Electronic security systems
Globally renowned biometrics company, Fingerprint Cards AB (Fingerprints) has launched a new solution for the PC market. Following several successful integrations in Chromebooks, biometric authentication is in increased demand as a more convenient and secure authentication method for both consumer and enterprise PCs. Growing application of biometrics Fingerprints’ new solution is tailored for use across a growing number of different form factors and use cases, including notebooks, 2-in-1...
Quantum Corporation has announced new software with advanced features and capabilities for DXi backup appliances to significantly improve backup and restore system performance, as well as monitor systems remotely utilising cloud-based analytics. The new DXi 4.1 software also integrates with Veeam Backup & Replication v10 and the new Fast Clone feature, to enable ultra-fast synthetic full backups in Veeam environments for more efficient use of resources for large enterprises. Improved synth...
Cozaint Corporation, manufacturer of ‘smart’ physical security platforms, has announced the launch of the BOBBY-W wall-mounted physical security kiosk. Available immediately, this ‘Video Surveillance as a Service’ (VSaaS) device has been designed to augment human security guard environments that need additional eyes and ears on their premises. BOBBY-W physical security kiosk BOBBY-W is based on a custom, Cozaint-built expandable platform that allows for the integration...
Check Point Research has published its latest Global Threat Index for July 2020. Researchers found that after a five-month absence, Emotet has surged back to 1st place in the Index, impacting 5% of organisations globally. Since February 2020, Emotet’s activities – primarily sending waves of malspam campaigns – started to slow down and eventually stopped, until re-emerging in July. This pattern was observed in 2019 when the Emotet botnet ceased activity during the summer months...
The compact new SALTO Neo Cylinder is a compact smart door lock cylinder equipped with state of the art wireless access control design technology. It is designed to provide smarter building management and can be installed on doors where fitting an electronic escutcheon is not normally possible or required and includes standard doors, server racks, gates, cabinets, electric switches, sliding doors, and more. For nearly a decade, SALTO, in partnership with BioCote® - the antimicrobial technol...
Matrix, a ‘Make in India’ manufacturer of Telecom and Security solutions, is renowned internationally for devising solutions for different-sized businesses. The innovator taps the communication requirements of every industry vertical and tailors products accordingly. GeM - CII NPPC 2020 Being a major player in the government sector, Matrix is participating in GeM - CII National Public Procurement Conclave 2020 (GeM - CII NPPC 2020), organised by the Government e-Marketplace (GeM),...
Intelligent Insights is a new software tool that brings together every element from scene to screen, from intelligent cameras enabling video data capture and interpretation, to the visualisation and reporting of data in one simple overview. Using data to improve security, safety, and business decisions has become increasingly important to the market and continues to grow. Intelligent Insights Now, Bosch has introduced an affordable software solution, called Intelligent Insights that enables customers to use data in new ways. It completes the data journey from scene to screen and helps users quickly understand the context of various situations, enabling them to make informed decisions. When, for example, the maximum number of people allowed to be in the area is reached, Intelligent Insights can immediately inform users. Intelligent Insights can be used standalone or seamlessly integrated with other systems to enhance situational awareness further. Integrates with Bosch cameras’ video analytics Intelligent Insights uses Bosch cameras’ built-in intelligence (Video Analytics) to interpret video images Intelligent Insights uses Bosch cameras’ built-in intelligence (video analytics) to interpret video images and captures camera metadata from situations involving moving objects, people counting, and crowd detection. The software tool then collects, aggregates, and displays this information using a series of pre-defined widgets, enabling users to visualise and evaluate a complete scene from a simple overview screen. Based on this, users can react faster and more efficiently, making better-informed decisions and improving overall security and safety. Usable data delivered in two ways Usable data can be visualised in two ways: As a widget and as a report. All widgets are displayed in a simple, easy-to-read dashboard that allows users to select and display only the widgets that they need at any given time. The report functions as a more detailed post-analysis so as to help users adjust and alter actions in the future. Intelligent Insights comes with a series of widgets, all of which contribute to specific safety and security needs. Area Fill Level, Occupancy Counting, and Crowd Detection offer the ability to monitor and detect crowds accurately, and count individuals and objects. The user can specify the desired occupancy rate of an area by determining the maximum number of people allowed to be in that area within a given time. Area Fill Level and Occupancy Counting capabilities In particular, Area Fill Level and Occupancy Counting are becoming increasingly applicable as they can activate and trigger an external output device when the threshold is reached. This could be a simple alert, a message displayed on a monitor at the entrance to inform visitors if they are allowed to enter, or a public announcement. This is very helpful when considering public health issues like the rapid spread of viruses such as COVID-19, in locations that can attract large numbers of people. Intelligent Insights also offers Object Counting and People Counting functions. Object Counting enables users to accurately count the number of vehicles or customer-defined objects within the field of view of one or more cameras. It is ideal in situations with fast-moving objects, such as roads or crossroads, where traffic frequency rates must be tracked to determine data such as peak or low traffic periods. People Counting and Object Positioning widget People Counting is used to count individuals, for example, the people entering or leaving a building People Counting is used to count individuals, for example, the people entering or leaving a building. This widget can aggregate the counting information from multiple cameras to provide users with an early warning when a sudden increase of people is detected, indicating a potential security issue. Intelligent Insights uses only anonymous data from cameras, ensuring people’s privacy is protected at all times. With the Object Positioning widget, users can get a real-time overview of all objects moving in a certain area. This is especially helpful for applications, such as perimeter protection. Based on their GPS position, which can be determined by cameras that feature built-in video analytics, the objects are plotted onto a map and classified with icons. Future-proof solution Intelligent Insights initiates with a basic licence, which includes all widgets and one dashboard, displaying 16 widgets. When needed, dashboards and widgets can be added according to customer needs and requirements. Furthermore, when customers use Bosch Intelligent Video Analytics, output and data from the Camera Trainer technology (included in Intelligent Video Analytics) like counting statistics of customer-specific objects can be visualised and reported. All this, combined with new widgets and functionalities incorporated in forthcoming updates and versions, makes Intelligent Insights a future-proof solution. Integration with BVMS Intelligent Insights is not only a powerful standalone software package but also designed for seamless integration Intelligent Insights is not only a powerful standalone software package but also designed for seamless integration. When integrated with the video management system of Bosch (BVMS), users can manage their live and recorded video streams and Intelligent Insights data within one unified graphical user interface (GUI). This integration eliminates the need to switch between multiple applications to get a complete picture of the situation. Another advantage of the integration with BVMS is that customers can enhance their video security solution to an integrated security solution that covers intrusion detection with B and G Series and access control management with the Access Management System 3.0. New insights to security industry With the launch of Intelligent Insights, Bosch has introduced a new software solution that brings new insights to the security and safety industry, one that already adds value but will also undoubtedly add more in the future.
Ajax Systems have announced that the latest OS Malevich 2.9 update brings significant changes for users and security industry professionals. The new data import feature simplifies the process of replacing old hubs with new ones. Remote activation/deactivation Detectors that work incorrectly can now be deactivated remotely and still be part of the system. Button and transmitter got new types of alarm notifications, adjustable in the app. Automation devices can now work in pulse mode and activate electrical appliances for a short period. The in-app panic button can now be used anywhere, not just at the protected property. Upon activation, it sends smartphone coordinates to an alarm monitoring company and all system users. Data import: Replacing hubs without reconfiguring the system With the import feature, all settings, connected devices, security groups, scenarios, and users can be easily migrated from an old hub to the new one. Engineers and user-administrators can install a more advanced hub model on the protected property without reconnecting each detector. Import feature also allows engineers to quickly restore the security system’s integrity, if its hub fails for some reason. Even if the system has hundreds of devices, dozens of scenarios, and several ReX range extenders, data import will take less than 15 minutes. The process is almost fully automated. Just connect the new hub to the internet, switch off the old one, start the data import, and follow instructions in the app. Temporary device deactivation Wrong installation, bad mounting choice, low signal level, broken tamper, or any other malfunction can easily result in a false alarm. With the release of OS Malevich 2.9, engineers can deactivate malfunctioning detectors remotely. No need to delete them from the list of devices. No need to rush to location. Two types of temporary device deactivation are available in the Ajax app, one is complete device deactivation and the other, deactivation of the notifications about the lid state. When the device is entirely deactivated, it doesn’t execute system commands and can’t take part in automation scenarios. Hub ignores all alarms and notifications of the deactivated devices. If notifications about the lid state of the device are disabled, the hub ignores only its tamper alerts. Alarm monitoring companies and users can still receive other alarms and notifications of this device. Temporary device deactivation function became one of the most popular requests from European PRO-users. Now, the functionality is available for all Ajax users. Pulse mode for Socket and WallSwitch Socket and WallSwitch (with firmware version 126.96.36.199 or higher) as well as Relay (with any firmware version) can now toggle switch devices, powered from the mains for a defined period, from 0.5 to 255 seconds. When the timer expires, devices switch back to their initial state: on or off. Previously, Pulse mode was available only in the Relay settings. It allowed electrical contacts to touch for up to 15 seconds and let the current flow. At the same time, Socket and WallSwitch could work only in bi-stable mode, closing and opening an electric circuit following the user’s command or executing a specific scenario. An additional command was required to change their state again. With OS Malevich 2.9 update, users have more options for automating lighting, electromechanical locks, and electric valves that control the water supply. Unlike Relay, WallSwitch and Socket can control electrical appliances without intermediary relays, rechargeable batteries, or an inverter. Adjustable alarm types for Button and Transmitter Information in alarm notifications defines how an alarm monitoring company and users will respond to the situation With OS Malevich 2.9 release, the settings of button and transmitter were expanded with an option to choose a type of alarm that the device communicates with an alarm monitoring company and other users: Intrusion Fire Medical help Alarm button Gas Information in alarm notifications Information in alarm notifications defines how an alarm monitoring company and users will respond to the situation. That’s why it has to correspond to the nature of the threat accurately. For instance, a wired gas detector connected to Ajax via a transmitter should notify about a gas alert. And a button provided to an older person should notify about a medical emergency. By choosing an appropriate alarm type, engineers and user-admins change both the text of an alarm notification and a code of the event sent to the CMS. Transmission of smartphone coordinates to alarm monitoring companies using the in-app panic button Button, SpaceControl and panic button A panic button is a tool that is hardly ever used. But in case of an emergency, it can save lives. Button, SpaceControl, or the panic button in the Ajax app notifies CMS operators if someone is in danger and are located on protected premises. An alarm monitoring company will respond immediately, once the button is pressed. With OS Malevich 2.9 release, the in-app panic button transmits an alarm notification along with the smartphone coordinates to an alarm monitoring company. All system users also get the coordinates and can copy them to get directions using GPS apps. Now, users can call for help using the Ajax app from wherever they are. The second layer of protection from accidental pressing in SpaceControl SpaceControl key fob With OS Malevich 2.9 release, SpaceControl gets additional protection from accidental pressing SpaceControl key fob has to be within reach, in a pocket, bag, or keychain, the places where its buttons can be easily pressed by accident. So, they have equipped SpaceControl with firm buttons and developed a filter that ignores any pressing shorter than 0.15 seconds. With OS Malevich 2.9 release, SpaceControl (firmware 188.8.131.52 or higher) gets additional protection from accidental pressing, which has already proved its efficiency in button. Now, double-click and long-press activation options are available in the device settings in the Ajax app. They recommend turning on this feature to avoid situations when premises are accidentally armed, or the panic button is unintentionally pressed. Other features added include: The option to configure Socket LED brightness - Now, it can be turned off or dimmed. Users can check for the new features in the device settings in the Ajax app or check the Socket manual if in need of help. Notifications about hubs being switched off/on or factory reset - Now, alarm monitoring companies and users will be informed of why a hub went offline. The option to switch off the visual indication of a detector triggering - The LED indicator of a detector can now be deactivated in the device settings. The feature is available for DoorProtect, DoorProtect Plus, MotionProtect, MotionProtect Plus, CombiProtect, MotionProtect Outdoor, MotionCam, and GlassProtect with firmware update 184.108.40.206 and higher, as well as MotionProtect Curtain with firmware update 220.127.116.11 or higher. New devices support - Hub 2 Plus, StreetSiren DoubleDeck, MultiTransmitter.
In the current landscape where reduced touch-points and low operating costs are nothing short of paramount, security expert Mul-T-Lock is offering a tailored access control solution to all hotel, holiday park and short-break property owners. SMARTair® is a modular and fully scalable access control system that offers an intelligent, yet simple, step up from keys. For hotels and home rental properties in particular, SMARTair® will replace inconvenient keys with a wireless locking system operated by smartcards and even smartphones when used in conjunction with Mul-T-Lock’s Openow™ app. Leisure and tourism industry solution With so many businesses in the leisure and tourism industry needing to cut operational costs and provide a safe and hygienic service to customers, SMARTair® does away with the need for manned receptions and touchscreens by putting the onus of checking in right in guests’ hands, with security still being closely monitored and operated by system managers. With SMARTair®, lost cards can be cancelled and replacement cards reprogrammed for increased guest security. The system can be tailored to meet each building’s needs and can be reprogrammed using the latest in access control management software as those needs evolve, without having to replace any physical locking systems – making it a cost-effective and straightforward solution for all hospitality venues. Monitor and control access rights With no hardwiring, the system can be installed at low cost with minimal disruption to a business. Designated system managers can also monitor and control access rights – allowing guests access when needed and revoking access once they check-out. The SMARTair® product portfolio also includes energy-saving devices for mounting on guest room walls and in-room safes. By utilising the Openow™ app, business owners, facilities managers and security administrators can instantly send, revoke or update virtual keys from the designated SMARTair® software or web browser allowing guests to access properties and rooms via their smartphone. System managers can be anywhere in the world when controlling access rights; making the whole process more convenient and secure for everyone. This also significantly reduces whole life costing, as it removes the need to replace key cards when they are lost or accidentally taken home by guests. Virtual keys mobile access An added bonus, Openow™ makes it easy for business owners to organise virtual keys inside the app, check how long they are valid, and protect them further with an individual PIN. If they have virtual keys from multiple sites or premises, Openow™ easily handles those too, with no time wasted wondering where key cards were left and no more appointments to pick them up or have them revalidated. Mul-T-Lock’s SMARTair® system with Openow™ app is the perfect solution for hotels and holiday parks with a high volume of visitors and subcontractors. It is built for businesses where third-party contractors are always on-site, hospitality venues that offer rooms for hire and boutique hotels or home rental with no manned receptions.
CertiPath, an innovator and renowned company in high-assurance identity, credential and access management services for highly regulated environments, has announced the appointment of industry veteran, Jack L. Johnson, Jr. as Advisor to CertiPath’s Board of Directors, effective immediately. Johnson has over 30 years of industry experience that includes executive positions with Guidehouse Consulting and its legacy firm, PricewaterhouseCoopers, the Department of Homeland Security as its first Chief Security Officer, and has also served with the United States Secret Service for over 20 years. Security assessments expert Johnson is currently the Chief Executive Officer (CEO) and Managing Partner of Jack Johnson and Associates, a strategic consulting firm that specialises in security assessments, providing business and risk consulting domestically and internationally. “As part of Jack’s role, he will offer guidance and direction with regard to our growth initiatives and ongoing business strategies, identifying opportunities that align with CertiPath’s mission,” states Jeff Nigriny, President and Founder of CertiPath. High-assurance credentials provider I have known and worked with CertiPath’s rock-solid, principled leadership team members for decades" Jeff adds, “Because our primary focus is to develop and provide unparalleled, groundbreaking technologies and services that enable high-assurance credentials in the federal government and commercial spaces, we look forward to enhancing the ever-changing landscape with Jack helping to take us to the next level.” Jack Johnson stated, “I have known and worked with CertiPath’s rock-solid, principled leadership team members for decades. They are a well-regarded company that has been filling an essential niche in the identity management space.” Jack adds, “I’m excited to work alongside these great professionals, as the company is on the cusp of expanding significantly and I look forward to being a part of their success.” Protective and intelligence-related duties veteran Johnson’s career spans a full range of investigative, protective and intelligence-related duties, as well as assignments with various Presidents, Vice Presidents, Presidential candidates and foreign heads of state. Johnson received his Bachelor of Science degree from the University of Maryland, a Master’s degree in Forensic Science from George Washington University, and as a veteran of the United States Army, he is involved in the Code of Support Foundation.
Tenable, Inc., the globally renowned cyber exposure company, has published a global industry study that revealed the vast majority of UK organisations (96%) have experienced a business-impacting cyber-attack in the past 12 months, according to both business and security executives. The data is drawn from ‘The Rise of the Business-Aligned Security Executive’, a commissioned study of more than 800 global business and cyber security leaders, including 103 respondents in the UK, conducted by Forrester Consulting on behalf of Tenable. ‘The Rise of the Business-Aligned Security Executive’ As cybercriminals continue their relentless attacks, 63% of respondents in the UK have witnessed a dramatic increase in the number of business-impacting cyber-attacks over the past two years. Unfortunately, these attacks had damaging effects, with organisations reporting loss of employee data (44%), financial loss or theft (36%) and customer attrition (34%). 65% of security leaders in the UK say these attacks also involved operational technology (OT). Countering the growing rate of cyber-attacks Fewer than 50% of security leaders said they are framing cyber security threats within the context of a specific business risk Business leaders want a clear picture of how at risk they are and how that risk is changing as they plan and execute business strategies. But only four out of 10 of local security leaders say that they can answer the fundamental question, ‘How secure, or at risk, are we?’ with a high level of confidence, despite the prevalence of business-impacting cyber-attacks. Looking at global respondents, fewer than 50% of security leaders said they are framing cyber security threats within the context of a specific business risk. For example, though 96% of respondents had developed response strategies to the COVID-19 pandemic, 75% of business and security leaders admitted their response strategies were only ‘somewhat’ aligned. Measuring and managing cyber security Organisations with security and business leaders who are aligned in measuring and managing cyber security as a strategic business risk deliver demonstrable results. Compared to their siloed peers, business-aligned security leaders are: Eight times more likely to be highly confident in their ability to report on their organisations’ level of security or risk. 90% are very or completely confident in their ability to demonstrate that cyber security investments are positively impacting business performance compared with 55% of their siloed counterparts. 85% have metrics to track cyber security ROI and impact on business performance versus just 25% of their siloed peers. Organisations with business-aligned cyber security leaders are also: Three times [3.2x] more likely to ensure cyber security objectives are in lock step with business priorities. Three times [3.3x] more likely to have a holistic understanding of their organisation’s entire attack surface. Three times [3.3x] more likely to use a combination of asset criticality and vulnerability data when prioritising remediation efforts. In the future, there will be two kinds of CISO - those who align themselves directly with the business and everyone else" “In the future, there will be two kinds of CISO - those who align themselves directly with the business and everyone else. The only way to thrive in this era of digital acceleration is to bring cyber into every business question, decision and investment,” said Renaud Deraison, Chief Technology Officer and Co-Founder, Tenable, Inc. Renaud adds, “We believe this study shows that forward-leaning organisations view cyber security strategy as essential to innovation and that when security and the business work hand-in-glove, the results can be transformational.” Study to examine cyber security strategies Forrester Consulting conducted an online survey of 416 security and 425 business executives, as well as telephonic interviews with five business and security executives, to examine cyber security strategies and practices at midsize to large enterprises in Australia, Brazil, France, Germany, India, Japan, Mexico, Saudi Arabia, the UK and the US. The study was fielded in April 2020. ‘Business-impacting’ relates to a cyber-attack or compromise that results in a loss of customer, employee, or other confidential data, interruption of day-to-day operations, ransomware payout, financial loss or theft, and/or theft of intellectual property.
During the Black Hat USA 2020 Virtual Event, Exabeam, the Smarter SIEM™ company, announced that customers can now licence its cloud SIEM technology by use case, beginning with licensable use cases for expedited insider threat and compromised credential detection. In addition, to simplify the process of acquiring and installing critical security content, the company is unveiling the new Exabeam Content Library, an easy-to-use security content repository to help organisations deploy advanced use cases more efficiently. Exabeam use case content increases threat visibility and enables security operations centre (SOC) teams to extract more value from their SIEM. According to the ‘Exabeam 2020 State of the SOC Report,’ security managers and analysts rated their ability to create content the lowest among all hard skills, yet creating rules and models to detect advanced threats, like lateral movement and credential switching, is critical to their security maturity. By providing a simple way to acquire the content needed to detect and remediate these critical security use cases, Exabeam is speeding the time to maturity for organisations. Security business needs “Security use cases for a SIEM tool should be a priority in the CISO’s tool box, and should not only cater to basic security hygiene, for which best practices exist, but also cater to the business needs of the organisation,” wrote Gorka Sadowski, senior director analyst at Gartner in a Gartner report. The Content Library is an online repository of knowledge and content that organisations can use to roll out new use cases. The initial release allows customers to quickly map data sources to security use cases and to download the necessary parsers. Exabeam is also announcing new, easy-to-implement content and tools to help customers maintain security as they adapt to a remote workforce. Investigate data exfiltration Exabeam is further enabling security teams to rapidly obtain value by detecting insider threats" Exabeam Cloud Connector for Code42 allows security teams to quickly detect and investigate data exfiltration by departing and remote employees, as well as the leak of high value data during a merger or acquisition. This announcement follows the previous release of the Exabeam Cloud Connector for Zoom. The ability for Exabeam solutions to easily plug into existing security environments enhances SOC team speed and efficacy. “New research shows that one-third of organisations have been hit with successful cyberattacks since the forced move to work from home. As security teams rush to respond to the pandemic and the increase in threats, it is critical that they find cost-effective ways to strengthen and mature their security posture,” commented Adam Geller, chief product officer, Exabeam. “In announcing these innovations, Exabeam is further enabling security teams to rapidly obtain value by detecting insider threats and compromised credentials and improving their security posture for remote employees.” Turnkey Playbooks “Unlike other SIEM vendors, Exabeam has allowed us to quickly add analytics to detect and investigate insider threats without having to replace our existing log management investment,” explained Director Damien Manuel, Cyber Security Research and Innovation Centre at Deakin University. “That’s a critical capability in the context of constantly evolving risks and potential vulnerabilities, and it gives us a smarter strategy to protect our organisation, employees, customers and data.” Exabeam has also released the first of its previously announced Turnkey Playbooks, automated solutions for common security investigations that do not require third-party licences or configuration. The new Turnkey Playbook for Threat Intelligence automatically identifies malicious domains, IP addresses, URLs, files, and email addresses with no additional configuration or third-party threat intelligence licences required.
There are many companies jumping into selling temperature detection systems to the state, local governments, hospitals, airports and local businesses, but do they know how to drive one? Anyone can get behind a car and drive it into a wall by accident. The same can happen with a temperature detection system. The first thing you should ask is “does my firm have a certified thermographer?”. If not, the firm are at risk of getting a low quality system that is being resold to make quick cash. Businesses that are doing this do not know how to operate it properly. Asking the right questions Secondly, you should ask whether the system is NDAA compliant. NDAA compliance means that your temperature detection equipment is protected by U.S. law. Does your system have a HSRP device (blackbody)? HSRP (Heat Source Reference Point) is a device that will allow the camera to detect the correct temperature a distance. Even if the room temperature does change throughout the day, treat it as a reference point for the camera to know the temperature at that distance. Can your system scan mutliple people at once? Can your system scan mutliple people at once? This is a bad question but often asked since most systems will say yes. For ease, everyone wants to scan many people at once, but the best practice according to FDA and CDC guidelines is to run one person at a time for best accuracy. Why? The HSRP (blackbody) device tells the camera what the correct temperature is at a given distance away from the camera. Every foot you are away from the HSRP device will be off by 0.1 degrees roughly. If you are in a room full of people, let's say 6, in view of the camera, every person that is not next to the HSRP device (5) will be given an inaccurate reading. Hence why it is so important to run the system correctly with just one person at a time. You will also need to follow the 6 feet rule. If you take that into consideration, one at a time at 6 feet apart, the device should tell you how you need to run the system. Sensitivity of thermal imaging Is your system’s sensor accurate enough? The FDA recommends an error of ±0.5°C or better. When looking for a system, make sure it is better than what they recommend. I would recommend ±0.3°C or better. Do not purchase a system over ±-.5°C degrees as you are doing yourself and your customers or employees an injustice. Another thing to look at is how many pixels it can determine the temperature from. Some cameras can only tell the temperature of 6 points on the screen, whilst others can take a temperature reading from each pixel. Take a 384x288 camera, for example, which would be over 110,000 points of temperature taking on a single image. Thermal cameras are very sensitive, so there are a lot of do’s and don’ts. For example, the system cannot see through glasses or hats. On the below image you can see a person with the visual camera on the right, whilst on the left side is through a thermal camera. Both are pointing at the same area. It is clear the person on the left side is “invisible” to the thermal imaging camera. Demonstrating the sensitivity of thermal imaging If you are a company who wants to detect the temperature of customers or employees though the front door, window or a car window, the answer would be no. You need a clear line of sight without any interference to scan for temperatures. Other things you need to look out for is wind and distance away from the HSRP (blackbody) device. Air and distance away from the HSRP device will make the system less and less accurate the more space between the device. Air and distance away from the HSRP device will make the system less and less accurate Thermal imaging and COVID-19 If you have a clear line of sight, is there anything I need to know? The answer is yes. Reflective materials such as metal can interfere with your temperature readings. Reflective materials are easily picked up from the thermal side so pointing at a medal, glass or anything reflective can cause inaccuracies within the system. In the age of COVID-19, temperature detection systems are more important than ever. Organisations must get a system in place to help scan for high temperatures in order to reduce the spread of the virus.
The emergence of smartphones using iOS and Android is rapidly changing the landscape of the IT industry around the world. Several industries, such as digital cameras, car navigation, MP3, and PNP, have been replaced by equivalent or even better performance using smartphones. Smartphones provide increasing portability by integrating the functions of various devices into a single unit which allows them to connect to platforms with network-based services and offer new services and conveniences that have never been experienced before. These changes have expanded into the access control market. Although not yet widespread, ‘Mobile access cards’ is one of the terminologies that everyone has been talking about. RF cards used for access security are being integrated into smartphones just as digital cameras and MP3s were in the past. While people might forget their access cards at home in the morning, they seldom forget their smartphones. Using smartphones for access control increases entry access reliability and convenience. Mobile/smartphone access control A key aspect of mobile credential is that it makes it possible to issue or reclaim cards without face-to-face interaction As in other markets, the combination of smartphones and access cards is creating a new value that goes beyond the simple convenience of integration enhancing the ability to prevent unauthorized authentication and entrance. People sometimes lend their access cards to others, but it is far less likely they might lend their smartphone with all their financial information and personal information – to another person. This overcomes an important fundamental weakness of RF cards. Another valuable aspect of mobile credential is that it makes it possible to issue or reclaim cards without face-to-face interaction. Under existing access security systems, cards must be issued in person. Since card issuance implies access rights, the recipient’s identification must be confirmed first before enabling the card and once the card has been issued, it cannot be retracted without another separate face-to-face interaction. Mobile access cards In contrast, mobile access cards are designed to transfer authority safely to the user's smartphone based on TLS. In this way, credentials can be safely managed with authenticated users without face-to-face interaction. Mobile cards can be used not only at the sites with a large number of visitors or when managing access for an unspecified number of visitors, but also at the places like shared offices, kitchens and gyms, currently used as smart access control systems in shared economy markets. The market share of mobile access cards today is low even though the capability can offer real benefits to users and markets. While the access control market itself is slow-moving, there are also practical problems that limit the adoption of new technologies like mobile access cards. Use of Bluetooth Low Energy technology While NFC could be an important technology for mobile credential that is available today on virtually all smartphones, differences in implementation and data handling processes from various vendors prevents universal deployment of a single solution to all devices currently on the market. Accordingly, Bluetooth Low Energy (BLE) has been considered as an alternative to NFC. Bluetooth is a technology that has been applied to smartphones for a long time, and its usage and interface are unified, so there are no compatibility problems. However, speed becomes the main problem. The authentication speed of BLE mobile access card products provided by major companies is slower than that of existing cards. Enhancing credential authentication speed Authentication speed is being continuously improved using BLE's GAP layer and GATT layers The second problem is that mobile access cards must be accompanied by a supply of compatible card readers. In order to use mobile access cards, readers need to be updated but this is not a simple task in the access control market. For 13.56 MHz smart cards (which were designed to replace 125 kHz cards), it has taken 20 years since the standard was established but only about half of all 25 kHz cards have been replaced so far. Legacy compatibility and the need for equivalent performance, even with additional benefits, will drive adoption timing for the Access Control market. While BLE technology helps resolve the compatibility problem of mobile access cards, it can identify some breakthroughs that can solve the speed problem. Authentication speed is being continuously improved using BLE's GAP layer and GATT layers, and new products with these improvements are now released in the market. Making use of key improvements allows Suprema's mobile access card to exhibit an authentication speed of less than 0.5 seconds providing equivalent performance to that of card-based authentication. AirFob Patch MOCA System's AirFob Patch addresses the need for technological improvements in the access control market in a direct, cost effective, and reliable way – by offering the ability to add high-performance BLE to existing card readers – enabling them to read BLE smartphone data by applying a small adhesive patch approximately the size of a coin. This innovative breakthrough applies energy harvesting technology, generating energy from the RF field emitted by the existing RF reader – then converting the data received via BLE back into RF – and delivering it to the reader. By adding the ability to use BLE on virtually any existing RF card reading device, MOCA allows greater ability for partners and end users to deploy a technologically-stable, high performance access control mobile credential solution to their employees, using devices they already own and are familiar with. Adding MOCA AirFob Patch eliminates the need to buy and install updated readers simply to take advantage of mobile credential, lowering costs and risks, and increasing employee confidence and convenience. Growth forecast of mobile access card market in 2020 In 2020, forecasts show that the mobile access card market will grow far more rapidly Several companies have entered the mobile access card market, but they have not set up a meaningful product solution stream until 2019. In 2020, forecasts show that the mobile access card market will grow far more rapidly. Reviewing new entries into the market allows identification of the latest products that provide improving solutions to compatibility and speed problems. MOCA AirFob Patch addresses development plans in process today that overcome the legacy installed base of card readers – allowing rapid creation of an environment that can make immediate use of BLE mobile access cards. Integrated mobile digital ID With proven usability and within suitable environments, mobile access cards will also begin to make inroads into other markets, not just the access control market. In the sharing economy market, which seeks access management without face-to-face interaction, the integrated mobile digital ID led by the 'DID Alliance' will serve as a technical tool that can be used in access authentication – forging increasing links between the access control and digital ID markets.
With the start of the 2020s, many security industry experts are reflecting on the emerging technologies over the past decade and looking forward to what is in store in the future. Artificial Intelligence (AI) is a buzzword that has infiltrated everyday nomenclature throughout the past decade. Every industry from healthcare, to banking, to security has implemented some form of AI that is touted as the hidden key to maximising productivity and/or security. However, AI technology is still in its infancy and is not the panacea that many cybersecurity experts claim. Why AI is more hype than reality AI is a nascent technology and has limited practical applications Today, AI is a nascent technology and has limited practical applications because it’s still difficult to understand the rational that is used by the machine learning algorithms for making their decisions. As a result of this limited understanding, these technologies are only leveraged for pinpointed functionality. For example, AI can be designed to analyse data for specific threats, such as malware, but AI technology is only as good as the data it analyses and cannot be fully trusted to discover new threats that emerge on their own. Furthermore, even when a threat is detected by AI, humans are still needed to confirm that a real risk is present. The value of AI in security today AI undoubtedly has its place in today’s security space. Government agencies and the military use AI to comb through hundreds of hours of call data to try to isolate terrorist or criminal activity. In its current state, AI can successfully review large amounts of data and automate repetitive tasks. The results of these services are helpful as additional data points, but at this time it makes more sense to use AI as helper technology rather than fully relying on AI to ultimately make decisions for organisations. Furthermore, AI can be utilised in access management to watch the habits of individuals and identify actions that stray outside the norm. For example, if a user logs into a system outside the normal working hours, AI can identify this anomaly and utilise step-up authentication to further validate the user should be granted access. AI can also be leveraged for access certification campaigns by providing scoring that helps approvers prioritise their efforts on certifications with low scores. However, algorithms should not be trusted to make higher stake decisions. This is because AI cannot currently be taught or programmed with the intuition that humans naturally possess, making the risk of a breach or other security threat is considerably higher. As computing power rapidly grows, so will the future of AI capabilities AI will continue to grow from its infancy into a more useful and robust tool In this next decade, AI will continue to grow from its infancy into a more useful and robust tool that companies can utilise to keep their assets and people safe. There will be a point where AI reaches a mature stage where it can truly think and learn on its own; computing power has grown exponentially in the last decade and will only continue to grow more in the next. This increase in computing power opens up a limitless number of possibilities for AI usage, especially as humans perfect and refine AI’s algorithms. For now, AI has a place in today’s security industry and has already proven to be adept at identifying threats and making society safer. While this is helpful, humans remain as a critical factor in evaluating threats. I believe that the future of AI is bright, and fully expect that our capabilities around explainable AI will rapidly advance thus providing many opportunities to leverage these technologies in a fully autonomous capacity in the not-to-distant future.
The Private Security Industry Act of 2001 gives the Security Industry Authority (SIA) the function of setting standards of conduct in the United Kingdom’s private security industry. Time is winding down to provide input during the SIA’s six-week consultation on a new draft code of conduct for SIA licence holders and applicants for SIA licences. The authority is inviting the industry, licence holders, and anyone with an interest in private security to have their say on the draft code of conduct by taking part in a survey. The consultation will end on 23 February. “The ethos of the code of conduct is that it will improve standards and public safety by setting out the standards of conduct and behaviour we expect people to uphold if they are entrusted with protecting the public, premises and property,” says Ian Todd, Chief Executive, Security Industry Authority (SIA). Security's Code of Conduct A code of conduct sets out what standards of behaviour professionals have to meet in order to work in the profession In security as in many professions, a code of conduct sets out what standards of behaviour professionals have to meet in order to work in the profession. SIA is suggesting Six Commitments of behaviour that will apply to all licensed security operatives and to applicants. If the code of conduct is sanctioned by the U.K. Home Office, it would become mandatory and incorporated into SIA’s licensing criteria Get Licensed. A commitment to certain standards of behaviour is fundamental to what it means to be fit and proper, and to being part of a profession. The six commitments are: Act with honesty and integrity Be trustworthy Protect the people and property you are entrusted to protect Be professional at work Act with fairness and impartiality at work Be accountable for your decisions and actions “We will review the comments from the consultation once it concludes on 23 February, analyse the results and publish a report on our findings,” says Todd. “The SIA will then use the comments it has received to write a final version of the code of conduct. The introduction of a code of conduct will be subject to final approval by Home Office Ministers.” SIA’s current Standards of Behaviour provide guidance on professional behaviour but are not mandatory. The draft code of conduct builds on the Standards of Behaviour. Upholding SIA's Standards The SIA’s Partnership and Interventions team is the unit that enforces the Private Security Industry Act “The majority of licence holders uphold the standards of behaviour that the SIA, their employers and the public expect of them,” says Todd. “Their professionalism and dedication keep the public safe and tackle crime. However, there are incidents in which some licence holders do not behave in this way. This minority lower the standard of service the public receives, harm public safety, and bring themselves and the rest of the private security industry into disrepute.” The SIA’s Partnership and Interventions team is the unit that enforces the Private Security Industry Act. It is likely that they will be required to enforce the code of conduct should it become mandatory. The draft code of conduct is currently out for consultation and the proposal has been shared widely to licence holders, private security businesses, and enforcement partners encouraging them all to take part. “Once the consultation has concluded, we will analyse the findings from the feedback, produce a report and publish it on our website and share this widely via social media,” says Todd.
Using computed tomography (CT) security technology for cabin baggage screening at airports can eliminate the need for passengers to remove liquids and laptops from their bags, thus helping to make the security process easier and more efficient. As the latest in checkpoint scanning technology, CT provides 3D images with much more information to improve threat detection capabilities so decisions by the operator can be resolved quickly and more accurately, without the need for manual search. The whole experience is better and safer for everyone. The use of computed tomography The Netherlands were the first to introduce CT at the checkpoint and the Transportation Security Administration (TSA) in the United States plans to install 145 units in its airports by the end of the year. Australia is already installing and using CT at some of its airports. The United Kingdom is the first country to mandate use of CT for screening cabin baggage, and it is expected that the EU will also mandate this type of technology in the near future. It is expected that the EU will also mandate this type of technology in the near future The process of deploying CT is another level in the evolution of passenger screening and aviation security. Since 9/11, the traveling public has become increasingly educated about aviation security, says Steve Revell, Senior Director of Aviation CT at Rapiscan Systems. “What passengers expect is courtesy, professionalism and, most of all, to be able to travel safely without fear of harm,” he says. “Each level of security we have seen introduced over the years, I believe, shows commitment from all stakeholders to meet these key deliverables.” Rapiscan Systems' 920CT Rapiscan Systems' 3D cabin baggage screening system, 920CT, utilises patented Dual-Energy technology and a sophisticated algorithm to provide the highest level of automatic detection of highly dense items, as well as automatic detection of explosives based on the most stringent global regulatory requirement. It also has a truck wheel design and contactless power and data transfer, both of which reduce maintenance costs and downtime and make the 920CT more efficient and robust. Rapiscan's 920CT provides the highest level of automatic detection Rapiscan’s 920CT is equipped with advanced software and detection algorithms that are designed to be upgradeable. With 3D volumetric imaging, the 920CT is superior to 2D systems as it provides improved visualisation of potential threats. It has also been engineered to integrate seamlessly with Rapiscan’s TRS tray return solution to create a more efficient checkpoint experience, for both passengers and staff. “As a manufacturer, we strive to provide the very best quality service and equipment we can – working closely with regulators and airports alike to ensure the evolution and expansion of air travel is both collectively understood and fit for purpose,” says Revell. Portfolios and partnerships Rapiscan has a wide portfolio of products and capabilities. However, one company cannot do it all. “For this reason, we will always look to best-of-breed technologies that complement our offerings and provide a cohesive solution and, more importantly, long-term partnership,” says Revell. “The partnership deliverable is what drives the future. Our mission is one of an open platform that invites other technologies to work in conjunction with ours and integrate in such a way that can provide meaningful reports and controls systems to our clients, driving core efficiencies and security enhancements.” Our mission is one of an open platform that invites other technologies to work in conjunction with ours “The efforts borne by each of the key stakeholders is done for one very important and aligned reason, to ensure to the very best of our abilities that passenger safety is put first, is always put first and is done in the most courteous, professional way possible, without any undue inconvenience,” he adds. Increasingly, airports are asking for suppliers’ systems to talk to each other. Many airports have security screening equipment from multiple manufacturers and want to put images from these into a single, searchable database, to track missing items, improve productivity and efficiency, or comply with regulations. The Digital Imaging and Communication for Security (DICOS) is an industry standard that defines an interoperable data format for integration of security screening technologies across multiple vendor platforms. It facilitates the development and use of improved security screening technologies and third-party software. Rapiscan’s 920CT supports DICOS, and the company is working with multiple vendors to help create a single platform for airports.
The boundaries between the smart home market and security market at large are narrowing. Amidst a wave of expansion, suddenly everything is becoming digital. Home automation has been around for close to 30 years but hasn’t really hit it big because integration hasn’t been that simple. Now that the Internet of Things has stepped into the market, home automation is really taking off. As technology in the smart home market advances, the gap between the residential and professional security markets is growing smaller. Additional revenue for security industry There will continue to be more opportunity for interoperability, and home automation will continue to grow and eventually become a norm. Growth in the residential security market and its position as the channel for smart home solutions, have attracted numerous new entrants. Telecoms, cable operators, and CE (consumer electronics) manufacturers are joining traditional security players as they compete to fulfill consumer demand for safety and security. Connected products also provide a layer of competition as consumers must decide whether having category devices such as doorbell video cameras, networked cameras and other products suffice for their security. Smart home services can provide additional revenue streams for the security industry. In Parks Associates’ 2017 survey of U.S. security dealers, 58% report that smart home service capabilities enable extra monthly revenue. Almost half of dealers also note they have to offer smart home devices and services in order to keep up with their competition. Data capture form to appear here! Residential security solutions Growth is going to be slow and steady. Everyone needs to be realistic about that" The trend has no doubt accelerated in the last couple of years. New collaborations are being made between audio-video (AV) suppliers and security solution providers. The clientele of high-end AV products is becoming increasingly concerned with home security and property protection. So, in recent months, the requirement for residential security solutions has been increasing as technical solutions can go hand in hand with AV installers’ capabilities and client base. “One of the big mistakes many make is that they assume – based on some of the hype and big market investments – that the smart home market is set to explode,” says Michael Philpott, Senior Practice Leader, Consumer Services at Ovum. "This is not the case – growth is going to be slow and steady. Everyone needs to be realistic about that, rather than expecting some rapid ramp up simply because some big names have entered the market.” Pressure to upgrade security standards Surprisingly for what has historically been something of a grudge purchase, in the context of home automation, security is seen as a solution some consumers are looking for. Another security aspect of home automation is cyber security, in particular how it applies to various IoT devices in the home. Now as connected devices gather personal information from realms long considered private and protected – the bedroom, the kitchen counter, the nursery – the risks are higher than ever. All of the data that various devices and sites have collected can be combined, shifted and then exploited by marketers or even stolen by hackers. Both manufacturers of smart home products and the companies that install them are feeling pressure to upgrade security standards. They are moving to set policies that will regulate who has access to data and how it is used. Ease of installation Advances in the home market are increasing customers’ expectations as well as adoption of newer technologies A recent revelation that some “smart TVs” might be listening to conversations and transmitting them to "third parties" caused an uproar. These sets have voice activated features that enable users to change channel, turn on a DVD or browse the internet by speaking to the screen or remote. The fine print in privacy policies contains warnings that general conversations are also being heard, and one company even told owners to turn off this function if they were concerned. Another impact of smart homes on the security marketplace is to raise expectations about the capabilities of commercial systems. Products made today for residential applications are very high quality, easy to install (do-it-yourself, or DIY), and have very rich feature sets. End users expect their commercial solutions to have a similar ease of use and ease of installation. Geofencing in commercial applications The quality of video that people are seeing at home is motivating some legacy commercial customers to finally move to IP video from lower resolution analogue cameras. A higher percentage of commercial customers use mobile applications to view integrated video and access control data. People’s experience with smart thermostats has them asking for geofencing in some commercial applications. In short, advances in the home market are increasing customers’ expectations as well as adoption of newer technologies. Read part two of our smart home mini series here.
Schools and heritage sites present their own unique difficulties for security and access control. It becomes a challenge when the same is to be applied to a school that is also a heritage site of exceptional value. This was the challenge facing security administrators at the Colegio Diocesano Santo Domingo in Orihuela, Spain. The Colegio Diocesano is more than just a school. Its historic buildings date to the 1500s, a heritage site as well as a place of learning - with a museum that requires the protection of the same access system. Hence, the brief for a new access system required minimal disruption on two fronts. The college buildings are a Resource of Cultural Interest and on Spain’s heritage registry: they must not be damaged. School chiefs also required little disturbance of everyday school learning. Wireless access control was the obvious answer. A wireless access solution to a 16th-century problem Powerful management option enables real-time security control to limit free access to and around the site SMARTair® wireless access control devices now control access through 300 doors around the school. A mix of battery-powered escutcheons and weather-proof escutcheons, knob cylinders and wired wall readers (including for lifts) are connected to SMARTair’s intuitive software by a network of 38 wireless communication hubs. The school chose SMARTair Wireless Online management for its new keyless access system. This powerful management option enables real-time security control to limit free access to and around the site, even if the school data network is down. Automated emails inform security staff of any incidents, keeping students, staff, equipment, and precious heritage safe. “The main benefit is the ease of real-time key management — from any place and at any time — via the wireless online management system,” says IT Manager, Francisco Fernández Soriano. “This increases security for children and for staff because no unauthorised people can enter the school.” SMARTair locks and readers SMARTair TS1000 software makes it easy to issue and cancel access credentials for temporary visitors such as parents SMARTair locks and readers provide a streamlined way to manage access. Student and staff carry credentials programmed to allow access to specific authorised areas. SMARTair TS1000 software makes it easy to issue and cancel access credentials for temporary visitors such as parents. “In addition to the main entrances and classrooms, access to private spaces such as lifts, offices, staff rooms, the church, the museum, the library and the IT room is constantly monitored,” he adds. “Thanks to our SMARTair devices installed at more than 300 doors, the security team can find out who has accessed which space and when, at any time.” Installation and integration The system was installed without a hitch and also without any disruption to classes" The installation of the school’s new SMARTair system demanded minimal work. Some school doors date to the 16th century, so major alterations to door hardware were not possible. “The system was installed without a hitch and also without any disruption to classes,” confirms Fernández Soriano. Because SMARTair is a modular system, scalability is built in. They can extend or fine-tune their access system when they choose. Indeed, SMARTair’s “Phase II” is already under discussion. SMARTair software also easily slotted into the school’s existing management workflows. The Colegio Diocesano has used iinventi education management software for the past five years. Integration with SMARTair software was simple: access control, the library and canteen are managed from an integrated system. “SMARTair gives the school’s security team the answers they need,” concludes school director, Reverend José María Fernández-Corredor.
Loughborough University has selected the ASSA CLIQ® Remote system from the ASSA ABLOY Door Hardware Group to help secure its plant control rooms. With more than 18,000 students at Loughborough University for 2018-19, the award-winning ASSA CLIQ® Remote technology has been used across the site for a range of different applications, including teaching laboratories and offices. Its success as a security and access control solution has led to it being extended to cover the university’s plant control rooms too. Providing an easy-to-use electromechanical locking system, the ASSA CLIQ® Remote solution uses high-end micro-electronics and programmable keys and cylinders to offer flexible control over access rights. ASSA CLIQ® Remote solution Loughborough University can programme and update each key remotely, removing or granting access privileges for the key holder in real-time. This allows only those with the necessary authority at the university to enter a plant control room. Furthermore, the system removes the security risks associated with lost or stolen keys, eliminating the time and cost spent on replacing a mechanical lock. For staff that have access to these areas and then leave the university, their access rights can be easily be removed by using the system’s simple, web-based interface, ensuring ex-employees and contractors never pose a security risk. ASSA CLIQ® Remote also provides a full audit trail for assured peace of mind around who has accessed the plant control rooms and - because the locks are powered by a battery inside the programmable ASSA CLIQ® Remote key - no extra wiring is required when installing the system. Wireless electronics locks Phil Sheppard, Senior Clerk of Works at Loughborough University, said: “For us, a big advantage to ASSA CLIQ® Remote is that its electronics effectively extend the patent of the key indefinitely. The system cannot be copied, which means ASSA CLIQ® Remote provides a long-lasting access control solution.” “The audit capabilities of the system are also really useful, ensuring we know exactly who accessed a plant control room, and when. The system can be extended really easily as well, which has been another key reason why we continue to use ASSA CLIQ® Remote to meet our access control needs across the university.” “Ultimately, by working with a trusted manufacturer such as ASSA ABLOY, we can be safe in the knowledge that only authorised individuals can access the university’s plant control rooms.” Secure access control solution Sean Falkinder, National Sales Manager for ASSA CLIQ® Remote, adds: “We have provided a range of solutions for Loughborough University over the years, and the use of ASSA CLIQ® Remote for the university’s plant control rooms is just the latest success story. We’re delighted that the technology is able to provide such a safe and secure access control solution for the site.”
Samson Security has adopted SmartTask to support the rapid growth of the business, which has seen the company treble in size in less than a year. The workforce management software is initially being used for electronic proof of attendance, across more than 400 security officers and engineers that deliver a wide range of services, including manned guarding, mobile patrol, alarm response and FM services. Advanced guarding management and monitoring “We needed an advanced guarding management, monitoring and reporting solution that could adapt and expand to our changing requirements as we grow,” explains John Richards, Operations Director at Samson Security Ltd. John adds, “Our mobile and manned services now span the North West, the Midlands and North Wales, so SmartTask will give us the visibility and control needed to coordinate and protect our team, while maintaining our excellent service standards.” SmartTask workforce management software Samson Security selected SmartTask because of the simplicity and flexibility of the system SmartTask will replace a previous time and attendance solution, which no longer met the needs of the business. Having undertaken a review of the marketplace, Samson Security selected SmartTask because of the simplicity and flexibility of the system. The app-based nature of the system means that employees can use the software via a personal or work smartphone, while providing the opportunity to use additional functionality such as patrol monitoring and electronic forms. Security guards are using either a SmartTask-enabled smartphone or an onsite landline to accurately record the start and end times, as well as any required check calls. The app captures a timestamp and GPS location for accurate customer reporting and SLA monitoring for alarm responses. Controlled access Samson Security also uses the control room dashboard at its National Command Centre to gain complete visibility of any exceptions, while mobile and office managers have controlled access for their individual areas of responsibility. John adds, “We are already exploring other ways of using SmartTask, which will enable us to consolidate much of our employee scheduling and workforce management requirements into a single system. We have set up bespoke smart forms, so will shortly be rolling out electronic incident reporting to our team, replacing our existing paper-based process.” Scalable, flexible solution He further said, “The scalable and flexible nature of SmartTask means we can take a phased approach, avoiding operational disruption and not overburdening our internal resources.” Paul Ridden, Chief Executive Officer of SmartTask commented, “We have developed our software to meet the precise needs of security and FM companies now and in the future. Possessing high levels of configurability and scalability, backed by first-rate service and support, SmartTask can support the long-term success of our customers in-line with their business and operational priorities.”
ISONAS Inc., a globally renowned IP access control and hardware solutions provider, and part of the Allegion family of brands, has announced that the ISONAS Pure IP access control solution has been installed at a new flagship distribution centre for Premier Packaging, an international packaging solutions company, with facilities in 14 locations nationwide. ISONAS Pure IP access control In the summer of 2018, Premier Packaging was looking to implement an access control system to help secure their brand-new 320,000-square-foot facility in Louisville, Kentucky. After working closely on a recent project with Orion Networks, a trusted IT infrastructure provider, Premier Packaging relied on their recommendation to implement a cutting-edge access control solution from ISONAS. With no access control system in place at any of their 14 locations and a combination of office workers, support staff, truck drivers and warehouse employees entering and existing the building daily, a process to control access was a necessity. Monitoring and tracking visitors to distribution centre A major challenge facing the new distribution centre was truck drivers, who came into the facility, were not company employees. With on average 250 people coming in and out of the new facility in Kentucky daily, monitoring and tracking who those people were and if they belonged there was imperative. They were also looking for the flexibility to manage the locking and unlocking of doors remotely, rather than having to rely on physical keys. “After comparing ISONAS to other access control systems out there, we knew that ISONAS was the right flexible access control solution to meet Premier Packaging’s security needs,” states Brock Jamison, VP and Director of Sales at Orion Networks. ISONAS RC-04 reader-controllers installed ISONAS Pure Access software was implemented to give the packaging company remote access capabilities The initial project consisted of 18 ISONAS RC-04 reader-controllers installed at their new distribution centre in Louisville. The RC-04 reader-controllers from ISONAS delivers advanced technical functionality with an easy installation process. In addition to the ISONAS hardware, the ISONAS Pure Access software was implemented to give the packaging company remote access capabilities. Pure Access Pure Access, ISONAS’s industry-renowned software, is a cloud-based access control application that provides users the ability to manage their access control from anywhere at any time, on any device. “We are extremely happy that our unique access control solution could help Premier Packaging improve safety and security at their new distribution center seamlessly,” states Jonathan Mooney, ISONAS Sales Leader. ISONAS cloud-based platform By using both the ISONAS hardware and software solution together, Premier Packaging was able to improve security and keep employees safe. With the ISONAS cloud-based platform, Premier now required all Louisville employees to enter the building using their ID badges to gain access. If an employee was not in the database and verified, then access would be denied. Future plans include rolling out the ISONAS access control solution to additional buildings and possibly integrating it with other security systems.
NEC Corporation, NEC Corporation of America and their partner, Infrared Cameras Inc., were selected by the Hawaii Department of Transportation (HDOT) to provide thermal temperature screening and facial recognition technology at Hawaii's public airports to help protect the community and identify passengers with a potentially elevated body temperature. The companies combined resources to submit a unified proposal for the project. Preventative measures against COVID-19 "Taking these steps to implement the technology at our airports shows our commitment to providing preventative measures against COVID-19 for the community," said Hawaii's Governor David Ige. "We recognise that temperature screening won't catch every infected passenger, but it is an available tool that can be implemented and combined with the additional measures the State is providing to help prevent the spread of this virus, while helping rebuild the economy." NEC technology deployed at Hawaii's public airports We believe NEC's technology will help to ensure the safety and health of visitors and residents of Hawaii against COVID-19" "We are honoured to become a part of this significant project for Hawaii towards the revival of tourism and business in the state," said Toshifumi Yoshizaki, Senior Vice President, NEC Corporation. "We believe NEC's technology will help to ensure the safety and health of visitors and residents of Hawaii against COVID-19, and our team will make every effort to ensure the success of this public and private joint project together with all of the partner companies." Multi-person thermal screening solution "Team NEC's approach is predicated on enhancing existing processes and services rather than introducing a bottleneck or negative impact to processing speed," said Raffie Beroukhim, Chief Experience Officer for NEC Corporation of America. Raffie adds, "We look forward to working with the State of Hawaii to further automate and enhance the travellers' experiences with our high throughput, multi-person thermal screening solution." NEC and Infrared Cameras selected NEC and Infrared Cameras were selected with a proposal of US$ 23.3 million for equipment and installation and a 10-year maintenance plan of US$ 1.42 million annually for a total contract amount of US$ 37.5 million. The companies were selected in part because of their innovative concept and functionality to deliver accurate and efficient thermal temperature screening for people traveling to Hawaii. The selection committee evaluated various systems and technologies and NEC and Infrared Cameras were determined to be the best fit for Hawaii's needs. Thermal temperature screening equipment The thermal temperature screening equipment will be installed in three phases at the Daniel K. Inouye International Airport (HNL), Kahului Airport (OGG), Lihue Airport (LIH), Ellison Onizuka Kona International Airport at Keahole (KOA) and Hilo International Airport (ITO). Phase 1 will have the temperature scanners installed this month at the gates currently being used for arriving trans-Pacific flights. Phase 2 will have the temperature scanners installed at the remaining gates in the coming weeks. Phase 3 expects to have the facial recognition equipment installed by December 31, 2020. Leveraging facial recognition technology The system incorporates privacy protections from design to deployment While the Hawaii airports system will leverage facial recognition technology, people should not think of the features they may have seen in a movie. The system incorporates privacy protections from design to deployment and NEC will work with HDOT throughout this process to ensure the solution meets the requirements of the State of Hawaii. Furthermore, the system will only temporarily retain a picture of a person with an elevated temperature of 100.4 degrees and above to help airport representatives identify them and conduct an additional assessment to determine if health precautions are necessary. Use of thermal image capture technology The picture will be erased within 30 minutes and will not be shared with any outside agencies. Anyone with a temperature below 100.4 degrees will not have their image retained at all. The system will not automatically have a person's personal information, such as their name, address or driver licence number. It will not contain information about criminal history or outstanding warrants. The use of the thermal image capture technology is anticipated to be safer and more cost effective than manual temperature checks. Without the use of facial recognition technology, an employee would need to be next to each camera at all times to pull a person aside as they walk by the camera, creating bottlenecks and further exposing employees to travellers and, thus, possible COVID-19 infection.
SL Green Realty Corp., one of Manhattan's largest office landlord, has appointed Sharry to be a technology partner for the One Vanderbilt project scheduled to be opened in September 2020 in midtown Manhattan. Smart, integrated building systems Sharry is a pioneer in the newly emerging market of PropTech (property & technology). The company supplies an ecosystem of smart and integrated functions for premium commercial office buildings and customers in the Americas, Africa, and Europe. Recently, Sharry, the PropTech company, announced a new touch-free elevator system for COVID-safe buildings. One Vanderbilt Sharry was appointed by SL Green Realty to be a technology partner for One Vanderbilt in New York" A sky-line defining skyscraper tower, One Vanderbilt will be the epitome of the 21st century workplace space. Developed by SL Green Corp., the 1,401-foot-tall (427 m) commercial office building will be the 5th tallest building in the U.S. TD Bank is signed on as the anchor tenant of the 1.7-million-square-foot property, which is due to open in September of 2020. All users and tenants will be equipped with smart and mobile products delivered by Sharry. “Sharry was appointed by SL Green Realty to be a technology partner for One Vanderbilt in New York,” confirms Michal Cerovsky, Chief Operations Officer (COO) and a Co-Founder of Sharry. The company is headquartered in Prague, Czech Republic, EU. Digital solutions for a safer work environment "One Vanderbilt is already an architectural icon in New York, but its completion will open a new era in which digital solutions will provide a healthier and safer work environment," adds Vladimír Mašinský, Head of Business Development at Sharry, who also manages Sharry's partnership with SL Green Realty. Anchoring the modernisation of East Midtown region of New York City, One Vanderbilt will provide tenants with an impressive slate of amenities unrivaled in history of real estate in NYC, including a 30,000-square-foot tenant-only amenity floor with large format meeting spaces, club-style lounge and an extraordinary outdoor terrace. Direct connection to transit network Immediately adjacent to Grand Central Terminal, the building will create direct connections to the surrounding transit network. The building will also include an 11,000-square-foot high-design restaurant from world-renowned chef, Daniel Boulud. SL Green’s unprecedented US$ 220 million private investment to improve Grand Central’s public transit infrastructure has already begun to materialise. Tenants include a star roster of top-tier financial, banking and legal firms that have committed to One Vanderbilt. Integrating individual services and technological systems There are many innovations by Sharry that improve the commercial office building experience “It's a major milestone for Sharry to be a partner of the One Vanderbilt project, a prominent part of the New York City skyline, less than four years after the company was founded. At the same time, it tells us that we were correct in taking the more demanding approach, integrating individual services and technological systems available in buildings into a single platform,” said Josef Šachta, CEO and Co-Founder of Sharry. There are many innovations by Sharry that improve the commercial office building experience. The company brings in a new set of smart features integrated to the building, such as mobile access that allows workers to open doors or turnstiles, just with their smartphones. If the workers drive, a smart camera link recognises their licence plate and opens the gates. Smart parking management Parking management ensures maximal utilisation of parking spots. All users can take advantage of a tenant engagement platform for sharing important building-related news, chatting with other users, or booking shared amenities. Visitors to buildings where software from Sharry is installed can also expect the utmost in convenience. "A guest will receive a meeting invitation with a QR code. They can reserve a parking space, and the system will then automatically let in upon arrival thanks to smart cameras. The guests will then report to the reception using the QR code, just like check-in at airports. The host who invited the guest will then be notified that their visitor is already in the lobby," said Product Manager, Ondřej Langr, in describing another example of the multi-level integration offered by Sharry. Touch-free elevator system for COVID-safe buildings Recently, the company has announced a touch-free elevator system for COVID-safe buildings Recently, the company has announced a touch-free elevator system for COVID-safe buildings as its latest innovation. This anti-coronavirus feature enabling users to control elevators from their mobile phones or smart watches will be presented during Q3/2020 in the Sharry Workplace product line as part of a revolutionary mobile access system. Along with One Vanderbilt, Sharry is completing the implementation of its smart tools ecosystem in several other office buildings on the East coast of the USA. Thanks to these projects, it is firmly placed among the top players in the PropTech segment and especially in NYC, which last year ranked first on the Tech Cities index, which is compiled by the Savills consulting company. “We always wanted our software to be in the best buildings in every city to which we expanded. And New York was our dream destination. I am very proud of our entire team that we can work together here on the iconic building One Vanderbilt will soon be,” adds Josef Šachta.
Round table discussion
We live in an era of Big Data. Surrounded by a flood of information, more companies are looking for ways to analyse that information (data) and systematically extract intelligence that can help them operate more efficiently and profitably. The data obsession has extended to the physical security industry, too, where large amounts of data have historically been a little-used byproduct of our access control and even video systems. But the picture is changing. We asked this week's Expert Panel Roundtable: What impact are data analytics having on the security market?
Delivering on customer expectations is a basic tenet of success in the physical security market. However, meeting expectations may be an elusive goal, whether because customer needs are not communicated effectively or because equipment doesn’t perform as promised. We asked this week’s Expert Panel Roundtable: what if a customer expects more than a security system can deliver?
Securing large campus environments can be particularly demanding and requires a range of technology solutions. In effect, a campus may represent a dozen or more individual facilities to be secured, in addition to protecting the overall environment. Seeking more insight into the number and variety of needs of securing a campus, we asked this week’s Expert Panel Roundtable: What are the security challenges of protecting large campus environments?
Electronic security systems: Manufacturers & Suppliers
- CyberLock Electronic security systems
- Alpro Electronic security systems
- ASSA ABLOY - Aperio® Electronic security systems
- HID Electronic security systems
- ACT Electronic security systems
- Morse Watchmans Electronic security systems
- CLIQ - ASSA ABLOY Electronic security systems
- SALTO Electronic security systems
- TDSi Electronic security systems
- Dahua Technology Electronic security systems
- Sargent Electronic security systems
- AMAG Electronic security systems
- Corbin Russwin Electronic security systems
- EVVA Electronic security systems
- Baxall Electronic security systems