ADI Global Distribution, a pioneer in wholesale distributor of security, AV (Audio Visual) solutions and low-voltage products, has announced that it has integrated with D-Tools’ business management software solutions, D-Tools Cloud and System Integrator. Customers can now access ADI’s full product offering directly from the D-Tools’ software interface.
Business management software
D-Tools software is designed to drive sales and improve operating efficiency, by streamlining the entire project workflow, including estimating and proposals, system design and documentation, procurement, project management, installation, and ongoing service, all through a data-driven process that leverages an extensive and integrated product library.
Through this integration, ADI Global Distribution customers can simply enter their ADI account number, to access detailed product information, get real-time pricing, prepare quotes and place orders at ADI, directly from within D-Tools software.
ADI Global - D-Tools software integration
“Building strategic supplier relationships to further support our software users is a top priority for D-Tools. ADI is a leading distributor in the security and AV market, and we're proud to be working with them,” said Barrie McCorkle, the Director of Supplier Schemes at D-Tools.
Barrie McCorkle adds, “Through this integration, we're helping customers save time, by alleviating the workload that comes from managing product data and the procurement process, so they can drive sales and increase productivity companywide.”
D-Tools software is used by thousands of residential and commercial security system installers
D-Tools software is used by thousands of residential and commercial security system installers, and AV systems integrators, across the low voltage industry. Suitable for smaller projects, D-Tools Cloud offers an easy-to-deploy, web-based solution, which streamlines the sales and project management process, from any device.
System Integrator on-premises solution
For larger projects, D-Tools’ System Integrator is a robust, end-to-end on-premises solution that streamlines the entire project workflow, from initial client contract through engineering drawings and ongoing service.
“In addition to our wide selection of products, ADI is committed to providing our customers with the support and service, to operate more efficiently,” said Robert (Bob) Appleby, the Vice President and General Manager, ADI North America.
He adds, “By integrating with D-Tools, dealers have easy access to ADI's complete product offering, pricing and ordering capabilities, from the project building platform. This helps improve proposal turn-around times, streamline project workflows and improve productivity.”
Technology-led employee safety specialists, Peoplesafe, have launched a new mass notification tool designed for instant communication with employees in a crisis.
Peoplesafe Alert is a simple, intuitive app that allows organisations to send and track mass safety messages to thousands of employees simultaneously, overriding phones set to silent or do not disturb and, if necessary, using geofencing capabilities to only communicate with those in a certain location.
Designed to be used in any crisis, the Peoplesafe Alert tool can be operated in real-time, and messages cannot be edited or forwarded to protect the credibility of the organisation and guarantee that the information is current, correct, and constantly controlled.
With its dedicated platform, the app can sit on multiple devices and operating systems which guarantees that the priority messages will cut through any other conflicting or distracting messages at the time of an emergency.
Peoplesafe Alert app is available in all countries, meaning that employees can be targeted by country if required
BS 22301-compliant, globally available tool
Although UK-based, the Peoplesafe Alert app is available in all countries, meaning that employees can be targeted by country if required. This also means that messages can reach employees no matter where they are in the world when a crisis unfolds.
When sending a communication, administrators can tailor the message to the recipient’s native language. The tool is fully compliant with BS 22301 and the encrypted service is delivered from ISO27001 certified data centres which guarantees that an organisation is meeting regulatory standards for business continuity.
Examples of emergencies
Emergencies where Peoplesafe Alert would come into play include; extreme environmental events such as flooding or an earthquake, cyber-attacks, network security, control, and access issues (such as recently seen with the outage of WhatsApp, Facebook, and Instagram), and outbreaks of infectious diseases.
This marks an expansion for the technology company, which has previously focussed on lone worker safety and protection products and services.
Preparedness in case of future emergencies
We need to look ahead and guarantee that business continuity will not be compromised in the face of any future emergencies"
Peoplesafe CEO Naz Dossa said, “While the experience of steering employees through the COVID-19 pandemic is still fresh in everybody's mind; we need to look ahead and guarantee that business continuity will not be compromised in the face of any future emergencies.”
“Technology has been crucial in keeping employees informed, safe, and (for the most part), able to deliver their work. However, given that the pandemic was an unprecedented situation, lessons have been learned.”
Effective communication ability
“Peoplesafe Alert’s instant, precise mass notification abilities will enable an organisation to communicate effectively with all, or some of their employees depending on the emergency. As technology safety experts with many years experience, we are in a prime position to assist our customers so that they can both take care of their employees in a crisis and maintain business continuity using next generation communications.”
Peoplesafe Alert licenses can cost as little as per user, per month, offering a scalable solution that can flex with the requirements of the organisation.
Allegion, a global provider of security products and solutions, has announced the first integration between Overtur, Allegion’s digital environment connecting all building phases in opening design, construction and ongoing management, and Software for Hardware, an industry-renowned software developed for door, frame and hardware distributors.
The partnership announcement comes in advance of the DHI conNextions 2021 conference, where both companies will be demonstrating the collaboration.
Contract and integrated hardware dealers, who engage Allegion on specifications, written by the company’s Architectural Services or who use Overtur platform themselves, for opening specification writing and collaboration, can now export hardware specification information to Software for Hardware’s platform and continue to the project process.
Data-centric approach to opening design
Transitioning an opening specification to the submittal phase can be time consuming"
“Transitioning an opening specification to the submittal phase can be time consuming, especially if manual entry is involved,” said Michael Rebbec, Overtur platform integration’s Product Owner at Allegion.
Michael Rebbec adds, “With this integration, we aim to equip Software for Hardware customers with the benefits of Overtur’s data-centric approach to opening design, with Software for Hardware’s expertise in estimating and detailing a project, in the construction phase.”
Overtur’s software platform
Overtur’s comprehensive platform enables all project team members to collaborate on a project’s opening data. In the design phase, collaborators can upload plans and door schedules, through a plugin within Autodesk’s Revit programme or by directly uploading Adobe PDFs, and Microsoft Excel documents.
Once loaded, hardware consultants can assign and configure individual products to each opening, such as a lock, a closer or an exit device. Once finalised, project information is available in multiple formats, including Hardware Set schedules and a fully written specification.
Exporting data into Software for Hardware platform
Customers who use Overtur for their opening specifications (either through Allegion’s Architectural Services or on their own) can now further benefit from this technology. Once the opening information is finalised, customers can export their data into the Software for Hardware platform, without the need for manual entry of data.
Once imported to Software for Hardware platform, customers can add necessary configuration and dimensional information for estimating and submittals.
No need for manual data inputs
The Overtur and Software for Hardware integration benefits our shared customer base"
“The Overtur and Software for Hardware integration benefits our shared customer base, by providing a process to save valuable time and effort,” said Ian Oxman, the Co-Owner of Software for Hardware, adding “Data duplication and error are eliminated, as the Overtur integration removes manual data input.”
Frank Ruane, President, Quarters Hardware, located in Woburn, Massachusetts, said “Technology like Overtur can save the distributor many hours of data entry and reduce errors. Allegion and Software for Hardware have created a really useful tool for door, frame and hardware distributors.”
DHI conNextions 2021
Starting Wednesday, on Oct. 20, 2021, attendees can visit booth #313, at DHI conNextions 2021 conference, to experience a live demo of the Overtur and Software for Hardware integration.
Overtur is Allegion’s digital environment connecting all building phases in opening design, construction and ongoing management of door security and openings. It provides a centralised place to capture, maintain and verify door opening requirements, information and decisions, with easy options to push information to industry-renowned tools.
GeoVision has announced the release of GV-Control Center (V4.0), integrated security management software, designed for central monitoring systems.
GV-Control Center is designed for enterprise system users, to handle high-volume video data. From real-time monitoring, video playback, event detection pop-up, I/O central monitoring, 3D E-map and communications, GV-Control Center helps security guards to quickly identify threats, and take swift actions.
GV-Control Center (V4.0)
GeoVision unveils a re-designed user experience on GV-Control Center (V4.0), to streamline its interfaces and aim at building a consistent experience, across the platforms of GV-VMS and GV-Edge Recording Manager.
Additionally, GV-Control Center V4.0 introduces the new viewing windows, Face Recognition (FR) Watch and ASManager View, to integrate the monitoring of face recognition, access control and LPR events into the central monitoring operation. The AI (video analytics) events from forefront GV-VMS software and GeoVision AI cameras are also incorporated in the new version.
Recent cyber-attacks have disabled and even shut down physical assets. Robust foundational security and training staff, able to recognise an attack can help mitigate the threat, as ABB’s Rob Putman explains.
Edge devices and data analytics
As cyber security specialists, we must navigate an ever-changing threat landscape, one that is made even more complex by the increased interconnectivity between Operational Technology (OT) and Information Technology (IT), as companies look to leverage edge devices and data analytics, as well as remote connectivity, in the wake of the COVID-19 pandemic.
As the threat surface evolves, the industry must guard against attacks on key physical infrastructure, carried out by a range of malicious actors, including nation states and criminals intent on blackmail.
The chemicals sector, a high-value target for cyber-criminals
Cyber-criminals view the chemicals sector, as a high-value target, because of the potential cost
In 2017, not long after a ransomware attack that targeted Maersk, the world’s largest shipping firm, made the news around the world. Another cyber-attack, this time targeting physical industrial assets, generated fewer headlines, and yet could have resulted in both real, as well as financial, damage.
Cyber-criminals view the chemicals sector, as a high-value target, because of the potential cost, both financial and reputational, to the operator, should production be interrupted or stopped entirely.
Cyber security vulnerabilities put physical assets at risk
The attack in question, a ‘Triton’ custom malware attack on a petro-chemical facility in Saudi Arabia, targeted a safety system, taking over system controllers. Bugs in the code triggered an emergency shutdown, but could have led to the release of toxic and explosive gases. It was a vivid reminder of how cyber security vulnerabilities are increasingly putting companies’ key physical assets at risk.
Two more-recent high-profile incidents illustrate my point. In February, a Florida water treatment plant was hacked. The malicious actor remotely accessed the system for three to five minutes, during which time they opened various functions on the screen, including one that controls the amount of sodium hydroxide (NaOH) in the water. The hacker changed the NaOH from about 100 parts per million to 11,100 parts per million, which could have resulted in a mass poisoning event.
Colonial Pipeline cyber-attack incident
Then, in May, the Colonial Pipeline system that originates in Houston, Texas and carries gasoline, and jet fuel, suffered a ransomware attack. Using a VPN, hackers targeted back-office IT systems, forcing Colonial to shut down IT hosts and network infrastructure, severing communication with those OT systems that are responsible for communicating ‘transactional data’ associated with fuel delivery.
In this instance, a single compromised password disrupted Colonial’s ability to invoice its customers. This dependency on OT data stopped pipeline and business operations, and the company was elected to pay the hackers an initial ransom of US$ 4.4 million, in order to restore operations. The Colonial attack was multi-dimensional, in that it not only impacted Colonial’s business, but also the wider US economy and national security, since the pipeline transports nearly half of the east coast's fuel supplies.
Outdated IT system elevates physical risk
The increased interconnectivity between IT and OT can also create vulnerabilit
Attacks such as these prove that, armed with little more than a laptop, an email account and access to the dark web, determined hackers can cause disproportionate damage to physical infrastructure.
As mentioned at the outset, the increased interconnectivity between IT and OT can also create vulnerability. Producers often want to know: Is it risky to connect a production asset or their operational environment to the Cloud? My answer is, if you do so without having done any risk audits around people, processes and technology, or without enhancing and maintaining that environment, then yes, that is risky.
For example, we often observe that the life cycle of a production asset far outlasts the IT systems that are used to run it. Take a cement kiln. Several generations of plant operators may have come and gone, but that asset may still run, using legacy software, such as Windows XP and why not?
Need to replace aging distributed control systems
Well, that’s fine, if you are not concerned about having that asset compromised, and all that entails. A ‘flat’ IT network, an aging distributed control system, and machines with legacy versions of Microsoft Windows, all these elements, which are still commonplace in many industries, make it much easier for attackers to find and infiltrate a company, without needing sophisticated tools.
The age-old mantra of not interfering with a piece of equipment or software that appears to be working, often applies to the individual assets. For example that cement kiln that are still controlled by the same Windows XP-based control software.
However, if we’re honest, things have changed quite a bit, not because something was broken, but because innovation came in. That same kiln control system is most likely connected to other systems, than when first commissioned and that opens it to exposure to threats that it was never designed for.
The human element
There is a misconception that IoT-connected devices can open companies to risk
There is a misconception that IoT-connected devices can open companies to risk, but many recent, high-profile cyber-attacks have been conducted from a laptop, by hacking someone’s VPN, or are a simple phishing/malware attack. In all these cases, the human element is partly to blame.
Take the Florida attack. The compromised computer at the water treatment facility was reportedly running an outdated Windows 7 operating system and staff all used the same password, in order to gain remote access via the Teamviewer app, which the hacker was then able to use.
Physical and human assets, key to robust cyber security
Discussion on the best way to mitigate the threat is often framed solely around specific technical solutions and ignores the fact that robust foundational cyber security is really driven by two very different, but equally important, types of capital: physical assets (e.g. production machinery), and human assets.
The truth is that smart digital software and industry-renowned cyber security applications, while critical, are in many cases, only as good as the weakest human link in the chain. Industry would, therefore, do well to ask itself the following question: Do we have a security problem, or a complacency problem?
At this juncture, it is important to point out that the majority of companies that ABB works with, are at least aware of the threat posed by cyber attackers, and the potential impact of an attack, on their revenues, reputation and bottom line.
User error and human-generated exposures
Making sure staff are aware of the threat and training them to respond properly, if they are targeted, is vital
However, user error and human-generated exposures are where most of these attacks occur. Those human failures are mostly not due to malicious intent from employees, but to the lack of training of the employees on secure behavior.
Making sure staff are aware of the threat and training them to respond properly, if they are targeted, is vital. However, there are also age demographics at play here. Much of the operations employee base is heading towards retirement and often, there is no plan or ability to backfill these people.
Need to invest in new digital and automated technologies
If you think you don't have enough people now, in order to stay on top of basic care and feeding of the OT environment, with regards to security, what is that going to be like in 20 years?
For this reason, there must be a major industry reset, when it comes to its workforce. Companies must invest in new digital and automated technologies, not only to ensure that they stay ahead of the curve and mitigate risk, but also to attract the next generation of digitally literate talent.
Robust cyber security is built on solid foundations
When we talk about foundational cyber security, we mean fundamentals, such as patching, malware protection, high-fidelity system backups, an up-to-date anti-virus system, and other options, such as application allow-listing and asset inventory. These basic controls can help companies understand their system setup and the potential threats, identify vulnerabilities, and assess their risk exposure.
The Pareto principle states that around 80% of consequences come from 20% of the causes. In the context of cyber security, that means 80% of exposure to risk comes from 20% of the lack of security. If companies do the foundational things right, they can manage out a significant amount of this risk.
Importance of maintaining and upgrading security controls
However, having basic security controls, such as anti-virus software in place, is just the first step on that journey. Equally important is having someone within the organisation, with the requisite skill set, or the extra labour bandwidth, to operate, maintain and update those security controls, as they evolve.
Educating, training and recruiting existing employees, and the next generation of talent, along with forging partnerships with trusted technology providers, will ensure that industry can leverage the latest digital technologies, in order to drive business value, and secure physical assets against cyber-attacks.
The COVID-19 pandemic is only accelerating the expansion of Automation, Robotics, Machine Learning (ML) and Artificial Intelligence (AI), and changing how people live their daily lives. This expansion leads the way with technologies that are developed to solve problems, improve operations, streamline processes and assist people, to focus on learning new skills, creativity, and imagination.
Transformation of the physical security industry
One of the latest industries to be permanently transformed is physical security. The era of utilising security cameras is slowly changing into more advanced and more efficient technological applications - security robotic solutions.
SMP Robotics is a California-based company, which is a pioneer in developing robotic technologies, powered by AI, to assist, improve and deliver on new expectations in today’s world. One of their services is smart surveillance systems. This represents a proactive approach to security. The company, SMP Robotics’ Founder and Chief Executive Officer (CEO), Leo Ryzhenko, stated “Autonomous robotic technologies will become a driving force in future security solutions.”
Robotics and AI in autonomous security solutions
The robots can patrol 24/7, counteracting intrusion and communicating via voice message with guards
The company uses robotics and AI technology to implement autonomous security solutions, which reduce liability and overhead, as well as improving the quality of services. Robotic guards are capable of patrolling all types of facilities, in both urban and rural contexts.
The robots can patrol 24/7, counteracting intrusion and communicating via voice message with guards. The inspection robots, deployed by SMP Robotics, are easily integrated with many existing security technologies, armed with obstacle avoidance and anti-collision measures, automatically recharge, and can recognise faces up to 50 metres. As the world grows increasingly complex, technology like this is essential to ensure safety for all.
AI-enabled autonomous video monitoring ground vehicles
The advancements in technological breakthroughs of SMP Robotics position the company and its AI-powered, autonomous video monitoring ground vehicles, to be the most adaptable to any industry, cost-effective for clients’ business needs, in providing various types of services from public safety, crime prevention, to asset protection and physical security.
The last few years were very productive for the company. The latest generation of the autonomous models, which outperform in efficiency, dozens of security cameras, were deployed or in a process to be delivered to a number of key clients, in various industries throughout the globe, from oil & gas, nuclear power plants to data centres, healthcare facilities, and amusement parks.
Smart security robots
Tal Turner, the Vice President (VP) of Business Development and Partnerships, SMP Robotics, said “We provide autonomous, artificial intelligence, all-weather, all-surface, smart security robots that are turnkey and operate independently on their own, using real-time obstacle avoidance, face recognition, and other cutting-edge technological advancements.”
According to Coherent Market Insights, the Robots as a Service (RaaS) market direction will grow by 15.9% by 2028 and reach the threshold of 41.3 billion dollars. SMP Robotics stands at the forefront of the security robotic revolution, making an impactful change to make the world a safer place.
Schools were never designed and built with social distancing in mind. So, it’s perhaps not surprising that as children returned to schools, for the autumn term this year, the prospect of outdoor classes and assemblies was mooted in the media and by the Government. Many in the education sector are making the case that, should there be further COVID-19 outbreaks, in the coming months, it would be better to utilise outside space, rather than resort to closing schools. In the COVID-19 era, head teachers are considering taking learning and large gatherings, such as assemblies outdoors, when possible.
Managing ‘class bubbles’, hygiene and ventilation
While Dr. Yvonne Doyle, the Medical Director of Public Health England (PHE) has publicly reassured parents that schools are not the ‘drivers’ or ‘hubs’ of COVID-19-19 infection in communities, there is a lot of pressure on school leaders to manage ‘class bubbles’, extra cleaning and hygiene, ventilation, and COVID-19 testing, to protect families and staff.
It’s a logical step to switch, in certain circumstances, to outdoor activities where fresh air is on tap, and social distancing is far easier to manage.
Specially built outdoor classrooms
Across the school and nursery sector, there’s ongoing investment in specially built outdoor classrooms
Across the school and nursery sector, there’s ongoing investment in specially built outdoor classrooms, which had been growing in popularity, even before the pandemic. These facilities offer numerous benefits as an extension of existing learning spaces and provide children the opportunity for hands-on learning, beyond a stuffy classroom.
However, if outdoor spaces are routinely called upon as part of COVID-19 contingency planning, how can schools ensure that their outdoor classrooms and wider areas are secure, robust, and fit for purpose?
When specifying outdoor classrooms and learning spaces, it’s essential to take into account the well-being of the students and staff, who will use them, noise pollution and acoustics. Most importantly, education managers need to ensure the surrounding area is secured and adequately protected from threats, including terrorism.
Perimeter security measures for schools
How can schools and nurseries secure their perimeters, so that outdoor learning is totally safe for all? A starting point is to seek out architects and suppliers, who have a good understanding of security standards.
Worryingly, Jacksons Fencing’s research recently found that only one-third of architects are seeing both LPS 1175 and the UK police initiative, Secured by Design (SBD) physical security standards, specified for schools. This highlights a lost opportunity for architects to propose solutions that are appropriate to the level of risk and needs of the school, without turning the site into an unwelcoming fortress.
Helping schools identify specific security needs
Head teachers would be wise to work with architects, who not only know the latest security standards inside and out, but are also are willing to play a more advisory role, helping the school identify exactly what is needed.
Head teachers should prioritise solutions appropriate to their site’s specific risks
It’s also vital that architects don’t simply replace existing fencing and gates, with the same security systems that have been in place for years. Instead, they will need to meet changing needs and risks. Our research finds that teachers often report issues, with the school perimeter and gates, from being climbed over (28%) and causing injury, to gates not locking properly (10%). Head teachers should prioritise solutions appropriate to their site’s specific risks, which sometimes require altering of existing measures.
School fencing is an important aspect of any education site. As well as defining its boundary and making a visual distinction between public and private property, the fencing and gates that surround and secure a school, will typically meet a wide variety of other important criteria, including preventing unauthorised entry to the grounds, protecting pupils, staff, and visitors from accidents and injury, deterring theft and anti-social behaviour, and reducing the risk of malicious damage, and acts of terrorism.
Welded mesh panels for perimeter fencing
Popular options for schools include welded mesh panels for perimeter fencing or sports areas, and railing systems to act as demarcation, in order to control foot and car traffic.
Within the outlying boundary, barriers, bollards and parking posts will keep pedestrians, and vehicles safe from each other, while timber fencing and gates can be designed to control the flow of people, around the grounds and reduce the areas, where students can be hidden from view.
Automated gates and access control
Perimeter fencing must be complemented with safe entrances and exits for vehicles and pedestrians. Every school has unique entry-control requirements, determined by factors, such as size, location and the local environment. These needs influence the decisions you make, when preparing technical specifications for school security gates.
Do you require gates to be steel or timber, manual or automated, single or double leaf? Specialist suppliers will be in the best position to offer inputs on school gates, which typically need to offer solid security and durability, with a welcoming aesthetic.
Specifying access control system
When specifying a school access system, it’s important to consider the areas of the school
When specifying a school access system, it’s important to consider the areas of the school, such as sports fields, car parks, and children’s play and learning areas, and whether it requires playground segregation. Selected gates should meet the design of the fencing, to create a secure perimeter with no weak points, with automated gates conforming to all current safety regulations. .
Noise pollution can be a problem as well, including noise coming in or leaving the school in residential areas. If more teaching is to be carried out outside, it’s worth considering acoustic barriers to reduce noise in and around the school.
Timber acoustic barriers for security and privacy
Timber acoustic barriers offer security and privacy, and can reduce noise levels, by as much as 32 decibels (in laboratory conditions), so are ideal for city centre schools or those located close to busy highways.
There are many ways to build an outdoor classroom. Timber products can help to create a welcoming environment, such as wooden shelters, pergolas, fencing, and decking. Always check that high quality timber, ideally guaranteed for 25 years against rot and insect attack, is being used to provide an attractive, cost-effective, safe and sustainable solution, for all weather conditions.
DBS approved installers
And of course, installers must be DBS approved, so that they can install outdoor classrooms, during school holidays, or within term time, with minimal disruption.
The COVID-19 pandemic had a huge impact on schools and learning. While nobody wants to think of fresh outbreaks of the infection, or any other virus, installing an outdoor classroom made from high-quality, long-lasting materials is a great way to future-proof school learning and ensure safety, and preparedness. Putting extra thought and care into the security angle will provide schools with decades of protection against a host of unforeseen events.
Vehicle barriers first rose to the forefront of public attention after 9/11. The focus from 2001 to 2010 was on anti-terrorism, and vehicle barriers appeared at military and government facilities around the world.
The U.S. Capitol breach on Jan. 6, 2021, brought heightened attention to the risks in a society that is increasingly fractured and volatile. Various protest events in recent months have made customers more aware of possible threats and prompted many to proactively install vehicle barriers and other systems to protect their premises.
Shifting market focus
Since 2010, and with the anti-terrorism market mostly saturated, the market focus for vehicle barriers shifted to public safety applications such as stadiums, schools, universities, large tech companies, and data centres.
It’s an example of deploying technology developed in “wartime” to the broader public good, says Keith Bobrosky, the new president of vehicle barrier company Delta Scientific Corporation.
Withstanding the pandemic
The only remaining hurdle for Delta Scientific is to deal with continuing uncertainty going forward
Like many in the security market, Delta Scientific has withstood a tumultuous two years during the duration of the novel coronavirus pandemic.
They have “come through with flying colours,” says Bobrosky. The company never closed down, and its vaccination rate is high. The only remaining hurdle is to deal with continuing uncertainty going forward.
Delta Scientific’s commitment
Bobrosky began working in sales at Delta Scientific in 2007. Along the way, he has expanded into management, production, and engineering management.
Through it all, he has seen a company that provides employees the autonomy to do their jobs and who have a strong commitment to customers, he says. The privately-owned company is nimble; decisions can be made quickly to respond to market changes, adds Bobrosky.
Addressing needs during a pandemic
The company was concerned about lower demand when the economy shut down, says Bobrosky, but they did not see an impact. The business was steady as a result of government entities and other organisations taking advantage of being closed to evaluate and address security needs. “We saw a decent flow of government business because of the shutdown,” says Bobrosky.
Delta Scientific focuses on the domestic U.S. market but also has a presence selling to partners in the Middle East and Europe, where the equipment is known for its ability to take multiple hits. Even after withstanding an impact according to ASTM standards, their barrier is still operational.
Increased steel purchased
Delta Scientific ramped up its purchasing power, staving off any shortages and striving to keep lead times short
As material shortages have spread through the industry, Delta Scientific has ramped up its purchasing power, staving off any shortages and striving to keep lead times short. Steel is their major component – literally, 98% of the weight of the products is steel, and there are 5,000 pounds of steel per barrier.
The price of steel has gone up and there have been shortages. The company has maintained supply by leveraging its reputation and purchasing power. Most of their components are made in the USA, which has helped them dodge the recent challenges of the global supply chain.
Application of barriers and bollards
Automotive dealerships are another market for Delta Scientific; their bollards and barriers are used as anti-theft devices to keep vehicles from being stolen from a sales lot.
Delta Scientific’s products can foil car thieves who might otherwise use a large vehicle to plow through a barrier and then enable a parade of accomplices to drive away in additional vehicles. Auto resellers buy anti-terrorism products to protect their inventories.
DSC550 Open Frame vehicle barrier
Delta Scientific’s products have evolved from push buttons and relay to touch screens and microprocessors
New efficient product designs enable Delta Scientific to use less steel while keeping prices competitive and maintaining crash ratings. The products are more innovative, says Bobrosky. New barriers include the DSC550 Open Frame vehicle barrier, which does not block the view as solid barriers do.
During the last decade control systems for Delta Scientific’s products have evolved from push buttons and relays to touch screens and microprocessors, although some customers still prefer the simplicity of the older approach.
Portable crash barriers
The equipment can also be controlled remotely and integrated with PSIM-type systems. Although the systems are stand-alone, some clients have been toying with the idea of controlling them through the internet, emphasising the importance of appropriate cybersecurity.
A separate line of portable crash barriers can be towed into place in 15 minutes by a vehicle or even a golf cart. They are used for events such as the Democratic and Republican National Conventions, the Oscars, music festivals, etc. There are hundreds of units in the field, available as needed for various events and rented out to event management companies and other organisers.
Improving customer relations
As the president of Delta Scientific, Bobrosky says his biggest opportunity is to continue improving customer relations – a never-ending goal. He will also strive to increase communication. Looking ahead, additional crash tests are scheduled for 2022, and the company will continue to look for ways to “do more with less.”
A new generation of video cameras is poised to boost capabilities dramatically at the edge of the IP network, including more powerful artificial intelligence (AI) and higher resolutions, and paving the way for new applications that would have previously been too expensive or complex.
Technologies at the heart of the coming new generation of video cameras are Ambarella’s newest systems on chips (SoCs). Ambarella’s CV5S and CV52S product families are bringing a new level of on-camera AI performance and integration to multi-imager and single-imager IP cameras. Both of these SoCs are manufactured in the ‘5 nm’ manufacturing process, bringing performance improvements and power savings, compared to the previous generation of SoCs manufactured at ‘10nm’.
CV5S and CV52S AI-powered SoCs
The CV5S, designed for multi-imager cameras, is able to process, encode and perform advanced AI on up to four imagers at 4Kp30 resolution, simultaneously and at less than 5 watts. This enables multi-headed camera designs with up to four 4K imagers looking at different portions of a scene, as well as very high-resolution, single-imager cameras of up to 32 MP resolution and beyond.
The CV52S, designed for single-imager cameras with very powerful onboard AI, is the next-generation of the company’s successful CV22S mainstream 4K camera AI chip. This new SoC family quadruples the AI processing performance, while keeping the same low power consumption of less than 3 watts for 4Kp60 encoding with advanced AI processing.
Faster and ubiquitous AI capabilities
Ambarella’s newest AI vision SoCs for security, the CV5S and CV52S, are competitive solutions"
“Security system designers desire higher resolutions, increasing channel counts, and ever faster and more ubiquitous AI capabilities,” explains John Lorenz, Senior Technology and Market Analyst, Computing, at Yole Développement (Yole), a French market research firm.
John Lorenz adds, “Ambarella’s newest AI vision SoCs for security, the CV5S and CV52S, are competitive solutions for meeting the growing demands of the security IC (integrated circuit) sector, which our latest report forecasts to exceed US$ 4 billion by 2025, with two-thirds of that being chips with AI capabilities.”
Edge AI vision processors
Ambarella’s new CV5S and CV52S edge AI vision processors enable new classes of cameras that would not have been possible in the past, with a single SoC architecture. For example, implementing a 4x 4K multi-imager with AI would have traditionally required at least two SoCs (at least one for encoding and one for AI), and the overall power consumption would have made those designs bulky and prohibitively expensive.
By reducing the number of required SoCs, the CV5S enables advanced camera designs such as AI-enabled 4x 4K imagers at price points much lower than would have previously been possible. “What we are usually trying to do with our SoCs is to keep the price points similar to the previous generations, given that camera retail prices tend to be fairly fixed,” said Jerome Gigot, Ambarella's Senior Director of Marketing.
4K multi-imager cameras
“However, higher-end 4K multi-imager cameras tend to retail for thousands of dollars, and so even though there will be a small premium on the SoC for the 2X improvement in performance, this will not make a significant impact to the final MSRP of the camera,” adds Jerome Gigot.
In addition, the overall system cost might go down, Gigot notes, compared to what could be built today because there is no longer a need for external chips to perform AI, or extra components for power dissipation.
The new chips will be available in the second half of 2021, and it typically takes about 12 to 18 months for Ambarella’s customers (camera manufacturers) to produce final cameras. Therefore, the first cameras, based on these new SoCs, should hit the market sometime in the second half of 2022.
Reference boards for camera manufacturers
The software on these new SoCs is an evolution of our unified Linux SDK"
As with Ambarella’s previous generations of edge AI vision SoCs for security, the company will make available reference boards to camera manufacturers soon, allowing them to develop their cameras based on the new CV5S and CV52S SoC families.
“The software on these new SoCs is an evolution of our unified Linux SDK that is already available on our previous generations SoCs, which makes the transition easy for our customers,” said Jerome Gigot.
Better crime detection
Detecting criminals in a crowd, using face recognition and/or licence plate recognition, has been a daunting challenge for security, and one the new chips will help to address.
“Actually, these applications are one of the main reasons why Ambarella is introducing these two new SoC families,” said Jerome Gigot.
Typically, resolutions of 4K and higher have been a smaller portion of the security market, given that they came at a premium price tag for the high-end optics, image sensor and SoC. Also, the cost and extra bandwidth of storing and streaming 4K video were not always worth it for the benefit of just viewing video at higher resolution.
4K AI processing on-camera
The advent of on-camera AI at 4K changes the paradigm. By enabling 4K AI processing on-camera, smaller objects at longer distances can now be detected and analysed without having to go to a server, and with much higher detail and accuracy compared to what can be done on a 2 MP or 5 MP cameras.
This means that fewer false alarms will be generated, and each camera will now be able to cover a longer distance and wider area, offering more meaningful insights without necessarily having to stream and store that 4K video to a back-end server. “This is valuable, for example, for traffic cameras mounted on top of high poles, which need to be able to see very far out and identify cars and licence plates that are hundreds of meters away,” said Jerome Gigot.
The advent of on-camera AI at 4K changes the paradigm
Enhanced video analytics and wider coverage
“Ambarella’s new CV5S and CV52S SoCs truly allow the industry to take advantage of higher resolution on-camera for better analytics and wider coverage, but without all the costs typically incurred by having to stream high-quality 4K video out 24/7 to a remote server for offline analytics,” said Jerome Gigot.
He adds, “So, next-generation cameras will now be able to identify more criminals, faces and licence plates, at longer distances, for an overall lower cost and with faster response times by doing it all locally on-camera.”
Deployment in retail applications
Retail environments can be some of the toughest, as the cameras may be looking at hundreds of people at once
Retail applications are another big selling point. Retail environments can be some of the toughest, as the cameras may be looking at hundreds of people at once (e.g., in a mall), to provide not only security features, but also other business analytics, such as foot traffic and occupancy maps that can be used later to improve product placement.
The higher resolution and higher AI performance, enabled by the new Ambarella SoCs, provide a leap forward in addressing those scenarios. In a store setup, a ceiling-mounted camera with four 4K imagers can simultaneously look at the cashier line on one side of the store, sending alerts when a line is getting too long and a new cashier needs to be deployed, while at the same time looking at the entrance on the other side of the store, to count the people coming in and out.
This leaves two additional 4K imagers for monitoring specific product aisles and generating real-time business analytics.
Use in cashier-less stores
Another retail application is a cashier-less store. Here, a CV5S or CV52S-based camera mounted on the ceiling will have enough resolution and AI performance to track goods, while the customer grabs them and puts them in their cart, as well as to automatically track which customer is purchasing which item.
In a warehouse scenario, items and boxes moving across the floor could also be followed locally, on a single ceiling-mounted camera that covers a wide area of the warehouse. Additionally, these items and boxes could be tracked across the different imagers in a multi-headed camera setup, without the video having to be sent to a server to perform the tracking.
Updating on-camera AI networks
Another feature of Ambarella’s SoCs is that their on-camera AI networks can be updated on-the-fly, without having to stop the video recording and without losing any video frames.
So, for example in the case of a search for a missing vehicle, the characteristics of that missing vehicle (make, model, colour, licence plate) can be sent to a cluster of cameras in the general area, where the vehicle is thought to be missing, and all those cameras can be automatically updated to run a live search on that specific vehicle.
If any of the cameras gets a match, a remote operator can be notified and receive a picture, or even a live video feed of the scene.
Efficient traffic management
With the CV52S edge AI vision SoC, those decisions can be made locally at each intersection by the camera itself
Relating to traffic congestion, most big cities have thousands of intersections that they need to monitor and manage. Trying to do this from one central location is costly and difficult, as there is so much video data to process and analyse, in order to make those traffic decisions (to control the traffic lights, reverse lanes, etc.).
With the CV52S edge AI vision SoC, those decisions can be made locally at each intersection by the camera itself. The camera would then take actions autonomously (for example, adjust traffic-light timing) and only report a status update to the main traffic control centre. So now, instead of having one central location trying to manage 1,000 intersections, a city can have 1,000 smart AI cameras, each managing its own location and providing updates and metadata to a central server.
Privacy is always a concern with video. In this case, doing AI on-camera is inherently more private than streaming the video to a server for analysis. Less data transmission means fewer points of entry for a hacker trying to access the video.
On Ambarella’s CV5S and CV52S SoCs, the video can be analysed locally and then discarded, with just a signature or metadata of the face being used to find a match. No actual video needs to be stored or transmitted, which ensures total privacy.
In addition, the chips contain a very secure hardware cyber security block, including OTP memory, Arm TrustZones, DRAM scrambling and I/O virtualisation. This makes it very difficult for a hacker to replace the firmware on the camera, providing another level of security and privacy at the system level.
Another privacy feature is the concept of privacy masking. This feature enables portions of the video (say a door or a window) to be blocked out, before being encoded in the video stream. The blocked portions of the scene are not present in the recorded video, thus providing a privacy option for cameras that are facing private areas.
“With on-camera AI, each device becomes its own smart endpoint, and can be reconfigured at will to serve the specific physical security needs of its installation,” said Jerome Gigot, adding “The possibilities are endless, and our mission as an SoC maker is really to provide a powerful and easy-to-use platform, complete with computer-vision tools, that enable our customers and their partners to easily deploy their own AI software on-camera.”
Physical security in parking lots
With a CV5S or CV52S AI-enabled camera, the camera will be able to cover a much wider portion of the parking lot
One example is physical security in a parking lot. A camera today might be used to just record part of the parking lot, so that an operator can go back and look at the video if a car were broken into or some other incident occurred.
With a CV5S or CV52S AI-enabled camera, first of all, the camera will be able to cover a much wider portion of the parking lot. Additionally, it will be able to detect the licence plates of all the cars going in and out, to automatically bill the owners.
If there is a special event, the camera can be reprogrammed to identify VIP vehicles and automatically redirect them to the VIP portion of the lot, while reporting to the entrance station or sign how many parking spots are available. It can even tell the cars approaching the lot where to go.
Advantages of using edge AI vision SoCs
Jerome Gigot said, “The possibilities are endless and they span across many verticals. The market is primed to embrace these new capabilities. Recent advances in edge AI vision SoCs have brought about a period of change in the physical security space. Companies that would have, historically, only provided security cameras, are now getting into adjacent verticals such as smart retail, smart cities and smart buildings.”
He adds, “These changes are providing a great opportunity for all the camera makers and software providers to really differentiate themselves by providing full systems that offer a new level of insights and efficiencies to, not only the physical security manager, but now also the store owner and the building manager.”
He adds, “All of these new applications are extremely healthy for the industry, as they are growing the available market for cameras, while also increasing their value and the economies of scale they can provide. Ambarella is looking forward to seeing all the innovative products that our customers will build with this new generation of SoCs.”
BIM (building information modeling) provides a process for creating and managing information during the building lifecycle and beyond. BIM is often equated with 3D modeling of construction projects, but the visual component is just part of the value of BIM.
Additional data, such as specifications and other documentation, is also part of the process, underlying the visual aspects, helping to drive decision making and providing immediate access to detailed information about all facets of the building process.
Incorporating BIM systems
For the last six years, ASSA ABLOY Opening Solutions has worked with specification writers and architects in Europe, the Middle East, and Africa (EMEA) to make it easy to incorporate ASSA ABLOY Opening Solutions doors, hardware, and security solutions into BIM systems.
Everyone on a project can work together in the interactive and information-rich BIM environment. BIM tools are also used by contractors, distributors, facility owners, and security consultants.
BIM information relating to doors, hardware, and security solutions is available in the cloud
BIM information relating to doors, hardware, and security solutions is available in the cloud with the company’s Openings Studio BIM software. This improves the process of door scheduling and visualisation and enables customers to focus on the design, installation, and management of openings.
“If you have up-to-date information inside the BIM model, you can reduce mistakes and misunderstanding in the building industry,” says Marc Ameryckx, ASSA ABLOY Opening Solutions’ BIM Manager for the EMEIA region.
“It helps to eliminate mistakes before they happen or as early as possible in the building process. The earlier, the less it costs. We provide data as soon as possible in the process.” (ASSA ABLOY Opening Solutions also has comparable systems available in other regions of the global company.)
Centralised data in BIM 3D model
Expanding the data available in BIM provides additional value compared to merely providing “BIM objects” that can be incorporated into a BIM 3D model. The combination of BIM modeling and the underlying specifications boosts the quality of the project and its key to success, says Marc Ameryckx.
Even after the building is complete, the BIM model is still valuable, providing a repository of “as-built” information that can be used by building managers and security professionals tasked with operating and maintaining the building.
For example, if a lock needs to be replaced, retrofitting is simpler because all the information about the lock and existing installation is available in a centralised data file.
Revit and ArchiCAD
A widely used BIM software is Revit from Autodesk, a program that brings architecture, engineering, and construction disciplines into a unified modeling environment to drive more efficient and cost-effective projects.
Another BIM software program is ArchiCAD, developed by the Hungarian company Graphisoft. Openings Studio™ added a plugin for ArchiCAD this year, in addition to Revit.
Tailor-made information security solutions
We provide tailor-made information security solutions with various hardware on projects with more doors"
“We can provide tailor-made information security solutions with various hardware on projects with more doors, adding more flexibility,” says Marc Ameryckx. “Customers do not need to be the experts on the products because we provide expertise as part of our specifications.”
For example, how often do building mistakes occur because of a misunderstanding about the electrical needs of a lock and the wrong cabling is installed? The problem is especially expensive if it is discovered only after the walls are complete. Providing complete data about the electrical lock as part of a BIM system avoids the snafu.
Another example is the specification of a deadbolt lock on a door that operates with an electric strike. The deadbolt undermines the intended operation of the electric strike and can interfere with escape routes in case of an emergency. The mistake becomes obvious in the BIM environment and can be rectified before consequences impact the real world.
Data addition to Opening Suites site
ASSA ABLOY Opening Solutions is continuously expanding the data it provides at the Opening Suites site, covering additional functionality and more components including the door, cabling, and electrical connections.
Hardware sets are linked to specific doors in the BIM models, including all the details of various components, including article numbers, technical sheets, electrical requirements, all depending on customer expectations.
Physical equipment includes QR codes that can be scanned by a smartphone to provide information on the door (A mobile app is in development).
More details and more data
Experienced BIM consultants work with the Openings Studio software on projects ranging from single doors to large buildings with many doors.
Data will be more and more important, and there will be more data inside BIM models
Adding more data and detail to the BIM process at the level of each door expands the usefulness of BIM, which has historically been focused on broader issues such as structural work and HVAC. “Openings Studio™ provides all the data to integrate doors and security in the BIM process,” says Marc Ameryckx.
The higher level of detail may be a new aspect even for customers who already use BIM software. “Data will be more and more important, and there will be more data inside BIM models,” says Marc Ameryckx. In the future, the use of “digital twins” could expand the capabilities even further; for example, the software could simulate escape routes in case of fire. More data makes more things possible.
Alcatraz AI has announced that they are bringing the Alcatraz AI Rock facial authentication solution to BrainBox AI’s offices. BrainBox AI is at the forefront of building automation and a renowned company in the green building revolution.
Identity and facemask verification solution
As BrainBox AI’s office recently re-opened with limited capacity, the company is taking proactive steps, through Alcatraz AI’s robust identity and facemask verification solution, in order to keep employees safe.
As one survey showed, two-thirds of employees have safety concerns, regarding the return of on-site operations. Considering these statistics, health and safety must be top priorities for businesses, as they re-open. BrainBox AI is keeping its employees’ safety at the top-of-mind, by installing Alcatraz AI’s Rock solution, before they return, to ensure greater safety and security.
Alcatraz AI’s Rock facial authentication solution
Alcatraz AI’s Rock facial authentication solution combines advanced AI and 3D sensing technologies
Alcatraz AI’s Rock facial authentication solution combines advanced AI and 3D sensing technologies, to provide facilities with enterprise-grade identity verification, which is needed to create secure spaces.
Rock’s state-of-the-art security features include touchless access, multi-factor authentication, video at the door and intelligent tailgating detection. Alcatraz AI’s access control solution, the Rock, effectively detects tailgating and sends ‘real-time alerts’, if an unauthorised person enters, and sends real-time notifications to ACS/VMS.
BrainBox AI, leading the green building revolution
“BrainBox AI is leading the green building revolution, and we are looking forward to bringing frictionless, multi-sensor technology and a touchless authentication feature to the office,” said Tina D’ Agostin, the Chief Executive Officer (CEO) of Alcatraz AI, adding “By utilising the Alcatraz AI Rock, we’ve helped BrainBox AI’s offices re-open smoothly and safely.”
“BrainBox AI is excited to announce its partnership with Alcatraz AI. Our employees’ safety is always our top priority. We are confident The Rock’s touchless authentication and the frictionless security system will give each BrainBox AI employee peace of mind, when returning to the office,” said Jean-Simon Venne, the Co-Founder and Chief Technology Officer (CTO) of BrainBox AI.
ASSA ABLOY’s Code Handle door entry solution is a simple solution for keeping private rooms very private, in order to allow access only to those who require it and authorised personnel.
Code Handle door entry solution
The PIN code setting of the Code Handle access control solution allows users to keep control of who has access, particularly important when they want to keep items away from children.
In primary schools, Code Handle protects each and every room that staff and security don’t want pupils to access. This ensures that only authorised teachers and support staff, who know the code to unlock the door, can access these rooms. All they need to do is enter the code on the Code Handle‘s keypad and the door opens.
Works together with existing locking units
Code Handle, by ASSA ABLOY, works in combination with the existing locking units
Code Handle, by ASSA ABLOY, works in combination with the existing locking units, already installed in facilities. Users can keep the cylinder or lock, and just change the handle to a battery-powered Code Handle.
With Code Handle, there is no need to cable the door, connect it to the mains or install an electronic access control system. The Code Handle door entry solution is perfect for staff offices, kitchens, store rooms, staff toilets, or any other school room that is to be kept private and secure.
ASSA ABLOY’s Code Handle has various benefits, including:
Auto-lock - Staff rooms are used many times, throughout the day, With Code Handle’s auto lock feature, there is no need to remember to lock the door, when exiting.
Easy to install and retrofit - All it takes is two screws and two minutes of time, to install Code Handle on almost any interior door.
Keyless and convenient - Secure rooms with no keys, no wires and no expensive access control system, with the Code Handle door entry solution.
A host of industry-pioneering fire protection solutions from UK manufacturer, Advanced, have been installed to protect approximately 140,000 sq ft of Grade A office space at Westferry House, Canary Wharf.
As a cornerstone office building situated at the western gateway to Europe’s largest and most successful business district, Westferry House consists of 11 storeys, complete with its retail promenade on the ground floor. At the core of the active fire protection for the building are six Advanced MxPro 5 fire alarm control panels installed alongside Apollo Soteria multi-sensors.
Installing custom-made fire panel
Responsible for all aspects of the installation, as well as the future maintenance of the system, are Advanced partners, Pacific Security Systems Ltd.
The Kent-based fire and security specialists installed the MxPro 5 fire panels alongside Advanced’s remote-control terminal and repeater panel, TouchControl, to provide a discreet and aesthetically pleasing means of viewing the fire system in the building’s recently refurbished reception area.
Advanced’s team was commissioned by Pacific Security Systems to design and manufacture a custom-built annunciator panel
Advanced’s AdSpecials team was also commissioned by Pacific Security Systems to design and manufacture a custom-built annunciator panel to control the pressurisation and extraction fans and dampers on all floors of the building. The annunciator also integrates with the building’s VA/PA system to provide manual control of messages on all floors.
Reliable and user-friendly solutions
Kirk Short, Director at Pacific Security Systems, said, “As long-time installers of Advanced with many successful projects, large and small, under our belts, we know its solutions are both reliable and user friendly. The bespoke equipment we required for the fire system upgrade at Westferry House is of an excellent standard, and we found the AdSpecials team very easy to work with throughout the entire design process.”
Advanced’s AdSpecials team works with customers requiring bespoke fire panels to design and manufacture unique fire system solutions, whatever the installation challenge.
Versatile TouchControl solution
Amanda Hope, UK Fire Business Development Manager at Advanced, said, “Canary Wharf attracts some of the World’s most respected and successful companies, and it was fantastic to learn that our solutions have been installed in such a prestigious commercial office space.”
“Westferry House is just a stone’s throw from the Landmark Pinnacle – the UK’s tallest residential building – another iconic site protected by Advanced’s MxPro 5 panels. Westferry House is also a fantastic example of where our TouchControl solution comes into its own, providing additional monitoring and control in a sleek and versatile format that complements the building’s stylish reception space.”
TouchControl is a high-resolution touchscreen repeater that makes it easy to check fire system status via interactive maps
TouchControl is the low-profile, high-resolution touchscreen repeater that makes it easy to check fire system status via interactive maps and zone plans while harmonising with a wide range of interiors. When in standby, it can be used to display branding, advertisements, and information, but will instantly revert to fire operation when a fire condition occurs.
Advanced, owned by FTSE 100 Company Halma PLC, protects a wide range of prestigious and high-profile sites across the globe – from London’s Shard to Abu Dhabi International Airport and the Hong Kong – Zhuhai – Macau Bridge
Fire protection solutions
Advanced is a world pioneer in the development and manufacture of fire protection solutions. Advanced’s reputation for performance, quality, and ease of use see its products specified in locations around the world, from single-panel installations to large, multi-site networks.
Advanced’s products include complete fire detection systems, multi-protocol fire panels, extinguishing control, fire paging, false alarm management, and reduction systems as well as emergency lighting.
Halma is a global group of life-saving technology companies with a clear purpose to grow a safer, cleaner, healthier future for everyone, every day.
Visa chooses Callsign, as their preferred behavioural biometric digital and device intelligence identity provider. Under the agreement, Visa will introduce Callsign's behavioural biometric and device fingerprinting solutions to the Visa network of financial institutions, payment service providers (PSPs), and merchants across Europe.
Callsign joins the Visa Fintech Partner Connect programme giving banks, merchants, and the wider card ecosystem access to Callsign's Intelligence-driven authentication solutions which positively identify consumers using inherent behavioural biometrics whilst detecting and preventing fraud.
Allowing genuine access via MFA
Callsign technology helps banks, merchants, and PSPs to answer two questions; is the user who they say they are? And are they permitted to access the service they are requesting?
Callsign combines behavioural biometrics, device intelligence with MFA to help authenticate users' identities
Using machine learning techniques Callsign combines behavioural biometrics, device intelligence, and geo-location with multi-factor authentication to help authenticate users' identities.
This approach helps banks, merchants, and PSPs to secure and authenticate users' identities frictionlessly, stopping fraud early and only letting genuine customers access their service and transact safely and seamlessly.
Need for secure and accurate user experience
The agreement comes at a time of spiralling fraud, according to a recent report, every second fraudulent transaction in the finance industry was account take over.
Card, not present fraud (CNP) accounted for 79% of all card fraud across the Single European Payments Area and, figures from UK finance suggest that in the money lost to Authorised Push Payment (APP) scams totalled nearly half a billion (479 million) in 2020.
"The need to accurately identify users online for digital payments and online banking is critical due to the shift to online transactions in the past 18 months. Financial services organisations are looking for the technology that provides the most secure, accurate, and seamless user experience to incorporate into their solutions. We are pleased to be joining the Visa Fintech Partner Connect to work with Europe's leading fintech," concluded Amir Nooriala, Chief Commercial Officer, Callsign.
A new generation of security professional is waiting in the wings. They will be faced with unprecedented challenges, as they seek to transform the security marketplace to the ‘next level’. Technology changes ensure the market will be very different 10 years from now and the fresh labour pool will need to be able to meet the host of new challenges.
We asked our Expert Panel Roundtable: What exciting career opportunities in the security industry await the next generation?
Assembling security solutions has long been considered the role of the integrator, whose role is to pick and choose the best technology tools and then to assemble the complete system. However, more manufacturers are offering pre-integrated end-to-end solutions that include multiple elements from the same manufacturer, designed to work seamlessly together. At the end of the day, end users want to know: Whose role is it to provide security ‘solutions’ – the manufacturer or the integrator? We asked our Expert Panel Roundtable.
Since the advent of the physical security industry, access control has been synonymous with physical cards, whether 125 kHz ‘prox’ cards or the newer smart card alternatives. However, other credentials have also come on the scene, including biometrics and even smart phones. Some of these choices have distinct cost and security advantages over physical cards. We asked this week’s Expert Panel Roundtable: How soon will the access control card become extinct and why?