Sectigo, a globally renowned company in digital identity management and web security solutions, has announced the launch of its new Secure Partner Program, furthering Sectigo’s commitment to the company’s base of more than 1,200 partners worldwide. Partners in the program gain myriad benefits, including access to the new Sectigo Connect Partner Portal, advancing their ability to build new capabilities, deliver more value to customers, drive higher profits, and accelerate growth in t...
“While it has certainly been a tough year for in-person events, the Electronic Security Association (ESA) sees the value that the Electronic Security Expo (ESX) delivers each year to the pro-installed electronic security and life safety industry,” says ESA President, Jamie Vos. “As a previous co-owner of ESX, ESA has now acquired full ownership of the industry’s only national tradeshow developed by and for the pro-installed community. ESX is a place where you can feel th...
Allied Universal, a globally renowned security and facility services company in North America, has announced the acquisition of SecurAmerica, a privately held, Atlanta, Georgia-based security company with 49 offices located throughout the United States of America. Terms of the deal were not disclosed. US-based, private security firm SecurAmerica was founded by Frank Argenbright, a Georgia entrepreneur who, over the past 40 years, has built both security and facilities management companies with...
SATO (SATO Europe) has underpinned its leading range of labelling solutions with the launch of its new PV4 mobile printer, a next-generation mobile printer aimed at providing operators with enhanced efficiency across supply chains. The globally renowned company in the development of auto-ID and labelling solutions has designed the printer for on-the-go tasks across a wide range of fast-paced environments where performance and precision are crucial, such as logistics and distribution centres. Wi...
SALTO Systems’ access control door lock components and system peripherals are definitely keeping in step with the latest and best new building design trends. The new Dark Bronze option for the XS4 Original and Mini ANSI product range matches some of the new design trends and blends perfectly with both white and dark doors, modern styles, and sophisticated wooden decorations. SALTO door locking solutions The SALTO door locking product range is available in a variety of finishes to comple...
Bosch Security Systems (Bosch) has introduced the AUTODOME IP starlight 5100i with enhanced image quality and built-in Artificial Intelligence (AI) to help operators react before a potential situation occurs. Designed for outdoor surveillance applications when light levels vary, the AUTODOME IP starlight 5100i has a new ½ inch camera sensor offering 4MP resolution and 20x optical zoom to detect people or objects at a maximum distance up to 1,676 metres (5,498 feet). AUTODOME IP starligh...
Evolv Technology has announced the appointments of a pair of executives with proven track records for guiding high-growth digital technology companies into global market leaders. Eric Pyenson joins as General Counsel from VMware Carbon Black (part of Carbon Black, Inc.) and A.J. De Rosa as Chief Revenue Officer (CRO) from Orbital Insight. Evolv just completed its most successful year since being founded in 2013. Scaling operations across all functions, the company is the world’s first and only commercially successful provider of artificial intelligence (AI)-based touchless security screening systems. Evolv Express Evolv Express is deployed worldwide and has been used to screen more than 50 million people Evolv Express is deployed worldwide and has been used to screen more than 50 million people, second in numbers only to the U.S. Department of Homeland Security’s Transportation Security Administration (TSA). Pyenson is a veteran technology industry lawyer and management executive with broad private and public company experience, including managing multiple initial public offerings (IPOs) and strategic transactions, as well as building respected in-house legal teams. Technology industry expert He joins Evolv as general counsel from VMware Carbon Black, where he served as vice president and general counsel of the Carbon Black Security Business Unit following VMware’s US$ 2.1 billion acquisition of Carbon Black in 2019. Previously, as Carbon Black’s General Counsel and a member of the executive team, he helped lead its US$ 175 million IPO in 2018. He also served in a similar role with A123 Systems, which had one of the most successful IPOs in the clean technology sector. Notably, he has significant international and security experience serving the U.S. government on counterterrorism matters earlier in his career. New sales and revenues head As Evolv’s new Chief Revenue Officer (CRO), De Rosa is responsible for all sales, business development, customer success and strategic partnership initiatives. Most recently, he served as CRO at Orbital Insight, where as head of all client-facing operations, sales, customer success and marketing efforts he helped the company to establish a global leadership position in the geospatial analytics sector. With expertise in advanced sensors, data analytics, SaaS-based models and sales optimisation methodologies, he brings to his new role more than 25 years of experience scaling global sales organisations, building strategic relationships and driving customer success. Combining vision with advanced technologies We’re living in chaotic, stressful times and having a sense of safety has never been more important" Earlier in his career, as Senior Managing Director and Co-head of Global Sales at Eze Software Group, he built a team that grew annual sales in excess of US$ 100 million. “We’re living in chaotic, stressful times and having a sense of safety has never been more important,” said Evolv Technology’s Chief Executive Officer (CEO), Peter George, adding “Evolv identified early on that human security had to be fundamentally rethought in order to provide substantially better outcomes – capable of addressing known threats as well as risks that would inevitably present themselves in the future.” Peter further said, “By combining our vision with advanced technologies, we’re leading that digital transformation. We’re thrilled to welcome Eric and A.J. to the team. They’ll play important roles as we accelerate our growth and keep even more people safe around the globe.” Digital transformation of physical security Evolv is leading the digital transformation of physical security, one that is touchless and addresses the ‘new normal’ threat of pandemic viruses as well as concealed weapons. Using AI software and powerful sensors, Evolv Express can screen up to 3,600 people per hour, 10 times faster than legacy approaches such as metal detectors, hand wands and manual inspections. The system enables social distancing at entrances and other security checkpoints, while minimising person-to-person interaction, requiring no stopping, no emptying of pockets or removing bags. Screening technologies deployed at various sites People being screened simply walk through naturally, alleviating potential crowding and long lines while greatly reducing contact between guests, employees and security staff. In use at hundreds of outdoor entertainment venues, cultural landmarks, corporations, warehouses, schools, hospitals, stadiums and large-scale events worldwide, Evolv’s customers include Six Flags Entertainment Corporation, L.L. Bean, Wynn Las Vegas, Oakland International Airport, two South Carolina school districts, Hersheypark, Set Jet, the Biltmore Estate and the Pittsburgh Symphony Orchestra. By using Evolv Express, organisations optimise the performance of their security teams, while reducing screening expenses by as much as 70 percent.
GAI-Tronics, the globally renowned company in manufacturing industrial and commercial communication solutions, has announced the release of its new access control feature to the HUBBCOM family of products, Temperature Sensing. Temperature sensing Temperature sensing is a new way to facilitate a contactless check-in process for employees and authorised visitors in a building. “GAI-TRONICS is proud to have developed an access control feature that complies with WHO COVID-19 safety standards and guidelines to ensure peace of mind and promote health and safety,” said Stuart (Stu) Foote, Senior Product Manager at GAI-Tronics. Benefits of Temperature Sensing Access Control include: Body temperature reading while wearing a mask Minimisation of face-to-face contact when checking into a building Reduction of contact transmission by reporting irregular body temperatures Reduction of manual temperature scanning workload Compliance with COVID-19 safety standards and regulations How Temperature sensing works? Access to a building or facility is denied if an irregular body temperature is detected An authorised user walks into a business’s vestibule/lobby, scans their access card and is prompted to align their face with the template that appears on the screen. Body temperature is read within 2-5 seconds and, if a satisfactory temperature is detected, access is granted. Access to a building or facility is denied if an irregular body temperature is detected. An email report of the body temperature and photo are sent to a pre-determined individual (security personnel or facility operations management etc.). What makes GAI-TRONICS’ system different? HUBBCOM devices provide numerous functionalities from access control and point-to-point audio/video intercom to SIP telephony and facility-wide or zoned broadcasting and alarm generation. Temperature sensing is an option offered on HUBBCOM models (GSC1100TS, GSC2100TS, GSC3100TS and GSC4100TS). Temperature sensing access control is an ideal security solution for businesses across a wide range of markets including manufacturing facilities, offices, educational institutions, healthcare and almost any building with an indoor vestibule/entry way.
Ensuring the safety of residents and staff in specialised housing environments has always been a priority for those in the sector. Karen Trigg of Allegion UK highlights the steps decision-makers must make to keep occupants in sheltered, extra care or supported housing safe and secure. Whether it’s adhering to fire safety or infection control guidelines, a topic that is never far from ones thoughts at the moment, there are many options that decision-makers can take to ensure maximum safety and compliance in specialised housing settings. Only recently, the pandemic has left facilities such as care homes and their staff under scrutiny over their infection control methods. And now, with the winter period playing a role in the spread of common colds and such, infection control, along with the safety of occupants, is rife in the news. So, with that in mind, what are the steps that must be taken to ensure occupants in supported housing stay safe and secure? Safe environment Providing a safe environment for all doesn’t have to be a complex process, although it is important that the process is thorough, with occupants in these settings potentially far more vulnerable to injury or worse in the event of a fire. The same is true for infection control, where robust policies and protocols should be in place to protect those living in supported housing, as well as the staff looking after them. Fire safety NFCC comprehensive guide includes proposals designed to protect residents situated in specialised housing The National Fire Chiefs Council’s (NFCC) comprehensive guide for specialised homes, published in 2017, includes many proposals, all designed to protect the estimated three-quarters of a million residents situated in specialised housing in the U.K. Further to this, in January 2020, the Scottish Government strengthed its response to fire safety – the Practical fire safety for existing specialised housing and similar premises: guidance – which is aimed at housing and care providers, as well as care regulators and care service commissioners. Both reports detail ways in which specialised homes should work to minimise fire risk to protect both the people living, working and visiting there and the building itself. Risk assessment & fire safety management Examining the statistics surrounding fire safety in these environments, it’s unsurprising that it remains a priority. According to the NFCC report, sheltered and extra care housing accounts for about 2% of housing stock, but between 2010 and 2016, they accounted for about 7% of fires – a critical finding. From this, London Fire Brigade’s eight-page document distilled the main information and includes a person-centred fire risk assessment checklist and a list of the main fire safety management procedures, such as testing fire doors and fire alarms, record-keeping and essential maintenance. Crucially, fire doors and their appropriate door hardware, such as mechanical and electromagnetic closers and panic emergency exit hardware, must be fitted correctly and regularly checked to ensure these heavily used products are fit for purpose. Comfortable usage Key for specialised housing, it’s important to remember that there is no one-size-fits-all solution to fire safety products. Residents, for example, must be comfortable using fire doors and their hardware, thus removing the risks associated with heavy or non-functional doors that residents in these settings may have additional problems operating. Decision-makers are advised to consult a door hardware expert, who will provide further guidance as to the products that will best meet the needs of a specific facility. These experts consider such issues as assessing the emergency access and egress systems, as well as establishing how best to accommodate the needs of all occupiers and staff. Infection control 80% of infections spread through the environment and 71% of healthcare facilities use environmental cleaning to prevent the spread of infection Infection control has long been front and centre of people’s minds – and never more so since the COVID-19 pandemic, which highlighted the endemic risks in all commercial, healthcare, domestic and cares home settings. In 2018, a report conducted by Allegion UK revealed that while 80% of infections are transmitted through the environment, only 71% of healthcare facilities used environmental cleaning to prevent the spread of infection. Furthermore, just 52% of healthcare respondents said they were satisfied that their existing infection control measures were robust and effective. The potential for exposure to pathogens is significant within specialised home settings. While handwashing and disinfection protocols, as well as ventilation procedures, all form an important part of infection control, there are additional measures that can be taken, such as installing antibacterial door hardware, handles and levers in high-traffic areas. Antibacterial protection These solutions contain added antibacterial protection to help eliminate potentially harmful bacteria and defend against the spread of microorganisms. In an environment where health risks are more probable, this provides extra peace of mind when it comes to maintaining the highest levels of hygiene and minimising the risk of contamination. It’s also key to observe the building’s emergency exits. Emergency exit devices can also be coated with antibacterial properties, contributing to both fire safety standards and now infection control, by reducing the risk of cross-contamination, providing long-lasting protection and enabling people to escape a building quickly. Furthermore, touchless electromagnetic door controls can assist with ease of movement, fire safety and infection control by being linked to the building’s alarm system, closing shut in the event of a fire and eliminating the need for people to wedge the doors open. Taking responsibility In what is now a critical time for many specialised housing facilities, decision-makers must take responsibility in their choices to help meet both the fire safety and infection control requirements that have been set. While it’s true that the varied nature of running sheltered, extra care and supported housing facilities can make decisions feel like complex challenges, today’s hardware solutions provide one helpful and easy solution, enabling higher levels of building safety and security and that, in the current environment, is more important than ever.
Synology Inc., globally renowned high-performance, reliable, versatile, and environmentally-friendly NAS servers and storage solutions firm, has announced the launch of the RackStation RS1221+ and RS1221RP+ (redundant power) 2U 8-bay rackmounted storage servers, which have been specially built to deliver high performance in a space-efficient and cost-effective manner. “The RackStation RS1221+ and RP+ storage server units are designed for small businesses, and indeed, ‘small’ they are,” said Michael Wang, Product Manager at Synology, Inc. Michael adds, “These units not only pack in a huge leap forward in performance, but do it at a modest depth for 2U units in their class. What's more, for businesses that require higher availability, the RP+ version is equipped with dual power supplies for redundancy and added reliability.” RackStation RS1221+ and RS1221RP+ storage servers The new RackStation series units deliver 3.6X higher compute performance and 3.8X random read IOPS at 108K The RS1221+ and RS1221RP+ rackmounted storage servers are the first RackStation series units built around the AMD Ryzen V1500B processor. Compared to their predecessor, the new RackStation series units deliver 3.6X higher compute performance, 3.8X random read IOPS at 108K, and 2.3x higher sequential write performance at 1,147 MB/s. This basically translates to faster performance in data management and backup tasks, while also allowing businesses to scale to higher numbers of concurrent users and services, and the same time maintain a high performance output. Compact servers for space-sensitive deployments At only 306.6 mm and 407.5 mm deep (including front server handles), the RackStation RS1221+ and RS1221RP+ storage servers are less than half the depth of standard 2U rackmounted devices, making them ideal for smaller rackmount enclosures, such as wall mounted cabinets, or two-post racks (RS1221+ only), where space is at a premium. The RackStation RS1221+ and RP+ storage server units are configured with 4 GB of DDR4 ECC memory by default, upgradable to 32 GB. Its PCIe 3.0 slot enables easy upgrading to 10GbE with a compatible NIC, or to add super-fast NVMe cache via Synology M.2 cards and Synology SVN3000 series SSDs. These rackmounted server units can scale to 12 drive bays using an RX418 expansion unit and compatible drives. For businesses wanting extended support, its 3-year limited warranty and can be extended to 5 years. Efficient data management and protection Synology DSM enables backup of IT infrastructure with the Synology Active Backup suite Synology Diskstation Manager (DSM), Synology's unified operating system, simplifies difficult and cumbersome data management processes while still giving users ample control over decisions that matter. Synology DSM enables backup of IT infrastructure with the Synology Active Backup suite and hosting of on-premises private cloud with Synology Drive, virtual machines with Virtual Machine Manager, mail servers with MailPlus, and other SaaS services. Global availability RS1221+ and RS1221RP+ are available from Synology resellers globally. The predecessor, the RS1219+ contains an Intel Atom C2538 processor. Performance figures are achieved in the Synology lab with optimized network and configuration settings. Actual performance could vary in different environments. Comparison done against prior-generation RS1219+. Check compatibility list for compatible Network Interface Cards. 2 SSD cache can be enabled using the E10M20-T1 and M2D20 M.2 SSD adapter cards with Synology SNV3500 or SNV3400 NVMe SSDs. SSD caching is also supported via SFF (2.5") SSDs. The capacity of the RS1221+ and RS1221RP+ can be expanded using a Synology RX418 expansion unit, purchased separately. Supports LFF (3.5 inch) or SFF (2.5 inch) SATA drives. Check compatibility list for validated drives. RS1221+ and RS1221RP+ include a 3-year limited hardware warranty, which can be extended to 5-years with the optional EW201 bundle, a 7-year Extended Warranty service add-on.
Ping Identity, the Intelligent Identity solution for the enterprise, has been honoured with a Glassdoor Employees’ Choice Award, recognising it as a Best Place to Work in 2021. The annual Employees’ Choice Award is based solely on the input of employees who provide anonymous feedback about their job, work environment and employer on Glassdoor, one of the worldwide leaders on insights about jobs and companies. Ping Identity was recognised as a Best Place to Work among Small and Medium sized companies in the U.S., ranking among the top 50 with an overall rating of 4.8 out of 5 stars. The Glassdoor honour stems largely from Ping’s ongoing focus on cultivating an employee-first culture. Nurturing a safe environment The uniquely supportive and inclusive culture encourages work-life balance and offers robust health and wellness options, childcare flexibility, charitable matching and more, all while nurturing a safe environment for professional and personal growth. When sharing a company review on Glassdoor, employees are asked to rate their satisfaction with the company overall When sharing a company review on Glassdoor, employees are asked to rate their satisfaction with the company overall, and key workplace factors such as career opportunities, compensation and benefits, culture and values, senior management and work/life balance. In addition, employees are asked to describe the best reasons to work at their companies as well as any downsides. Compensation and benefits "The most enduring companies put people, culture, and values first. We're grateful to all the employees who took the time to share their honest experiences working at Ping and we're honoured to serve them,” said Andre Durand, CEO and Founder of Ping Identity. Glassdoor’s Best Places to Work were determined using company reviews shared by U.S.-based employees between October 22, 2019 and October 19, 2020. To be considered for the U.S. small and medium company category, a company must have had fewer than 1,000 employees and have received at least 30 ratings across each of the eight workplace attributes (overall company rating, career opportunities, compensation and benefits, culture and values, senior management, work-life balance, recommend to a friend and six-month business outlook) from U.S.-based employees during the period of eligibility.
HiveWatch, a security fusion startup company that uses multi sensor fusion to help companies respond better and effectively to physical security threats, has emerged from stealth and announced a seed funding round led by CrossCut Ventures, with participation from Freestyle and SaaS Ventures. Centralising event data HiveWatch’s platform pulls data from a company’s disparate monitoring systems and security sensors to provide operators a single-pane-of-glass to evaluate and respond to alerts. By centralising event data, HiveWatch reduces the security program noise that plagues operations By centralising event data, HiveWatch reduces the security program noise that plagues operations, using multi-sensor analysis and machine learning to only elevate events that require a human response. With years of experience building comprehensive security programs for both unicorn startups and renowned Fortune 500 enterprises, HiveWatch’s Chief Executive Officer (CEO) and Founder, Ryan Schonfeld is addressing the biggest common challenge in building an advanced and state-of-the-art global security operations centre. Security operations platform “We’re building a platform to make security leaders more aware, more connected, more proactive, and more informed,” said Hive Watch Chief Executive Officer and Founder, Ryan Schonfeld. He adds, “Noise from the wide range of legacy sensors that exist within most companies’ security infrastructure is only addressed by hiring more people to process the data, resulting in a reactionary security program yielding minimal return on investment. The overarching vision of HiveWatch is to help the security leaders we talk to every day gain the intelligence needed to make their teams more effective.” Multi-sensor analysis to reduce noise HiveWatch reduces 90% of the noise that plagues operations centres on a daily basis and allows operators to evaluate the remaining threats as fast as possible. Instead of operators switching between each sensors’ proprietary software to manually gather situational data, HiveWatch empowers operators by presenting all significant event feeds in one window as an alert comes in. Vast experience in technology startup execution HiveWatch is made up of top technical talent from Apple, Bird, Cisco, Disney, and NORAD HiveWatch is made up of top technical talent from Apple, Bird, Cisco, Disney, and NORAD, who have a broad combined security expertise in advanced military operations knowledge with high-growth technology startup execution. HiveWatch’s Head of Product, Jordan Hill has previously led multiple teams at Bird to develop machine learning solutions to contextualise hardware and software data for internal safety operations, sidewalk detection, and asset recovery that returned millions of dollars in capital investments and revenue globally. Enhanced interoperability and visibility “We were attracted to the background of this founding team, and their history and experience in scaling corporate security systems for high-growth companies like Bird,” said Brian Garrett, Co-Founder and Managing Director at Crosscut Ventures. Brian adds, “Ryan and Jordan have figured out how to bring interoperability and visibility into an antiquated software and hardware ecosystem. Their approach will make corporate security programs more accessible for both high-growth startups and Fortune 500 enterprises as we enter a post-Covid, data-driven paradigm.” Building scalable and efficient security programs HiveWatch is directing their funding to expand their team with new and diverse security leaders and system engineers to accelerate feature releases and onboarding customers from their wait list. “Interoperability has been a problem in physical security since I started my career more than 30 years ago,” said Ron Rothman, former President of Honeywell Security and a HiveWatch Advisor, adding “The nature of products available today has made scaling security cumbersome. With HiveWatch, you can build scalable and efficient programs by sense making and reducing noise across disparate security sensors.” HiveWatch is the multi-sensor security fusion platform that brings the right people, information, and tools together to achieve higher levels of security and safety. HiveWatch provides teams with access to the data they need, when they need it by delivering fused intelligence to empower proactive security.
Several major players vigorously employ biometric recognition technologies around the globe. Governments use biometrics to control immigration, security, and create national databases of biometric profiles. Being one of the most striking examples, the Indian Aadhaar includes face photos, iris, and fingerprints of about 1.2 billion people. Financial institutions, on their part, make use of biometrics to protect transactions by confirming a client's identity, as well as develop and provide services without clients visiting the office. Besides, biometric technology ensures security and optimises passenger traffic at transport facilities and collects data about customers, and investigates theft and other incidents in retail stores. Widespread use of biometrics Business, which suddenly boosted the development of biometrics, is an active user of biometric technology Business, which suddenly boosted the development of biometrics, is another active user of biometric technology. Industries choose biometric systems, as these systems are impossible to trick in terms of security, access control, and data protection. Being in demand in business, these three tasks are also relevant for the industry. However, the use of biometrics at industrial sites is discussed unfairly seldom. Therefore, it is the face identification that is the most convenient there, as workers often use gloves, or their hands may be contaminated, and the palm pattern is distorted by heavy labour. All these features make it difficult to recognise people by fingerprints or veins and significantly reduce identification reliability. Therefore, industries seek facial recognition solutions. Thus, let us demonstrate the application of face recognition technology at different enterprises, regardless of the area. Facial recognition use in incident management Facial biometric products are known to automate and improve the efficiency of security services by enriching any VMS system. These systems provide an opportunity of instantly informing the operator about recognised or unrecognised people, and their list membership, as well as save all the detected images for further security incident investigation. Furthermore, some sophisticated facial biometric systems even provide an opportunity to build a map of the movements of specific people around a site. Besides, it is relevant not only for conducting investigations but also in countering the spread of the COVID-19 virus. Identifying and tracking COVID-19 positive cases Therefore, if an employee or visitor with a positive COVID-19 test enters a facility, the system will help to track his/her movement and identify his/her specific location. It will also help to take the necessary measures for spot sanitary processing. Thus, the introduction of biometric facial recognition at the industrial enterprise can improve and speed up the incidents’ response and investigations without spending hours watching the video archive. Access control system to secure physical assets The right access control system can help industries secure physical and informational assets The right access control system can help industries secure physical and informational assets, cut personnel costs, and keep employees safe. Facial recognition systems may enrich access control systems of any company by providing more security. As biometric characteristics, by which the system assesses the compliance of a person with the available profiles in the database, cannot be faked or passed. The human factor is also reduced to zero, due to the fact that while identity documents can be changed, the inspector can make a mistake or treat his/her task carelessly, be in collusion with an intruder, the biometric system simply compares a person in front of the camera with the biometric profiles database. Biometric facial identification software For example, RecFaces product Id-Gate, a specialised software product for reliable access control to the site, checks the access rights by using biometric facial identification alone or in conjunction with traditional IDs (electronic passes, access keys, etc.), which means that there is almost a zero probability of passing to the site by someone else's ID. The access control system’s functionality allows one to strictly account the number and time of all the facility’s visitors and also track their movement. When unauthorised access is attempted or a person from the stop list is detected, Id-Gate sends an automatic notification to the access control system and operator. Enhanced data and information security Even despite the division of access to different industrial enterprise areas, the security service needs to provide independent information system security. Employees with the same facility access rights may have different access rights to data. However, in that case, a personal password is not enough, as an employee may forget it, write it down and leave it as a reminder, tell a colleague to do something for him/her during the vacation, or just enter it at another person’s presence. Password-free biometric authentication systems make the procedure user-friendly and secure Password-free biometric authentication Password-free biometric authentication systems make the procedure user-friendly and secure. Such systems usually provide an option of two-step verification when successful password entry is additionally confirmed by biometric recognition. Hence, it is particularly relevant due to the current lockdown in many countries. To sum up, the application of biometric technologies solves several issues of the industry, such as: Optimises and partially automates the work of the security service, as it provides reliable identification and verification of visitors/employees, reduces the amount of time spent on finding a person on video and making a map of his/her movements, without spending hours on watching video archive in case of investigation. Provides a high level of reliability and protection from unauthorised access to the enterprise and the information system. Provides a two-step verification of the user/visitor (including password and biometric data) and almost eliminates the risk of substitution of user data/ID.
The Security industry’s role in maintaining safe workplaces has never been more critical. Yet, individual security officers remain likely to drop shifts at the last minute and with greater frequency in the current climate, with illness, lockdown, self-isolation and home-schooling all common reasons for being off. Having a reliable bench with relief officers on hand has never been more important. Sorting drops internally (as opposed to using agency officers) is no longer nice to have to improve margins but is increasingly expected by clients who require consistent support more than ever. Thanks to COVID-related complications, staff sickness and absence rates could reach as much as 15% this winter and because of this, Controllers can no longer assume they know how many Security officers are going to be able to turn up on any given shift. The truth is traditional static, fixed schedules and standard workforce management software can’t resolve blow-outs or unpredictable demand with any degree of reliability. It is too rigid and inevitably operates too close to maximum capacity to give scope for an adequate response. Agency officers By using agency officers, Controllers find themselves stuck in a cycle of relying on them and allocating valuable time to filling shifts rather than dealing with the root of the staffing issues. Agency officers are also expensive and need to be trained, with each new officer having to be familiarised with site procedures before starting a shift. By avoiding agencies businesses can not only save money but also the relentless job of ringing around to fill last-minute gaps. Agency staff also heightens the risk of internal officers catching COVID by increased mixing with outside staff members. Static staffing Static roles have a fixed rota pattern and are needed in place no matter how low or high each site requires So, what can Controllers do to avoid agencies but also ensure they have the staffing levels they require? The solution lies in rethinking the approach to static staffing - or staffing by fixed-schedule, permanent team members. In short, the answer is to set full-time staffing levels to the minimum required for operational stability and use a bench of dynamic reserves to cover all other levels of demand. Static roles are those that have a fixed rota pattern and are needed in place no matter how low or high each site requires. Dynamic roles, in contrast, are those roles that can be filled from a pool of people who work non-fixed hours. Once minimum full-time staff requirements are determined then Controllers can begin mapping the dynamic reserves needed to build a bench of officers. How to build a bench Choose areas of the business (by client contract or region) that will benefit most. As a guide, look first where any agency usage is significant. A bench isn’t a line-up of second-rate substitutes - it’s an opportunity to build a talented flexible workforce that wants or needs to be able to work non-standard hours. By empowering bench officers with choice over how and when they work, businesses will see less staff turnover and be able to fill shifts quickly and easily with the right people. By taking into account the preferences and skills of the workforce businesses can intelligently match available officers to the right shifts for them. This helps to build better teams that work well together and allows officers to choose the shifts that suit them best. There has never been a better time for recruiting additional bench staff. This may seem an odd strategy during a recession, but with unemployment levels at a high and incentives from the government to employ apprentices, now is actually the perfect time to look at what additional skills each team needs to offer high levels of service. With the option of flexible contracts and many officers looking to be able to fit work into their busy lifestyles, recruiting additional officers to be part of a bench is a win-win situation. Flexible working options Dynamic staffing gives maximum responsiveness and efficiency but it is complex There are further advantages of internally filling roles, especially during the pandemic, such as peace of mind that officers aren’t mixing unnecessarily with outside staff, reducing the risk of exposure to the virus. This is especially important for those who live with or are high-risk people themselves. In addition to this, by offering flexible working options, officers can feel empowered and happier; we live in a flexible and personalised society so why shouldn’t this thinking be applied to our working lives? By giving officers this dynamic option, many who have other responsibilities such as childcare or aging relatives to care for can still enjoy working and contributing to society. This way of thinking is inclusive, empowering and a lifeline for those who are juggling different factors. Dynamic staffing software Dynamic staffing gives maximum responsiveness and efficiency but it is complex. The moving parts involved - the volume of officers, their availability, the necessary skills, performance feedback - is hard enough when setting schedules in advance. Throw in last-minute blow-outs because of sickness, timetable clashes and operational needs and the sheer complexity can cause an operational meltdown. Dynamic staffing software can help take the operational headache away. Treating officers equally Lastly, it is important that all officers are treated equally, whether full time or bench. Controllers and the reputation of the business rely on these bench officers to respond to unpredictable needs, they aren’t a band-aid, they are the business and their performance depends on their satisfaction and retention.
Today’s environment has evolved into something that according to some may seem unexplainable. But in the context of video surveillance, this is something that we understand. Allow me to shed some light and understanding in terms of security and why it truly is a necessity. Security is not a luxury, it is a necessity. An essential practice now peaking the interests of all businesses small and large. A video surveillance system is a cost effective option that does not require monitoring fees. As business slows, temporarily shuts down or closes, an increase in vacant properties is inevitable. This pandemic will continue to put severe pressure on many businesses around the country. With so many considered non-essential, it is really sad to see how many must shutter their doors and lay off employees. Keeping an eye out for suspicious activity using a commercial grade surveillance system that supports advanced analytics, may end up saving your potential customers thousands of dollars down the road. Demand for video surveillance and security products We can certainly draw on the conclusion that security is a “need” more so than a “want”. Times like this just further cement that thought process. In today’s economic spiral, people aren’t actively looking for lighting controls or home theaters. What they look for is a way to keep their loved ones safe, protect their homes, businesses and property. In my opinion, you will see video surveillance and security product sales skyrocket in the coming months and years. It has been reported that response times for first responders may be impacted as a result of COVID-19, leaving those with bad intent more time to ransack a property knowing that law enforcement may be slow to respond. Criminals will always take advantage of the situation. All we can do as a community is use common sense, stay vigilant and watch out for one another. For some of us that may mean mitigating risks with technology. Affordable video monitoring solutions Having a solution that can quickly and securely share video footage may be the difference between identifying a perpetrator and becoming a victim. Ella, a video search platform developed by IC Realtime, makes every second of video instantly searchable and shareable, either with the authorities or your neighborhood social apps. Plus it is compatible with any RTSP streaming device. To wrap this up, it’s not about pointing out the obvious, it’s really about bringing awareness as to how technologies can be implemented to provide peace of mind without breaking the bank. Video surveillance technology is a way to do that and provide added security for you, your family and your business.
The cloud is here to stay. Its resilience and ability to connect the world during during the COVID-19 pandemic has proved its worth, even to the uninitiated who have now witnessed first-hand the value of connected systems. Video and access control as a service provides a flexible and fluid security and business solution to meet the demands of a rapidly evolving industry, where the changing threat landscape means investing in the cloud is an investment towards success. This article will look back at our articles in 2020 about the growing popularity of cloud solutions for physical security, with links to the original content. Product offering While most people agree on the definition of “cloud,” there are several points about the terminology that may require clarification. Private cloud or public cloud? VSaaS or unlimited storage for video? Beyond the basics, the terms become foggy, reflecting a variety of notions about how cloud services fit into the broader physical security marketplace. As cloud usage becomes more popular, it’s important that marketers be precise in their terminology, and that integrators and end users be diligent in understanding the specifics of available product offerings. Different meanings “The cloud has many different possible connotations, depending on the context,” says Yu Hao Lin of Rasilient Systems, one of our Expert Roundtable panelists. For example, corporate CIOs will more likely understand the cloud to be a private cloud platform. As such, the public cloud is a ubiquitous term while the private cloud is more specified. Cloud system security Security of cloud systems is an ongoing discussion in the industry, especially how cloud system cybersecurity compares to that of on-premise systems. Our Expert Panel Roundtable weighed in on this question. “While both kinds of security systems serve their purpose, it can be argued that the streamlined updates that are commonplace with cloud-based solutions may put them at more of an advantage when it comes to data security,” says panelist Eric Widlitz of Vanderbilt Industries. “Also, most reputable cloud-based solutions are running in secured data centers by companies such as Google, Microsoft or Amazon, so you also get to take advantage of all the security layers they have protecting your data.” Hybrid cloud video security solution A growing list of cloud players reinforces the importance of the cloud in the future of physical security There are several relatively new companies pushing cloud in a big way. Verkada is fast-growing company currently currently focusing to deliver an all-in-one hybrid cloud video security solution powered by edge processing inside the camera. The growing list of cloud players reinforces the importance of the cloud in the future of physical security. Combining AI and cloud video One company investing in the cloud is Eagle Eye Networks, which has raised $40 million of Series E funding from venture capital firm Accel to finance the realisation of their vision to combine AI and cloud video. The money will allow Eagle Eye to continue its steep growth curve and leverage AI on its true cloud platform to reshape video surveillance. “The investment will make video surveillance smarter and safer for end-users,” says Ken Francis, President. Eagle Eye offers an application programming interface (API) to enable the integration of best-in-breed third-party AI and analytics systems to leverage the video. Eagle Eye is also investing in its own AI development and hiring additional development and customer service personnel. Hirsch Velocity Cirrus and MobilisID Identiv introduced the Hirsch Velocity Cirrus cloud-based Access Control as a Service (ACaaS) solution and MobilisID smart mobile physical access control solution. Hirsch Velocity Cirrus is an optimal solution for both end-users and integrators, with lower upfront costs, reduced maintenance, enhanced portability, and the future-proof assurance of automatic security updates and feature sets. MobilisID is a smart mobile physical access control solution that uses Bluetooth and capacitive technologies to allow frictionless access to a controlled environment without the need to present a credential. Advantages and disadvantages Advantages of cloud-based physical security technologies are many, when supporting staff The advantages of cloud-based physical security technologies are many, and have wide-ranging applications for all areas of the transport sector; across stations, transport hubs and vehicles. When used to support staff and complement existing processes, such systems can prove invaluable for transport professionals in helping to create a safer working environment, promoting confidence among personnel and passengers, and assuring passengers who are fearful about the current pandemic that all possible precautions are being taken during their journey. 5G supporting cloud-based applications 5G is the first communication environment that is cloud-native. As such, such, 5G networks will support cloud-based applications in a way that 4G, 3G and 2G can’t support. For instance, sensors (e.g. in a manufacturing plant) often have small internal storage and rely on synced devices (e.g. gateways) to interact with the cloud. Soon, these sensors will be able to work more efficiently, interacting with the cloud via the ultra-low latency and the edge computing capabilities supported by 5G networks. Increasing use of IoT Unlike current IoT services that make performance trade-offs to get the best from these existing wireless technologies, 5G networks will be designed to bring the high levels of performance needed for the increasing use of IoT. It will enable a perceived fully ubiquitous connected world, with the boosted capacity offered by 5G networks transferring exponentially more data at a much quicker rate.
Many employers faced a need to ramp up hiring of drivers to meet a higher demand for product deliveries and transportation logistics during the COVID-19 pandemic. To meet the demand for drivers, employers had to make quick hiring decisions while also ensuring products were still being delivered in a timely fashion. Safe work environment Businesses have a duty of care to provide a safe working environment for their employees and contractors. It is therefore important to limit exposing drivers to risk, to put in place proper safety and security protocols, and to clearly outline them in company policies. Whether an employee or contractor, these drivers represent the brand they work for. If they do not adhere to company-mandated safety and security rules, because the business did not make them aware or they intentionally did not comply by acting with malice, this can put the drivers, other employees, customers and the company at risk financially, legally and with regard to their reputation. Adherence to safety protocols Operating in haste typically results in forced errors and mistakes within the business" “This need to hire drivers quickly resulted in many businesses lowering their standards and accepting certain risks to meet the increased demand. Operating in haste typically results in forced errors and mistakes within the business, potentially leading to harmful events and a damaged brand reputation,” stated Thomas Kopecky, Chief Strategy Officer and Co-Founder, Ontic Technologies (Ontic), a unified protective intelligence software platform. In the conversation presented below, Kopecky outlines the safety and compliance requirements needed to manage the risks while meeting the demand for drivers. Q: What risks do employers face as they ramp up hiring to meet higher demand for drivers? Thomas Kopecky: There have been instances in which a transportation contractor with multiple violations has simply established the business under a new name but continues to operate dangerously. Hastily hiring such a firm without proper enhanced vetting increases the risk from a safety, as well as a business continuity standpoint. Having to terminate a contract and replace a contractor midway can also have significant financial repercussions. In addition to problems created by executing too quickly, employers are now required both to mitigate their own general liability risks and to manage the perceived risk they may create due to the pandemic. For example, if a delivery driver tests positive for COVID-19, there is the potential they have also exposed customers. Employers must consider contactless delivery or other methods and protocols to mitigate this presumed risk of the pandemic. Q: What are the elements of safety and compliance involved in onboarding new drivers? Thomas Kopecky: When onboarding new drivers, corporations must think about more than clean background checks and adequate infrastructure. Whether employees or contractors, organisations must focus on what other risks the drivers bring with them. As part of this review, an open source scrub should be conducted at the outset to discover the driver’s online activity. Through this exercise, a whole host of questions can be addressed including, for example, whether their morals and values align with those of the company. Are they involved with fringe or radical interest groups? Do their actions conflict with the culture of the organisation, and could they have a negative impact? These are all questions that employers should be considering when hiring new drivers or contracting a new company. Q: What tools are available to help companies vet their driver fleets and how can these tools make a difference? Employers should also consider State Business Records for potential red flags Thomas Kopecky: To vet their driver fleets, corporations can use several tools and resources that will strengthen the organisation’s overall security. Ideally this is a software platform that brings all this information into one place so vetting, real-time data and concerning activities are not siloed but can be connected in order to assess potential risks and threats. Logically, businesses should consider reviewing Department of Transportation Records, which allow organisations to check whether drivers are licenced and appropriately insured. Employers should also consider State Business Records for potential red flags, such as whether an organisation is delinquent or no longer functioning in a given state. Finally, it’s beneficial to review civil records as these can highlight any active or past cases associated with an organisation. This includes fraud, bankruptcy, poor business practices, and more. Q: What should be the standard methodology to investigate and collect data on new driver programs? Thomas Kopecky: Corporate culture and company policies impact the level of vetting required (determined by company policy), which varies from business to business. Quite often, most valuable investigative content is associated with an actual fleet company owner and not a recently created business entity so it behooves corporations to research this information first. Then verify the information provided is correct, and whether any other conflicting information exists. As previously noted, employers should review civil and criminal records at the state level and cases at the federal level, as it is often the fleet company or owner involved in litigation that could reflect negatively on a brand. Media coverage and consumer complaints are another critical source for negative mentions that may not always appear in public records. You should also ask if the Department of Transportation (DOT) regulates this contract or driver; and if they were once a provider and are now re-applying, is it under a new name? If the answer is yes to either question, it will be necessary to check DOT records for adequate licencing or insurance coverage to ensure providers applying under a new name aren’t trying to circumvent the vetting process. Q: What are the privacy concerns, and how can potential employers ensure they do not violate issues of privacy as they vet drivers (and/or other employees)? Businesses must conduct their operations in a fair, lawful, and transparent manner Thomas Kopecky: Businesses must conduct their operations in a fair, lawful, and transparent manner. Employers often dictate their own guidelines and requirements from company to company. Companies must ensure they follow the law and handle data used for vetting driver fleets in a manner compliant with General Data Protection Regulation (GDPR), Health Information Portability and Accountability Act (HIPAA), and the Fair Credit Reporting Act (FCRA). When utilising software platforms, those that aggregate public record data in real-time and efficiently to provide actionable insights will be key for protecting corporate driver fleets and businesses overall. Q: How is addressing these issues different in the case of a contracted service versus a company employee? Thomas Kopecky: Addressing these issues will vary from company to company, but it will be important for clients' legal counsel to help interpret the law in the respective state they operate in and make this final determination. This will help shape policy and the employer’s compliance requirements in the area of operation. In some jurisdictions, contractors are vetted and treated like employees who are protected by FCRA. In contrast, there are more broad interpretations of what level of vetting and continuous monitoring can take place on contractors versus employees in other jurisdictions. Q: What is at risk if companies fail to address these issues? Thomas Kopecky: If companies fail to address security issues with managing their driver fleets, they risk major liability, business continuity and brand reputation. Every employee and contractor is in essence an ambassador of the brand, and in many instances, they are the only customer-facing representative for the enterprise. Imagine you are a contractor driving for a major delivery service. If you were to get into an accident and tragically kill someone driving their branded truck, the repercussions of that accident would harm the brand as opposed to the small contracting company by which you are employed. This can have a disastrous impact on the enterprise, both from a reputation and financial standpoint. When proactive steps are not taken to evaluate fleet companies or their owners, this can be viewed as negligence. Consider another example: A brand hires a driver company that has committed fraud while operating under another company’s name. What is the brand’s cost to conduct an initial onboarding assessment of this company versus the cost of investigating an issue, terminating the contract, and dealing with any potential litigation that might follow? The latter is clearly the financial burden. Corporations must proactively address risk associated with their driver fleets to mitigate risk before it occurs. Q: What is the biggest misconception (in the industry and/or the public at large) about employee vetting requirements? Enhanced vetting today often includes looking into a contractor’s background or its company Thomas Kopecky: We have passed the days where everything is all about criminal background checks and instant alerts when a driver receives a DUI. We are entering a world where business continuity and resiliency are necessary. Companies are so reliant on contracted services or seasonal employee pools that if that roster of operators were found to be unsuitable, the business itself would not meet the demands of its customers. Before the digital age, people only understood the driver vetting process to be based around a search of felony convictions. Enhanced vetting today often includes looking into a contractor’s background or its company from a different vantage point. Employers must begin to think about litigation history, negative media coverage and vocal social platforms, history of poor business practices or fraud, and more. These are factors that need to be considered for a business to mitigate risk and maintain continuity of service in an era where timeliness and instant gratification are highly valued.
Close collaboration with customers has been a hallmark of the physical security industry for decades. And yet, less ability to collaborate face-to-face to discuss customer needs has been a consequence of the COVID-19 pandemic. “True innovation, which comes from close collaboration with customers, is more difficult to achieve remotely,” said Howard Johnson, President and COO, AMAG Technology, adding “Not being able to visit in person has not been helpful. Kurt John, Chief Cyber Security Officer at Siemens USA, adds “We need to plan intentionally with a strategic approach for collaboration and innovation.” Securing New Ground virtual conference Security experts from three manufacturers reflected on the impact of COVID-19 on the physical security industry Security experts from three manufacturers reflected on the impact of COVID-19 on the physical security industry at a ‘View from the Top’ session, during the Securing New Ground virtual conference, sponsored by the Security Industry Association. Their comments covered business practices during the pandemic and the outlook for technology innovation in response. “We had to pivot quickly on business models and create a cross-portfolio team task force to discuss how we can leverage technologies to help customers [during the pandemic],” said John, adding “We are having outcome-based conversations with customers about their businesses and operations, and how we can combine short-term benefits with long-term growth and flexibility.” But some of those conversations are happening from a distance. Results-oriented approach in remote work environment After the pandemic took hold, Siemens shifted rapidly to remote work and embraced other infrastructure changes. “We had to refocus and lead with empathy, flexibility and trust,” said John, adding “We gave our staff flexibility to set their hours and used a results-oriented approach.” There is also a social element missing in the work-from-home model. “Virtual coffee machines do not replace being there in person,” said Pierre Racz, President and CEO, Genetec, adding “Small talk about the weather is important psychological elements.” Positives in using multi-factor identity management He predicts that, in the future, office hours may be reduced, but not floor space, with space needed for in-person collaboration and long-term social distancing. Employees will come to the office to do collaborative work, but can work from home to accomplish individual tasks that may be ‘deferred’ to after-hours, when the kids have been fed. When the pandemic hit, Genetec had resumed 95% of their operations within 36 hours, thanks to their use of multi-factor identity management. They did not suffer from malware and phishing issues. “Multi-factor is really important so that well-engineered phishing campaigns are not successful,” said Pierre Racz. Shift to ‘Zero Trust’ model All three panelists noted a coming skills gap relating both cyber security and systems integration Remote working technologies are shifting to a ‘zero trust’ model, in which access to systems is granted adaptively based on contextual awareness of authorised user patterns based on identity, time, and device posture. For example, an office computer might have more leeway than a home computer and a computer at Starbucks would be even less trusted. The approach increases logical access security while providing users their choice of devices and apps. Skills gap in cyber security and systems integration A growing skills gap has continued throughout the pandemic. “Where we have vacancies, we have struggled to find candidates,” said Howard Johnson. All three panelists noted a coming skills gap relating both cyber security and systems integration. New technologies will clearly require new skills that may currently be rare in the workforce. Cyber security will become even more important with growth in new technologies such as AI, machine learning, 5G and edge computing. A workforce development plan is needed to address the technologies and to enable companies to pivot to new business needs, said John. Adoption of temperature sensing solutions From a technology viewpoint, Johnson has seen attention shift to the reception area and portal, away from touch technologies and embracing temperature sensing as a new element. There have also been new requests for video and audio at the portal point, to create methods of access and egress that do not require security personnel to be present. “Some customers are early adopters, and others are waiting for the market to mature before investing,” Howard Johnson said. “Security companies have been faced with the need to respond rapidly to their customers’ needs during the pandemic, but without seeming like ‘ambulance chasers’,” said Pierre Racz. In the case of Genetec, the company offered new system capabilities, such as a 'contamination report', to existing customers for free. Move to a hybrid and flexible work environment In the new normal, the pendulum will swing back to the middle with more flexibility and a hybrid approach" An immediate impact of the pandemic has been a reduction in required office space, as more employees have worked from home, raising questions about future demand for office space. “The pendulum tends to swing to the extremes,” said Kurt John, adding “In the new normal, the pendulum will swing back to the middle with more flexibility and a hybrid approach.” “Users will be much more careful about letting people into their space, which requires more policies and procedures,” said Lorna Chandler, CEO, Security by Design, who participated in a panel at Securing New Ground about how the pandemic is changing commercial architecture and access control. “Users should also be careful in the rush to secure premises from COVID-19 that they don’t violate HIPAA laws or create other potential liabilities,” adds Chandler. Continuum of mechanical and electromechanical devices Mark Duato, Executive Vice President, Aftermarket, ASSA ABLOY Opening Solutions, said a “Continuum of mechanical and electromechanical devices is needed to protect premises and ensure convenient operation of an access control operation.” “First and foremost, the immediate reaction to the impact of COVID-19 is to rush to educate and invest in technologies to increase the ability to analyse people,” said Duato, who also participated in the access control panel. Shift to touchless, frictionless access control “The move to touchless, frictionless access control “is really a collaboration of people, process and technology,” said Valerie Currin, President and Managing Director, Boon Edam Inc., adding “And all three elements need to come together. Touchless and frictionless have been in our market for decades, and they’re only going to become heightened and grow. We’re seeing our business pivot to serve markets we have not served in the past." More and more data is a feature of new systems, but is only helpful when it is analysed. “We all live in a world of data, or IoT and sensor technology,” said ASSA ABLOY’s Mark Duato, adding “But we don’t want to be crushed by data. Data is only helpful when you can reduce it to functional benefits that will help us innovate. We have to take the time to squeeze the value out of data.”
Boon Edam Inc., a globally renowned company in security entrances and architectural revolving doors, has announced that Ferrero Rocher, an international famous chocolatier, has outfitted its new global headquarters building in Luxembourg with a ‘golden’ TQA automatic revolving door. The unique colour of the door provides a visual reference to the chocolatier's signature use of golden wrappers around each piece of chocolate. Aside from elevating their brand, Ferrero Rocher also installed a revolving door to provide a comfortable interior lobby for both employees and visitors. Ferrero Rocher's headquarters building houses 1,300 employees in nearly 30,000 sq. metres. Employees were previously spread out over five buildings but are now centralised at one global headquarters building. The building design mimics the atmosphere of an Italian square through the use of a large atrium surrounded by two-multi-story office wings. TQA automatic revolving door entry Boon Edam coordinated with and supported the design by customising a 12-foot, TQA automatic revolving door General Contractor, Felix Giorgetti and Facade Builder, Groven + Portal, commissioned Boon Edam to design a unique revolving door for the entrance to the Ferrero Rocher building, leading into an impressive interior atrium. Building designers included Ferrero's signature bronze/gold brand color into the facade and window surrounds. Boon Edam coordinated with and supported that design by customising a 12-foot, TQA automatic revolving door with a custom, golden paint finish. With its automatic operation, employees and visitors can simply approach the door and it will start rotating on its own with no need to touch the door. Prevention of infiltration of outdoor air The other benefit of this touchless entrance is its inherent ability to prevent infiltration of outdoor air, protecting the interior area from drafts, cold weather, debris and noise. The Boon Edam TQA revolving door features a low-torque speed control, safety sensors, and endless finish options for a beautiful and easy-to-use public entry.
Globally renowned security video wall technology and audio visual solutions expert, Ultimate Visual Solutions (UVS) has announced that the company has secured its first contract in Poland, as part of a concerted sales drive across Central and Eastern Europe. The project deal, for a client in the energy sector, is to supply a control room with UVS Lucidity video wall controller technology. This deal takes the number of countries where Ultimate Visual Solutions has worked in or supplied equipment to 17 in the last two years. UVS Lucidity video wall controller technology The contract is the result of detailed online demonstrations of the UVS Lucidity video wall controller technology The contract is the result of detailed online demonstrations of the UVS Lucidity video wall controller technology during lockdown, to a client brought to UVS by the audio-visual distributor, Business International Group. The AV distributor, based in Warsaw, Poland provides professional solutions, devices and audio-visual accessories to a wide range of clients. UVS technology will be at the heart of a new operations centre, where it will be providing the monitoring of key Supervisory Control And Data Acquisition (SCADA) systems and other critical data. Monitoring of SCADA systems and critical data Business International Group was introduced to Ultimate Visual Solutions by Pawel Religa, the UVS representative in Central and Eastern Europe, who was recruited to take advantage of the region’s fast-growing audio-visual markets. He was given technical support by UVS’s certified and authorised Eastern Europe pre-sale and after-sale service support partner, Robert Chlebowski of SIGE Poland. Pawel Religa has a wealth of experience in the AV sector, with previous employers including, Edbak (EDBAK Sp. Zo.o.). He is focusing on Russia, Poland and other key parts of the European mainland. Live demonstrations of UVS technology Pawel Religa commented, “The fact that Ultimate Visual Solutions (UVS) were able to provide Business International Group and their end client with very specific online live demonstrations and evaluations of the proposed UVS technology, and using the exact same SCADA application as the end client has implemented, convinced the end client that it was providing the correct solution.” Pawel further adds, “Ultimate Visual Solutions support during the sales, procurement and installation cycle has been excellent and Business Group are looking forward to a long term business relationship.” UVS remote services suite Ultimate Visual Solutions launched a suite of remote services, including a live online demonstration facility Earlier this year, Ultimate Visual Solutions launched a suite of remote services, including a live online demonstration facility, in order to provide full video wall technology evaluations for partners and their clients, even in lockdown or self-isolation due to the COVID-19 pandemic. Steve Murphy, Managing Director of Ultimate Visual Solutions (UVS), which is based in the Business First - Burnley Business Centre, said “This contract is the first to come as a result of the many proposals we have been doing during lockdown for Business International Group in Poland, which have benefitted greatly from our ability to provide online demonstrations.” Video wall displays and AV solutions provider Steve Murphy adds, “The investment we made at the beginning of 2020 in our remote demonstration and remote support capability is proving invaluable and has contributed to a very strong finish to 2020.” Ultimate Visual Solutions (UVS), which has its headquarters at the Business First - Burnley Business Centre in Burnley, United Kingdom, provides video wall displays and audio visual solutions to a range of clients across the UK and the rest of the world. It changed its name from eyevis UK in September 2018, following the acquisition of eyevis GmbH by the Leyard Group.
Specialist property developer and investor, Kajima Properties’ new project development at 77 Coleman Street in the City of London is a luxury multi-tenant office set over seven floors. BNP Paribas acts as the managing agent, while the redevelopment was designed by architect, Buckley Gray Yeoman. The prominent London location is a minute’s walk from Moorgate Tube station and the Elizabeth Line. The redevelopment included installing elegant external facades as well as creating floors of new office space, and 16,000 sq. feet of retail, leisure and restaurant space. The site offers exceptional internet reliability and speed for tenants, and is one of just 22 buildings in the UK to achieve a platinum connectivity rating by WiredScore, the Mayor of London’s digital connectivity rating scheme. Seamless access control system BNP Paribas and Kajima Properties wanted a seamless and highly efficient access system BNP Paribas and Kajima Properties wanted a seamless and highly efficient access system to allow bona fide users and visitors easy access through reception and lifts to their desired location. This needed to be underpinned, but not impinged by, a robust security management system including CCTV to keep people and the building safe. They wanted to keep any waiting time in reception to an absolute minimum to avoid crowding, including good access for disabled users, and for all entry to be touchless. Tenants and reception staff would need an efficient, secure and easy to use system for managing visitors. While an entry phone and door automation would be required for anyone arriving out-of-hours, or at the rear of the property, such as for deliveries and trades people with equipment. Bespoke security solutions Finally, a key part of the brief was for any installed equipment, such as turnstiles and lifts, to be in keeping with the sophisticated, minimal look and feel of the building. The Team Antron Security project managed the design, supply and installation of the access control and security system for 77 Coleman Street and acted as the ‘go to’ contact for client, Kajima Properties and BNP Paribas. Antron Security is a globally renowned installer of bespoke security solutions and has been providing security installations for the past 29 years. Taking care of the supply, design, installation and maintenance of security systems, Antron Security is NSI approved, meaning all staff and systems installed comply with the latest industry standards and are regularly inspected. Integriti access and security management system Inner Range provided the core access and security management system, Integriti, which enabled Antron Security to build the bespoke solutions needed for 77 Coleman Street in London, UK. Inner Range is a globally renowned company in the design and manufacture of intelligent security solutions since 1988. More than 150,000 Inner Range systems have been installed in over 30 countries till date. The company’s flagship product, Integriti, offers enterprise-level intelligent security and integrated smart building controls for single sites through to global estate portfolios. Seamless, touchless entry for tenants Cards are presented to readers embedded in bespoke Integrated Design Limited (IDL) entry turnstiles The building’s 2000+ regular users are issued secure proximity cards, carrying encrypted information about when and where the user is allowed to go. Cards are presented to readers embedded in bespoke Integrated Design Limited (IDL) entry turnstiles, which also allows them to be read by the KONE lift integration. The high level lift integration with ‘destination control’ means the lift software takes into account where each of the building’s four lifts are, where the user’s ‘home floor’ is, as well as where other users are going/due to go, and instantly calculates the quickest lift for the new user. Antron Security and IDL collaboration The user is immediately directed to the most efficient lift via a display screen on the turnstile. If users are able to go to more than one floor, they can update their preference in the lift itself. For the turnstiles in the reception area, Antron Security and IDL worked closely with the vision set out by the architect to create a high-performing system that was in keeping with the sleek, minimalist design of the building. A bespoke set up of slim ‘speed lane’ turnstile pedestals, together with a separate glass gate were an ideal solution for a reception area where space is limited but security provisions and good disabled access are needed. IDL’s Glassgate 200 opens away from the user, and closes behind, preventing tailgaters and all IDL items are manufactured in the United Kingdom. Readers for proximity cards and QR codes were set into the speed lanes to create a seamless flow through the reception area. Fully integrated visitor management system Inner Range’s Integriti also allowed Forge’s Bluepoint visitor management system to integrate with IDL’s turnstiles and the KONE lifts. For visitors to access tenanted floors within the building, the following has to take place: A tenant creates the meeting via Bluepoint. An email is generated and sent to the visitor’s inbox where they can create a mobile QR code pass and save it to their smart phone wallet. When the visitor arrives, they scan their QR code on their smart phone at the reception desk, at which point their QR code becomes valid on the Integriti access control system. The visitor is then able to enter via IDL’s speed lane turnstiles, and they are directed by the KONE lift display (which is set into the speed lane) to which lift car they need. To leave, the visitor presents their QR code at the speed lane turnstile, which tells the system they’re leaving. The QR codes are only valid for one entry and one exit, and only on the appointment date and at the planned appointment time. Afterwards, the QR code becomes invalid and is deleted from the system. The QR code gives the visitor the ability to access everything they will need, from the entry turnstile and lift through to any locked doors en route. The integration between Integriti and Forge’s Bluepoint visitor management system was achieved with an XML read/write interface, as well as API integration between a SQL database and a cloud-hosted VMS database based on Microsoft Azure cloud services platform. BTP XIP intercom system A BTP XIP intercom system was installed to allow visitors out-of-hours to contact the security team A BTP XIP intercom system was installed to allow visitors out-of-hours to contact the security team, or for deliveries and trades people to use in order to access doors at the rear of the building. The XIP system uses an ethernet distribution network, which means the system can be expanded easily, and it’s possible to install long-distance connections that data networks can’t reach. Hikvision CCTV cameras installed CCTV cameras from Hikvision’s ‘superior’ range have been installed throughout the site to create a hard-wired IP closed circuit television system. They are integrated with the Integriti access control system, which allows for intelligent ‘cause and effect’ monitoring. System protocols automatically bring up specific camera feeds for security managers to view in response to alerts, and footage can be viewed holistically along with other information on from Integriti, such as if a door has been left open. Intelligent access control Inner Range’s Enterprise product, Integriti, provides seamless integration with a multitude of other smart building management systems, underpinned by robust security. This includes encrypting all communications through every device and interface, and providing intruder detection to European standard EN50131. Integriti helps building managers create greener, more energy efficient sites by tracking how tenants use the building, and amending heating and lighting settings as a result. Integriti also provides trace reporting, that can identify a user’s movements if they have become unwell and identify who else has been near them. System benefits for users Touch-free entry to the building via the speed lanes and lifts. No unnecessary stops for users and visitors on their way into the building. Less crowding in the lift areas. Easy to use visitor management system. Robust security that doesn’t impinge on access. Sleek and minimal design in keeping with the building design. Jamie Crane, Commercial Director at Antron Security, stated “The flexibility of Inner Range’s Integriti access control system and Forge’s Bluepoint visitor management allowed us to incorporate high-level lift integration (known as ‘destination control’).” He adds, “Together, they create a future-proof solution as we can continue to meet the ever-changing requirements of the landlord and tenants via our ability to integrate with third party systems and devices such as lifts, intercoms, lighting and building management devices.”
HID Global, the globally renowned company in trusted identity solutions, has announced that Collectors Universe, Inc. has added HID Trusted Tag Services to its Professional Coin Grading Service (PCGS) coins and banknote holders, so as to enable collectors to quickly and easily validate the authenticity, grade, and condition of their PCGS collectibles, with a tap of their NFC-enabled smartphone. Product authentication technology With the rare coin market exceeding US$ 3 billion, product authentication technology has swiftly become a necessity to prevent counterfeit coins and banknotes without compromising the encapsulation or condition of the collectibles. Collectors Universe first launched HID Trusted Tag Services with approximately 100,000 coins and received overwhelmingly positive feedback from customers. The company has purchased an additional two million HID Trusted NFC Tags to embed into broader segments of the PCGS inventory. HID Trusted Tag Services HID Trusted NFC tags are embedded into PCGS’s coin and banknote holders using discreet wet inlays “HID Trusted Tag Services is the single biggest leap forward for third-party grading since the inception of the collectibles market. I hope that every third-party grading service in the industry considers integrating similar technology into their product lines as well. It’s simply that important for the hobby as a whole,” said Brett Charville, President of Professional Coin Grading Service. HID Trusted NFC tags are embedded into PCGS’s coin and banknote holders using discreet wet inlays. Collectors just tap their phone to a holder to authenticate their collectible through the HID Cloud Authentication service. Anti-counterfeiting technology Each tap generates a unique one-time URL that automatically launches Collectors Universe’s proprietary PCGS Cert Verification app or opens a web browser to display information about the collectible’s authenticity. The single-use URLs help prevent threats such as spoofing or other attempts to circumvent the HID Trusted Tag Services. “With the HID solution, Collectors Universe is the first in the numismatic industry and among the first in any of the collectibles fields to utilise this type of anti-counterfeiting technology at scale,” said Collectors Universe Chief Information Officer, John Nelson, adding “The technology provides peace of mind to customers who seek reassurance that their investment is going toward a verifiable collectable.” NFC technology and cloud authentication services “HID Trusted Tag Services was specifically designed for Internet of Things use cases that benefit from combining our trusted NFC technology and cloud authentication services to enable new, convenient experiences for customers,” said Mark Robinton, Vice President of IoT Services with HID Global. Mark adds, “Product authentication and brand protection are some of the many applications we automate by leveraging smartphones to streamline and simplify processes that were previously manual and paper-based.”
Border Caravan Storage, a family run business that offers storage for 170 caravans, motor homes and trailers has been operated by Keith, Alison and Helen Rogers for over 15 years. The site used an access control system to control access to the site, but there wasn’t an ideal method of tracking which units were on site, at any given time. The management team had been using a manually operated display board that was prone to error, so they decided to look for a reliable automatic method of identifying which units were on site. Airlock system with uPASS long-range reader The Border management team spoke to Paul Evans of BTT Comms (ex MMV), who suggested using Nortech’s airlock system, where vehicles have to pass through two separate electronically controlled gates to enter or exit the site. The existing drivers’ access control fobs are used alongside uPASS tags, which are placed in the side window of the caravans for detection by the uPASS long-range reader. The system has been recognised by CaSSOA, who endorse the system giving the highest level of security possible If a caravan passes through the first gate, the second gate will only open if the uPASS tag and the driver's fob are both detected and provide a valid match. The information is also relayed to a specially designed asset management system that keeps a real-time log of all units on and off the site. High level of access control security This system has been recognised by CaSSOA, the Caravan Storage Owners’ Association, who endorse the system giving the highest level of security possible, which is recognised by insurance companies, thereby reducing insurance costs for caravan owners. Benefits Simple and reliable means of monitoring the movement of caravans on and off the site. Reliable long-range tag detection avoids manual intervention and reduces running costs. Enhanced security reduces insurance costs for caravan owners. Helen Rogers of Border Caravan Storage stated, “We are very pleased with the new system which provides information in real time and we now know which caravans and owners are on site at any time giving us total peace of mind.”
Boon Edam Inc., a globally renowned company in security entrances and architectural revolving doors, has announced that Dexus Wholesale Property Fund has upgraded the Gateway Building in Sydney’s Circular Quay to feature entry security measures to protect employees, visitors and valuable data. The ideal solution was found by integrating Boon Edam Speedlane Swing optical turnstiles, IDEMIA’s MorphoWave touchless fingerprint scanners, Schindler’s elevator dispatch and Honeywell’s access control technology. Integration with MorphoWave touchless reader MorphoWave scans and verifies four fingerprints through a simple hand wave gesture Gateway’s access solution allows authorised and registered tenants to simply wave their hand in the MorphoWave touchless fingerprint scanner reader to enter the secure area through the turnstiles. Guests can sign in and register their finger pattern to become authorised to enter. MorphoWave scans and verifies four fingerprints through a simple hand wave gesture, during which the sensor takes several 3D photos of the fingerprints to extract biometric data and compare with the authorised fingerprints stored in the device. If they match, the user is granted access. This process all happens in less than one second. Featuring Schindler’s PORT Technology Each MorphoWave reader is connected to Schindler’s PORT Technology, which then receives the user’s credential data and conducts a cross-check with the building’s access control database. If the user is valid, a command is sent to the Boon Edam Lifeline Speedlane Swing to open its barriers. This interaction is surprisingly quick, with limited latency. “Tenants have a duty of care to protect their employees and visitors as well as valuable data and intellectual property, and they need the cooperation and support of a responsible and innovative building manager such as Dexus to manage secure entry into the building,” said Michael Fisher, Managing Director, Boon Edam Australia. Seamless access control integration A major part of the solution involves elevator destination control, whereby a user’s credentials are automatically assigned an elevator as they are verified and allowed access through the turnstile. This seamless integration was facilitated by an existing global partnership between Boon Edam and Schindler. The partnership arranged for Schindler’s PORT 4 mini technology to be embedded into the Speedlane Swing optical turnstiles at the manufacturing stage in the Boon Edam factory. Using an advanced algorithm and the integrated Schindler PORT 4 mini elevator destination control for visual and audio feedback, an elevator is automatically assigned, at the same time the turnstile is opening, allowing for optimum efficiency. The security is controlled by Honeywell’s access control system, integrated with Schindler’s PORT Technology. Honeywell access control system Honeywell has managed the security and building management systems for the Gateway building since 1990 Honeywell has been managing the security and building management systems for the Gateway building since it was first opened in 1990. Honeywell Asia-Pacific Solution Architect Leader Rhys Crabb said “Early engagement at all stages and a commitment to a collaborative approach enabled Dexus to select the best available technologies. Dexus placed customer outcomes first and foremost in the project brief, ensuring the delivery of a product that provided tenants and visitors with a premium, modern and secure user experience that is flexible and easy to use.” Boon Edam optical turnstiles Mr. Stephen Hodge, Senior Project Manager, Dexus, said “With so many stakeholders, and a strong need for reliability and quality, it was important that everyone knew the goals of the project and worked well together. I’m pleased to say that it was like a perfect jigsaw and everything came together smoothly." Stephen adds, “What was important to Dexus is that we were pushing the boundaries to create better experiences, but we’re only doing so with proven products. Boon Edam’s optical turnstiles have been installed globally and locally, and this gave us added confidence that they were the right product for this forward-looking project.” Enhanced building security “Another significant help with this project was that the companies involved built a prototype, located at Schindler’s Head Office based in Sydney, so that the Dexus management and technical teams could test the solution well in advance of implementing it at Gateway,” Hodge continued. He further stated, “It gave us peace of mind that we’d selected the right suppliers. We have tenants in Gateway who requested ground floor security, so we went out to tender to seek the best combination of sophisticated security and elegance, without being obtrusive to the building’s users.” Touchless fingerprint scanners for privacy Touchless fingerprint scanners were chosen to control access to secured floors and areas of the building Touchless fingerprint scanners were chosen to control access to secured floors and areas of the building, because they provide an extra level of privacy that was attractive to tenants. “A computer algorithm converts each person’s unique fingerprint signature into binary code, zeroes and ones, and uses that code to grant access,” explained Mr. Hodge, adding “Boon Edam turnstiles have the ability to integrate facial recognition, which could be highly valuable in other projects, but the fingerprint scanners were the right fit for this building. Boon Edam made it simple to integrate the scanners with their optical turnstiles, which helped us meet project deadlines.” Effective management of system installations For such a complex project, installation always has its challenges, including managing installation work as people continue to use the building. Mr. Bill Garrett, Facility Manager at Gateway Building, was impressed by Boon Edam’s service and installation team. He said, “The Boon Edam installation team always ensured safety was the number one priority and they did a quality job, even with some very difficult-to-access areas.” Garrett adds, “I’m delighted with the result of the project. One of the major benefits of the new entry system is that there’s a dedicated underground entrance for tradespeople, couriers and deliveries, which removes congestion and bulky carts from the main lobby. It’s all about enhancing the user experience, and Gateway will set a new benchmark for a seamless, secure and aesthetically pleasing entry.” Staged approach towards system implementation The testing, combined with the staged approach, allowed for a smooth transition to the new security technology" Mr. Garrett explained that to get tenants used to a totally new system, they adopted a staged approach. At first, the turnstiles were put into place but left in the open position and after an initial period, some of the turnstiles were closed so that tenants could try entering using the new technology, if they wished. Finally, the entire system was fully implemented. “In addition to this staged approach, we met with key tenants and allowed them to test the system in advance. The testing, combined with the staged approach, allowed for a smooth transition to the new security technology,” said Garrett. Scope of touchless access control technologies Now that the technology has been successfully rolled out at Gateway, Dexus is looking at other locations that could utilise the same harmony of security technologies. “We are continuing to assess opportunities to implement touchless technologies in new developments as well as in our existing buildings,” said Mr. Hodge. “The stylish and secure entrance at Gateway has been ideal through the COVID-19 pandemic. It manages flow, queries guests on recent visits to pandemic hotspots, if they are feeling any symptoms, and can record all entrants to the building, helping us meet government requirements. And the same features will be beneficial in a broader context, too, to help mitigate against unauthorised entry,” concludes Hodge. Dexus is actively exploring the possibility of rolling out similar security entrance systems in other buildings, thereby delivering the seamless balance of security and elegance.
Round table discussion
What a year 2020 was for the security industry! There were vast challenges that could not have been foreseen at the beginning of the year. It is safe to say that the events of 2020 defied all industry prognosticators. However, is that any reason not to hope our expectations looking ahead to 2021 will be much closer to reality? Can we possibly benefit from looking ahead and trying to plan for the challenges of the year ahead? We asked this week’s Expert Panel Roundtable: What will be the security industry’s biggest challenge in 2021?
As a subset of the larger economy, the security industry is bound to feel the effects of an economic downturn. Such was the case in 2020 when the COVID-19 pandemic undermined economic growth and presented a brand new set of challenges to business. The security industry has been able to pivot toward emerging opportunities, but that success has been offset by broader economic challenges. We asked this week’s Expert Panel Roundtable: What impact, positive or negative, has the larger economy had on the security marketplace in 2020?
Should security spending be a one-time capital expense or as an ongoing operating expense? At first glance, the question appears to be an accounting issue with little impact on the actual equipment or systems involved. However, as security professionals seek to cost-justify new systems, the question may be central to providing the “best security for the money” and a system that fits the company’s continuing needs. We asked this week’s Expert Panel Roundtable: Should security be a capital expense (CAPEX) or an operating expense (OPEX)? Is the trend shifting and what is the impact?
10 step guide to staying ahead of emerging security threatsDownload
2021 Trends in Video SurveillanceDownload
Exploring new vertical markets for professional security systemsDownload
Capture new opportunities with computer vision and video analyticsDownload