HID Global, a provider of trusted identity solutions, will showcase its latest physical access control and secure identity solutions at IFSEC London in Hall 7, stand IF 2130, June 18-20. For the first time in the UK, HID Global will present its recently launched biometric fingerprint reader for secure access control, and a new, game-changing augmented reality tool. The company will also highlight new integrations using HID’s cloud-based card issuance for streamlined enterprise deployments...
Morse Watchmans, the industry pioneer in key control and asset management systems, is showcasing the benefits of their KeyWatcher Touch and AssetWatcher key and asset management solutions at IFSEC International 2019 (stand no. IF620) in London, from June 18-20. The company is also introducing KeyWatcher Fleet, a key control system specifically for fleet management, to IFSEC attendees. “We’re thrilled to once again showcase the exciting features of our AssetWatcher and KeyWatcher Tou...
PAC & GDX, providers of access control and door entry solutions, are showcasing the range and depth of their innovative technology on Stand IF2930 at IFSEC International 2019. From a single door installation to a fully integrated network based system, the company’s extensive portfolio provides unbeatable reliability and robust functionality, at a price point that enables installation in a diverse range of residential and commercial buildings. In order to provide integrators and end us...
Suprema ID, global provider of biometrics and ID solutions, has announced that it will launch the new FAP30-compliant BioMini Slim 3 fingerprint scanner, at ID4Africa 2019 in South Africa on 18 - 20 June 2019. BioMini Slim 3 fingerprint scanner The new BioMini Slim 3 comes with the world's slimmest optical sensor. With the FAP30 compliant wider platen, the scanner now captures wider area of fingerprints which leads to better accuracy. The sensor's slim form factor also allows extra flexibility...
Suprema ID, global provider of biometrics and ID solutions, has announced that it will showcase the new FAP30-compliant BioMini Slim 3 fingerprint scanner, at SDW2019 in London, UK on 11 - 13 June 2019. BioMini Slim 3 fingerprint scanner Suprema ID's new BioMini Slim 3 fingerprint scanner comes in a robust IP65-rated dust and waterproof structure with the ultra-slim optical sensor featuring its proprietary advanced LFD (Live Fingerprint Detection) technology to prevent spoofing frauds. Moreove...
LEGIC launches its powerful ATC4096-MP312 smartcard IC with 8k byte memory and an improved reading distance. The new transponder chip is EAL 5+ certified and has a long-time backwards compatibility to readers in the field. LEGIC is proud to offer such an impressive IC in its product portfolio. LEGIC’s new smartcard IC features an improved reading distance of up to 11 cm on ISO 14443 A. Thanks to its backwards compatibility to the reading infrastructure of more than ten years, it can easil...
Globally renowned biometrics company, Fingerprint Cards AB (Fingerprints) has announced that it has now shipped 1 billion fingerprint sensors worldwide. The Swedish-based biometrics specialist company has played a central role in bringing smartphone fingerprint sensors to the mass-market. Having led major advancements to the technology, Fingerprints was responsible for driving the first integration of fingerprint touch sensors into an Android handset back in 2014, with its high-tech fingerprint sensors now integrated into more than 330 smartphone models globally.Fingerprint biometricsFingerprint biometrics has already replaced the PINs and passwords on smartphonesFingerprint biometrics has already replaced the PINs and passwords on smartphones and as devices diversify, Fingerprints’ expertise is also bringing trust to a range of new, next-generation form factors, cutting across a variety of applications, including access control, smartcards and IoT.“This represents a major milestone for the company and the industry, demonstrating rapid consumer adoption of biometrics in recent years,” comments Phil Sealy, Principal Analyst at ABI Research. “We see sustained growth for the biometrics market in the coming years, driven by existing use cases like smartphones, and the rise of new applications like payment cards and connected cars. Fingerprints will continue to play a significant role in enabling innovation in these areas, taking its significant biometric expertise and reapplying to new emerging use cases.”Optical fingerprint sensors for mobileEarlier this year, Fingerprints secured the world’s first volume order of fingerprint sensors for dual-interface payment cards. To complement these existing capacitive sensors, Fingerprints recently announced optical ‘in-display’ fingerprint sensors for mobile, enabling consumers to authenticate on the smartphone screen and offering OEMs greater design freedom. Its full portfolio of biometric solutions also includes ‘touchless’ biometrics solution, with iris and facial recognition combined for a convenient and secure user experience.“This is a proud moment for us and the global biometrics industry; proof of how far we’ve come in simplifying the lives of consumers every day, all over the world. But this is just the beginning,” comments Christian Fredrikson, CEO at Fingerprints. “With huge investment into hardware, software and algorithms, we are continuing to drive new innovative solutions to market while increasing performance and enhancing the user experience. As applications continue to arise and new technologies emerge, we’re committed to realising our vision of truly seamless ‘all-in’ security, where you are the key to everything.”
Allegion US, a provider of security products and solutions, and Open Options, a global access control solutions company, integrated the ENGAGE IP Gateway with DNA Fusion software to expand their offering of scalable security solutions. Open Options is a longstanding Allegion software alliance member and is committed to offering the most up-to-date technology available. The integration of the ENGAGE IP Gateway with Open Options’ DNA Fusion access control platform offers users another cost-effective option in their access control solution. Simplify installation The ENGAGE Gateway provides the ability to leverage existing IP-based infrastructure for maximum efficiency The ENGAGE Gateway provides the ability to leverage existing IP-based infrastructure for maximum efficiency. Ethernet connectivity provides the ability to connect to the network for real-time access control directly from an in- or out-of-network host to an edge device. To further simplify installation, the Gateway can be powered over ethernet (PoE), removing the need for separate power supplies or wiring. The ENGAGE Gateway performs regular, frequent communication between the Gateway and linked ENGAGE enabled devices. The Gateway is able to send commands such as lock, unlock and lock down from an IP host in real-time. Commands are executed in less than five seconds. As an Internet of Things (IoT) device, the Gateway leverages network security practices, including AES-256 bit and TLS encryption to provide customers with secure, dependable experiences. Real-time communication These secure communication protocols, in addition to real-time communication between devices, help to ensure the end user’s facility security is constantly monitored and allows access events to be addressed immediately. This solution also minimises traditional hardware infrastructure, which provides the end user a smaller security footprint and cost savings. “Open Options is dedicated to providing open platform solutions, which is why we continually work with leading security providers to develop integrations that give end users a choice in their access control products,” said Ben Vestal, vice president of sales and business development at Open Options. “We’re excited to join with Allegion in offering our end users an opportunity to further enhance their security by utilising real-time connectivity between their electronic lock and access control solution.” Access control software DNA Fusion is designed with customer input to ensure it delivers a user-friendly and open access control platform DNA Fusion, Open Options’ award-winning open architecture access control software, seamlessly integrates with security systems like Schlage’s electronic locks, readers and credentials. Developed by experts with years of industry experience, DNA Fusion is designed with valuable customer input to ensure it delivers a user-friendly and open access control platform. Other supporting products—visitor management, photo ID and more—work together to provide a complete security solution. Numerous Allegion products have a deep integration developed by Open Options. The integration between DNA Fusion and the ENGAGE IP Gateway is the result of requests for additional solutions by the end user. Networked access control It can leverage an existing IP infrastructure to enable networked access control to doors traditionally ignored. “What’s great about Open Option’s DNA Fusion software is that it offers a full-scale access control solution that can be tailored to fit each customer’s unique security needs,” said Dewey VanVoorhis, electronics product manager at Allegion. “This integration offers end users yet another solution to expand security and convenience to more of their doors.”
Farpointe Data, the access control industry's OEM for RFID credentials and readers, announces that its Conekt mobile smart phone access control identification solution now integrates advantages that Apple iOS 12 delivers, such as 3-D touch, Widget and Auto-Unlock, into the Conekt Wallet App, version 1.1.0. All new improvements create increased user convenience. “These improved Wallet App features let access control system manufacturers, integrators and dealers provide their customers with the simplest to use mobile access credentials in the market,” explains Scott Lindley, general manager of Farpointe Data. Mobile access control “Our Conekt solution provides the easiest way to distribute mobile credentials with features that include allowing the user to register only once and requires only the handset's phone number. We need no portal accounts or activation features. By removing these and additional information disclosures, we've also addressed privacy concerns that have been slowing adoption of this technology.” The newly improved Widget lets the user make up to three mobile access control credentials as widgets For instance, the newly improved Widget lets the user make up to three mobile access control credentials as widgets. This saves time by allowing quicker access to credentials supporting divergent building systems such as payroll, parking and cafeteria systems, directly from the smartphone's home screen. Biometric defences With 3-D Touch, a new pressure-sensitive feature, the user simply pushes on the Wallet App to select from up to three of the most commonly used mobile credentials. Each user can choose their own combination. For example, a delivery driver may gain entrance to the van parking area while the vice president gets access to the boardroom. Lastly, Auto-Unlock lets a user select a MAC as their favourite. Once designated, a little star appears in the upper right corner of the mobile access credential. As the favourite, it is transmitted immediately whenever the Wallet App is selected. All new Wallet App features are available immediately and will continue to operate securely behind the smart phone's PIN code and biometric defences.
NatWest has rolled out the UK’s first biometric payment card trial. The card is provided by Gemalto and is using Fingerprints’ T-shape sensor module and newly-announced software platform for payments. Its ultra-low power consumption means that the card does not need to feature a battery, as it borrows power from the contactless POS terminals, and superior biometric performance ensures both security and convenience for its user. This is the first trial in the UK, a leading and pioneering market for contactless payments. As part of the trial, NatWest customers will be able to verify transactions above the £30 payment cap using their fingerprint instead of PIN code, using an easy and secure interface.
People and vehicle access control specialist Nortech will be exhibiting at Elevate 2019, the meeting place for UK’s growing physical activity sectors at London’s ExCel on the 8-9 May to introduce its innovative products to the market. 2019 is Nortech’s first time at the show and they will be demonstrating the flexibility of the Norpass access control solution, which provides a wide range of features that are ideally suited to the leisure sector. Access control sector With Norpass, access control can be provided at all access points to gyms, fitness studios, health clubs and more to ensure that only authorised members and staff can enter the premises. Nortech recommends the use of its Mifare readers and smartcards that have a dedicated secure access control sector. Norpass3, the licence free software at the heart of the access control system, can run on any standard specification PC The benefits of using smartcards with a dedicated access control sector is greatly improved security plus the ability to issue sequentially numbered cards to members, facilitating easier card management. In addition, the same cards can be used for other Mifare enabled facilities such as vending machines and fitness management systems. Norpass3, the licence free software at the heart of the access control system, can run on any standard specification PC (Windows 7 onwards) and is quick and easy to set up using the built-in setup wizard. Time limited access It includes many features that are ideal for leisure centre membership access control including - Picture Pop-up - This enables staff to monitor people entering through a turnstile to ensure that the person entering is the valid cardholder. When an ID card is presented to the reader, the cardholder’s photo automatically appears on the screen of the operator/administration terminal. Time Limited Access - A feature that automatically enforces time limited access to certain areas (for example where a member is allowed the use of the facility for a fixed number of hours each week). Once a member has used up their weekly allocated time, they will not be allowed access until the start of the next week or until a staff member has granted an extension. Count Groups and Reporting - This feature can be used to ensure that the number of members of a particular category present within a restricted area does not exceed a preassigned limit (e.g.for health and safety reasons), and to make sure that the appropriate level of supervision is available. Whenever the numbers exceed the limit, an alarm will be raised to alert staff to take action. Automatic Digital Video Recorder Activation - Individual ID cards can be registered on the system so their use can be monitored in real time. For example, if a card has been reported as lost or stolen, its record can be set to automatically activate a video recording of the person using that card when it is used to gain access through a certain turnstile. Vehicle access management Nortech will also be demonstrating the Nedap ANPR (Automatic Number Plate Recognition) solution for vehicle access management. The ANPR is fully compatible with Norpass so that it can provide a fully integrated vehicle access management system for staff and members. Nortech has supplied products and solutions to the security industry for over 25 years as an independent British company. The company uses extensive experience and expertise to create new security products to fit their clients’ needs and designs everything with the customer in mind. Visit Nortech at Elevate 2019 on 8-9 May at London‘s ExCel to find out more about the many systems available and how they can benefit the future of people and vehicle control solutions.
In the past, biometrics solutions for access control were often deployed with reduced security thresholds because their imaging technology, which routinely yielded false fingerprint rejections, resulted in long authentication lines at the door. HID Global, a global provider of trusted identity solutions, announced its new fingerprint reader that merges credential excellence with HID’s globally-patented multispectral imaging technology to address this issue and fuel broad adoption of biometrics at the door. The high-performance iCLASS SE RB25F fingerprint reader provides an unrivalled experience by dramatically increasing image capture performance and fingerprint matching in under a second, significantly reducing delays that were previously symptomatic of biometric solutions. Lumidigm multispectral technology The reader is field-configurable over a network, and is designed to ease migration from traditional and existing fingerprint reader solutions"“Driven by increasing threats to an organisation’s security, biometric authentication is one of the fastest growing segments in the access control market,” said Stephen Carney, Vice President of Product Marketing, Physical Access Control Solutions with HID Global. “The powerful combination of HID’s highly reliable Lumidigm multispectral technology and the reader’s robust construction with IP67 and anti-vandal IK09 ratings now enables customers to deploy fingerprint authentication across a wide range of real-life environments. The reader is also field-configurable over a network, and is designed to ease migration from traditional and existing fingerprint reader solutions.” Real-time validation of fingerprints HID’s multispectral imaging technology captures images from both the surface and sub-surface of the skin so that all types of fingerprints, from people of any age, can be read quickly and reliably in cold, dry, dirty, wet and other challenging environmental conditions. This, coupled with trusted liveness detection for spoof prevention, enables the iCLASS SE RB25F reader to provide real-time validation that fingerprints are genuine and belong to a living person who is physically present at the authentication point. To maximise security, the reader includes built-in optical tamper protection, and it supports the Open Supervised Device Protocol (OSDP), as well as HID’s Seos technology for multi-layered authentication between the reader and credentials. HID Biometric Manager The iCLASS SE RB25F can be used with all popular industry-standard high frequency credential technologies Security administrators can download the complimentary HID Biometric Manager, an on-premise software tool for configuring and managing one or many iCLASS SE RB25F readers. Built on a server- and browser-based client architecture, the HID Biometric Manager is ideal for enrolling users’ fingerprints (for both 1:1 verification and 1: N identification modes), assigning access rights and conducting many other functions. The comprehensive tool can also be used to securely log all door events where the readers have been installed and to upgrade readers in the field remotely over a TCP/IP connection. Certified in several major geographies worldwide and available with multiple interface options for various system architectures, the new iCLASS SE RB25F can be used with all popular industry-standard high frequency credential technologies (including HID Mobile Access Mobile IDs, Seos, iCLASS SE, iCLASS, MIFARE DESFire, MIFARE Classic).
The access control industry tends to be more conservative when it comes to the adoption of new technology and services for end users, but that doesn't mean that 2019 won't provide a significant amount of progress through emerging trends taking shape in the industry. In addition to the increased adoption and acceptance of the cloud, mobile credentials and biometrics are becoming more mainstream, and integrations between manufacturers will take centre stage. Here, we take a look at these and other trends helping to shape the coming year. Cloud-based products We're continuing to see a demand by end-user customers for customised responses to certain actions within an access control system For many access control manufacturers, the core of the business is in more traditional products, with a high percentage of installs continuing to be these kinds of projects. However, over the last couple of years, cloud-based products have emerged as a viable option for customers. We've seen more of a willingness for end-user customers to inquire whether this is an option for them, citing ease of use, remote management, cybersecurity and more as part of their foray into this branch of access control. The cloud has established its reputation as being quicker to install, more flexible for customers to access and manage both their access points as well as the video associated with these doors, and placing less pressure on internal (or in some cases, non-existent) IT teams to help set up and manage an access control system. Mobile credentials applications We're continuing to see a demand by end-user customers for customised responses to certain actions within an access control system. For example, if there's an alarm set off during the day along a perimeter, the ability to automatically execute a lockdown and simultaneous email or message to everyone within the building alerting them to the issue is critical. The desire for this kind of flexibility within a system is prompting manufacturers to build new simple to use graphical tools into their systems that allow customised action responses that are proportional to the level of alarm. There's a strong desire by many of today's companies to be able to use mobile phones for access control and as such, manufacturers are either developing their own mobile credentials applications or integrating their systems with these kinds of products. Over the last couple of years, cloud-based products have emerged as a viable option for customers Future of biometrics As companies start to ask about whether their facilities are safe enough, they're often more willing to consider access control that takes security to a new level, such as the implementation of biometric readers. Biometrics is getting more usage in professional security applications and many customers want to move away from using physical cards for access control. Manufacturers that don't currently have biometric hardware in place are starting to integrate with readers designed to offer this functionality in an effort to meet the demands of customers. The dramatic rise in facial recognition biometrics is something that will likely shape the future of biometrics as costs start to decrease. While the access control industry is highly fragmented, we're seeing a trend toward increased partnerships and open-platform technology that helps end users achieve the kind of comprehensive security that they desire. Video management platforms We're seeing a trend toward increased partnerships and open-platform technology that helps end users achieve the kind of comprehensive security that they desire For example, there are a number of access control providers that are providing paths toward full integration with lock manufacturers and vice versa in an effort to meet the needs of clients who may have purchased locks but a high powered access control system to properly manage them. There's also a large shift toward full integration with video management platforms and access control systems to fully integrate the two into a single, user-friendly experience and give end users more control over both. Additionally, manufacturers are looking to provide customers with a single system that meets the needs they have with regards to video, intrusion and access control. Right now, I don't think there's a system that can fully deliver on the promise of being exceptional at all three, so integrations and partnerships remain important to achieve that end goal. Access control world An increasing number of end users are realising the holes in the current Wiegand protocols that have been in place since the 1980s, along with the large number of ‘off the shelf’ equipment that's now available to allow outsiders access through readers that operate under these protocols. As a result, in the last decade or so, OSDP has come onto the scene and is growing in popularity. One of the most important steps for access control manufacturers in 2019 will be to listen to customers who are concerned with this vulnerability and work toward fully supporting OSDP in an effort to protect these access control systems. It's an exciting time to be a part of the access control world, as we finally see results from all of the hype centred around the cloud, biometrics, mobile credentials, hacking protection and strong partnerships come to fruition. As 2019 begins, look for these trends to grow in popularity and for manufacturers to really listen to the end-user customer they serve and respond in kind.
Considering how much the modern smartphone has become a common everyday tool and cultural icon, it’s hard to believe it has only been with us for a relatively short space of time. The first Apple iPhone was launched in 2007 and yet in a little over a decade the smartphone has become as essential as our keys or wallet. From its conception as a multi-faceted communications device, it has morphed into something far more integrated in our daily lives. Services such as Apple Pay, Android Pay and PayPal have seen the smartphone become a credible replacement for cash and cash cards, but equally, it is possible to replace access cards and keys as well.Smartphones can easily receive authentication credentials remotely and access can be confirmed or denied instantly The ability to accurately authenticate an individual and the applications this offers for security purposes, is something that the security industry needs to continue to embrace and further promote to our customers. Considerable advantages Most security professionals understand the potential benefits of using mobile device authentication, with flexibility being the key advantage. Smartphones can easily receive authentication credentials remotely and access can be confirmed or denied instantly. Equally, smartphones already contain many secure options to ensure they are only used by the authorised user – fingerprint and face recognition, as well as pattern authentication and PIN, being prime examples. Unfortunately, there is still a lack of awareness amongst some security operators, customers and the public of these exciting benefits. Potentially there may also be some reluctance, in certain quarters, to trusting a mobile device with physical security. A lack of trust in seemingly ‘unproven’ technology is not unusual, but the security industry needs to demonstrate reliability along with the considerable security and convenience benefits of using it. Trusted part of security network Many smart devices already securely bind the mobile device with the right person by using 2-factor authenticationMobile device security needs to earn its trust, in much the same way as any other new ground-breaking application. In fairness to the doubters, it’s not hard to imagine how much of a risk a badly protected mobile device could be to any secure network! There are two key obstacles that smartphones need to clear before they can become a trusted part of the security network though. Firstly, that they are secure enough to be trusted as part of a security network, and secondly that they can reliably identify an authorised user in a real-world environment. Many smart devices already securely bind the mobile device with the right person by using 2-factor authentication. For example, this could combine a PIN code with the fingerprint or face of the authorised individual. In areas with particularly high security, you could also implement a wall-mounted biometric reader (fingerprint, facial recognition or iris scan) to add a further level of protection and ensure there is no wrongful use of the mobile device. Security tokens or access cards are typically rigid in their programming, only allowing access to certain areas Security by location With its many and varied functions, undoubtedly one of the most useful systems on any smartphone is its GPS location tracking. It’s also a perfect tool to assist with security systems interaction.A benefit of using smart device authentication is the cost savings over operating traditional tokens Consider any secure facility – it will feature different levels of access. This can vary from a humble canteen and break-out areas, right through to secured doors around potentially dangerous or highly sensitive areas - such as plant rooms, or even a nuclear facility! Security tokens or access cards are typically rigid in their programming, only allowing access to certain areas. A smartphone, however, can be granted or denied access depending on the location of the request by the individual – GPS literally adds a level of extra intelligence to security. Personal items Using QR codes seem to be a simple but reliable identity and access control authentication option Mobile devices tend to be guarded and protected with the same concern as your money or your keys. Many of us literally carry our mobile device everywhere with us, so they are relatively unlikely to be misplaced or lost – certainly in comparison to a key card for example. Also, think about how often you use or hold your smartphone – some estimates suggest 2,600 times each day! With that level of interaction, you’ll be aware very quickly if it’s been misplaced, not least because of the inconvenience and cost to replace it. This level of personal connection makes it perfect for use with security systems. Cost savings Another obvious benefit of using smart device authentication is the cost savings over operating traditional tokens. No more plastic badges, access cards, lanyards, printers and consumables used to administer security. This is something the security industry really needs to shout about! It will come as no surprise to hear that smartphones are exceptionally common too. Figures suggest that in 2015 there were nearly 41m in use in the UK and this is predicted to rise to 54m by 2022. With the UK population being just over 65m, that is a very high percentage of people already carrying this technology. Using a resource that people already have, and which is highly secure, makes unquestionable financial as well as practical sense. GPS location tracking is a perfect tool to assist with security systems interaction Integrated technology Agreeing on common and shared open protocols has unfortunately been one of the stumbling blocks for the security industry in adapting to a predominantly smartphone authentication approach. NFC (Near Field Communications) technology in mobile phones and smart devices has failed to be the universal success it promised.Not everyone has an iPhone, but it is such an important segment of the market for customers Mobile technology trends have dictated to the systems that use it. Apple’s earlier (Pre iOS 11) decision to restrict the use of NFC to Apple Pay on its devices has had a profound effect on the implementation of NFC in other applications too. Not everyone has an iPhone, but it is such an important segment of the market that other manufacturers are wary of how customers will be able to use any new technology. We have seen a much bigger focus on using Bluetooth Low Energy technology on mobile devices instead. With providers such as HID Global, STid in France and Nedap in the Netherlands now concentrating on developing Bluetooth Low Energy readers and mobile credential applications, this seems like a highly credible alternative. Along with NFC and Bluetooth Low Energy options, there also seems to be a lot of interest in using QR codes as simple but reliable identity and access control authentication. These can easily be displayed on a screen or printed if necessary, giving great flexibility over the type of technology that is used in the future. Upgrading existing security systems There are strong arguments for many businesses to continue using MIFARE+ systems if they suit operations well We are steadily seeing the signs of smartphone authentication replacing the cards and tokens we have been familiar with. However, many consumers still want options rather than to just be railroaded down one path. A business that has invested in cards or tokens will want to use that technology investment fully. The changes will come when readers are updated – this is when security specifiers and installers need to promote the advantages of dual-technology readers, which offer options to include smartphone authentication into the mix. There is still considerable diversity amongst smart devices, the operating systems they use, and the security technology employed by each. Android, Apple iOS and Blackberry devices all vary with regards to the biometric authentication available, so security administrators may need to be flexible on the types of authentication they accept. Interestingly, card technology has also progressed at an astonishing speed too – with MIFARE+ proving to be a highly cost-effective, practical and secure system that can easily be integrated. There are strong arguments for many businesses to continue using these systems if they suit operations well. NFC (Near Field Communications) technology in mobile phones and smart devices has failed to be the universal success it promised Hybrid systems A hybrid approach may be the best answer for many security operators. This means those who choose to enjoy the benefits in terms of flexibility and convenience of smartphone authentication can do so, whilst those who are more hesitant can continue to use more traditional methods. A hybrid approach may be the best answer for many security operators Larger organisations may find that the swap over is a slower and more gradual process, whilst smaller start-up businesses may prefer to jump to a smartphone-based approach straight away. If security systems are well integrated but modular in their approach, then it becomes much simpler to evolve as time goes on. Embracing the benefits Using their app-based systems architecture, smartphones are ideally placed to evolve with security systems in the future. There are many benefits for the security industry and our customers, but we need to remember that this move will involve a culture change for many security operators and users. The security industry needs to be mindful and respectful of any anxiety, but also be positive and promote the considerable benefits mobile authentication offers.
Over the past few years, biometrics has rapidly expanded into consumer applications, like the financial market for customer authentication, to payment services and withdrawing cash from ATMs in high-fraud markets. However, its adoption as an additional authentication factor for physical access control systems (PACS) and other enterprise applications, hasn’t been as rapid. But this is changing. Biometrics offers numerous benefits at the door and throughout the enterprise. With the advent of new anti-spoofing capabilities, and its integration into secure trust platforms that protect privacy and support a variety of RFID credential technologies, biometric authentication is poised to deliver a much higher matching speed and better overall performance. This will dramatically improve an organisation's security, whilst enhancing user convenience.Newer solutions are overcoming security and convenience hurdles to help realise the full potential of biometrics Challenges for biometric authentication Biometrics fuses convenience and security while validating “true identity” versus identity that is associated to the possession of an ID card. As an example, biometrics prevents a user from taking someone else’s card and obtaining access to privileged resources. This adds the human element to traditional methods of authentication, strengthening security by combining something the user “is” with something the user “has” or “knows.” According to the firm ABI Research in its May 2018 study, Biometric Technologies and Applications, the total fingerprint sensor shipments for the entire consumer market is “estimated to reach 1.2 billion worldwide for 2018, thus ensuring its market dominance.”It has been far too easy for fraudsters to create a fake fingerprint and present it to a reader Despite the benefits of fingerprint authentication in numerous consumer applications, there have been impediments to its broader adoption in the enterprise. While price has been one big roadblock, there have also historically been other reasons for its slower-than-expected growth. First, many technologies are still vulnerable to spoofs and hacking. It has been far too easy for fraudsters to create a fake fingerprint and present it to a reader. Equally troublesome, older products have not been able to move users through the doors as fast as a simple ID card and reader. In general, all fingerprint capture technologies are not equal amongst older products, and there can be significant differences in performance. Developing Technology Performance Newer solutions are overcoming these security and convenience hurdles to help realise the full potential of biometrics. Their development has focused on three key areas: How fingerprint images are captured – if the image can’t be properly captured, the rest of the process fails The implementation of liveness detection to enhance trust – even in the case when the image is properly captured, if it is fake the system cannot be trusted Optimising performance through a combination of new technology and algorithms, whilst ensuring interoperability so the performance can be trusted. The skin is illuminated at different depths to deliver much richer data about the surface and sub-surface features of the fingerprint Optimising capture The quality of the captured image is critical, across all types of fingerprints and environments. Many customers choose sensors that use multispectral imaging because it collects information from inside the finger to augment available surface fingerprint data. The skin is illuminated at different depths to deliver much richer data about the surface and sub-surface features of the fingerprint The skin is illuminated at different depths to deliver much richer data about the surface and sub-surface features of the fingerprint. Additionally, the sensor collects data from the finger even if the skin has poor contact with the sensor, because of environmental conditions such as water or finger contamination. Multispectral sensors work for the broadest range of people with normal, wet, dry or damaged fingers, across the widest range of usage conditions – from lotions or grease to sunlight to wet or cold conditions. The sensors also resist damage from harsh cleaning products and contamination from dirt and sunlight. Liveness detection Liveness detection is the ability to determine that the biometric data captured by the fingerprint reader is from a real living person, not a plastic fake or other artificial copy. An increasingly visible dimension of biometric performance in commercial applications, liveness detection is critical for preserving trust in the integrity of biometrics authentication. At the same time, it must not impede performance or result in excessive false user rejections.While liveness detection optimises performance, it is also important to ensure that this performance can be trusted The most trusted multispectral imaging fingerprint sensors with liveness detection provide a real-time determination that the biometric captures are genuine and are being presented by the legitimate owner, rather than someone impersonating them. This capability leverages the image-capture approach of using different colors or spectrum of light to measure the surface and subsurface data within a fingerprint. In addition to this optical system, the biometrics sensor features several core components, including an embedded processor that analyses the raw imaging data to ensure that the sample being imaged is a genuine human finger rather than an artificial or spoof material. Advanced machine learning techniques are used so the solution can adapt and respond to new threats and spoofs as they are identified. While liveness detection and the underlying capture technology optimises performance, it is also important to ensure that this performance can be trusted. This requires adequate testing to ensure interoperability with template matching algorithms. The first requirement for incorporating biometrics into a physical access control solution is a secure trust platform Trusted performance The top-performing solutions capture usable biometric data on the first attempt for every user. They also speed the process of determining that the biometric data is not a fake, and they quickly perform template matching to reject impostors and match legitimate users.The card/mobile plus finger mode is one of the fastest-growing two-factor authentication use cases for securing access to both physical and digital places To trust this performance, though, the focus must be elsewhere: on interoperability with template-matching algorithms. Extensive interoperability testing must be performed by skilled and independent third parties like the National Institute of Standards and Technology (NIST) so that performance data can actually be trusted in all template-matching modes, and not simply a vendor claim. Template matching modes Template-on-card and card/mobile + finger modes using “1:1” template-matching profiles authenticates a person’s identity by comparing the person’s captured biometric template with one that is pre-stored in a database. Template-on-device mode for finger-only authentication using “1:N” matching compares the person’s captured biometric template against all stored biometric templates in the system). The card/mobile plus finger mode is one of the fastest-growing two-factor authentication use cases for securing access to both physical and digital places.Cryptography prevents any man-in-the-middle attacks while also protecting the biometric database As an example of how to deliver trusted performance, HID Global uses the top-ranked NIST certified MINEX III minutia algorithm to ensure interoperability with industry-standard fingerprint template databases. This interoperability ensures that today’s systems, which are based on much more powerful hardware than in the past, will perform accurate 1:N identification of a full database in less than a second. Physical access control integration The first requirement for incorporating biometrics into a physical access control solution is a secure trust platform designed to meet the concerns of accessibility and data protection in a connected environment. The platform should leverage credential technology that employs encryption and a software-based infrastructure to secure trusted identities on any form factor for physical access control, access to IT networks and beyond. Cryptography prevents any man-in-the-middle attacks while also protecting the biometric database. This system also must encompass remote management of all readers and users, spanning all onboarding as well as template loading and enrolment activities for supported authentication modes. Properly implemented, biometrics solutions with liveness detection also protect privacy – if you can’t use a fake finger, it is meaningless Other important focus areas include configuration and administration, plus all logs, reports and monitoring.New system architectures and data models have been created to protect personal information and maintain user privacy It should be possible to manage biometric readers as groups or individually over the network, and tools should be available to allow system administrators to manage all configuration settings from time and data to language, security and synchronisation. The system should enable continuous live monitoring of authentication, alerts and system health, and provide a rich set of associated reporting tools. There are also backend implementation decisions to be made, including how a biometric authentication system will be seamlessly integrated into third-party systems. This is another major pain point of biometric technology. To simplify deployment, application programming interfaces (APIs) should be available for direct integration of the biometrics authentication solution with the access control infrastructure. Privacy considerations Properly implemented, biometrics solutions with liveness detection also protect privacy – if you can’t use a fake finger, then even if you did obtain someone’s fingerprint data, it is meaningless. Strong and updatable liveness protection is critical if biometrics are to eliminate the need to use PINs or passwords.Strong and updatable liveness protection is critical if biometrics are to eliminate the need to use PINs or passwords Biometrics data must be handled like all sensitive and identifying information, and properly architected system designs will always consider and protect against both internal and external threats and attacks. New system architectures and data models have been created to protect personal information and maintain user privacy. Beyond the encryption of the data itself, there are now many good alternatives available for building highly secure and well protected systems, including the use of multi-factor and even multi-modal authentication to maintain security even if some identifying data is compromised. Today’s modern fingerprint authentication solutions are on a fast track to deliver a unique combination of ease of use, availability and convenience and higher security to physical access control systems. With their latest improvements in liveness detection, system architectures, performance and ability to be easily incorporated into access control solutions, they seamlessly combine security and convenience to make them a viable option when accessing a facility, networks and services. These solutions deliver a higher confidence of “who” is being admitted through the building’s front door, where it really matters.
There are many new technologies at ISC West this year. There are also some tried-and-true solutions on display. More mature products have the benefit of being fully vetted and battle-tested, which may make them a more comfortable choice for security customers. I had a couple of discussions on Day 2 of the show about the advantages, and possible drawbacks, of new products. “To a security director, when you say ‘new,’ he translates that into ‘risk,’” says Bill Spence, VP of Sales, U.S., Canada and Western Europe for HID Global’s Lumidigm biometrics brand. “Anytime you say new, there is a probability of risk. The key is to educate. Education quantifies risk, and an educated customer can make an intelligent decision about risk versus reward.” “We have to take customers from where they are to help them understand new technologies,” says Spence. “We must give them a bridge to that understanding, and education is the bridge.” Lumidigm biometrics integrations An app provides graphics that take installers step-by-step through the installation process HID Global is incorporating Lumidigm biometrics into the new iClass SE RB25F fingerprint reader being highlighted at the show. Two-factor authentication can use either a card or mobile credential along with biometrics; there is no latency; and templates can be stored on a card. Another new offering at the HID Global booth is an augmented reality tool to simplify installation of newer systems that incorporate the more secure OSDP protocol. An app provides graphics that take installers step-by-step through the installation process. Also highlighted at the HID Global booth — and at the booths of turnstile manufacturers throughout the show — are embedded readers that provide tested and certified mobile access control for turnstiles. IClass SE technology is embedded in the iRox-T Turnstile Reader from Essex Electronics. Innovative security technologies There’s a delicate balance at any trade show between creating excitement about new products and educating customers to be comfortable with new technologies. There is some of both at ISC West 2019. In the future, hardware will be a delivery device, not the core of systems “We are on the cusp of change in the industry, and it’s closer than ever,” says Jennifer Doctor, Johnson Controls’ Senior Director, Project Management - Intrusion. “We will see the impact of promised technologies that will come from other industries, such as artificial intelligence. The very definition of security is changing. We are an industry that needs to be risk-averse, and we need to prove out the technology. There is innovation, but we just need to make sure technologies are what the market wants and expects.” “In the future, hardware will be a delivery device, not the core of systems, which will come from intelligence in the software and from services,” she adds. “The products we deliver will enable that.” Have 30 percent of service companies in the U.S. security market jumped into the cloud? PowerSeries Pro intrusion portfolio Johnson Controls is highlighting the commercial PowerSeries Pro intrusion portfolio, which features PowerG encrypted technology that enables wireless systems that are cyber-secure. The cloud is coming on strong, and one company finding success in cloud systems is Eagle Eye Networks, which has seen 93% compounded annual growth over the past three years. Economies of scale have enabled them to lower subscription prices by 35%, with an extra 10% decrease for customers that pay annually. Ken Francis, President of Eagle Eye Networks, says they are signing up 50 new dealers a month for the cloud video offering. Francis estimates that 30 percent of service companies in the U.S. security market have jumped into the cloud “It’s really heating up,” says Francis. “The general cloud is driving increases in the surveillance cloud.” Jumping to cloud Embracing the cloud and recurring monthly revenue (RMR) requires that dealers transform their businesses to ensure success. Francis says dealers should dedicate sales resources to cloud offerings rather than expect everyone to sell the cloud, and there should be a base commission plan on RMR services in lieu of upfront project fees. March Networks is also showing integration of video with the Shopify cloud-based point-of-sale (POS) system “Talk to professionals about your cash flow and understand how to capitalise on financing partners to ensure cash flow while investing in the RMR stream,” he adds. “And look for ways to reduce your costs to serve the customer base as your RMR increases.” For example, use of remote site diagnostics, configuration and support can avoid the need for expensive “truck rolls” that can undermine profitability. Francis estimates that 30 percent of service companies in the U.S. security market have jumped into the cloud. Alarm companies, which are accustomed to the RMR model, are generally ahead of the curve, while traditional security integrators are lagging. “It’s a requirement to change or die,” he notes. Insight hosted managed service Also, in the area of managed services, March Networks is highlighting its Insight hosted managed service that can provide instant information on video systems located at remote sites, including visibility into firmware versions, camera warranty information, and cybersecurity status of systems. The ability to dive deeply into system status empowers a new recurring revenue stream for integrators. Color-coded icons summarise system status and show pending issues and clicking on the icons provides detailed workflow information. The system can also be offered for smaller systems such as those at convenience stores and quick-serve restaurants. March Networks is also showing integration of video with the Shopify cloud-based point-of-sale (POS) system. The integration enables managers to evaluate POS information, especially anomalies, to determine possible employee theft and other shrinkage issues.
The European Union has spelled out specific requirements and safeguards for handling and protecting personal data. In the General Data Protection Regulation (GDPR), the EU makes clear exactly what is expected of those who control and process data. (The United Kingdom has committed to follow the regulation despite the Brexit vote.) Everyone is facing a deadline on May 25th 2018 to comply with the GDPR. What are the exact implications for the physical security market? What do customers need to do to ensure they are compliant? These are urgent questions, given that the clock is already ticking. The GDPR’s implications are especially timely considering the physical security industry’s current emphasis on the value and importance of data. The growing value of data was a big topic at the recent IFSEC show in London. The industry is looking for new ways to leverage data for benefits in a company beyond the security department. New cybersecurity responsibilities One example is access control data: Who is granted access to which door and more generally, how do employees move throughout an enterprise? This is information that can be useful to managers, whether to analyse facility usage trends or promote more efficient operations. Access control data is especially valuable when combined with other data in an organisation, such as human resource (HR) and accounting records. It provides more data points that a company can use in overall metrics to guide business operations. But as the GDPR emphasises, the value of data and the ability to leverage data come with new responsibilities, specifically a need to protect privacy. This includes a need for additional cybersecurity of networked systems, another current “hot topic” in the market and historically a weak, or at least under-addressed, point for the industry. The GDPR applies to “personal data,” but its detailed definition includes digital information such as IP addresses and a range of personal identifiers. Sensitive personal data, such as biometric data used to uniquely identify an individual, is in a “special category.” Physical security systems collect plenty of personal data, some of it critical and sensitive, including an employee’s PIN code, fingerprints, or even video footage. GDPR impact on physical security Other areas that might impact the physical security industry include requirements to provide information about any transfers of data to other countries outside the EU and the retention period of data and criteria used to determine the retention period. There is also a “right to erasure” that provides an individual a right to have personal data erased if it is “no longer necessary in relation to the purpose for which it was originally collected/processed.” Physical security systems collect plenty of personal data, some of it critical and sensitive, including an employee’s PIN code, fingerprints, or even video footage In the accountability section of the regulation, companies are required to implement “appropriate technical and organisational measures” to ensure and demonstrate compliance. In the category of “data protection by design”, there is a general obligation to “implement technical and organisational measures to show that [a company] has considered and integrated data protection into processing activities.” It is even more reinforcement to the need for more cybersecurity. Data protection by design The GDPR endorses the use of approved codes of conduct and certification mechanisms to demonstrate compliance, including codes created by trade associations or representative bodies. There may be an opportunity for organisations in the physical security market to step in and create such guidelines and to clarify best practices as they relate to our market’s technologies. In the category of “data protection by design,” physical security system manufacturers should include data protection and security from the ground floor as they are designing new products. Based on several recent conversations, I can say with confidence that these concerns are definitely on the minds of many in our industry. But concerns aren’t necessarily answers, and time is short to fully comply with GDPR by the deadline. And the issue isn’t limited to Europe; multi-national companies that do business in Europe, or even cloud systems that store data there, are also impacted. And even beyond GDPR, data protection is an urgent concern around the world. It’s time to step up.
What happens to a company’s data in the case of a disaster such as 9/11 or Hurricane Sandy? How can a company recover from a disaster and continue their business uninterrupted? It’s a complicated challenge – and one many security professionals and risk management professionals must consider. Companies like Recovery Point provide resources to help a company survive a catastrophic event and keep its computer programs and business processes running. Their customers include large, well-known companies and the government. “When big disasters happen, people begin rethinking what they need to protect against,” says Dick Fordham, Director of Marketing and Strategy, Recovery Point. “We try to imagine the worst that can happen, and put in place adequate measures to provide the security in those areas.” Recovery Point is a national provider of integrated business continuity and disaster recovery systems. The company stores copies of its customers’ critical enterprise data on its servers in multiple locations. Recovery Point enables customers to bring their systems and networks back up and let employees continue working despite any damage from the disaster. “We’re not a big company – about 150 employees – but we can service the biggest clients because we provide a high degree of personalised service,” says Fordham. There is also a 45,000-square-foot facility in Gaithersburg, Maryland, where clients’ data can be stored up to 30 days on disk and up to seven years on tape Client data storage and backup Recovery Point’s flagship facility is located on a 17-acre private campus in Germantown, Maryland; about 30 miles northwest of Washington, D.C. There is also a 45,000-square-foot facility in Gaithersburg, Maryland, where clients’ data can be stored up to 30 days on disk and up to seven years on tape in high-end, secure vaults. There are also two 100-seat work areas where displaced workers from customer companies can continue to perform their duties – one in Gaithersburg and another one in Kenosha, Wisconsin. Recovery Point is also a tenant in a data centre in Mt. Prospect, Illinois, providing an additional, redundant location to store data in case of a disaster. Recovery Point offers cloud backup strategies to handle data from major computer systems used by large companies; whether it’s mainframe computers, AIX operating systems or iSeries. In addition to providing recovery services in case of a disaster, the company works with companies daily to test and maintain their systems and to provide proof-of-concept demonstrations. Concentric circles of security Security is a large part of the services Recovery Point provides. The company leverages the most secure approaches and technologies to ensure that customers’ data is protected, including the familiar “concentric circles of security” approach familiar to most security practitioners. At the centre of the circle is the data of customer companies, what Fordham calls ‘the crown jewels.’ Recovery Point uses a combination of cyber, network and physical security to protect a customer’s data assets. “If their data is gone or corrupted, their business is gone or corrupted,” says Fordham. Location of the data centre(s) is the first stage of protecting the backup data. Recovery Point is located outside urban areas, away from likely terrorist threats, in an area that is not prone to hurricane or tornado activity. The ‘geographically stable’ area is above the 100-year floodplain. At the perimeter, there is no signage identifying the company or its mission. An anti-ram barrier topped with a 10-foot personnel security fence encircles the campus. At the gate, visitors must be validated remotely or by authorised badge and security code. Inside the perimeter, there are hydraulic anti-vehicle barriers that can resist a 30-tonne truck going 50 miles per hour. Bollards at four-foot intervals keep vehicles away from the building. Visitors require access badges and receptionists at multiple sign-in desks are located behind ballistic-rated bullet-proof glass Inside, visitors require access badges and receptionists at multiple sign-in desks are located behind ballistic-rated bullet-proof glass. Badges allow access only to the specific areas a visitor needs, whether it is the location where their data is stored, temporary work areas, meeting rooms or overnight sleeping quarters. Two-factor authentication includes iris-scan, fingerprint and voice recognition biometrics. Data security process Independent certification, including auditing of processes and physical boundaries around the data, meets standards such as the Federal Information Security Management Act (FISMA) and the Federal Risk and Authorisation Management Program (FedRAMP). The network and power must also be stable and Recovery Point has Uptime Institute Tier 3 certification, which includes redundant, switchable systems. There is an A side and B side to each system; if one side is ‘down’ for maintenance or a malfunction, the other side is fully functional to ensure uninterrupted service. “Customers have already had one disaster,” says Fordham. “We make it as painless as possible for them not to worry about their data, to make them feel secure. In a disaster there are other things to worry about, such as their home and families. We want security you can see and security you can feel.”
South Africa’s Athlone Campus is home to the Western Cape College of Nursing, a sprawling complex of lecture halls, administration blocks and four hostels that house around 2000 nursing students. Gallagher Command Centre was chosen as the most effective system to manage access to the hostels and keep the students safe. The nursing college had no method of limiting access to its hostels. People came and went as they liked, there was no record of who was on site and it was difficult to enforce visitor hours. Theft was a problem and reported cases of sexual assault had become a major concern. Access needed to be more secure. Access control system for authorised entry Biometric fingerprint readers were mounted on turnstiles at each of the hostel entrances and exits to manage general accessSafety and security are essential to providing a healthy living and learning environment for students. Athlone Campus partnered with local security solutions provider, FS Systems, to install access control and video surveillance in its hostels. Gallagher Command Centre was chosen to manage the access control system, monitoring access points and allowing only authorised students, staff and visitors to enter the hostel buildings. Biometric fingerprint readers were mounted on full-height turnstiles at each of the hostel entrances and exits to manage general access. Fingerprint readers prevent unauthorised entry from people using lost or loaned cards, and the anti-passback measures built into Command Centre means students can’t ‘pass in’ a visitor or bypass the system, as it recognises and records that someone has tried to enter twice. Integrated visitor management system Gallagher’s integrated visitor management system now monitors visitors and allows the college to control visiting hours. Visitors to the college hostels must register at reception and have their fingerprint captured by the visitor management system. They are then granted access to only the hostel they are visiting. In the evening, the system generates an alarm and reports on visitors still on site – allowing security to ask people to leave and prevent further visitors from entering. The general feeling from students and staff is that they are more secure" Jason Adams, Cost and Estimating Manager for FS Systems says, “The general feeling from students and staff is that they are more secure knowing that everyone entering the facility has gone through some sort of screening or registration process at the security office. The presence of physical security barriers (full-height turnstiles) is reassuring, in that not just any person can gain entry without the necessary authorisation.” Installation of video surveillance solution Alongside access control, the college installed a comprehensive video surveillance solution to reduce incidents of violence, vandalism and crime. The entire video management system is seamlessly integrated with Command Centre, creating one easily managed security solution to track student, staff and visitor movements and ensure that when an incident does occur, security staff are quickly informed and able to respond effectively. “It’s essential for the system to be user-friendly and easy to operate and manage,” says Jason. “The detailed maps that appear onscreen with Gallagher Command Centre clearly indicate the location of alarms and give security staff the ability to respond more quickly to emergencies.” Using Gallagher Command Centre, the nursing college now has a powerful and versatile security system that meets the unique needs of its site. Reduction in criminal activity The college has achieved significant cost savings through the prevention of vandalismThe system provides a reliable way to clearly capture data to monitor students, staff and visitors, lower criminal activity and improve onsite safety. In particular, security personnel can easily find the right information for quick incident resolution, which has led to improved processes, procedures and convictions when necessary. The college has also achieved significant cost savings through the prevention of vandalism and a significant reduction in reported cases of theft. The combination of the new access control system and an increase in physical security barriers means they have also been able to decrease the number of security guards patrolling the facility, reducing overhead costs. Customising and generating reports for college management is also a straightforward task, saving time and money. Most importantly, Gallagher’s security solution has given Western Cape College of Nursing control of who is on site and when – allowing its students to be safe, secure and focussed on learning.
IndiaNivesh is one of the leading financial services conglomerate in India. IndiaNivesh is into various aspects of investment banking and consulting business. It plans to emerge as a dynamic, customer-centric, and progressive financial group in the country with PAN India presence. Having its head office in Mumbai, IndiaNivesh is growing with eight regional offices and 29 branch offices across India. Project specifics Application: Time-Attendance and Access Control Locations: 32 (PAN India) Users: 500 Units Installed: 60 Readers: Fingerprint and RFID Card IndiaNivesh being widely involved in financial services business with 29 branch offices and 8 regional offices across India, required eradication of forged attendance data and manual attendance process, as security is a crucial aspect for them. To streamline and manage attendance data of all employees accurately and perform calculation of error-free salary has been a tedious task. It has been challenging to integrate their existing payroll software with the time-attendance software. COSEC time-attendance solution Matrix offered COSEC time-attendance solution helped in connecting all its regional and branch offices to their head office in Mumbai Matrix offered COSEC time-attendance solution which has web-based architecture and helped in connecting all its regional and branch offices to their head office in Mumbai. Implemented automatic salary calculation as Matrix COSEC time-attendance software got easily integrated with existing payroll software. Result Real-time attendance of all employees at a centralised location Integration with its existing payroll software Ease of Implementation using the existing infrastructure Fraudulent timekeeping is completely eliminated Accurate In/Out time of each employee recorded Live monitoring of In/Out timing Generation of time-attendance and access control reports and charts for all branches Improved overall productivity of the organisation Continuous operations with excellent service support Biometric access control solutions COSEC DOOR FOP - Optical fingerprint-based door controller for access control and time-attendance COSEC DOOR CAS – Card-based door controller for access control and time-attendance COSEC PANEL - Site controller to manage multiple door controllers and advanced access control Features COSEC LE PLATFORM - Application server platform for 1000 users and expandable up to one million users COSEC LE TAM - Comprehensive time-attendance and leave management module for COSEC LE platform COSEC LE ACM - Comprehensive access control module for COSEC LE platform
A chain of one-stop shopping destination is one of the pioneers of discount shopping center in the UAE and Dubai. With a selected chain of suppliers, they offer the widest choices of products at very affordable prices. The products of this retail chain range from daily food items to beauty products and perfumes. Household items such as kitchenware, tableware, appliances, decors and electronics including mobile phones and computer accessories are also available here. The store offer apparels such as ladies wear, menswear, and children’s wear, in addition to shoes, bags, school and office supplies. Branches of this retail chain are located in more than eight locations with the one in Sharjah being the biggest branch till date. Easy attendance management Since branches of this retail chain are spread across UAE, managing attendance of every employee became a tedious task. Moreover, keeping track of each of their IN and OUT timings, overtime, leaves, and shift management for multiple locations from a single location was another challenge the retailer faced. Attendance management, multiple shift management and over time calculation became tricky challenges to deal with. Apart from that, they required specific type of reports to map everything department or location wise. Matrix offered its dynamic range of biometric hardware products along with the software solutions to complement the devices Matrix offered its dynamic range of biometric hardware products along with the software solutions to complement the devices. As the retail chain is an exponentially growing company building stores at several locations, Matrix offered its Time-Attendance module along with fingerprint and card based door controller, COSEC DOOR FOT. This solution assisted in easy attendance management of employees along with their shift and overtime management. Analysis of employees’ attendance The solution also allowed generation of several specific types of reports with detailed filtering options for smooth process and analysis of employees’ attendance details. Matrix People Mobility Management solution assisted the retail chain achieve following results: Centralised Attendance Management and Monitoring Easy Shift & Schedule Management Elimination of Overtime Issues Smooth HR Process with Various Precise Reports The products used for providing solutions: COSEC DOOR FOT - Fingerprint and Card based Door Controller for Time-Attendance COSEC CENTRA ME - Application Server Platform with 500 or more Users and Expandable up to 1,000 Users COSEC ME TAM - Time-Attendance Module for 500 or more Users COSEC USER100 - User license for 100 users
Students of all ages in state schools are entitled to a safe learning environment. If students don't feel safe, they are not able to stay focused during classroom lessons and activities. That’s why Narre Warren South. P-12 College has upgraded its security with the installation of a sophisticated SALTO access control and ID pass system. Located south east of Melbourne, Australia, Narre Warren South P-12 College is a unique school on one campus with two sub schools, Primary, (Prep to Year 6) and Secondary, (Years 7 to 12). It follows the P-12 Curriculum which is designed to provide diversity and pathway opportunities, ensuring students maximise opportunities that exist after school and ensure people achieve their learning goals in a fun and supportive learning environment. Mechanical key system The College previously used a mechanical key system for its security needs Home to over 2000 students and 200 staff, cultural diversity is a feature of the College with at least 50 ethnic groups being represented speaking 68 languages. A third of the College’s student population come from families where the language background is other than English. The College previously used a mechanical key system for its security needs; however this was increasingly complicated to manage as keys multiplied, and it was difficult to guard against key duplication and copying. Another negative was the cost of re-keying and replacing locks to maintain security if keys were lost or not handed back. Security arrangements The College also had a number of challenges when it came to managing and limiting traffic flow through the staff car parks, both inside and outside school hours. To alleviate such problems, the College decided to look into upgrading its security arrangements and called in local security specialists Eclipse Security Systems. Director Greg Flood takes up the story. “We met with Brett Dyer, (the College’s Property and Maintenance Manager), and explained how SALTO solutions are in use around the world in educational environments including universities, university housing, schools, research institutes, academies, kindergartens and more where they provide security, access control and campus management.” Cost-effective package Brett liked the fact that SALTO could offer a solution that was education proven" “Replacing keys with smart access control would give the school much more control over its security. For instance installing smart online wireless locks on main entrance doors would enable the school to incorporate these doors into its lock down procedure. At busy student drop off and pick up times in the morning and afternoon, the school gates could be automated to improve traffic flow and ease congestion.” “And since Narre Warren South P-12 like almost all state schools hire out their sports, meeting facilities etc to third party groups outside of school hours, the new access control solution would make it much easier to manage access for such short term visitors. Brett liked the fact that SALTO could offer a solution that was education proven and offered a secure, flexible way to have all the above benefits and more in a versatile, cost-effective package that was future proof and gave a great return on the schools investment dollars.” Scheduled automatic locking Most external doors have a mix of offline and online SALTO XS4 escutcheons" “The removal of the old system and the upgrade to smart locks was smooth and straightforward, and we’ve now retro-fitted in excess of 100 doors and automated a number of perimeter gates. Most external doors, plus the addition of a number of internal office doors across all the blocks, have a mix of offline and online SALTO XS4 escutcheons, as well as control units and wall readers.” “The most important thing for us is to ensure that we are doing everything we can to safeguard our children. Our new access control system furthers this goal” says Brett Dyer. “We went with Greg’s recommendation of SALTO for its functionality and value for money. We particularly like how easy it is to use and program, especially the issue and management of contactless smartcards for external user groups." "The scheduled automatic locking and unlocking of external doors and gates is a huge time saver, and so far we’re pleased with the product and the capabilities it now gives us.”
Johnson Controls has announced that the Dr. P. Phillips YMCA has installed Software House’s C-CURE 9000 security and event management platform as part of a comprehensive visitor management system designed to increase security by verifying member identity and restricting access of non-members. Dr. P. Phillips’ YMCA, located in Doctor Phillips, Fla., is the largest of 27 facilities that are part of The YMCA of Central Florida. This single location serves 11,000 active members. The facility recently completed an $11 million renovation and expansion project, which also included an upgrade to the physical access control system to incorporate biometric technology to improve the member check-in process. Biometric fingerprint access The turnstiles help to manage the flow of visitors and identify when a person does not have membership privileges to gain accessThe comprehensive system integrates Software House C-CURE 9000 with biometric readers from iDentytech and swing glass optical turnstiles from Automatic Systems. Together, the systems manage the flow of visitors into the facility by enabling members to gain access using a biometric fingerprint reader instead of swiping an access control card. The turnstiles help manage the flow of visitors and identify when a person does not have membership privileges to gain access. Membership enrolment information resides in C-CURE 9000, which serves as the central component of the overall access control system. Johnson Controls' integration arm served as the systems integrator on the project. Accurate accounting of membership status “With the old system,” said Dan Humbert, director of IT for the YMCA of Central Florida, “the only way to tell which family centre membership someone held was by the colour of the barcode. With the C-CURE 9000 system that’s all automated. We can now capture the information on where they can work out directly in the system.” A major benefit of the new access control system and membership program is that it provides more accurate accounting of membership status. The system can flag out-of-date memberships, so when a person is denied access can be directed to the desk where they can pay on-site and be reinstated.
Jutting up to a height of 126 meters, the 36-story Prime Tower is Zurich’s tallest building and number two in Switzerland. Its 40,000 square meters of floor space can accommodate more than 2,000 workplaces. It is striking with its futuristic architecture and dark green reflective exterior. The tower’s impressive details include a 10-meter-high entrance hall and the CLOUDS bar and restaurant on the top floor boasting an unmatched view far out across the surrounding landscape. Bosch networked security solution The operator relies on Bosch to keep the building safe and secure. And to meet the Prime Tower’s unique requirements, the company’s experts recently implemented a modernisation project. One of the new system’s technical highlights is a combination of electronic and biometric access control. “Our owner, the firm of Swiss Prime Site Immobilien AG, attaches great importance to monitoring who exactly is inside the building at all times,” explained Annika Hammes, who heads the trustee department at Wincasa, a building services outfit that was contracted to design and execute the solution. Electronic and biometric access control Error-free biometric identification is accomplished by reading the vein patterns on the backs of people’s hands Error-free biometric identification is accomplished by reading the vein patterns on the backs of people’s hands. This is done contactlessly for very easy, comfortable use. A total of 120 hand vein readers have been installed in the building and connected to the controllers of the eight elevators. Once employees and guests have been biometrically registered, they board lifts that automatically take them to the right floors. Encrypted ID cards are used to access the rental units, thereby making sure that people can only enter zones for which they have been authorised. All relevant security information is collected in a management system so that the responsible employees always have everything in view and can respond quickly when there is a need. Bosch handled everything for this project: advising the client, and then planning and implementing the system. The modifications were made without interrupting use of the building, which was a major challenge not only for the project team, which therefore had to work very swiftly, but also for the tenants themselves. “This called for very close cooperation between the Bosch team and the mixed-use site management (MUSM) team of Wincasa AG, which met the requirements for continued building use while the work was ongoing,” explained Hammes.
Round table discussion
Where does the time go? Before you know it, here we are at mid-year reflecting on an eventful first half of 2018 in the physical security market. It’s also a good time for our Expert Panel Roundtable to pause and look ahead at what we might expect in the second half of the year. We asked this week’s Expert Panel Roundtable: What technology development will have the greatest impact in the second half of 2018?
Rapid changes in technology span both the consumer and the physical security markets. In the consumer market, technology innovation is nowhere more apparent than in the palms of our hands, where we all hold the latest smartphones and mobile devices. Simply put, the unprecedented power and capabilities of today’s smart phones have changed our lives. No wonder they are also having an impact on our business of physical security systems. Although a consumer product, smartphones increasingly play a role in security. We asked this week’s Expert Panel Roundtable: How are smartphones impacting technologies in the physical security market?