, anger or fear, and subsequently warns staff by a visual alert or alarm trigger. As a result, end users can identify high-risk situations in real-time and prevent acts of physical aggression before they happen. Artificial intelligence to detect weapons A gunshot detector recognises firearm discharge from various firearms in different settings. Within seconds of a gunshot, the software accurately classifies and triggers an immediate notification through a designated VMS. Security staff can then verify the alert, effectively reducing the reaction time of first responders. With the development of artificial intelligence (AI) in object recognition, AI weapons detection offers an efficient alternative to gunshot detection to prevent active shooting: AI can visually detect guns based on their shapes before they are fired. The AI is trained to recognise firearms in different shapes, sizes, colours, and at different angles in videos, so that the AI weapon detector can be deployed with existing camera systems, analyse the video feeds, and instantly notify security staff when a gun is spotted. Audio analytics, processed inside a video camera, are another approach that can quickly pinpoint zones that security staff should focus on, which can dramatically shorten response times to incidents. Audio-derived data also provides a secondary layer of verification that an event is taking place which can help prioritise responses from police and emergency personnel. Detecting audio levels and alerting operators Operators can be notified of abnormal situations via event signals allowing the operator to take suitable measuresThe first job of a well-configured camera or camera/mic pair is to detect sounds of interest while rejecting ancillary sounds and noise below a preset threshold. Each camera must be custom-configured for its particular environment to detect audio levels which exceed a user-defined level. Since audio levels are typically greater in abnormal situations, any audio levels exceeding the baseline set levels are detected as being a potential security event. Operators can be notified of any abnormal situations via event signals allowing the operator to take suitable measures. Finding a baseline of background noise and setting an appropriate threshold level is the first step. Well configured audio analytics can deliver critical information about a security event, accelerating response times and providing timely details beyond video-only surveillance. Analytics take privacy concerns out of the equation and allow installers and end users to use camera audio responsibly. Hanwha Techwin's audio source classification technology, available in its X Series cameras, features three customisable settings for category, noise cancellation and detection level for optimum performance in a variety of installation environments.
Coming off a successful ISC West show, Honeywell is sharply focussed on product development, with an emphasis on advanced software. “We have a strong new product pipeline this year – more than two times the number of products than we’ve released in the past several years,” says Luis Rodriguez, Director of Product Marketing, Honeywell Commercial Security. “At ISC West, we received a lot of interest in how AI and new security systems are changing the market.” Although uses for AI are still emerging in security, Honeywell sees an important role for AI in building a connected system to ensure the safety and security of a building, and more importantly, its occupants. AI allows end users to go beyond monitoring activity on a surface level to really understand the scene – from who exactly is in the area to what they might be doing. As more data is processed over time, AI will continue to build on its learnings to help deliver a more accurate assessment of potential threats each time. Machine learning-based analytics End users should explore the use of machine learning-based analytics as machine learning is more advanced than AI-based systems, says Rodriguez. “When speaking to dealers and integrators, end users should also inquire about the detection accuracy of systems that use AI or machine learning technology, particularly around false positives and negatives.” Honeywell seeks to develop integrated security systems that provide the earliest detection “Additionally, end users should always ask to conduct site testing so to understand how well-suited the machine learning-based system is to the particular user’s native environment,” adds Rodriguez. “The testing will help identify the exact needs of their site.” Honeywell is reinvesting in its video portfolio, both in hardware and software innovation, as well as partnering with the top experts in the IT and education industries to stay ahead of customer demand. Honeywell seeks to develop integrated security systems that provide the earliest detection, enable the fastest response, centralise decision making, and allow customers to manage it all from anywhere. Solutions for vertical markets Honeywell Commercial Security is focussed on supporting vertical markets that have specific security needs such as education, banking and finance, and pharma. Each has unique nuances that call for tailored security approaches. “As Honeywell continues to develop its suite of security solutions for the future and identify personalised systems for each vertical, AI such as analytics, deep learning and facial recognition will play an integral role during research and testing,” says Rodriguez. Honeywell is developing video and audio analytics technology capable of studying crowd behaviour as well as detecting guns, gunshots An example is the education market, where eliminating human delay in reporting potential threats to law enforcement and creating faster systems that help omit single-point failures are key to protecting schools and ensuring students’ safety. To address those challenges, Honeywell is developing video and audio analytics technology capable of studying crowd behaviour as well as detecting guns, gunshots and fights, says Bruce Montgomery, Business Development Manager, Honeywell Commercial Security. Testing technology for sports security The software is able to visualise, automate planning, design and efficiency analysis of a video surveillance system"A partnership with University of Southern Mississippi’s National Center for Spectator Sports Safety and Security (NCS4) is testing technology such as MaxPro Video, Pro-Watch Access Control and UNP Mass Notification in the National Sport Security Laboratory and in connected real-world environments. “The analytics data gathered from these environments will help inform future security innovations,” says Montgomery. Another Honeywell partnership is with JVSG, whose CCTV Design Software offers a new way to design more affordable and higher quality video surveillance systems. Integrators and distributors are now able to add a range of models from Honeywell’s portfolio of Performance Series IP Cameras into their system design from the software’s database. “The software is able to visualise, automate planning, design and efficiency analysis of a video surveillance system,” says Jeremy Kimber, Director of Enterprise Global Product Management, Honeywell Security and Fire. The program is used by more than 7,000 CCTV designers in more than 130 countries around the world and is downloaded more than 60,000 times every year.
Knightscope’s long-term mission is to “make America the safest country in the world,” says William Santana Li, Chairman and CEO. “The company was started six years ago as we had grown tired and horrified by the ongoing violence in our country and decided to do something about it.” But are security robots the solution to crime and violence in the United States? “There are 2+ million law enforcement and security professionals trying to secure 328+ million people across the 50 states,” Mr. Li says. “The math just doesn’t work, which is why our country pays $1+ trillion in negative economic impact annually – a hidden tax we all pay in blood, tears and treasure.” Robots provide professionals with new tools. “We make really smart eyes and ears that operate 24/7/365 for an affordable price,” says Mr. Li. “We have actually operated more than 700,000 hours in the real world, both outdoors and indoors, across 15 states and are now operating across five time zones – fully autonomous without any human intervention.” Utilising robotics and AI AI helps Knightscope robots interact better with humans and perform activities like identifying peopleKnightscope is a security technology company that utilises self-driving technology, robotics and artificial intelligence to provide security professionals additional eyes and ears to do their jobs much more effectively – as well as provide a consistent around-the-clock physical deterrence to help minimise negative behaviour. Knightscope says its K1, K3 and K5 security robots, and accompanying user interface, the Knightscope Security Operations Center (KSOC), continue to make significant contributions to the safety of its client base. Artificial intelligence helps Knightscope robots interact better with humans and perform activities like identifying people, looking up license plates, detecting rogue wireless devices, having a machine-to-human dialogue and, in the future, detecting dangerous objects in a scene automatically. “Our long-term plan is to have the machines be able to see, feel, hear and smell, so advances in sensor capabilities, efforts in sensor fusion, and the future with 5G capabilities will make for profound advances,” says Mr. Li. Facial recognition software at ISC West 2019 was Knightscope’s fourth time exhibiting at ISC West, and they have also exhibited at GSX/ASIS, ISC East, numerous other trade shows, and have hosted some of their own. Mr. Li has seen the reaction to security robots evolve over the years. People are realising that the technology is not science fiction but science fact and looking to see how it can be an integral part of their respective security programs “At first, it was typically ‘what is that?’ or ‘what does it do?’ But the last 12 to 18 months have been very different. There has been much more meaningful, implementation-focussed dialogue, feedback, requests for new features, etc. Now folks are realising that our technology is not science fiction but science fact and looking to see how it can be an integral part of their respective security programs.” Their ISC West presence this year highlighted facial recognition software that utilises deep learning to detect, analyse and compare faces. Pechanga Resort Casino in Temecula, Calif., an existing Knightscope customer, is using the beta format on its K1 security robot platform. Additional benefits of using robots Knightscope has raised over $40 million to develop and deploy its technology and is backed by more than 6,000 family offices, accelerators, funds, private investors and four major corporations, says Mr. Li. As the machines get smarter and more capable over time – the number of applications will become endless" Robots also provide additional benefits beyond security, says Mr. Li, such as branding, community relations and public relations opportunities for clients. “In some cases, our clients have utilised our Concierge feature to allow for human-to-machine customer service interactions,” he says. “We have also been able to showcase and inspire STEM (science, technology, engineering and math) students with practical applications of technology for the good of society. And robot selfies have certainly become a thing.” Endless number of applications In terms of vertical markets, in the near term, Knightscope has seen positive scaling and growth on corporate campuses and at logistics facilities, manufacturing plants, hospitals, casinos, commercial real estate and malls. “As the machines get smarter and more capable over time – the number of applications will become endless,” says Mr. Li. They currently drop new software code every two weeks and new hardware typically a couple of times a year. “In my opinion, it is ill advised for early stage technology companies to utilise B2G (business-to-government) sales as the initial go-to-market strategy,” says Mr. Li. “For Knightscope we have been primarily focussed on B2B (business-to-business) sales and actually until 2017 were geographically constrained to California only. What we are doing is technologically extremely difficult as these are effectively self-driving cars. Additionally, despite the never-ending international interest, we are laser focussed on the United States.”
3xLOGIC, Inc., global provider of integrated, intelligent security solutions, has announced that integrator partner, Harris Tec, has reported the successful installation of a 3xLOGIC infinias access control system for their customer. Harris Tec is a relatively new company and is helmed by Justin Harris, who has been in the security industry for several years. Justin said, “Our customer does both local cultivation of marijuana plants, as well marijuana production, which means marijuana by-products. Cultivation and production are in two separate parts of the facility and require two separate licenses.” The facility is approx 30,000 sq.ft in size, and the infinias system manages access for eight doors and an inventory cage Cannabis security On November 8, 2016, Nevada voters approved Question 2, which legalises, regulates, and taxes recreational marijuana throughout the state and allows adults age 21 or older to possess up to one ounce of marijuana and grow up to six plants beginning on January 1, 2017. Marijuana is largely a cash business and with high-value inventory also on premise, security is of utmost concern for such an entity. The facility is approximately 30,000 square feet in size, and the infinias system manages access for eight doors and an inventory cage. Except for one exterior door, all other managed doors are on the interior. “I’ve been installing infinias for about five years, and I love the system,” commented Harris. Infinias access control system He adds, “I like the system’s flexibility, we have it programmed to create a man trap at the main entrance, only one door can be opened at a time. We also can do lock down with the system automatically halting all ingress and egress.” “My staff initially aren’t experts in all things access control and they manage this system very well, they’re able to leverage all the system’s capabilities. By closely managing the interior doors, we are making sure the 40+ employees are going only where they are explicitly approved to go.” Electronic access control It’s not practical to give out keys to the facility, so we have to implement electronic access control" Harris further said, “With infinias, my customer has real peace of mind. It’s not practical to give out keys to the facility, so we have to implement electronic access control. And in this business, there is a good amount of turnover, so it’s essential we are able to program badges both on and off immediately,” said Harris. The end user’s employees are organised into several different groups, each with different access privileges in terms of day and time and location. Managed Services Provider Harris Tec is the Managed Services Provider (MSP) for the end user, they perform day-to-day system management, troubleshoot any issues, make all changes to schedules and groups, and turn cards on and off. System-generated reports are used for trouble-shooting and on-site security staff manage doors with an app installed on a tablet. Harris concluded, “When I’m asked if the system can do this or do that, I tell my employees, ‘Never say no,’ because this system can do virtually anything. You just have to use it and quickly you’ll understand the tremendous flexibility and capabilities you have.”
ASSA ABLOY Project Specification Group, a unit of ASSA ABLOY Opening Solutions UK & Ireland, has partnered with ColladoCollins Architects to leverage the benefits of its Openings Studio BIM software to make significant time and cost savings on the former Shredded Wheat factory project. The project, a thriving new commercial and residential development based in Welwyn Garden City in Hertfordshire, will consist of over 643 units and more than 7,100 doorsets. Encompassing a sensitive refurbishment of former Shredded Wheat factory buildings, the project is part of a huge development that includes over 1,200 units in total. Opening Studio BIM software Openings Studio is a BIM software tool that was developed to significantly improve the process of door scheduling Using ASSA ABLOY’s Openings Studio software, ColladoCollins has been able to save weeks of time and manpower when specifying and managing ironmongery schedules for the project. Openings Studio is a BIM software tool that was developed to significantly improve the process of door scheduling, visualisation and more. Users are able to focus on the design, installation and management of door openings – all within an information-rich environment. Easy door installation and management Specifying as many as 7,100 doorsets can be an extremely time-intensive task. Using traditional methods, information would be provided in countless separate schedules and documents, which would require a Revit operator to manually create and update, with someone else to then check for errors. Then, as the project develops, information may become out of date and therefore require individual doors to be flagged up and re-sent for advice. The time and manpower that goes into this process is not only inefficient, but also ineffective, with the prospect of human error still a prominent possibility. Software integration For these reasons, ColladoCollins began to work closely with ASSA ABLOY Project Specification Group to integrate Openings Studio with their own Revit model, allowing the firm to be able find all the relevant information and ironmongery schedules in a single place, delivered in one document. Martin Russell, Project Leader at ColladoCollins, comments: “Moving to BIM was a natural progression for us, and as market leaders, ASSA ABLOY was the obvious choice to assist us.” Integration of door hardware ASSA ABLOY's inputs have vastly improved the integration of door hardware within the former Shredded Wheat Factory project"“Utilising the advice from Eric Spooner, BIM Manager at ASSA ABLOY, as well as the Openings Studio software itself, we have managed to free up our team from tirelessly working through door hardware schedules. This means we can focus on architecture and aesthetics, knowing the specification and integration of the ironmongery is in hand and will seamlessly feedback into the project within the allotted timescales. “The information and advice provided by ASSA ABLOY has vastly improved the integration of door hardware within the former Shredded Wheat Factory project. With a project of this size, sharing information can be quite a task – from large file sizes to sourcing relevant information. The prompts from Openings Studio make transforming information clear, concise and generally easy to follow. BIM software tools “At ColladoCollins, we pride ourselves on designing and delivering high quality buildings with a sensitive, sustainable approach, utilising a strong design ethos with a strong technical background whilst understanding the commercial challenges facing our clients. Openings Studio enhances our ability to provide this service and we would seize the opportunity to work with ASSA ABLOY on similar projects in the future.” Eric Spooner, BIM Manager at ASSA ABLOY, adds: “As Openings Studio flags up any queries and automatically updates in live time, it is easy to see any discrepancies and changes within the schedules. By re-sharing the model information, it then also allows us at ASSA ABLOY to view the changes and feedback to architects – allowing us to work in close collaboration at every stage of a project.”
Nationwide Building Society has partnered with Traka to provide an intelligent key management system in its branches. The partnership will enhance the Society’s processes in its network, for the benefit of its employees and members. Nationwide has around 18,000 employees and around 650 branches across the UK. Previously branch managers were initially being relied upon to have ensured the management and safety of branch keys throughout the working day, and overnight. This has been a time constraining and manual process, but an essential part of branch security. Traka’s intelligent key management solution has been trialled, originally tested across 21 sites, and systems Key management process Traka’s intelligent key management solution has been trialled, originally tested across 21 sites, and systems now operate across Nationwide’s UK-wide branch network. Richard Newland, Director of Branch & Workplace Transformation at Nationwide said; “There was an opportunity to greatly improve our key management process, to make it easier for our colleagues to manage branch keys.” Seamless installation process “The introduction of Traka key management systems moved us into a more digital management system. Our colleagues no longer need to solely manage keys, and the audit trail capability has helped us to remove the manual paper recording and see the instant status of keys at any one time.” Traka worked closely with Nationwide to understand bespoke requirements for key management across its branch network, ensuring a seamless installation process under a tight timeframe for delivery. Once installed, Traka worked closely with individual branches to ensure staff had full training in the use of key management systems and access control solutions for authorised personnel. In Nationwide’s case, Traka has made a significant difference from an operational perspective Accurate audit trail Tom Smith, Traka Market Development Manager added: “What our relationship with Nationwide demonstrates is our preferred approach to working with clients, in true partnership. Our aim is to understand bespoke requirements for key management and ensure our systems can accommodate, without compromising on ease of use for staff.” “In Nationwide’s case, Traka has made a significant difference from an operational perspective. The main resolution being staff no longer need to solely manage keys, and instead, they can focus on servicing members needs more efficiently. Nationwide has total peace of mind they have a secure and accurate audit trail of all keys, across every branch in its network.”
A compressive video surveillance solution consisting of 96 cameras from Dahua Technology UK is being installed at the striking Fort Dunlop commercial and retail site, overlooking the M6 motorway in Birmingham. Built for Dunlop Rubber, Fort Dunlop became the tyre-maker’s flagship production facility and at one time was the world’s largest factory, employing 3,200 workers. After production stopped in the 1980s, the building lay derelict before being redeveloped into 360,000 square feet of office and retail space, also now with an adjoining hotel. Cameras include the 12MP panoramic internal IPC-EBW81230 fisheye camera and the external panoramic IPC-PDBW8802 dome cameraPanoramic fisheye and dome cameras Much of the site’s previous video surveillance system was installed during the refurbishment in 2006, but with advances in modern technology, it was felt that the current system was no longer meeting basic requirements. An external consultant assessed the site and put forward plans for an upgrade. Bromsgrove-based Champion Security Installations won the bid for the upgrade project. Installed over two phases, the design consists of a total of 96 static and PTZ cameras from Full HD to 4K resolutions. Cameras include the 12MP panoramic internal IPC-EBW81230 fisheye camera, which uses H.265/H.264 triple-stream encoding, and the external panoramic IPC-PDBW8802 dome camera, with four 2-Megapixel progressive scan CMOS sensors and day/night functionality. Images are managed and recorder by a 128-channel, ultra 4K NVR616 network video recorder. The aim was to meet all of the different security, health and safety criteria, as well as ensure ease of use for the operators" Ensuring safety of staff and building “Having undertaken a full review of the security systems at Fort Dunlop, it became clear that a replacement CCTV system was required to ensure protection of the staff, visitors and building,” said a spokesperson from Savills. “Three different options were presented by contractors, but it quickly became clear that the Dahua system presented by Champion Security met our brief. The system installed has changed the way we monitor and protect our asset, and its ease of use has been a revelation to our site staff.” A spokesperson from Champion Security Installations added, “We have worked with the management of Fort Dunlop for a number of years now, so we designed the new IP CCTV system in consultation with them. The aim was to meet all of the different security, health and safety criteria, as well as ensure ease of use for the operators. Having installed Dahua equipment at a number of sites, we invited them to assist with the design of the Fort Dunlop system using a number of their new products. Working in conjunction with Dahua and Oprema Ltd, the project was delivered on time and within budget.”
UK perimeter solutions manufacturer, Jacksons Fencing, has recently completed a project at Portsmouth Retail Park, the latest addition to Portsmouth City Council’s investment portfolio. The £17m development aims to generate up to £1m a year for local services, create jobs and contribute to the city’s revitalisation. Development and construction firm Simons Group undertook the 70,000 sq. ft. build while Jacksons Fencing won the tender to supply and install fencing and access control for the perimeter of the service areas and plant and bin stores. A secure perimeter was important, as any disruption to the service areas would negatively impact day-to-day operations. Air conditioning units, loading areas and bin stores can be vulnerable to vandalism and anti-social behaviour, so protecting these areas against unauthorised access not only prevents accidents and theft, but also ensures operational efficiency and protecting businesses from financial loss and liability. Jacksons Fencing also installed two single leaf and four double leaf EuroGuard swing gates, which seamlessly match the perimeter fencing Balancing security and aesthetics While the retail park and the stores within the development need protection, it is also a public space that depends on attracting shoppers, and so required a welcoming aesthetic. To fulfil these requirements, 100m of Jacksons EuroGuard Regular fencing at 3m high was installed. Ideal for commercial properties, EuroGuard Regular is able to secure the premises without appearing imposing or fortress-like. Its anti-climb design and vandal-proof panel to post fixings give the panels the strength and rigidity to effectively demark public and private spaces, deter potential intruders, or simply keep shoppers and young children out of harm’s way. To provide efficient access for staff, delivery and service vehicles, Jacksons Fencing also installed two single leaf and four double leaf EuroGuard swing gates, which seamlessly match the perimeter fencing. Turnkey security support Head of Commercial Sales at Jacksons Fencing Cris Francis comments: “Simons Group is one of the biggest names in retail construction and development, so this is a significant project for Jacksons, and testament to the high quality of our products and expertise of our team.” Brian Hodgkin, Commercial Manager at Simons Group, adds: “It’s obviously crucial that our projects are properly secured and we were pleased to work together with Jacksons to ensure security on the Portsmouth Retail park was of the highest standard.” Jacksons Fencing designs and manufactures high-quality security fencing and has a wide range of perimeter solutions ideal for a variety of projects. Their team of technical and engineering experts have worked on many different bespoke projects, providing full turnkey support to meet any requirements their clients have.
Security has become one of the priorities to be focused on for the operation of commercial buildings because many people come in and out of the buildings every day. IP surveillance solutions are particularly essential for those commercial applications generally used in a wider and more open areas, owing to the requirement of system scalability. Surveon commercial solutions, including high-reliability cameras with wide monitoring area, feature-rich CMS with multiple access as well as RAID NVR with flexible storage expansion. These enterprise solutions help commercial buildings to prevent the incidents such as thefts or other illegalities, effectively safeguarding the property and profits in time. Enhanced storage and data security When designing a suitable surveillance system, commercial buildings might encounter some major challenges such as open field and wide monitoring area. Under such circumstances, Surveon’s 3-megapixel camera will be the best solution. Surveon’s RAID NVR allows users to scale up the storage capacity through iSCSI (SAN/NAS) and JBOD It provides 1.5-time larger monitoring range at 30 FPS, offering a cost-effective option for monitoring wide areas. Besides, Surveon cameras are with industrial-grade components and 3-year warranty to ensure long-term operations. Its quality can be proved by the extremely low RMA rate, and reliability can be assured. The data protection of recorded videos and the flexible expansion of storage capacity for future scale up are of great importance to the planning of commercial surveillance. Surveon’s RAID NVR allows users to scale up the storage capacity through iSCSI (SAN/NAS) and JBOD, bringing commercial buildings a convenient and budget-saving option that they can expand storage capacity by demand or yearly budget instead of buying entire system at the beginning. Efficient management with reduced risk Surveon’s enterprise Central Management Software provides superior features including interactive video walls, matrix screen displays, centralised alarm management, and high scalability for thousands of cameras and multiple clients, allowing the management level and the security guards to keep every detail under control and review both live and stored videos through browsers or mobile applications anytime, anywhere. Surveon was chosen as the supplier of a comprehensive networked security solution for KL Tower, the highest building in Malaysia. The security project manager for the KL Tower said, “Surveon’s full end-to-end integration, including enterprise VMS and storage that supports up to 300TB, helps us manage the project in the most efficient way and brings the lowest risk.” Surveon's commercial solutions have also been deployed at Historic Buildings in Poland, ISP server rooms in Taiwan, and the building of airline catering service provider in Hong Kong.
Round table discussion
When security topics become a part of current events, it is usually in a negative light. Security generally only becomes news when it fails, sometimes in a dramatic, high profile and tragic way. However, security failures can also shed light on lessons learned and opportunities to improve. Working toward better security can translate into the purchase of more goods and equipment supplied by our market. For additional insights into the intersection of security and current events, we asked this week’s Expert Panel Roundtable: Good news or bad news? How do news reports and/or current events influence the general public’s opinion of physical security?
Employee turnover is a problem for many companies, especially among younger employees who have not developed the philosophy of employer loyalty that was common in previous generations. Nowadays, changing jobs is the norm. The idea of spending decades working for a single employer seems almost quaint in today’s economy. However, excessive employee turnover can be expensive for employers, who are looking for ways to keep their brightest and best employees happily toiling away as long as possible. We asked this week’s Expert Panel Roundtable: How can the physical security market promote better employee retention in a competitive employment environment?
The residential/smart home market is undergoing revolutionary transformation, with a flood of new products and technologies helping to make our homes more connected, easier to manage and, yes, smarter. These massive steps forward provide challenges, and also opportunities, for the security industry, which has played a major role in protecting homes and residents for decades. We asked this week’s Expert Panel Roundtable: How are changes in the residential/smart home market impacting security?