Johnson Controls announces the release of CEM Systems AC2000 v10.1, which contains a number of new features that improve functionality and the user experience and help to mitigate health and safety risks. Support for a range of new third-party products that increase the performance and scope of the CEM Systems AC2000 access control system has also been added.
The Health and Safety (H&S) Induction Check application for CEM Systems emerald intelligent access terminals allows cardholders to self-certify with a card swipe on the emerald terminal once they have completed H&S induction training and before they are provided access to a site. The application automatically records induction completed date on the CEM Systems AC2000 system, helping mitigate the risk of H&S incidents and report on who has and hasn’t completed training.
CEM Systems AC2000 v10 Functionality at the edge has been improved with enhancements to the Local Access Remote application on the CEM Systems emerald terminal
Another H&S feature now available with AC2000 v10.1 is the Emergency Responder Remote application which helps improve emergency response times during incidents. This application allows system users to quickly find emergency responders (Fire Marshalls, First Aiders and/or First Responders) via CEM Systems emerald terminals.
Functionality at the edge has been improved with enhancements to the Local Access Remote application on the CEM Systems emerald terminal. This allows ‘Extra Access’ to be added, amended and removed via the app on the CEM Systems emerald terminal and provides potential cost savings for remote sites where a workstation client may not be feasible.
MorphoWave Compact biometric access reader
Support has been added for the MorphoWave Compact frictionless biometric access reader, SimonsVoss SmartIntego wireless locking solutions and STid Architect range of RFID readers. This builds on the range of biometric, wireless lock solutions and RFID reader options that available to CEM Systems AC2000 system users.
Matrix Comsec has confirmed its participation in the 27th Convergence India 2019 event, to be held in the Pragati Maidan, New Delhi from 29th - 31st January 2019. Matrix will be showcasing its complete range of Enterprise IP-PBXs, Unified Communication Server for Modern Enterprises, IP-PBX for SMB & SME, VoIP & GSM Gateways and new portfolio of IP Communication endpoints.
PARISAT VC video conferencing
Matrix is well-known for its indigenous and innovative range of solutions for Unified Communications, IP Video Surveillance, Access Control, and Time-Attendance. Each of our solutions is specifically designed for large, multi-location enterprises, SME and SMB organisations. Matrix Comsec continuously works towards keeping abreast with the constantly upgrading technology by designing and manufacturing solutions that are equipped with the latest technology. Matrix will be presenting some of its indigenously engineered Telecom solutions at the 27th Convergence 2019 Meet.
Matrix Comsec will be showcasing its recently launched video conferencing solution – PARISAT VC as the highlight of the event. This Enterprise Meeting solution sets a new benchmark by offering enhanced video and voice capabilities. PARISAT meets the communication needs of modern enterprises to brainstorm ideas and devise effective strategies. Matrix PARISAT VC empowers organisations to make quick decisions and enhance customer experience.
Matrix Network Management Matrix will be exhibiting its all-in-one solution for centralised control of every connected Matrix communication server and Gateway within a single network
Matrix will be exhibiting its all-in-one solution for centralised control of every connected Matrix communication server and Gateway within a single network.
Range of Gateways - Based on SIP (Session Initiation Protocol), Matrix range of Gateways allows easy integration with most of IP-PBX, TDM PBX, Softswitch and Hosted solutions. This award-winning series of Matrix Gateways is perfect for enterprise and carrier-class solutions.
Matrix Telecom solutions
Starting from a single port VoIP adaptor to high density VoIP-GSM-PRI-FXO/FXS Gateways, Matrix Telecom Solutions align with all requirements of Small to Large Business. Preloaded with superior voice quality and state-of-the-art routing features, Matrix Gateways are ideal for multi-site connectivity, remote survivability and SIP trunking.
“Convergence India is a major technology event bringing ICT professionals on a common platform. Matrix is all set to showcase its latest Telecom solutions at Convergence this year. We look forward to meeting key decision makers and service providers and give them a first-hand experience of our Telecom solutions that are redefining business communications and providing a competitive advantage to our customers worldwide.” said Ganesh Jivani, Managing Director, Matrix Comsec.
Maxxess will be at Intersec 2019 showcasing its latest advances in corporate risk reduction, improved people management and smarter hospitality access solutions - including new releases in its popular eFusion and Ambit solutions.
eFusion security management
The latest version of the VisitorPoint module within the eFusion security management platform will be showcased, offering a host of new streamlined functions for efficient people and visitor management. Harnessing current advances in cloud computing and mobile communications, VisitorPoint is being used at premises from hotels and campuses to corporate headquarters. It allows the whole process of visitor management to be streamlined in a way never previously possible.
For example, it lets guests’ phones be used as access credentials, making it a perfect alternative to room keys in the hospitality sector. Compatibility of the VisitorPoint system with ASSA Abloy Hospitality products has proved to be particularly popular with hotels.
VisitorPoint System VisitorPoint is also ideal for busy hotel reception teams who need to keep across who is entering the premises
VisitorPoint is also ideal for busy hotel reception teams who need to keep across who is entering the premises. With the latest version of VisitorPoint, users can easily view pre-registered visitors in advance; manage and sign-in large groups in seconds; book meeting rooms; manage visitor car parking; and automate notifications and messaging.
Now organisations can go even further in streamlining their people and diary management processes, thanks to integration with Outlook and Google calendars. A new VIP feature allows automatically tailored welcomes for specified guests and/or groups; and a QR Scan App allows visitors and VIPS to be immediately verified. In addition, a new, sleek self-service kiosk will be unveiled at the show, which is ideal for positioning in hotels and high-end corporate lobbies.
Open-technology systems integration
Meanwhile, with its versatile, open-technology software eFusion is proving a practical alternative to costly or complex conventional PSIM solutions. It offers the advantages of a modular, building block approach and gives users the freedom to integrate, customise and adapt their security systems to meet both current needs and emerging risks. Ensuring compatibility with leading surveillance, intruder, access and fire detection systems, eFusion now supports more than 60 off-the-shelf integrations and several important additions are confirmed for the show.
These latest integrations include Jaquies IP intercom hardware; the mobile phone app GuardPoint; and the Metra locker system hardware.
“For users who want control and better value from their security investments, eFusion with its expanding choice of integrations is the ideal management platform”, says Lee Copland, Managing Director, Maxxess EMEA.
Smart, open infrastructure
The eFusion platform allows legacy systems to be transformed into a smart, open infrastructure and extends the life of equipment"
“The eFusion platform allows legacy systems to be transformed into a smart, open infrastructure and extends the life of equipment. Our technology is proving particularly popular because it gives users all the advantages of advanced PSIM without the associated cost or complexity.”
eFusion can be easily scaled from one site to multiple sites globally and it can connect stand-alone systems for easy upgrades such as retro-fits with existing hardware.
Network monitoring for public safety
Also on show, Ambit allows security controllers to communicate directly with both individuals and groups and to monitor the safety of everyone on site (or on multiple sites), for example employees, residents, visitors, or contractors. Now Ambit users will benefit from direct notification of a wide range of risks thanks to a new integration with the NC4 incident alert service.
NC4 monitors risks and issues alerts in real time, covering potential threats ranging from terrorist incidents to weather events, from civil disruption to cyber-attacks. With this new integration, as N4C alerts arise they will be filtered by proximity/relevance and directly sent to Ambit users.
Lone worker monitoring
Visitors to the Maxxess stand will also learn how Ambit’s latest life-saving technology comes with a choice of applications tailored to the user’s needs. For example, it can allow lone-worker monitoring; courtesy communications and remote escorting after-hours; panic alarm features; and individualised messaging during incidents. It can help security teams co-ordinate and work more effectively with emergency responders too as well as improving the efficiency of day-to-day operations.
We are well positioned to further capitalise on major infrastructure projects across the region such as hotels and leisure"
With new customers and projects including Bluewater Island, TAJ Hotel & Residences JLT Dubai, TAJ Hotel & Palace on Palm Jumeirah, the Emirates Nuclear Energy Corporation, Emirates Flight Catering Extension, the Jewel of the Creek and Yahsat, 2019 will be an exciting year of growth for Maxxess in the Middle East.
Maxxess expands Middle East reach
“We are well positioned to further capitalise on major infrastructure projects across the region such as hotels and leisure. The demand for increased operational efficiencies across the MENA region has seen many organisations look to automate tasks and at the same time mitigate against the potential for human error. This is evident in the demand we’re seeing for streamlined visitor management, the elimination of keys and better optimised workforces across security and facilities management functions.”, said Lee Copland, Managing Director, Maxxess EMEA.
He adds, “And as real-world applications for artificial intelligence become a reality, we are continuing to collaborate with our world leading video surveillance partners to bring these advanced analytics into the eFusion platform. Meanwhile, we will continue to support our customers in complying with revised fire and safety codes and new security regulations.”
With access control for the simplest to the most complex application, ASSA ABLOY has a security solution to make any building smarter. Our wireless, battery-powered devices include Intersec’s Access Control Product of the Year, one of many created to secure buildings sustainably in the connected cities of the future.
The ASSA ABLOY stand for Intersec 2019 (Sheik Saeed Hall 1, Stand A12) showcases the following commercial access control technologies and devices.
Aperio H100: access control in a slimline handle
The new H100’s stylish and robust design has proven a perfect fit for high-traffic office and facility doors"Intersec’s latest Access Control Product of the Year, the new Aperio H100 packs the power and flexibility of wireless access control into a simple door handle. With easy retrofitting to almost any interior door, broad RFID compatibility via an inbuilt credential reader, and simple integration with third-party systems, the H100 handle makes it cost-effective to extend access control to many more internal doors.
A standard battery fits inside the H100, ensuring a minimal footprint. “The new H100’s stylish and robust design has proven a perfect fit for high-traffic office and facility doors,” says Murtaza Husaini, ASSA ABLOY Business Development & Marketing Director for the Middle East & Turkey. “The handle simply adds powerful access control functionality without wires.”
Like all Aperio wireless door devices, the H100 is built to open standards for easy integration — including online, in real time — with access control systems around smart buildings.
CLIQ: programmable keys for flexible, sustainable locking
For small to medium-sized businesses, CLIQ Go enables managers to run an access system on the move via their smartphoneMechatronic locking system CLIQ combines high-end mechanical and electronic protection. A range of key-operated mechanical cylinders and weatherproof padlocks offer maximum attack resistance. CLIQ technology then layers encrypted, user-friendly electronic security on top, with the option to administer the system from a secure web interface or smartphone app. All CLIQ devices are wire-free: Power is supplied by a standard battery inside the programmable key.
For small to medium-sized businesses, CLIQ Go enables managers to run an access system on the move via their smartphone. For managing remote sites or a mobile workforce (or both), CLIQ Remote with the CLIQ Connect app smooths mobile workflows. A key-holder no longer needs to update access rights in person, carry updating devices, or return to base. All they need is a smartphone and the app.
With its unique combination of security and flexibility, CLIQ is deployed widely at sites with stringent safety requirements and ever-changing access needs, including critical infrastructure, emergency services, museums, banks and cash-in-transit businesses.
Code Handle: secure handle with built-in PINpad
Code Handle keeps sensitive files, private rooms, personal belongings or valuable stock separated and secureIt is impossible to keep watch over every private door in a public space: the storeroom in a shop or pharmacy, or a toilet for staff only. That's when you need Code Handle, a simple, secure handle with a built-in PINpad. Enter a 4-digit code and the door opens. Code Handle locks automatically when the door closes.
Code Handle is easy to retrofit to the existing locking unit of almost any interior door: just change the handle for a battery-powered Code Handle. No need to cable the door or use mains power, and no need to install an electronic access control system.
Code Handle keeps sensitive files, private rooms, personal belongings or valuable stock separated and secure. It keeps you hands-on, and everyone else’s hands off.
With the coming of a New Year, we know these things to be certain: death, taxes, and… security breaches. No doubt, some of you are making personal resolutions to improve your physical and financial health. But what about your organisation’s web and mobile application security? Any set of New Year’s resolutions is incomplete without plans for protecting some of the most important customer touch points you have — web and mobile apps.
Every year, data breaches grow in scope and impact. Security professionals have largely accepted the inevitability of a breach and are shifting their defense-in-depth strategy by including a goal to reduce their time-to-detect and time-to-respond to an attack. Despite these efforts, we haven’t seen the end of headline-grabbing data breaches like recent ones affecting brands such as Marriott, Air Canada, British Airways and Ticketmaster.
The apps that control or drive these new innovations have become today’s endpoint
The truth of the matter is that the complexity of an organisation’s IT environment is dynamic and growing. As new technologies and products go from production into the real world, there will invariably be some areas that are less protected than others. The apps that control or drive these new innovations have become today’s endpoint — they are the first customer touch point for many organisations.
Bad actors have realised that apps contain a treasure trove of information, and because they are often left unprotected, offer attackers easier access to data directly from the app or via attacks directed at back office systems. That’s why it’s imperative that security organisations protect their apps and ensure they are capable of detecting and responding to app-level threats as quickly as they arise.
It’s imperative that security organisations protect their apps and ensure they are capable of detecting and responding to app-level threats as quickly as they arise
In-progress attack detection
Unfortunately, the capability to detect in-progress attacks at the app level is an area that IT and security teams have yet to address. This became painfully obvious in light of the recent Magecart attacks leveraged against British Airways and Ticketmaster, among others. Thanks to research by RiskIQ and Volexity, we know that the Magecart attacks target the web app client-side.
During a Magecart attack, the transaction processes are otherwise undisturbed
Attackers gained write access to app code, either by compromising or using stolen credentials, and then inserted a digital card skimmer into the web app. When customers visited the infected web sites and completed a payment form, the digital card skimmer was activated where it intercepted payment card data and transmitted it to the attacker(s).
Data exfiltration detection
During a Magecart attack, the transaction processes are otherwise undisturbed. The target companies receive payment, and customers receive the services or goods they purchased. As a result, no one is wise to a breach — until some 380,000 customers are impacted, as in the case of the attack against British Airways.
The target companies’ web application firewalls and data loss prevention systems didn’t detect the data exfiltration because those controls don’t monitor or protect front-end code. Instead, they watch traffic going to and from servers. In the case of the Magecart attacks, the organisation was compromised and data was stolen before it even got to the network or servers.
Today’s proven obfuscation techniques can help prevent application reverse engineering, deter tampering, and protect personal identifiable information and API communications
Best practice resolutions
The Magecart attacks highlight the need to apply the same vigilance and best practices to web and mobile application source code that organisations apply to their networks—which brings us to this year’s New Year’s resolutions for protecting your app source code in 2019:
The key to success is quickly understanding when and how an app is being attacked
First, organisations must obtain real-time visibility into their application threat landscape given they are operating in a zero-trust environment. Similar to how your organisation monitors the network and the systems connected to it, you must be able to monitor your apps. This will allow you to see what users are doing with your code so that you can customise protection to counter attacks your app faces. Throughout the app’s lifecycle, you can respond to malicious behavior early, quarantine suspicious accounts, and make continuous code modifications to stay a step ahead of new attacks.
Next, informed by threat analytics, adapt your application source code protection. Deter attackers from analysing or reverse engineering application code through obfuscation. Today’s proven obfuscation techniques can help prevent application reverse engineering, deter tampering, and protect personal identifiable information and API communications.
If an attacker tries to understand app operation though the use of a debugger or in the unlikely event an attacker manages to get past obfuscation, threat analytics will alert you to the malicious activity while your app begins to self-repair attacked source code or disable portions of the affected web app. The key to success is quickly understanding when and how an app is being attacked and taking rapid action to limit the risk of data theft and exfiltration.
Protecting encryption keys is often overlooked but should be considered a best practice as you forge into the new year with a renewed commitment to app security to ensure your organisation’s health and well-being in 2019
Finally, access to local digital content and data, as well as communications with back office systems, should be protected by encryption as a second line of defense, after implementing app protection to guard against piracy and theft. However, the single point of failure remains the instance at which the decryption key is used.
Effective encryption requires a sophisticated implementation of White-Box Cryptography
This point is easily identifiable through signature patterns and cryptographic routines. Once found, an attacker can easily navigate to where the keys are constructed in memory and exploit them. Effective encryption requires a sophisticated implementation of White-Box Cryptography.
One that combines a mathematical algorithm with data and code obfuscation techniques transforming cryptographic keys and related operations into indecipherable text strings. Protecting encryption keys is often overlooked but should be considered a best practice as you forge into the new year with a renewed commitment to app security to ensure your organisation’s health and well-being in 2019.
Protecting applications against data breach
According to the most recent Cost of a Data Breach Study by the Ponemon Institute, a single breach costs an average of $3.86 million, not to mention the disruption to productivity across the organisation. In 2019, we can count on seeing more breaches and ever-escalating costs. It seems that setting—and fulfilling—New Year’s resolutions to protect your applications has the potential to impact more than just your risk of a data breach. It can protect your company’s financial and corporate health as well. So, what are you waiting for?
In the age of massive data breaches, phishing attacks and password hacks, user credentials are increasingly unsafe. So how can organisations secure accounts without making life more difficult for users? Marc Vanmaele, CEO of TrustBuilder, explains.
User credentials give us a sense of security. Users select their password, it's personal and memorable to them, and it's likely that it includes special characters and numbers for added security. Sadly, this sense is most likely false. If it's anything like the 5.4 billion user IDs on haveibeenpwned.com, their login has already been compromised. If it's not listed, it could be soon. Recent estimates state that 8 million more credentials are compromised every day.
Ensuring safe access
Data breaches, ransomware and phishing campaigns are increasingly easy to pull off. Cyber criminals can easily find the tools they need on Google with little to no technical knowledge. Breached passwords are readily available to cyber criminals on the internet. Those that haven’t been breached can also be guessed, phished or cracked using one of the many “brute-force” tools available on the internet.
It's becoming clear that login credentials are no longer enough to secure your users' accounts. Meanwhile, organisations have a responsibility and an ever-stricter legal obligation to protect their users’ sensitive data. This makes ensuring safe access to the services they need challenging, particularly when trying to provide a user experience that won’t cause frustration – or worse, lose your customers’ interest.
After GDPR was implemented across the European Union, organisations could face a fine of up to €20 million, or 4% annual global turnover
Importance of data protection
So how can businesses ensure their users can safely and simply access the services they need while keeping intruders out, and why is it so important to strike that balance?
After GDPR was implemented across the European Union, organisations could face a fine of up to €20 million, or 4% annual global turnover – whichever is higher, should they seriously fail to comply with their data protection obligations. This alone was enough to prompt many organisations to get serious about their user’s security. Still, not every business followed suit.
Cloud security risks
Breaches were most commonly identified in organisations using cloud computing or where staff use personal devices
According to a recent survey conducted at Infosecurity Europe, more than a quarter of organisations did not feel ready to comply with GDPR in August 2018 – three months after the compliance deadline. Meanwhile, according to the UK Government’s 2018 Cyber Security Breaches survey, 45% of businesses reported breaches or attacks in the last 12 months.
According to the report, logins are less secure when accessing services in the cloud where they aren't protected by enterprise firewalls and security systems. Moreover, breaches were most commonly identified in organisations using cloud computing or where staff use personal devices (known as BYOD).
According to the survey, 61% of UK organisations use cloud-based services. The figure is higher in banking and finance (74%), IT and communications (81%) and education (75%). Additionally, 45% of businesses have BYOD. This indicates a precarious situation. The majority of businesses hold personal data on users electronically and may be placing users at risk if their IT environments are not adequately protected.
Hackers have developed a wide range of tools to crack passwords, and these are readily available within a couple of clicks on a search engine
In a recent exposé on LifeHacker, Internet standards expert John Pozadzides revealed multiple methods hackers use to bypass even the most secure passwords. According to John’s revelations, 20% of passwords are simple enough to guess using easily accessible information. But that doesn’t leave the remaining 80% safe.
Hackers have developed a wide range of tools to crack passwords, and these are readily available within a couple of clicks on a search engine. Brute force attacks are one of the easiest methods, but criminals also use increasingly sophisticated phishing campaigns to fool users into handing over their passwords.
Users expect organisations to protect their passwords and keep intruders out of their accounts
Once a threat actor has access to one password, they can easily gain access to multiple accounts. This is because, according to Mashable, 87% of users aged 18-30 and 81% of users aged 31+ reuse the same passwords across multiple accounts. It’s becoming clear that passwords are no longer enough to keep online accounts secure.
Securing data with simplicity
Users expect organisations to protect their passwords and keep intruders out of their accounts. As a result of a data breach, companies will of course suffer financial losses through fines and remediation costs. Beyond the immediate financial repercussions, however, the reputational damage can be seriously costly. A recent Gemalto study showed that 44% of consumers would leave their bank in the event of a security breach, and 38% would switch to a competitor offering a better service.
Simplicity is equally important, however. For example, if it’s not delivered in ecommerce, one in three customers will abandon their purchase – as a recent report by Magnetic North revealed. If a login process is confusing, staff may be tempted to help themselves access the information they need by slipping out of secure habits. They may write their passwords down, share them with other members of staff, and may be more susceptible to social engineering attacks.
So how do organisations strike the right balance? For many, Identity and Access Management solutions help to deliver secure access across the entire estate. It’s important though that these enable simplicity for the organisation, as well as users.
Organisations need an IAM solution that will adapt to both of these factors, providing them with the ability to apply tough access policies when and where they are needed and prioritising swift access where it’s safe to do so
While IAM is highly recommended, organisations should seek solutions that offer the flexibility to define their own balance between a seamless end-user journey and the need for a high level of identity assurance.
Organisations’ identity management requirements will change over time. So too will their IT environments. Organisations need an IAM solution that will adapt to both of these factors, providing them with the ability to apply tough access policies when and where they are needed and prioritising swift access where it’s safe to do so.
Importantly, the best solutions will be those that enable this flexibility without spending significant time and resource each time adaptations need to be made. Those that do will provide the best return on investment for organisations looking to keep intruders at bay, while enabling users to log in safely and simply.
IHS Markit projects that the market for physical electronic access control solutions has grown to over $5.2 billion in 2018. The market has experienced stable and predictable growth rates that have hovered around 6 percent over the past several years. Electronic locks remain both the largest and the fastest growing product type in access control, representing nearly 40% of the global market size for all access control equipment.
Impact of technological developments
While market growth rates have been consistent, technological developments have dramatically impacted the market in 2018. The most prominent trend involves mobile credentials, which are poised to revolutionise the longstanding business model for access control system sales. The mobile credentials market was still in its infancy in 2018, but many end-users are already anticipating a transition to these credentials by installing compatible readers in their systems. By 2020, over 10 percent of all new readers sold in the market will be compatible with mobile credentials.
Access Control as a Service
Other trends to watch in 2019 and beyond include Access Control as a Service (ACaaS), which allow end-users to avoid the need to invest in costly on-site IT infrastructures to support their access control equipment. ACaaS solutions will be particularly popular to support small and mid-sized projects that service less than fifty doors. In addition, Bluetooth Low Energy (BLE) beacons will support geopositioning in an increasing number of the world’s most advanced access control systems. Through geopositioning, the exact location of specific personnel can be identified at any site in real-time.
The top fifteen access control vendors represent more than half of the total size of the global access control market, but there are pockets of opportunity for new vendors, particularly to accommodate small and mid-sized projects. The mobile credential and ACaaS markets will also be highly competitive in 2019 and should attract an influx of new market entrants.
There is a new event on the calendar for the security industry in 2019: The Security Event 2019, 9-11 April, at NEC, Birmingham. For additional details and a preview of the new trade show and conference, we spoke with Tristan Norman, Founding Partner and Event Director, The Security Event.
Q: It seems recently that some trade shows have been on the decline in terms of exhibit size and attendance. Why does the physical security industry need another trade show?
Norman: I think there are numerous factors that play into the decline of trade shows in general and not something that is limited to the security industry. Those events that are suffering are no longer serving their target market or have failed to adapt to the changes in the industry they serve. However, what we are seeing now is the rise of focused, more “evolved” trade events which fulfil a gap in the industry event calendar and provide something new and fresh to a disillusioned audience.
Q: What will be unique about The Security Event, and what role will it serve in bringing together buyers and sellers in the market? Where (geographically) will attendees come from? What we are seeing is a rise of trade events which provide something fresh to a disillusioned audience
Norman: The driving ethos behind The Security Event is that we are “designed by the industry, for the industry.” We were able to start with a blank canvas and take onboard all the feedback from stakeholders throughout the security buying chain and create an event that is sustainable and fit for purpose. We see the role of the event as a very important one – to truly reconnect the currently fragmented UK commercial security industry, back at the NEC in Birmingham.
We had originally anticipated that this would be an almost-exclusively UK event in year one. However, we have seen significant interest from potential visitors from across the wider EMEA region who are keen to do business in the UK. We formed a strategic alliance with Security Essen to help facilitate and strengthen our reach in these regions through additional marketing and PR activities. Consequently, early registrations indicate that it will be approximately an 80% UK and 20% international split.
Q: What conference programming is being planned to augment the trade show event?
Norman: Content will be delivered across three focused theatres, serving the needs of our audience throughout the buying chain. Emphasis will be placed on the latest technology innovations impacting the industry, practical advice on the most pressing issues facing security technicians, and important industry updates and insights.
All sessions are focused on delivering tangible benefits to ensure professionals are equipped to stay relevant and to grow their business and we’re excited to be working with key industry bodies, innovators and experts to deliver the programme. We look forward to announcing those in coming weeks.
Exhibitors want to re-engage with the thousands of industry colleagues who no longer attend other events on offer
Q: Comparisons to IFSEC are inevitable. How will The Security Event be different than the IFSEC Security and Fire shows? What are the advantages of locating at Birmingham NEC?
Norman: Both The Security Event and The Fire Safety Event, based at the NEC are completely different to any other trade show in the UK. We pride ourselves in creating a business platform that puts the exhibitors’ needs first, by limiting the size of stands and total number of exhibitors as well as creating a comprehensive CPD accredited educational programme for the visitors.
Q: Which big industry players are supporting the launch of The Security Event, and what feedback are you hearing in terms of why they signed up at the show's inception? If a global manufacturer has a footprint in both the US and Europe, any tradeshow will be managed locally
Norman: Our founding partners are Assa Abloy, Avigilon, Anixter, Comelit, Dahua, Honeywell, TDSi, Texecom, Tyco and Videcon. The full list of exhibitors and supporting partners can be found on our website.
The reasons why they have signed up are very simple. They all see the exact same gap in the industry event landscape as we do. We believe there is a need for a 3-day channel focused commercial security exhibition based at The NEC in Birmingham. Our exhibitors want to re-engage with the thousands of industry colleagues who no longer attend the other events on offer.
Q: Your 2019 show will be the same week as ISC West in Las Vegas. Do you think the competitive calendar will be a factor?
Norman: In terms of our both our audience and our exhibiting base there is very little overlap with ISC West. Generally, if a global manufacturer has a footprint in both the US and Europe, any tradeshow will be managed locally so we haven’t observed any issues so far.
We do acknowledge that having two shows at the same time globally isn’t ideal and we have moved our dates in 2020 to the 28-30 April to mitigate this going forward.
The Security Event 2020 will not clash with Las Vegas' ISC West 2020 as it will in 2019, says Norman
Q: How will you measure success in the first year of the show? What measurements (show size, number of attendees, exhibitor feedback, etc.) will constitute a "successful" first year for the show?Security Event will continue to evolve year after year, but will intent to stay true to the event's original concept
Norman: Great question – the most important barometer of success for me and the team next April is the general industry reaction, after all, this show was created for them. Furthermore, it is vital to us that our exhibitors feel they have achieved their objectives for the show, whether it be quality, quantity of leads or raising awareness of a new product launch. We’ll also be keen to understand how satisfied visitors are with the event, including their views of the content, access to new products/services, effectiveness of the out of hours networking, etc.
We are anticipating 6,000 visitors over the 3 days and I believe if we achieve this goal, we will have a strong rebooking on site, laying a great foundation for our 2020 event.
Q: How would you expect/hope the show would continue to evolve in coming years?
Norman: I hope over the next few years The Security Event cements itself as the industry’s favourite trade show and that exhibitors and visitors alike look forward to every year for both the business opportunities at the event and the networking outside of it. The Security Event will continue to evolve year after year, but I am determined that we stay true to our original concept and the principles on which the show was founded. After all, it is this formula that has proved to be so popular to date.
ADT Inc.’s acquisition of Red Hawk Fire & Security, Boca Raton, Fla., is the latest move in ADT Commercial’s strategy to buy up security integrator firms around the country and grow their footprint. In addition to the Red Hawk acquisition, announced in mid-October, ADT has acquired more than a half-dozen security system integration firms in the last year or so.
Here’s a quick rundown of integrator companies acquired by ADT:
Protec, a Pacific Northwest commercial integrator (Aug. 2017);
MSE Security, the USA’s 27th largest commercial integrator (Sept 2017);
Gaston Security, founded in 1994 as a video surveillance integration company and whose services have since expanded to include intrusion, access control, and perimeter protection (Oct. 2017);
Aronson Security Group (ASG), which delivers risk and security program consultants and offers advanced integration services, consulting and design engineers and a National Program Management team (March 2018);
Acme Security Systems, among the largest privately held security systems integrators in the Bay Area, focusing on electronic security systems, access control, video networks and more (March 2018);
Access Security Integration, a regional systems integrator specialising in design, delivery, installation and servicing of electronic security systems including enterprise-level access control, video and visitor management solutions, perimeter security and security operation command centers (Aug. 2018);
In addition to their moves in the commercial integrator space, ADT has also sought to expand their presence in cybersecurity with the following two acquisitions:
Datashield, specialising in Managed Detection and Response Services (Nov 2017);
Secure Designs, Inc., specialising in design, implementation, monitoring, and managing network defense systems, including firewall services and intrusion prevention, to protect small business networks from a diverse and challenging set of global cyber threats (Aug. 2018).
ADT has acquired more than a half-dozen security system integration firms in the last year or so
For additional insights into ADT’s game plan and the strategy behind these acquisitions, we presented the following questions to Chris BenVau, ADT’s Senior Vice President of Enterprise Solutions.
Q: ADT has been actively acquiring regional integrators this year – more than a half a dozen to date. Please describe the history of how ADT came to embrace a strategy of acquiring regional integrators as a route to growth? ADT's acquisition of Red Hawk is set to close in December, and brings premiere fire and life/safety solutions
BenVau: Our acquisition strategy started at Protection 1 when we embarked on our journey to build out our commercial and national account business and add enhanced integration capabilities to our portfolio. The merger of Protection 1 and ADT brought that foundation to ADT which up to that point was primarily a residentially and SMB-focused company. After the merger, we set out to identify and acquire additional regional integrators that would continue to build on that foundation and deliver enhanced technical solutions, advanced technologies and an expanded service, install and support footprint. Through our acquisitions we now operate two Network Operations Centers and three Centers of Excellence. We are also unique in the industry with the number and variety of certifications, like Cisco and Meraki, our engineers hold which ultimately allows us to offer Managed Security as a Service. They have also enhanced our operational capabilities.
Q: What criteria do you use to evaluate whether an integrator is a good “fit” for ADT?
BenVau: First and foremost, we look at the culture of the companies. The companies that we target for acquisition must be metrics- and customer service-driven. Secondly, we look at the leadership teams. ADT view their acquisitions more like mergers and take a patient approach to integrating them into their business We have been fortunate in the fact the leadership of the companies we acquired remain with us today in key management and executive positions helping to drive continued growth within their organisations. We also evaluate their current customer base, unique solutions and their ability to complement and enhance our portfolio with the goal of becoming a leading full-service, enterprise commercial provider. Our acquisitions have bolstered our network capabilities, brought enterprise risk management services, and a broader solution set in high-end video and access control solutions. Our most recent acquisition – Red Hawk, set to close in December – brings us premiere fire and life/safety solutions.
Q: What changes are typically needed after an integrator is acquired in order to adapt it to the ADT corporate model?
BenVau: We view our acquisitions more like mergers and take a patient approach to integrating them into ADT while taking into account their culture. We want to ensure that we find the right positions for their people, embrace the right messaging and put the right processes in place. We acquire these companies because they are the best in their respective businesses and geographies and bring their knowledge and experience in markets or with solutions that we may not have had previous access to.
ADT can support clients with their own in-house technicians which helps to ensure a consistent security program
Q: How can regional integrators benefit from the ADT brand? Have your newly acquired integrators realised additional growth?
BenVau: The companies we have acquired, generally, have exceeded expectations and surpassed initial goals. ADT brings expanded opportunities for these companies as well with our national footprint. Our National Account Sales Team has seen impressive growth over the years and are only limited by our ability to deliver. These integrators help to deliver on that. In the past, the regional players may have had to rely on sub-contractors to service their larger clients. With ADT, we can now support those clients with our own in-house technicians which helps to ensure a consistent security program across multiple locations.Our National Account Sales Team has seen impressive growth over the years and are only limited by our ability to deliver"
Q: Are additional integrator acquisitions planned this year and into 2019? How much is enough and when will it end (or slow down significantly)?
BenVau: We expect to close on our latest acquisition, Red Hawk, before the end of 2018. Red Hawk brings a national footprint focused on fire/life safety and security to ADT. While ADT already had a robust security offering, Red Hawk will contribute significantly to the fire side of the business. In addition, we will continue to evaluate the companies in the industry to determine if additional acquisitions make sense.
Q: Do you expect greater consolidation of the integrator channel in the industry as a whole? Why is this a good time for consolidation? Is it a good M&A market for buyers like ADT?
BenVau: We will continue to evaluate companies in the industry to determine if further acquisitions make sense. As for the industry, we can only speak for ourselves. Our focus is on investing in our field organisation, in particular our service technicians, engineers and project management teams"
Q: What other trend(s) do you see in the industry that will impact ADT (on the commercial side) in the next year or so, and how?
BenVau: In addition to their moves in the commercial integrator space, ADT has also sought to expand their presence in cybersecurity Networking is a big one. As we continue to drive integration of devices and services, from AI, “the cloud,” machine learning and even analytics, there will be more focus on the network they ride on. A deeper knowledge of network design, bandwidth impact, and system integration will be critical. As part of our acquisition strategy, we focused on talent to add to the team and have been able to add to our bench strength in this area.
Q: Any other comments/insights you wish to share about ADT’s strategy, future, and role in the larger physical security marketplace?
BenVau: Our focus is on investing in our field organisation, in particular our service technicians, engineers and project management teams. The cornerstone of our success lies in our ability to deliver outstanding customer support and service. It starts with sales and the ability to deliver security and life safety technologies, but it ends with a delighted customer who partners with us to help secure the things that matter most to them. Our recent acquisitions have more than doubled our commercial field operations teams and are key to establishing the ADT Commercial brand as a leading full-service provider of enterprise solutions to the marketplace.
Security Essen 2018, held in Messe Essen, Germany, promised attendees a newly modernised trade show with a simplified layout and more interactive experience. Compared to previous years, halls were reorganised by technology area, with aisles laid out to make more direct pathways for attendees. The fair welcomed 950 exhibitors and more than 36,000 trade visitors from the global security market.
Several manufacturers mentioned that footfall had been lighter than expected, but that the show had delivered on its promise to welcome more international visitors, in particular from the Middle East region. Exhibitors also grumbled about higher costs for booth space.
Key security industry exhibitors
Exhibitors expressed concern that the absence of key players reduced overall foot traffic Exhibitors praised the bigger aisles, which made it easier for visitors to navigate the show. However, some were unsure whether this was due to a better layout or simply because the show was missing key exhibitors. Notably absent were access control provider Dormakaba, security solutions company Honeywell, and surveillance providers Geutebruck and Dallmeier. Exhibitors expressed concern that the absence of key players reduced overall foot traffic.
Security Essen hosted a particularly strong access control presence. Halls 2 and 3 were home to companies from across the access control and mechatronics spectrum. Sponsorship by EVVA covered the west entrance. The locking systems manufacturer, which celebrates its 100th anniversary next year, boasted significant floorspace.
Exhibitors were pleased with the large access and locking presence, commenting that London-based IFSEC International tends to be dominated by video surveillance providers.
EVVA, which celebrates its 100th anniversary next year, boasted significant floorspace
Deep learning and artificial intelligence
The push toward artificial intelligence (AI) in physical security continues, although the tone at Security Essen seemed to be shifting beyond hype and more toward how the technology can actually add value. For example, Hikvision’s cameras boasted more intelligence and processing power, and the company emphasised faster-paced product cycles.
Customers ultimately do not buy AI – they buy benefits and solutions VIVOTEK embraced artificial intelligence as the biggest trend in the industry. The company demonstrated its latest deep learning technology for crowd detection applications. For Dahua, artificial intelligence allows users to easily search metadata in a video, including age and behaviour. Dahua demonstrated its solution for the transportation market, which is able to learn if a bus or train driver is falling asleep at the controls.
However, some manufacturers chose not to focus on artificial intelligence. Representatives from Brivo and Eagle Eye Networks highlighted that customers ultimately do not buy AI – they buy benefits and solutions. Historically, video analytics were oversold and underdelivered, and the same could happen to AI if the term is overused in marketing security solutions.
VIVOTEK embraced artificial intelligence as the biggest trend in the industry
The German market & GDPR
While the fair welcomed an increase in international visitors, many stands offered a distinctly German flavour. Exhibitors catered to German customers’ preference for data protection and high levels of privacy. Visitors were welcomed to the show by banners from Genetec, emblazoned with the slogan “Privacy matters… So, remember to forget me.” The video security provider’s stand demonstrated this concept more tangibly, via its Privacy Protector Module.
The surveillance software, which is certified with the European Privacy Seal (EuroPriSe), monitors events while automatically pixelating people and vehicles in real time. If an incident occurs, an authorised operator can securely access the unaltered video.
Visitors were welcomed to the show by banners from Genetec
Other companies also acknowledged issues of privacy and cybersecurity. Hikvision noted that Europe is more regulated, which limits the implementation of the company’s products compared to those used in China. Dahua emphasised that its data for the German market is stored in Frankfurt to meet demands for data protection.
IDIS made a point of saying there are no backdoors to their products. The deep learning products are easy to use and 96% accurate, says the company. FLIR has developed a cybersecurity hardening document, and strives to be transparent about cyber issues, including a web landing page where customers can raise any concerns.
Vanderbilt is also pushing the cloud as a way forward with its ACT365 cloud-based access and video solution. Users are not intimidated by the cloud anymore since we all use it in our personal lives, says the company.
Also on the access control side, EVVA were clear on the security of their AirKey mobile access system, which uses technology based on internet banking, double encryption and high-quality hardware.
As well as demonstrating its SAROS thermal camera, FLIR strived for cybersecurity concerns to be addressed by customers
Taking a broader view
Nedap views security as being about allowing people to focus on their daily lives and work, safe in the knowledge that security is being taken care of. At the show, Nedap launched its new slogan ‘Security for Life’, stating that “true security is when you don’t have to think about it”. Nedap’s global client program represents a long-term commitment to projects. They are having more discussions with clients about risk management through standardisation and centralised policy.Solutions – as opposed to products – were also a focus at Security Essen, as at IFSEC before it
Clients remain with Nedap because they keep investing in the platform, constantly updating the code and simplifying it to improve scalability for organisations, says the company. Nedap had one of the few double-decker booths at Security Essen.
Solutions – as opposed to products – were also a focus at Security Essen, as at IFSEC before it. HID Global touted their extensive use of partnerships to provide solutions. SeeTec highlighted their move away from products to a more solution-based approach. FLIR, perhaps best known as a thermal camera company, were pushing their solutions approach to markets including intelligent traffic, smart city, video management and PSIMs.
Nedap had one of the few double-decker booths at Security Essen
Vertical markets in focus
As vertical markets go, retail was big, and several players were offering some type of retail solution. Retail – along with banking, finance and transportation – was among Hikvision’s vertical markets of choice. Dahua's new panoramic cameras stitch together the image inside the camera instead of on the server SeeTec’s retail solution combines EAS with business intelligence and heat mapping. Dahua’s retail offerings include people counting and emotion detection, which can correlate with weather data, for example. Genetec also showcased a range of retail solutions.
Technology improvements announced at Security Essen include FLIR's more robust FB6 series thermal line, Promise Technology's SMARTBOOST technology improved playback performance, and Videotec's cameras with better night performance. The extended 50m range of Optex's intrusion detection laser sensor reduces the need for cameras. Dahua's new panoramic cameras stitch together the image inside the camera instead of on the server.
The Hanwha Techwin booth featured Korean flags and a “Korean at heart” motto to set the company apart
Signs of the U.S. congressional ban
There were signs at Security Essen of an impact of the recent U.S. ban on use of Hikvision and Dahua equipment in government installations, although both big Chinese manufacturers maintained a high profile at the German show. For example, the Hanwha Techwin booth featured Korean flags and a “Korean at heart” motto to set the company apart.
Chinese camera manufacturer Uniview were keen to stress that they are not owned by Chinese government (neither is Dahua). Uniview’s all-IP camera line offers high resolution, low-light, multisensor and fisheye options, and AI software provides facial recognition, object detection, and fire and smoke detection at the edge. The company aims to increase its global presence with more international branch offerings and international factories.
With innovative flair, characteristic Italian design and the quality of its products, Replay has become a leader in jeans and denim-based clothing manufacturers. It recently initiated a security and access control upgrade programme throughout its premises and decided to install solutions from PACOM, a STANLEY Products and Solutions company.
Since 1996 Replay has been headquartered in the Italian hilltop town of Asolo in a 25,000m2 reproduction of an early 20th century American industrial building. This acts as the company’s nerve centre, where research and creative development thrive.
Secursat has carved a reputation for its ability to design, specify and install integrated and strategic security solutions
Since its foundation, Replay’s key strategy has been formed around product vision, expansion into new markets and increasing control of its distribution network. As a result, it is now prominent in all European markets, the Middle East, Asia, America and Africa in over 50 countries, with its wholesale distribution network boasting 3,000 sales outlets with 200 retail stores.
Improving security and access control infrastructure
Milan based Secursat has carved an enviable reputation for its ability to design, specify and install integrated and strategic security solutions that address existing and predicted threats in compliance with current legislation and regulations. It creates security models based on a client’s requirements that not only are a form of business protection to reduce and prevent risks but, strategically, are an important tool to create value and be a source of competitive advantage.
“When Replay first approached us with the idea of improving its security and access control infrastructure, first of all we had to gain a complete understanding of its objectives,” explains Maura Mormile, Secursat.
“We always try to utilise any legacy infrastructure where possible, so we needed to find a technology solution that could be integrated with the customer’s equipment as well as being able to draw upon the benefits of our remote monitoring centre. It soon became apparent to us that technology from PACOM would meet all of Replay’s objectives.”
GMS enabled IP security solution
GMS provides the perfect harmony between interoperability and functionality to ensure that Replay’s specific security needs can be met"PACOM and Secursat have been working closely since the beginning of 2018, after forming a strategic partnership to provide new opportunities for both companies. Secursat is the first systems integrator to be appointed in Italy by PACOM and the Replay project represented the first opportunity for the companies to work together. The solution configured by Secursat was based around PACOM’s pioneering Graphical Management System (GMS), which is engineered to communicate over an internet protocol (IP) network and has technology tailored specifically for multi-site environments.
“Although not used extensively in Italy, the benefits of IP are beginning to be more widely understood and will have a dramatic effect on how security and access control systems are specified and installed,” states PACOM’s business development manager, Alfonso Lorenzo.
“Our GMS technology draws on over 30 years of experience in developing applications based on a data communications platform, successfully balancing electronic security and IT applications on a single network. GMS provides the perfect harmony between interoperability and functionality to ensure that Replay’s specific security needs can be met, without compromising on quality or operational process.”
PACOM 8003 hybrid control panels
PACOM 8003 offers up to eight configurable 5 state inputs and 8 outputs comprising 2 relays and 6 open collectors"Alongside the PACOM GMS are the IP based PACOM 8003 next generation hybrid control panels, which incorporate PACOM-Edge technology. By offering advanced security capabilities across Replay’s Ethernet backbone this control panel reduces the need for traditional security cabling.
Alfonso Lorenzo adds, “PACOM 8003 offers up to eight configurable 5 state inputs and 8 outputs comprising 2 relays and 6 open collectors. Inputs can be expanded up to 96 and outputs can be expanded up to 40 via the addition of on-board expansion modules and/or remote I/O devices.
“PACOM 8003 supports auto-discovery of peripheral devices for simplified installation and all doors can be individually configured to operate via card only, PIN only, or card and PIN, with access schedules providing additional control. It also satisfies the needs of Replay’s stores that may require access control.”
Tracking events in real time
Not only did we overcome traditional wiring issues but, thanks to IP, we have faster signal transmission to the remote monitoring centre"The entire installation went incredibly smoothly and was completed with minimal disruption to the stores. Maura Mormile comments, “All our integrators commented on how straightforward the PACOM equipment was to install and configure. Not only did we overcome traditional wiring issues but, thanks to IP, we have faster signal transmission to the remote monitoring centre, which centralises operations in an innovative and simple way.
“Furthermore, the use of the GMS means that we are able to track events in real time, have a record of events and can engage in remote management of the entire Replay security and access control infrastructure.”
Maura concludes: “The Replay project was not a particularly straightforward one but the combined expertise of Secursat and PACOM ensured a great result. The products are user friendly and, just as importantly, offer a high level of future proofing and expansion possibilities that will optimise security and access control infrastructure for many years to come.”
When a leading English university sought electronic locks for its newest student accommodation block, it turned to Aperio to extend its installed Gallagher Command Centre access control system.
The University of East Anglia (UEA) has relied on Gallagher access control for a decade. To extend their Gallagher Command Centre system to Crome Court—a student residence with 231 en suite rooms separated into flats for between 8 and 13 postgraduates—they needed the right wireless solution.
Wireless locking technology
Aperio wireless locks are battery powered, and so use much less energyUEA’s needs included more than just security, stylish component design and affordability. Crome Court was specifically designed to minimise environmental impact, including CO2 emissions. Any access control system was expected to contribute to that goal.
The university chose Aperio wireless locking technology from ASSA ABLOY. Aperio wireless locks are battery powered, and so use much less energy than wired magnetic security locks. They only “wake up” when a credential is presented to the reader.
On campus training
“We decided to offer Aperio to upgrade and extend our system at UEA because of its outstanding reputation within the security industry,” explains Jason Boyce, sales manager at Gallagher.
“Having worked with us for 6 years, Gallagher knew we would deliver,” adds David Hodgkiss, national sales manager at ASSA ABLOY UK.
Installation was quick and easy, aided by training delivered on campus by specialist ASSA ABLOY technicians. “We found ASSA ABLOY’s service faultless,” says Wayne Dyble, installation and support manager at Check Your Security, UEA’s service provider.
Environmentally advanced profile
There’s no need for expensive and time-consuming work changing the locks
Crome Court’s secure doors are fitted with Aperio E100 online escutcheons. Students open them with programmable RFID smart cards, instead of cumbersome mechanical keys. If a keycard is lost, it is straightforward for UEA facilities staff to cancel it and issue a replacement—using a simple web-based interface or mobile phone. There’s no need for expensive and time-consuming work changing the locks.
UEA also aimed to build Crome Court with an environmentally advanced profile. Here, too, Aperio delivered. Wireless locks are battery-operated and emit much less CO2 than wired magnetic locks. In fact, in carbon terms, Aperio locks emit 0.16 percent of the total emissions produced by standard wired locks.
Flexibility is another Aperio asset: additional doors can be brought into the same integrated Gallagher system whenever needed. “We hope to roll out Aperio across all new and existing residential estate,” says Christine Beveridge, head of campus services at UEA.
Retail banking combines a demand for high security with complex workflows. Staff need efficient access. Facility managers need the flexibility to design access permissions around individual needs, so not everyone can access every area whenever they choose. Nobody wants to carry or track large numbers of keys. These were the requirements, managers of Creval — a regional bank in Italy — faced when seeking an alternative to a mechanical master-key system.
Creval needed new access control devices to become an integral part of a security system for assets and people with the highest level of protection. They sought locks to offer a durable, secure and flexible alternative to standard mechanical security.
They found an easy, electronic way to administer a powerful, user-friendly system based on battery-powered physical keys and secure, advanced microelectronics.
Flexible high-security locking
Staff carry a single, battery-powered eCLIQ key, programmed with only the right preauthorised access permissionsCreval chose eCLIQ key-based wireless access control for its banking premises. Bank doors across the Lombardy region are guarded by more than 30 durable eCLIQ cylinders, putting Creval managers in complete control of entrance security.
eCLIQ is a scalable electronic extension of the CLIQ access control system deployed in critical infrastructure sites across Europe. Cylinders are fully electronic, protected against manipulation and with 128-bit AES encryption built into both lock and key microelectronics. Staff carry a single, battery-powered eCLIQ key, programmed with only the right preauthorised access permissions.
Time-limited access rights
Creval’s security manager is now able to grant access based on scheduled times and specific doors, and right down to the level of the individual site user. It is also straightforward to set time-limited access rights for a user key, increasing security if a key is lost. Audit trails and event logs are collected to the same, fine-grained degree.
Key management is easy with software operated from a local PC or securely on the web via a standard browser. In the unlikely event a key is misplaced, Creval administrators simply delete its validity from the system. “We are satisfied with the results of the new access control system,” says Claudio Brisia, Logical Security Manager at Creval headquarters in Sondrio.
Just a ten-minute walk from the city centre, the University of Leeds is upgrading door security in much of its student accommodation to keep pace with changing technology and customer demand. One of the biggest and busiest centres of higher education in the UK, the university has more than 34,000 students and over 8,000 staff, making it the third largest employer in Leeds.
With such a large student population to house, its residence portfolio both on and off campus is impressive. It ranges from the Victorian architecture of Lyddon Hall to modern purpose-built apartments such as Storm Jameson Court, through to shared houses and a huge choice of flats and apartments run in partnership with the likes of UNITE and iQ Student Accommodation.
Wireless electronic access control system
The Residential Services team have chosen to upgrade their SALTO ProAccess management system to the latest versionStarting university is a really exciting time, and for many students it will be their first time living away from home so both they and their parents will want to know they will be living somewhere safe and secure.
Starting in 2010, Residential Services swapped out its previous mechanical keyed system and since then has been using a wire free electronic access control system from SALTO across much of its student accommodation. This has proven reliable providing the versatility and efficiency to manage in excess of 1737 doors across the campus.
But technology does not stand still, and many advances have taken place since the original installation. So, the Residential Services team have now chosen to upgrade their SALTO ProAccess management system to the latest version to take advantage of its increased functionality and features including the ability to use smart phones as access credentials.
Benefits of SALTO solution
Paul Carr, National Accounts Manager at SALTO Systems, says: “Our ProAccess SPACE Software is a powerful web-based access control management tool that enables users like the University of Leeds to programme access-time zones, manage different calendars and view audit trails from each door.
ProAccess SPACE Software's user-friendly web-based interface is simple to set up and configure"
“Its user-friendly web-based interface is simple to set up and configure, giving them the flexibility and control they need. It balances security with accessibility, and advanced technology with affordability. By embedding such a high-performance electronic access control solution into their infrastructure, the University can protect people – both students and staff – as well as their assets and buildings.
Problems with key access control system
“Student accommodation for instance, whatever shape it comes in, is usually busy with people moving from bedrooms to and from various facilities in and around the building. That means a lot of events for doors to deal with. If a room key is not handed in when one student leaves, is the room secure for its next occupant? If a key has been lost how do you cancel it and know the room is truly secure without changing out the lock? And regards to that lost key, has it been copied?
“And for audit purposes, on a campus such as Leeds with such a massive choice of accommodation, how do you get an accurate security overview when there are literally thousands of keys in circulation? This is where ProAccess SPACE and electronic access control really scores.
“And now, with changing technology, more people want everything to be accessed through their personal device. That should come as no surprise as today’s students are digital natives and they expect convenience to come as standard!”
Delivering highest level of security
It is important that students are safe and secure and that access to their accommodation is strictly controlled"Simon Mulholland, Residence Refurbishment and Development Manager at the University of Leeds comments: “Living in University accommodation is a great way to experience student life, make new friends and feel part of our student community. We understand how important security is and it is a responsibility we take very seriously. It is important that students are safe and secure and that access to their accommodation is strictly controlled.
“The SALTO system we’ve been running since 2010 now has proven track record with us so upgrading was a fairly straightforward decision and the latest version of the ProAccess SPACE software enables us to continue to deliver the highest levels of security combined with the most convenient and enjoyable experience of the learning environment – all as cost-effectively as possible.
“Mobile credentials are an exciting application, after all when do you see a student without a smart phone, so this together with a number of other functions gives us enhanced productivity and control in a familiar but more powerful package.”
When is it too late to learn that a video camera isn’t working properly? As any security professional will tell you, it’s too late when you find that the system has failed to capture critical video. And yet, for many years, system administrators “didn’t know what they didn’t know.” And when they found out, it was too late, and the system failed to perform as intended. Fortunately, in today’s technology-driven networked environment, monitoring a system’s health is much easier, and a variety of systems can be deployed to ensure the integrity of a system’s operation. We asked this week’s Expert Panel Roundtable: How can remote monitoring of a security system’s health and operation impact integrators and end users?
The physical security industry is embracing the cloud in a big way. Cloud-based systems – which involve accessing a shared pool of information technology resources via the Internet – are much higher-profile in the video and access control markets, and large and small companies are getting on the cloud bandwagon. We asked this week's Expert Panel Roundtable: What factors are contributing to growth in cloud systems in the security market?
We are living in the age of Big Data, and businesses are inundated with large volumes of data every day. Success depends on capturing, analysing and ultimately transforming that data into information and intelligence that can be used to improve the business. So, it is with today's physical access control and video systems, too, which also generate unprecedented levels of data. But how can we make the data useful to end users and how can they realise its full value? We asked this week's Expert Panel Roundtable: Relating to physical security systems, what is the value of data and how can that value be measured?