Security screening and detection technology expert Rapiscan Systems has completed its largest single install of the new Orio Metor 900M walkthrough metal detector and its 920CX X-ray scanner. This substantial installation provides additional security and protection to over 80 facilities in Washington DC. The Metor 900M is an advanced upgrade on its predecessor the 600 series, which has been used in these facilities for the past five years. The upgrade consists of a complete redesign from the gr...
Two members of the Hardstaff Barriers team have been shortlisted for national apprenticeship awards due to their commitment and achievements at work. Rhiannon McGhee, Apprentice Health, Safety, and Environment Technician, has been nominated for ‘Apprentice of the Year’ and Kathryn Cooper, Service Manager, has been nominated for ‘Apprentice Champion of the Year’ in the National Apprenticeship Awards 2021 for the East Midlands region. About Hardstaff Barriers Hardstaff B...
A report launched by Menlo Security, a pioneer in cloud security, highlights growing concerns about securing users as the trend for hybrid and remote working is set to remain. The new report – which surveyed 500+ IT decision-makers in the U.S. and the U.K., includes a third at C-level – looks at attitudes to securing remote access to applications and resources and the adoption of zero-trust solutions. Developing working strategies While most respondents (83%) say they are confiden...
Device Authority, a globally renowned company in identity and access management (IAM) solutions for the Internet of Things (IoT), has announced its latest major software release, which includes KeyScaler Edge software solution. The current global market is driving a more mature Edge computing model, with localised AI (Artificial Intelligence) and ML (Machine Learning) becoming more mainstream. However, no solution exists in the market, to address localised Edge gateway IoT security services. A...
Abloy Oy announced ABLOY CUMULUS, a platform for keyless access, combining quality hardware products with secure access and management applications. It brings all the solutions together into a single ecosystem with a risk-free, integrated cloud service. “CUMULUS is our next step in the ‘keyvolution’ — the development in which mechanical keys are transforming into digital ones. We have wrapped our more than one hundred years of security expertise into digital so...
Cymulate, the industry pioneer in SaaS-based Continuous Security Validation (CSV) announced the next generation Extended Security Posture Management (XPSM) platform leveraging its native, Offensive Security technology and capabilities to widely support customers security and business needs. The combination of these new capabilities follows several product launches over the last six months and provides end-to-end validation of an organisation's cyber security posture. XSPM incorporates fo...
Automating the issuance of all enterprise public or private trusted digital certificates through a single platform reduces the risk of certificate mismanagement and associated outages. HID Global, a pioneer in trusted identity solutions, has simplified certificate automation for any Microsoft Active Directory-managed network devices with its PKI-as-a-Service (PKIaaS) platform. Customers can seamlessly issue, renew, replace or revoke certificates automatically with Microsoft Autoenrollment now that any device on the network can easily be connected with HID’s cloud-based PKIaaS via the Microsoft Autoenrollment connector. Cloud-based PKIaaS platform HID Global, through its cloud-based, HID PKIaaS platform that delivers the industry’s broadest range of automation capabilities for managing privately issued and publicly trusted certificates. The platform eliminates manual, risk-prone processes for tracking, installing, and renewing certificates, and provides one secure and convenient cloud-based platform for all certificate needs. Out-of-the-box integration PKIaaS platform’s out-of-the-box integration and Account Certificate Manager enables customers to centrally manage certificates HID Global has simplified how to integrate Microsoft Active Directory-managed network devices with its cloud-based PKIaaS to automate their certificate lifecycles. The HID’s PKIaaS platform’s out-of-the-box integration and Account Certificate Manager enables customers to centrally manage all device certificates across the entire enterprise, either manually or through an active directory or a mobile device management platform, and whether they are issued automatically or manually. Identity and access management solutions Microsoft Active Directory has a 44 percent share of the market for identity and access management solutions. Providing out-of-the-box integration and automation support for it in HID PKIaaS eliminates the need for agent-based certificate distribution and automation. In addition to Microsoft Autoenrollment, HID PKIaaS supports various pre-built integrations with standards-based certificate management protocols including Simple Certificate Enrollment Protocol (SCEP), Enrollment over Secure Transport (EST), and Automated Certificate Management Environment (ACME). It also provides robust RESTful Application Programming Interfaces (APIs) to integrate with any other third-party tools for certificate orchestration and automation. Auto-Enrollment connector PKIaaS’s Auto Enrollment connector acts as a proxy and connects with Microsoft Active Directory HID PKIaaS’s Auto Enrollment connector acts as a proxy and connects with Microsoft Active Directory for any certificate request that makes an outbound connection to HID’s PKIaaS platform for certificate issuance or updates. There is no need to update any firewall configuration for an inbound connection since it only makes an outbound connection at port 443. There is also no agent or other configuration change required at the individual device level, enabling customers to leverage existing technology deployments and infrastructure. About digital certificate and PKIaaS offerings HID PKIaaS offers trust for the enterprise and its computers, network devices, IoT systems, and e-commerce transactions. Use cases range from securing websites and email communications to digitising paper-based processes using digital certificates and securing network endpoints or connected machines. The HID PKIaaS offering with native support for the Microsoft Autoenrollment protocol is available as a low-cost subscription service with a guaranteed uptime Service Level Agreement (SLA).
Suprema, a global pioneer in biometric security and access control, announced the launch of an upgraded version of its X-Station 2 access control terminal, which supports fingerprint authentication. In May 2021, Suprema launched four models of X-Station 2, a next-generation “versatile intelligent terminal” that supports a variety of authentication methods from mobile access cards to RFID cards, QR codes, and barcodes. The newest X-Station 2 model comes equipped with a fingerprint recognition module that provides more options for customers. Features The main features of X-Station 2 include: Support for various authentication methods such as mobile access, QR codes, fingerprints, and RFID cards Fraud prevention via authentication photos using a built-in camera A convenient 4-inch touch screen Up to 500,000 users can be stored and processed Contactless authentication Suprema CEO Hanchul Kim said, “With COVID-19 increasing the demand for smartphone-based, non-face-to-face solutions, we received good reviews following the original launch of our X-Station 2 mobile access authentication terminal.” “The newly launched X-Station 2 fingerprint model diversifies contactless authentication options to customers who use existing biometric information. They can now enjoy the same level of security performance while offering users the convenience and peace of mind that mobile access brings.”
The majority of companies (68%) have experienced an incident involving a lone worker in the past three years, with a fifth of these incidents described as severe or very severe, according to research from lone worker solution, StaySafe. In addition, nearly a quarter of staff feels unsafe at least once a year. StaySafe surveyed over 1,300 lone workers and health and safety executives in the ‘The Lone Worker Landscape Report 2021’. Levels of protection This research aims, for the first time, to uncover the disparities between the opinions of employers and the lone workers themselves with the hope that, through greater understanding, the levels of protection given to lone workers can be improved. The research finds that incidents relating to external factors including accidents, ill health, aggression, and violence make up 41% of recorded lone worker incidents, with the rest (59%) involving stress, mental health issues, and tiredness. Incidents rates Male-dominated industries have higher rates of incidents overall, with 76% of utilities, telco, and construction Manual, traditionally male-dominated industries have higher rates of incidents overall, with 76% of utilities, telco, and construction companies experiencing an incident with a lone worker in the last three years. 66% of FM, property, and estate agents had reported an incident in the last three years, closely followed by housing and local authorities at 65%. Charities, social services, and the NHS recorded the lowest number of incidents (59%), which may be linked to both the nature of the roles, the increased levels of training in these industries, and company culture. The research showed that this group conducted the most training with 60% holding briefings on regulatory requirements relating to lone working. There could also be an issue with under-reporting in these industries. Lone worker safety concerns Only around a third (36%) of lone workers have expressed their safety concerns to their employer. However, companies seem unaware that lone workers are failing to report these concerns, with nearly all (92%) believing that their lone workers are speaking to them regularly about any incidents and concerns. Don Cameron, CEO of StaySafe, comments, “The considerable under-reporting of hazards is a major concern for health and safety executives, particularly as they seem unaware that their staff isn’t having these conversations. Under-reporting can lead to employers under-estimating the real level of risk faced by staff daily and failing to put in the necessary protective measures to prevent accidents or incidents.” Increasing safety measures following an incident 83% of companies took action following a lone worker incident through improved training or additional protective measures The majority of companies (83%) took action following a lone worker incident, usually through improved training or additional protective measures. However, a significant minority of companies (17%) took no action at all. In addition, the research indicates that companies are often overestimating how well they have dealt with hazards or incidents. 78% of executives say that they have addressed their employees’ concerns to a great or fair extent, with only 45% of lone workers agreeing. Understanding safety concerns Don Cameron adds, “We can see when it comes to reporting incidents, companies, on the whole, are doing the right thing. However, the research shows that health and safety executives can only take appropriate action when they are aware of safety concerns or potential risks and hazards that lone workers may face.” “It’s clear that there is a high rate of lone worker incidents, many of which are severe, and health and safety executives have to focus on preventing these before they happen by ensuring that they understand the safety concerns of their staff.”
The Security Industry Association (SIA) has named Bonnie Michelman as the 2021 recipient of the SIA Insightful Practitioner Award, an honour recognising excellence in promoting the implementation of innovative security solutions. Bonnie Michelman is the Executive Director of Police, Security and Outside Services at Massachusetts General Hospital (Mass General) and for Mass General Brigham Corporation. SIA will present her with the award on Wednesday, Nov. 17, during the 2021 SIA Honors cocktail reception. Corporate security leadership veteran She has 30+ years of corporate security leadership experience, and along with her roles with Mass General and Mass General Brigham Corporation, she also serves as President of the Board of International Association for Healthcare Security & Safety (IAHSS) Foundation. Bonnie Michelman has previously served as President of the International Security Management Association, ASIS International and IAHSS. She is on the Regional Board of Directors for the Anti-Defamation League and also serves on the Advisory Council for Hostage US. Under Michelman’s direction, Mass General won the Lindberg Bell Award for the nation’s finest health care security programme, in 1999, 2007 and 2018. Advocate for increasing diversity in the security industry She has also been an advocate for increasing diversity within the security industry She was appointed in 2010, by Secretary of Homeland Security, Janet Napolitano to the Homeland Security Advisory Council, holding that position until 2015, and chaired the U.S. Department of Homeland Security’s faith-based Security Advisory Committee. She has also been an advocate for increasing diversity within the security industry. Bonnie Michelman holds an MBA from Bentley College, an M.S. in Criminal Justice from Northeastern University and a B.A. in Government and Sociology from Clark University, as well as the Certified Protection Professional and Certified Healthcare Protection Administrator certifications. SIA’s 2021 Insightful Practitioner Award recipient “I was totally humbled and honoured in learning that I was the recipient of the 2021 Insightful Practitioner Award,” said Bonnie Michelman, adding “The greatest compliment one can experience is to be recognised by colleagues and one of the best industry associations that exists.” She adds, “I am so grateful to SIA, for not only this honour, but for all the work that SIA does and has done for a long time, to professionalise and advance the security industry and profession. SIA helps chart the course for this amazing industry.” Health Care Security Interest Group Bonnie Michelman is a prominent security thought leader and has spoken at a variety of industry conferences and events, including SIA’s Securing New Ground virtual conference and the 2021 Vertical Insights Health Care Security Symposium (Vertical Insights Symposium: Health Care Security). She helped the Security Industry Association in launching its Health Care Security Interest Group and has supported several of its projects, including a white paper on mitigating the risk of workplace violence in health care settings. “SIA is proud to announce Bonnie Michelman as the 2021 recipient of the SIA Insightful Practitioner Award,” said Security Industry Association (SIA) Chief Executive Officer (CEO) Don Erickson. Health care security expert We commend Bonnie for her outstanding accomplishments and contributions to the industry" He adds, “Bonnie is an industry luminary, whose leadership has grown Mass General’s security department into one of the top programmes in the country, and she has been a dedicated and influential volunteer with SIA, lending her expertise on health care security issues. We commend Bonnie for her outstanding accomplishments and contributions to the industry, and look forward to presenting her with this special award, at SIA Honors 2021.” SIA’s Insightful Practitioner Award is presented annually to a security practitioner, who demonstrates leadership and excellence, in promoting the implementation of innovative security solutions, through education, advocacy and teamwork with the security industry, and other stakeholders. SIA Honors 2021 Each year, SIA Honors, held concurrently with ISC East, the Northeast’s largest security trade show, hosted in collaboration with premier sponsor, Security Industry Association (SIA), features a gala cocktail reception and an award ceremony that recognises industry leaders. At SIA Honors 2021, in addition to presenting the Insightful Practitioner Award, the Security Industry Association will also honour industry leaders, with the George R. Lippert Memorial Award and the SIA Progress Award, sponsored by SIA’s Women in Security Forum. SIA Honors 2021 will be held on November 17, at Glasshouse Chelsea, in New York City, USA.
Eagle Eye Networks, the globally renowned company in cloud video surveillance solutions, has announced a new Vehicle Surveillance Package for the Eagle Eye Cloud VMS. Vehicle Surveillance Package (VSP) The Vehicle Surveillance Package (VSP) captures licence plate and vehicle information, received from distributed cameras and sends it to the Cloud, where it’s analysed, compared, alerted upon, and searched, to deliver business intelligence that improves efficiency, effectiveness, and safety. The solution includes Eagle Eye Time Watch, the industry’s first time-bound watchlist management tool, for loss prevention and operational efficiency. VSP detects and captures licence plate, and other vehicle information, triggering real-time alerts, making decisions to grant or deny access, and making other operational judgments. True cloud platform Users can search for vehicles across multiple sites and quickly review, using the video playback function. Eagle Eye Networks’ true cloud platform provides unlimited recording, unlimited camera support, global access and reliability. Vehicle detection, identification and tracking is important for businesses that manage fleets, track vehicles" “Vehicle detection, identification and tracking is important for businesses that manage fleets, track vehicles, or generate revenue from parking, to prevent loss and improve the customer experience,” said Dean Drako, the Founder and Chief Executive Officer (CEO) of Eagle Eye Networks. Dean Darko adds, “With Eagle Eye VSP, large- and small-scale businesses can take advantage of the Eagle Eye Cloud, to generate more revenue, improve traffic flow and efficiency, reduce loss, and make businesses and communities safer.” Eagle Eye Time Watch Eagle Eye Time Watch enables a business to timestamp a vehicle’s departure and return time, and alerts management or supervisors if a vehicle is outside a pre-determined time frame. This feature increases employee efficiency and protects against theft, resulting in a rapid return on investment. Customers across multiple industries use the Vehicle Surveillance Package (VSP) to: Reduce loss and increase profits, Improve fleet tracking/management, Improve garage/parking lot management Improve efficiency and safety for businesses with drive-in/drive-through and other access control and notification needs Improve traffic flow The new solution initially enables multi-site management and search of licence plate data for U.S. and Canadian plate libraries, with other regions to come.
Integrated security manufacturer TDSi announces the arrival of its latest student placement, Vlad Radoi. Vlad has joined the company’s Software Development Team for a twelve-month placement as part of his BSc (Hons) in Software Engineering studies at Bournemouth University. Supporting placement students Vlad is the latest in an ongoing line of TDSi placement students, as Managing Director John Davies elaborated, “As a business, we have a long heritage of supporting apprenticeships and placement students across all parts of our business, so we are always delighted to support a new student.” “Software Development is a key role within the access control and integrated security industry and one which is at the heart of what TDSi does, so Vlad is exactly the type of passionate young trainee professional we look to attract and support, as they enter the world of business as well as the technology of security.” About Vlad Radoi Vlad is looking forward to working directly with the TDSi team Originally from Romania (although he has lived in the UK for over 10 years) and a fan of the McLaren Formula One racing team and Arsenal Football Club, Vlad is looking forward to working directly with the TDSi team, as he stated, “Being at Bournemouth University has been fun and weird at the same time, for the last year and a half my experience has largely been online via Zoom and Teams, due to pandemic restrictions.” “However, I am excited to be getting first-hand experience in a commercial setting with TDSi, there is much to learn, and it will kickstart my career as a software engineer.” Gaining new experience Having started with TDSi at the beginning of August, Vlad is already working closely with the Software Development Team, helping it to enhance its GARDiS Access Control software for example. “At the moment, I am working with the GARDiS API, and whilst it is complex, I enjoy studying the intricacies of it. This role gives me lots of experience working with new frameworks and language, as well as learning how software development works in the real world.” Vlad is looking forward to the year ahead and added, “TDSi is an important player in the security and access control industry, and I look forward to learning a lot more about the company, its software, and software development as a whole.”
The past year has elevated consumer awareness about personal safety, from COVID-19 issues to social unrest, making safety top-of-mind and the need for personal safety solutions, even more prevalent. In addition, consumers spent more time at home, as schools closed, events were canceled and remote work increased. This prompted two major shifts that, in my opinion, most significantly opened the need for and raised the popularity of mobile safety solutions. Demand for grocery and food delivery apps surged Rise in use of app-based delivery services During the past 18 months, the use of app-based delivery services has skyrocketed During the past 18 months, the use of app-based delivery services has skyrocketed. With more use comes more interactions among strangers in homes and businesses, and while the majority of these moments are completely safe and convenient, incidents are happening, ranging from uncomfortable situations to physical assaults. And, with more delivery drivers on the road, there are going to be more accidents among gig-economy workers. Based on recent estimates, food and grocery delivery are expected to remain popular, even as we get back to normal life. High popularity of mobile security apps and wearables With more work shifting from stationary locations to working on-the-go, mobile security apps or wearables can be a lifeline in all sorts of situations. It’s important for these mobile safety products to be comprehensive, dynamic and designed to address the full range of people’s safety and security needs, from providing simple human reassurance to dispatching emergency help. Domestic violence cases increased According to the National Domestic Violence Hotline, due to COVID-19 lockdown restrictions, domestic violence rose as a result of many victims being stuck at home with their abusers, while sheltering in place and working from home. Mobile safety apps, such as ADT’s SoSecure U.S. Attorneys General and other state-elected officials have endorsed mobile safety apps, like SoSecure by ADT These situations necessitate the need for discreet ways for victims to call for help. U.S. Attorneys General and other state-elected officials have endorsed mobile safety apps, like SoSecure by ADT, as a tool to help victims of domestic abuse, safely call for help, without alerting their abuser. Over the past year, the mobile safety app market has seen tremendous innovation, including more user-friendly ways to make SOS calls. Today, within a single app, a person can summon help hands-free, by saying a secret phrase, by text or by swiping a button. Extension of mobile safety into wearable devices And, users can connect with people trained to help in unsettling situations over video, which can be an effective deterrent and provide video evidence. We’ve also seen the extension of mobile safety into wearable devices, in order to make these devices more discreet and usable. There will always be some safety risks in our lives. However, the good news is there’s no need to live in a constant state of fear. The easiest, most direct way to be prepared and ready to ‘fight back’ is by having a personal safety tool in your pocket, a mobile safety app that is there, when you need it most.
Today’s organisations face numerous diverse threats to their people, places and property, sometimes simultaneously. Security leaders now know all too well how a pandemic can cripple a company’s ability to produce goods and services, or force production facilities to shut down, disrupting business continuity. For example, a category three hurricane barreling towards the Gulf of Mexico could disable the supplier’s facilities, disrupt the supply chain and put unexpected pressure on an unprepared local power grid. Delivering timely critical information Tracking such risk is hard enough, but managing it is even more difficult. A swift response depends on delivering the right information to the right people, at the right time. And, it’s not as easy as it sounds. Indeed, 61 percent of large enterprises say critical information came too late for them, in order to mitigate the impact of a crisis, according to Aberdeen Research (Aberdeen Strategy & Research). These challenges are accelerating the hype around Artificial Intelligence (AI) These challenges are accelerating the hype around Artificial Intelligence (AI). The technology promises to help us discover new insights, predict the future and take over tasks that are now handled by humans. Maybe even cure cancer. Accelerating the hype around AI But is AI really living up to all this hype? Can it really help security professionals mitigate risk? After all, there’s a serious need for technology to provide fast answers to even faster-moving issues, given the proliferation of data and the speed at which chaos can impact operations. Risk managers face three major obstacles to ensuring business continuity and minimising disruptions. These include: Data fatigue - Simply put, there’s too much data for human analysts to process in a timely manner. By 2025, the infosphere is expected to produce millions of words per day. At that pace, you’d need an army of analysts to monitor, summarise and correlate the information to your impacted locations, before you can communicate instructions. It’s a herculean task, made even more difficult, when we consider that 30 percent of this global datasphere is expected to be consumed in real time, according to IDC. Relevance and impact - Monitoring the flood of information is simply the first hurdle. Understanding its impact is the second. When a heat dome is predicted to cover the entire U.S. Pacific Northwest, risk managers must understand the specifics. Will it be more or less hot near their facilities? Do they know what steps local utilities are taking to protect the power grid? Such questions can’t be answered by a single system. Communication - Once you know which facilities are impacted and what actions to take, you need to let your employees know. If the event is urgent, an active shooter or an earthquake, do you have a fast, effective way to reach these employees? It’s not as simple as broadcasting a company-wide alert. The real question is, do you have the ability to pinpoint the location of your employees and not just those working on various floor in the office, but also those who are working from home? How AI and ML cut through the noise Although Artificial Intelligence can help us automate simple tasks, such as alert us to breaking news, it requires several Machine Learning systems to deliver actionable risk intelligence. Machine Learning is a branch of AI that uses algorithms to find hidden insights in data, without being programmed where to look or what to conclude. More than 90 percent of risk intelligence problems use supervised learning, a Machine Learning approach defined by its use of labelled datasets. The benefit of supervised learning is that it layers several pre-vetted datasets, in order to deliver context-driven AI The benefit of supervised learning is that it layers several pre-vetted datasets, in order to deliver context-driven AI. Reading the sources, it can determine the category, time and location, and cluster this information into a single event. As a result, it can correlate verified events to the location of the people and assets, and notify in real time. It’s faster, more customised and more accurate than simple Artificial Intelligence, based on a single source of data. Real-world actionable risk intelligence How does this work in the real world? One telecommunications company uses AI and ML to protect a mobile workforce, dispersed across several regions. An AI-powered risk intelligence solution provides their decision makers with real-time visibility into the security of facilities, logistics and personnel movements. Machine Learning filters out the noise of irrelevant critical event data, allowing their security teams to focus only on information specific to a defined area of interest. As a result, they’re able to make informed, proactive decisions and rapidly alert employees who are on the move. Four must-have AI capabilities To gain real actionable risk intelligence, an AI solution should support four key capabilities: A focus on sourcing quality over quantity. There are tens of thousands of sources that provide information about emerging threats - news coverage, weather services, social media, FBI intelligence and so much more. Select feeds that are trusted, relevant and pertinent to your operations. Swift delivery of relevant intelligence. To reduce the mean-time-to-recovery (MTTR), risk managers need an accurate understanding of what’s happening. Consider the different contextual meanings of the phrases ‘a flood of people in the park’ and ‘the park is at risk due to a flood’. Machine Learning continuously increases the speed of data analysis and improves interpretation. Ability to cross-reference external events with internal data. As it scans different data sources, an AI engine can help you fine-tune your understanding of what’s happening and where. It will pick up contextual clues and map them to your facilities automatically, so you know immediately what your response should be. Ready-to-go communications. Long before a threat emerges, you can create and store distribution, and message templates, as well as test your critical communications system. Handling these tasks well in advance means you can launch an alert at a moment’s notice. The ability to minimise disruptions and ensure business continuity depends on speed, relevance and usability. AI and ML aren’t simply hype. Instead, they’re vital tools that make it possible for security professionals to cut through the noise faster and protect their people, places and property.
Intrusion alarm systems are currently facing a growing number of potential error sources in the environment. At the same time, alarm systems must comply with increasingly demanding legal requirements for sensors and motion detectors. As a future-proof solution, detectors equipped with Sensor Data Fusion technology raise the level of security while reducing the risk of cost- and time-intensive false alarms. This article provides a comprehensive overview of Sensor Data Fusion technology. Anti-masking alarms A cultural heritage museum in the South of Germany for decades, the installed intrusion alarm system has provided reliable protection on the premises. But suddenly, the detectors trigger false alarms every night after the museum closes. The system integrators are puzzled and conduct extensive tests of the entire system. When they finally identify the culprit, it’s unexpected: As it turns out, the recently installed LED lighting system in the museum’s exhibition spaces radiates at a wavelength that triggers anti-masking alarms in the detectors. Not an easy fix situation, since a new lighting system would prove far too costly. Ultimately, the integrators need to perform extensive detector firmware updates and switch to different sensor architecture to eliminate the error source. This scenario is by no means an isolated incident, but part of a growing trend. Need for reliable detector technology Legal requirements for anti-masking technology are becoming stringent in response to tactics by criminals The number of potential triggers for erroneous alarms in the environment is on the rise. From the perspective of system operators and integrators, it’s a concerning development because every false alarm lowers the credibility of an intrusion alarm system. Not to mention steep costs: Every false call to the authorities comes with a price +$200 tag. Aside from error sources in the environment, legal requirements for anti-masking technology are becoming more stringent in response to ever more resourceful tactics employed by criminals to sidestep detectors. What’s more, today’s detectors need to be fortified against service outages and provide reliable, around-the-clock operability to catch intruders in a timely and reliable fashion. Sensor Data Fusion Technology In light of these demands, one particular approach has emerged as a future-proof solution over the past few years: Sensor Data Fusion technology, the combination of several types of sensors within one detector – designed to cross-check and verify alarm sources via intelligent algorithms – holds the keys to minimising false alarms and responding appropriately to actual alarm events. This generation of detectors combines passive infrared (PIR) and microwave Doppler radar capabilities with artificial intelligence (AI) to eliminate false alarm sources without sacrificing catch performance. Motion detectors equipped with Sensor Data Fusion technology present a fail-proof solution for building security “It’s not about packing as many sensors as possible into a detector. But it’s about including the most relevant sensors with checks and balances through an intelligent algorithm that verifies the data for a highly reliable level of security. The result is the highest-possible catch performance at the minimum risk for erroneous alarms,” said Michael Reimer, Senior Product Manager at Bosch Security Systems. Motion detectors with sensor data fusion Looking ahead into the future, motion detectors equipped with Sensor Data Fusion technology not only present a fail-proof solution for building security. The comprehensive data collected by these sensors also unlock value beyond security: Constant real-time information on temperature and humidity can be used by intelligent systems and devices in building automation. Integrated into building management systems, the sensors provide efficiency improvements and lowering energy costs Integrated into building management systems, the sensors provide the foundation for efficiency improvements and lowering energy costs in HVAC systems. Companies such as Bosch support these network synergies by constantly developing and optimising intelligent sensors. On that note, installers must be familiar with the latest generation of sensor technology to upgrade their systems accordingly, starting with a comprehensive overview of error sources in the environment. Prominent false alarm triggers in intrusion alarm systems The following factors emerge as frequent triggers of false alarms in conventional detectors: Strong temperature fluctuations can be interpreted by sensors as indicators of a person inside the building. Triggers range from floor heating sources to strong sunlight. In this context, room temperatures above 86°F (30°C) have proven particularly problematic. Dust contamination of optical detectors lowers the detection performance while raising susceptibility to false alarms. Draft air from air conditioning systems or open windows can trigger motion sensors, especially when curtains, plants, or signage attached to the ceilings (e.g. in grocery stores) are put in motion. Strong light exposure directly on the sensor surface, e.g. caused by headlights from passing vehicles, floodlights, reflected or direct sunlight – all of which sensors may interpret as a flashlight from an intruder. Extensive bandwidth frequencies in Wi-Fi routers can potentially confuse sensors. Only a few years ago, wireless routers operated on a bandwidth of around 2.7GHz while today’s devices often exceed 5GHz, thereby catching older detectors off guard. LED lights radiating at frequencies beyond the spectrum of visible light may trigger sensors with their infrared signals. Regarding the last two points, it’s important to note that legislation provides clear guidelines for the maximum frequency spectrum maintained by Wi-Fi routers and LED lighting. Long-term security But the influx of cheap and illegal products in both product groups – products that do not meet the guidelines – continues to pose problems when installed near conventional detectors. For this reason, Sensor Data Fusion technology provides a reliable solution by verifying alarms with data from several types of sensors within a single detector. Beyond providing immunity from false alarm triggers, the new generation of sensors also needs to comply with the current legislature. These guidelines include the latest EN50131-grade 3, and German VdS class C standards with clear requirements regarding anti-masking technology for detecting sabotage attempts. This is exactly where Sensor Data Fusion technology provides long-term security. Evolution of intrusion detector technology Initially, motion detectors designed for intrusion alarm systems were merely equipped with a single type of sensor; namely passive infrared technology (PIR). Upon their introduction, these sensors raised the overall level of building security tremendously in automated security systems. But over time, these sensors proved limited in their catch performance. As a result, manufacturers began implementing microwave Doppler radar capabilities to cover additional sources of intrusion alarms. First step detection technology In Bosch sensors, engineers added First Step detection to trigger instant alarms upon persons entering a room Over the next few years, sensors were also equipped with sensors detecting visible light to catch flashlights used by burglars, as well as temperature sensors. In Bosch sensors, engineers added proprietary technologies such as First Step detection to trigger instant alarms upon persons entering a room. But experience in the field soon proved, especially due to error sources such as rats and other animals, that comprehensive intrusion detection demands a synergetic approach: A combination of sensors aligned to cross-check one another for a proactive response to incoming signals. At the same time, the aforementioned bandwidth expansion in Wi-Fi routers and LED lighting systems required detectors to implement the latest circuit technology to avoid serving as ‘antennas’ for undesired signals. Sensor data fusion approach At its very core, Sensor Data Fusion technology relies on the centralised collection of all data captured by the variety of different sensors included in a single detector. These data streams are directed to a microprocessor capable of analysing the signals in real-time via a complex algorithm. This algorithm is the key to Sensor Data Fusion. It enables the detector to balance active sensors and adjust sensitivities as needed, to make truly intelligent decisions regarding whether or not the data indicates a valid alarm condition – and if so, trigger an alarm. Advanced verification mechanisms The current generation of Sensor Data Fusion detectors, for instance from Bosch, feature advanced verification mechanisms, including Microwave Noise Adaptive Processing to easily differentiate humans from false alarm sources (e.g. ceiling fans or hanging signs). For increased reliability, signals from PIR and microwave Doppler radar are compared to determine whether an actual alarm event is taking place. Additionally, the optical chamber is sealed to prevent drafts and insects from affecting the detector, while the detector is programmed for pet and small animal immunity. Sensor cross-verification Further types of sensors embedded in current and future generations of Sensor Data Fusion detectors include MEM-sensors as well as vibration sensors and accelerometers. Ultimately, it’s important to keep in mind that the cross-verification between sensors serves to increase false alarm immunity without sacrificing the catch performance of actual intruders. It merely serves to cover various indicators of intrusion. Protecting UNESCO World Cultural Heritage in China Intelligent detectors equipped with Sensor Data Fusion are protecting historic cultural artifacts in China from theft and damage. At the UNESCO-protected Terracotta Warriors Museum site, one hundred TriTech motion detectors from Bosch with PIR and microwave Doppler radar technology safeguard the invaluable treasures against intruders. To provide comprehensive protection amid the specific demands of the museum site, the detectors have been installed on walls and ceilings to safeguard the 16,300-square-meter museum site. To ensure an optimal visitor experience without interference from glass walls and other barriers, many detectors are mounted at a height of 4.5 meters (15 feet) above ground under the ceiling. Despite their height, the detectors provide accurate data around the clock while exceeding the performance limits of conventional motion detectors, which clock out at a mere 2 meters (6 feet) catchment area. Integrated video systems The site also presents additional error sources such as large amounts of dust that can contaminate the sensors, as well as visitors accidentally dropping their cameras or mobile phones next to museum exhibits. To distinguish these events from actual criminal activity, the intrusion alarm system is integrated with the museum’s video security system. This allows for verifying alarm triggers with real-time video footage at a fast pace: In the case of an actual alarm event, the system alerts the on-site security personnel in the control room in less than two seconds. Added value beyond security Sensor Data Fusion technology provides a viable solution for the rising number of error sources in the environment As of today, Sensor Data Fusion technology already provides a viable solution for the rising number of error sources in the environment while providing legally compliant building security against intruders. In light of future developments, operators can leverage significant added value from upgrading existing systems – possibly without fundamentally replacing current system architecture – to the new detector standard. Added value how? On one hand, the detectors can integrate with access control, video security, voice alarm, and analytics for a heightened level of security. These synergetic effects are especially pronounced on end-to-end platforms like the Bosch Building Management system. On the other hand, the data streams from intelligent detectors also supply actionable intelligence to building automation systems, for instance as the basis for efficiency improvements and lowering energy consumption in HVAC systems. New backward-compatible detectors Bosch will release a new series of commercial detectors by end of 2021, based on the latest research on risk factors for false alarm sources in the environment and line with current legislation and safety standards. Throughout these developments, installers can rest assured that all new detectors are fully backward compatible and work with existing networking/architecture. With that said, Sensor Data Fusion technology emerges as the key to more secure intrusion alarm systems today and in the future. TriTech detectors from Bosch For reliable, fail-proof alarms the current series of TriTech detectors from Bosch relies on a combination of different sensor data streams, evaluated by an integrated algorithm. These Sensor Data Fusion detectors from Bosch combine up to five different sensors in a single unit, including: Long-range passive infrared (PIR) sensor Short-range PIR sensor Microwave sensor White light sensor Temperature sensor Equipped with these sensors, TriTech detectors are capable of detecting the most frequent sources of false alarms; from headlights on passing cars to a mouse passing across the room at a 4.5-meter distance to the detector. What’s more, TriTech detectors provide reliable performance at room temperatures above 86°F (30°C) while fully guarding against actual intrusion and sabotage attempts from criminals.
The city of Baltimore has banned the use of facial recognition systems by residents, businesses and the city government (except for police). The criminalisation in a major U.S. city of an important emerging technology in the physical security industry is an extreme example of the continuing backlash against facial recognition throughout the United States. Facial recognition technology ban Several localities – from Portland, Oregon, to San Francisco, from Oakland, California, to Boston – have moved to limit use of the technology, and privacy groups have even proposed a national moratorium on use of facial recognition. The physical security industry, led by the Security Industry Association (SIA), vigorously opposed the ban in Baltimore, urging a measured approach and ‘more rational policymaking’ that preserve the technology’s value while managing any privacy or other concerns. Physical security industry opposes ban In such cases, it is local businesses and residents who stand to lose the most" “Unfortunately, an outright ban on facial recognition continues a distressing pattern in which the clear value of this technology is ignored,” said SIA’s Chief Executive Officer (CEO) Don Erickson, adding “In such cases, it is local businesses and residents who stand to lose the most.” At the national level, a letter to US President Biden from the U.S. Chamber of Commerce Coalition asserts the need for a national dialogue over the appropriate use of facial recognition technology and expresses concern about ‘a blanket moratorium on federal government use and procurement of the technology’. (The coalition includes Security Industry Association (SIA) and other industry groups.) The negativity comes at a peak moment for facial recognition and other biometric technologies, which saw an increase of interest for a variety of public and business applications, during the COVID-19 pandemic’s prioritisation to improve public health hygiene and to promote ‘contactless’ technologies. Prohibition on banks, retailers and online sellers The ordinance in Baltimore prohibits banks from using facial recognition to enhance consumer security in financial transactions. It prevents retailers from accelerating checkout lines with contactless payment and prohibits remote online identity document verification, which is needed by online sellers or gig economy workers, according to the Security Industry Association (SIA). At a human level, SIA points out that the prohibition of facial recognition undermines the use of customised accessibility tools for disabled persons, including those suffering with blindness, memory loss or prosopagnosia (face blindness). Ban out of line with current state of facial recognition Addressing the Baltimore prohibition, the Information Technology and Innovation Foundation reacted to the measure as ‘shockingly out of line with the current state of facial recognition technology and its growing adoption in many sectors of the economy’. Before Baltimore’s decision to target facial recognition, Portland, Oregon, had perhaps the strictest ban, prohibiting city government agencies and private businesses from using the technology on the city’s grounds. San Francisco was the first U.S. city to ban the technology, with Boston, Oakland; Cambridge, Massachusetts; and Berkeley, California, among others, following suit. Police and federal units can use biometrics Unlike other bans, the Baltimore moratorium does not apply to police uses Unlike other bans, the Baltimore moratorium does not apply to police uses, but targets private uses of the technology. It also includes a one-year ‘sunset’ clause that requires city council approval for an extension. The measure carves out an exemption for use of biometrics in access control systems. However, violations of the measure are punishable by 12 months in jail. The law also establishes a task force to evaluate the cost and effectiveness of surveillance tools. Transparency in public sector use of facial recognition Currently, the state of Maryland controls the Baltimore Police Department, so the city council does not have authority to ban police use of facial recognition, which has been a human rights concern driving the bans in other jurisdictions. A measure to return local control of police to the city could pass before the year lapses. SIA advocates transparency in public-sector applications of facial recognition in identity verification, security and law enforcement investigative applications. SIA’s CEO, Don Erickson stated, “As public sector uses are more likely to be part of processes with consequential outcomes, it is especially important for transparency and sound policies to accompany government applications.”
BIM (building information modeling) provides a process for creating and managing information during the building lifecycle and beyond. BIM is often equated with 3D modeling of construction projects, but the visual component is just part of the value of BIM. Additional data, such as specifications and other documentation, is also part of the process, underlying the visual aspects, helping to drive decision making and providing immediate access to detailed information about all facets of the building process. Incorporating BIM systems For the last six years, ASSA ABLOY Opening Solutions has worked with specification writers and architects in Europe, the Middle East, and Africa (EMEA) to make it easy to incorporate ASSA ABLOY Opening Solutions doors, hardware, and security solutions into BIM systems. Everyone on a project can work together in the interactive and information-rich BIM environment. BIM tools are also used by contractors, distributors, facility owners, and security consultants. BIM software BIM information relating to doors, hardware, and security solutions is available in the cloud BIM information relating to doors, hardware, and security solutions is available in the cloud with the company’s Openings Studio BIM software. This improves the process of door scheduling and visualisation and enables customers to focus on the design, installation, and management of openings. “If you have up-to-date information inside the BIM model, you can reduce mistakes and misunderstanding in the building industry,” says Marc Ameryckx, ASSA ABLOY Opening Solutions’ BIM Manager for the EMEIA region. “It helps to eliminate mistakes before they happen or as early as possible in the building process. The earlier, the less it costs. We provide data as soon as possible in the process.” (ASSA ABLOY Opening Solutions also has comparable systems available in other regions of the global company.) Centralised data in BIM 3D model Expanding the data available in BIM provides additional value compared to merely providing “BIM objects” that can be incorporated into a BIM 3D model. The combination of BIM modeling and the underlying specifications boosts the quality of the project and its key to success, says Marc Ameryckx. Even after the building is complete, the BIM model is still valuable, providing a repository of “as-built” information that can be used by building managers and security professionals tasked with operating and maintaining the building. For example, if a lock needs to be replaced, retrofitting is simpler because all the information about the lock and existing installation is available in a centralised data file. Revit and ArchiCAD A widely used BIM software is Revit from Autodesk, a program that brings architecture, engineering, and construction disciplines into a unified modeling environment to drive more efficient and cost-effective projects. Another BIM software program is ArchiCAD, developed by the Hungarian company Graphisoft. Openings Studio™ added a plugin for ArchiCAD this year, in addition to Revit. Tailor-made information security solutions We provide tailor-made information security solutions with various hardware on projects with more doors" “We can provide tailor-made information security solutions with various hardware on projects with more doors, adding more flexibility,” says Marc Ameryckx. “Customers do not need to be the experts on the products because we provide expertise as part of our specifications.” For example, how often do building mistakes occur because of a misunderstanding about the electrical needs of a lock and the wrong cabling is installed? The problem is especially expensive if it is discovered only after the walls are complete. Providing complete data about the electrical lock as part of a BIM system avoids the snafu. Another example is the specification of a deadbolt lock on a door that operates with an electric strike. The deadbolt undermines the intended operation of the electric strike and can interfere with escape routes in case of an emergency. The mistake becomes obvious in the BIM environment and can be rectified before consequences impact the real world. Data addition to Opening Suites site ASSA ABLOY Opening Solutions is continuously expanding the data it provides at the Opening Suites site, covering additional functionality and more components including the door, cabling, and electrical connections. Hardware sets are linked to specific doors in the BIM models, including all the details of various components, including article numbers, technical sheets, electrical requirements, all depending on customer expectations. Physical equipment includes QR codes that can be scanned by a smartphone to provide information on the door (A mobile app is in development). More details and more data Experienced BIM consultants work with the Openings Studio software on projects ranging from single doors to large buildings with many doors. Data will be more and more important, and there will be more data inside BIM models Adding more data and detail to the BIM process at the level of each door expands the usefulness of BIM, which has historically been focused on broader issues such as structural work and HVAC. “Openings Studio™ provides all the data to integrate doors and security in the BIM process,” says Marc Ameryckx. The higher level of detail may be a new aspect even for customers who already use BIM software. “Data will be more and more important, and there will be more data inside BIM models,” says Marc Ameryckx. In the future, the use of “digital twins” could expand the capabilities even further; for example, the software could simulate escape routes in case of fire. More data makes more things possible.
Travel volumes at airports have been increasing of late, although still below the 2.5 million or so passengers the Transportation Security Administration (TSA) screened every day, on average, before the pandemic. As passengers return, they will notice the airport security experience has changed during the pandemic – and many of the changes are likely to continue even longer. Need for touchless technology The lowest U.S. air travel volume in history was recorded last April, with approximately 87,500 passengers. As passenger traffic plummeted, the aviation community sought to explore the potential of new technologies to make security checkpoints more contactless and flexible when the traffic numbers return. The pandemic has seen an increase in touchless technology deployed in the screening area. Used for cabin baggage screening, Computed Tomography (CT) produces high-quality, 3-D images to enable a more thorough analysis of a bag’s contents. Imaging Technology Millimeter-wave body scanners began replacing metal detectors globally as a primary screening method Enhanced Advanced Imaging Technology (eAIT), which uses non-ionising radio-frequency energy in the millimeter spectrum, safely screens passengers without physical contact for threats such as weapons and explosives, which may be hidden under a passenger’s clothing. Millimeter-wave body scanners began replacing metal detectors globally as a primary screening method. AI algorithms Other innovations include an automatic screening lane, centralised image processing, and artificial intelligence (AI). Looking ahead, AI algorithms have the ability to clear most passengers and bags automatically, making the process smoother and freeing up staff to focus only on alarms. The pandemic’s need for contactless screening may accelerate the adoption of AI. CAT machine Credential Authentication Technology (CAT) machines automatically verify identification documents presented by passengers during the screening process. The TSA continues to accept expired Driver’s Licenses and state-issued IDs for up to a year after expiration, based on the premise that license renewals may be delayed and/or more difficult during the pandemic. The REAL ID enforcement deadline was extended to Oct. 1, 2021. Health precautions Checkpoint health precautions have been a part of the airport screening experience since early in the pandemic. Last summer, the TSA announced the “Stay Healthy. Stay Secure” campaign, which included requirements such as social distancing among travelers, ID verification without physical contact, plastic shielding installed at various locations, and increased cleaning and disinfecting. In January 2021, President Biden signed an Executive Order requiring travellers to wear face masks when in airports and other transportation facilities (to remain in effect until May 11). Checkpoint screening Clear is a privately owned company that provides expedited security that uses biometrics either a person’s eyes or face to speed along the process of getting people through checkpoints. TSA officers wear masks and gloves at checkpoints and may also wear eye protection or clear plastic face shields. The limits on allowable liquids a passenger may take on board were broadened to include a hand sanitiser container of up to 12 ounces, one per passenger in a carry-on bag. A paradigm shift Just as aviation security changed after 9/11, the COVID-19 crisis is expected to lead to a paradigm shift to create a safer and more secure environment. Measures were implemented so that passengers, staff and other stakeholders could have continued assurance and confidence in airports amid and after the pandemic.
Alcatraz AI has announced that they are bringing the Alcatraz AI Rock facial authentication solution to BrainBox AI’s offices. BrainBox AI is at the forefront of building automation and a renowned company in the green building revolution. Identity and facemask verification solution As BrainBox AI’s office recently re-opened with limited capacity, the company is taking proactive steps, through Alcatraz AI’s robust identity and facemask verification solution, in order to keep employees safe. As one survey showed, two-thirds of employees have safety concerns, regarding the return of on-site operations. Considering these statistics, health and safety must be top priorities for businesses, as they re-open. BrainBox AI is keeping its employees’ safety at the top-of-mind, by installing Alcatraz AI’s Rock solution, before they return, to ensure greater safety and security. Alcatraz AI’s Rock facial authentication solution Alcatraz AI’s Rock facial authentication solution combines advanced AI and 3D sensing technologies Alcatraz AI’s Rock facial authentication solution combines advanced AI and 3D sensing technologies, to provide facilities with enterprise-grade identity verification, which is needed to create secure spaces. Rock’s state-of-the-art security features include touchless access, multi-factor authentication, video at the door and intelligent tailgating detection. Alcatraz AI’s access control solution, the Rock, effectively detects tailgating and sends ‘real-time alerts’, if an unauthorised person enters, and sends real-time notifications to ACS/VMS. BrainBox AI, leading the green building revolution “BrainBox AI is leading the green building revolution, and we are looking forward to bringing frictionless, multi-sensor technology and a touchless authentication feature to the office,” said Tina D’ Agostin, the Chief Executive Officer (CEO) of Alcatraz AI, adding “By utilising the Alcatraz AI Rock, we’ve helped BrainBox AI’s offices re-open smoothly and safely.” “BrainBox AI is excited to announce its partnership with Alcatraz AI. Our employees’ safety is always our top priority. We are confident The Rock’s touchless authentication and the frictionless security system will give each BrainBox AI employee peace of mind, when returning to the office,” said Jean-Simon Venne, the Co-Founder and Chief Technology Officer (CTO) of BrainBox AI.
IOTICS is creating a digital twin of Portsmouth International Port as part of an ambitious 1.5m project to demonstrate an achievable modular green hydrogen generation system within the Port. The Shipping, Hydrogen & Port Ecosystems UK (SHAPE UK) project is part of the Clean Maritime Demonstration Competition, funded by the Department for Transport and delivered in partnership with Innovate UK. Carbon neutral port Portsmouth International Port is the UK's largest and most successful municipal port, operated by Portsmouth City Council, and is one of the sites of the new Solent Freeport. It is committed to becoming the first carbon-neutral UK port by 2030 and the first zero-emission port by 2050. “As a port operating in the heart of a major city, and that is owned by the people of Portsmouth, we must do everything we can to minimise our impact as we continue to grow in the coming years,” said Jerry Clarke, Senior Project Manager at Portsmouth International Port. Virtualising activities Connected Places Catapult and Portsmouth University will leverage data to enhance and optimise operations IOTICS and its partners will create a digital twin of the port, interoperating with existing and emerging data from the port infrastructure and its activities as well as gathering data from the working hydrogen electrolyser. The IOTICS-enabled semantically defined digital twins, interoperating with data sources uncovered by KnowNow and deployed by Barter4Things will be an amalgamation to virtualise both dockside and offshore activities. Connected Places Catapult and Portsmouth University will leverage data from the digital twins within the port ecosystem to enhance and optimise operations with decision-support tools. Digital twin approach The digital twin approach will create a scalable model that is translatable for other ecosystems, use cases, and locations, offering a flexible foundation for further development. Sophie Peachey, Head of Customer Success at IOTICS said, “This project gives us many options to showcase the value of a digital twin approach by reusing data across different use cases." We will be looking at the business benefits for deploying renewable and clean fuels" "We will be looking at the business benefits for deploying renewable and clean fuels as well as the logistics of refuelling onshore equipment and sea-going vessels in a busy port. We’ll also be setting up the foundations of ways to look at environmental impacts of switching to clean fuel sources." Reducing carbon emissions Dr. David Hutchinson, a Reader in Environmental Innovation and Innovation and Impact Development Manager for the Faculty of Technology at the University of Portsmouth, said, “The Government has a very ambitious environmental target within the maritime sector." "SHAPE UK represents a milestone in the move to innovative low-cost green hydrogen generation and storage systems that bring significant reduction in carbon emissions and air pollution in and around Portsmouth and other UK ports.” He added, “The port is keen to act as a living lab so there will be a great student experience element, which will be particularly relevant for students in our Faculty of Technology, such as those on the renewable energy degree.”
Starr Corporation, located in American Falls, Idaho, United States, needed a way to track people’s time for time cards for a project that was to last a year long. It contacted Anviz for assistance. The customer, a food manufacturer, saw what they were doing for the construction site and wanted to have all subcontractors use the system, as to date there are 10,000 users and 200 some companies using the system. The challenge: For about a year-long length of the project, who comes to the construction site and who leaves. At any moment pull up a report of who is on-site ordered by the company. There are 200+ contractors and subcontractors on this project. The solution: It organised it so that company was the project name; departments were the various companies working on that project. Key benefits: Accuracy of capturing people and ability of reporting. Comments “The monthly attendance hours that CrossChex Cloud report to me took me 20 minutes to prepare to the bill while it typically takes me 2 hours without it,” said Brad Shroeder Pocatello, Idaho Manager.
Truline Industries is a specialty machining business located in Chesterland, Ohio, United States. Founded in 1939 Truline is built upon integrity both in work and in life. An AS 9100 / ISO 9001 certified facility, Truline makes use of the latest technology to fabricate fuel pump bearings for the aircraft industry as well as other high-tolerance precision machine parts. Challenge Truline Industries has been using Gallagher physical access control systems for their office building. However, the traditional access control is no longer satisfying; the client looked for an outdoor touchless face recognition access control solution with mask-wearing detection. Touchless recognition system Users who have been using RFID cards will still be able to keep using them on FaceDeep 5 RFID module Anviz reliable and stable touchless face recognition FaceDeep 5 (temperature detection optional) offers the client a good outdoor solution to get access to their office building without touching the reader, and wearing a mask. In addition, users who have been using RFID cards will still be able to keep using them on FaceDeep 5 RFID module, due to Protech Security with the Gallagher Controller integration. 10pcs FaceDeep 5 was installed in their office building outdoor and indoor, all devices are controlled centrally by software, very convenient to check access records, manage users, etc. Project partner Protech Security, with more than 30 years of service in Northeast Ohio and a strong commitment to providing quality, cost-effective protection for homes, businesses, educational institutions, and government facilities. Customer comments Anviz FaceDeep 5 is a very nicely designed and sturdy device, the recognition is very fast and precise even under outdoor strong sunlight, Truline Industries is very happy about this upgrading, which definitely brings the employees a safer and touchless access experience. Therefore, Protech Security provides excellent services and support; "we will surely recommend Anviz and Protech Security to our business partners."
Visa chooses Callsign, as their preferred behavioural biometric digital and device intelligence identity provider. Under the agreement, Visa will introduce Callsign's behavioural biometric and device fingerprinting solutions to the Visa network of financial institutions, payment service providers (PSPs), and merchants across Europe. Callsign joins the Visa Fintech Partner Connect programme giving banks, merchants, and the wider card ecosystem access to Callsign's Intelligence-driven authentication solutions which positively identify consumers using inherent behavioural biometrics whilst detecting and preventing fraud. Allowing genuine access via MFA Callsign technology helps banks, merchants, and PSPs to answer two questions; is the user who they say they are? And are they permitted to access the service they are requesting? Callsign combines behavioural biometrics, device intelligence with MFA to help authenticate users' identities Using machine learning techniques Callsign combines behavioural biometrics, device intelligence, and geo-location with multi-factor authentication to help authenticate users' identities. This approach helps banks, merchants, and PSPs to secure and authenticate users' identities frictionlessly, stopping fraud early and only letting genuine customers access their service and transact safely and seamlessly. Need for secure and accurate user experience The agreement comes at a time of spiralling fraud, according to a recent report, every second fraudulent transaction in the finance industry was account take over. Card, not present fraud (CNP) accounted for 79% of all card fraud across the Single European Payments Area and, figures from UK finance suggest that in the money lost to Authorised Push Payment (APP) scams totalled nearly half a billion (479 million) in 2020. "The need to accurately identify users online for digital payments and online banking is critical due to the shift to online transactions in the past 18 months. Financial services organisations are looking for the technology that provides the most secure, accurate, and seamless user experience to incorporate into their solutions. We are pleased to be joining the Visa Fintech Partner Connect to work with Europe's leading fintech," concluded Amir Nooriala, Chief Commercial Officer, Callsign.
Here East is an innovation and technology campus located at the heart of Queen Elizabeth Olympic Park in London, UK. Once the Press and Broadcast Centre for the 2012 Olympic Games, it is home to a thriving community of over 4,500 creative, academics, and innovators. Designed as a mini-city, the campus is a mixed-use development that houses offices, retail units, university facilities, cultural exhibitions, and public spaces. Notable tenants include BT Sport, the V&A Museum, Sports Interactive, and the studios of noted choreographer Wayne McGregor. In total, the site offers 1.2 million square feet of flexible space and caters to a wide range of visitors. Modernising data The previous video management system was still functioning. Yet, Here East’s Head of Security, Leighton Jones, was familiar with the Genetec unified platform and was confident it could deliver more. The advanced capabilities of the Genetec system would enable his team to gain a deeper understanding of the environment, resolve incidents in real-time and ensure a positive user experience. “Here East is a truly iconic location with a diverse list of high calibre visitors and tenants,” explains Jones. “I wanted to be able to say we use the best technology available and in my experience that is Genetec.” Here East has begun a multi-year phased adoption of Genetec solutions, starting with the deployment of Genetec Clearance to modernise data handling and the secure sharing of digital evidence. GDPR compliance Implementation of the EU GDPR has led Here East to revisit its processes for the sharing of video surveillance footage Like many organisations, the implementation of the EU General Data Protection Regulation (GDPR) has led Here East to revisit its processes for the sharing of video surveillance footage. Each time Here East received a validated evidence request, operators burned footage onto physical storage media such as a CD or a USB stick. The process was time-consuming and also created chain-of-custody issues. Here East had no control over how that footage was stored and shared by others. “It wasn’t a situation I was comfortable with,” explains Jones. “We find ourselves needing to share footage internally and externally. We need to retain controls on our data.” Clearance simplifies evidence sharing All digital evidence is now collected, shared, and distributed through Genetec Clearance. The team at Here East can put appropriate safeguards in place to minimise the risk of footage being inappropriately shared or lost. For example, it can specify viewing rights for specific users, set time limits, and revoke access to previously shared footage. The automatic redaction features available within Genetec Clearance have also streamlined the processing of requests for video evidence. Under the terms of the EU GDPR, any citizen can submit a subject access request, with Article 15 of the legislation presenting specific challenges concerning video surveillance. Article 15 states “the right to obtain a copy… shall not adversely affect the rights and freedoms of others. Video surveillance operators must redact the identities of multiple other third parties in relevant frames of video before footage can be shared. On a busy night, the canalside restaurants and bars on the Here East site can contain 1,000 people in a single camera’s field of view. Before the user had to spend significant time manually redacting the identifies of innocent parties in the footage. With Genetec Clearance, that task is instant and automated. Improved incident reporting capabilities Genetec Clearance has bolstered Here East’s incident analysis capabilities, simplifying the process of reporting back Genetec Clearance has bolstered Here East’s incident analysis capabilities, simplifying the process of reporting back to the senior management. Each month the Here East team runs an automated report breaking down incidents by time, date, and location. It then uses this data to make recommendations surrounding security operations and the deployment of resources. Where it’s applicable they run educational workshops for tenants. For example, phone snatching and bike theft are two of the most common crimes in their London borough. By closely monitoring the data, Here East can take proactive steps to detect, deter, and discourage perpetrators from operating on the Here East site. “It’s all well and good having the data but the most important thing is being able to visualise it, spot the meaningful patterns, and take the right preventative actions,” explains Jones. “Genetec Clearance makes this seamless”. The foundations for future growth Here East is still in the early phases of a long-term rollout with Genetec but is already benefitting from a unified approach to security, digital evidence-sharing, and operations. Further deployments will see the innovative site continue to work closely with Genetec to maximise value, push the boundaries of the technology and exceed the expectations of its tenants. “We’re continuing the legacy of the 2012 Olympics and have ambitious plans for the day-to-day management of this iconic site,” concludes Jones. “Our tenants expect a gold medal standard service and we have no intentions to disappoint”.
Round table discussion
A new generation of security professional is waiting in the wings. They will be faced with unprecedented challenges, as they seek to transform the security marketplace to the ‘next level’. Technology changes ensure the market will be very different 10 years from now and the fresh labour pool will need to be able to meet the host of new challenges. We asked our Expert Panel Roundtable: What exciting career opportunities in the security industry await the next generation?
Since the advent of the physical security industry, access control has been synonymous with physical cards, whether 125 kHz ‘prox’ cards or the newer smart card alternatives. However, other credentials have also come on the scene, including biometrics and even smart phones. Some of these choices have distinct cost and security advantages over physical cards. We asked this week’s Expert Panel Roundtable: How soon will the access control card become extinct and why?
Cost is a reality to be managed. No matter how powerful or desirable a technology may be to a customer, the sale often comes down to the basic question: Can I afford it? And affordability extends not just to the purchase price, but to the cost of technology over its lifespan. In addition to advances in technology capabilities, the security industry has also achieved inroads to make its offerings more worth the cost. We asked this week’s Expert Panel Roundtable: What is the physical security industry doing to make more affordable and cost-effective technology solutions for end users?