Electronic security systems
Doordeck has announced Oprema as their exclusive Paxton distribution UK partner, expanding smart security in the UK. Keyless smartphone access control Doordeck, which lets building users unlock doors from their phone (instead of a keycard or keyfob), is unique in being the only ‘keyless’ product on the market designed to integrate directly with a building’s existing access control system — like the industry-leading Paxton Net2. Fundamentally, it means you can roll out...
Nedap Security Management’s standards of excellence achieved another stamp of approval last month with ISO 27001 certification. This assures that all its products and services, including the AEOS access control system, are fully compliant with the highest international standards for information security. Fokko van der Zee, Managing Director of Nedap Security Management says: “This is the formal confirmation of our ambition to excel at everything we do. A crucial aspect of that, part...
Johnson Controls announces the release of CEM Systems AC2000 v10.1, which contains a number of new features that improve functionality and the user experience and help to mitigate health and safety risks. Support for a range of new third-party products that increase the performance and scope of the CEM Systems AC2000 access control system has also been added. The Health and Safety (H&S) Induction Check application for CEM Systems emerald intelligent access terminals allows cardholders to se...
With the coming of a New Year, we know these things to be certain: death, taxes, and… security breaches. No doubt, some of you are making personal resolutions to improve your physical and financial health. But what about your organisation’s web and mobile application security? Any set of New Year’s resolutions is incomplete without plans for protecting some of the most important customer touch points you have — web and mobile apps. Every year, data breaches grow in scop...
ASSA ABLOY has signed an agreement to acquire KEYper Systems, a supplier of electronic and mechanical key management systems in the US, with a strong presence in the automotive segment. KEYper was established in 1993, and operates from its HQ in Harrisburg, NC. KEYper Systems will become a separate business unit of Traka, which is a pioneer in key and asset management, and an operating unit of ASSA ABLOY Global Solutions. Ric Stone, President of KEYper will report to Justin Sasse, Managin...
In the age of massive data breaches, phishing attacks and password hacks, user credentials are increasingly unsafe. So how can organisations secure accounts without making life more difficult for users? Marc Vanmaele, CEO of TrustBuilder, explains. User credentials give us a sense of security. Users select their password, it's personal and memorable to them, and it's likely that it includes special characters and numbers for added security. Sadly, this sense is most likely false. If it's anythi...
BQT Solutions, a provider of high security card and biometric readers and locks, has launched its new Orca weatherproof lock which provides industry-leading strength, unparalleled environmental durability and seamless access control integration for securing gates, roller doors, shipping containers, and any other large door or entryway. Matthew Nye-Hingston, CTO of BQT Solutions Locking division commented, “Orca is the ultimate weatherproof lock, providing the complete combination of strength, security and convenience in one solution. It encompasses the features found in premium electronic locks, with the physical strength and function required to secure doors of any shape, whatever size.” Integration into access control system Key features such as an IP67 rated design and built-in heater enable the Orca to withstand extreme weather environments including hot and cold climatesOrca lock is the latest generation of roller lock from BQT Solutions, building on an impressive portfolio that includes the YG10 – winner of the SIA New Product Showcase Award in the Lock Systems and Secure Storage Containers category presented at ISC West 2018. Along with its highly impressive physical attributes, Orca’s ability to integrate into an access control system is what elevates its abilities well beyond anything else on the market. Orca is fully monitored and user-configurable, whilst being impervious to weather or environmental challenges making it perfect for deployment indoors or outdoors. Orca’s standout features include: High Security Performance - With a holding force in excess of 50,000N, 18mm diameter stainless steel bolt pin and reinforced strike design, the Orca lock ensures the most sensitive sites remain protected from even the most vigorous methods of attack. Fully Weatherproof - Key features such as an IP67 rated design and built-in heater enable the Orca to withstand extreme weather environments including hot and cold climates, marine and desert conditions. Highly Configurable - Orca can be adapted to suit a wide range of application requirements, with user selectable fail safe/fail secure modes and three user selectable control methods. Complete Monitoring - Orca can truly become a part of the access control system, with a range of output signals including: bolt locked and unlocked position, door position, and tamper detection. Versatile Installation - A symmetrical design means Orca can be installed both horizontally and vertically, giving greater flexibility to installers looking for optimum positioning. Low Cost Running - With the heater disabled, Orca offers low current consumption, drawing as little as 30mA in standby and only 300mA in operation at 12VDC. Long-term Reliability - A high quality low voltage motor is the key to the Orca’s reliability while stainless steel and wear resistant plastic components ensure complete peace of mind for any security operator. Optimal heavy-duty monitored lock BQT Solutions is a specialist in the development, manufacture and supply of high quality, high security card and biometric readersMatthew added, “Orca is the perfect heavy-duty monitored lock for any integrated security solution. Our highly-skilled team in New Zealand has worked hard to ensure we bring a product to the market that we truly believe is the best of its kind. With several exhibitions lined up in the new year, we are looking forward to showing more customers how Orca can secure their installations.” An Ava Group company, BQT Solutions is a specialist in the development, manufacture and supply of high quality, high security card and biometric readers, electromechanical locks and related electronic security products. The company provides a wide range of both off-the-shelf solutions and purpose tailored solutions. Working with major system integrators, security consultants and end users, BQT Solutions develops tailored access control solutions to fulfil a range of access control requirements. From standalone units to fully integrated enterprise solutions, BQT access control systems are designed to provide maximum security, maximum value – and a migration path to meet present and future needs.
Matrix Comsec has confirmed its participation in the 27th Convergence India 2019 event, to be held in the Pragati Maidan, New Delhi from 29th - 31st January 2019. Matrix will be showcasing its complete range of Enterprise IP-PBXs, Unified Communication Server for Modern Enterprises, IP-PBX for SMB & SME, VoIP & GSM Gateways and new portfolio of IP Communication endpoints. PARISAT VC video conferencing Matrix is well-known for its indigenous and innovative range of solutions for Unified Communications, IP Video Surveillance, Access Control, and Time-Attendance. Each of our solutions is specifically designed for large, multi-location enterprises, SME and SMB organisations. Matrix Comsec continuously works towards keeping abreast with the constantly upgrading technology by designing and manufacturing solutions that are equipped with the latest technology. Matrix will be presenting some of its indigenously engineered Telecom solutions at the 27th Convergence 2019 Meet. Matrix Comsec will be showcasing its recently launched video conferencing solution – PARISAT VC as the highlight of the event. This Enterprise Meeting solution sets a new benchmark by offering enhanced video and voice capabilities. PARISAT meets the communication needs of modern enterprises to brainstorm ideas and devise effective strategies. Matrix PARISAT VC empowers organisations to make quick decisions and enhance customer experience. Matrix Network Management Matrix will be exhibiting its all-in-one solution for centralised control of every connected Matrix communication server and Gateway within a single network Matrix will be exhibiting its all-in-one solution for centralised control of every connected Matrix communication server and Gateway within a single network. Range of Gateways - Based on SIP (Session Initiation Protocol), Matrix range of Gateways allows easy integration with most of IP-PBX, TDM PBX, Softswitch and Hosted solutions. This award-winning series of Matrix Gateways is perfect for enterprise and carrier-class solutions. Matrix Telecom solutions Starting from a single port VoIP adaptor to high density VoIP-GSM-PRI-FXO/FXS Gateways, Matrix Telecom Solutions align with all requirements of Small to Large Business. Preloaded with superior voice quality and state-of-the-art routing features, Matrix Gateways are ideal for multi-site connectivity, remote survivability and SIP trunking. “Convergence India is a major technology event bringing ICT professionals on a common platform. Matrix is all set to showcase its latest Telecom solutions at Convergence this year. We look forward to meeting key decision makers and service providers and give them a first-hand experience of our Telecom solutions that are redefining business communications and providing a competitive advantage to our customers worldwide.” said Ganesh Jivani, Managing Director, Matrix Comsec.
Maxxess will be at Intersec 2019 showcasing its latest advances in corporate risk reduction, improved people management and smarter hospitality access solutions - including new releases in its popular eFusion and Ambit solutions. eFusion security management The latest version of the VisitorPoint module within the eFusion security management platform will be showcased, offering a host of new streamlined functions for efficient people and visitor management. Harnessing current advances in cloud computing and mobile communications, VisitorPoint is being used at premises from hotels and campuses to corporate headquarters. It allows the whole process of visitor management to be streamlined in a way never previously possible. For example, it lets guests’ phones be used as access credentials, making it a perfect alternative to room keys in the hospitality sector. Compatibility of the VisitorPoint system with ASSA Abloy Hospitality products has proved to be particularly popular with hotels. VisitorPoint System VisitorPoint is also ideal for busy hotel reception teams who need to keep across who is entering the premises VisitorPoint is also ideal for busy hotel reception teams who need to keep across who is entering the premises. With the latest version of VisitorPoint, users can easily view pre-registered visitors in advance; manage and sign-in large groups in seconds; book meeting rooms; manage visitor car parking; and automate notifications and messaging. Now organisations can go even further in streamlining their people and diary management processes, thanks to integration with Outlook and Google calendars. A new VIP feature allows automatically tailored welcomes for specified guests and/or groups; and a QR Scan App allows visitors and VIPS to be immediately verified. In addition, a new, sleek self-service kiosk will be unveiled at the show, which is ideal for positioning in hotels and high-end corporate lobbies. Open-technology systems integration Meanwhile, with its versatile, open-technology software eFusion is proving a practical alternative to costly or complex conventional PSIM solutions. It offers the advantages of a modular, building block approach and gives users the freedom to integrate, customise and adapt their security systems to meet both current needs and emerging risks. Ensuring compatibility with leading surveillance, intruder, access and fire detection systems, eFusion now supports more than 60 off-the-shelf integrations and several important additions are confirmed for the show. These latest integrations include Jaquies IP intercom hardware; the mobile phone app GuardPoint; and the Metra locker system hardware. “For users who want control and better value from their security investments, eFusion with its expanding choice of integrations is the ideal management platform”, says Lee Copland, Managing Director, Maxxess EMEA. Smart, open infrastructure The eFusion platform allows legacy systems to be transformed into a smart, open infrastructure and extends the life of equipment" “The eFusion platform allows legacy systems to be transformed into a smart, open infrastructure and extends the life of equipment. Our technology is proving particularly popular because it gives users all the advantages of advanced PSIM without the associated cost or complexity.” eFusion can be easily scaled from one site to multiple sites globally and it can connect stand-alone systems for easy upgrades such as retro-fits with existing hardware. Network monitoring for public safety Also on show, Ambit allows security controllers to communicate directly with both individuals and groups and to monitor the safety of everyone on site (or on multiple sites), for example employees, residents, visitors, or contractors. Now Ambit users will benefit from direct notification of a wide range of risks thanks to a new integration with the NC4 incident alert service. NC4 monitors risks and issues alerts in real time, covering potential threats ranging from terrorist incidents to weather events, from civil disruption to cyber-attacks. With this new integration, as N4C alerts arise they will be filtered by proximity/relevance and directly sent to Ambit users. Lone worker monitoring Visitors to the Maxxess stand will also learn how Ambit’s latest life-saving technology comes with a choice of applications tailored to the user’s needs. For example, it can allow lone-worker monitoring; courtesy communications and remote escorting after-hours; panic alarm features; and individualised messaging during incidents. It can help security teams co-ordinate and work more effectively with emergency responders too as well as improving the efficiency of day-to-day operations. We are well positioned to further capitalise on major infrastructure projects across the region such as hotels and leisure" With new customers and projects including Bluewater Island, TAJ Hotel & Residences JLT Dubai, TAJ Hotel & Palace on Palm Jumeirah, the Emirates Nuclear Energy Corporation, Emirates Flight Catering Extension, the Jewel of the Creek and Yahsat, 2019 will be an exciting year of growth for Maxxess in the Middle East. Maxxess expands Middle East reach “We are well positioned to further capitalise on major infrastructure projects across the region such as hotels and leisure. The demand for increased operational efficiencies across the MENA region has seen many organisations look to automate tasks and at the same time mitigate against the potential for human error. This is evident in the demand we’re seeing for streamlined visitor management, the elimination of keys and better optimised workforces across security and facilities management functions.”, said Lee Copland, Managing Director, Maxxess EMEA. He adds, “And as real-world applications for artificial intelligence become a reality, we are continuing to collaborate with our world leading video surveillance partners to bring these advanced analytics into the eFusion platform. Meanwhile, we will continue to support our customers in complying with revised fire and safety codes and new security regulations.”
Evolis, global provider of personalisation systems for plastic cards, announced the creation of a subsidiary in Tokyo under the name of Evolis Japan. Evolis Japan Operational since January 7, 2019, Evolis Japan will market the entire Evolis product range and offer technical support. Since 2008, Evolis has been present in Japan through a distributor. The creation of a local subsidiary aims at strengthening relations with local partners in order to accelerate the group’s business development and maximise the chances to establish a long-term presence in Japan. Card personalisation solutions Evolis Japan’s mission is to expand the traditional distribution network, develop a new network dedicated to new sectors and to strengthen its ability to reply to demands of government bodies and financial institutions. "Japan is one of the world’s leading economies with more than 125 million people. We therefore see strong potential in several key markets for card personalisation. The creation of a Japanese company will help us reinforcing our existing business relationships and facilitate the development of new partnerships" says Emmanuel Picot, president of Evolis.
People and vehicle access control specialist, Nortech’s technical training courses have been specially designed to make sure that installers/system integrators are equipped with the skills and knowledge needed to install, maintain and troubleshoot Nortech systems. Real-world security issues Led by highly experienced technical experts, Nortech’s courses combine hands-on practice with theoretical sessions covering real-world security issues and take place at the company’s dedicated training facility in South Wales. Nortech is committed to providing an outstanding customer experience with its products and services. As part of this commitment, it offers a range of in-depth training in access controllers, readers and ID devices, and long-range identification, ideal for those with sound knowledge and experience in people and vehicle access systems. The courses provided include Long range identification training begins with vehicle tagging and ANPR systems Nortech products overview, which focuses on Nortech’s access control products, card readers, ID devices, long range identification, vehicle counting and parking management products. Access Control: The modules cover the access control products, Norpass installation and Nortech Reader Interface installation. The final module progresses into the installation and configuration of NRI products. Long range identification training begins with vehicle tagging and ANPR systems. Other modules in the programme discuss the installation and configuration of the ANPR, uPASS and Transit ranges. Vehicle detection and parking training includes learning about Nortech’s popular Feemaster Smart and the company’s counting and count management products. The installation and configuration of the Feemaster Smart Console, entry and exit stations and an overview of the inductive loop detector operation, applications and set up of Nortech’s parking detectors are all included. Readers and ID devices installation training for each reader and ID device supported by Nortech is also available. Training is free to all existing account customers. In addition, every participant will receive a comprehensive pack of product specifications, application notes and a certificate of completion.
Wavestore, the British developer of open platform Video Management Software (VMS), has announced the opening of a Middle East office and the appointment of Mustapha Kabbara as its Business Development Director for the region. Reporting to Wavestore’s Managing Director, James Smith, and based at the company’s new offices in Dubai Silicon Oasis, UAE, Mustapha Kabbara will be engaging with regulatory authorities, consultants and system integrators throughout the Middle East in order to develop new business opportunities for the company’s highly acclaimed video management platform which has been developed to unlock the potential of an integrated security solution. Expanding pre and post-sales support We now feel the time is right to demonstrate our support for the region by investing in our new office and expanding our team"“The Middle East has always been a key target market for Wavestore. Following on from successfully winning a number of prestigious projects, we now feel the time is right to demonstrate our support for the region by investing in our new office and expanding our team,” said James Smith. “Our decision to do so reflects our determination to continue to globally expand our pre and post-sales support in line with the very welcome increase in demand for our best-in-breed VMS solutions.” Prior to joining Wavestore, Mustapha was the Business Development and Sales Leader for Honeywell, a role he had performed since 2012 and this followed on from a two-year spell during which he held a technical and training management position. Cyber secure VMS solution Wavestore delivers compelling total cost of ownership benefits, such as the provision of free technical support"“I am delighted to be joining Wavestore at this exciting time,” said Mustapha. “There are many reasons why Wavestore is ideally positioned to achieve great success in the Middle East, not the least of which is that our VMS offers virtually unlimited scalability, is inherently cyber secure, and it delivers a platform for integrations which add real value to end-users and their projects. “All of these attributes are key factors which are needed to be taken into consideration for high security and mission critical applications. “Equally important, with customers in the Middle East looking to achieve greater value from their investment in an electronic security solution, Wavestore delivers compelling total cost of ownership benefits, such as the provision of free technical support and a commercial proposition that does not involve tying customers into expensive recurring upgrade contracts.”
IHS Markit projects that the market for physical electronic access control solutions has grown to over $5.2 billion in 2018. The market has experienced stable and predictable growth rates that have hovered around 6 percent over the past several years. Electronic locks remain both the largest and the fastest growing product type in access control, representing nearly 40% of the global market size for all access control equipment. Impact of technological developments While market growth rates have been consistent, technological developments have dramatically impacted the market in 2018. The most prominent trend involves mobile credentials, which are poised to revolutionise the longstanding business model for access control system sales. The mobile credentials market was still in its infancy in 2018, but many end-users are already anticipating a transition to these credentials by installing compatible readers in their systems. By 2020, over 10 percent of all new readers sold in the market will be compatible with mobile credentials. Access Control as a Service Other trends to watch in 2019 and beyond include Access Control as a Service (ACaaS), which allow end-users to avoid the need to invest in costly on-site IT infrastructures to support their access control equipment. ACaaS solutions will be particularly popular to support small and mid-sized projects that service less than fifty doors. In addition, Bluetooth Low Energy (BLE) beacons will support geopositioning in an increasing number of the world’s most advanced access control systems. Through geopositioning, the exact location of specific personnel can be identified at any site in real-time. The top fifteen access control vendors represent more than half of the total size of the global access control market, but there are pockets of opportunity for new vendors, particularly to accommodate small and mid-sized projects. The mobile credential and ACaaS markets will also be highly competitive in 2019 and should attract an influx of new market entrants.
Edward Snowden’s name entered the cultural lexicon in 2013, after he leaked thousands of classified National Security Agency documents to journalists. He’s been variously called a traitor, a patriot, a revolutionary, a dissident and a whistleblower, but however you personally feel about him, there’s one way to categorise him that no one can dispute: He’s a thief. There’s no doubt about it: Snowden’s information didn’t belong to him, and the scary truth is that he is neither the first nor the last employee to attempt to smuggle secrets out of a building – and we need to learn from his success to try to prevent it from happening again. Since the dawn of the digital age, we’ve fought cyber pirates with tools like firewalls, encryption, strong passwords, antivirus software and white-hat hackers. But with so much attention on protecting against cyber risks, we sometimes forget about the other side of the coin: the risk that data will be physically removed from the building. Douglas Miorandi, director of federal programs, counter-terrorism and physical data security for Metrasens, recently discussed the major risks to physical data security with SourceSecurity.com. Q: What do you believe are the main physical threats to data? The biggest threats I have seen in the physical data security space have varied over the years, but there are four specific risks that remain the same across the board for any organisation, which are: Every organisation is at risk of having data walk out the building with that employee The Insider Threat The Outsider Threat The Seemingly Innocent Personal Item Poor or Nonexistent Screening To beginning with, every company or government agency has at least one disgruntled employee working for them, whether they know it or not, and that means every organisation is at risk of having data walk out the building with that employee. That is what security experts call the insider threat. Q: What do you think influences employees to steal data from their own organisation? People steal data from their workplaces because they see some means to an end, whether it’s to expose something embarrassing or damaging due to a personal vendetta, or because they can sell it to a competitor or the media and benefit financially – meaning they don’t even need to be disgruntled; they might just want a quick way to make a buck. Financial data, too, is attractive, both for insider trading and selling to the competition. People steal data from their workplaces because they see some means to an end, whether it’s to expose something embarrassing or damaging due to a personal vendetta, or because they can sell it to a competitor or the media and benefit financially This can happen to both private companies as well as government agencies. Take Natalie Mayflower Sours Edwards for example, a Treasury Department employee who was caught in the act just last month, when she disclosed sensitive government information about figures connected to the Russia investigation to a reporter. She didn’t hack the system, she simply used a flash drive. And let’s not forget that Snowden was a contractor working for the NSA. Q: Many of us think of security threats coming from an outsider, do companies still face these type of threats? Yes. Unfortunately, organisations do not only need to worry about their own employees – companies and government agencies need to be wary of threats from outsiders. COTS devices include SD cards, external hard drives, audio recorders and even smart phones They can come in the form of the corporate spy – someone specifically hired to pose as a legitimate employee or private contractor in order to extract information – or the opportunistic thief – a contractor hired to work on a server or in sensitive areas who sees an opening and seizes it. Either one is equally damaging to sensitive data because of the physical access they have. Q: Whether it be an insider threat or an outsider threat, what are ways these individuals can steal sensitive data? There are two types of personal items that can be used to steal data: the commercially available off-the-shelf (COTS) variety, and the intentionally disguised variety. This is considered risk number three – the seemingly innocent personal item. COTS devices include SD cards, external hard drives, audio recorders and even smart phones, any of which can be used to transport audio, video and computer data in and out of a building. Intentionally disguised devices are straight out of the spy novel; they could be a recording device that looks like a car key fob, or a coffee mug with a USB drive hidden in a false bottom. Intentionally disguised devices are straight out of the spy novel; they could be a recording device that looks like a car key fob, or a coffee mug with a USB drive hidden in a false bottom Q: What is the difference between COTS and disguised devices? The difference between COTS and disguised devices is that if someone gets caught with a COTS device, security will know what it is and can confiscate it. The disguised device looks like a security-approved item anyone could be carrying into the workplace, making it especially devious. Sometimes these devices don’t just function to bring information out of a building; they are used to damage a server or hard drive once it’s plugged in to a computer or the network. Some are both – a recording device that extracts data and then destroys the hard drive. Companies with airtight cyber security protocols can sometimes fall down when it comes to physically screening peopleQ: With these types of discrete items, can security personnel still catch individuals in the act? For example, through security screenings? Poor or nonexistent screening is the most substantial security threat to any organisation when it comes to sensitive data. Whether it’s an employee, an outside contractor or a device, the physical security risks are real, and everyone and everything entering and leaving a building needs to be screened. Unfortunately, screening often isn’t occurring at all, or is ineffective or inconsistent when it does occur. Even companies with airtight cyber security protocols can sometimes fall down when it comes to physically screening people and stopping them from stealing data through recording devices. Q: It’s surprising that so many organisations would neglect physical security when protecting their data. It’s a huge mistake, and the consequences can be dire. They range from loss of customer trust, exorbitant lawsuits and tanking stock prices in the private sector; and risks to national security in the public sector. Costs and resource allocation increase as well during efforts to reactively fix or mitigate the effects of physically stolen data. For both the private and public sectors, the risk for data to be physically removed from a building has never been greater. Years ago, it was much harder for the average Joe to figure out where they could sell stolen data. Now, with the Deep Web, anyone with Tor can access forums requesting specific information from competing spy agencies, with instructions on how to deliver it, greatly reducing the risk of getting caught – and increasing the likelihood people will try it. Although it’s getting easier to sell data, the good news is that all of these threats are avoidable with the right measures. Physical data security and cybersecurity must be considered the yin and yang of an airtight policy that effectively protects sensitive or confidential assets from a malicious attack Q: So how can an organisation protect against these risks? There are a number of ways – and the first one requires a change of mindset. Not long ago, the building/physical security department and the IT/cybersecurity department were considered two different entities within an organisation, with little overlap or communication. Organisations now are realising that, because of the level of risk they face from both internal and external threats, they must take a holistic approach to data security. Physical data security and cybersecurity must be considered the yin and yang of an airtight policy that effectively protects sensitive or confidential assets from a malicious attack. Q: How can companies and government agencies combine both physical data security and cybersecurity initiatives? Physical security managers can advise cybersecurity managers on ways to reinforce their protocols – perhaps by implementing the newest surveillance cameras in sensitive areas, or removing ports on servers so that external drives cannot be used. Organisations need to create an effective program and ensure it stays effective so people know it’s not worth the hassle to try In turn, the cybersecurity team can let the physical security team know that they have outside contractors coming in to work on the server, and the physical security team can escort the contractors in and stand guard as they work. Constant communication and a symbiotic relationship between the two departments are crucial to creating an effective holistic security protocol and, once you’ve got the momentum going, don’t let it slow down. Sometimes efforts start off strong and then peter out if priorities change. When guards are down, it’s an excellent time for a malicious actor to strike. Organisations need to create an effective program and ensure it stays effective so people know it’s not worth the hassle to try. It’s not just about the mentality, though. Using the right technology is just as important. Q: What type of technology can you use to protect physical data? Many problems can be avoided by simply using the right technology to detect devices that bring threats in and carry proprietary information out. Electronics such as hard drives, cell phones, smart watches, SD cards and recording devices have a magnetic signature because of the ferrous metals inside them. Using a ferromagnetic detection system (FMDS) as people enter and exit a building or restricted area means that anything down to a small microSD card triggers an alert, allowing confiscation or further action as needed. Electronics such as hard drives, cell phones, smart watches, SD cards and recording devices have a magnetic signature because of the ferrous metals inside them Q: How does FMDS work? In the most basic terms, FMDS uses passive sensors that evaluate disturbances in the earth’s magnetic field made by something magnetic moving through its detection zone. Nothing can be used to shield the threat, because FMDS doesn’t detect metallic mass; it detects the magnetic signature, down to a millionth of the earth’s magnetic field. FMDS is the most reliable method of finding small electronics items and should be part of the “trust, but verify” model Although it is a passive technology, it is more effective and reliable than using hand wands or the walk-through metal detectors typically seen in an airport, which cannot detect very small ferrous metal objects. FMDS can see through body tissue and liquids, so items cannot be concealed anywhere on a person or with their belongings. Whether or not the items are turned on doesn’t matter; FMDS doesn’t work by detecting a signal, but rather by spotting the magnetic signature that electronics contain. This is ideal, because most recording devices do not emit any signal whatsoever. In my experience, FMDS is the most reliable method of finding small electronics items (as well as other ferrous metal objects, like weapons), and should be part of the “trust, but verify” model, in which companies assume the best of their employees and anyone else entering the building, but still take necessary precautions. Q: What are the key takeaways for organisations looking to enhance data security? The toughest challenge in the security sector – whether it’s cyber or physical – is remembering that the bad guys are constantly looking for ways to slip in through the cracks, and security departments need to stay one step ahead to ward off both internal and external threats. Recognising the existing threats, putting together a holistic security strategy, and using the right technology to detect illicit devices comprises an effective three-pronged approach to protecting an organisation’s data. Organisations cannot afford to be passive about security and assume employees won’t steal data and spies won’t sneak in. Strong countermeasures are necessary because data loss can come from both inside and outside, in both private and public sectors, from places not everyone thinks of – and with technology like FMDS acting as a backup to the human element, organisations can lock down their data and keep the wolves in sheep’s clothing from getting through the door.
It amazes me how in a few short years security systems have gone from simple, dumb cameras witnessing events to intelligent eyes, ears, speech and touch solutions that boost situational awareness far beyond human capabilities. It seems the only senses missing from the equation now are smell and taste. And who knows, someone might be working on those in a lab somewhere right now. But what’s really fascinating to me is how the Internet of Things (IoT) has opened a world of possibilities for transforming security technology into something new yet again. With IoT we’re able to push and pull nuggets of intelligence from sources we never considered before: environmental sensors, pressure plates, door lock timers and much more. It’s helped us break through the constraining mindset that security systems are strictly single-purpose. With interconnectivity at the core, we’re starting to imagine myriad ways to apply these tools to challenges outside the realm of security. Here are just a few examples. Flood management assistance Network camera adds another dimension and timeliness to flood management by helping responders investigate remotely As recent hurricanes and floods have shown, water damage can be devastating to a community. That’s why some municipalities are using their city surveillance cameras in conjunction with water sensor to proactively address the problem. Water sensors collect data from multiple sources such as rain gutters, sewer systems and pump stations, in order to monitor fluctuations in water levels and water quality. If an alert triggers, having a network camera in proximity to visually verify the situation helps responders determine the best course of action. For instance, if multiple water detection sensors trigger alerts simultaneously or sequentially over a large area it’s probably due to natural runoff from recent rainfall. But without eyes on the scene, how can you be sure? Network camera adds another dimension and timeliness to flood management by helping responders investigate and identify the cause of a trigger remotely. It might be a fire hydrant spewing water, a water main break or even a chemical spill. With video streaming live to the command center, staff can remotely inspect the area, determine the cause of the trigger and decide whether remediation is required, thus avoiding the expense of dispatching an investigative crew to a non-event. Some municipalities are using their city surveillance cameras in conjunction with water sensor to proactively address the problem Environmental control assistance Data centers house the lifeblood of a business so it’s no wonder why companies work hard to protect them. We’re all familiar with the integration of network cameras with access control systems to visually verify who is actually using the credentials. Network camera adds another dimension and timeliness to flood management by helping responders investigate and identify the cause of a trigger remotely But there’s another aspect to protecting data centers and that’s environment control. Data centers need to maintain optimum humidity and temperature for the racks of electronics. When environmental sensors in the facility detect out-of-norm ranges technicians can remotely command a network camera to zoom in on the gauges and help them determine whether remediation might be necessary. Coupling network cameras with other sensors in the data center can provide visual confirmation of other conditions as well. For instance, every time a data rack door-open-close sensor detects an event it can trigger the camera to pan to the location and stream video to security. Some data centers employ weight sensors at the doorway to weigh personnel and equipment as they enter the room and when they exit to ensure no additional hardware is being taken out of the facility or left inside without permission. Any discrepancy would trigger the camera to zoom in for a close-up of the individual’s face and send a visual alert and ID information to security. Roadway management and parking assistance Network cameras have long played a part in city-wide traffic management. Adding video analytics and integration with network sensors, makes those cameras that much smarter and versatile. They can detect cars driving in bike lanes or driving in the wrong direction and capture license plates of offenders. Their ability to detect anomalous traffic flow patterns can be integrated with car counting sensors, networked electronic road signs and traffic light systems to automatically redirect vehicles to alternate routes. They make great, intelligent parking lot attendants, too. Working in conjunction with weight sensors network cameras can count vehicles coming into and leaving a lot or garage and verify when the facility has reached capacity. License plate recognition and video analytics can be used to ascertain that a vehicle entering a reserved parking space doesn’t match the credentials and vehicle attributes in the database. With the addition of noise sensors and audio analytics, network cameras can improve roadway and parking facility safety by detecting and identifying specific sounds – breaking glass, car alarms, gun shots, and aggressive speech – and triggering a visual alert to first responders. Network cameras can improve roadway and parking facility safety by detecting and identifying specific sounds and triggering a visual alert to first responders Shopper experience assistance In the early days of online shopping, e-tailers designed their sites to replicate the in-store customer experience. In an ironic turn of events, today brick-and-mortar stores are trying to mirror the online shopping experience. To do so, they’re turning their security systems into adjunct sales assistance. With network video and audio system automation they can recognise and acknowledge loyal customers with personal greetings. Retailers are applying people counting video analytics to checkout activity to create rules-based consistency in customer service With heatmapping analytics they can measure how much time a customer spends in a specific department or observe how they walk through the aisles of the store. They can track shopping behaviors such as items looked at that made it into the cart or didn’t, or whether a customer actually checked out or left the merchandise behind. By capturing these shopping patterns and trends retailers can shape a more positive, more profitable customer shopping experience. For instance, integrating video analytics with point of sale systems and RFID sensors on merchandise tags can result in timely alerts to sales associates to recommend additional merchandise. This is a case of emulating how e-tailers let the customer know that other customers who bought X often also purchased items Y and Z. Or to avoid disappointing customers due to stock outages, retailers are linking weight sensors and video analytics to make sure their shelves are well-stocked and if not, quickly alert associates to what items need to be restocked. Capturing business intelligence Retailers are also using video cameras to monitor checkout queues and trigger automated announcements over the public-address system, closed system such as smartphones or other wireless communications devices that checkers are needed rather wait for a person to call for backup. IoT laid the groundwork for network security solutions to seamlessly integrate with other IP-based technologies, sensors and programs They’re applying people counting video analytics to checkout activity to create rules-based consistency in customer service. While retailers will always use their surveillance camera for loss prevention, they’re finding that integrating traditional technology in new ways can yield even bigger returns. Linking network video surveillance, video analytics, network communications system and sensors with point-of-sale systems and customer loyalty databases, retailers are capturing the business intelligence they need to get back in the game and make brick-and-mortar a greater overall experience than online shopping. A natural cross-over technology This trend towards integration has forever changed how organisations view their investment in security technology. The intelligence and versatility of a tool that can see, verify and analyse what’s happening in real-time is spurring users to tap its cross-over potential for a host of other tasks that could benefit from more astute situational awareness – everything from manufacturing and equipment maintenance to logistics, inventory control and beyond. IoT laid the groundwork for network security solutions to seamlessly integrate with other IP-based technologies, sensors and programs. How we capitalise on that connection is only limited by our imagination.
There is a new event on the calendar for the security industry in 2019: The Security Event 2019, 9-11 April, at NEC, Birmingham. For additional details and a preview of the new trade show and conference, we spoke with Tristan Norman, Founding Partner and Event Director, The Security Event. Q: It seems recently that some trade shows have been on the decline in terms of exhibit size and attendance. Why does the physical security industry need another trade show? Norman: I think there are numerous factors that play into the decline of trade shows in general and not something that is limited to the security industry. Those events that are suffering are no longer serving their target market or have failed to adapt to the changes in the industry they serve. However, what we are seeing now is the rise of focused, more “evolved” trade events which fulfil a gap in the industry event calendar and provide something new and fresh to a disillusioned audience. Q: What will be unique about The Security Event, and what role will it serve in bringing together buyers and sellers in the market? Where (geographically) will attendees come from? What we are seeing is a rise of trade events which provide something fresh to a disillusioned audience Norman: The driving ethos behind The Security Event is that we are “designed by the industry, for the industry.” We were able to start with a blank canvas and take onboard all the feedback from stakeholders throughout the security buying chain and create an event that is sustainable and fit for purpose. We see the role of the event as a very important one – to truly reconnect the currently fragmented UK commercial security industry, back at the NEC in Birmingham. We had originally anticipated that this would be an almost-exclusively UK event in year one. However, we have seen significant interest from potential visitors from across the wider EMEA region who are keen to do business in the UK. We formed a strategic alliance with Security Essen to help facilitate and strengthen our reach in these regions through additional marketing and PR activities. Consequently, early registrations indicate that it will be approximately an 80% UK and 20% international split. Q: What conference programming is being planned to augment the trade show event? Norman: Content will be delivered across three focused theatres, serving the needs of our audience throughout the buying chain. Emphasis will be placed on the latest technology innovations impacting the industry, practical advice on the most pressing issues facing security technicians, and important industry updates and insights. All sessions are focused on delivering tangible benefits to ensure professionals are equipped to stay relevant and to grow their business and we’re excited to be working with key industry bodies, innovators and experts to deliver the programme. We look forward to announcing those in coming weeks. Exhibitors want to re-engage with the thousands of industry colleagues who no longer attend other events on offer Q: Comparisons to IFSEC are inevitable. How will The Security Event be different than the IFSEC Security and Fire shows? What are the advantages of locating at Birmingham NEC? Norman: Both The Security Event and The Fire Safety Event, based at the NEC are completely different to any other trade show in the UK. We pride ourselves in creating a business platform that puts the exhibitors’ needs first, by limiting the size of stands and total number of exhibitors as well as creating a comprehensive CPD accredited educational programme for the visitors. Q: Which big industry players are supporting the launch of The Security Event, and what feedback are you hearing in terms of why they signed up at the show's inception? If a global manufacturer has a footprint in both the US and Europe, any tradeshow will be managed locally Norman: Our founding partners are Assa Abloy, Avigilon, Anixter, Comelit, Dahua, Honeywell, TDSi, Texecom, Tyco and Videcon. The full list of exhibitors and supporting partners can be found on our website. The reasons why they have signed up are very simple. They all see the exact same gap in the industry event landscape as we do. We believe there is a need for a 3-day channel focused commercial security exhibition based at The NEC in Birmingham. Our exhibitors want to re-engage with the thousands of industry colleagues who no longer attend the other events on offer. Q: Your 2019 show will be the same week as ISC West in Las Vegas. Do you think the competitive calendar will be a factor? Norman: In terms of our both our audience and our exhibiting base there is very little overlap with ISC West. Generally, if a global manufacturer has a footprint in both the US and Europe, any tradeshow will be managed locally so we haven’t observed any issues so far. We do acknowledge that having two shows at the same time globally isn’t ideal and we have moved our dates in 2020 to the 28-30 April to mitigate this going forward. The Security Event 2020 will not clash with Las Vegas' ISC West 2020 as it will in 2019, says Norman Q: How will you measure success in the first year of the show? What measurements (show size, number of attendees, exhibitor feedback, etc.) will constitute a "successful" first year for the show?Security Event will continue to evolve year after year, but will intent to stay true to the event's original concept Norman: Great question – the most important barometer of success for me and the team next April is the general industry reaction, after all, this show was created for them. Furthermore, it is vital to us that our exhibitors feel they have achieved their objectives for the show, whether it be quality, quantity of leads or raising awareness of a new product launch. We’ll also be keen to understand how satisfied visitors are with the event, including their views of the content, access to new products/services, effectiveness of the out of hours networking, etc. We are anticipating 6,000 visitors over the 3 days and I believe if we achieve this goal, we will have a strong rebooking on site, laying a great foundation for our 2020 event. Q: How would you expect/hope the show would continue to evolve in coming years? Norman: I hope over the next few years The Security Event cements itself as the industry’s favourite trade show and that exhibitors and visitors alike look forward to every year for both the business opportunities at the event and the networking outside of it. The Security Event will continue to evolve year after year, but I am determined that we stay true to our original concept and the principles on which the show was founded. After all, it is this formula that has proved to be so popular to date.
The Middle East security market provides a healthy opportunity for manufacturers who can capitalise on the region’s key verticals. Intersec’s 20th edition show focused more on solutions than on products, including solutions for the growing retail sector and an infrastructure market requiring ruggedised equipment to stand up to harsh environments. Intersec hosted security, safety and fire protection exhibitors from over fifty countries at Dubai’s spacious International Convention and Exhibition Centre on 21st - 23rd January. For the security market, the show was an opportunity to demonstrate how the industry’s latest technologies can benefit end-users in the UAE and globally. While the show hosted many impressively-sized stands from key security players, these tended to reflect the ongoing shift from a product-centric market to a focus on customer problems and solutions. Rather than filling the floorspace with an abundance of products, many brands chose to showcase how their flagship solutions could function in real-world applications. Retail surveillance delivers ROI Numerous companies opted to highlight their retail solutions – a key vertical for Dubai, which is known for its elaborate city shopping hubs. The Axis Communications stand allowed visitors to experience its network video offerings for the retail sector, including integrations with Electronic Article Surveillance (EAS) and Point of Sale (POS) technologies. Solutions on show reflected how security systems are increasingly expected to provide a tangible return on investment: With options for queue management and people counting, Axis video technology can be used to provide business intelligence and improve the customer experience, as well as enhancing safety. IP video manufacturer Vivotek also showcased its latest retail offering, including fisheye cameras with built-in crowd detection and heatmap technology, which can help retail managers analyse customer traffic patterns and highly frequented areas. The panoramic nature of Vivotek’s IP cameras makes them ideal for collecting comprehensive data from retail stores. MOBOTIX CEO Thomas Lausten demonstrates how the company’s dual modular camera delivers high-quality images in extreme weather conditions IP video in extreme conditions The MOBOTIX stand was also less product-driven than at past shows. Instead, the focus was on how the manufacturer combines intelligent IoT technology and robust materials to address real end-user needs. CEO Thomas Lausten, who joined the company in June 2017, was on-hand to demonstrate how the company’s dual modular camera continues to deliver high-quality images in extreme weather conditions including ice, rain and sand. Rugged solutions were a big theme across the show floor. This is unsurprising given Intersec’s location in Dubai – the Middle East provides ample opportunity for the security market to capitalise on large outdoor projects, including the oil and gas industry. Video surveillance manufacturer Videotec showcased its latest HD PTZ cameras built to withstand harsh outdoor environments. The stand hosted an immersive ‘Experience Centre’, where the company’s flagship PTZ cameras moved in sync to a rolling video, demonstrating their use in vertical markets including oil and gas, marine surveillance, and critical infrastructure. Video surveillance manufacturer Videotec showcased its latest HD PTZ cameras built to withstand harsh outdoor environments MENA security market requirements Storage provider Promise Technology showcased its latest portfolio of surveillance solutions, including a cloud-based infrastructure optimised for growing IP video requirements. The manufacturer also introduced its new Vess A700 network video recorder series. This latest NVR offering specifically targets medium- to large-scale applications such as banking and industry. Such a solution is ideal for the growing Dubai market, where strict legislation requires a video retention time of 180 days. Intersec is set to return to Dubai from 20th - 22nd January 2019. Organisers expect over 1,300 exhibitors from across to globe to come together for a bigger, wider ranging and more innovative show.
Security is more-than-ever linked to consumer electronics, especially in the residential/smart home market. CES 2018 in Las Vegas is therefore brimming with news that will have a direct impact on the security market, today and especially looking into the future. Products for the future of security CES is a giant trade show for consumer electronics with 2.75 million net square feet of exhibitor space and featuring more than 3,900 exhibitors, including 900 startups - in contrast, ISC West has some 1,000 exhibitors. During the week-long show welcoming 170,000-plus attendees from 150 countries, more than 20,000 new products are being launched. The products incorporate ingredient technologies such as artificial intelligence and 5G that will also be familiar elements as the future of the security industry unfolds. Familiar players at security shows also have a presence at CES, and many consumer technologies on display offer a glimpse of what’s ahead for security The areas of consumer electronics and security are closely intertwined. For example, Apple recently expanded near-field communication (NFC) support to include the NDEF (NFC Data Exchange Format), which will likely accelerate the adoption of smartphones for access control credentialing. In another recent development, Amazon acquired Blink, a home security camera startup that offers wireless home security systems. The acquisition aligns with Amazon’s effort to offer more home devices. Key security technologies at CES 2018 Familiar players at security shows also have a presence at CES. For example, Bosch is highlighting its “Simply. Connected” portfolio of smart city technology to transform security as well as urban mobility, air quality and energy efficiency. Many consumer technologies on display offer a glimpse of what’s ahead for security. Are Panasonic’s 4K OLEDs with HDR10+ format or Sony’s A8F OLED televisions a preview of the future of security control room monitors? At CES, Johnson Controls is announcing support for Apple HomeKit now offered in their DSC iotega wireless security and automation solution. Consumers can manage both their security system and also other home automation abilities using Apple’s Home app, or Siri on their iPhone, iPad or Apple Watch. Interlogix is announcing new features and components of its UltraSync SmartHome system, including hands-free voice control, high-definition cameras, an LTE cellular module and soon-to-be-released doorbell camera. The areas of consumer electronics and security are closely intertwined Developments in crime awareness ADT has a high profile at CES, including the launch of its ADT Go mobile app, equipped with 24/7 emergency response from ADT’s live monitoring agents and backed by Life360’s location technology, providing emergency response, family connectivity, safety assistance and crime awareness. ADT is also unveiling a video doorbell and expanding its monitoring to cybersecurity. IC Realtime is introducing Ella, a cloud-based deep-learning search engine that augments surveillance systems with natural language search capabilities across recorded video footage. Ella enables any surveillance or security cameras to recognise objects, colours, people, vehicles and animals. Ella was designed using the technology backbone of Camio, a startup founded by ex-Googlers who designed a simpler way to apply searching to streaming video feeds. It’s a “Google for video:” Users can type in queries such as “white truck” to find every relevant video clip. Smarter homes and smarter computers Do-it-yourself smart home security company Abode Systems announces iota, an all-in-one system giving customers more freedom and flexibility to build out and monitor their smart home. The new form factor has a built-in full-HD resolution camera enabling customers to see and hear what’s going on in their home 24/7 while a built-in gateway supports hundreds of devices to make homes more convenient, safer and more secure. There is also support for Apple HomeKit. Highly programmable and high-performance platforms will no doubt play a role in the future of video surveillance systems in our market The Z-Wave Alliance will host 30-plus leading smart home brands in the Z-Wave pavilion at CES. A full walk-through home will demonstrate different brands working together to create one cohesive smart home experience. Sigma Designs unveils its 700-Series Z-Wave platform, including numerous performance and technology enhancements in energy-efficiency and RF performance. Personal protection in attendance Self-defence product company SABRE will debut a combination pepper spray with dual sound-effect personal alarm that “alternates between the traditional wailing sound and a primal scream, while a strobe blinks 19 times per second to disorient assailants.” SABRE’s Modern Fake Security Camera includes “sleek, realistic design to deter would-be thieves.” Chip maker Ambarella is introducing the CV1 4K Stereovision Processor with CFflow Computer Vision Architecture. The chip combines environmental perception with advances in deep neural network processing for a variety of applications, including video security cameras and fully autonomous drones. At CES, applications will focus on automotive uses, including advanced driver assistance systems (ADAS), self-driving, electronic mirror and surround view systems. The highly programmable and high-performance platform will no doubt play a role in the future of video surveillance systems in our market. A full walk-through home will demonstrate different brands working together to create one cohesive smart home experience Extending home security and efficiency The Ring whole-house security ecosystem creates a “Ring of Security” around homes and neighbourhoods. Products include “Stick Up” indoor/outdoor security cameras, integrated LED lighting, a “Ring Alarm” integrated bundle for $199 including a base station, keypad, contact sensor, and Z-Wave extender. “Ring Protect Plans” include 24/7 professional monitoring. The “Streety” phone app, from Vivint Smart Home, extends home security into the neighbourhood. Streety makes it easy for neighbours to monitor neighbourhood activity through a network of shared residential cameras. They can keep an eye on kids, cars and property through live video feeds and use recorded video clips to investigate incidents. A new device making its debut at CES is the Walker “commercialised biped robot,” from UBTECH Robotics, which provides a complete home butler service and is designed to ease the day-to-day operations of a busy home or office. The varied of functions includes video surveillance monitoring, security patrol monitoring, motion detection and “instant alarm,” as well as dancing and playing games with children. The company says Walker will “bridge the gap between technologies that were once only available in scientific research institutions and everyday people.”
With innovative flair, characteristic Italian design and the quality of its products, Replay has become a leader in jeans and denim-based clothing manufacturers. It recently initiated a security and access control upgrade programme throughout its premises and decided to install solutions from PACOM, a STANLEY Products and Solutions company. Since 1996 Replay has been headquartered in the Italian hilltop town of Asolo in a 25,000m2 reproduction of an early 20th century American industrial building. This acts as the company’s nerve centre, where research and creative development thrive. Secursat has carved a reputation for its ability to design, specify and install integrated and strategic security solutions Since its foundation, Replay’s key strategy has been formed around product vision, expansion into new markets and increasing control of its distribution network. As a result, it is now prominent in all European markets, the Middle East, Asia, America and Africa in over 50 countries, with its wholesale distribution network boasting 3,000 sales outlets with 200 retail stores. Improving security and access control infrastructure Milan based Secursat has carved an enviable reputation for its ability to design, specify and install integrated and strategic security solutions that address existing and predicted threats in compliance with current legislation and regulations. It creates security models based on a client’s requirements that not only are a form of business protection to reduce and prevent risks but, strategically, are an important tool to create value and be a source of competitive advantage. “When Replay first approached us with the idea of improving its security and access control infrastructure, first of all we had to gain a complete understanding of its objectives,” explains Maura Mormile, Secursat. “We always try to utilise any legacy infrastructure where possible, so we needed to find a technology solution that could be integrated with the customer’s equipment as well as being able to draw upon the benefits of our remote monitoring centre. It soon became apparent to us that technology from PACOM would meet all of Replay’s objectives.” GMS enabled IP security solution GMS provides the perfect harmony between interoperability and functionality to ensure that Replay’s specific security needs can be met"PACOM and Secursat have been working closely since the beginning of 2018, after forming a strategic partnership to provide new opportunities for both companies. Secursat is the first systems integrator to be appointed in Italy by PACOM and the Replay project represented the first opportunity for the companies to work together. The solution configured by Secursat was based around PACOM’s pioneering Graphical Management System (GMS), which is engineered to communicate over an internet protocol (IP) network and has technology tailored specifically for multi-site environments. “Although not used extensively in Italy, the benefits of IP are beginning to be more widely understood and will have a dramatic effect on how security and access control systems are specified and installed,” states PACOM’s business development manager, Alfonso Lorenzo. “Our GMS technology draws on over 30 years of experience in developing applications based on a data communications platform, successfully balancing electronic security and IT applications on a single network. GMS provides the perfect harmony between interoperability and functionality to ensure that Replay’s specific security needs can be met, without compromising on quality or operational process.” PACOM 8003 hybrid control panels PACOM 8003 offers up to eight configurable 5 state inputs and 8 outputs comprising 2 relays and 6 open collectors"Alongside the PACOM GMS are the IP based PACOM 8003 next generation hybrid control panels, which incorporate PACOM-Edge technology. By offering advanced security capabilities across Replay’s Ethernet backbone this control panel reduces the need for traditional security cabling. Alfonso Lorenzo adds, “PACOM 8003 offers up to eight configurable 5 state inputs and 8 outputs comprising 2 relays and 6 open collectors. Inputs can be expanded up to 96 and outputs can be expanded up to 40 via the addition of on-board expansion modules and/or remote I/O devices. “PACOM 8003 supports auto-discovery of peripheral devices for simplified installation and all doors can be individually configured to operate via card only, PIN only, or card and PIN, with access schedules providing additional control. It also satisfies the needs of Replay’s stores that may require access control.” Tracking events in real time Not only did we overcome traditional wiring issues but, thanks to IP, we have faster signal transmission to the remote monitoring centre"The entire installation went incredibly smoothly and was completed with minimal disruption to the stores. Maura Mormile comments, “All our integrators commented on how straightforward the PACOM equipment was to install and configure. Not only did we overcome traditional wiring issues but, thanks to IP, we have faster signal transmission to the remote monitoring centre, which centralises operations in an innovative and simple way. “Furthermore, the use of the GMS means that we are able to track events in real time, have a record of events and can engage in remote management of the entire Replay security and access control infrastructure.” Maura concludes: “The Replay project was not a particularly straightforward one but the combined expertise of Secursat and PACOM ensured a great result. The products are user friendly and, just as importantly, offer a high level of future proofing and expansion possibilities that will optimise security and access control infrastructure for many years to come.”
Traditionally, many stores have used an assortment of tags and labels on a diverse range of merchandise, most of which were designed for an entirely different set of products. As a result, many apparel retailers have recognised that in some instances merchandise and textiles are being damaged. Checkpoint Systems, renowned supplier of source-to-shopper solutions, has therefore developed an innovative new anti-theft solution to meet their specific requirements – Mini NeedleLok. Mini NeedleLok anti-theft solution Designed to protect all types of garments, including very thin fabric, the one-piece solution deters thieves while preventing damage that would usually occur on application of pinned security tags. Whilst other products on the market feature a hinged mechanism which can snag and rip textiles, Mini NeedleLok uses a needle in place of a separate pin, which separates the fibres rather than breaking through them. This allows store assistants to gently spread fabric threads on application to avoid leaving a visible hole after removal. In order to reduce time spent on in-store tagging labour, the Mini NeedleLok mechanical design allows quick and easy application, whilst the solution’s wide opening also allows freedom of placement anywhere on the garment. Minimum product damage risk The Mini NeedleLok speeds up the self-checkout process The Mini NeedleLok also speeds up the self-checkout process. It can be removed quickly and efficiently at the point-of-sale, thanks to its single-piece design and wide opening, enabling store associates to assist with other enquiries, improving the in-store customer experience. It also eliminates the risk of damage to the merchandise, or injury to the customer, as the needle is never exposed. Not only that, with 70% of purchase decisions made at the shelf, Mini NeedleLok has been designed with display in mind. Its sleek look and smart black colour ensures it doesn’t impede on the garment’s aesthetics in order to help turn a browser to a buyer. For those retailers wishing to take their visual merchandising a step further, the solution can also be customised, from adding a logo to a bespoke colourway that matches the company’s branding. Anti-theft retail solution Irene Fernandez, Product Management Europe at Checkpoint Systems, commented: “We’re more customer focused than we have ever been in our history, which is demonstrated through the diverse range of solutions that we now offer retailers across a variety of markets. With the Mini NeedleLok, we took our existing technologies and created a product that fits our apparel customers’ requirements - an effective anti-theft solution that protects merchandise, with the added benefit of being customisable. This is ideal for fashion brands where aesthetic is crucial to their identity.”
Retail banking combines a demand for high security with complex workflows. Staff need efficient access. Facility managers need the flexibility to design access permissions around individual needs, so not everyone can access every area whenever they choose. Nobody wants to carry or track large numbers of keys. These were the requirements, managers of Creval — a regional bank in Italy — faced when seeking an alternative to a mechanical master-key system. Creval needed new access control devices to become an integral part of a security system for assets and people with the highest level of protection. They sought locks to offer a durable, secure and flexible alternative to standard mechanical security. They found an easy, electronic way to administer a powerful, user-friendly system based on battery-powered physical keys and secure, advanced microelectronics. Flexible high-security locking Staff carry a single, battery-powered eCLIQ key, programmed with only the right preauthorised access permissionsCreval chose eCLIQ key-based wireless access control for its banking premises. Bank doors across the Lombardy region are guarded by more than 30 durable eCLIQ cylinders, putting Creval managers in complete control of entrance security. eCLIQ is a scalable electronic extension of the CLIQ access control system deployed in critical infrastructure sites across Europe. Cylinders are fully electronic, protected against manipulation and with 128-bit AES encryption built into both lock and key microelectronics. Staff carry a single, battery-powered eCLIQ key, programmed with only the right preauthorised access permissions. Time-limited access rights Creval’s security manager is now able to grant access based on scheduled times and specific doors, and right down to the level of the individual site user. It is also straightforward to set time-limited access rights for a user key, increasing security if a key is lost. Audit trails and event logs are collected to the same, fine-grained degree. Key management is easy with software operated from a local PC or securely on the web via a standard browser. In the unlikely event a key is misplaced, Creval administrators simply delete its validity from the system. “We are satisfied with the results of the new access control system,” says Claudio Brisia, Logical Security Manager at Creval headquarters in Sondrio.
Denmark’s Evotec chose Idesco readers to complete their cargo securing system they had designed for transport companies’ vehicles. Evotec’s system does more than merely preventing cargo theft. Drivers also feel more secure when delivering because hijack risks are also reduced. This is because cargo is robustly secured when drivers leave vehicles behind. Idesco 8 CD 2.0 DESFire readers Evotec selected Idesco 8 CD 2.0 DESFire readers for deployment on delivery vehicles Danish cargo companies had been struggling with regular delivery cargo thefts. Drivers did not feel secure when delivering and financial losses were growing. Evotec decided to develop a novel vehicle security solution for cargo companies. As part of their solution, Evotec selected Idesco 8 CD 2.0 DESFire readers for deployment on delivery vehicles. Idesco readers have since been installed on several hundred Danish cargo trucks and vans. Early in their design process, Evotec had seen a clear need to strictly limit access to vehicle’s cargo space to authenticated personnel only. They had known RFID technology could provide accurate, secure user identification and authentication. They learned that Idesco’s MIFARE DESFire readers, paired with 128-bit AES-encrypted DESFire transponders, would easily repel transponder hacking or cloning. Best of all, they learned Idesco designed many of its readers for installing outdoors, reliably resisting impacts, moisture, dirt and temperature extremes. Security Key Management service Idesco’s Security Key Management service saved Evotec extensive time and resources"Bo Schønning, Evotec Aps CEO, described the subsequent cooperation of Idesco with his company, “We got great assistance in choosing the correct solution for our system”. In addition to coded readers, Evotec ApS also subscribed to Idesco’s convenient Security Key Management Service for ensure compatibility with every vehicle’s readers. Since DESFire demands readers and transponders be encoded with matching security keys, Idesco’s Security Key Management service saved Evotec extensive time and resources, freeing them to focus exclusively on installations for their customers’ vehicles without worrying about managing DESFire keys themselves. “We feel safe when Idesco handles this data for our customers”, says Bo Schønning. The cargo drivers of Evotec’s customers are assigned vehicle specific transponders to carry, which open the cargo space when presented to the reader guarding it. For increased security, the driver cabin locks automatically when the cargo space unlocks. Additionally, cargo doors automatically lock when they close and will remain locked when the vehicle’s engine is running. The system works equally well in vehicles equipped with liftgates. Opening the vehicle’s driver cabin with the ignition key doesn’t affect its cargo space: it remains continuously locked. If needed, a vehicle’s cargo space could be opened remotely via fleet management software. If a transponder is stolen, a vehicle’s readers can be reprogrammed to not recognise the transponders. Fleet management and vehicle tracking Vehicles are also equipped with GPS transmitters that update fleet software with vehicle locations and routes Vehicles are also equipped with GPS transmitters that update fleet software with vehicle locations and routes. The fleet software’s online tracking and route reporting also provides cargo companies a powerful fuel control ability that can reduce fleet costs. “This system has significantly increased drivers’ security at work while reducing costs caused by theft”, notes Bo Schønning, CEO, Evotec ApS. “Fuel costs have also been reduced, as the cars aren’t left idling anymore. It is easier to control the fleet, and our customers can also follow the quality of deliveries with this system”, he continues.” RFID technology Founded in 1989, Idesco is an experienced company in the field of RFID technology. From the very beginning, Idesco was a pioneer in using RFID, deploying it for identification in industrial applications. Down through the years Idesco continued expanding its reputation as a pioneer provider by innovating numerous technological alternatives and multiple technologies for a variety of different application areas. Every day, Idesco devices collect data and enhance security for a variety of access control, vehicle identification, logistics and inventory control systems.
Vega Systems Inc. has announced that their Redundancy Management Framework (RMF) software has begun operations at a prominent airport in the Middle East. The airport surveillance software plugin for Milestone XProtect enhances video security. Typically, without the software system, video surveillance down-times at critical infrastructure locations have the potential to create security loopholes. Vega Systems' RMF reduces live video disruption to milliseconds during server failure episodes while simultaneously providing uninterrupted access to all archived footage. This, along with other beneficial features, mitigates the impact of server failures on security. Vega Systems' RMF RMF is a novel, few-to-all approach towards enhancing XProtect Recording Server Redundancy through dual recording. A few redundant servers can handle concurrent failures of all primary servers. Offering a live view recovery almost instantaneously following the recording server failure, the system works two orders of magnitude faster than fail-over recording. RMF is a result of collaboration between Vega Systems Inc in San Jose, California, Sunjin Infotech based in Seoul, South Korea, and Milestone Systems' Middle East offices. The product is a plug-in framework for the Canon subsidiary Milestone Systems' XProtect software.
Jutting up to a height of 126 meters, the 36-story Prime Tower is Zurich’s tallest building and number two in Switzerland. Its 40,000 square meters of floor space can accommodate more than 2,000 workplaces. It is striking with its futuristic architecture and dark green reflective exterior. The tower’s impressive details include a 10-meter-high entrance hall and the CLOUDS bar and restaurant on the top floor boasting an unmatched view far out across the surrounding landscape. Bosch networked security solution The operator relies on Bosch to keep the building safe and secure. And to meet the Prime Tower’s unique requirements, the company’s experts recently implemented a modernisation project. One of the new system’s technical highlights is a combination of electronic and biometric access control. “Our owner, the firm of Swiss Prime Site Immobilien AG, attaches great importance to monitoring who exactly is inside the building at all times,” explained Annika Hammes, who heads the trustee department at Wincasa, a building services outfit that was contracted to design and execute the solution. Electronic and biometric access control Error-free biometric identification is accomplished by reading the vein patterns on the backs of people’s hands Error-free biometric identification is accomplished by reading the vein patterns on the backs of people’s hands. This is done contactlessly for very easy, comfortable use. A total of 120 hand vein readers have been installed in the building and connected to the controllers of the eight elevators. Once employees and guests have been biometrically registered, they board lifts that automatically take them to the right floors. Encrypted ID cards are used to access the rental units, thereby making sure that people can only enter zones for which they have been authorised. All relevant security information is collected in a management system so that the responsible employees always have everything in view and can respond quickly when there is a need. Bosch handled everything for this project: advising the client, and then planning and implementing the system. The modifications were made without interrupting use of the building, which was a major challenge not only for the project team, which therefore had to work very swiftly, but also for the tenants themselves. “This called for very close cooperation between the Bosch team and the mixed-use site management (MUSM) team of Wincasa AG, which met the requirements for continued building use while the work was ongoing,” explained Hammes.