Dahua Technology, a video-centric smart IoT solution and service provider, is introducing its Dahua DeepHub Smart Interactive Whiteboard – an IFPD (Interactive Flat Panel Display) device designed for modern meeting rooms and remote communication demands. Based on customer needs of digital transformation, Dahua Technology has been exploring the video conferencing market for years and has utilised its technological innovation capability to equip Dahua DeepHub with a user-friendly...
Household adoption of smart home systems currently sits at 12.1% and is set to grow to 21.4% by 2025, expanding the market from US$ 78.3 billion to US$ 135 billion, in the same period. Although closely linked to the growth of connectivity technologies, including 5G, tech-savvy consumers are also recognising the benefits of next-generation security systems, to protect and secure their domestic lives. Biometric technologies are already commonplace in our smartphones, PCs and payment cards, enhan...
In March 2021, the U.S. National Institute of Standards and Technology (NIST) released Special Publication 500-334, which provides guidance on implementing the technology that allows the use of contactless fingerprints, acquired via the camera in mobile devices (e.g., an Android or iOS mobile phone), to be stored, transmitted, and matched against legacy fingerprint databases, operated by law enforcement and border protection services. Special Publication 500-334 Together with NIST and other in...
Anviz Global has announced the roll out of a new server for CrossChex Cloud in Europe, which fulfills the requirement of GDPR. Users can avail of the free trial with a faster connection and enhanced data security. CrossChex Cloud CrossChex Cloud is a cloud-based time and attendance management system, without any software, needed. It is a super-quick setup and easy-to-use system, which is dedicated to saving money for businesses, through employee time management, reducing administrative costs o...
Keyless Technologies, the privacy-preserving, identity company announced FIDO2 Certification for its proprietary biometrics technology. This comes just months after Keyless became one of only seven providers globally to receive FIDO Biometrics Certification, validating that Keyless' facial recognition technology meets industry standards for user verification and spoofing detection accuracy. Achieving certification in both Biometrics and FIDO2 confirms that Keyless' biometric authentication...
A time attendance system can help to keep a close eye on an employee’s working hours, prevent time theft by accurately tracking and recording employees’ time and attendance. A biometric time attendance system allows employees to clock in quickly and easier compare to the standard system and eliminate “buddy punching” in advance to the traditional time card system. A complete biometric time attendance system includes both hardware and software. Include the electronic div...
Anviz Global is dedicated to providing the highest quality solutions to customers. Their commitment to quality includes proactive management of the Anviz Global’s product lifecycle, in order to ensure a streamlined portfolio that helps users easily select the right solution for each application. Operational efficiency This process also provides operational efficiencies for Anviz Global and their partners, helping them to deliver on their commitment, to improve the way enterprises do business together. This letter is to inform customers that the following models will be transited from General Availability to End of Life. Meanwhile, Anviz Global’s operation platform will stop receiving new orders of these models, effective from January 1, 2022. The products being discontinued and their replacement models include: Discontinued Models Key Features Replacement Models Upgraded Features T5 Pro Standalone Fingerprint Access Controller EP30 Linux-based Enhanced CPU Colour LCD Screen Standalone Fingerprint Access Controller P7 Standalone Fingerprint Access Controller VF30 Pro Linux-based Enhanced CPU Colour LCD Screen PoE Standalone Fingerprint Access Controller M7 Standalone Fingerprint Access Controller C2 Slim Linux-based Enhanced CPU PoE / IP65 Standalone Fingerprint Access Controller
ADI Global Distribution (ADI), a globally renowned wholesale distributor of security, AV and low-voltage products, has announced that it has released a new mobile app, to provide dealers with a fast and easy way to shop at ADI, from their mobile devices. Dealers can use the mobile app to search for products, check pricing and availability, place orders and manage their ADI account on-the-go. ADI App with facial and fingerprint recognition The new ADI App presents a modern design and offers advanced features to make it easy to access the industry's one of the largest selection of security, AV and other low voltage products. With facial and fingerprint recognition, users can log into the ADI App in seconds and can expect faster loading times, improved navigation with clear messaging and product organisation, and an updated navigation bar with visible links to products and services. Barcode scanning functionality Using barcode scanning functionality, customers can scan items to find detailed product information Using barcode scanning functionality, customers can scan items to find detailed product information and instantly check pricing and inventory levels. The simple checkout process allows users to choose local branch pickup or select the shipping option that fits their project timeline and budgets. The app makes it easy for customers to manage their ADI account, and can take advantage of time-saving features to check order status, easily reorder past shipments and make product lists by project or customer. Transforming digital experience for customers “The release of our new app is the next step in our strategy to transform the customer's digital experience at ADI. And to help us get it right, we incorporated feedback from customers across the entire design and testing process, in order to improve the connected customer journey,” said Laura Phelan, Global Vice President of Digital Experience and Digital Branch at ADI Global Distribution. Laura Phelan adds, “The ADI App gives our customers a fast and convenient way to access the products, support and services they rely on from ADI.” New features and functionality In addition to ADI's complete product portfolio, the mobile app provides access to ADI's deals centres, monthly sales flyers, training and events, value-added services and more. ADI will continue to add new features and functionality to the app and make it easier for dealers to shop at ADI. The new app is currently available for U.S. customers and can be searched as ADI US Mobile in the App Store and Google Play Store.
Keyless, a pioneering privacy-first biometric authentication firm announced that it has joined the DizmeID Foundation, to develop an open ecosystem for decentralised management of digital identities. Control over digital identity DizmeID Foundation operates to combine the benefits of self-sovereign identity with necessary compliance and regulation, to enable wallet holders with ownership and control over their digital identity, data access, and distribution. Keyless will work alongside Algorand, Fabrick, and InfoCert within the foundation to make it easier and more secure for users to share their personal information in exchange for blockchain-based services. Blockchain technology "Many users find the idea of blockchain services intimidating and that has caused the adoption of this revolutionary technology to be painfully slow." By integrating with Dizme, the biometric software will make it more intuitive for users to enroll, and benefit from" "We hope that by integrating with Dizme, that our biometric software will make it more intuitive for users to enroll, and begin benefitting from the services offered on its decentralised identity platform," said Andrea Carmignani, co-founder and chief executive officer at Keyless Technologies. Digital Identity verification Dizme enables organisations to both issues and verifies a user's identity through verifiable digital credentials – a digital version of a real-world identity document such as a driver's license or birth certificate. "The way organisations manage their customer's personal data must change if we want to stop privacy and security breaches from being a daily occurrence," said Daniele Citterio, DizmeID Foundation Chairman. "Currently, our identities are managed by multiple, siloed parties – like private and public organisations. Not only can this leave us exposed to a higher number of threats, but it can also create friction during the identification process," Daniele Citterio continued. Digital credentials With Dizme, organisations can issue and verify verifiable digital credentials to provide services, goods, or resources to users. Once a user has their digital credentials issued to them, they can choose to share their credentials with organisations via their Dizme wallet. Data security "Verifiable digital credentials can help build trust between organisations and users, while also enabling users to control what personal information they share with organisations, and how long for, to ensure their data is not being misused or mishandled" explained Daniele Citterio. Zero-trust authentication platform Keyless zero-trust authentication platform offers strong compliance while ensuring biometric data is never at risk Keyless zero-trust authentication platform offers strong compliance with obligations outlined in the European Union's General Data Protection Regulation – while also ensuring biometric data is never at risk of being compromised or mishandled – making it easier for both companies to target enterprises who need to meet strict compliance obligations. Privacy based biometric solution "At Keyless, we understand that for organisations to fully realize the benefits of emerging technologies, we must make them compliant, private, and secure.” “To protect biometric data from threats, we've combined the security benefits of distributed architecture with privacy-enhancing cryptography. The result is a zero-knowledge biometric solution that ensures biometric data and other personally identifiable information is never at risk," explained Carmignani. DizmeID Foundation Joining the likes of Algorand, Fabrick, and InfoCert, this integration also marks Keyless' participation as a founding member to the DizmeID Foundation – the first decentralised identity network that combines the benefits of decentralised identity as well as the compliance to eIDAS regulations.
Offering enhanced security and personalised access control, Nortek Control has launched its new Linear BT135-W Access Control Reader and Linear BT125-W Access Control Reader. The new readers integrate Bluetooth Low Energy (BLE) technologies, providing users intelligent, contactless and secure access control in a slim design, which fits seamlessly into any office or building environment. Furthermore, the new Linear readers provide dealers and end-users several options to customise access control in a secured way. Linear BT135-W and BT125-W Access Control Readers Users are able to pair the Linear BT135-W Reader with the new Linear 13.56 MHz smart cards Users are able to pair the Linear BT135-W Reader with the new Linear 13.56 Megahertz (MHz) smart cards and key fobs for premium security. With 13.56 MHz information extremely difficult to clone, these new readers provide a strong security solution for additional user peace of mind. Plus, the Linear BT125-W Access Control Reader offers backward compatibility with current Linear 125 kilohertz (kHz) Prox cards and key fobs. By combining these solutions with the new Linear Access Control Mobile App, users get the added convenience of touchless entry, and the flexibility to have both physical and mobile credentials. Enhanced security wit Linear Access Control Mobile App Security is further heightened with the mobile app, which securely stores and delivers mobile credentials to personal devices. Along with providing the ability to customise options to specific end user needs, the app can also store multiple credentials with a colour-coded labelling system to distinguish between the credentials. “We’ve up-levelled the security in our new readers, leveraging all the capabilities of BLE technology. Users get secure access to mobile credentials, and their phone’s built-in biometric sensors increase security and expand credentials protection by utilising a user’s integrated personal biometric data on their mobile devices, such as fingerprint scanners or face unlock,” said Mark Prowten, Director of Product Management for Nortek Control’s Linear brand. Easy installation and deployment Mark Prowten adds, “We also designed our new readers with dealers and integrators in mind. They will appreciate how simple we’ve made installation and deployment for them. There is no portal login or on-boarding process necessary, allowing them to ensure a user’s information stays secure and private. In addition, the app only requires a one-time registration of a user’s cell phone number.” All Linear Bluetooth access control readers include a digital BLE range-setting card For the dealer, having the flexibility to determine read range at different levels uniquely solves perimeter access needs. All Linear Bluetooth access control readers include a digital BLE range-setting card. This card gives installers the ability to toggle the reader’s Bluetooth read-range between five different modes: Tap-and-Go, Short (up to 2 inches), Medium (up to 10 inches), Long (up to 15 feet), and Max (up to 30 feet). Contactless smart card technologies “These new Linear readers combine the latest, advanced BLE and contactless smart card technologies that allow our access control manufacturer and integrator customers to offer a total solution, one that supports mobile and physical credentials,” said Richard Pugnier, Vice President of Marketing at Nortek Control. Richard Pugnier adds, “As part of our total solution with expanded feature options, the latest Linear access control readers offer an easy upgrade path for existing customers, while also making them very attractive for new site installs that can lead to additional revenue opportunities for our dealers.” Available now, the new Linear BT135-W and BT125-W Access Control Readers, along with the new mobile and physical credentials, are the most recent introduction in the successful and growing Linear reader series. The new Linear mobile app is live on both the iTunes App Store, and Google Play Store.
The CCTV User Group welcomes the appointment of Fraser Sampson as the new independent Biometrics and Surveillance Camera Commissioner (BSCC). The appointment was announced on March 9, 2021, by the UK Home Secretary. The new BSCC combines two roles that were previously separate offices: the Surveillance Camera Commissioner and the Biometrics Commissioner. Previously held by two part-time appointees, the new role is a full-time position. Promote compliance with the Surveillance Camera Code The UK Home Office said in a statement that Fraser Sampson, who took up his post on March 1, 2021, will promote compliance with the Surveillance Camera Code and rules on police use of DNA and fingerprints. Peter Webster, Director of The CCTV User Group, welcomed Fraser’s appointment, stating “We welcome the appointment of the new commissioner to oversee and promote compliance with the CCTV Code of Practise. Fraser comes to the office with excellent credentials, and we look forward to working with him in his new role to promote high standards in the use of CCTV surveillance for public safety and security.” Importance of public space CCTV systems The members of the CCTV User Group welcome the appointment of Fraser Sampson" Ilker Dervish, Vice Chair of The CCTV User Group, commented “The members of the CCTV User Group welcome the appointment of Fraser Sampson as the new Biometrics and Surveillance Camera Commissioner as a clear confirmation that the Home Office continues to recognise the importance of public space CCTV systems in our communities.” Ilker Dervish adds, “We are sure that Fraser Sampson’s experience and expertise will be a valuable contribution to the continuing development of regulations, guidelines and standards signposting a clear path to more effective and professional use of video surveillance systems.” CCTV Code of Practise The position of Surveillance Camera Commissioner had been unfilled since the departure of Tony Porter in December 2020. Tony held the office and successfully promoted the code of practise for seven years. The CCTV Code of Practise is based on a document originally produced by The CCTV User Group, which was adopted and developed by the first SCC, Andrew Rennison.
Isorg, a pioneer in organic photodetectors (OPDs) and large-area image sensors, announces its Fingerprint Acquisition Profile (FAP) 10 module has received FBI certification, the first in this category of organic photodiode (OPD) based optical sensors. The FAP 10 biometrics module is now approved for use in security applications, in particular in mobile device identification for access control at airports and other facilities where the highest security levels are needed. Intense indoor lighting FAP 10 is manufactured by printing organic photodiode on a TFT (Thin Film Transistor) backplane. Isorg is the only manufacturer in the world commissioned to mass produce OPD sensors; it is ready for ramp-up to industrial batches at its state-of-the-art plant in Limoges, France. As FAP 10 benefits from strong in-house optical know-how, another significant advantage for customers is the module’s ability to withstand acute brightness, from intense indoor lighting to direct sunlight. The police, security guards, and other task force officers can conduct controls indoors or outdoors without the fingerprinting device producing saturated images; quickly authenticating a person’s identity in all-weather conditions or under strong artificial light. OPD fingerprint sensor The security market will continue to benefit from our ongoing developments to achieve certification" “This FBI certification confirms Isorg’s capacity to deliver biometrics modules based on organic electronics that rise to the challenges of the security market and meet its stringent requirements,” said Jean-Yves Gomez, CEO at Isorg. “We are the very first to gain security approval of an OPD fingerprint sensor that assures the high-level image quality, accuracy, and robustness that customers need in border control, access control, voter identification, etc. The security market will continue to benefit from our ongoing developments to achieve certification on higher form factors (up to FAP 60) based on the same scalable OPD technology.” Four-finger authentication FAP 10 is a complete solution, incorporating an image sensor, dedicated light source, optical filters, and driving electronics. To support customer product development, Isorg will provide a reference design with its latest integrated ROIC (Read Out Integrated Circuit) and software processing for image quality enhancement that is optimised with Isorg’s OPD sensor technology. The module is a flat, slim design (less than 2mm thick) and robust enough for all outdoor conditions The module is a flat, slim design (less than 2mm thick) and robust enough for all outdoor conditions. This makes it ideal for mobile ID devices in use anywhere, unlike competing optical modules whose fingerprint scanners are bulky, heavy, and more fragile. Isorg’s module architecture is versatile, allowing the company to offer a roadmap of up to four-finger authentication for a FAP 60 module with scalability for even larger palm-sized surface areas. Slimmest complete solution Anti-spoofing features can also be easily integrated into the hardware and software. Isorg’s FAP 10 is approved for one finger authentication, with a surface area of 0.5” to 0.65” (1.27 – 1.65cm). The company is planning for FBI certification of larger area biometrics modules, up to four fingers (FAP 60) offering very significant cost advantages for large areas. Isorg has already capitalized on similar benefits from this advanced technology that provides smartphone makers with the slimmest complete solution for large area Fingerprint on Display (FoD) applications. It enables the entire area of the smartphone screen to function as a digital fingerprint scanner.
Display solutions play a key role in SOCs in providing the screens needed for individuals and teams to visualise and share the multiple data sources needed in an SOC today. Security Operation Centre (SOC) Every SOC has multiple sources and inputs, both physical and virtual, all of which provide numerous data points to operators, in order to provide the highest levels of physical and cyber security, including surveillance camera feeds, access control and alarm systems for physical security, as well as dashboards and web apps for cyber security applications. Today’s advancements in technology and computing power not only have increasingly made security systems much more scalable, by adding hundreds, if not thousands, of more data points to an SOC, but the rate at which the data comes in has significantly increased as well. Accurate monitoring and surveillance This has made monitoring and surveillance much more accurate and effective, but also more challenging for operators, as they can’t realistically monitor the hundreds, even thousands of cameras, dashboards, calls, etc. in a reactive manner. Lacking situational awareness is often one of the primary factors in poor decision making In order for operators in SOC’s to be able to mitigate incidents in a less reactive way and take meaningful action, streamlined actionable data is needed. This is what will ensure operators in SOC truly have situational awareness. Situational awareness is a key foundation of effective decision making. In its simplest form, ‘It is knowing what is going on’. Lacking situational awareness is often one of the primary factors in poor decision making and in accidents attributed to human error. Achieving ‘true’ situational awareness Situational awareness isn’t just what has already happened, but what is likely to happen next and to achieve ‘true’ situational awareness, a combination of actionable data and the ability to deliver that information or data to the right people, at the right time. This is where visualisation platforms (known as visual networking platforms) that provide both the situational real estate, as well as support for computer vision and AI, can help SOCs achieve true situational awareness Role of computer vision and AI technologies Proactive situational awareness is when the data coming into the SOC is analysed in real time and then, brought forward to operators who are decision makers and key stakeholders in near real time for actionable visualisation. Computer vision is a field of Artificial Intelligence that trains computers to interpret and understand digital images and videos. It is a way to automate tasks that the human visual system can also carry out, the automatic extraction, analysis and understanding of useful information from a single image or a sequence of images. There are numerous potential value adds that computer vision can provide to operation centres of different kinds. Here are some examples: Face Recognition: Face detection algorithms can be applied to filter and identify an individual. Biometric Systems: AI can be applied to biometric descriptions such as fingerprint, iris, and face matching. Surveillance: Computer vision supports IoT cameras used to monitor activities and movements of just about any kind that might be related to security and safety, whether that's on the job safety or physical security. Smart Cities: AI and computer vision can be used to improve mobility through quantitative, objective and automated management of resource use (car parks, roads, public squares, etc.) based on the analysis of CCTV data. Event Recognition: Improve the visualisation and the decision-making process of human operators or existing video surveillance solutions, by integrating real-time video data analysis algorithms to understand the content of the filmed scene and to extract the relevant information from it. Monitoring: Responding to specific tasks in terms of continuous monitoring and surveillance in many different application frameworks: improved management of logistics in storage warehouses, counting of people during event gatherings, monitoring of subway stations, coastal areas, etc. Computer Vision applications When considering a Computer Vision application, it’s important to ensure that the rest of the infrastructure in the Operation Centre, for example the solution that drives the displays and video walls, will connect and work well with the computer vision application. The best way to do this of course is to use a software-driven approach to displaying information and data, rather than a traditional AV hardware approach, which may present incompatibilities. Software-defined and open technology solutions Software-defined and open technology solutions provide a wider support for any type of application the SOC may need Software-defined and open technology solutions provide a wider support for any type of application the SOC may need, including computer vision. In the modern world, with everything going digital, all security services and applications have become networked, and as such, they belong to IT. AV applications and services have increasingly become an integral part of an organisation’s IT infrastructure. Software-defined approach to AV IT teams responsible for data protection are more in favour of a software-defined approach to AV that allow virtualised, open technologies as opposed to traditional hardware-based solutions. Software’s flexibility allows for more efficient refreshment cycles, expansions and upgrades. The rise of AV-over-IP technologies have enabled IT teams in SOC’s to effectively integrate AV solutions into their existing stack, greatly reducing overhead costs, when it comes to technology investments, staff training, maintenance, and even physical infrastructure. AV-over-IP software platforms Moreover, with AV-over-IP, software-defined AV platforms, IT teams can more easily integrate AI and Computer Vision applications within the SOC, and have better control of the data coming in, while achieving true situational awareness. Situational awareness is all about actionable data delivered to the right people, at the right time, in order to address security incidents and challenges. Situational awareness is all about actionable data delivered to the right people Often, the people who need to know about security risks or breaches are not physically present in the operation centres, so having the data and information locked up within the four walls of the SOC does not provide true situational awareness. Hyper-scalable visual platforms Instead there is a need to be able to deliver the video stream, the dashboard of the data and information to any screen anywhere, at any time — including desktops, tablets phones — for the right people to see, whether that is an executive in a different office or working from home, or security guards walking the halls or streets. New technologies are continuing to extend the reach and the benefits of security operation centres. However, interoperability plays a key role in bringing together AI, machine learning and computer vision technologies, in order to ensure data is turned into actionable data, which is delivered to the right people to provide ‘true’ situational awareness. Software-defined, AV-over-IP platforms are the perfect medium to facilitate this for any organisations with physical and cyber security needs.
In a world forever changed by the coronavirus pandemic, companies worldwide are now expanding their concept of physical security to best safeguard their facilities and employees. Few incidents have had as much of an impact on businesses globally as the COVID-19 pandemic; much of the world is still struggling to contain COVID-19, navigating the lasting effects and exploring what the “new normal” looks like. While some organisations are still engaged primarily in “anywhere operations”, i.e. remote work, many organisations are implementing strategic physical security solutions that better protect everyone through the use of video surveillance technology and advanced intelligence capabilities. As this new normal takes hold within the business environment, security strategies will largely be centered around several key initiatives like access control, people counting, occupancy controls, temperature screening, contact tracing, and reducing office touch points. With the use of a video management system (VMS) in the shadow of COVID-19, occupancy data from a VMS can trigger a lockdown and not permit new entrants until the occupancy drops below a certain threshold; this is significantly useful for organisations that have returned to in-person work. But there’s a caveat: though many legacy security systems are being re-evaluated to allow for touchless or frictionless access control — a move designed to eliminate the need for employees and visitors to physically touch a surface when using an access control system — upgrading the outdated technologies can be cumbersome and expensive, especially for organizations that had not planned for an interruption like the pandemic. Security contractors will be vital So, what is the solution? Security contractors will play a vital role in helping end-users across a range of vertical markets — large and small — to achieve their goals in the new paradigm. For some, this may mean leveraging existing access control and video surveillance systems with upgrades where needed. For others, an entire overhaul is made possible with budget friendly solutions for businesses to migrate to integrated access control through end-to-end security solutions that tie into existing infrastructures without major disruptions (meaning the organisation will never be left vulnerable). Cybersecurity is becoming even more intertwined with physical security There is massive transformation occurring in the security industry, most notably the movement to digitise physical access and integrate it with video management systems and surveillance. This shift means that cybersecurity is becoming even more intertwined with physical security, allowing organisations the ability to correlate the metadata of people’s behaviors and activities — a plus point for those looking to remain vigilant against future pandemic-esque business interruptions. Access, video, and audio are converging into consolidated platforms. Due to lower costs and pairings with IP-based, wireless infrastructure, there are infinite solution configurations. IT security requirements are beginning to apply to physical security because of this integrated infrastructure. Multi-factor authentication The security industry is also beginning to see a trend of multi-factor authentication, which is going to dominate in the days to come as it makes solutions more reliable. Most people carry smartphones these days, which have green check communication capabilities that allow easy multi-factor authentication. Costs are going down, and algorithms are getting better, making more people willing to try it. Some new solutions have both the fingerprint reader and a camera for facial biometrics Some new solutions have both the fingerprint reader and a camera for facial biometrics. Cameras and CCD modules cost almost nothing, and they do not have to be super high-end anymore, especially if organisations are doing one-to-one verification. It’s not just about security now; it is security, health, and safety. Access control with video, intelligent readers, and credentials is a perfect platform for next generation solutions.
Recently contacted by your credit card company because of a data breach or were you a victim of identity theft? Many of us have either been affected by identity theft or know someone who has been affected. Many consumers are seeking a secure environment that is also user-friendly. Businesses are seeking the same, with absolute certainty, that only valid users can access critical data. How can your company tackle these security and usability requirements while ensuring customer satisfaction? Today's three primary biometric modalities are fingerprint, facial and iris, and each has its own strengths and weaknesses but due to the global COVID-19 pandemic, touchless is highly preferred. Any company claiming their technology is best for all applications is likely being disingenuous. The key is to first prove a biometric is required, and once decided, the following five steps will help select the best biometric modality and supplier. Today's three primary biometric modalities are fingerprint, facial and iris, and each has its own strengths and weaknessesBiometrics can provide a mechanism to tackle these issues head-on by moving from what you know (password) and have (ID card) to who you are (your biometric), which dramatically increases the level of security while also being user-friendly. But how is the best biometric modality selected for an upcoming product? User interaction Start by defining the planned customer usage model, including the typical user, normal or desired interaction, and product in-field environment and placement, as well as any strategic plans. Think through the clothing the users will wear (e.g., face masks), the height of the users, hygiene requirements and opt-in requirements. Decide how quickly the biometric must respond and test this during the POC testing. The better the enrollment image (template), the better the matching performance and overall user experience. Biometric storage Start by defining the planned customer usage model, including the typical user, normal or desired interaction, and product in-field environment and placement, as Due to the global COVID-19 pandemic, touchless is highly preferredwell as any strategic plans. Think through the clothing the users will wear (e.g., face masks), the height of the users, hygiene requirements and opt-in requirements. Decide how quickly the biometric must respond and test this during the POC testing. The better the enrollment image (template), the better the matching performance and overall user experience. Cost and security Start by selecting which product lines will use the biometric and establishing the desired price point(s). Decide how the biometric will fit into the product and get bulk pricing to understand unit costs at volume. Software is typically handled as a license fee and often negotiable. The production cost per unit decreases as volumes increase. Choose the biometric modality that best meets functional and security requirements while hitting the targeted price. The biometric security level required depends on the assets being protected and the matching usage model. A 1:1 model, such as a cellphone, may be fine with a low-security biometric application. However, in a 1:N model, such as airport security, requires a more secure biometric such as iris. To select the best biometric for the product, compare each company's false acceptance rate (FAR) and false rejection rate (FRR). FAR indicates the biometrics ability to keep intruders out, while FRR indicates the biometrics ability to allow enrolled users in. Ensure that all biometric companies being considered can provide this information at a minimum. It is better to get each company's detection error trade-off (DET) curve, which shows how FAR and FRR vary relative to each other. Criminal activity Hackers and criminals are always trying to break technology, including biometrics. Be certain each technology has robust presentation attack detection (PAD), which ideally is third-party certified. Understand what if any personally identifiable information (PII) needs to be captured, and decide how the PII will be handled, including who will manage the data (i.e., your company, the biometric supplier or another third party). Be certain that whoever controls the PII uses the latest encryption standards and employs techniques to secure this data in memory, crossing the network and in the biometric database. Understanding the European GDPR Compliance standards if applicable will also be important. Supplier consideration Each supplier being considered should be evaluated throughout the POC testing process. Ensure the supplier is trustworthy, provides good customer support and meets its commitments. Evaluate the supplier's engineering capability and support model to ensure it can support any desired design changes and support your Be certain each technology has robust presentation attack detection (PAD)engineers to deliver the best functioning product. Selecting the best biometric for your exact use case will take some time and effort, but it has the potential to grow your business and delight your customers. Do not shortchange the process and go with the cheapest solution without doing some research. As the saying goes, you get what you pay for.
As the deal/no deal prospects of Brexit are tossed in a whirlwind of UK and EU politics, the uncertainty of the back-and-forth has broadly impacted general economic trends, and by extension, the physical security market. The new deadline for a Brexit agreement is October 31, already postponed six months from the scheduled April 12 departure date. Numbers show that Britain’s GDP shrank in the second quarter, possibly reflecting fewer exports because of Brexit uncertainty. And beyond the current indecision lies the long-term impact of a possible change in trading status between the United Kingdom and continental Europe. Other issues include capital flow and labor mobility. Brexit uncertainty leading to security concerns Loss of shared information with the EU will make the UK less safe “Companies … are unclear about their future,” comments Martin Warren of the Institute of Chartered Accountants in England and Wales. “Companies are making decisions now about jobs, supply chains, headquarters and asset locations, incurring significant, and possibly unnecessary, cost and upheaval.” Warren fears the destructive effects of a ‘no deal’ outcome and hopes politicians will break the deadlock and restore business confidence. Security implications of Brexit extend beyond economics. Loss of shared information with the EU will make the UK less safe. Extradition across EU borders will be more difficult, and exchange of data such as fingerprints and vehicle registrations is at risk. The Irish border after Brexit is of particular concern to security professionals. Countering threat of international terrorism Robert Hall of London First and Alison Wakefield of Security Institute say the security impact of departing the EU will be long lasting and profound. “In security terms, the UK will still have to contend with international terrorism, transnational crime and the global movement of people, all challenges that require wide scale cooperation.” They add that leaving the EU will require “a significant investment in people, resources and databases to cope with the anticipated volumes of traffic through ports, airports and tunnels.” Analyst company IHS Markit earlier commented about the impact on the security industry of Brexit’s drag on the UK economy, “Access control, intruder and fire alarm markets typically track construction rates closely and are forecast to be affected most. However, a large cut to infrastructure spending would be just as damaging to the video surveillance market.” UK security companies prefer ‘soft exit’ from EU If a ‘soft exit’ trade deal is not negotiated, the UK would have to revert to WTO trade rules If a ‘soft exit’ trade deal is not negotiated, the UK would have to revert to World Trade Organisation (WTO) trade rules, which means tariffs on trade between the UK and the EU, says IHS Markit. There are five British-based access-control and intruder-alarm vendors supplying the European market in significant quantity – each with revenue exceeding $10 million. IHS Markit estimates these companies combined account for less than 10 percent of total European, Middle-Eastern and African (EMEA) market revenues for both industries. Uncertain future of UK security marketplace Asset protection specialist VPS Security Services has warned that the ongoing Brexit saga will likely lead to a rise in vacant commercial and residential properties as developers and investors are more reluctant to move forward with their UK real estate strategies. Seemingly endless machinations and shifting proposals are making the eventual outcome of Brexit very much a guessing game. Uncertainty translates into a volatile and changing outlook, and the eventual impact on the broader economy is an open question. As a reflection of that economy, the security marketplace will inevitably feel the economic impact, too, not to mention the new security challenges likely to ensue.
“These are children. There is no reason to scan a kid. Just because the government can do this is no reason the government should be doing this.” The impassioned argument, quoted by The Florida Current, comes from a Florida state legislator who introduced a bill aimed at stopping public school systems from collecting biometric data on children. The ominous-sounding practice actually has a practical side – use of a fingerprint or palm scan can enable a school system to get thousands of students through a lunch line in a short period of time. The schools have found a quick fingerprint scan is faster, and more secure, than use of an identity card or PIN number. The system has been used in 83 schools for several years in one district and reflects an investment of $300,000, according to the newspaper. The system could also be used to identify parents, employees and volunteers, which could help to prevent strangers from sneaking into a school function. It may fall to those in the security market who understand the technology to provide the needed information to defuse concerns The proposed bill, which is “pending reference review,” would provide for parental notification of data collected on students by schools. (It also would require the school to phase out Social Security numbers, replaced by a unique ID number developed by the state Department of Education.) I'm not sure exactly what the problem is with “scanning a kid,” as long as there are no adverse health effects, a concern I am sure has been addressed (and in any case was not an argument presented in Florida against the technology). I don't have a problem with parental notification; it's the underlying attitude toward technology implied in the bill that I find troubling. As I understand it, the intent of biometric systems is to confirm an identity. A student enrols in the system with a fingerprint or palm print scan, and the system stores only data points from that scan, which are compared with data points when the individual uses the system again. The system doesn't actually store a complete fingerprint, and there is no massive centralized database of children's fingerprints that could be stolen or otherwise compromised. If I'm wrong, someone correct me – please. Too often, negative responses to technology are based on misunderstanding. Emotions can get in the way of information. It may fall to those in the security market who understand the technology to provide the needed information to defuse concerns. UPDATE: Florida’s Senate Bill 188, which imposes a blanket prohibition on the use of biometric identification technology within the Florida public school system, was signed into law by Gov. Rick Scott on May 12, 2014. This despite a letter from the Security Industry Association opposing the bill. SIA’s letter read in part: “While SIA understands the legislature’s concern for protecting the privacy of Florida students, we are troubled that widespread misperceptions about the nature and use of biometrics technology has enabled passage of the bill without a thorough debate examining the student safety and local economic implications — and despite any reported cases of identity theft or misuse of information collected by such systems.”
Adani Group is an Indian multi-national conglomerate, with its headquarters located in Ahmedabad, Gujarat, in India. The group’s diversified businesses include resources, logistics, energy sectors and agriculture business. Adani Group is the largest port developer and operator in India, with the Mundra port, located in Gujarat, the largest commercial port in India. Having multiple ports, branches, manufacturing units and corporate offices at various locations, Adani Group is one of the largest business units in India. In all, this business group has 15,000+ employees and 50,000+ workers (with 900+ third-party contractors), who are involved in the incorporation of various work orders, across 25+ business units. Attendance and shift record maintenance Adani Group is widely engaged in multiple business units and ports, with strength of 50,000+ workers, who are engaged under 900+ contractors employed at various locations. Maintaining and managing the entire attendance details, diverse shifts and leave policies for the various locations and numerous workers at a central place was critical for the multi-national conglomerate. Moreover, task allotment to workers based on its requirements, skills under a contractor and its verification against the respective contractor's report were tedious tasks for the management to deal with on a regular basis. To provide approved and appropriate induction of each worker, at a defined level, monitor progress status of each work order and its segregation, based on reports were quite challenging. COSEC Contract Workers Management solution Report generation to eliminate the fraudulent and erroneous payment of wages, at contractors' end, had been the need of the hour. Moreover, their requirement of timely and error-free payroll processing was to improve overall productivity. After a comprehensive discussion, with regards to the problems and requirements of the Adani Group’s management, Matrix offered its COSEC Contract Workers Management solution for their 50,000+ workers, who are working under 900+ contractors, spread across the enterprise’s four locations in India. Centralised attendance management solution Matrix’s COSEC Contract Workers Management solution offers a centralised attendance management solution Matrix’s COSEC Contract Workers Management solution offers a centralised attendance management solution for various branches that are spread across multiple locations, which automates all processes right from recording entries and exits, up to processing salaries. The COSEC Contract Workers Management solution facilitates enrolment of the worker credentials, along with photographs, documents and induction details. It helps contractors to manage workers efficiently, using contractors’ self-service portal. The solution provides multiple connectivity possibilities, via Ethernet, Wi-Fi and Mobile broadband. Seamless integration with SAP The solution also eases the tracking of work order progress. It offers seamless integration with SAP, using the database to database linking and offers the feature of real-time notifications, in cases of exceptional situations, via Email and SMS. Results: Enhanced security with effective worker’s enrolment process, abiding by various induction levels. Increase in productivity of administration by 20%. Easy decision making, due to the generation of customised reports. Smooth and effective monitoring of work orders. Improved security with centralised control and monitoring, with reduced time spent by the security department. Error-free man hours’ computation for quick & effective wages’ calculation. Minimised manual interventions. Products offered by Matrix include: COSEC CENTRA LE - Application software platform, expandable up to one million users. COSEC LE CWM - Contract Workers Management module for COSEC CENTRA LE. COSEC DOOR FOW - Fingerprint and RF card-based door controller with Wi-Fi connectivity. COSEC PATH DCFM - Fingerprint, Mifare card, and NFC-based door controller. COSEC VEGA FAX - Fingerprint and RF card-based premium door controller with Touch Sense LCD, IP65, Wi-Fi and POE connectivity options. COSEC DOOR FOP - Fingerprint and RF card-based premium door controller with LCD and keypad.
Adani Group is a multi-national conglomerate headquartered in Ahmedabad, Gujarat, India and has a diversified portfolio of businesses, including resources, logistics, energy sectors and agriculture business. Adani Group is the largest port developer and operator in India, with Mundra being the country's largest commercial port. With multiple ports, branches, manufacturing units and corporate offices at various locations, Adani Group is one of the largest business units. In all, this business group has 15,000+ employees and 50,000+ workers (with 900+ third-party contractors), who are involved in the incorporation of various work orders across 25+ business units. Managing staff attendance and diverse shifts Adani Group is widely engaged in multiple business units and ports with 50,000+ workers under 900+ contractors, employed at various locations. Maintaining and managing entire attendance, diverse shifts and leave policies for the various locations, and numerous workers at a central place was critical for them. Moreover, task allotment to workers based on its requirements, skills under a contractor and its verification against the respective contractor's report were tedious tasks for the management. To provide approved and appropriate induction of each worker at a defined level, monitor the progress status of each work order and its segregation based on reports were quite challenging. Report generation to eliminate the fraudulent and erroneous payment of wages at contractors' end had been the need of the hour. Moreover, their requirement of timely and error-free payroll processing was arisen to improve overall productivity. COSEC Contract Workers Management COSEC Contract Workers Management offers centralised attendance management solution for various branches After comprehensive discussion regarding problems and requirements, Matrix offered COSEC Contract Workers Management solution for their 50,000+ workers, who have been employed under 900+ contractors, spread across four locations in India. COSEC Contract Workers Management offers centralised attendance management solution for various branches, spread across multiple locations, which automates all processes, right from recording entries and exits up to processing salaries. Enrollment of the worker credentials COSEC Contract Workers Management facilitates enrollment of the worker credentials, along with a photograph, documents, and induction details. It helps contractors to manage workers efficiently, using contractors' self-service portal. The solution provides multiple connectivity possibilities via Ethernet, Wi-Fi and mobile broadband. It eases the tracking of work order progress. It offers seamless integration with SAP using the database to database linking and offers the feature of real-time notifications, in cases of exceptional situations via email and SMS. Results: Enhanced security with effective worker's enrollment process abiding by various induction levels. Increase in productivity of admin by 20%. Easy decision making due to the generation of customised reports. Smooth and effective monitoring of work orders. Improved security with centralised control and monitoring - Reduced time spent by the security department. Error-free man hours' computation for quick & effective wages' calculation. Minimised manual interventions. Matrix products and solutions Offered: COSEC CENTRA LE - Application Software Platform expandable up to one million users. COSEC LE CWM - Contract Workers Management Module for COSEC CENTRA LE. COSEC DOOR FOW - Fingerprint and RF Card-based Door Controller with Wi-Fi connectivity. COSEC PATH DCFM - Fingerprint, Mifare Card and NFC-based Door Controller. COSEC VEGA FAX - Fingerprint and RF Card-based Premium Door Controller with Touch Sense LCD, IP65, Wi-Fi, PoE. COSEC DOOR FOP - Fingerprint and RF Card-based Premium Door Controller with LCD and Keypad.
The Tatua Co-operative Dairy Company manufactures markets and sells specialised dairy ingredients and food products, 90% of which are exported around the world. Tatua’s security system was recently upgraded to ensure world-class access control and boundary security that enhanced Tatua’s globally recognised food safety and quality programme. This upgrade has provided additional assurances for customers who purchase the company’s food and ingredient products. Layered security solution At its manufacturing site at Tatuanui, near Morrinsville in New Zealand’s dairying region, Tatua invested in a layered security solution, protecting the site from the outside in. The Gallagher monitored pulse fence acts to deter and defend against would-be intruders. Inside the facility, a range of access control products are used to ensure people entering the facility are who they should be, and have current Health & Safety site induction competencies. This allows them authorisation to work on-site and, if required, in specific production areas. Tatua operates 24/7 and has 370 employees, over 1300 inducted contractors, and numerous trucks and milk tankers accessing the site daily. It is crucial the access control system can perform several functions to ensure the site is safe and secure. Integrated security The Gallagher system can integrate with multiple security products from CCTV to biometric readers Integration was a key factor when choosing a Gallagher system. Projects Engineer, Grant Webb, said, “We have multiple areas which need specific security requirements. As the Gallagher system can integrate with multiple security products ranging from CCTV to biometric readers, it ensures the right people have the right access to specific areas on site.” Fingerprint recognition Morpho fingerprint readers provide primary access onto the site and into buildings. As there are so many people on-site, and because contractors can change on a regular basis, fingerprint readers eliminate the need for access cards, which saves both time and money. It also reduces the need for anyone entering production areas to carry an access card, which is a potential source of product contamination. Licence plate recognition Milestone Licence Plate Recognition (LPR) is used at the three entrance gates to the tanker bay. Details of the tankers delivering milk and chemicals to the site are loaded into the CCTV system interface. This links to the Gallagher Command Centre, so when a tanker arrives at a gate, the LPR system identifies the pre-registered licence plate. This feeds back to Command Centre and grants access to approved vehicles. “There are over 60 tankers registered, that previously had key fobs that would go missing with no record of who held the fob,” says Webb. “LPR makes the delivery of milk and chemicals more efficient and has eliminated the need for swipe card readers and mounting posts that would traditionally be required to gain entry to this area.” Command centre The milk testing system in the tanker bay has been integrated into Command Centre. The hoses in the bay are always locked. When a tanker arrives, the driver first completes an inhibitory substance test on a load of milk. If the milk test is clear, the Gallagher system releases the locks on the milk inlet hoses via integration with the site’s supervisory control and data acquisition (SCADA) system, programmable logic controller (PLC), and milk testing system. If the test is positive, an external alarm is raised within the SCADA system, and the hoses remain locked so milk can’t be delivered. This mitigates milk contamination and improves product safety. PLC system integration The integration with the PLC system has allowed the Command Centre lockdown feature to be enabled within the tanker bay Further integration with the site PLC system has allowed the Command Centre lockdown feature to be enabled within the tanker bay. So, when clean-in-place (CIP) cleaning is active, the area is automatically placed into lockdown. This excludes trucks and personnel from entering the area when dangerous chemicals and hot water are being used. Window button integration Forklift entry into warehouses is access controlled via Nedap Window Button integration with Command Centre. The Nedap system provides a long-range vehicle identification tag for secure vehicle access to major airlocks into manufacturing plants, where forklifts deliver raw goods and ingredients. This system ensures that only authorised forklift drivers can open the airlock. The doors on either side of the airlocks are controlled via interlock door rules created in Command Centre. The interlock rules only allow one door to be open at a time, thereby maintaining the integrity of the hygiene zone of the manufacturing plant. Both of these systems help mitigate product safety risks on site. Simplifying security processes Department employees also find the personal data fields important for recording health and safety qualifications, such as working at heights. When a contractor arrives, staff can check the contractor has the right qualifications to work in the area they are entering. Contractor management When the site induction competency is due to expire, the contractor receives an SMS notification. Their supervisor will also receive an email. Another feature of the Gallagher system that Tatua uses is the reporting function. This is used as part of the company’s ongoing contractor management. The use of a QR code for preregistered visits and visitor passes makes the sign in and sign out process very quick and simple A separate report is sent to each company with an inducted employee, to advise contractor managers/ supervisors on the induction status of their employees, which are emailed out on a monthly basis. This ensures the contracting companies have people with authorised access to the site and allows them to schedule their own re-inductions when required. Reporting is also used to check activity at the monitored pulse fence. Visitor management A visitor management kiosk is located at the main reception for all visitor registrations. It requires all visitors to read and accept Tatua’s terms and conditions of entry, including Health and Safety rules before a visitor pass is issued. Once signed in, the Tatua host receives an automatic SMS and email notification of their visitor’s arrival. “The use of a QR code for preregistered visits and visitor passes makes the sign in and sign out process very quick and simple,” says Webb. Multiple levels of security Webb concludes, “Our security solution from Gallagher offers so much more than access control. Integration is key to ensuring we add multiple levels of security in areas such as delivery and dispatch, milk collection, and more. This ensures the site runs smoothly, minimising health and safety risks to employees and contractors, and maintaining quality and product safety standards.”
Boon Edam Inc., a globally renowned company in security entrances and architectural revolving doors, has announced that Dexus Wholesale Property Fund has upgraded the Gateway Building in Sydney’s Circular Quay to feature entry security measures to protect employees, visitors and valuable data. The ideal solution was found by integrating Boon Edam Speedlane Swing optical turnstiles, IDEMIA’s MorphoWave touchless fingerprint scanners, Schindler’s elevator dispatch and Honeywell’s access control technology. Integration with MorphoWave touchless reader MorphoWave scans and verifies four fingerprints through a simple hand wave gesture Gateway’s access solution allows authorised and registered tenants to simply wave their hand in the MorphoWave touchless fingerprint scanner reader to enter the secure area through the turnstiles. Guests can sign in and register their finger pattern to become authorised to enter. MorphoWave scans and verifies four fingerprints through a simple hand wave gesture, during which the sensor takes several 3D photos of the fingerprints to extract biometric data and compare with the authorised fingerprints stored in the device. If they match, the user is granted access. This process all happens in less than one second. Featuring Schindler’s PORT Technology Each MorphoWave reader is connected to Schindler’s PORT Technology, which then receives the user’s credential data and conducts a cross-check with the building’s access control database. If the user is valid, a command is sent to the Boon Edam Lifeline Speedlane Swing to open its barriers. This interaction is surprisingly quick, with limited latency. “Tenants have a duty of care to protect their employees and visitors as well as valuable data and intellectual property, and they need the cooperation and support of a responsible and innovative building manager such as Dexus to manage secure entry into the building,” said Michael Fisher, Managing Director, Boon Edam Australia. Seamless access control integration A major part of the solution involves elevator destination control, whereby a user’s credentials are automatically assigned an elevator as they are verified and allowed access through the turnstile. This seamless integration was facilitated by an existing global partnership between Boon Edam and Schindler. The partnership arranged for Schindler’s PORT 4 mini technology to be embedded into the Speedlane Swing optical turnstiles at the manufacturing stage in the Boon Edam factory. Using an advanced algorithm and the integrated Schindler PORT 4 mini elevator destination control for visual and audio feedback, an elevator is automatically assigned, at the same time the turnstile is opening, allowing for optimum efficiency. The security is controlled by Honeywell’s access control system, integrated with Schindler’s PORT Technology. Honeywell access control system Honeywell has managed the security and building management systems for the Gateway building since 1990 Honeywell has been managing the security and building management systems for the Gateway building since it was first opened in 1990. Honeywell Asia-Pacific Solution Architect Leader Rhys Crabb said “Early engagement at all stages and a commitment to a collaborative approach enabled Dexus to select the best available technologies. Dexus placed customer outcomes first and foremost in the project brief, ensuring the delivery of a product that provided tenants and visitors with a premium, modern and secure user experience that is flexible and easy to use.” Boon Edam optical turnstiles Mr. Stephen Hodge, Senior Project Manager, Dexus, said “With so many stakeholders, and a strong need for reliability and quality, it was important that everyone knew the goals of the project and worked well together. I’m pleased to say that it was like a perfect jigsaw and everything came together smoothly." Stephen adds, “What was important to Dexus is that we were pushing the boundaries to create better experiences, but we’re only doing so with proven products. Boon Edam’s optical turnstiles have been installed globally and locally, and this gave us added confidence that they were the right product for this forward-looking project.” Enhanced building security “Another significant help with this project was that the companies involved built a prototype, located at Schindler’s Head Office based in Sydney, so that the Dexus management and technical teams could test the solution well in advance of implementing it at Gateway,” Hodge continued. He further stated, “It gave us peace of mind that we’d selected the right suppliers. We have tenants in Gateway who requested ground floor security, so we went out to tender to seek the best combination of sophisticated security and elegance, without being obtrusive to the building’s users.” Touchless fingerprint scanners for privacy Touchless fingerprint scanners were chosen to control access to secured floors and areas of the building Touchless fingerprint scanners were chosen to control access to secured floors and areas of the building, because they provide an extra level of privacy that was attractive to tenants. “A computer algorithm converts each person’s unique fingerprint signature into binary code, zeroes and ones, and uses that code to grant access,” explained Mr. Hodge, adding “Boon Edam turnstiles have the ability to integrate facial recognition, which could be highly valuable in other projects, but the fingerprint scanners were the right fit for this building. Boon Edam made it simple to integrate the scanners with their optical turnstiles, which helped us meet project deadlines.” Effective management of system installations For such a complex project, installation always has its challenges, including managing installation work as people continue to use the building. Mr. Bill Garrett, Facility Manager at Gateway Building, was impressed by Boon Edam’s service and installation team. He said, “The Boon Edam installation team always ensured safety was the number one priority and they did a quality job, even with some very difficult-to-access areas.” Garrett adds, “I’m delighted with the result of the project. One of the major benefits of the new entry system is that there’s a dedicated underground entrance for tradespeople, couriers and deliveries, which removes congestion and bulky carts from the main lobby. It’s all about enhancing the user experience, and Gateway will set a new benchmark for a seamless, secure and aesthetically pleasing entry.” Staged approach towards system implementation The testing, combined with the staged approach, allowed for a smooth transition to the new security technology" Mr. Garrett explained that to get tenants used to a totally new system, they adopted a staged approach. At first, the turnstiles were put into place but left in the open position and after an initial period, some of the turnstiles were closed so that tenants could try entering using the new technology, if they wished. Finally, the entire system was fully implemented. “In addition to this staged approach, we met with key tenants and allowed them to test the system in advance. The testing, combined with the staged approach, allowed for a smooth transition to the new security technology,” said Garrett. Scope of touchless access control technologies Now that the technology has been successfully rolled out at Gateway, Dexus is looking at other locations that could utilise the same harmony of security technologies. “We are continuing to assess opportunities to implement touchless technologies in new developments as well as in our existing buildings,” said Mr. Hodge. “The stylish and secure entrance at Gateway has been ideal through the COVID-19 pandemic. It manages flow, queries guests on recent visits to pandemic hotspots, if they are feeling any symptoms, and can record all entrants to the building, helping us meet government requirements. And the same features will be beneficial in a broader context, too, to help mitigate against unauthorised entry,” concludes Hodge. Dexus is actively exploring the possibility of rolling out similar security entrance systems in other buildings, thereby delivering the seamless balance of security and elegance.
IDEMIA, the globally renowned company in Augmented Identity, moved to its new headquarters in September 2018, in an 11-floor building located in La Défense business district, in Paris, France. The building brings together 1,300 employees out of total worldwide staff strength of close to 15,000 people. Biometric access control Due to the sensitive nature of its activities in this building, and given its position on the biometrics market, IDEMIA decided to deploy biometric access control throughout the entire building, a first in this business district and a fantastic opportunity to showcase IDEMIA’s flagship products in real life. Most employees get to the office via nearby metro and tram stations, and therefore, arrive within the same 30-minute window. This creates the need for a high throughput access control solution, for entrance and exit peak-times. Access to the six elevators serving the eleven floors is given after a first control at speed gates in the lobby area. MorphoWave Compact devices deployed IDEMIA opted for MorphoWave Compact associated to Digicon’s dFlow speedgates IDEMIA opted for MorphoWave Compact associated to Digicon’s dFlow speedgates. MorphoWave Compact devices were mounted on a special stylish stainless steel pedestal. Four dFlow lanes were installed, with readers for entry and exit. MorphoWave Compact is IDEMIA’s flagship biometric device for physical access control. It performs a 3D scan and verification of four fingerprints in less than one second, in a quick and easy touchless ‘wave’ gesture within the reader. dFlow speedgates These features make the product particularly well-suited for such high-traffic locations, with the capability to authenticate up to 50 people per minute, thanks to advanced algorithms based on Artificial Intelligence. With dFlow speedgates, Digicon introduces a new vision for access control gates, one with continuous flows and normally open doors. dFlow enables free flow, ushering new levels of comfort and security. Frictionless biometric solution The installation is highly acclaimed by employees who appreciate the frictionless use of MorphoWave Compact and its natural ‘wave’ hand gesture, as well as Digicon’s ‘always open’ dFlow concept, that enables them to get to the elevators in only a few seconds. Of course, IDEMIA was well-placed for this biometric employee access control deployment, being the provider of MorphoWave Compact. The employees were immediately convinced by the frictionless and hygienic experience it offered them. The team in charge of the security of the building found the MorphoWave Compact and dFlow combination more secure and less intrusive than other access control systems. Most importantly, what is true for a company like IDEMIA will also be true for any company in need of a high level of security delivered in a frictionless and convenient way, especially in high-traffic locations like in an HQ lobby.
The 100 Mount Street premium-grade office tower completed in May 2019, is the tallest (152m) building in North Sydney. With an innovative cross-braced exoskeleton structure and a soaring glass curtain wall, the tower celebrates Sydney‘s history of excellence in architecture and structural engineering. The 35-story office tower offers panoramic views of Sydney Harbour, Sydney Opera House and Sydney Harbour Bridge, and is occupied by some of Sydney’s best-known companies. The site also benefits from its proximity to key transport infrastructures with a train station, bus stops, ferry wharf and taxi stand all within walking distance. This high traffic location required a convenient and secure way to ensure controlled access for the 2,000 people entering the building everyday, while maintaining the aesthetics of the 8 metres-high ceiling lobby. Efficient control access to the building In order to efficiently control access to the building, the security contractor supplied top quality COMINFO EasyGate SPT entrance control gates equipped with IDEMIA’s MorphoWave™ Compact high-end biometric contactless devices. COMINFO is an experienced manufacturer of turnstiles and speed gates. EasyGate SPT models were installed, equipped with the latest MDD motor technology (Magnetic Direct Drive: no gearbox, no oil, no brush) and advanced infrared optical sensors which ensure safe passage and detect tailgating and cross-over, to ensure that only authorised people can pass through the gates. MorphoWave Compact™ is the flagship biometric device for physical access control from IDEMIA, the front-runner in Augmented Identity. The terminal performs a 3D scan and verification of 4 fingerprints in less than 1-second, in a quick and easy touchless wave gesture. Aesthetic integration The features of the product are particularly well-suited for high traffic locations with the capability to authenticate up to 50 people per minute thanks to advanced algorithms based on Artificial Intelligence. COMINFO carried out an aesthetical integration of MorphoWave™ Compact into EasyGate SPT, resulting in a powerful solution that brings the latest physical access control system using only a simple wave of a hand. The project was deployed by Centaman, COMINFO’s partner for Australia/New Zealand. First to implement biometric technology Dexus and Dexus Wholesale Property Fund who owned the building were the first to implement this biometric technology in office buildings and have now more than 2,000 people registered with their biometrics, removing the need for physical access cards or touching anything when entering or leaving the secured premises. The installation is highly acclaimed by employees who appreciate the frictionless and hygienic use of MorphoWave™ Compact and EasyGate SPT.
Round table discussion
Perimeter security is the first line of defence against intruders entering a business or premises. Traditionally associated with low-tech options such as fencing, the field of perimeter security has expanded in recent years and now encompasses a range of high-tech options. We asked this week’s Expert Panel Roundtable: What are the latest trends in perimeter security technology?
When technology performs a required task effectively, there is little reason to upgrade to the ‘next big thing’. In this regard, the physical security market is notoriously slow to change. Much of yesterday’s most robust and dependable equipment is still in place at thousands of customer sites, still performing as well as the day it was installed. However, there comes a point when any technology becomes outdated. We asked this week’s Expert Panel Roundtable: Which security technologies are becoming outdated or obsolete?
Protecting dormitory residents and assetsDownload
Protecting Critical Infrastructure through facial recognitionDownload
12 questions to ask your access control providerDownload
Providing frictionless cloud Video Storage as a Service (VSaaS)Download