With the need for security guard services growing worldwide, Montreal-based tech startup TrackTik Software Inc., an integrated security workforce management cloud-based software solutions provider, has announced US$ 45 million in financing from Toronto-based Georgian Partners and Montreal-based Caisse de dépôt et placement du Québec (la Caisse). Disruptive AI and Machine Learning Funds will be used to drive new product development — including disruptive artificial...
PSA has announced a partnership with Solutions360, Inc., global provider of business management software for professional systems integrators in the security and audio-visual markets, as a part of the PSA Business Solutions Providers program. PSA members will be able to streamline their business procedures and workflow through the Q360 software, which includes full accounting, project management, job costing, service and dispatch, inventory and sales functions. PSA Business Solutions program &...
Perpetuity Training, part of the Linx International Group, is proud to announce the first graduates from the International Security and Risk Management MSc, developed and delivered by Perpetuity Training in collaboration with the University of South Wales (USW). The ceremony took place in Pontypridd on 17th December 2018. The course addresses the critical issues in security management and combines theoretical knowledge with professional best practice. The MSc can be taken on a part-time (two-ye...
Edward Snowden’s name entered the cultural lexicon in 2013, after he leaked thousands of classified National Security Agency documents to journalists. He’s been variously called a traitor, a patriot, a revolutionary, a dissident and a whistleblower, but however you personally feel about him, there’s one way to categorise him that no one can dispute: He’s a thief. There’s no doubt about it: Snowden’s information didn’t belong to him, and the scary truth...
The American National Standards Institute (ANSI) has appointed Susan Carioti, the vice president of certification, standards and guidelines at ASIS International, to a three-year term as a director-at-large on the ANSI board of directors. Standards and conformance-based solutions As a director-at-large, Carioti will work with members of the board to determine and approve the policies and direction of ANSI’s strategic vision, and in close collaboration with stakeholders from industry and...
Pulse Secure, global provider of secure access solutions to both enterprises and service providers, has announced that the IAIT Lab (Institute for the Analysis of IT components) has completed an extensive test of Pulse Connect Secure, resulting in superb findings across usability, comprehensiveness and interoperability for the market leading VPN solution. Pulse Connect Secure Pulse Connect Secure provides easy, secure, authenticated access for remote and mobile users to corporate resources&mda...
Used for both people and vehicle access, the UHF ISO Combi Card offered by Nortech is a card with a long-range UHF tag and proximity or smartcard technology. UHF ISO Combi Card Designed for use with the uPASS range, the card’s features ensure that only one card is required for both vehicle and building access applications. Based on passive UHF technology, the UHF Combi Card by Nedap is identified up to 10 metres with the uPASS Target, five metres with the uPASS Reach or two metres with the uPASS Access. The card does not contain a battery thereby making it maintenance free, and convenient to use in typical applications including parking areas in combination with building access at gated communities, universities and offices. UHF and proximity/smartcard technology The UHF Combi Card combines UHF technology with proximity or smartcard technology that is used for building access. This combination ensures compatibility and seamless integration with existing access control applications. The UHF Combi Card supports several technologies, these are UHF - Mifare, UHF - Mifare Desfire, UHF - Legic, UHF - EM, UHF - HID prox and UHF - HID iClass. The UHF Combi Card is featured with special security protection to provide data integrity and prevent copying. The card has a thin, ISO format that can be used with several optionally available plastic card holders. The UHF ISO Card is a long-range identification tag that only uses UHF technology for vehicle or people access control. Customised printing of the UHF Combi Card and UHF ISO Card is available on request.
With an extensive background in security and manned guarding, Paul Lotter has been appointed as the Regional Operations Director at UK’s renowned security services provider, Corps Security. Lotter will focus on operations within London and the South of England and is responsible for overseeing all aspects of service delivery to the customer. Security services expert Lotter has almost 20 years of experience working in the security industry. He previously worked with other security service providers, looking after high-profile corporate customers in the South West of England and around Greater London, managing the strategic direction of all the operational security requirements as well as also managing various buildings in the south of England. Commenting on joining Corps Security, Lotter said: “I was so impressed by Corps’ rich heritage that when the opportunity arose, I couldn’t turn it down. Being able to work for an organisation that has the ability to use its profits to support charities each year is truly unique. Corps is able to make a real difference in this way and this is something I’m truly proud to be a part of.” IT security “Corps has a clear vision from the top of the business that everyone is able to get behind. We are a dynamic business helped by our innovative IT security offerings.” Mike Bullock, CEO at Corps Security said: “We’re thrilled to welcome Paul to the team, he’s already implemented positive change and shown his expertise in the sector.”
Hikvision, global provider of innovative video surveillance solutions, has added an ultra HD 32 MP panoramic camera to its award-winning PanoVu camera range. Seamless panoramic image The new DS-2CD6984G0-IH(S)(AC) 32 MP PanoVu Series Panoramic Dome Camera uses four 1/2" Progressive Scan CMOS sensors to deliver a true 180-degree horizontal panorama, as well as a vertical field of view of 95 degrees. The four video images are stitched together by the camera itself, which intelligently outputs a single, seamless panoramic image. Frank Zhang, General Manager of the International Product Marketing Department at Hikvision says, “We are very excited to add this state-of-the-art high definition camera to the award-winning PanoVu family. Organisations with large outdoor areas are continually looking for innovative ways to monitor and protect their premises. Our 32 MP camera gives them some of the most remarkable panoramic and HD monitoring features they’ll find on the market.” HD panoramic video in low-light environmentsThe camera offers impressive HD, with a maximum resolution of 8160 × 3616 pixels The camera offers impressive HD, with a maximum resolution of 8160 × 3616 pixels. Its 32 MP image resolution at 30 fps ensures smooth video image preview and playback. Engineered with low illumination capability and four embedded infra-red LEDs, the DS-2CD6984G0-IH(S)(AC) can continue to deliver HD panoramic video in low-light environments and even under 0 lux conditions, up to a distance of 20 metres. Multiple display modes The camera also has a range of display modes to suit user needs. In addition to the standard 32 MP panorama view, users can choose to output the panoramic image in 8 MP resolution to fit into a corresponding network video recorder. The camera can also deliver four, 8 MP standalone images from each lens, or four images in divided panorama view. Thanks to its broad field of view, the DS-2CD6984G0-IH(S)(AC) is ideal for large, open areas such as stadiums, plazas, entertainment venues and industrial facilities. Just one camera can cover an area that previously required multiple cameras, reducing IP channels. This also makes installation and configuration much easier, faster and potentially more cost-effective.
KnowBe4, provider of the world’s largest security awareness training and simulated phishing platform, announced the results of an independent survey, which found that an overwhelming majority of corporations – 96% – say security awareness training improved their corporate security culture. Further, an 86% majority of respondents say the training lowers the overall risk posed by cyber security scams. These are the findings of the KnowBe4 2018 Security Awareness Training Deployment and Trends Survey, an independent web-based survey that polled 1,100 organisations worldwide in September 2018. The study queried organisations on the leading security threats and challenges facing their firms as cybersecurity attacks increase and intensify. Helping organisations in repelling hacks The survey data showed that security awareness training helps organisations recognise and repel hacks in a majority of instances"“Social engineering – such as phishing scams – now ranks as the number one cause of network hacks, and email is usually the chief culprit,” said Stu Sjouwerman, CEO, KnowBe4. “Security breaches disrupt productivity and put organisations, their data assets, intellectual property, employees and customers in danger. The survey data showed that security awareness training helps organisations recognise and repel hacks in a majority of instances.” The study also polled organisations on the initiatives they’re taking to more proactively combat the growing diversified and targeted cyber threats. The study found that 88% of respondents currently deploy security awareness training tools. The businesses report that security awareness training is an effective mechanism that has an immediate impact on minimising risk and positively changing employee culture. Other top survey findings include: Social engineering was the top cause of attacks, cited by 77% of respondents, followed by malware (44%); user error (27%) and a combination of the above (19%) and password attacks (17%). Some 84% of respondents said their organisations could quantify the decrease in successful social engineering attacks (e.g., phishing scams, malware, zero day, etc.) after deploying security awareness training to their end users after just a few simulated exercises. This is based on 700 anecdotal responses obtained from the essay comments and first-person interviews. On average, respondents reported that social engineering cyber hacks like phishing scams and malware declined significantly from a success rate of 40%-50% to zero to five percent after firms participated in several KnowBe4 security awareness training sessions. Almost three-quarters – 71% of survey participants – indicate their organisations proactively conduct simulated phishing attacks on a monthly, quarterly or weekly basis.
3xLOGIC, Inc., a provider of integrated, intelligent security solutions, and a three-time Deloitte Technology Fast 500™ winner, announced the availability of its portfolio of solutions including infinias access control, VIGIL video management system and TRENDS business intelligence platform into the European market through its sister company, PAC, located in Stockport in the UK. While 3xLOGIC’s solutions have been trusted for many years in North America and beyond, the launch of infinias, VIGIL and TRENDS in the UK represents the first time that the cost-effective, easy-to-use solutions have been made available in Europe, a key new market for 3xLOGIC. Commercial-grade features The launch of the 3xLOGIC solutions meets a fast-growing demand in the European market Whether leveraging cloud or server-based options, 3xLOGIC’s infinias, VIGIL and TRENDS solutions are easy to manage, simple to install and simple to scale, to meet an organisation’s changing needs. “infinias is the original IoT access control system, and it now serves thousands of installations ranging from one to thousands of doors,” said Wayne Jared, VP of Engineering for 3xLOGIC. “Its market-leading design, simplicity, scalability and integration with video have resulted in exponential adoption across all vertical markets including delivering commercial-grade features at a price point for the small-to-medium business market.” Demand in the European market The launch of the 3xLOGIC solutions meets a fast-growing demand in the European market for a solution which is internet-facing with a cloud back-end. These solutions will be available in the UK from November 2018, followed by other European markets in due course, and will be supplied by existing PAC partners who possess the necessary skill set and business model to leverage this exciting technology. Infinias access control is available in four versions: cloud, essentials, professional and corporate, each tailored to specific end user needs and capabilities. Training facility for end-users With an Easy Set-up Wizard to guide users through installation, the application has users up and running in minutes The VIGIL Software Suite provides a powerful, enterprise-grade video management system (VMS) with unrivaled ease of set-up and use. VIGIL Server software is the core program upon which all other 3xLOGIC applications are built. With an Easy Set-up Wizard to guide users through installation, the application has users up and running in minutes. Designed with bandwidth limitations in mind, VIGIL Server utilises 3xLOGIC proprietary RapidStream technology and Substream Motion Detection capabilities to provide high resolution over low bandwidth networks. To support 3xLOGIC’s solutions—infinias, VIGIL and TRENDS—PAC will offer robust after-sales support through telephone and field support engineers based in the UK. In addition, a series of online training courses have been developed to ensure customers can take full advantage of all the features and benefits infinias offers. A dedicated training facility in Manchester will offer hands-on training for end users, while they can also schedule on-site and/or online training to supplement their needs.
PerpetuityARC Training, part of Linx International Group, has launched its new Principles of Security Management course. The three-day classroom course uses case studies and group work to provide a comprehensive introduction to the essentials of corporate security management. It is the first course to be hosted at PD Ports’ training facilities in Teesside, North East England. Access management training The Principles of Security Management course is ideal for security managers, security supervisors, multi-tasked managers (for whom security is not their primary role) and those seeking to make a career in security management. The course content includes: Security risk measurement and management An introduction to security surveying Security design principles Physical security of perimeters and buildings Access management Video surveillance systems Designing loss prevention measures Introduction to investigations A variety of places to study Principles of Security Management is the first course delivered at PD Ports’ training facilitySarah Hayward-Turton, Head of Sales at Linx International Group, states: “Our new Principles of Security Management course provides the fundamental knowledge necessary to understand the elements needed to deliver comprehensive security provision and how they interact.” Principles of Security Management is the first course delivered at PD Ports’ training facility and gives learners an even wider choice of where they can study, whether in Southampton, Oxford, Leicester or the new Teesside location. PD Ports is a shipping and logistics company with a strong footprint in field. Earlier this year Linx International Group announced it would be delivering security training courses in Teesside following market feedback and demand. To launch the course, PerpetuityARC Training is offering Principles of Security Management at the promotional price of £400 (including VAT) per person. The first course will run from 11 to 13 December 2018, with more dates to be announced.
There’s only so much a corporation can do to counteract the threat of a major incident. You can ask everyone to be vigilant and to report anything suspicious, but you cannot stop someone intent on deliberately starting a fire, threatening a work colleague with a knife or something much worse. And of course, most businesses recognise that even routine events – such as burst pipes, IT system failures, extreme weather event or power outages – can have significant consequences unless they are quickly brought under control. Training security officers Governments and organisations across the world are increasingly encouraging businesses to re-assess risks and to plan for and conduct drills for major emergencies. This is driving different agencies and companies to invest in new skills, resources and systems, and encouraging businesses to routinely re-evaluate their emergency response strategies. UK police forces are increasingly training security officers in the public and private sectors on how best to react to potential terrorist incidents For example: UK police forces are increasingly training security officers in the public and private sectors on how best to react to potential terrorist incidents, as part of the UK government’s Action Counter Terrorism programme. And organisations including the Association of University Chief Security Officers (AUCSO) and Higher Education Business Continuity Network (HEBCoN) are developing customised training for their members to improve their own response and business continuity plans. Mass notifications systems Whether an organisation is facing a terrorist attack or a severe weather event, follow up reports consistently identify that the same types of challenges are common to all crisis situations, with similar errors often occurring again and again. Typically, these are centred on three key areas: poor communications, fractured command and control structures, and delayed deployment of resources. Communications skills and technologies clearly play a pivotal role in how effective an organisation is in responding to major incidents, particularly when it comes to assessing the situation and its implications, moving people towards safety and providing updates as an incident unfolds. However, when an organisation is considering its technology options, emergency response and mass notification systems (MNS) are often touted as the ideal platform to deliver all the required critical communications and ongoing updates. UK police forces are increasingly training security officers in the public and private sectors on how best to react to potential terrorist incidents Emergency notification system All the incident reporting, command and control, and communications functions have been brought together on a single platform But, if an organisation does not know exactly where all its staff or students are, and it cannot see the location and availability of its first responders and other emergency coordinators relative to them and the incident, then how useful is it to send a top-down alert to everyone? And what about fast moving or multi-centre incidents, where previously agreed evacuation procedures, recommended actions or mustering points may need to change if an incident takes an unexpected turn? Many organisations may have been lulled into believing that an emergency notification system will allow them to confidently handle all the communications aspects of virtually any crisis. In reality, too many businesses are still unaware that there are now much more sophisticated and proven technologies where all the incident reporting, command and control, and communications functions have been brought together on a single platform. Using live map tracking The benefit of using these advanced and more integrated approaches – often categorised as mobile distributed command and control systems – is that they enable faster and better decision making in a crisis using real-time feedback and two-way dialogue with those closest to the emergency. And they avoid the risks of any potential delays, miscommunications or mistakes that can happen when an organisation is under pressure to respond and often switching between multiple systems. Leading universities and multi-national corporations are already using new mobile/web-enabled platforms to improve their incident response These next generation emergency management platforms have been specifically designed to enable real-time mapping of an organisation’s security assets and its users on a single screen and to fully integrate it with a highly targeted geo-fenced notification capability. The mass notification aspect of the system can then be used to advise specific groups on the best actions to take at their location as an incident develops. The use of live map tracking enables real time mapping of an organisation's security assets Segmented messaging Many leading universities and multi-national corporations are already using these new mobile/web-enabled platforms to plan, manage and improve their incident response, leading to 50% faster reactions and more positive outcomes.During a crisis, users can receive push notifications so the security centre can immediately see their exact location and advise them accordingly The systems have been widely adopted within the higher-education sector, but they are equally applicable to any large company with multiple international sites or those situated in research or corporate campuses where the bulk of assets and people are based in one or more key locations. Typically, systems provide users with a smartphone app that they can use to call for immediate emergency or first aid support when at work, or to report something suspicious which could prevent an apparently minor incident from escalating into a full-scale emergency. During a crisis, users can receive push notifications, SMS and E-mails asking them to open the app if they are not already logged in, so the security centre can immediately see their exact location and advise them accordingly. Supporting dispersed mustering Now that communications can be more nimble, responsive and flexible this can support the increasing numbers of planners are recognising the advantages of dispersed mustering. This is a strategy that has been developed to reduce the risk of secondary attacks on unprotected people complying with instructions to evacuate from premises and gather in what are, effectively, exposed locations. It is now acknowledged that evacuees waiting outside for any length of time are more vulnerable to targeted attacks or to injury, from flying glass for example. With dispersed mustering – a strategy made more effective by these new mobile distributed command and control systems - a building’s occupants can be advised not to go outside, but to move to known safe internal locations. People in each specific area can then be kept regularly updated. Many corporations are now using new mobile/web-enabled platforms to improve their incident response Coordination between response agencies The software platforms can be integrated with an organisation’s fixed security infrastructure to take real-time sharing of information First responders are permanently logged in, so the emergency operations centre can see their exact locations in real-time and can advise what actions to take in mustering people or in setting up and protecting security cordons. Bringing everything together on one platform, with real-time feedback and in a fully integrated system also removes what is often seen as the weakest communication link in managing any major incident: the need to rely on conventional two-way radio as the sole means of communication between the command and control centre and its first responders and other team members on the ground. The software platforms can be integrated with an organisation’s fixed security infrastructure to take real-time sharing of information to a new level for improved collaboration, coordination and communications between users, the incident management team and external agencies. Improving emergency response strategies One of the most powerful features of some of these new systems is the ability to record and view all alerts, responses and the detailed conversations between first responders, emergency coordinators and other parties. This allows the systems to be used to simulate major incidents involving inputs from the emergency services and other key agencies and to ensure the organisation’s crisis management plans have been fully tested against a range of possible incident scenarios.
Video surveillance across the world is growing exponentially and its major application is in both public safety and law enforcement. Traditionally, it has been fixed surveillance where cameras provide live streams from fixed cameras situated in what is considered strategic locations. But they are limited in what they can see given by their very definition of being "fixed." The future of video surveillance includes the deployment of more mobile video surveillance with the benefits it offers. Instead of fixed cameras, this is the ability to live stream from mobile devices on the move such as body-worn cams, drones, motorbikes, cars, helicopters and in some cases, even dogs!Sending drones into the air, for example for missing people or rescue missions, is much more cost-effective than deploying helicopters Advantages of mobile surveillance The advantage of mobile surveillance is that the camera can go to where the action is, rather than relying on the action going to where the camera is. Also, sending drones into the air, for example for missing people or rescue missions, is much more cost-effective than deploying helicopters. The ability to live stream video from cars and helicopters in high-speed pursuits can be used to take some of the operational issues from the first responders on the ground and share that “life and death” responsibility with the operational team leaders back in the command centre. This allows the first responders in the pursuit vehicle to focus on minimising risk while staying in close proximity of the fleeing vehicle, with direction from a higher authority who can see for themselves in real time the issues that are being experienced, and direct accordingly. In addition to showing video live stream from a pursuit car or motorcycle, by using inbuilt GPS tracking, the video can be displayed on a map in real time, allowing a command chief to better utilise additional resource and where to deploy them, through the use of displaying mapping information with real time video feed. It allows police chiefs to make better informed decisions in highly-charged environments. The 4G phone network can now be used with compressed video to live stream cost effectively Application in emergency situations The same is true of first responders in many different emergency situations. Mobile surveillance opens up a new area of efficiencies that previously was impossible to achieve. For example, special operations can wear action body-worn cameras when doing raids, fire departments can live stream from emergency situations with both thermal and daylight cameras, and paramedics can send video streams back to hospitals allowing doctors to remotely diagnose and prepare themselves for when patients arrive at the hospital. How can special operations and emergency first responders live stream video from a mobile camera with the issues of weight, reliability and picture-quality being considered? H265 mobile video compression Law enforcement insists on secure transmissions, and it is possible to encrypt video to the highest level of security available in the public domain The 4G phone network can now be used with compressed video to live stream cost effectively. The issue of course is that 4G is not always reliable. Soliton Systems has mitigated this risk of low mobile quality in certain areas, by building an H265 mobile video compression device that can use multiple SIM cards from different cellular providers simultaneously. H265 is the latest compression technique for video, that is 50% more effective than conventional H264, and coupling this with using multiple “bonded” SIM cards provides a highly reliable connection for live-streaming high-quality HD video. The 400-gram device with an internal battery can be connected to a small action cam, and can live-stream simultaneously over at least three different cellular providers, back to a command centre. Latency is typically less than a second, and new advance improvements are looking to reduce that latency further. Encrypted video transmission What about security? Law enforcement insists on secure transmissions, and it is possible to encrypt video to the highest level of security available in the public domain, i.e. AES256.What about integration into existing video infrastructure at the command centre? It is not untypical for a police force to have an existing video management system (VMS) at their command centre such as Milestone System’s Xprotect. The Soliton range of products are ONVIF-compliant, a standard used by video surveillance cameras for interoperability, allowing cameras and video devices that are ONVIF-compliant to simply “plug&play” into existing video management systems. These mobile transmitters are deployed with law enforcement and first responders across the globe. Their ability to provide secure, full HD quality and highly-reliable video streaming within a small unit, and to enable it to be integrated into the current eco-system that is already installed at the receiving end, has made them a favourite choice with many companies and government agencies.
When asked about what the market should be thinking about in 2018, I am left offering an answer that serves as an urgent call to action: prepare yourself for change! The security industry is soon likely to see a dramatic shift from the traditional segmentation of commercial and residential security. Smart phones, mobile technologies, cloud computing, and having everything provided ‘as a service’ in peoples’ lives means users of buildings have a new set of expectations. In many ways, the coming crosspollination of residential and commercial security offerings means we will have a better idea of best practices. The convenience of residential spaces will combine with the robust security of commercial facilities, for example. But this also means a higher level of demand will be placed on security integrators, facility managers and owners. Operations groups may need to change drastically to offer new technologies. Security as a service is likely to become more common. And new technologies are emerging that will facilitate this change and require new skillsets and expertise. So, what the market should be thinking about right now is: how do we all, collectively, keep up? More critical is finding ways to offer or utilise new technologies and total solutions that make operations easier Ensuring security preparedness As it stands now, in terms of physical security for doors and openings, we are currently in a world where we can secure almost anything. Be it hospital, school, file cabinet, server rack, grain silo or barn that is off the electrical grid, we have a solution for that. So being hyper-aware of your industry, its offerings, and how the products work together is important, as it means every location that needs security can have security. But perhaps more critical is finding ways to offer or utilise new technologies and total solutions that make operations easier, moving security components deeper into a building, facility or campus, and building and leveraging on partnerships where everyone is invested in the other’s success. Here are a few suggestions for addressing these issues. Training in new security solutions Perhaps the biggest change in the near term will be emerging technologies that will alter how we currently use security solutions. Be it cloud-based security, intelligent keys, new types of credentials, or simply a better software for management, the need to be well-versed on these offerings is key. To this end, it is important to not only know what offerings exist in the security world, but also be well-trained on them. Seek out a manufacturer that is willing to offer training and education on products, strategies and solutions. While it is important to secure server rooms at the point of entry, it might also make sense to provide a cabinet lock with audit capabilities on the rack or cabinet itself Identifying an end goal Further, approach the integration and implementation of these technologies with a collaborative mindset. For dealers and integrators this means utilising new technologies to better secure a facility for a client. As a building owner or manager, it means making tenant and occupant life better while streamlining your own operations. The ultimate goal of any new technology is to meet customer needs in the very best possible way. And that goal should trickle down from manufacturer to integrator to the facility manager and ultimately the end user. Don’t just implement technology for the sake of doing so. Do it with purpose by identifying an end goal and utilising these amazing solutions to achieve that. Identifying an end goal also means seeking out the core requirements a building has to provide users with the expected level of security and service. This is obviously dependent on the building, and it doesn’t always mean physically moving into a building, but rather looking at ways to move further into the operations of a business. Securing access to buildings Government facilities are undergoing a transition to security requirements dictated by the FICAM programme For some businesses, keeping server racks or file cabinets secure can be critical. And while it is important to secure these rooms at the point of entry, it might also make sense to provide a cabinet lock with audit capabilities on the rack or cabinet itself. New opportunities also fall into this category. Government facilities are currently undergoing a transition to security requirements dictated by the Federal Government’s Identity, Credential, and Access Management (FICAM) programme. FICAM sets standards for implementation of secure access to all government facilities and mandates the use of FIPS 201 Personal Identity Verification (PIV) for federal employees and contractors. This means that PIV enabled access points will be required on the perimeters, interiors and other openings. Finding ways to retrofit these affordably, efficiently and effectively means offering more secure openings on what is likely to be a tight budget. This can also apply to offsite facilities. Earlier I mentioned barns and grain silos – locations that are often left off electrical grids but can come with the need for auditing capabilities – and a solution exists for that. So, while a corporate headquarters might be under robust lock and key, it is always good to ask about other locations that could use a simple security upgrade. Personal Identity Verification-enabled access points will be required on the perimeters, interiors and other openings Establishing security partnerships Again, the best way to achieve readiness with this approach is to be aware of the market and its offerings, and to engage in collaborative partnerships. Collaborative partnerships are critical for everyone who is tasked with protecting the people and places that matter most. Manufacturers rely on the integrators and building supervisors to understand the new and developing needs in the industry. Integrators then must rely on manufacturers to provide these solutions, offer education and training, and be in constant contact about the newest technologies available. Collaborative partnerships are critical for everyone who is tasked with protecting the people and places that matter mostAnd building owners or managers must both be aware of their tenant and end user needs and demands – be it for new technologies or even seeking out sustainability solutions. In turn, they need to know they can rely on a collaborative approach from an integrator and manufacturer who is invested in their success. Industry collaboration for a secure future Again, the biggest thing we must all need to consider now is how to prepare for the future. Treading water is simply not enough in the security market anymore. New technologies and performance expectations are forcing us to consider ways to better serve our clients – whether we are a manufacturer, integrator or in charge of facilities. And the best way to do this is together. We are all invested in the success of one another, and in the people who use the places we strive to keep safe. By seeking out, developing, and cultivating these partnerships in collaboration and innovation, we are able to help one another prepare for the future that is becoming more complex, intriguing and exciting every day.
One factor aggravating concerns about workplace violence in corporate America is the easy availability of firearms. In many states, citizens, including employees, have the right to carry firearms onto a company’s property even though firearms are prohibited in the workplace. In effect, an employee prone to violence may have a firearm as near as their vehicle in the company parking lot. Currently, 23 states in the U.S. have so-called “parking lot storage” laws, which enable employees to store firearms in their vehicle’s trunk or glove box despite any corporate ban on weaponry. The laws have evolved as an expression of the Second Amendment “Right to Bear Arms” in the last decade or so. There is some variance in the laws from state to state, but they generally allow a citizen to carry a gun to and from work and keep it stored out of sight in their vehicle. Global Security Exchange (GSX) is the new branding for ASIS International’s annual conference and trade show Employee Second Amendment rights “The laws contend that employees should not have to give up their Second Amendment rights between home and the workplace and should be able to have a gun with them for protection from their front door at home to the front door of the workplace,” says Eddie Sorrells, Chief Operating Office/General Council of DSI Security Services. Sorrells will speak about the current state of the laws, how they came about, the nuances of state-to-state differences, and the possible impact on overall corporate security in a session titled “Employees Who Carry: Preventing Workplace Violence” at the upcoming GSX conference in Las Vegas, 23rd - 27th September. Global Security Exchange (GSX) is the new branding for ASIS International’s annual conference and trade show, attended by more than 22,000 security professionals from 100-plus countries. Sorrells’ session will be Sept. 24 from 10:30 to 11:45 a.m. Restrictions on gun visibility Employees may think the “right to carry” extends to the workplace, but the right only extends to the parking lot. The company still has the right to ban guns inside the premises. However, it is unlawful in some states for companies to search vehicles in parking lots, and companies who do so are violating the law, says Sorrells. Among the various state laws, some exempt public education institutions and other public venues. Depending on how the laws are written, there may be other exemptions, too. In Florida, for example, the law exempts any organisations that have explosives on site. With weapons on a company's property, a high-risk termination could potentially become violent Most laws require weapons to be stored securely out of sight. However, in Alabama, for example, it is legal to store validly permitted guns in full view during hunting season, Sorrells says. A resident of Alabama himself, Sorrells has been in the contract security business for 27 years, working mostly in multi-state operations. He has worked for 500 or so corporate security organisations throughout the country and is a practicing attorney who has studied issues of workplace violence and active shooters. “There is a political element to these laws, which were created with the goal of protecting Second Amendment rights,” says Sorrells, who says he sees arguments on both sides of the issue. However, political opinions aside, “if you’re a business owner, you have to contend with dozens of weapons on a company’s property,” he adds. “That could be an issue if a high-risk termination could potentially become violent. You have to assume there is a weapon in that person’s vehicle.” Sorrells' session will dive into the case law and illuminate some of the legal issues and how courts have addressed them GSX education program After the session, Sorrells hopes attendees will take away a good working knowledge of the state of the laws, how to comply with the laws, and issues such as posting of signs. The session will dive into the case law and illuminate some of the legal issues and how courts have addressed them. The timely session is an example of the valuable information attendees can gain by attending GSX. Sorrells has been attending the yearly ASIS International Conference and Exhibits for more than 20 years, at least since the mid-1990s. As the pre-eminent security organisation around the world, ASIS International provides unrivalled educational and networking opportunities at the yearly conference, he says. “There is a vast amount of networking and educational offerings on a wide variety of topics, including technology, legal issues, risk management, workplace violence, consulting, and anything under the sun,” says Sorrells. The newly branded GSX education program is led by subject matter experts from ASIS International, InfraGard (a public-private partnership between U.S. businesses and the Federal Bureau of Investigation), and ISSA (Information Systems Security Association). Sessions will deliver valuable, actionable takeaways to help attendees shape their security strategies. There will also be an exhibition of 550-plus suppliers and manufacturers highlighting the latest security solutions.
Twitter has around 350 million active users a month, all eagerly posting 280-character “tweets” about the world around them. It’s a vast amount of data from all over the globe. Security professionals have begun to appreciate the value of mining all that data for insights to help them protect people, assets and operations. One company leveraging the Twitterverse to provide real-time situational awareness to corporate security end users is Dataminr.Dataminr assembles this information flow into a useful timeline that summarises the ongoing sequence of events Algorithms for actionable security signals The New York-based technology company has developed algorithms that comb through the full Twitter dataset to provide actionable signals to security professionals around the world about security-related events as they unfold. For corporate security, early information about an unfolding event enables them to take action faster in order to secure their people, locations and business operations. “OMG! Just heard a loud bang on the quad,” a tweet might declare. Combined with location information gleaned from a mobile phone, such a tweet could be the first indicator of an unfolding security incident. As an event unfolds, hundreds of such tweets are likely to be posted from the surrounding areas, collectively offering a running narrative of developing events. Dataminr assembles this information flow into a useful timeline that summarises the ongoing sequence of events. Many times, tweets are the first information available from an incident even before the arrival of first responders.Dataminr’s information is provided in a variety of platforms, from a web-based dashboard to a mobile app or notification via email “Early notification allows security professionals to be more proactive,” says Dillon Twombly, SVP, Corporate Sales at Dataminr. “We have a broad range of users across Fortune 1000 companies, and also including country security managers, security operations centers, and executive protection. "In retail, we provide information for security operations or loss prevention. Events sometimes have a potential to spin out of control, and we allow security professionals to react faster and get ahead of an event proactively.” Various security platforms Dataminr’s information is provided in a variety of platforms, from a web-based dashboard to a mobile app or notification via email. The system can be integrated with a company’s workflow, and the software interfaces with various security platforms, such as physical security information management (PSIM) systems. Another corporate use for Dataminr is in public relations, where social media could be a source of misinformation or rumors about an issue or event Dataminr addresses all regulatory and legal concerns, and it is GDPR-compliant. However, privacy is generally not a big concern because Twitter data is posted publicly, and Dataminr gleans information related to a specific event, not a specific Twitter user’s individual data. “Over the past couple of years, we have grown the security vertical,” says Twombly. “The market is receptive to the value of social media as a tool for users tasked with responding in a comprehensive way to a range of issues.”The company’s services are useful across the full range of vertical markets in the security industry Public safety and security In addition to security and public safety applications, Dataminr also provides services to financial companies and even media outlets. In fact, the 9-year-old company started in finance, where stock or currency traders were able to leverage breaking news notifications to make decisions faster. In the media vertical, Dataminr provides information to 500 newsrooms globally. Public safety and security uses have evolved, and Twombly currently spearheads the company’s work in corporate security, calling on his experience in the security world. Another corporate use for Dataminr is in public relations, where social media could be a source of misinformation or rumors about an issue or event.Customers can customise the kind of information they want to receive, and Dataminr algorithms use the full publicly available data set of Twitter Tracking Twitter posts enables a company to get ahead of an evolving story and help to shape the narrative. Twombly says Dataminr has “deep and broad relationships” with corporate customers and delivers information that can possibly be used by multiple departments in an organisation. The company’s services are useful across the full range of vertical markets in the security industry, from transportation to major industrials to financial services to energy. In the education vertical, major universities are customers, as are local school districts. Customers can customise the kind of information they want to receive, and Dataminr algorithms use the full publicly available data set of Twitter. Twombly says the company’s software is constantly evolving and being fine-tuned in response to changing needs. Dataminr is a “strategic partner” of the social media giant and works closely with them on product development, he adds.
Cybersecurity talk currently dominates many events in the physical security industry. And it’s about time, given that we are all playing catch-up in a scary cybersecurity environment where threats are constant and constantly evolving. I heard an interesting discussion about cybersecurity recently among consultants attending MercTech4, a conference in Miami hosted by Mercury Security and its OEM partners. The broad-ranging discussion touched on multiple aspects of cybersecurity, including the various roles of end user IT departments, consultants, and integrators. Factors such as training, standardisation and pricing were also addressed as they relate to cybersecurity. Following are some edited excerpts from that discussion. The role of the IT department Pierre Bourgeix of ESI Convergent: Most enterprises usually have the information technology (IT) department at the table [for physical security discussions], and cybersecurity is a component of IT. The main concern for them is how any security product will impact the network environment. The first thing they will say, is “we have to ensure that there is network segmentation to prevent any potential viruses or threats or breaches from coming in.” The main concern for IT departments is how any security product will impact the network environment”They want to make sure that any devices in the environment are secure. Segmentation is good, but it isn’t an end-all. There is no buffer that can be created; these air gaps don’t exist. Cyber is involved in a defensive matter, in terms of what they have to do to protect that environment. IT is more worried about the infrastructure. The role of consultants and specifiers Phil Santore of DVS, division of Ross & Baruzzini: As consultants and engineers, we work with some major banks. They tell us if you bring a new product to the table, it will take two to three months before they will onboard the product, because they will run it through [cybersecurity testing] in their own IT departments. If it’s a large bank, they have an IT team, and there will never be anything we [as consultants] can tell them that they don’t already know. But we all have clients that are not large; they’re museums, or small corporations, or mom-and-pop shops. They may not be as vulnerable from the international threat, but there are still local things they have to be concerned about. It falls on us as consultants to let them know what their problems are. Their IT departments may not be that savvy. We need to at least make them aware and start there. Wael Lahoud of Goldmark Security Consulting: We are seeing more and more organisations having cybersecurity programs in place, at different maturity levels. At the procurement stage, we as consultants must select and specify products that have technology to enable cybersecurity, and not choose products that are outdated or incompatible with cybersecurity controls. We also see, from an access control perspective, a need to address weaknesses in databases. Specifying and having integrators that can harden the databases, not just the network itself, can help. The impact of physical security products on the network environment was a dominant topic at the MercTech4 consultants roundtable discussion The need for standards on cybersecurity Jim Elder of Secured Design: I’d like to know what standards we as specifiers can invoke that will help us ensure that the integrator of record has the credentials, knows what standards apply, and knows how to make sure those standards are maintained in the system. I’m a generalist, and cybersecurity scares the hell out of me.We’re not just talking about access to cameras, we are talking about access to the corporate network and all the bad things that can happen with that. My emphasis would be on standards and compliance with standards in the equipment and technology that is used, and the way it is put in. It can be easier for me, looking at some key points, to be able to determine if the system has been installed in accordance. We are seeing more and more organisations having cybersecurity programs in place, at different maturity levels"I’m taking the position of the enforcement officer, rather than the dictator. It would be much better if there were focused standards that I could put into the specification— I know there are some – that would dictate the processes, not just of manufacturing, but of installation of the product, and the tests you should run accordingly. Pierre Bourgeix: With the Security Industry Association (SIA), we are working right now on a standard that includes analysed scoring on the IT and physical side to identify a technology score, a compliance score, a methodology, and best-of-breed recommendation. Vendor validation would be used to ensure they follow the same process. We have created the model, and we will see what we can do to make it work. Terry Robinette of Sextant: If a standard can be written and it’s a reasonable process, I like the idea of the equipment meeting some standardised format or be able to show that it can withstand the same type of cyber-attack a network switch can withstand. We may not be reinventing the wheel. IT is the most standardised industry you will ever see, and security is the least standardised. But they’re merging. And that will drive standardisation. Jim Elder: I look to Underwriters Laboratory (UL) for a lot of standards. Does the product get that label? I am interested in being able to look at a box on the wall and say, “That meets the standard.” Or some kind of list with check-boxes; if all the boxes are checked I can walk out and know I have good cybersecurity threat management. IT is the most standardised industry you will ever see, and security is the least standardised" The role of training Phil Santore: Before you do any cybersecurity training, you would need to set the level of cybersecurity you are trying to achieve. There are multiple levels from zero to a completely closed network. Wael Lahoud: From an integrator’s perspective, cybersecurity training by the manufacturer of product features would be the place to start – understanding how to partner the database, and the encryption features. We see integrators that know these features are available – they tick the boxes – but they don’t understand what they mean. Cybersecurity is a complex topic, and the risk aspects and maturity levels vary by organisation. That would be a good starting point. The role of integrators Wael Lahoud: Integrators like convenience; less time means more money. So, we see some integrators cut corners. I think it is our role (as consultants) to make sure corners are not cut. If you rely solely on integrators, it will always be the weak password, the bypass. We have seen it from small projects to large government installations. It’s the same again and again. Even having an internal standard within an organisation, there may be no one overseeing that and double-checking. Tools will help, but we are not there at this point. I will leave it up to manufacturers to provide the tools to make it easy for consultants to check, and easier for integrators to use the controls. Cybersecurity is a complex topic, and the risk aspects and maturity levels vary by organisation - so training is very important The impact of pricing Pierre Bourgeix: The race to the cheapest price is a big problem. We have well-intended designs and assessments that define best-of-breed and evaluate what would be necessary to do what the client needs. But once we get to the final point of that being implemented, the customer typically goes to the lowest price – the lowest bidder. That’s the biggest issue. You get what you pay for at the end of the day. With standards, we are trying to get to the point that people realise that not all products are made the same, not all integrators do the same work. We hope that through education of the end user, they can realise that if they change the design, they have to accept the liability.It’s not just the product that’s the weakest link, it’s the whole process from design to securing that product and launching it" The big picture Wael Lahoud: The Windows platform has a lot of vulnerabilities, but we’re still using it, even in banks. So, it’s not just the product that’s the weakest link, it’s the whole process from design to securing that product and launching it. That’s where the cybersecurity program comes into play. There are many vulnerable products in the market, and it’s up to professionals to properly secure these products and to design systems and reduce the risk. Pierre Bourgeix: The access port to get to data is what hackers are looking for. The weakest link is where they go. They want to penetrate through access control to get to databases. The golden ring is the data source, so they can get credentialing, so they can gain access to your active directory, which then gives them permissions to get into your “admin.” Once we get into “admin,” we get to the source of the information. It has nothing to do with gaining access to a door, it has everything to do with data. And that’s happening all the time.
Texas A&M University-San Antonio (A&M-SA) has become the first university in the world to deploy an Indoor Positioning Solution across its entire campus for the purpose of providing the safest possible environment. The SafeZone indoor positioning solution, provided by CriticalArc, provides the campus police with an unprecedented three-dimensional view of multi-story buildings. For example, instead of receiving an alert about ‘an incident somewhere in the student union building’, they get pinpoint specifics, such as ‘it’s on the fourth floor, west wing, outside room 410’. "With indoor positioning and SafeZone, we're able to provide a faster response time, whether it's a medical emergency or an active shooter,” says Roger Stearns, A&M-SA’s assistant chief of Police, featured in this video. The entire police department benefits from advanced features such as heat mapping and incident playback to optimise performance" Safer environment for students The university’s Chief of Police Ron Davidson wanted to innovate with this full-coverage system because the campus was expanding, including a newly completed residence hall, which meant having students around the clock for the first time in A&M-SA’s history. He was committed to ensuring a safer environment for students, staff and visitors. In addition, Chief Davidson was in search of a common operating view that would provide the Emergency Operations Center and all officers on patrol a real-time location of all available officers and volunteers, as well as showing the location of all incidents ̶ essential for coordinating first responders and the Campus Community Emergency Response Team (CCERT). Heat mapping and incident playback “SafeZone is essential technology to position your organisation on the cutting edge of campus law enforcement. The real-time common operating view both enhances officer safety and acts a force multiplier. Plus, the entire police department benefits from advanced features such as heat mapping and incident playback to optimise performance,” Davidson said. Texas A&M-San Antonio has adopted the indoor positioning solution as a standard and will deploy it in all future buildings on campus. The solution is fully supported by the University’s Information Technology department and has been assessed for additional applications to enhance the student experience including wayfinding and research by academics in the newly completed Science and Technology building. Easy to maintain wireless installation The process to get the SafeZone indoor positioning solution deployed is a simple one, as it’s a wireless installation and easy to maintain"SafeZone was easy to deliver with no disruption to the campus. It was deployed in a matter of weeks during the summer break. “The process to get the SafeZone indoor positioning solution deployed is a simple one, as it’s a wireless installation and easy to maintain,” added Stearns. Organisations can install wireless, wearable duress alarms able to pinpoint anyone anywhere on campus as an alternative to fixed, expensive, wired panic alarms. Among other capabilities, SafeZone allows users to get the most rapid help simply by activating an alert, using an app or a wearable duress alarm. As soon as the alert is triggered, the location and details of the user are streamed to the monitoring team, allowing officers to coordinate a smarter, more targeted response. By enabling responders to visualise the precise location of an incident, anywhere on campus, SafeZone is much more powerful than traditional, fixed panic alarms and blue light telephones, which are more expensive to install and less accurate in operation. SafeZone public safety solution Glenn Farrant, Chief Executive Officer, CriticalArc, notes; “I’m delighted by the close partnership between A&M-SA and CriticalArc resulting in this ground-breaking implementation of the SafeZone public safety solution. Chief Davidson and his team are at the forefront of using this technology and we are pleased to be helping them improve the quality of life, and the learning experience, for everyone on their campus.” The SafeZone indoor positioning solution is commercially available worldwide for a range of university, hospital, enterprise and finance applications and is being deployed in more than 80 countries worldwide.
Jutting up to a height of 126 meters, the 36-story Prime Tower is Zurich’s tallest building and number two in Switzerland. Its 40,000 square meters of floor space can accommodate more than 2,000 workplaces. It is striking with its futuristic architecture and dark green reflective exterior. The tower’s impressive details include a 10-meter-high entrance hall and the CLOUDS bar and restaurant on the top floor boasting an unmatched view far out across the surrounding landscape. Bosch networked security solution The operator relies on Bosch to keep the building safe and secure. And to meet the Prime Tower’s unique requirements, the company’s experts recently implemented a modernisation project. One of the new system’s technical highlights is a combination of electronic and biometric access control. “Our owner, the firm of Swiss Prime Site Immobilien AG, attaches great importance to monitoring who exactly is inside the building at all times,” explained Annika Hammes, who heads the trustee department at Wincasa, a building services outfit that was contracted to design and execute the solution. Electronic and biometric access control Error-free biometric identification is accomplished by reading the vein patterns on the backs of people’s hands Error-free biometric identification is accomplished by reading the vein patterns on the backs of people’s hands. This is done contactlessly for very easy, comfortable use. A total of 120 hand vein readers have been installed in the building and connected to the controllers of the eight elevators. Once employees and guests have been biometrically registered, they board lifts that automatically take them to the right floors. Encrypted ID cards are used to access the rental units, thereby making sure that people can only enter zones for which they have been authorised. All relevant security information is collected in a management system so that the responsible employees always have everything in view and can respond quickly when there is a need. Bosch handled everything for this project: advising the client, and then planning and implementing the system. The modifications were made without interrupting use of the building, which was a major challenge not only for the project team, which therefore had to work very swiftly, but also for the tenants themselves. “This called for very close cooperation between the Bosch team and the mixed-use site management (MUSM) team of Wincasa AG, which met the requirements for continued building use while the work was ongoing,” explained Hammes.
Living in the era of global village, everything is rapid change. To keep up with the pace, the large-scale enterprises need to take every movement of branches in control, ensuring every policy has delivered well. HQ-Branch management, including central control, alarm synchronisation, data retention and protection is becoming a great important challenge to enterprises nowadays. Without integrating lots of systems and management tools, Surveon HQ-Branch security solutions provide VMS with easy remote deployment, advanced VA for alerts and post events search, storage with large capacities for 365-day recording, and local /remote replication through NAS or ISCSI, supporting headquarters (HQ) to easily manage all branches. Surveon Control Center and Enterprise NVRs Surveon Control Center provides enterprises with an easy remote deploymentUnlimited number of cameras, users, NVRs, and monitors are supported in one domain architecture, Surveon Control Center (SCC), which provides enterprises with an easy remote deployment. Its monitor wall can be set up with any combination of camera views, making HQ can be easier awarded every branch's movements. Surveon NVR embedded 12 Video Analytics which can identify and initiate alerts for various user-defined events, offering effective monitoring, detections, alerts, and responses to events for enterprises. For example, intrusion detection can prevent uninvited people from entering the sensitive areas. Moreover, the advanced Post VA Search provides enterprises an efficient tool to quickly identify useful information and relative footage from hundreds of hours of video recording, reducing the time and efforts of HQ security manager, making HQ-branch surveillance system more efficient. Data retention and storage Surveon Enterprise NVRs provide large capacities for 365-day non-stopping recordingThe data retention of recorded videos and the system which can support hundreds of camera records are of great importance to the planning of enterprise surveillance. Surveon Enterprise NVRs provide large capacities for 365-day non-stopping recording, fulfilling the long-time storage requirements from enterprises. Surveon NVR supports remote replication through NAS or ISCSI. Enterprise can keep 1st copy in local branch and 2nd copy in remote HQ. If the source data fails due to system malfunctions or disasters, enterprise can leverage the remote copy to restart services in a few minutes. Software integration Agribank, the largest commercial bank in Vietnam, and House Green, a home improvement retail chain in Taiwan, has adopted Surveon HQ-branch solutions. “Different from PC-based NVR solutions, Surveon adopts a system design fully customised for surveillance applications. This offers higher value for SIs, including advanced levels of integration and stability.” said the Sales Director of Surveon partner in Vietnam.
Above the Line Security have improved the safety of their at-risk employees by switching from a manual call-in system to the user-friendly StaySafe lone worker solution. Employees at Above the Line Security are responsible for guarding individuals and high-value equipment on busy film sites. Ensuring employee safety StaySafe allows workers on site to send an alert in an emergency while providing the employee with an accurate location via a real-time map Prone to theft and coming into contact with potentially volatile paparazzi and members of the public, the company required a more reliable way of monitoring the safety of their guards. StaySafe allows workers on site to send an alert in an emergency while providing the employee with an accurate location via a real-time map. Monitors are alerted if an employee triggers an alert or fails to check-in on the app during their shift. StaySafe StaySafe also provides the ability for an alert to be raised even during difficult situations. If engaged in a confrontation, a panic can be sent discreetly, or a duress PIN entered if the app is discovered by the aggressor. Missed check-in alerts will also alert a monitor in cases where the lone worker may be unable to send a panic themselves. “Having used an app for the first time to protect our lone workers, we were incredibly impressed by the ease and agility of set up and usability. Our employees have adapted quickly to using the app whenever they work and as they do not always come to the office, it allows them to set up for the day quickly and independently.” Lone workers’ safety Security Personnel are often targets for verbal and physical abuse due to the nature of the work they carry out" Adele O’ Toole at Above the Line, continues; “Previously, we had to rely on night supervisors based in external locations to take check-in and emergency calls manually. This proved expensive and disconnected, particularly if our lone workers were situated in areas of low signal where making contact to ensure their safety was infrequent and unreliable. With StaySafe, we are able to instantly locate our workers on a map once they have checked-in, even in areas of low signal, saving us a lot of time and human resources.” Don Cameron, CEO at StaySafe adds; “Security Personnel are often targets for verbal and physical abuse due to the nature of the work they carry out. They often protect valuable assets which leads to the potential risk of theft and aggression. StaySafe provides peace of mind for the lone workers and the business by providing an effective and reliable solution for a range of volatile situations. Organisations can see exactly where their staff are in the case of an emergency and can send assistance directly to them – all with the added bonus of being user-friendly and cost-effective, only requiring a mobile phone.”
Aeroturn LLC, a turnstile manufacturer that offers 100% Made in The USA turnstiles, announced that the company was selected by Alliance Security to deliver a state-of-the-art turnstile solution for a high-profile New York based global media giant. Alliance Security is headquartered in New York and deploys a portfolio of security technology installation and managed service offerings. Alliance Security’s parent company, Alliance Building Services is comprised of Alliance Maintenance, Alliance Security, Alliance Restoration, Alliance Electrical and Alliance Painting & Flooring, which services over 60 million square feet of building space in the New York Tri-State region. Alliance Building Services holds an immense portfolio of clients across diverse industries that includes some of the highest profile organisations and real estate properties in the world. Security and technology solutions With an evolution spanning decades, Alliance Security has become an industry expert in security and technology solutions and was in the market for a turnstile manufacturer that demonstrated a trusted record of delivering reliable solutions to high-profile clientele. Aeroturn fit the bill perfectly. “Once Aeroturn U.S.A. validated they could accommodate and deliver technical and operational excellence in engineering and design, the Alliance Security management team was confident in selecting Aeroturn U.S.A. as the best strategic partner to deliver for our client,” states Simon Torres, Alliance Security’s head of Engineering Services. Alliance Security will now turn to Aeroturn U.S.A. in the future when seeking a reliable turnstile manufacture" For this particular project and scope, Aeroturn delivered a unique turnstile solution that complied with operational expectations and standards with products manufactured in the U.S.A. Further commenting on deployment success, Simon Torres from Alliance Security states – “Alliance Security and Aeroturn USA architecture and design needed to account for multi-area ingress and egress considerations with the goal of enhancing the employee and visitor experience – and we are happy to announce that our mission was accomplished seamlessly. Since we can classify this deployment as a tremendous success, Alliance Security will now turn to Aeroturn U.S.A. in the future when seeking a reliable turnstile manufacture that delivers design, operational and technical excellence.” Zero-maintenance turnstiles Aeroturn designs, manufacturers, tests, delivers, and installs the world’s only zero-maintenance standard and customised turnstiles. “We are extremely proud to have been selected by Alliance Security for this prestigious project and look forward to a long and prosperous strategic partnership in the future,” states Michael Stoll, VP of Technical Sales & Marketing at Aeroturn. The company’s customer first philosophy is the driving force behind its success. Customers and strategic partners like Alliance can rely on Aeroturn to deliver the very best in turnstile solutions.
As one of the largest IT companies in Scandinavia, EVRY provides comprehensive computing, IT consulting, and business solutions to Nordic companies, financial institutions, public sector entities, and health authorities. While security at EVRY facilities is paramount, so is maintaining a leadership brand and accommodating a high flow of staff and visitors. Boon Edam security doors Entrances of EVRY facilities must provide a high level of security given the value and sensitivity of the work they do, as well as the presence of clients’ intellectual property and other data. Management was looking for entry designs that would not only provide a secure entry way, but would also display excellence in design, innovation and quality – elevating and supporting the overall perception of the firm for both staff and visitors. The EVRY security team quickly zeroed in on Boon Edam as a premium entrance provider. When they heard that many Boon Edam entrances could be customised to meet aesthetic objectives or to match desired colors and finishes, they were compelled to come and see the samples in person. Bravida system integrator Bravida, the system integrator who installed the Lifeline Speedlane Swing speed gates integrated them with cutting-edge access control technology Bravida, the system integrator who installed the Lifeline Speedlane Swing speed gates integrated them with cutting-edge access control technology that communicated with security personnel. The combination of this physical and technological access control delivered a highly effective solution that met EVRY’s needs for both staff and visitor access control. “The reception area of an IT company like EVRY was an ideal application for the Lifeline Swing speed gates,” explains Daan Van Beusekom, Product Manager Security Access, Royal Boon Edam. “The sleek, high-tech design of the turnstiles support EVRY’s brand positioning, and they provide a high-throughput, secure solution that meet EVRY’s demanding access requirements. The turnstiles also integrate with leading access control systems, making it easy to tie them in with EVRY’s existing security strategies and systems.” Lifeline Speedlane Swing speed gates The Lifeline Speedlane Swing speed gates are available in a wide selection of dimensional and glass choices to support a range of needs, such as higher security levels or disabled access. It features a slim form factor that creates an almost invisible gateway – instantly conveying an impression of sleek design that is reinforced by futuristic light pulses that guide user actions. Available in a range of colors and finishes, it can be customised to blend in or stand out, depending on the need for the installation.