Electronic security systems
As part of its 50th anniversary celebration Viking Electronics is revealing a brand mascot named “Vin”. Vin is a tough but fun representation of the Viking brand and the 500+ products that bear its name. Viking Electronics “We’re grateful for the opportunity to serve the security and communications industry for 50 years. We wanted to celebrate this milestone with a fun and personable representation of Viking Electronics. Vin represents the tough and battle-tested legacy...
Matrix, global manufacturer of enterprise-grade telecom and security solutions, is participating in the India Africa ICT Expo 2019, Kigali, Rwanda from 5th to 6th August 2019. India Africa ICT Expo is one of the best platforms to have business interactions and create strategic alliances. This year, Matrix will showcase its latest Telecom, IP video surveillance and people mobility management solutions. ETERNITY NENX communication At the event, Matrix will highlight ETERNITY NENX, newly launched...
42Crunch, API security pioneer and creator of the industry’s first API Firewall, announces the latest release of its API security platform with full support for Kubernetes environments. This new solution allows organisations to easily automate API security across Kubernetes environments – enabling the zero-trust architecture needed to protect each microservice, and scale without risk. The rapid adoption of microservices architectures and Kubernetes lead to proliferation of APIs expo...
Smarter Security, the intelligent entrance controls company, has announced new optical technology that reduces the risk of “sidegating” when two people attempt unauthorised side-by-side entry through a turnstile. Layered security strategy Jeff Brown, Chief Executive Officer at Smarter Security, says “Security teams must approach insider threats and collusion with a layered security strategy that starts at the front lobby. This innovative optical turnstile technology available...
Using AI to bring focus to security, Avigilon Corporation, a Motorola Solutions company, has announced that it will once again be showcasing some of its latest and most innovative products and technologies at GSX 2019. Avigilon will showcase the next generation of video analytics, artificial intelligence, access control and cloud solutions, as well as some of the integrations with Motorola Solutions. Cutting-edge video analytics and AI Avigilon will be demonstrating how these latest technologi...
Wolverhampton integrated perimeter, security and event overlay fencing specialist Zaun Limited is the latest company to renew its membership with Secured by Design (SBD), the national police crime prevention initiative. Perimeter protection solutions Zaun is a private British company, founded in 1996, and with regional offices in France and Dubai. Zaun offers a complete service from initial site survey through to manufacture in the UK and distribution globally to a host of countries. Both thei...
The Kwikset brand of Spectrum Brands, Inc. – Hardware & Home Improvement Division, announces the launch of SmartCode 955. Functioning as a commercial grade electronic lever, SmartCode 955 provides advanced security, strength and durability. It is the first commercial grade electronic lever from Kwikset - U.S. door hardware manufacturer - designed to serve the security needs of facility managers, residential and commercial property owners, and small business owners. SmartCode 955 electronic lever Kwikset has been making homeowners feel safe since 1946 and now, with the introduction of SmartCode 955, Kwikset brings that same commitment to commercial and residential property owners, facility managers and small business owners. SmartCode 955 is a robust, secure access control solution that provides ultimate convenience and peace of mind. The versatile electronic lever holds up to 30 unique user codes for seamless access control and is intended for use on a wide variety of doors, including office doors, utility rooms, storage closets, vacation properties and more. The versatile electronic lever holds up to 30 unique user codes for seamless access control “SmartCode 955 is a standout commercial grade lever,” says Ali Atash, Senior Product Marketing Manager, Kwikset, Spectrum Brands Inc. – Hardware & Home Improvement Division. “Not only is it easy to use, install and manage, but it goes above and beyond to provide best-in-class security so people can trust their property is safe.” Kwikset patented SmartKey Security Featuring Kwikset patented SmartKey Security, SmartCode 955 protects against common and forced entry break-in methods like lock picking, lock bumping and torque attacks. Additionally, because of SmartKey Security, property owners and facility managers can reset their security by re-keying the locks quickly and easily; rendering lost, loaned or unreturned keys useless. SmartCode 955 is now available for purchase from select retailers. The commercial grade lever will be available in four finishes: Satin Nickel, Satin Chrome, Venetian Bronze and Iron Black.
Corps Security has won a three-plus-two-year contract to provide security services to French international bank BNP Paribas in London. The integrated security partnership involves manned guarding and event guarding services together with close protection services and systems monitoring from Corps’ monitoring centre in Glasgow. Manned guarding, event security BNP Paribas operates in 77 countries and is the world’s seventh largest bank by assets and properties. It was formed by the merger of Banque Nationale de Paris and Paribas in 2000, but its history stretches back to its first foundation in 1848 as a national bank. More than 40 Corps Security colleagues will work across four different BNP Paribas bank sites in the capital, including three in the City together with Harewood Avenue in Marylebone. BNP Paribas – Corps Security partnership Mike Bullock, CEO of Corps Security, said: “BNP Paribas was founded in 1848, just 11 years before Corps Security. We’re delighted to be working in partnership with one of the most established names in the banking world to deliver a truly innovative security offering.”
Cobalt Iron Inc., global provider of cloud-based data protection and security solutions, has announced that it has received a patent for its techniques related to electronic discovery (e-discovery) when searching for data in backup storage. Solidifying Cobalt Iron's advanced enterprise-data discipline capabilities and providing further proof of it, this patent represents the company's unique approach to managing backup data sets to facilitate e-discovery requests. As a result, CIOs, data custodians, compliance officers, systems administrators, backup administrators, and other IT professionals who use Cobalt Iron's Adaptive Data Protection platform can fulfill e-discovery requests more quickly and cost-effectively, with verifiable data discipline. Adaptive Data Protection platform Among the largest data targets for e-discovery searches in most enterprises are backup data sets In today's business and regulatory climate, it is essential for enterprises to be able to respond to e-discovery requests in a timely, comprehensive, and cost-efficient manner. Among the largest data targets for e-discovery searches in most enterprises are backup data sets, which typically contain copies and versions of all key corporate data. Performing e-discovery data searches on these enterprise backup data sets can be complex, time-consuming, and very costly. Enterprise data custodians struggle with balancing the demands of legal e-discovery requests against the challenges and costs of performing the searches. e-discovery in backup data This Cobalt Iron patent unveils novel techniques for facilitating electronic discovery in backup data including: - Extracting metadata from a backup data set for e-discovery - Efficiently identifying a subset of data within a backup data set associated with an e-discovery request - Performing data reduction on data targeted by an e-discovery request - Preserving a native file format and a chain of custody for each data item in a backup data set identified by an e-discovery request - Applying e-discovery and backup policies to data identified by an e-discovery request - Automatically copying e-discovery data that is about to be deleted or modified within a backup data storage e-discovery techniques "Cobalt Iron's new electronic discovery techniques bring insights and efficiencies to corporate data custodians, allowing them to manage e-discovery requests more effectively and introduce new levels of data discipline," said Richard Spurlock, CEO and founder of Cobalt Iron. "Preserving native file formats, maintaining a chain of custody, and applying e-discovery policy for each data item identified by an e-discovery request greatly simplifies the arduous tasks associated with regulatory compliance."
Sargent and Greenleaf, Inc. (S&G), a global manufacturer of high-security locks and locking systems for safes, vaults and high-security cabinets, has appointed Mark LeMire to Chief Executive Officer. LeMire comes to Sargent and Greenleaf with over 25 years of experience in executive management, new product development and engineering. Most recently, LeMire held leadership positions at Loma Systems and Buehler, both divisions of Illinois Tool Works (ITW). As a Global Director of Marketing and Product Development for Buehler, he managed and led the product portfolio encompassing lifecycle management, innovation and new product development. As CEO, LeMire will provide strategic leadership and day-to-day operational management for Sargent and Greenleaf, guiding the company to exceed its business objectives. Security and communication expert Mark will be a great asset as he takes on this role to help further S&G’s long-standing reputation" “We are proud to welcome Mark to the S&G executive team,” said Paul Bridwell, Managing Director at OpenGate Capital, who is responsible for overseeing all North American investments for the firm. “With his extensive product development knowledge, Mark will be a great asset as he takes on this role to help further S&G’s long-standing reputation as a trustworthy and dependable manufacturer of high-quality, innovative products.” OpenGate Capital acquired S&G in June 2019 and the business joins the firm’s global portfolio of lower middle market businesses operating across North America and Europe. Asset security “I am excited to work with the S&G team to build upon the successful and respected legacy that those before me have built over the last 160-plus years,” states LeMire. “As technology evolves, S&G will continue to provide products that secure our customers’ most valuable assets, while building even stronger customer relationships.” LeMire graduated from Purdue University with a B.S in Mechanical Engineering Technology and received his M.B.A in Marketing from DePaul University in Chicago.
SALTO Systems, a manufacturer of wire-free smart electronic locking solutions, and INTEREL, the award-winning hospitality guest room management solution, announces the integration of SALTO’s BLUEnet technology into INTEREL’s guest room control solutions, using BLE wireless radios to allow hotels to minimise their infrastructure investment, optimise energy consumption, and take advantage of SALTO’s next-generation products. The new SALTO and INTEREL BLE integration replaces traditional ZigBee with SALTO’s BLUEnet wireless – a future-focused Bluetooth Low Energy technology. INTEREL is one of the first guest room management solutions to integrate with SALTO’s BLUEnet Wireless Technology. Real-time control Our newest integration incorporates the most efficient and advanced technology" Hotels can now integrate seamlessly with a wide variety of SALTO wireless locks that bring intelligent and dependable automation for guest rooms and operating enhancements that provide the most reliable, cost-effective, and technologically-advanced guest room system. SALTO BLUEnet wireless is designed for doors where real-time control is required and can be installed as an independent system or can complement the SALTO Virtual Network (SVN). “We’re excited to continue to offer technologically-advanced solutions for the hospitality industry with leading guest room management partners like INTEREL,” said SALTO Vice President of Hospitality Sales Michael Cline. “Our newest integration incorporates the most efficient and advanced technology into guest room access control and energy management and is just another example of how SALTO and INTEREL continue to improve product offerings.” Online access control “Our integration with SALTO’s BLUEnet wireless is strongly in line with INTEREL’s dedication to the future of hospitality,” noted Florian Gallini, INTEREL CEO. “By incorporating the latest Bluetooth technology, INTEREL and SALTO are providing hotels with the opportunity to utilise the most efficient way to integrate best-in-class access control and energy management for the hospitality industry.” INTEREL and SALTO deliver advanced guest features and online access control functionality The integration provides secure room access control for guests and staff that works in tandem with in-room thermostats and controls to ensure that energy consumption – one of the top expenses for the hospitality industry – is minimised. Guest room management includes features such as controlling the temperature, lighting, curtains, and even requesting hotel services, with the touch of a button. The integrated solution - which can replace mechanical keys and proximity cards with smartphone-based access control technology - also can alert hotel staff when a room is occupied and can help them to respond quicker to guest requests. Additionally, INTEREL and SALTO deliver these advanced guest features and online access control functionality without additional infrastructure, reducing total cost of ownership for the hotel.
The Security Industry Association (SIA) has released the American National Standards Institute (ANSI)-approved ANSI/SIA CP-01-2019, a security systems standard for false alarm reduction features. The standard leverages technology, industry experience and common knowledge to pinpoint the causes of and decrease the frequency of false alarm dispatches, detailing recommended design features applicable to both residential and commercial properties protected by electronic security systems. The 2019 standard is a revision of ANSI/SIA CP-01 2014 and builds on the 2014 version in meaningful ways, including new guidance for handling informative signals and definitions for remote devices to reduce the frequency of false alarm dispatches and updated language throughout that minimises the dependence on the term ‘control panel’, ensuring increased applicability to innovative security system approaches. Significant reduction in false alarms CP-01-2019 is intended for use or reference by all security industry professionals“When CP-01 was first released, we saw a significant reduction in false alarms, but as technology advances, so must the standards and processes that help reduce false alarms,” said Joe Gittens, director of standards at SIA. “There is still a great deal of work to do industry-wide, but this release is a step forward, and we are excited to continue furthering the mission of eliminating false dispatches.” The effort to update this keystone standard was led by SIA’s Intrusion Subcommittee with valuable input from The Monitoring Association and the Electronic Security Association. Addressing both user- and equipment-caused false alarms, CP-01-2019 is intended for use or reference by all security industry professionals. Areas covered by ANSI/SIA CP-01-2019 include event recognition, information handling sequences and provisions for system layout testing, installer programming options and recommended test procedures to help determine compliance to the standard.
Public spaces in cities and suburbs are important places for community development and promoting outdoor recreation. These areas may include main streets, parks, promenades, band shells and fields. Such locations are often utilised by public event planners for community activities, including summer festivals, wintertime ice skating rink installations, music concerts and art fairs. As the year drew to a close, holiday and Christmas markets as well as major New Year’s Eve events, presented cities with constant public event security needs. The public nature of these events increases risks of incidents with high-speed vehicles that put attendees in danger. Fortunately, there are three ways for public space managers to prevent casualty-causing collisions and further promote the use of local public areas. Developing an effective action plan When strategising how to react to an alert, think about what time of the year and time of day the event is occurring It is important to have a plan developed before an incident or accident occurs. Warning systems, utilising doppler radar and digital loop technologies, alert guards to abnormal vehicle velocity changes in the surrounding area. Managers of public areas should organise a meeting with public safety authorities and local agencies to discuss what must immediately occur when a high-speed vehicle is approaching a public event. When strategising how to react to an alert, think about what time of the year and time of day the event is occurring. Having such a reaction plan in place combines technology and strategic planning to ensure everyone is on the same page to effectively target a threat and promote overall event safety. Securing public areas Ideally, there will be no need to implement a well-conceived action plan. After all, taking preventive measures to secure public areas where events take place is important to keep people safe from accidental vehicle collisions and intentional attacks. Protect attendees by clearly separating pedestrian and vehicle locations using security devices such as – Barricades Portable barriers Bollards Install guard booths Avoid the risk of vandalism and theft, making sure people are safe when walking back to the cars at night by keeping parking areas illuminated with flood lights. Install guard booths with employees who monitor activity in the parking area and who are prepared to react if an alert is triggered. Furthermore, prevent accidental collisions by clearly marking the parking area with informative warning signs and using barricades to direct traffic. These three tips can be used by public area managers to promote security at the next community event. Additionally, the technologies used to secure an event can also be used as infrastructure for year-round security. Installing gates that shut when the public space is closed or using aesthetically pleasing bollards are steps any public area manager can take to promote community safety.
With the coming of a New Year, we know these things to be certain: death, taxes, and… security breaches. No doubt, some of you are making personal resolutions to improve your physical and financial health. But what about your organisation’s web and mobile application security? Any set of New Year’s resolutions is incomplete without plans for protecting some of the most important customer touch points you have — web and mobile apps. Every year, data breaches grow in scope and impact. Security professionals have largely accepted the inevitability of a breach and are shifting their defense-in-depth strategy by including a goal to reduce their time-to-detect and time-to-respond to an attack. Despite these efforts, we haven’t seen the end of headline-grabbing data breaches like recent ones affecting brands such as Marriott, Air Canada, British Airways and Ticketmaster. App-level threats The apps that control or drive these new innovations have become today’s endpoint The truth of the matter is that the complexity of an organisation’s IT environment is dynamic and growing. As new technologies and products go from production into the real world, there will invariably be some areas that are less protected than others. The apps that control or drive these new innovations have become today’s endpoint — they are the first customer touch point for many organisations. Bad actors have realised that apps contain a treasure trove of information, and because they are often left unprotected, offer attackers easier access to data directly from the app or via attacks directed at back office systems. That’s why it’s imperative that security organisations protect their apps and ensure they are capable of detecting and responding to app-level threats as quickly as they arise. It’s imperative that security organisations protect their apps and ensure they are capable of detecting and responding to app-level threats as quickly as they arise In-progress attack detection Unfortunately, the capability to detect in-progress attacks at the app level is an area that IT and security teams have yet to address. This became painfully obvious in light of the recent Magecart attacks leveraged against British Airways and Ticketmaster, among others. Thanks to research by RiskIQ and Volexity, we know that the Magecart attacks target the web app client-side. During a Magecart attack, the transaction processes are otherwise undisturbed Attackers gained write access to app code, either by compromising or using stolen credentials, and then inserted a digital card skimmer into the web app. When customers visited the infected web sites and completed a payment form, the digital card skimmer was activated where it intercepted payment card data and transmitted it to the attacker(s). Data exfiltration detection During a Magecart attack, the transaction processes are otherwise undisturbed. The target companies receive payment, and customers receive the services or goods they purchased. As a result, no one is wise to a breach — until some 380,000 customers are impacted, as in the case of the attack against British Airways. The target companies’ web application firewalls and data loss prevention systems didn’t detect the data exfiltration because those controls don’t monitor or protect front-end code. Instead, they watch traffic going to and from servers. In the case of the Magecart attacks, the organisation was compromised and data was stolen before it even got to the network or servers. Today’s proven obfuscation techniques can help prevent application reverse engineering, deter tampering, and protect personal identifiable information and API communications Best practice resolutions The Magecart attacks highlight the need to apply the same vigilance and best practices to web and mobile application source code that organisations apply to their networks—which brings us to this year’s New Year’s resolutions for protecting your app source code in 2019: Alert The key to success is quickly understanding when and how an app is being attacked First, organisations must obtain real-time visibility into their application threat landscape given they are operating in a zero-trust environment. Similar to how your organisation monitors the network and the systems connected to it, you must be able to monitor your apps. This will allow you to see what users are doing with your code so that you can customise protection to counter attacks your app faces. Throughout the app’s lifecycle, you can respond to malicious behavior early, quarantine suspicious accounts, and make continuous code modifications to stay a step ahead of new attacks. Protect Next, informed by threat analytics, adapt your application source code protection. Deter attackers from analysing or reverse engineering application code through obfuscation. Today’s proven obfuscation techniques can help prevent application reverse engineering, deter tampering, and protect personal identifiable information and API communications. If an attacker tries to understand app operation though the use of a debugger or in the unlikely event an attacker manages to get past obfuscation, threat analytics will alert you to the malicious activity while your app begins to self-repair attacked source code or disable portions of the affected web app. The key to success is quickly understanding when and how an app is being attacked and taking rapid action to limit the risk of data theft and exfiltration. Protecting encryption keys is often overlooked but should be considered a best practice as you forge into the new year with a renewed commitment to app security to ensure your organisation’s health and well-being in 2019 Encrypt Finally, access to local digital content and data, as well as communications with back office systems, should be protected by encryption as a second line of defense, after implementing app protection to guard against piracy and theft. However, the single point of failure remains the instance at which the decryption key is used. Effective encryption requires a sophisticated implementation of White-Box Cryptography This point is easily identifiable through signature patterns and cryptographic routines. Once found, an attacker can easily navigate to where the keys are constructed in memory and exploit them. Effective encryption requires a sophisticated implementation of White-Box Cryptography. One that combines a mathematical algorithm with data and code obfuscation techniques transforming cryptographic keys and related operations into indecipherable text strings. Protecting encryption keys is often overlooked but should be considered a best practice as you forge into the new year with a renewed commitment to app security to ensure your organisation’s health and well-being in 2019. Protecting applications against data breach According to the most recent Cost of a Data Breach Study by the Ponemon Institute, a single breach costs an average of $3.86 million, not to mention the disruption to productivity across the organisation. In 2019, we can count on seeing more breaches and ever-escalating costs. It seems that setting—and fulfilling—New Year’s resolutions to protect your applications has the potential to impact more than just your risk of a data breach. It can protect your company’s financial and corporate health as well. So, what are you waiting for?
In the age of massive data breaches, phishing attacks and password hacks, user credentials are increasingly unsafe. So how can organisations secure accounts without making life more difficult for users? Marc Vanmaele, CEO of TrustBuilder, explains. User credentials give us a sense of security. Users select their password, it's personal and memorable to them, and it's likely that it includes special characters and numbers for added security. Sadly, this sense is most likely false. If it's anything like the 5.4 billion user IDs on haveibeenpwned.com, their login has already been compromised. If it's not listed, it could be soon. Recent estimates state that 8 million more credentials are compromised every day. Ensuring safe access Data breaches, ransomware and phishing campaigns are increasingly easy to pull off. Cyber criminals can easily find the tools they need on Google with little to no technical knowledge. Breached passwords are readily available to cyber criminals on the internet. Those that haven’t been breached can also be guessed, phished or cracked using one of the many “brute-force” tools available on the internet. It's becoming clear that login credentials are no longer enough to secure your users' accounts. Meanwhile, organisations have a responsibility and an ever-stricter legal obligation to protect their users’ sensitive data. This makes ensuring safe access to the services they need challenging, particularly when trying to provide a user experience that won’t cause frustration – or worse, lose your customers’ interest. After GDPR was implemented across the European Union, organisations could face a fine of up to €20 million, or 4% annual global turnover Importance of data protection So how can businesses ensure their users can safely and simply access the services they need while keeping intruders out, and why is it so important to strike that balance? After GDPR was implemented across the European Union, organisations could face a fine of up to €20 million, or 4% annual global turnover – whichever is higher, should they seriously fail to comply with their data protection obligations. This alone was enough to prompt many organisations to get serious about their user’s security. Still, not every business followed suit. Cloud security risks Breaches were most commonly identified in organisations using cloud computing or where staff use personal devices According to a recent survey conducted at Infosecurity Europe, more than a quarter of organisations did not feel ready to comply with GDPR in August 2018 – three months after the compliance deadline. Meanwhile, according to the UK Government’s 2018 Cyber Security Breaches survey, 45% of businesses reported breaches or attacks in the last 12 months. According to the report, logins are less secure when accessing services in the cloud where they aren't protected by enterprise firewalls and security systems. Moreover, breaches were most commonly identified in organisations using cloud computing or where staff use personal devices (known as BYOD). According to the survey, 61% of UK organisations use cloud-based services. The figure is higher in banking and finance (74%), IT and communications (81%) and education (75%). Additionally, 45% of businesses have BYOD. This indicates a precarious situation. The majority of businesses hold personal data on users electronically and may be placing users at risk if their IT environments are not adequately protected. Hackers have developed a wide range of tools to crack passwords, and these are readily available within a couple of clicks on a search engine Hacking methodology In a recent exposé on LifeHacker, Internet standards expert John Pozadzides revealed multiple methods hackers use to bypass even the most secure passwords. According to John’s revelations, 20% of passwords are simple enough to guess using easily accessible information. But that doesn’t leave the remaining 80% safe. Hackers have developed a wide range of tools to crack passwords, and these are readily available within a couple of clicks on a search engine. Brute force attacks are one of the easiest methods, but criminals also use increasingly sophisticated phishing campaigns to fool users into handing over their passwords. Users expect organisations to protect their passwords and keep intruders out of their accounts Once a threat actor has access to one password, they can easily gain access to multiple accounts. This is because, according to Mashable, 87% of users aged 18-30 and 81% of users aged 31+ reuse the same passwords across multiple accounts. It’s becoming clear that passwords are no longer enough to keep online accounts secure. Securing data with simplicity Users expect organisations to protect their passwords and keep intruders out of their accounts. As a result of a data breach, companies will of course suffer financial losses through fines and remediation costs. Beyond the immediate financial repercussions, however, the reputational damage can be seriously costly. A recent Gemalto study showed that 44% of consumers would leave their bank in the event of a security breach, and 38% would switch to a competitor offering a better service. Simplicity is equally important, however. For example, if it’s not delivered in ecommerce, one in three customers will abandon their purchase – as a recent report by Magnetic North revealed. If a login process is confusing, staff may be tempted to help themselves access the information they need by slipping out of secure habits. They may write their passwords down, share them with other members of staff, and may be more susceptible to social engineering attacks. So how do organisations strike the right balance? For many, Identity and Access Management solutions help to deliver secure access across the entire estate. It’s important though that these enable simplicity for the organisation, as well as users. Organisations need an IAM solution that will adapt to both of these factors, providing them with the ability to apply tough access policies when and where they are needed and prioritising swift access where it’s safe to do so Flexible IAM While IAM is highly recommended, organisations should seek solutions that offer the flexibility to define their own balance between a seamless end-user journey and the need for a high level of identity assurance. Organisations’ identity management requirements will change over time. So too will their IT environments. Organisations need an IAM solution that will adapt to both of these factors, providing them with the ability to apply tough access policies when and where they are needed and prioritising swift access where it’s safe to do so. Importantly, the best solutions will be those that enable this flexibility without spending significant time and resource each time adaptations need to be made. Those that do will provide the best return on investment for organisations looking to keep intruders at bay, while enabling users to log in safely and simply.
All schools and universities need to address three different levels of security when considering access control. The first level is the least vulnerable of the three and concerns the perimeter entry and exit points. Here, incorporating some level of electronic access control should be a consideration, whether that is a combination of electronic and mechanical door hardware, or a complete electronic solution. An electromechanical solution, such as electric strikes, can be beneficial in the effectiveness of perimeter security as they provide greater visitor management and traffic control. Data capture form to appear here! Facilitating visitor entry Electric strikes are able to control access via keypads, cards and proximity readers Electric strikes are able to control access via keypads, cards and proximity readers. When combined with mechanical locks, they provide the benefits of unrestricted egress. The second level is more vulnerable than the first and relates to the point at which people are screened before entering the interior of the school. As this area will be designed primarily to facilitate visitor entry, it will require adequate monitoring of access control. To do this, the latches used on access-controlled egress doors can be electronically controlled from the reception area or school office. Exit or entry doors can be opened by a push from the inside and, if the entry area is also an emergency exit, electronically-powered panic bars can also provide an effective solution. More and more schools are installing visitor management systems to control who can and cannot get into the building. Access control solutions Finally, the third level – and the most vulnerable – refers to the core of the school that both students and staff occupy. These are internal hallways, corridors, stairwells, entry points and restricted areas (such as staff lounges and science laboratories). These are the areas where a school must foster the safest environments for pupils, while also providing protection as they often contain confidential information, expensive equipment or chemicals. The access control system is linked to all doors within the school building A number of different access control solutions are beneficial, whether electronic, mechanical or a combination of the two. For electronic solutions, there are two options available: remote or centralised systems. With remote lockdown systems, individual locks are activated by remote control within proximity to the door. With integrated centralised systems, the access control system is linked to all doors within the school building and locked at the touch of a button. Prevent unauthorised persons Mechanical solutions, which include a cylinder lock and key, are also suitable for places such as classrooms, as doors can be locked externally with a key or internally with a thumbturn, to prevent unauthorised persons from entering. At one university in the United States, a smart RFID wire-free access control solution has been installed At one university in the United States, a smart RFID wire-free access control solution has been installed. The SALTO Virtual Network (SVN) wire-free system pushes and pulls data from the university’s ‘hot spot’ entry points to all their offline locks. By choosing a wire-free solution, the university only had to run wires to their exterior doors. The interior doors do not require wiring as these locks are stand-alone wire-free locks. Student accommodation block Securing access to student accommodates is another concern among colleges. One university in the United Kingdom wanted a security system to protect their student accommodation; in particular, a keyless system that would grant 24/7 access to its students while also enabling campus security to monitor these activities remotely. They chose Vanderbilt’s ACT365, which keeps audit trails by monitoring and recording fob activity. When another English university sought electronic locks for its newest student accommodation block, it turned to Aperio wireless locking technology from ASSA ABLOY. They used the wireless locks to extend the Gallagher Command Centre access control system to a student residence with 231 en suite rooms separated into flats for between 8 and 13 postgraduates. Aperio wireless locks are battery-powered and use less energy than wired magnetic security locks.
Krowd is an app that connects people together based on geography; that is, if they are at the same place at the same time. Users sign into the app using the local WiFi, identify themselves by username, and are placed immediately in a group chat comprising anyone else at the location who has signed into the app. An enhancement of the Krowd app, known as Krowdsafe, leverages the technology to achieve and promote security and safety. Specifically, Krowdsafe enables users to interact directly with security personnel at a public place to report any crimes or security infractions and to enable rapid response. Think of it as “crowdsourcing” security – the app provides more eyes and ears to keep a venue safer. In effect, it enables each of its users to be an extension of the security presence at a venue or event. Krowdsafe improves crowd resilience. “Crowdsourcing” security – the app provides more eyes and ears to keep a venue safer Krowdsafe security app Krowdsafe also opens a channel of communication for the security team to provide ad-hoc security information reminders or messages. Krowdsafe can be used at a variety of venues, including stadiums, transport hubs, office blocks, retail malls, college campus and major events organisers. The app does not access identities, violate privacy, or track the movements of users. Other app users only know the information fellow users disclose. Still, group chats, one-on-one engagement, and other social media interactions can ensue, whether about a favourite football team or the excitement of a rock concert. The system fosters digital engagement that centers around a physical space. Krowdsafe applies those capabilities to promoting better security. Enhancing crowd safety and management The elements of Krowdsafe beat out 67 competitors to win the Defence & Security Accelerator Competition to Innovate Crowd Safety, launched by the UK Home office after terror events in 2017. Key areas of interest in the competition were to improve the detection of threats from explosives and weapons within a range of crowded places with high footfall and so reduce the chance of future attacks. Krowdsafe provides a prioritised, readily accessible and simple way for members of a crowd to communicate with a security team charged with keeping them safe. The £250,000 government award has helped the product move forward commercially at a faster pace. Krowdsafe app does not access identities, violate privacy, or track the movements of users Krowdsafe users can tap a red button, prominent on the Krowd app, that says “Report.” They may then choose from a listing of common threat types – from suspicious activity or unattended activity to medical emergency or fire services. The list is configurable by venue and corresponds to any specific threat models. The list corresponds to the nature of any situation security wants to address, such as “anti-social behavior” at a football club. Users in the crowd can anonymously report racist chanting, for example. In a children’s sporting event, the app can be used to facilitate lost-and-found children. If a child gets lost, a user can share a photo with the security team, who can alert the “public” (other Krowdsafe users) and find the child within minutes or seconds. Encrypted identifier code A user taps the “Report” button, selects an issue, and an alert goes directly to the security team A user taps the “Report” button, selects an issue, and an alert goes directly to the security team, who can respond because they have the encrypted identifier code from which the message came. For that point, the security team communicates one-on-one with the user, who can then choose to share their current location with the security team to facilitate response. (The “legitimate interest” of knowing the location negates any privacy concerns.) Once location is enabled, the security team can follow the precise positioning of threats on a map, using GPS and other technologies, or even on a three-dimensional digital map of a multi-story building. Another security benefit of Krowdsafe is prevention. Event organisers and venue managers can promote the use of Krowdsafe on posters or in announcements throughout the venue. Additional eyes and ears are the equivalent of CCTV coverage on every inch of a venue and use of the system makes the environment more hostile to mischievous, malicious and/or terrorist activity. In effect, bad guys will go somewhere else. Enhancement to Krowd app Krowdsafe is an enhancement to the Krowd app, which has been around for a couple of years and is available in app stores for iOS and Android. The app approximates in the digital world the experience of being a stranger in the crowd in the real world. Users can join a conversation based on their username, and then disclose to the crowd whatever they wish (or not). Event managers/organisers can promote hashtags to help identify others in the crowd (such as #ManUnited to identify fans of the same football team). In general, users can identify themselves (voluntarily) according to common interests using hashtags. “Krowd is a group chat that connects people together at the same place at the same time in a group, but without anyone having to disclose personal information,” says Geoff Revill, Managing Director, Krowdthink Ltd. “You have a digital presence in the same place with other people at the same time.” Wireless connectivity Users connect initially into the system through WiFi, access to which serves to approximate presence at a venue Users connect initially into the system through WiFi, access to which serves to approximate presence at a venue. Once someone signs in, information about them is merely a grouping of “hash” numbers, which are used to identify them as they communicate with others in the location. However, the “hashing” cannot be hacked to find a user’s location, thus ensuring greater privacy. Because Krowd does not collect personal data (which is a revenue source for most social media companies), the company generates revenue by providing the service to venue owners who wish to interact with and manage a crowd. Data security Location data is considered sensitive under General Data Protection Regulation (GDPR), and tracking locations can help to identify where someone lives, works, who they associate with, etc. By not tracking location, Krowd avoids the related privacy issues. After initially signing in on WiFi, Krowd communications can also use 2G, 3G and other cellular networks in addition to WiFi. Addressing privacy concerns is essential to encouraging involvement in the Krowd app, and in Krowdsafe. “If you want people to participate in keeping the crowd safe, you have to get their trust and respect them, that’s a building block behind the behavioral science,” says Revill. By not tracking location, Krowd avoids the related privacy issues Privacy protection Because Krowd users remain anonymous (except for the information they choose to share), user data is not collected (and/or sold or used for future marketing purposes). Krowd’s paying customers are event venues and public places that provide the Krowd service and can promote their commercial messages or provide other information to their populations while on site. Krowdsafe can provide immediate security benefits to a venue. Even if only 25 staff members use the app in a given location, for example, that’s 25 more sets of eyes and ears to help the security department. In a retail mall, if the staffs of 200 tenant businesses use the app, that’s another 500 or so people watching out for security. Among the general public, use of the app can be promoted in customer newsletters, or by posting group discussions on big screens around a venue. Wide marketing scope It enables members of a crowd to report any broken doors, water leaks or blocked toilets Security is a secondary benefit for some Krowd users, who are drawn to the app because of marketing opportunities, such as the ability to provide discounts or promotional offers to customers while they are on site. The app also encourages social media interaction, while maintaining the venue’s ability to “manage” the crowd by moderating any discussions. The Krowd app also provides management benefits to a venue. For example, it enables members of a crowd to report any broken doors, water leaks or blocked toilets. In general, the app helps to promote a better brand experience for the customer. Incident management One of the UK government’s concerns about Krowdsafe was its possible use by terrorists or other to cause incidents in a public venue. Think of the case of Olly Murs, a U.K. singer, whose mistaken tweets about hearing gunshots caused a brief panic at a department store on a busy shopping day. Might Krowd be uses similarly by a terrorist or other evil-doer to cause chaos or a distraction? No, says Revill, who points to a higher level of control over content exchanged in Krowd versus Twitter, for example. The security team can censor content or limit its propagation. They can also disable or block a user from communicating on the app. Messages containing dangerous or troubling content, such as racist terms, can trigger alerts to enable security teams to respond quickly.
Among the cloud’s many impacts on the physical security market is a democratisation of access control. Less expensive cloud systems are making electronic access control affordable even to smaller companies. Cloud-based access control With the growing cloud-based access control market, integrators can find more opportunities in small businesses and vertical markets that typically wouldn’t be on the radar of their sales team. Large upfront costs for a server, software and annual licensing previously made a typical electronic card access system cost-prohibitive. With cloud access, integrators can offer less expensive upfront costs with low monthly subscription fees that cover all software updates, database backups, security patches and more. The benefit for the integrator is recurring revenue that increases their profitability The benefit for the integrator is recurring revenue. While helping clients save money on server, software and IT infrastructure costs, integrators secure recurring revenue that increases their profitability. Building recurring revenue not only provides cash flow but also keeps a manufacturer’s name on the top of the minds of customers and leads to additional sales. Mobile access Continued investment in mobile access and cloud technology is essential to meet the access control needs of the booming multi-family housing and shared office-space markets. Managing access control for end users and residents in these verticals is challenging. Use of mechanical keys in these environments is too expensive and time consuming; it’s necessary to deploy wireless, technologically-advanced solutions. Managing access control for end users in different verticals is challenging, thus it’s necessary to deploy wireless, technologically-advanced solutions While the security industry has traditionally been slow to adopt IT technologies, the cloud is the exception. Large IT industry cloud players such as Amazon Web Services, Microsoft, and Google are being used by security industry professionals to provide systems that are easier to install, maintain, and administer and are far more secure and less expensive than a customer can provide on their own. Advancing cloud technology Cloud technologies give people access through their mobile phones and other devices Enterprise customers increasingly want to be able to use smartphone apps to open doors, authenticate to enterprise data resources or access a building’s applications and services. They seek to create trusted environments within which they can deliver valuable new user experiences; in effect, there is a demand for “digital cohesion.” Cloud technologies are a key piece of the solution. They give people access through their mobile phones and other devices to many new, high-value experiences. At the same time, they help fuel smarter, more data-driven workplace environments. With the arrival of today’s identity- and location-aware building systems that recognise people and use deep learning analytics to customise their office environment, the workplace is undergoing dramatic change. Application programming interfaces Cloud-based platforms and application programming interfaces (APIs) will help bridge biometrics and access control in the enterprise, overcoming previous integration hurdles while providing a trusted platform that meets the concerns of accessibility and data protection in a connected environment. Cloud-based platforms, APIs will help bridge biometrics and access control in the enterprise “A big growth driver for the cloud is demand from enterprises that no longer look at access control simply for securing doors, data and other assets,” says Hilding Arrehed, Vice President of Cloud Services, HID Global, one of our Expert Panelists. “They want to create trusted environments within which they can deliver valuable new experiences to users. Cloud technologies make this possible by enabling people to use mobile devices for new applications and capabilities.”Cloud-based platforms and application programming interfaces (APIs) will help bridge biometrics and access control in the enterprise Cloud-based platforms For example, cloud-based platforms will provide the backbone for quickly adding complementary applications like biometrics, secure print, virtual photo IDs, and vending as well as other access control use cases and emerging permission-based capabilities yet to be developed. “Cloud-based platforms facilitate new managed service models for mobile IDs and secure issuance and will fuel simplified development environments and easy integration into vertical solutions,” says Arrehed. “They have the potential to give organisations greater flexibility to upgrade and scale security infrastructure, improve maintenance and efficiency, and accelerate ROI.”
ASSA ABLOY Project Specification Group, a unit of ASSA ABLOY Opening Solutions UK & Ireland, has partnered with ColladoCollins Architects to leverage the benefits of its Openings Studio BIM software to make significant time and cost savings on the former Shredded Wheat factory project. The project, a thriving new commercial and residential development based in Welwyn Garden City in Hertfordshire, will consist of over 643 units and more than 7,100 doorsets. Encompassing a sensitive refurbishment of former Shredded Wheat factory buildings, the project is part of a huge development that includes over 1,200 units in total. Opening Studio BIM software Openings Studio is a BIM software tool that was developed to significantly improve the process of door scheduling Using ASSA ABLOY’s Openings Studio software, ColladoCollins has been able to save weeks of time and manpower when specifying and managing ironmongery schedules for the project. Openings Studio is a BIM software tool that was developed to significantly improve the process of door scheduling, visualisation and more. Users are able to focus on the design, installation and management of door openings – all within an information-rich environment. Easy door installation and management Specifying as many as 7,100 doorsets can be an extremely time-intensive task. Using traditional methods, information would be provided in countless separate schedules and documents, which would require a Revit operator to manually create and update, with someone else to then check for errors. Then, as the project develops, information may become out of date and therefore require individual doors to be flagged up and re-sent for advice. The time and manpower that goes into this process is not only inefficient, but also ineffective, with the prospect of human error still a prominent possibility. Software integration For these reasons, ColladoCollins began to work closely with ASSA ABLOY Project Specification Group to integrate Openings Studio with their own Revit model, allowing the firm to be able find all the relevant information and ironmongery schedules in a single place, delivered in one document. Martin Russell, Project Leader at ColladoCollins, comments: “Moving to BIM was a natural progression for us, and as market leaders, ASSA ABLOY was the obvious choice to assist us.” Integration of door hardware ASSA ABLOY's inputs have vastly improved the integration of door hardware within the former Shredded Wheat Factory project"“Utilising the advice from Eric Spooner, BIM Manager at ASSA ABLOY, as well as the Openings Studio software itself, we have managed to free up our team from tirelessly working through door hardware schedules. This means we can focus on architecture and aesthetics, knowing the specification and integration of the ironmongery is in hand and will seamlessly feedback into the project within the allotted timescales. “The information and advice provided by ASSA ABLOY has vastly improved the integration of door hardware within the former Shredded Wheat Factory project. With a project of this size, sharing information can be quite a task – from large file sizes to sourcing relevant information. The prompts from Openings Studio make transforming information clear, concise and generally easy to follow. BIM software tools “At ColladoCollins, we pride ourselves on designing and delivering high quality buildings with a sensitive, sustainable approach, utilising a strong design ethos with a strong technical background whilst understanding the commercial challenges facing our clients. Openings Studio enhances our ability to provide this service and we would seize the opportunity to work with ASSA ABLOY on similar projects in the future.” Eric Spooner, BIM Manager at ASSA ABLOY, adds: “As Openings Studio flags up any queries and automatically updates in live time, it is easy to see any discrepancies and changes within the schedules. By re-sharing the model information, it then also allows us at ASSA ABLOY to view the changes and feedback to architects – allowing us to work in close collaboration at every stage of a project.”
The University of Birmingham educates over 30,000 students, with more than 6,000 doors providing access to student accommodation. Gallagher’s integrated access control solution is responsible for providing operational continuity and creating a safe and secure environment for residents. The University recently completed its new state-of-the-art student accommodation development, Chamberlain, which consists of a 19-storey tower and three low-rise blocks. An essential requirement was an integrated access control system, reducing the need for keys. Timothy Owen, General Manager of Student Accommodation at the University says, “We wanted to move away from using keys as students are prone to losing them and trying to manage thousands of locks and associated keys was a constant administration and financial drain.” In order to minimise the complexity of managing a new system, the University required a solution that integrated with, or was an extension of, their existing campus access control and accommodation management systems. “We need to maintain control over access to our buildings, while ensuring a duty of care to our residents and staff so that they can go about their business as required,” says Timothy. “Fundamentally, we needed a system that gives both us and our resident’s confidence in the security of the accommodation.” Gallagher Command Centre, together with the Aperio wireless locking technology, was selected as the University’s choice Aperio wireless locking technology A large and complex estate with buildings of different construction and age, the University needed a solution that was flexible enough to accommodate their unique requirements. Gallagher Command Centre, together with the Aperio wireless locking technology by ASSA ABLOY Access Control, was selected as the University’s preferred choice, meeting their security needs in a cost effective way while still delivering to the overall specification. Timothy says, “The completion of our new state of the art Chamberlain development was extremely close to the date of the first student arrival, so the team had to be dedicated and work flexibly to ensure it was ready in time – which it was.” Gallagher Command Centre integration The Gallagher Command Centre integration allows for the access key and student ID to be combined into one card, offering a number of benefits to both students and staff. Previously the accommodation arrival process required students to arrive at the University with their contracts and queue up so that a member of staff could sign them in manually and hand them the keys to their accommodation. From there students could head to their room. “Arrivals is always a busy time but with the help of the Gallagher solution we’ve not only improved the student experience but also the administration process,” says Timothy. “Now the student ID and accommodation key is encoded on to one card so it can be posted out in advance and access to the room automatically granted via the accommodation management system. Students no longer need to queue for keys, can get to their rooms instantly, and spend more time enjoying their arrival experience.” Secure, authorised access control The simple act of swiping an access card automatically checks the student in and an attendance report can be instantly generated The simple act of swiping an access card automatically checks the student in and a report can be generated to show who has arrived and who hasn’t, allowing staff to follow up accordingly. If the room is no longer required it can be quickly and easily re-allocated to another student, resulting in improved occupancy rates. Using Gallagher Command Centre together with the University’s accommodation management system allows staff to check on the well-being of students by monitoring the use of their access card. Student security and tracking The University also houses students under the age of 18, and one of the safeguarding requirements is that the University can monitor their whereabouts on a daily basis. Timothy adds, “This can be difficult to achieve with many students to track, but Gallagher Command Centre can easily confirm the time and location of our resident’s last door access, providing peace of mind that students who may be uncontactable are in fact on site.” University staff are also seeing positive improvements since the installation of the new system – particularly at the start of the year. The arrivals process is now less congested and more relaxed. The team have far fewer issues than with physical keys, enabling them to spend more time on the overall student experience. Since the installation of the first 800 bedrooms at Chamberlain, the University has already extended the system by a further 900 at Mason, with plans in place for an additional 1500 bedrooms this summer. Combined access and student ID card “Replacing keys with a combined access and student ID card has reduced our operational costs as we now have far fewer keys to purchase and store,” explains Timothy. “The student experience has improved and staff are now free to deal with urgent matters and offer a more personal service. We can easily create reports to help us audit access and have generally provided a much more modern and secure place to live and work.”
King’s College London, based in the centre of London in UK, is a world-leading university and a founding college of the renowned University of London. One of the oldest universities in England, it was established by King George IV and the Duke of Wellington in 1829, receiving its Royal Charter in the same year. Campus security and access control King’s College London had been using a variety of access control products to control and manage security across its multiple campuses. Its key requirement was a standardised access control system that could operate college-wide and be scaled to include new buildings and establishments. Also, considering the college campus is based in the heart of London, the threat of terrorism and active shooter incidents is a major concern for KCL, especially in more recent times where attacks have taken place extremely close to college buildings and campus. With thousands of students and employees to protect, the need to adopt the latest security features is essential in order for the college to keep all areas secure, in particular student accommodation, high security labs and research facilities. Gallagher access control solution Gallagher’s access control products were easily integrated with King’s College’s existing systems With Gallagher technology already successfully deployed in isolation at the university’s Guy’s and Strand campuses, it made sense to select Gallagher as the access control platform of choice for the entire college. Gallagher’s access control products were easily integrated with King’s College’s existing systems, including staff and student databases, and sources for cardholder information. This included the college’s enterprise Identity Management system, called FIM, which provides daily updates on joiners, movers and leavers to allow accurate decision-making by the security team. Additionally, Gallagher products were integrated to work alongside SITS, the college’s student management system, providing rapid updates of new students so that individual ID cards can be issued once the registration process is complete. Gallagher Mobile Connect app KCL has also invested in new mobile technology, with Gallagher readers that can be accessed via a mobile phone using the Gallagher Mobile Connect app. This will allow students and staff to conveniently access designated areas, control lighting, visitor access, and more. While it is still early days for the college using this technology, the system is adaptable and provides the ability to add features that meet future requirements. The overall benefits of the Gallagher security solution deployed at King’s have proved significant. Nick O’Donnell, Director of Estates and Facilities at King’s College London, says the Gallagher solution “improves service to King’s College’s facility users, especially its students, and reduces the college’s reputational risk by removing technical barriers to comprehensive security management.” Streamlining multiple security systems Streamlining the differing security systems used by individual campuses by introducing a college-wide standardised system has highlighted many additional advantages, including a considerable reduction in costs for training, special projects and operator skills. Gallagher integrations allow extra security features to connect to Gallagher Command Centre Gallagher integrations allow extra security features to connect to Gallagher Command Centre, creating a central administration system that keeps things simple to manage. Integrating with Aperio, for example, ensures doors are locked when people leave the room – providing peace of mind that rooms won’t be accidentally left open over night or during the weekend. Student and staff ID management Gallagher’s proven technology has boosted King’s College’s confidence in its electronic system. When there are alerts, the university’s security services can consult a single system and react quickly. Card holders are also now registered on one system, allowing tighter management of passes. Overall, the college reports fewer system failures, with better decision-making between its numerous estates and libraries, while multi-site students, staff and visitors have experienced easier card management.
Resort World Casino New York City, (RWNYC) is the only legalised gaming casino in New York City. Its location near JFK International Airport meets New York State gaming regulations regarding geographical requirements, in order to protect visitors, patrons, and the casino’s assets. With approximately 400 million dollars channeled through its facility each week, the casino’s concerns include security across multiple points of entry, vendor offices, cashier cages, count room areas, and high limit rooms. The casino has an average of 15,000 guests per day, approximately 1,000 employees and 6,500 parking spaces. The requirement to accurately monitor and protect Resort World’s guests, facility, and personnel, demanded a state-of-the-art solution that could meet its complex security needs. Comprehensive security and surveillance program Gallagher worked closely with Resort World to understand their unique challenges In order to create and maintain a safe and secure environment for all, Gallagher worked closely with Resort World to understand their unique challenges. A comprehensive security and surveillance program were implemented to seamlessly integrate people, processes, and technology. This program included: Integration with iTrak System, providing up-to-date information on personnel and incident reports from all departments. Synectics VMS Integration (with more than 2,000 HD cameras), to control doors, acknowledge alarms, link cameras to alarms, and alter the mood of the monitor room by changing the color of the lighting. If an alarm is activated the monitor room lighting turns red. Open Process Control Integration, to automatically generate VMS alerts. These alerts convert to a WAV (audio) file that announces the location of the alert and then directs cameras to the specific area of interest. Interface and automatic export of the Employee Dining Buffet record to payroll weekly. Scalable security solution Director of Surveillance at Resort World New York City, Jason Arnett, and his team have completed the Gallagher Access Technician Training Course and are qualified as first responders. A+ Technology & Security in Bay Shore, New York is Gallagher’s Certified Channel Partner and service provider for RWNY. “Security of the property is key to the success of our business,” says Jason. “Having a system that is capable of numerous customisations, while being scalable to the constant demand for growth, proves it is an all-around solid security system for our environment.” Customer inspired Resort World Casino New York City identified a need for a solution that would disable employee access cards at the end of their shift. Employees were required to pass through a security checkpoint at the start of their day to reactivate their access card. To streamline this process, Resort World selected Gallagher’s Action on Access integration. Jason explains, “This significantly enhanced the security of the property by taking fear out of the equation.” Gallagher Action on Access integration ID badges are no longer active while off property, activation of the ID is done in the presence of security ID badges are no longer active while off property, activation of the ID is done in the presence of security, meaning unauthorised access to the property due to a lost ID badge is no longer a concern. Additionally, in the event of an emergency, a report can be run producing an accurate account of who is in the building. Lastly, it requires staff to enter and exit the property though one particular entrance, limiting the possibility of internal theft. Ultimately, Action on Access delivers a two-fold protection plan. Cardholder selection is regulated by the state to ensure that no individual has full capability to create a complete cardholder credential or select access for the cardholder. In order to maintain compliance with state regulations, RWNYC utilises features included with Gallagher Command Centre such as dual access point authorisation, interlocks, and security alarms tied-in with output to control lights, as well as additional device notifications. Authorised and secure access control In order to provide enhanced protection and authorised access control, several mantraps were positioned in critical areas of the facility. These mantraps allow RWNYC staff to know who is on duty. This step, in conjunction with Action on Access, provides a significant safety measure as it allows for the enabling and disabling of card access with time restraints, in the event a card is lost or compromised.The Gallagher system is fully customisable to meet and exceed gaming regulations for this property" “With Gallagher’s latest software update, we’ve been creating more customised views for our staff to better monitor particular areas,” says Jason. Email alert notifications are used to inform Player Development that an invited guest is entering the private gaming space, allowing a greeter to welcome them and provide best in class customer service. Gallagher security system Gallagher’s security solution affords RWNYC a reduction of five to eight hours of labor per week by utilising Command Centre’s reporting and auditing capabilities. “The Gallagher system is fully customisable to meet and exceed gaming regulations for this property. It is modular and can be divided into multi-tenant features. Gallagher’s functionality and flexibility are only limited by your imagination,” Jason summarised. Gallagher Command Centre is at the center of Resort World Casino New York City’s thorough and complex security program, helping protect their world class entertainment facility by safeguarding physical property, minimising risk, and reducing operational costs.
Queensland University of Technology (QUT) is a major Australian university at the forefront of innovation and development in tertiary education. With a strong focus on research, technology, and sustainability, QUT has state-of-the-art facilities and equipment located across three campuses in Brisbane, as well as multiple remote research sites. With highly-valuable assets and facilities, open campuses, and a combined population of approximately 58,000 staff and students, it is imperative for QUT to have a robust yet discreet security and site management system operating 24/7. In 1995, QUT selected Gallagher as their technology partner to develop and implement a seamless security and site management solution. More than 20 years on, this partnership remains strong as QUT continues to seek new and innovative technology to manage their campuses and simplify operations. Intelligent access control readers QUT’s three campuses have diverse physical environments which are essentially open to the general public. One campus is situated between the Brisbane River and Brisbane Botanical Gardens, another is located in the centre of an urban retail village, residential area and high-school. “The QUT campuses, whilst tertiary education institutions, are open to the public. This open and accessible environment presents a challenge when trying to protect the people and property of QUT” says Tracey Bartlett, Security Systems Officer. We have high expectation of the Gallagher system to manage the security of the non-public domain" “We have high expectation of the Gallagher system to manage the security of the non-public domain whilst allowing staff, students and authorised visitors the access they require.” To do this, QUT operates 1500 intelligent access control readers across their sites. Integration with Command Centre With the readers communicating directly with Gallagher’s site management software platform, Command Centre, QUT is able to manage, monitor, and report on facility access. “We have buildings that are open until 10pm and others that are accessible 24 hours a day, 7 days a week.” says Bartlett. “Our security staff in the CMS (Central Monitoring Stations) are able to create building and cardholder schedules, quickly lock down areas, grant immediate access and generate report. These reports assist the QUT Space Management Team on exactly how and when our facilities are being used.” Key objectives Secure multiple campuses that have open perimeters Protect staff and students and assets Ensure quick identification and response to alarms from multiple systems Streamline cardholder administration processes Staff and students security The safety of students and staff is the number one priority for QUT and the university works hard to ensure they operate safe and secure campuses. Through Gallagher’s site management solution, QUT is able to integrate multiple systems – including emergency control points and alarms for temperature change, fire, and flooding - and feed the information into Command Centre. Having one central monitoring platform ensures staff quickly identify, locate, and respond to any potential risks on campus. CMS Operators are highly skilled with the Gallagher system and, in conjunction with our CCTV system" “Our CMS team operates 24/7, of CMS Operators are highly skilled with the Gallagher system and, in conjunction with our CCTV system, have a complete view of what’s happening on site. They are then able to direct the field staff to areas of the campus that need attention,” says Bartlett. Ease-to-use software With tens of thousands of cardholders, all with ever-changing access needs, QUT requires a large number of staff to be able to administer and manager cardholder profiles within Command Centre. “The feedback from staff new to the CMS have commented that Command Centre is very easy to use software and they’re surprised at just what the system can do.” says Bartlett. In addition to streamlining the administration processes involved in cardholder management, Gallagher’s system also streamlines operations for QUT. More than just a card controlling physical access, QUT’s cards act as staff and student IDs, are used to operate printers and borrow from the library and can be used to monitor time and attendance. Through Command Centre, audit trails are generated for quick and easy reporting on each card function. Site management software As a technology focused university, QUT continuously reviews and implements new systems and technology as they become available. In order to keep up with the very latest site management software available from Gallagher, QUT opts for an ongoing Software Maintenance agreement. “We’ll continue to welcome the opportunity to embrace Gallagher’s latest products as we are confident, they will meet our needs” says Bartlett.
Located in the city centre of New Zealand’s capital, Wellington, Chaffers Marina is home to some of the country’s most exclusive multi-million-dollar vessels and receives visitors from around the world. With 185 berths across 5 piers, Chaffers Marina’s location amidst public areas presents unique security risks and facilities management challenges. In 2011, Chaffers Marina began working with Gallagher and today utilises some of the latest Bluetooth and mobile technology to deliver effortless site and facilities access for staff and marina users. Risk management & accountability With a location in the central business district of Wellington, Chaffers Marina sits amidst public areas including a city park. Historically, when the park hosted events and festivals, members of the public would unlawfully access the marina piers and climb aboard vessels. It was these incidents that initially prompted Chaffers Marina to review their current systems and find new site management and CCTV solutions. To mitigate the risks posed by unauthorised site access, Chaffer’s Marina installed cameras across the site To mitigate the risks posed by unauthorised site access, Chaffer’s Marina installed cameras across the site and introduced alarmed and monitored gates on each pier with Gallagher access control readers. In addition to preventing unauthorised access by the general public, the access control solution provides a reliable method for the Marina to manage and report on the activity of contractors on site. “It’s absolutely vital that we not only manage who gets on and off of the piers, but that we have also have a thorough audit trail supported by video footage.” says Ken Burt, Marina Manager at Chaffer’s Marina. Bluetooth T15 readers Chaffer’s Marina is utilising Gallagher’s Bluetooth T15 Readers across the site and is experiencing a significant increase in efficiency as a result. “Staff and contractors moving around the site with equipment or pushing trolleys, don’t have to stop to dig out a key or card to unlock the gate” says Ken. “Instead, the Bluetooth reader communicates with the mobile phone in our pocket and unlocks it automatically, it just makes life so much easier.” Likewise, marina users are able to move effortlessly around the site, accessing the piers, office, and the comprehensive amenities building, all via the Bluetooth connection on their mobile device. Gallagher’s mobile technology is having a considerable impact on the administrative side of the business too. To date, visiting vessels taking temporary berths would need to be met by a member of the Chaffers Marina team, in order to hand over an access card to provide pier and facility access. Mobile Connect App Through Gallagher’s Mobile Connect App, Chaffer’s administrative staff can now issue an access credential directly to a visitor’s mobile device before they’ve even arrived at the marina. “We’re very excited about this technology” said Ken, “aside from how simple and impressive it is for our visitors, the impact on our administration - particularly having to retrieve or replace unreturned visitor’s cards - is huge.” Gallagher’s Command Centre Mobile App makes life even easier for marina manager Ken, by enabling him to manage alarms, user access, and gate status, remotely via a mobile device. “I primarily use Command Centre Mobile on my iPad after hours” said Ken. “When someone calls me after hours about an access issue, I can now manage it from home on my tablet, that’s incredibly efficient for us and delivers a huge saving on call outs.” Harsh environmental conditions Gallagher’s T15 readers are the ideal choice for outdoor application Chaffer’s Marina faces harsh environmental conditions that put any external hardware to the test. Gallagher’s T15 readers are the ideal choice for outdoor application and were designed specifically to meet the needs of all-weather environments. “We’d had problems with previous hardware becoming damaged by water, wind, and salt.” said Ken. “Gallagher’s T15 readers were developed in direct consultation with us and other sites that have difficult conditions. The team at Gallagher really do listen to what we say and incorporate it in their design, and because of that, I have every confidence in the products Gallagher makes.” says Ken. Forward thinking To further enhance operational efficiency across their site, Chaffers Marina is currently looking to leverage Gallagher’s mobile and Bluetooth technology to automate and simplify members’ access to power facilities. According to Ken “Gallagher’s technology presents some opportunities for us to be really innovative in how we deliver and record access to different facilities on our site, we’re exploring those ideas as we speak.”
Round table discussion
Companies in fast-moving industries tend to want half or more of their revenue to come from products released in the last three or so years. The logical extension of that philosophy is the demise of product "cash cows" that remain in a company's portfolio for many years. Where better to witness the shortening life cycles of technology products than in the smart phone market, where most of us buy into the hype of the "latest and greatest?" But does acceleration of new product introductions translate into shorter product life cycles in the field? We asked this week's Expert Panel Roundtable: What is an acceptable life cycle for a physical security system? Is there a trend toward systems being replaced more, or less, often?
“Don’t try this at home.” It’s a common warning, but how does it apply to security systems? With today’s systems becoming easier to install, and with customers becoming more tech-savvy, there is a growing market for “do-it-yourself” or DIY home security systems. The trend also extends beyond the home security market: Business end users may also think they can forgo a professional installer and handle installation in-house. The customer may save money by installing a system, but at what risk? We asked this week’s Expert Panel Roundtable: What are the pitfalls of “do-it-yourself” when it comes to security systems?
Even the most effective technologies usually require some level of human involvement. What new technologies do, generally speaking, is change the nature of a human’s role. Most jobs in today’s world are vastly different than 50 years ago, in many cases because of the changing role of technology. In the physical security world, what specific impact does technology have on the human element of systems? We asked this week’s Expert Panel Roundtable: Have recent developments in security systems made manpower more, or less, important to the equation? Explain.
Electronic security systems: Manufacturers & Suppliers
- CyberLock Electronic security systems
- Alpro Electronic security systems
- Morse Watchmans Electronic security systems
- SALTO Electronic security systems
- ASSA ABLOY - Aperio® Electronic security systems
- TDSi Electronic security systems
- Sargent Electronic security systems
- Dahua Technology Electronic security systems
- Vanderbilt Electronic security systems
- Corbin Russwin Electronic security systems
- Baxall Electronic security systems
- EVVA Electronic security systems