Matrix will be participating in the Rail India Conference & Expo 2019 to be held at The Lalit in New Delhi on 29th – 30th August 2019. From Telecom domain, Matrix will be showcasing enterprise meeting solution - PARISAT meeting server at the event. The conferencing server is engineered for 10 video and 100 audio participants enabling police force to collaborate from different locations and solve critical situations at the earliest. At the event, Matrix will exhibit pure IP solution -...
Driven by technology developments such as voice recognition, smart devices and the Internet of Things, our homes are getting “smarter” all the time. Increasingly, we expect our residential environments to be responsive to our voice commands, whether we are adjusting a thermostat, turning on a light, or lowering the window shade. Smarter home integration yields new opportunities and challenges for home security, too, which contributes an element of safety and protection to the conveni...
Boon Edam Inc., a pioneer in security entrances and architectural revolving doors, announces they are emphasising the theme of tailgating mitigation and integration in booth #1103 at the GSX (formerly ASIS) exhibition in Chicago, Illinois from September 10-12. GSX is an annual event that brings together over 20,000 participants from across the security profession for a week of networking, educational opportunities and discovering the latest security solutions. Boon Edam is also the official tur...
Secure units for vulnerable children and their families are one of the most complex developments to provide security for, but thanks to its tailored solutions and vast experience, ASSA ABLOY High Security and Safety Group has helped to improve resident safety at numerous facilities. The amount of time young adults are spending in Secure Units is increasing by up to 20%, putting added pressure on these types of facilities. This is also putting strain on the need for security solutions that...
Advanced Access is celebrating its Gold Partner status with Comelit UK to provide bespoke security for future-proof smart door entry solutions. Specialist access control and door entry distributor, Advanced Access works closely with Comelit, introducing its customers to innovative security systems including its stylish audio and visual door entry, latest technology. Advanced - Comelit partnership Says Sam Wade, Advanced Access UK Sales Manager, “For more than 10 years Advanced Access ha...
Kingdom is delighted to announce the recent acquisition of Dunedin Facilities Management Ltd. Established in 2012, Dunedin has gained an excellent reputation for delivering CCTV, Door Supervisors, Security Guards, Mobile Patrols, Key Holding and Event security solutions. With an extensive portfolio of loyal clients, Dunedin looks forward to using the Kingdom platform to develop further future growth in Scotland. The Dunedin acquisition continues the strategic expansion plans of Kingdom. Enhanc...
You don’t need to continue using keys and key cards. When you want effective first-line security for private doors in public spaces, you no longer need cumbersome kit. To keep opportunist hands off your belongings, the Code Handle 4-digit code-operated electronic handle locks without any wires, expensive hardware or software, mechanical keys or changes to your existing doors. PIN codes unlock so many features of our daily lives, from a smartphone to your online bank account. Now you can use them to unlock security door handles, too. Code Handle is a stylish handle with an integrated electronic PINpad. When you fit a Code Handle to your door, you make sure only authorised people get in. Without a 4-digit code, the handle stays locked and the door stays closed. Fire accredited Code Handle For such a simple device, Code Handle packs several clever features into its sleek, low-profile design“Code Handle is unique in comparison to common code door locks: it has the code function and battery incorporated inside its handle, so you don’t need to make extra modifications to your door,” explains Lars Angelin, Business Development Manager for Code Handle at ASSA ABLOY EMEA. For such a simple device, Code Handle packs several clever features into its sleek, low-profile design. When you close the door behind you, Code Handle locks itself, so you don’t need to put down whatever you are carrying. From inside, a Code Handle opens freely. It is also fire accredited (EN 1363). Code Handle is simple to install and retrofit. Everything you need for a simple, effective security barrier is inside the box. Two screws fit a new Code Handle to almost any interior door, with left- or right-hand opening. There is no need to cable the door, connect it to mains, or pay a specialist installer. Works with standard lock hardware Code Handle is the lock of choice for sensitive, low-security doors in all kinds of placesCode Handle works in tandem with standard lock hardware. You can keep your existing cylinder or lock mechanism and just change the handle. Two standard batteries (CR2) slot inside the Code Handle, and typically last 30,000 lock/unlock cycles before replacement. Code Handle is an attractive proposition, with an elegant contemporary design, in brushed stainless steel and satin chrome. No more ugly push-button-and-twist mechanical PIN locks spoiling the look of your office. Code Handle is the lock of choice for sensitive, low-security doors in all kinds of places. At libraries, airports, railway stations, gyms, schools, car dealerships, restaurants and offices, a Code Handle PIN lock keeps the public out of accessible private rooms. In company archives, stock rooms, customer toilets, management offices and medicine stores, Code Handle deters casual intruders and keeps your property safe and secure.
Comelit Group and Salto Systems have announced a state-of-the-art integration to enable a unique door entry and access control solution, operated via simple-to-use mobile app technology. Salto Systems is a Spanish company founded in 2001 with one objective: devising a world-class access control system simple to use and extremely efficient. Now, Salto has become one of the world’s top manufacturers of electronic access control system, the perfect partner for Comelit. Salto KS integrated App The Italian security specialist, known for its high specification solutions, has invested in creating the integration with Salto’s exclusive KS cloud-based access control system, following successful collaboration work with two UK leading property development companies. The Salto KS integrated App offers audio and visual functionality for building entrances and apartment doors The Salto KS integrated App, compatible with all leading smart phone and tablet technology and tailored to provide push notifications, offers audio and visual functionality for building entrances and apartment doors, to control all aspects of door entry. This includes providing remote, real-time access whilst not on site for deliveries and visitors, alongside communicating with concierge services. Home security Says Francesca Boeris, Managing Director Comelit Group UK, “With the way apps are delivered and maintained changing, home security is now everyone’s responsibility. What Comelit and Salto have delivered with this significant integration is future proof technology that paves the way for users to stay connected to their home.” “Our teams in the UK and Italy and Salto crew have worked closely together right from the initial design to maximise the opportunities with Salto’s KS cloud-based services and enable push notifications. But we know it’s only the first step. We are already working closely on next phases and further third-party integration, to strengthen Comelit’s position as the market leader in cloud technology. Comelit door entry system “We are incorporating more into our app capability and anticipating solutions that keep people powered and protected wherever they are, fitting today’s mobile-connected lifestyles.” The integration is now complete, offering each Resident the ability to manage and control the Comelit door entry and Salto access control from the Salto KS App. First phase, the app is now being specified into over 4,000 new apartments being planned for development.
Suprema Inc., a provider of biometrics and security solutions, announces that the company introduces the company's latest range of biometric security solutions at Security Exhibition & Conference 2019 in Sydney, Australia. At the show, Suprema will showcase FaceLite, its latest facial recognition terminal, 2nd generation fingerprint IP readers and enterprise access control solutions. Launched at ISC West in April this year, Suprema extends introduction of the FaceLite in Australia. The FaceLite provides the world's best facial recognition performance in terms of matching speed, operating illuminance and user capacity. In addition to the FaceLite Suprema will demonstrate its range of access control terminals, updated BioStar 2 security platform with visitor management solution. Time attendance applications The new FaceLite is designed for both the enterprise access control systems and time attendance applications by featuring Suprema's technologies and innovative features. Loaded with powerful 1.2GHz CPU and massive 8GB memory, FaceLite achieves incredible matching speed of up to 30,000 matches per second and accommodates up to 30,000 users while providing intuitive face-enrolment GUI for faster user registration. The industry's unique and the most advanced biometrics-based intelligent access controller On the optical side, the new face recognition technology overcomes possible interference from dynamic lighting conditions including sunlight and ambient light. The new technology allows greater range of operating illuminance from zero lux to 25,000 lux which covers almost every possible lighting conditions regardless of indoor or outdoor, day or night. In addition, the company also showcase CoreStation, the industry's unique and the most advanced biometrics-based intelligent access controller. Face recognition technology The new Suprema CoreStation is an intelligent door controller which provides advantages of biometric-enabled security over centralised access control systems. Designed for mid to enterprise-level systems, CoreStation handles up to 500,000 users with incredible fingerprint matching speed of up to 400,000 matches per second. By providing high-performance, biometric readiness and Ethernet communication, CoreStation is capable of offering comprehensive access control functionalities for up to 132 access points along with the company's BioStar 2 security platform. The device also provides centralised biometric template management and also interfaces with complete set of reader technologies including RS-485(OSDP) and Wiegand. Along with the new enterprise access control solution and face recognition technology, Suprema will also showcase the company's extensive range of latest biometrics and access control solutions at Security Exhibition and Conference 2019. To experience latest Suprema products and technologies, please visit Suprema stand(#A8).
Globally renowned entrance security specialist, Meesons A.I. Ltd is celebrating being selected as a finalist in the 2019 NatWest Great British Entrepreneur Awards. 2019 NatWest GB Awards NatWest Bank is the headline sponsor of the awards which celebrate the incredible stories that have taken businesses to where they are today. Jeremy Terry, Chief Executive Officer at Meesons, secured a place in the North West Regional Final for Service Industries Entrepreneur of the Year category following an impressive growth in turnover that has averaged 28% pa over the last five years. The final will be held in Manchester on 15 October. There are few better examples of how a disruptor business has been able to grow market share in a market dominated by large, multinational competitors. The foundations of this growth are a result of a clear vision and strategic plan that is driven forward by Meesons’ strong management team. The company currently services and maintains in excess of 650 sites throughout the UK Bespoke access control solutions Alongside this, service continues to be a core pillar of growth at Meesons and the business is committed to delivering individual client attention to ensure customers find the right entrance control solution to meet their needs. The company currently services and maintains in excess of 650 sites throughout the UK, ranging from critical national infrastructure, to large corporate clients, through to the UK’s largest budget gym operators that require 24/7 access to maintain revenue. Speed gates and security portals Meesons made a bold move around a decade ago that involved reinventing the business with a goal to provide entrance control to support on site security, manned guarding and reception staff, and improve operational efficiencies by offering bespoke entrance control solutions. (Speed gates and Security Portals). This pathway to growth was set out by CEO Jeremy Terry, whose vision identified an opportunity in specific, new vertical markets for enhancing access security to capitalise on the growth in 24/7, multi-tenanted, multi-occupancy buildings. Since then, Jeremy and the management team have driven forward the business, achieving a record turnover in the last financial year and currently employing 35 people. LPS 1175: Issue 8 physical security The company remains committed to investing in heightening the uniqueness of its existing core ranges and has just become the first and only business to achieve LPS 1175: Issue 8 physical security standard for an extended range of security portals. In addition, to ensure efficient installation and ongoing service support, Meesons has built a team of nationwide engineers to offer customers a highly responsive service. Jeremy Terry, Chief Executive Officer at Meesons A.I. Ltd., said, “We have organically grown the business through hard work, determination and belief that we can make it work. We have now achieved significant market share from international competitors by taking the business from an undifferentiated, commodity-driven product trader to a specialist provider of entrance security solutions. I am delighted that we have been recognised in the awards because everyone in the business plays a part in achieving these outstanding results.” Open, secure buildings Meesons recognise the importance to clients of keeping their buildings open and secure Meesons recognise the importance to clients of keeping their buildings open and secure, which is why it has developed a range of Service and Maintenance plans to meet customers’ needs. These range from next day response to a fully comprehensive package including an AM/ PM on-site response time. Jeremy Terry adds, “Our ultimate goal is to earn the lifetime loyalty of our customers through excellent customer service, the introduction of innovative new products and technical leadership in our product categories.” Meesons’ security applications Meesons has installed products in some landmark buildings, including, The Francis Crick Institute, a £650 million research facility; the second tallest building in the UK, located in Canary Wharf; 55 Colmore Row, a Grade-A office redevelopment which required a unique Speed Gate solution; 10 South Colonnade, a new government hub located in Canary Wharf and the largest commercial fit-out in the city due for completion in late 2019 for a global financial institution.
The 2019 editions of Shanghai Intelligent Building Technology (SIBT) and Shanghai Smart Home Technology (SSHT) will be held from 3 ‒ 5 September at the Shanghai New International Expo Centre (SNIEC). Spurred by the fast development of China’s intelligent building, Internet of Things (IoT) and Artificial Intelligence (AI) sectors, the two exhibitions are close to capacity as there has been strong demand from exhibitors to participate at the shows. Smart neighbourhoods The total exhibition space is also expected to reach a record of over 28,750 sqm The concurrently held trade fairs are expected to attract over 280 renowned businesses from China and overseas, and welcome a similar number to last year’s 29,423 professional visitors. The total exhibition space is also expected to reach a record of over 28,750 sqm. Fairgoers to SIBT and SSHT will not only be treated to the usual array of smart home and building technologies and solutions, but will once again be able to visit the returning Parking China fair, while a debut ‘Shanghai Smart Office Technology’ (SSOT) feature zone will add yet another element to these growing group of exhibitions. Covering key topics such as IoT, AI, big data, robots, smart offices, smart parking, home security, HVAC, energy conservation, 5G, smart neighbourhoods and smart cities, fairgoers and exhibitors alike can benefit from a one-stop market and purchasing platform which positively bring together multiple different industries. Smart parking industries On the development of SIBT, Ms Lucia Wong, Deputy General Manager of Messe Frankfurt (HK) Co Ltd said: “As SIBT welcomes its 13th edition, I must express my sincere gratitude for the unwavering support from the industry. Devoted to demonstrating cutting-edge technology and innovative products, we are looking forward to highlighting new market trends and welcoming fairgoers this September.” Ms Wong also shared her optimism on the fifth edition of SSHT, stating: “The fairs have grown alongside the market. By exploring advanced technology and top-tier products, we strive to promote the widespread implementation of smart homes.” In line with recent policies implemented by China, green building and renewable energy initiatives are being promoted in different parts of the country, while intelligent buildings have also become a common sight across cities. China’s IoT capabilities are also developing rapidly which extends to the smart building, smart office and smart parking industries. Cross-industry cooperation Over 280 exhibitors from multiple sectors will congregate at the shows As 5G and AI technology continue to improve, smart home is now more than a fictional concept but a lifestyle that is gradually taking over traditional homes. Full smart home implementation are expected to soar in popularity with sensors becoming the epicentre of smart homes. With the rapid development of 5G technology and the enhanced applicability of AIoT and IoT operation systems, the future of home industry will be brimming with exciting possibilities. With both fairs placing a strong emphasis on ‘AI+IoT’, SIBT and SSHT will work in synergy to bring together IoT and smart building suppliers, encouraging cross-industry cooperation and communication. Over 280 exhibitors from multiple sectors will congregate at the shows including Schneider, Hisense, Ezviz, Ave Leelen, ANJUBAO, Dnake, Legrand China, SUREN, ORVIBO, Baiwei, FANTEM, HaiLin, Shuncom, KNX, EnOcean, Crodigy, A-OK, wistarmotor, HDL, Grandland, Daming Laffey, UIOT, Eastsoft, Savekey, Wintom Sun-shade, Auxdio, Sonos, aminasound, D&M, Cinemaster, Levoice, Elite, Changsha Yidai, Ningbo Hope, Bao Feng Cinema, WTi Group, ALCATEL, Dongguan Taitron, and more. Smart control systems Selected exhibitors and their innovations include: HDL - HDL showcases integrated smart control systems, one-stop solutions and equipment. New products on display include the multipurpose S10 touch screen and other smart panels. Ezviz - Concentrating on the safety-related aspects of smart living and technology, the company will demonstrate its intelligent air quality sensor with remote access and history function, as well as its video recorder with internet-connection, 360° high-speed rotation, intelligent human detection, acoustic location, and other functions. Legrand China - Legrand China will offer visitors a multitude of new smart home appliances and systems, including intelligent switches for window blinds, switch modules, gateways, smart plugs, wireless IR transmitters, controllers, and door and window detectors. FANTEM - The latest upgrade to its home system, OOMI3.0, is a stability solution for wireless connections in mansions and duplexes. Targeting the needs of families and those that require large-scale systems, it supports scenario settings with the use of multiple gateways. CTTL-Terminal Labs summit forum envisions smart living Every edition of SIBT and SSHT introduces cutting-edge industry technology through a diverse programme of concurrent events. This year, SIBT will be collaborating with CTTL-Terminal Lab under the China Academy of Information and Communications Technology (CAICT) to present forums on smart cities, neighbourhoods and buildings. Under CAICT, CTTL-Terminals Lab specialises in ICT development research, product standards and testing, and new ICT development research, offering all-round support for related industries. Led by the lab, this year’s forum will introduce a number of renowned speakers to discuss their latest research on industry trends and innovative new technology. Smart office solutions A new ‘Smart Office’ zone will debut this year to explore the growing market demand for smart office solutions. The zone will highlight a number of technologies and solutions that provide optimal performance for office facilities using IoT and connected technology. The show will explore improved urban parking resource management and better parking eco-systems in buildings The smart parking sector will also be under the spotlight as the Parking China fair will once again be held concurrently to provide a high-level international platform for smart parking solutions in cities. To help the industry thrive, the show will explore improved urban parking resource management and better parking eco-systems in buildings. SIBT is organised by Guangzhou Guangya Messe Frankfurt Co Ltd, Shanghai Hongshan Exhibition Service Co Ltd, China Council for the Promotion of International Trade – Shanghai Pudong Sub-Branch, and The Intelligent Engineering Branch of China Exploration & Design Association. Building technology exhibitions The organisers of SSHT are Guangzhou Guangya Messe Frankfurt Co Ltd, Shanghai Hongshan Exhibition Service Co Ltd, China Council for the Promotion of International Trade – Shanghai Pudong Sub-Branch, and China Smart Home Industry Alliance. The two fairs will be held from 3 – 5 September 2019 at Shanghai New International Expo Centre in China. SIBT and SSHT are both headed by the biennial Light + Building event in Frankfurt, Germany. The fair will be held once every two years. The next edition will be held from 8 -13 March, 2020. Messe Frankfurt also organises a series of light and building technology exhibitions in Asia including Guangzhou Electrical Building Technology, Guangzhou International Lighting Exhibition and Shanghai International Lighting Fair. The company's light and building technology fairs also extend to markets in Argentina, India, Thailand, Russia, the UAE and other countries and regions.
Radware® a provider of cyber security and application delivery solutions, announces that its SSL DDoS attack protection, DefenseSSL®, now features behavioural-based algorithms for keyless protection against HTTPS flood attacks. For the first time, organisations have the scale needed to effectively mitigate HTTPS floods. According to Google, the majority of internet traffic is now encrypted and accounts for more than 70% of internet pages. While SSL/TLS encryption is critical for many aspects of security, it also opens the door to a new generation of powerful distributed denial-of-service (DDoS) attacks. Simplifying key management SSL/TLS connections require up to 15 times more resources from the destination server than of the requesting host, meaning that threat actors can launch devastating DDoS attacks using only a relatively small number of connections. Radware’s keyless DDoS mitigation solution now makes it possible to protect from SSL-based HTTP DDoS attacks at scale without adding latency to customer communications, and while preserving user privacy and simplifying key management. Service providers and carriers serve many tenants on their network and provide them with cyber-attack protections Service providers and carriers serve many tenants on their network and provide them with cyber-attack protections. Due to their own security policies, network tenants cannot provide their decryption keys to the service provider’s or carrier’s network administrators, which leaves the providers or carriers vulnerable to HTTPS flood attacks. With no decryption capabilities, service providers and carriers are left with no effective solution to provide HTTPS flood protection to their tenants. Managing decryption keys Radware’s Chief Marketing officer, Anna Convery-Pelletier, said, “Our new DefenseSSL capabilities support carriers and service providers in protecting themselves and their customers against HTTPS flood attacks even when they don’t have access to their tenants’ decryption keys. This unique capability eliminates the massive operational complexity that comes with managing decryption keys. Further, with this solution, enterprises have the flexibility to opt for the most suitable protection to match their needs. Enterprises that have access to decryption keys can still choose to use those keys to decrypt suspected traffic and increase the accuracy of their mitigation.” Radware’s solution for keyless protection against HTTPS flood attacks is based on a stateless architecture. Traditional solutions are stateful and thus themselves vulnerable to DDoS attacks. With advanced behavioural algorithms and the combination of rate-based and non-rate-based parameters, Radware can identify DDoS attacks over encrypted traffic, even without inspection of the traffic’s content. Radware’s DefenseSSL functionality is currently available across its DefensePro advanced protection product suite.
There’s no question that the popularity of Do-It-Yourself (DIY) security and home automation products is on the rise. The reasons for the growth in DIY sales are numerous, including increased awareness of home automation products, fast set-up, limited (if any) installation costs, and interoperability with other smart security products. In fact, with the parallel rise of smart home hubs like Alexa and Google Home, many people are opting to attempt the set-up of smart home devices without any professional assistance. According to a 2018 Residential Security Market Report prepared by Parks Associates and Security Sales & Integration magazine, “More than 60% of installing dealers now report that DIY systems are biting into demand for their services.” But the rise in DIY is not entirely bad news for security and home automation installers and dealers. There are a number of ways to view this glass as half-full. Let’s look at a few of them. Increase in revenue for dealers With their lower cost and perceived ease of installation, DIY products have broken down barriers for additional purchaseThere are reasons for dealers and installers to be cheerful about the rise of DIY. For one thing, according to that same Residential Security Market Report from Parks Associates, residential security dealers are doing quite well. The report states, “In 2017, revenues were up an average 7.72% for security dealers.” What about installations? The report goes on to say, “For 2017, the average number of installs per dealer was 22 per month, compared to 17 per month in 2016.” So, revenues are up for security dealers, and at least part of the reason can be attributed to the fact that DIY products can raise overall awareness of and spur interest in other home automation and security products. With their lower cost and perceived ease of installation, DIY products have actually broken down barriers for the additional purchase, and installation, of complete, professionally installed systems. Wireless, connected smart locks For example, the sale of wireless, connected smart locks (viewed by some consumers as DIY) can lead to opportunities for further home automation product sales and professional installations. Connected smart locks can actually act as an extension of a smart hub or controller. They can be used to wirelessly communicate with and control all the devices that make up a home automation system, including lighting, entertainment, thermostats, air, alarms, shades and more. With their lower cost and perceived ease of installation, DIY products have actually broken down barriers for new security installations And they can do all this from a prime, convenient location – the front door, as well as other points of entry like the side or back doors. Plus, smart lock conversion kits like Kwikset Convert let homeowners easily bring home automation capabilities to their door without altering the aesthetics of the entry. Connected smart locks can allow homeowners to set up their home with custom scenarios, right before they step inside. For example, residents can program their lock so that every time they unlock the door, a foyer light goes on, temperatures begin to rise to a set level – even connected coffee makers can begin to make a cup. Portfolio of home automation products One of the best ways to mitigate the ‘threat’ of DIY sales is for dealers and installers to become more versatileSmart locks are just one example of the potential of DIY products to spark a homeowner’s interest in a wide range of other home automation devices, many of which would benefit from professional installation. One of the best ways to mitigate the ‘threat’ of DIY sales is for dealers and installers to become more versatile and offer a complete portfolio of home automation products. The larger the home automation offering, the more devices there are to sell and install, the larger the installation required, the greater the need for professional installation. Many homeowners who feel like they have a certain level of handiness will start by trying to do it themselves with a DIY product. But things don’t always go as planned, especially if they are attempting to set up a robust home automation system. First off, just because a product is DIY doesn’t mean that the old products that are being replaced are going to easily make way for the new. A DIY thermostat or smart lock might require that the old equipment (and possibly wires) get tugged out of the wall. Messy holes might need to be filled. Advantages of professional installation Even after the old system has been removed, homeowners planning on setting up a connected system may soon realise they don’t have the electrical skills or technological know-how to install and connect all devices, get a system programmed correctly, and get everything up and running smoothly. Professional installers have learned from experience; there’s very little that they haven’t seen before. With their years of experience, installers know the best way to automate a home and how to create a custom smart home experience Do-it-yourselfers might be able to solve problems by searching the internet and finding videos. But, then again, they might not. After going the DIY route once, many full-home automation system enthusiasts are beginning to realise that the best way to get things done right the first time is to leave the installation and set-up to a professional. Professional installers can and should bring an extra level of experience and guidance to the process. Their services should go beyond tech installation and also include interface design. With their years of experience, installers know the best way to automate a home – how to create a custom smart home experience that doesn’t make the user feel less than smart. Selling additional home automation products If a problem arises due to installation error, the DIYer does not have any recourse to correct these mistakesResidential security dealers who offer professional installation should be willing to embrace the DIYer who has attempted to do a self-install but has not been able to complete the process successfully. With an open mind to this scenario, they can save the day for the DIYer, as well as create an opportunity to sell additional home automation equipment that the DIYer may not have known to be available. The disparity between DIY and professional installation also brings to light the fact that there are no ‘satisfaction guarantees’ and no ‘installation/labour warranty’ available when a home automation system is installed by a DIYer. If a problem arises with either the equipment connectivity due to installation error, or if a piece of equipment is installed incorrectly, the DIYer does not have any recourse to correct these mistakes. This may not be as critical if a DIYer installs a minor piece of equipment, but with something as critical as securing and protecting their home with a home automation and security system, most people want full peace of mind that everything has been installed correctly. Reduces connection instability According to a 2017 study by the analyst firm, IHS Markit, “The quality of the equipment is usually higher in professionally installed systems, and professional configuration and setup greatly reduces the potential for connection instability…” This is an issue that DIYers may come to realise over time. On the other hand, one issue DIYers may recognise right away, especially if they are attempting to connect multiple devices, is that the connectivity may be inconsistent. Professionally installed devices operating on a wireless protocol might deliver better, consistent, longer-range connectivity IHS Markit explains that, “DIY systems rely on open protocols and Wi-Fi connectivity that can sometimes be unreliable, creating connection issues. Some of the sensors can become unrecognisable to the system, requiring intervention from the user. In contrast, professional wireless systems rely on UL- or EN-certified equipment to operate on the basis of proprietary frequency, enabling them to work with the control panel much more seamlessly.” In other words, professionally installed devices operating on a wireless protocol, even an open-source protocol like Z-Wave, might deliver better, consistent, longer-range connectivity, and fewer headaches. Not everyone is a DIY customer There are customers who want someone to install the devices correctly and help them learn how to use and maintain themThere’s no doubt that there’s a segment of the security and home automation market that loves to spend their free time doing their own home improvement. They are watching videos, reading how-to books and manuals, and enjoying every minute. There’s also a segment of the market whose top goal is to save money up front. For these customers, there’s no getting around the joy of saving money with the lower cost of many DIY products. But there are also a great number of prospective customers out there for whom DIY is of absolutely no interest. These consumers do not want to be their own IT department. They want expert help: they want someone to install the devices correctly and help them learn how to use and maintain them. The IHS Markit study points out what many home automation dealers already know: that the elder and aging-in-place markets are an ideal destination for the security and convenience of home automation products. The study says, “Many senior citizens are not tech savvy enough to install a DIY system by themselves, so they tend to rely on professionally installed systems that are usually maintained by a family member.” Along with the senior citizens market, there are many other market segments out there that still desire worry-free professional installation. Installers should offer a range of products that includes some DIY products, and some leave-it-to-a-pro products Producing complete and custom solutions Perhaps the best way for dealers and installers to stave off that feeling of doom that they might have about DIY is to tackle the problem head on and be creative. Offer a range of products that includes some DIY products, and some leave-it-to-a-pro products – consider the DIY product a great entry point for a more comprehensive system. Play up the peace of mind that comes with professional installations and support that pitch with flexible monitoring contracts and service plans. Share what you do and why; relay your passion for producing complete and custom solutions and communicate how you add value to any and every sale. No one, not even the most tech-savvy consumer, wants to install their own products if the end result is that the product doesn’t work the way it should. That’s where the pros can, should and will always come into play.
Across the country, law enforcement officers are finding it increasingly difficult to respond to the near overwhelming number of calls coming from security alarms. Police departments commonly define a false alarm as a call, which upon investigation, shows no evidence of criminal activity, such as broken windows, forced doors, items missing, or people injured. While false alarms bog down police, they can also negatively impact customers and integrators. End users can expect hefty fines for false alarm responses, and when these customers receive large bills from the city, many turn to installers, dealers, and even manufacturers expecting them to accept the responsibility and pay the bill. What first brought the issue of alarm verification to your attention? It is crucial to both see a situation and concurrently listen to any corresponding sounds to gain full insight I’ve been aware of the problem of false alarms for about 5 years. I believed audio capture, through microphone deployment, could be an active part of the solution when used as a second source for indicating ‘out of the norm’ activity and as an equal component with the video surveillance technology. In 2015, I found similarly minded security professionals when introduced to the Partnership for Priority Verified Alarm Response. After reading PPVAR’s paper on ‘Audio Verified Alarms Best Practices; [April 2015],’ I knew that the Partnership was on to something important. In our lives, two of the five senses we count on day-in and day-out are sight and sound. It is crucial to both see a situation and concurrently listen to any corresponding sounds to gain full insight. What is the false alarm rate? In 2016, the International Association of Chiefs of Police reported that over 98 percent of all alarm calls in the United States were false. This number is obviously staggering, and something we need to work towards correcting. Why did this issue resonate so strongly with you? When I first investigated this issue, I was sure that the security industry would have already recognised this and was acting to ensure improved alarm verification, preferably through a combination of audio and video technologies. However, I quickly saw that this was not the case, or even close to the norm. I have questioned the rationale behind the lack of adoption and found the deployment of audio is often hindered by the concern of privacy. I’ve spearheaded many initiatives to explain the monitoring policies surrounding audio As CEO of Louroe Electronics, I’ve spearheaded many initiatives to explain the monitoring policies surrounding audio. I’ve had to reassure many security personnel and customers how the law supports the use of audio in public places as long as there is no expectation of privacy. By dispelling fears with facts around deploying and implementing audio sensors, customers can confidently include audio in their surveillance systems and gain a more effective security solution. Who is affected by this? Truth be told, everyone from the end user to the manufacturer is affected by this issue. Not to mention the strain this puts on law enforcement who are tired of ‘wasting time’ and effort out in the field on these nuisance alerts. When an end user receives a bill for their false alarm, many of them will immediately blame the integrator and or the monitoring center for a faulty set up and management and expect the integrator to remedy the situation, including carry the burden of paying the fines. The integrator, on the other hand, will turn to the manufacturer, assuming faulty equipment and installation instructions; therefore, looking for reimbursement for the cost. What is the average false alarm fee? It depends on many factors, and especially your first responder assigned location for responseIt depends on many factors, and especially your first responder assigned location for response. According to the Urban Institute, fees generally range from $25-$100 for the first offense, rising as high as a few thousand dollars per false alarm if a location has a large number in a single year. What’s worse, in extreme cases, alarm systems may even be blacklisted by the police dispatch center if they have raised too many false alarms in the past. Why do you believe audio is the ideal technology for secondary source verification? Video surveillance has been the main option for security monitoring and alarm validation for decades, however industry professionals are realising that video alone is not enough. Video only tells half of the story, by adding audio capture, the responsible party gains a turnkey solution with the ability to gather additional evidence to verify alerts and expand overall awareness. In reality, audio’s range is greater than the field of view for a camera. Sound pickup is 360 degrees, capturing voices, gunshots, breaking glass, sirens, or other important details that a fixed camera many not see. How would a secondary source verification system work with audio? Using a video monitoring solution equipped with audio, the microphone will pick up the sounds at the time a visual alert or alarm is triggered. If embedded with classification analytics, the microphone will send alerts for specific detected sounds. The captured audio, and any notifications are immediately sent to the monitoring station, where trained personnel can listen to the sound clip, along with live audio and video from their station. When law enforcement receives a validated alarm, they can better prioritise the response From here, an informed decision can then be made about the validity of the alarm, along with what the current threat is at the location. If the alarm is in fact valid, the information is then passed along to the law enforcement within minutes. When law enforcement receives a validated alarm, they can better prioritise the response. It also provides more information in a forensic evaluation. Are there any additional resources you would suggest looking into? Yes, we would suggest looking into the following to see a few different perspectives on the matter: NSA Support For 2018 Model Ordinance For Alarm Management and False Alarm Reduction Partnership for Priority Verified Alarm Response Support for the Term “Verified Alarm” and Prioritising Verified Alarm Responses Urban Institute Opportunities for Police Cost Savings without Sacrificing Service Quality: Reducing False Alarms
The extensive analysis and discussion preceding any decision to implement a new physical security solution – whether it’s hardware, software or a combination of both – often focuses on technology, ROI and effectiveness. When it comes to deciding what type of security entrances to install at your facility, you will almost certainly also consider the aesthetics of the product, along with throughput and, if you’re smart, you’ll also look into service concerns. Each of these factors has its important place within the evaluation process, and none should be overlooked as they all have a significant effect on how well your entrances will perform once they are installed. Culture influences door solution decisions How significant will the change from current entrances to security entrances be for employees? Still, one additional factor actually trumps everything: if you have not considered your organisation’s culture in choosing a security entrance, you may be missing the most important piece of the puzzle. Culture is a part of every other decision factor when selecting an entry solution. Before you make a decision about what type of entrance to deploy, you need to consider and understand the values, environment and personality of your organisation and personnel. For example, how significant will the change from current entrances to security entrances be for employees? If people are accustomed to simply walking through a standard swinging door with no access control, this will be a culture change. Beyond this, whether you are considering a type of turnstile, a security revolving door or possibly a mantrap portal, simply walking through it will be a significant change as well. Training employees on door security You’ll want to know whether employees have ever used security entrances before. If these types of entrances are in place in another part of the facility, or in a facility they’ve worked in at an earlier time, the adjustment will not be as great as if they’ve never used them at all. Consider, too, how your personnel typically react to changes like this in the organisation or at your facility. They may be quite adaptable, in which case there will be less work to do in advance to prepare them. However, the opposite may also be true, which will require you to take meaningful steps in order to achieve buy-in and train employees to properly use the new entrances. With the increased importance of workplace security, discussing new entrances with workforces will help maintain a safer environment Communicate through the decision-making process All of this will need to be communicated to your staff, of course. There are a number of ways to disseminate information without it appearing to come down as a dictate. Your personnel are a community, so news about changes should be shared rather than simply decreed. As part of this process, you’ll need to give some thought to the level of involvement you want for your staff in the decision-making process. Finally, do not overlook the special needs among your personnel population. You undoubtedly have older individuals on staff, as well as disabled persons and others who bring service animals to the office. Entrances need to be accessible to all, and you never want to be in the position of having a gap in accessibility pointed out to you by the individual who has been adversely affected. New security entrance installation By communicating early and often with your personnel, you can alleviate a great deal of the anxiety Once you have made the decision about which security entrances to install, training your personnel on how to use the new security entrances – both before and after the installation – will help to smooth the transition. Because workplace security is such a big issue right now, it makes sense to discuss the new entrances in the context of helping to maintain a safer environment. They will prevent violent individuals from entering, decrease theft, and most of all, promote greater peace of mind during the workday. If you can help them take control of their own safety in a responsible way, you have achieved much more than just a compliant workforce. By communicating early and often with your personnel, you can alleviate a great deal of the anxiety and concern that surrounds a significant change in the work environment. Schedule group meetings Consider your employees; what type of communications do they respond best to? A few suggestions to educate staff on the benefits of the new entrances include: Typically, you would communicate a general message 2-3 months in advance and then provide more specific information (for example, impacts to fire egress, using certain entrances during construction) in a follow up message closer to the installation date. Schedule group meetings to: announce the rationale for increased security, share statistics on crime, review the new security changes that are coming, show drawings/photos of the new doors/turnstiles, and show the orientation videos available from the manufacturer. These meetings are an excellent way to work through user questions and directly address any concerns. Once the installation of a new security system is complete, it is a good idea to have an "ambassador" on board to help employees use these new systems Ensure you monitor public areas If you are implementing a lot of new changes, such as a new access control system, new guard service and security entrances, you might consider hosting a ‘security fair’ on a given day and have the selected vendors come for a day with tabletop displays to meet employees and answer questions during their lunch. This could be a great way to break the ice in a large organisation. Make user orientation videos (provided by the manufacturer) available in several ways, for example: Intranet Site Monitors in public areas—lounges, cafeteria, hallways, etc. Send to all staff as email attachments Immediately after installation, once the doors or turnstiles are operational but before they are put into service, train ‘ambassadors’ on how to use the door/turnstile. Have these people monitor and assist employees during peak traffic times. What is the ultimate success of the installation? By communicating clearly and openly with your population you can greatly facilitate adoption and satisfaction If you have thousands of employees, consider dividing them into groups and introduce the new entrance to one group at a time (Group A on Monday, Group B on Tuesday, etc.) to allow a little extra orientation time. Place user education ‘quick steps’ posters next to the door/turnstiles for a few weeks to help employees remember the basic steps and guidelines, e.g., ‘stand in front of the turnstile, swipe badge, wait for green light, proceed.’ Ask your manufacturer to provide these or artwork. While there are always going to be people who are resistant to change, by communicating clearly and openly with your population you can greatly facilitate adoption and satisfaction. Your responsiveness to any issues and complaints that arise during and after the implementation is equally fundamental to the ultimate success of the installation.
Critical infrastructure facilities are vulnerable to many security challenges, from terrorism to natural disasters. Challenges also include vandalism, theft, employee identification and verification, access control, regulations, and the increasing infiltration of connectivity and the Internet of Things. In addition, many critical infrastructure facilities are housed in harsh and hazardous environments, which adds to the challenges to keep employees and facilities secure. The security risks facing a utility, telecom provider or other critical infrastructure facilities can have far-reaching consequences, including major disruption of core services. It’s essential to minimise the risk of any incidents that could disturb operations and lead to a loss of income or fines. Providing security to critical infrastructure often requires incorporating legacy systems, integrating siloed solutions and automating error-prone manual operations. Data capture form to appear here! Locks remain essential CLIQ locking system from ASSA ABLOY can simplify security and workflow for critical infrastructure entitiesAs a tool to address the complex security scenarios facing critical infrastructure, locks are indispensable. In critical infrastructure environments, locks are often required to be resistant to extreme temperatures, dust and toxic substances, fire and explosions. Locks must also perform in environments that are even more challenging, including rain and manipulation. Critical infrastructure facilities can benefit from a high-security locking system that combines electronic and mechanical security; in effect, providing an intelligent combination of both. CLIQ locking system from ASSA ABLOY can simplify security and workflow for critical infrastructure entities. With terrorism posing a serious threat, perimeter fencing, doors and their locks are the first line of defense against potential intruders at installations such as chemical and power plants, gas terminals, oil refineries, utilities, transport, hospitals, research facilities and other major areas which need controlled access. With terrorism posing a serious threat, perimeter fencing, doors and their locks are the first line of defense against potential intruders CyberLock smart keys CyberLock electromechanical lock cylinders and smart keys record access details of who opened, or attempted to open, every lock, providing critical information when investigating a security breach. In addition, CyberLock enables users to instantly add or delete electronic keys. This eliminates exposure due to lost or stolen keys, and also allows users to assign customised access privileges based on time, date, and authority level. CyberLock cylinders are designed to operate in a variety of applications where high security is required, such as entry gates, chemical feed areas, watersheds, and other water sources. The system’s electronic keys cannot be duplicated or copied, and can be deactivated if lost or stolen, thus reducing the risk of unauthorised entry. Key management solutions Traka has been a source of key management solutions, providing asset protection and process controlThe flexibility and protection of key management is another area of improvement that critical infrastructure companies are benefitting from. With multiple facilities sited at different locations, staff can quickly be granted authorisation to access keys with the press of a button, allowing supervisors to adjust their security based on the needs of the business. Because of the customisation ability, the use of key management systems is continuing to grow throughout the utility sectors as assets increase and varying levels of access management can be set through the system. Traka has been a source of key management solutions, providing asset protection and process control for the industry with smart cabinets and lockers integrated alongside efficient software.
All schools and universities need to address three different levels of security when considering access control. The first level is the least vulnerable of the three and concerns the perimeter entry and exit points. Here, incorporating some level of electronic access control should be a consideration, whether that is a combination of electronic and mechanical door hardware, or a complete electronic solution. An electromechanical solution, such as electric strikes, can be beneficial in the effectiveness of perimeter security as they provide greater visitor management and traffic control. Data capture form to appear here! Facilitating visitor entry Electric strikes are able to control access via keypads, cards and proximity readers Electric strikes are able to control access via keypads, cards and proximity readers. When combined with mechanical locks, they provide the benefits of unrestricted egress. The second level is more vulnerable than the first and relates to the point at which people are screened before entering the interior of the school. As this area will be designed primarily to facilitate visitor entry, it will require adequate monitoring of access control. To do this, the latches used on access-controlled egress doors can be electronically controlled from the reception area or school office. Exit or entry doors can be opened by a push from the inside and, if the entry area is also an emergency exit, electronically-powered panic bars can also provide an effective solution. More and more schools are installing visitor management systems to control who can and cannot get into the building. Access control solutions Finally, the third level – and the most vulnerable – refers to the core of the school that both students and staff occupy. These are internal hallways, corridors, stairwells, entry points and restricted areas (such as staff lounges and science laboratories). These are the areas where a school must foster the safest environments for pupils, while also providing protection as they often contain confidential information, expensive equipment or chemicals. The access control system is linked to all doors within the school building A number of different access control solutions are beneficial, whether electronic, mechanical or a combination of the two. For electronic solutions, there are two options available: remote or centralised systems. With remote lockdown systems, individual locks are activated by remote control within proximity to the door. With integrated centralised systems, the access control system is linked to all doors within the school building and locked at the touch of a button. Prevent unauthorised persons Mechanical solutions, which include a cylinder lock and key, are also suitable for places such as classrooms, as doors can be locked externally with a key or internally with a thumbturn, to prevent unauthorised persons from entering. At one university in the United States, a smart RFID wire-free access control solution has been installed At one university in the United States, a smart RFID wire-free access control solution has been installed. The SALTO Virtual Network (SVN) wire-free system pushes and pulls data from the university’s ‘hot spot’ entry points to all their offline locks. By choosing a wire-free solution, the university only had to run wires to their exterior doors. The interior doors do not require wiring as these locks are stand-alone wire-free locks. Student accommodation block Securing access to student accommodates is another concern among colleges. One university in the United Kingdom wanted a security system to protect their student accommodation; in particular, a keyless system that would grant 24/7 access to its students while also enabling campus security to monitor these activities remotely. They chose Vanderbilt’s ACT365, which keeps audit trails by monitoring and recording fob activity. When another English university sought electronic locks for its newest student accommodation block, it turned to Aperio wireless locking technology from ASSA ABLOY. They used the wireless locks to extend the Gallagher Command Centre access control system to a student residence with 231 en suite rooms separated into flats for between 8 and 13 postgraduates. Aperio wireless locks are battery-powered and use less energy than wired magnetic security locks.
The excitement of ISC West 2019 continued until the very end – almost. Exhilarated by the first two busy days of the show, attendees and exhibitors seemed to welcome a slower third day. There were no complaints about booth traffic, and still plenty of thoughtful conversations taking place, everyone determined to maximise the value of face time with customers until the last second. Building an IoT ecosystem in SAST At a show lacking in high-profile new technology announcements, the biggest news is perhaps the possible long-term impact of first-time exhibitor Security and Safety Things (SAST), a Bosch startup. SAST is building a new Internet of Things (IoT) ecosystem for the security and safety industry, including an app store, an open and secure camera operating system, a software developer environment, and a portal for integrators. SOCs (system-on-chips inside cameras) are becoming much more capable" Their 1,800-square-foot booth was big for a first-time exhibitor, and the American football theme was well received, as was the substance of the company’s effort to drive innovation in a highly fragmented industry. Seeing actual cameras and apps on display at the ISC West booth is “more real than PowerPoint,” says Hartmut Schaper, CEO of Security and Safety Things (SAST). “For us, seeing is believing,” says Schaper. “It was important for us to show cameras and apps for the first time. People are surprised at how far down the road we are.” “This dynamic will change in the industry,” says Schaper. “SOCs (system-on-chips inside cameras) are becoming much more capable. Soon there will be more processing power on the edge. People will find a way to use the extra processing power.” “Seeing is believing” at the SAST booth at ISC West 2019, where CEO Hartmut Schaper showed several manufacturers’ cameras whose functionality can be expanded using Android apps Developing more apps Several large manufacturers are already involved in the initiative, but there are some holdouts. “We are having ongoing talks with everyone to convince them to join,” Schaper says. “Some of the bigger ones will come around. We are not a camera manufacturer, and not a threat. We are owned by Bosch but are managed completely separately. There will be more and more apps developed, and momentum will increase.” “A year from now we will have successful customers we can talk about, and more camera manufacturers on board,” he says. “This year we are taxiing on the runway, but next year we will have cleared the tarmac and be climbing.” If the approach succeeds, their first appearance at ISC West will be remembered as historic. Future of surveillance cameras Off the show floor, in a nearby meeting room, chip maker Ambarella demonstrated technologies that will be driving the future of video surveillance cameras, including more intelligence at the edge. “People have been using more traditional video analytics approaches, though most of them have been disappointing,” says Chris Day, Ambarella VP of Marketing and Business Development. “What is ground-breaking now is the use of neural networks and real artificial intelligence, which has increased capabilities 100x. "You will see camera products coming out over the next year that are massively better than before. It’s not just incrementally getting better. Cameras will be coming out later this year with analytics that are absolutely amazing based on [the new chips.]” Larry Anderson, editor-in-chief of SecurityInformed.com, talks about Ambarella HDR and Low Light Solutions with Jerome Gigot, Senior Director of Marketing for Ambarella. (Source: Ambarella) New systems-on-chips Ambarella has introduced four new systems-on-chips (SoCs) in the last year, with emphasis on computer vision (video analytics). The newest is the S6LM Camera SoC with 4K imaging technology, unveiled at ISC West. The S6LM includes Ambarella's latest high dynamic range (HDR) and low-light processing technology, highly efficient 4K H.264 and H.265 encoding, multi-streaming, on-chip 360-degree de-warping, cyber-security features, and a quad-core CPU. People shouldn’t forget what a good camera is, and there doesn’t have to be a tradeoff" “With so much focus on AI and computer vision, I’m concerned the industry has taken focus away from low light imaging, wide dynamic range and image quality,” says Day. “You have to see the details in an image. People shouldn’t forget what a good camera is, and there doesn’t have to be a tradeoff, it’s all included in one chip.” From products to systems With a new general manager on board (Daniel Gundlach, formerly of Bosch), FLIR Systems Security Division is continuing its transition from a product company to a solutions provider, removing internal silos to clear the path. FLIR offers a strong end-to-end portfolio for Smart Cities applications, including the TruWITNESS line of body worn cameras and newly acquired Aeryon drones. FLIR’s historical strength as the top thermal imaging provider continues, but today they are much more than a thermal imaging company, offering visible day/night cameras, infrared pan-tilt-zoom cameras, video management systems and other technologies to provide a broader platform. FLIR's Saros security cameras combine multiple security technologies, including thermal sensors, high-resolution visible imaging, IR and visible LED illuminators, onboard analytics and two-way audio and digital input/outputs. Products in critical infrastructure applications In addition to Safe Cities, FLIR installs a range of products in critical infrastructure applications, such as oil and gas and electric utilities. Ports also tend to combine traditional security with an emphasis on perimeter protection, a FLIR strength. Existing perimeter protection applications can open opportunities for the broader platform. For example, installing a complete system in an airport that already uses FLIR’s thermal technology represents “low-hanging fruit” for the company, says Fredrik Wallberg, FLIR Director of Marketing – Security and Intelligent Transportation Systems. Ambarella demonstrates its latest imaging technology for video security during ISC West 2019 (Source: Ambarella) Integrated solutions Bosch's focus At the Bosch booth, there was an emphasis on integrated solutions and the customer experience. A mock retail store setup demonstrated systems such as overhead cameras for people counting and alarm communication to provide an alert if a refrigerator door is left ajar. A wireless panic button generates a silent alarm, communicates with a 2-way radio, and triggers a camera to focus on the area. An AVIOTEK IP camera alarms if there is a fire, based on observing actual flames rather than smoke. A new Bosch fixed dome camera series offers wireless remote commissioning capabilities that reduce installation and set-up time by up to 75 percent. Set-up only takes three steps: install the mounting bracket, connect the cables, and attach the camera module. Commissioning can be done wirelessly or remotely with no need for ladders or lifts. Dahua marks five years in the U.S. An IR illuminator is attached to each lens module to ensure there is always illumination in the field of view Time flies in the security industry, and it has already been five years since the Dahua brand entered the U.S. market. Today the company offers products through ADI and some 20 distributors, and has more than 30 technical consultants and technical support employees and 50 or 60 sales people in the field (including independent rep firms). “We are growing,” says Tim Shen, Director of Marketing at Dahua Technology USA. “It’s exciting for the company.” At ISC West, Dahua introduced a line of Multi-Flex panoramic cameras with lens modules that can be repositioned along an internal track for 180-, 270- or 360-degree views, providing flexibility for integrators. An IR illuminator is attached to each lens module to ensure there is always illumination in the field of view. Cost savings come from ease of installation (one camera instead of four) and only one VMS license (instead of four). AI and night colour cameras Dahua is also emphasising its Night Colour cameras that remain in full colour mode regardless of how dark it gets. There is no IR illumination or IR cut filter – the camera stays in color mode and displays any visible image in colour with as little as 1 lux of illumination. The 2 megapixel version is on display at ISC West, and a 4 megapixel version will come in the fall. A year ago at ISC West, Dahua emphasised its initiatives in artificial intelligence (AI) in order to position the company as a technology leader. This year, the message was more general – ‘Power Through Technology.’ The range of Dahua technologies includes AI, Night Colour, Starlight low-light imaging, fifth-generation HDCVI, and e-POE (Enhanced Power over Ethernet). Dahua USA's Director of Marketing says "the market itself likes AI", and expects more AI applications to follow (Source: Dahua USA's LinkedIn) “When we present AI to customers, they are happy, but when it comes to the budget they don’t have it,” says Shen. “The market itself likes AI, and it’s very much a buzzword. But we still need a proof of concept that it can do something good for end users. We need time to develop broader applications. The ‘smart retail’ market and education are good places to start.” he says. “AI is for project business,” adds Jennifer Hackenburg, Dahua’s Senior Product Marketing Manager. “Projects that are looking at AI haven’t come to fruition yet; they are still in the pipeline. It’s not for your everyday business. They are implementing it, but not as fast.” Access control beyond doors Access control should extend beyond doors. That’s the message I heard at the ASSA ABLOY booth, which displayed a variety of physical locks and intelligent access systems. An example is traffic cabinets, those metal boxes in public locations that could potentially be accessed to invade an internal network. ASSA ABLOY emphasises the need to secure the variety of enclosures, cabinets, drawers and small spaces ASSA ABLOY emphasises the need to secure the variety of enclosures, cabinets, drawers and small spaces throughout an enterprise. The company’s ‘security continuum’ message draws attention to the need for the right level of security for the right opening, using existing infrastructure as well as new electronic technologies. “Customers face a combination of non-traditional access control and questions on how they can secure things that are not doors,” says David Corbin, ASSA ABLOY Director of Access Control Accessories. The security message is resonating beyond the traditional security department to involve other stakeholders in an enterprise, including IT directors. There is new awareness of vulnerabilities that have been there forever, such as traffic cabinets that can be opened with a key purchased on eBay.
Allegion, globally renowned provider of security products and solutions, has announced that the Schlage AD electronic locks, NDE networked wireless locks, LE networked wireless locks and MT multi-technology readers now support contactless student IDs in Apple Wallet. Allegion - CBORD collaboration Allegion worked with CBORD and Apple to enable a mobile credential leveraging the industry global standard NXP DESFire EV1 security technology to provide higher education campuses with an easy-to-implement solution for the enablement of contactless student IDs for iPhone and Apple Watch. The University of Tennessee, University of Vermont and University of San Francisco are among the first schools to leverage the solution. “A recent study from The Center for Generational Kinetics found that 95 percent of Gen Z owns a smartphone and being connected is their norm. Because of this, universities are tasked with meeting student preferences while also ensuring campus security,” said Jeff Koziol, Allegion business development manager, campus software partner. “Allegion is proud to expand its product features to provide higher education campuses seamless yet flexible security solutions, and an improved mobile access experience for students and faculty members alike.” Contactless student IDs Having contactless student IDs in Apple Wallet makes it easier and more convenient for students and faculty to access buildings like residence halls or the library, as well as make payments on and around campus for coffee, laundry and other purchases with iPhone and Apple Watch. Universities can remotely issue credentials over-the-air, and those credentials are protected by two-factor authentication and can be remotely deactivated by the student or university. MIFARE DESFire EV1 technology, supported by Allegion in this program, is the widely accepted open global standard "As an institution that values innovation, it's important to us that we are always adapting to the way students use technology to enhance the campus experience," said Chris Cimino, senior vice chancellor for finance and administration. "Being able to access your VolCard on your iPhone is one of the many ways UT is continuously improving to meet expectations for a modern campus.” MIFARE DESFire EV1 technology MIFARE DESFire EV1 technology, supported by Allegion in this program, is the widely accepted open global standard and one of the top solutions in contactless credentials. By leveraging Allegion and CBORD’s solution with DESFire, higher education campuses are now able to take advantage of an open architecture and work with various manufacturers without being locked into a siloed proprietary solution. This new capability is compatible with the following Schlage commercial solutions: AD electronic locks - Schlage AD-400 wireless locks were designed to reduce installation costs on interior access-controlled doors, such as student rooms, faculty offices, classrooms and lab spaces, while offering the adaptability to support future evolutions in technology. The AD-400 and AD-300 wired locks are available in cylindrical, mortise, mortise deadbolt and exit trim chassis options, and they integrate into popular physical electronic access control systems (PACS). NDE networked wireless cylindrical locks - NDE wireless locks integrate into popular electronic access control systems from PACS providers to bring the benefits of electronic access control deeper into university buildings. NDE packages the cylindrical lock, credential reader and access control sensors together in to a small footprint that is both easy to install on university campuses and affordable. LE networked wireless mortise locks - The LE design packages the mortise lock, credential reader and access control sensors together into a small footprint that is both elegant and affordable. They feature two sleek trim options with broad range of decorative lever choices to match the style of any residence hall. MT Multi-Technology readers - Schlage MT multi-technology readers are designed to simplify university access control solutions and allow a transition from proximity or magnetic stripe (on a physical student ID) to more secure, encrypted smart card technology or mobile credentials in the Apple Wallet. Schlage’s AD Series Locks This extended offering is the next wave in Allegion’s pursuit to work with other providers in the industry for digital credential rollout in universities. Recently, the company announced its collaboration with Transact to enable contactless student IDs in Apple Wallet through Schlage’s AD Series Locks at Mercer University.
People and vehicle access control specialist, Nortech offers a number of products within the Nedap product range that use vehicle tagging to identify individual vehicles while they are moving through a monitoring point. uPASS Reach reader The uPASS Reach reader offers long-range vehicle identification for up to 5 metres using the latest UHF technology. With consistent reading up to 5 metres and adjustable onsite reading as just two of the benefits of the system, the uPASS Reach reader has an elegant slim design, LED and audible read indication and is encased in weatherproof housing. It also operates with passive UHF tags, self-adhesive windscreen tags and hand-held tags with dual-technology options. Long-range passive UHF tags The reader output allows the access control system to open the gate/barrier when an authorised vehicle arrives When the uPASS Reach reader is installed (maximum height two metres) next to an automatic gate or barrier, long-range passive UHF tags are identified at a distance of up to 5 metres as soon as they are visible in direct line of sight of the reader. The reader output allows the access control system to open the gate/barrier when an authorised vehicle arrives without the need for the driver to present a card or badge, and the built-in high intensity LED provides the user visual feedback that the tag has been read. UHF tags are also both battery and maintenance-free. UHF Windshield Tag To work alongside the uPASS Reach, Nedap has designed four different UHF tags to suit all environments. The UHF Windshield Tag is a passive UHF transponder and offers long range identification up to 5 metres when installed inside non metallised windscreens. This provides cost-effective long range vehicle identification for access control applications and is available as a standard peel off version or as a tamperproof version for additional security. Passive UHF Exterior Tag Where vehicle windscreens are fully metallised, Nedap offers a passive UHF Exterior Tag which can be easily fitted onto non-metallic / plastic parts of the vehicle such as the headlights. For added security, the UHF Exterior Tag is a tamper resistant, transparent, adhesive tag. It will show visual proof of removal and is extremely difficult to remove, intact and functional. The chip inside is also protected against harmful UV rays. UHF Heavy Duty Tag This tag features a rugged design for long term use in outdoor and industrial environments The Nedap UHF Heavy Duty Tag is a passive UHF transponder which again offers long-range identification up to 5 metres with the uPASS Reach. However, this tag features a rugged design for long term use in outdoor and industrial environments. The UHF Heavy Duty Tag is a cost-effective solution for installations where the tag needs to be mounted onto the exterior of the vehicle and can also be cable tied or bolted onto bicycles, forklifts and many other industrial devices. Finally, the UHF ISO Combi Card is a card featured with long-range UHF tag and proximity or smartcard technology. Used for both people and vehicle access, it enables the use of one card for both vehicle and building access applications. Available with a range of formats such as Mifare, Legic and HID. Efficient vehicle identification reader The uPASS Reach reader complies with the ISO18000-6C and EPC global Gen 2 directive. This long-range vehicle identification reader is based on latest passive UHF technology. It is used in combination with battery free UHF (EPC Gen 2) tags, making this access control solution totally cost efficient. The uPASS Reach is ideal for convenient vehicle access to public car parks, private-run parking spaces and lots, gated communities and staff parking areas in corporate offices and government buildings.
Health services and their funding have long been in the news, with social care and mental health coming in for particular attention. Both of these core areas are seeing a growing need for their services. While nationally this is a problem, there is good news in East Anglia with the opening of the 16 bedroom Samphire Ward at Chatterton House, a new acute care mental health facility in King’s Lynn, Norfolk. The build comprised of a refurbishment of two redundant wards linked to create one modern compliant 16 bed facility at a cost of £4m which is operated by North and West Norfolk Care Group, part of Norfolk and Suffolk NHS Foundation Trust (NSFT). NSFT provides inpatient and community-based mental health services in both Norfolk and Suffolk. It is also commissioned to provide in some of its localities, learning disability services, along with other specialist services including medium and low secure services and wellbeing. Continuim access control system Many of these sites use a legacy building access control system called Continuim The new facility is one of many sites across Norfolk and Suffolk that fall under management of the trust. Managing over 4,000 staff and controlling over 1500 access controlled doors across multiple sites. Many of these sites use a legacy building access control system called Continuim which is a bolt on module to Trend BMS, where all doors on this system are required to be wired on-line. Several years ago the trust wanted a more modern contactless access control solution for their facilities in Norfolk and Suffolk. They specifically wanted a solution that offered cost savings by not having to wire all doors. SALTO access control was chosen for fitting to new and refurbishment projects, with a view to possibly retro-fitting the new solution across all the existing sites on a rolling upgrade basis as time and future budgets allow. SALTO access control solution Security and Infrastructure Manager for the Strategic Estates department at the trust, Paul Evans, says “By choosing SALTO the trust were able to specify a mix of online and offline equipment. The cost saving for offline equipment enables the trust to specify more internal offline doors to become controllable as part of the access control system, thus giving us greater flexibility and security for our facilities.” Evans continues “Given the nature of our work and that some of our service users can have really challenging behaviour issues, it is vital that for their safety and that of the staff, we are able to control access simply and easily yet securely into and around the many different areas of the ward, the administration area and indeed the rest of the rooms in the building.” Contactless smart access control Reduced-ligature hardware working with contactless smart access control was needed in the user areas A standard off-the-shelf access control solution was not suitable as reduced-ligature hardware working with contactless smart access control was needed in the user areas together with anti-barricade doors, vision panels, automatic lockdown abilities, locker locks and a host of other special items and so we wanted a company with specialist experience in this field to carry out the supply and installation.” After going out to a competitive open tending process, local security specialist and certificated SALTO partner AC Leigh, based in Norwich, won the contract to secure the new facility. One of their lead designers, Simon Clarkson, worked with Paul and his team to design and deliver the system. Central monitoring system Clarkson, Health and Safety Director at AC Leigh says “We listened to what Paul and his team needed and especially how they wanted to manage and control the building and delivered a completely focused solution that allows central administration of the facility using hardware and software from SALTO Systems as the core of the solution.” On-line wall readers are used to control access into and around the building and these have been installed on main entry points, alongside bedroom doors and in ‘airlocks’ to control access from one area to another. SALTO slave control units Paul Evans says, “The latest SALTO online CU4200 control units were used on this project where data can be shared to SALTO slave control units via a single master control unit. This reduced the load on the already exhausted IT infrastructure which has meant that more online doors can be added to the SALTO system.” Bedroom doors are all fail secure with mechanical key override and are also anti-barricade. The facility has the bespoke ability to operate a standard 8 male, 8 female bedroom configurations. However, the trust wanted the flexibility to extend either male or female bedrooms to 10 bedrooms. This was achieved by two swing corridor doors. Electro-magnetic locks In standard operation, these powered swing doors are held open with electro-magnetic locks In standard operation, these powered swing doors are held open with electro-magnetic locks. In their swing scenario a key switch can be operated which releases the hold open magnet and energises the SALTO system powering a separate electronic locking device on the door. This enables the trust to easily maintain the required gender separation within the bedroom areas. Paul Evans comments “AC Leigh were able to configure the required solution easily and train the staff in its operation accordingly.” Aelement Fusion smart locks Other doors are fitted with Aelement Fusion smart locks. AC Leigh worked closely with the trust to design and manufacture special reduced ligature handles and reader covers to ensure that ligature points were reduced in conjunction with DHF technical specification TS001:2013 enhanced requirements and test methods for anti-ligature hardware. “The consultation between AC Leigh and the trust took several months with multiple prototypes being presented to the trust for approval.”, Evans says, adding “After looking at all the various options, the trust is happy that the best solution for this type of battery operated offline door has been chosen and installed at Chatterton house.” He also confirms that the bespoke design would be used as their preferred solution on future projects for this type of door. XS4 Mini locks Meanwhile in staff areas XS4 Mini locks are fitted. In open common areas, lockers are equipped with smart XS4 locker locks enabling each service user to have a secure storage place for their individual personal items. To operate the various doors, staff use their smartcard ID badges to gain access while service users use wristbands to access their bedroom, locker and certain permissible doors. SALTO SPACE electronic locking Tying all this together is SALTO SPACE a flexible, fully integrated electronic locking and software platform Tying all this together is SALTO SPACE a flexible, fully integrated electronic locking and software platform that enables operators to effectively manage every door and user access plan on-site via powerful web-based access control management software. Audit trail information from the doors is held for 31 days before deletion in accordance with the trust data policy. Simon Clarkson concludes “The client needed precise tailoring of access levels and the SALTO access control solution has empowered them with an intuitive, easy to use but adaptive system. The use of this standalone largely battery operated access control system will provide significant cost savings over the years to come compared with other systems, and will deliver a reduction in engineer call-outs and simplify system administration making for a long term secure and reliable access control solution for the trust.”
Modern office design needs an advanced access control system that is powerful, flexible and aesthetically in tune with workspace users and their needs. At Plexal, a new £15 million flexible work environment located in the heart of Olympic East London, where the city’s ‘innovation community’ meet to brainstorm and explore new ideas, Aperio achieves all the three virtues wirelessly. At Plexal enterprise and academia work together, with technology companies, start-ups, universities and creatives under one roof. Up to 800 entrepreneurs use the workspace to devise, create and launch products and services. Innovative access control solution Easy, non-disruptive installation of new locking devices was another goal: Plexal preferred a wireless solution Plexal required a tried-and-tested access control solution they could rely on for high-end security to protect this new co-working office against unauthorised intrusion and burglary. Easy, non-disruptive installation of new locking devices was another goal: Plexal preferred a wireless solution. Any chosen solution would need the flexibility to expand access control as Plexal’s site scales over time. Device aesthetics must complement a contemporary, light-filled interior design with lots of glass. Powerful, flexible, wireless connectivity Plexal offices are now fitted with Aperio wireless, access card-based locking technology. Plexal’s battery-powered Aperio locks are integrated with DoorFlow, NetNodes’ online platform for managing and auditing building access. So far, 59 Aperio L100 wireless high-security door locks have been installed and integrated online with DoorFlow. These Aperio locks provide Plexal with a high level of physical protection and transmit door status to DoorFlow in real time. Adaptable locking solution Plexal required an adaptable locking solution for a range of different doors and, with no wiring required" “Plexal required an adaptable locking solution for a range of different doors and, with no wiring required, it was quick and easy to install Aperio with minimal disruption,” says Stewart Johnson, Director at NetNodes. Because Aperio locks are battery- rather than mains-powered, the new wireless solution also keeps Plexal’s maintenance costs and energy consumption low. Aperio wireless locks use no power when idle, only “waking up” to read credentials or maintain a system heartbeat. Annual running cost savings over traditional wired doors are significant. Modern locking device design Aperio aesthetics were a good fit for Plexal’s modern workspace. “We have a futuristic-style, open-plan design here at Plexal — our offices are predominantly glass-fronted, so we needed an effective design which was not only robust but adaptable, too,” says John Herbert, Facilities Manager at Plexal. “What really appealed to me about ASSA ABLOY access control’s products was the aesthetic.” Aperio technology integration And because Aperio technology is built on an open platform for integration with almost any security or building management system, Plexal’s access control solution is fully future-proofed. They have the option to expand to new offices, floors or even buildings easily. Aperio can upgrade mechanically locked doors and wirelessly connect them — online or offline — to new or existing access control systems. This is achieved with minimal modification to doors and premises, offering a simple, cost-effective security upgrade. Aperio can upgrade mechanically locked doors and wirelessly connect them to new or existing access control systems Wireless access control “Should any additional doors need to be added to the system in the future, this can be done easily, without modifying or changing the aesthetics of the environment,” confirms Stewart Johnson. “This also minimises future installation costs, offering a cost-effective and straightforward access control upgrade.” “We foresee change in the not-too-distant future and are delighted at our options to modify,” adds John Herbert. Secure physical and digital access ASSA ABLOY's innovations enable safe, secure and convenient access to physical and digital places, offering efficient door opening solutions, electronic locking devices, trusted identity solutions and entrance automation technologies.
As the largest and busiest commercial port in New Zealand, Port of Tauranga spans 190 hectares and handles in excess of 1500 ships and 840,000 TEU (Twenty-foot Equivalent Units) each year. The port is a bustling import and export gateway which relies on efficient processes and procedures to maintain superior operational activity. Being a large site, with unrivalled sea, road, and rail connections, Port of Tauranga has a strong focus on employing security and safety solutions which enhance and support workflow across the site. In 2004, Port of Tauranga faced new security challenges with the introduction of the International Ship and Port Facility Security Code (ISPS Code). Key security element The new code was developed following the attacks of September 11, 2001 on the United States, and prescribed new measures required by governments, ships, and ports, in order to continue shipping trade with North America. Gallagher’s access control system was installed at 12 road access gates Compliance with the ISPS code was enforced by Maritime New Zealand, giving ports throughout the country until the end of 2004 to become compliant with the new regulations. A key security element for Port of Tauranga to become ISPS compliant was restricting and controlling access on and off the port. Gallagher’s integrated access control solution was selected as the system to deliver this for Port of Tauranga. To manage the variety of entry and exit points, Gallagher’s access control system was installed at 12 road access gates, 4 rail access gates, and over 60 doors across the site. Access Control Solution Providing more than just standard card/reader access control, Gallagher’s Challenge feature gives the port an additional tier of security by utilising video integration. The Challenge solution enables operators the ability to check cardholder identities against a live image being taken at the access point. This feature reduced the number of staffed gates required, resulting in significant ongoing labour savings for Port of Tauranga. With a large number of people coming and going from the port on a daily basis, Port of Tauranga needed a robust system capable of effortlessly managing a large database. While the port has only 170 employees, there are currently 9,000 active cardholders. “A constant flow of trucks throughout the day is essential,” said Mike Letica, Manager of Security at the Port of Tauranga. “Trucks delivering containers cannot be backed up waiting.” The Gallagher access control solution, coupled with Gallagher’s Command Centre software platform, enables Port of Tauranga to restrict entry amongst the 9,000 cardholders to the specific areas they are authorised to work in, through the use of access groups and access zones. Plant washing facility The system provides the functionality for bulk changes to be easily applied to groups, ensuring the port staff’s database administration time is kept to a minimum. More than just controlling access on and off the site, Port of Tauranga needed an auditable trail of exactly who had accessed the site. Another key feature of Gallagher Command Centre being utilised by Port of Tauranga The Gallagher Command Centre platform provided the functionality for tailored reports on who had accessed zones and facilities, and at what time. “Some services available at the port, for example the plant washing facility and diesel pump, are billed back to the user” said Letica. “We needed a simple way of identifying users and this was achieved by having access control cards activate the facilities”. Another key feature of Gallagher Command Centre being utilised by Port of Tauranga is the scheduling function. Port security team Being able to adjust the access control schedule for the road and rail gates in support of peak operating times and statutory holidays provides greater control for the port security team, along with the ability to set schedules in advance. In 10 years, the operational activity at Port of Tauranga almost doubled. From approximately 32,000 trucks per month in 2004, to over 61,000 trucks and 24,000 cars per month in 2014, the volume and tonnage growth has been extensive. Despite both activity growth and site expansion, the Gallagher system has enabled Port of Tauranga to maintain the same number of security staff they had in 2004. Letica has confidence in the Gallagher solution supporting the port’s future expansion, “We believe we have a security system that has not only met our growth needs to date, but is going to continue to meet our needs in the future.”
Wintec (The Waikato Institute of Technology), established in 1924 is a major New Zealand Government-funded tertiary institution, which has three Hamilton campuses; a city site overlooking the central business district, Avalon campus on the northern outskirts of the city, and a horticultural campus at Hamilton Gardens. In addition, it has regional operations at Te Kuiti and Thames and also an office in Beijing. The Avalon campus, a ten-minute drive from the city, is home to specialist trades training facilities, a state-of the-art sport and exercise complex and custom designed facilities for the School of International Tourism, Hospitality and Events. The third Hamilton campus, the Horticultural Education Centre, is situated amidst the 58 hectares of Hamilton Gardens. On-line distance education Wintec’s programmes and qualifications are nationally and internationally recognised Wintec is one of the largest institutes of technology in New Zealand, and has more than 35,000 full-time and part-time students, more than 500 full and part time staff and eleven schools within its academic faculty. International enrolments exceed 1000 from 47 countries. A range of student services provide its domestic and international students with a high level of support so they enjoy a positive, safe and secure study experience. Wintec’s programmes and qualifications are nationally and internationally recognised and its degrees have equal status to those from universities. The degree programmes include Media Arts, Midwifery, Nursing, Occupational Therapy, Early Childhood Education, Business Studies, Engineering, Technology, Information Technology, and Sport and Exercise Science and a wide range of full and part time courses for those already in the workforce. Wintec is also recognised nationally in the delivery of on-line distance education for those unable to attend regular classes for reasons of geographical access or other constraints. Electronically controlled doors Wintec strives for a balance of unobtrusive yet robust control of site activity, essential for maintaining an open campus environment. Shane Goodall, Security Manager at Wintec, describes the approach to security as highly proactive and collaborative: “by focusing on preventing issues arising, we now have a minimal policing role and the crime resolution rate is high”. This environment is underpinned by Gallagher’s security system, a core access control, intruder alarms and integration platform. Wintec first installed the Gallagher system (formerly Cardax FT) in 1999 and has since migrated this legacy system to Gallagher’s latest security technology platform. Security for the entire organisation, including satellite sites, is managed and monitored centrally from Wintec’s single Gallagher security system. Since initial installation, Wintec’s Gallagher access control system has grown from 7 to 240 electronically controlled doors in 2009, with another 40 planned - testimony to the scalability and flexibility of the system. Network friendly system communications The organisation first installed 6 cameras in 2004 which has increased to 7 DVRs and 85 cameras Wintec has integrated its imaging system to the Gallagher system delivering a visual record which can be matched to the audit trail of events in Gallagher Command Centre software. The organisation first installed 6 cameras in 2004 which has increased to 7 DVRs and 85 cameras (both analogue and IP). Another compelling aspect of the system for Wintec is the scalability and TCP/IP network friendly system communications. As well as monitoring and controlling staff and student access, equipment including computers, TVs, printers, audio visual resources at Wintec are also monitored through the Gallagher system. The ‘Gallagher Hub’, a new computer laboratory offering comprehensive IT resources is open 24 hours. The Hub contains 125 workstations, and there are plans to extend that number. Active monitoring of equipment though the Gallagher system has significantly reduced theft. Students and staff have scheduled access to shared IT resources, classrooms and lecture theatres. Manage cardholder data ‘Cardholder Import’, an XML Interface, supports the importation of cardholder data including course enrolments from their student record system to Gallagher Command Centre. Shane comments, “Student card issuing is an automated process which is enrolment-driven – a student’s access privileges are assigned according to their enrolled courses.” “To implement this, we defined a rules-based allocation of access groups in the Gallagher system using the XML interface. The interface is ‘live’ so that changes in the student enrolments database are immediately reflected in the Gallagher system. The student’s updated access privileges come into effect without delay.” Staff that interact directly with students are now empowered to manage cardholder data enabling the security team to focus on security. Students and staff utilise Mifare SmartCard functionality extensively, embracing them as an integral multiapplication tool in their modern educational environment – SmartCards are used to issue resources from the library and as pre-stored value cards enabling prepaid printing and photocopying. In the near future they will also be used in Wintec’s Pay and Display car-park and potentially as passes onto city council buses. Electronic access control At Wintec, security is not viewed as a discrete functional activity relegated to security staff only Stewart Brougham, Director of Internationalisation at Wintec, says students have given very positive feedback about their ID cards. In particular, the ability to verify the identity of staff members from their ID access cards provides peace of mind for students. The end result is a people-friendly campus. Future enhancements of Wintec’s security may include the utilisation of the CommCard solution from Gallagher to manage and monitor access to student accommodation. CommCard is a unique high level integration between the Gallagher Command Centre software and Salto off-line readers, delivering offline, non-monitored electronic access control for lower security doors. An overriding philosophy of collaboration has seen Wintec take a lateral approach to security, the value of which many organisations have yet to realise. At Wintec, security is not viewed as a discrete functional activity relegated to security staff only. The ongoing management of security is a joint effort between the security services team and the information services team. Increasing operational security The security services team manages the Gallagher system while IT looks after back end functions such as installation on the network and backup. Wintec has leveraged the convergence of security (access control) and other operational business functions recognising the tremendous potential for reducing risk and increasing operational security, safety, performance and efficiency. Looking beyond simply controlling and monitoring who goes where and when on site, Wintec is harnessing the reporting capabilities of Gallagher Command Centre to meet regulatory requirements. The Gallagher system enables the institution to report on actual space utilisation (not just space booking). Decisions are made for best use, and also to substantiate funding, based on these reports. “The key to space utilisation reporting are the frequency of reporting and the integrity and reliability of information,” states Stewart Brougham. It’s a national issue for educational institutes in New Zealand. Extending external partnerships “For Wintec, reporting is about ensuring compliance with regulatory requirements and is also a staff time management issue – reducing the administration load on lecturers, who would otherwise have to track student attendance manually.” Brian Fleming, Director of Gallagher Channel Partner, Concord Technologies, sites this lateral application of a security system as key to maximising the value of Gallagher to Wintec. Wintec has a strong relationship with Gallagher in the ongoing development of its technologies This collaborative philosophy extends to proactive external partnerships with their Gallagher Channel Partner, Concord Technologies, for the installation and maintenance of the Gallagher system, and with system designer and manufacturer, Gallagher. Having signed an agreement to continue in the capacity of a Gallagher field test site, Wintec has a strong relationship with Gallagher in the ongoing development of its technologies. Wintec’s success, in the last 5 years, as a test site reflects the competence of both its IT and security staff and the institute’s commitment to edge student services. Minimal training has been required. Software maintenance agreement There is open communication and information sharing between all internal and external parties involved, which means any issues that arise can be quickly addressed. Wintec has committed to a site maintenance plan with their security partner, Concord Technologies. The plan incorporates both software and hardware maintenance to ensure the system is maintained on the latest operating platforms within a known cost structure. A Software Maintenance Agreement also ensures enhanced ongoing system performance and reliability of the Gallagher system. Acknowledgements Gallagher would like to acknowledge the support of Wintec and security partner, Concord, with the development of this in-site study. Gallagher would also like to particularly acknowledge and thank Shane Goodall for the pivotal role he plays in championing the collaboration of these parties and for his outstanding support of the Northern Region Cardax User Group (NZ) in the capacity of Chairman of the group.
Round table discussion
Passwords are one of the most familiar elements of information systems, but also one that can be overlooked or underutilised. New alternatives are emerging, and the role of passwords is evolving in the age of the Internet of Things. We asked this week’s Expert Panel Roundtable: How is the role of passwords changing in physical security systems?
Cybersecurity has become the ultimate buzzword in the physical security market. And it also represents one of the industry’s most intractable challenges. Several years ago, the problem with cybersecurity was lack of awareness among physical security practitioners. It’s now safe to say that awareness has increased. Everyone today talks about cybersecurity, but has it helped the larger problem? We asked this week’s Expert Panel Roundtable: Is greater awareness helping to increase the cybersecurity of physical security systems?
ISC West 2019 is in the industry’s rear-view mirror, and what a show it was! The busy three days in April offered a preview of exciting technologies and industry trends for the coming year. We asked this week’s Expert Panel Roundtable: What was the big news at ISC West 2019?
Door security: Manufacturers & Suppliers
- Aiphone Door security
- Adams Rite Door security
- TESA Door security
- Magnetic Solutions Door security
- Trimec Door security
- HID Door security
- Deedlock Door security
- Eff-Eff Door security
- Techniphone Door security
- Cisa Door security
- CyberLock Door security
- Unican Door security
- CDV UK Door security
- SALTO Door security
- Clarke Instruments Door security
- BPT Door security
- Alarm Lock Systems Door security
- Honeywell Security Door security
- Lockey Door security
- Aritech Door security