Maxxess has released a major update to its popular eVisitor visitor management solution with new mobile access integrations and touchless reader choices to support more flexible workplace operations post-pandemic. The new release includes options for mobile access control using smartphones, with authorised visitors and site users now able to pass through secure entrances using a choice of more convenient and hygienic contactless and touchless methods, including secure GDPR-compliant biometrics....
The introduction of 8 and 16 channel Wisenet X Series NVRs makes it cost-effective, for even small businesses to take advantage of the licence-free Deep Learning AI video analytics, built into Wisenet AI cameras. As is the case with the 32 and 64 Wisenet X NVRs introduced in 2020, by reading the AI metadata captured by Wisenet AI cameras, the new NVRs are able to help users to quickly and accurately search video for objects and the attributes associated to them. Deep Learning AI video an...
Keyless, a pioneering privacy-first biometric authentication firm announced that it has joined the DizmeID Foundation, to develop an open ecosystem for decentralised management of digital identities. Control over digital identity DizmeID Foundation operates to combine the benefits of self-sovereign identity with necessary compliance and regulation, to enable wallet holders with ownership and control over their digital identity, data access, and distribution. Keyless will work alongside A...
Hikvision launches its new cloud-based and fully integrated access and attendance solution for SMB and enterprise users. Built with an intuitive user interface, the new solution provides sophisticated, multi-site access control and time and attendance management that centralise and simplify HR operations, and enhances the employee experience. Cloud-based access and attendance solution Hikvision’s cloud-based access and attendance solution is an integrated HR management and access control...
Over a third, (36 percent) of employees say they have picked up bad cybersecurity behaviours and found security ‘workarounds’ since working remotely, according to a new report from Tessian, the human layer security company. Cybersecurity behaviours The report, which analysed ‘Back to Work’ security behaviours, also revealed that nearly a third of employees (30 percent) believe they can get away with riskier security behaviours when working remotely, with two in five (39...
Panasonic announces its new updated range of S-Series cameras setting a new standard with embedded AI capabilities and improved image quality for more accurate analytics running on the camera. The first four indoor dome and box-type models, with Full HD resolution, will be available in early July. Further line-up expansions will follow later this year, including outdoor and fisheye models. The addition of AI to the Standard range of Panasonic cameras enables businesses to take advantage of deep...
Userful Corporation, the provider of the foremost software-defined AV-over-IP platform for the enterprise, announces the release of a new corporate signage application as a part of its award-winning Visual Networking Platform—Userful Emerald Signage. The Emerald Signage application sits at the front-end of the Visual Networking Platform and enables corporate end-users—from the heads of HR departments to communications managers or administrative staff—to easily author, deploy and manage the content on signage displays anywhere in the world. Integration and Content Management System (CMS) As part of Userful’s Visual Networking Platform, IT departments can easily integrate Userful Emerald Signage, along with any other visual applications and services, into its network infrastructure while maintaining administrative control, ensuring data privacy and network security. Userful’s Visual Networking Platform gives the IT department the management tools and control it needs while Userful Emerald Signage delivers content creation and management capability to each individual department. Emerald Signage features a native Content Management System (CMS) application, which simplifies the creation, management and display of content through a cloud-based intuitive interface, providing fully dynamic corporate digital signage on a global scale. Authority Comment Visual Networking Platform allows organisations to break down silos across departments “Emerald Signage is the first solution of its kind, and a breakthrough in the digital signage space.” says, John Marshall, CEO, Userful. “As part of the Userful Visual Networking Platform, it allows organisations to break down silos across departments by unifying its corporate communications on a single platform, administered via its IT infrastructure, but deployed by each individual department, thus streamlining operations and facilitating better employee engagement through elite visual communications.” Key features Canvas Content Creator: easily create custom posters and signage layouts from over 400 templates, and combine images, videos and widgets in a single view. Includes QR Code Generator, enabling touchless interactivity. Role-Based Permissions & Access Control: gives administrators full control over who is allowed to deploy and manage content. One-Click App Integration: include widgets and apps to canvases—including YouTube, Twitter, Weather, RSS, News, and more. Global Management: Provision, manage and monitor displays or video walls anywhere in the world through the cloud. Any source, anywhere, any time: provides multiple ways to stream content onto any screen, including secure local HDMI sources, VNC and RDP. Integrated into Userful's platform: deploy using on-premise and cloud or hybrid infrastructure with commercially available, off-the-shelf-hardware ensuring maximum flexibility and reduced Total Cost of Ownership (TCO). Whether it’s used for corporate messaging, employee recognition, driving brand awareness, or increasing cooperation and transparency, Userful Emerald Signage is easy to deploy, manage and support.
Lock and security specialist, Mul-T-Lock has launched CLIQ Local Manager, the ideal locally installed access control system for medium to large businesses. The new CLIQ Local Manager software has been designed for the day-to-day management of eCLIQ master key systems. With it, system managers can perform a variety of tasks, based on the specific needs of their environment, managing access rights of user keys locally via desktop programming devices. CLIQ Local Manager Mul-T-Lock’s CLIQ Local Manager is simple to set up, even for new users of CLIQ. Automated COM port selection makes getting started quick and easy, plus the software has been developed to be extremely intuitive and user friendly, reducing the need for lengthy training sessions and in turn, decreasing investment costs. CLIQ Local Manager has also been developed to offer a more secure solution, owing to its state-of-the-art future-proof design, which allows system managers to allocate access authorisations and collect audit trails. This makes the software ideal for securing premises that house maximum security or sensitive data, such as prisons, hospitals and government establishments. Support for GDPR-compliant software CLIQ Local Manager supports GDPR-compliant software, used to meet user demands for data privacy Able to handle up to 5,000 keys and 5,000 cylinders, CLIQ Local Manager also supports GDPR-compliant software, used to meet user demands for data privacy. The software can be used with any common Windows computer and is ideal for those wanting an access control system in remote locations, such as national parks and farmland, as there is no need for network coverage at points of installation. eCLIQ access control locks Working on a modular system, Mul-T-Lock’s eCLIQ access control locks are quick and easy to install, in place of mechanical cylinders and padlocks. Retrofittable to doors, cabinets and gates, and requiring no cabling, the system offers a low cost and low maintenance solution for all types of applications. CLIQ Local Manager allows for easy migration from old manager software and lets users choose the level of service they need so that they can always get help and software updates, whenever needed. Plus, the software allows users to set reminders so that they never forget an important task.
Industry-renowned video surveillance outfit, Cloudview, has unveiled its latest state-of-the-art, cloud-based solution to the CCTV market. Buoyed by two successful funding rounds, Cloudview’s latest cloud video recording system (CVR) is now ready for launch. Cloud video recording system (CVR) This next-generation technology unifies, manages and securely consolidates smart-triggered events from IP CCTV cameras in any location. Data is stored safely and is always accessible. Built from the ground up, the CVR utilises British technology with military-grade data security and ‘privacy by design’ at its core. Cloudview’s CVR enables the capture, storage and management of visual data, using the Cloud Cloudview’s CVR enables the capture, storage and management of visual data, using the Cloud and securely consolidates visual data from any number of CCTV systems, into a unified, encrypted account, held on secure cloud servers and supported by Amazon Web Services. All data is hosted within the United Kingdom and Cloudview’s role-based access controls allow businesses to manage their visual data, so only users who require to see certain content are allowed to, helping businesses with their GDPR compliance. Compatible with IP-based cameras and system Compatible with virtually any IP-based camera and system, the cloud video recording system offers smart detection to maintain an active CCTV network and minimise system downtime. The Cloudview CVR can support business transformations from older analogues systems into new IP-based networks. It also overhauls and can unify siloed parts of existing systems into a centrally managed CCTV system. Scalable storage options Optimised to work across any online or mobile network, Cloudview’s CVR offers scalable storage options that can support single camera to large-scale, multi-site operations. Recorded events are then accessible anywhere via the web. By ensuring the safety and security of assets and people, it allows clients to focus on their core business goals. Investor confidence in Cloudview comes hot on the heels of the new Chief Executive Officer (CEO) appointment for the company, Keith Cornell, who brings to the table, over 20 years of executive management, boardroom and corporate development experience in the global technology market. His brief is to work with both investors and internal stakeholders to manage the company’s ambitious expansion plans. Enhancing people and asset safety The Cloudview CVR is key and represents the natural evolution of security technology" “The success of our recent funding rounds means we can now accelerate our activity to increase traction in the UK market,” said Cloudview’s Chief Executive Officer (CEO), Keith Cornell, adding “The Cloudview CVR is key and represents the natural evolution of security technology. Our central aim has not changed – to keep people and assets safe.” Keith Cornell adds, “Using the Cloud as the foundation means we can provide a system that delivers on that promise. CVR is flexible, easy, compatible and versatile enough for any security-conscious organisation, no matter what their specific needs may be.” Future-proof platform He further stated, “With compliance and transparency baked into the system, our CVR solution offers a future-proof platform that will not only change the CCTV industry, but also set the benchmark for all future operations.” Cloudview’s CVR launch comes at a time of growing uptake in remote control and video surveillance, prompted by the ongoing COVID-19 pandemic. 81% of respondents in the 2020 IFSEC Video Surveillance Report believe that video technology plays an important safety role in tackling the problem. Facial recognition and CCTV have seen a 47% increase in use to track potential outbreaks.
Device Authority, a pioneer in identity and access management (IAM) for the Internet of Things (IoT), and Medigate, an IoT device security and asset management company dedicated to healthcare, announce their partnership for securing the Internet of Medical Things (IoMT). Whether to improve the cybersecurity of IoMT, or directly address other challenges, this partnership delivers Healthcare Delivery Organisations (HDOs) important new integrated capabilities. Explosive spending on the Internet of Medical Things (IoMT) is ushering in a healthcare revolution. And COVID-inspired advances to telehealth and remote patient monitoring (RPM) are compounding the trend. But connected medical progress comes with a price. Increased cyber risks IoMT devices and their ability to connect to Healthcare IT systems have also increased cyber risks IoMT devices and their ability to connect to Healthcare IT systems have also increased cyber risks. They must be effectively addressed, as cyberattacks do not just pose a threat to the financial business interests of the HDO but present potential patient safety risks. The Medigate platform fuses its understanding of clinical workflows with unmatched device profiling capabilities and knowledge of authorised operating requirements. This allows the company to instantly detect anomalous device behaviours and trigger appropriate remediation workflows. It also enables instant threat corelations to the HDO's potentially impacted assets. Device Authority’s KeyScaler™ platform uses patented Dynamic Device Key Generation (DDKG) and PKI Signature+ technology to address the identity access management challenges. KeyScaler is especially effective for medical devices, as it secures the medical devices’ identity and offers an automated approach for registration and authentication. Protecting sensitive data These measures protect sensitive patient data and other information exchanged among a wide range of devices – from smartphones to tablets, to large surgical robots or any other device that leverages standard digital certificate protocols. This partnership also opens the possibilities of retrofitting Device Authority's KeyScaler to legacy devices. This has the potential to deliver significant ROI, cost savings and help HDO's more rapidly comply with new and pending security guidance, directives, and regulations. Together we have a robust, secure end-to-end solution for healthcare providers" “We are delighted to partner and collaborate with Medigate who focus on the healthcare and medical industry which has always been a core focus for Device Authority. Together we have a robust, secure end-to-end solution for healthcare providers and medical device manufacturers solving detection, patient safety, compliance, and data security challenges,” said Darron Antill, CEO of Device Authority. Remaining clinically focused “The COVID-19 epidemic showed us the power of health IT, but it also reinforced how critically important it is to manage and protect the devices used to facilitate care– both inside and outside the four walls of the hospital. By integrating Medigate technology with Device Authority’s platform, we’re able to offer capabilities that are uniquely built to meet the NIST functions of Identify, Detect and Protect, while remaining clinically focused and attuned to medical workflows.” “We’re thrilled to partner with Device Authority and for the opportunity to leverage their best-in-class solutions to protect patients, clinicians, hospital leaders, and all others who utilise the IoMT on a daily basis,” said Stephan Goldberg, VP of Systems Engineering at Medigate.
Crossword Cybersecurity Plc, the technology commercialisation company focused on cyber security and risk management, is pleased to announce its acquisition of the whole of the share capital of Verifiable Credentials Limited (VCL), the provider of Identiproof, the World Wide Web Consortium (W3C) verifiable credentials compatible middleware and wallet technology, with whom Crossword is already working. Identiproof Identiproof is a key component in verifiable credentials systems Identiproof, VCL’s middleware technology suite of products, is a key component in verifiable credentials systems, such as COVID-19 status certificates and their issuer, verifier, and wallet applications. Identiproof is currently being used in a UK Government-funded trial of COVID-19 certificates for East Kent Hospitals University NHS Foundation Trust (EKHUFT), which Crossword Cybersecurity Plc is also involved in, separately for a client in the entertainment sector, and with another client in the United Arab Emirates. Identiproof will become Crossword’s third product, joining Rizikon and Nixer in the portfolio, as a cryptography-based cyber security product. Acquisition of Verifiable Credentials Limited (VCL) Crossword Cybersecurity Plc has agreed to pay a total consideration of up to 2.75 million pounds for Verifiable Credentials Limited. The payments are structured as follows: An initial payment of100,000 and 300,000 pounds in company shares, issued in two tranches - 150,000 pounds on completion and 150,000 pounds on the first anniversary of completion. 100,000 pounds in company shares payable on achievement of the first VCL commercial licence deal to the NHS or another UK Government organisation. On the first anniversary of the transaction, up to 750,000 pounds in company stock payable on a straight-line pro rata basis on achievement of revenue between 100,000 and 325,000 pounds, in the first 12 months post acquisition. On the second anniversary of the transaction, up to 1,500,000 pounds in company shares payable on a straight-line pro rata basis on achievement of revenue between 250,000 and 625,000 pounds in the second 12 months post acquisition. All shares will be issued at a price based on the average mid-market price for the three months prior to the date of issue. Issuing of digital certificates and documents Identiproof is a central technology in applications for the issuing of digital certificates and documents that cannot be forged or transferred, and that respect the privacy of the holders of those certificates. It does this through the process of selective disclosure, whereby the recipient requests the minimum of information in conformance with GDPR. Identiproof is one of the first systems built to the 2019 W3C recommendations - The Verifiable Credentials Data Model and Web Authentication (FIDO2), two new global web security standards. This technology has wide ranging applications including digital ticketing, certificates, licences, memberships, passports, proof of ownerships, and the list goes on. Achieved W3C verifiable credentials standard David Chadwick will join Crossword as Product Director for verifiable credentials products VCL achieved this early adoption of the W3C verifiable credentials standard because Emeritus Professor, David Chadwick, VCL’s Chief Executive Officer (CEO), is one of the six co-authors and editors of the standard, and a well-known expert in the field of digital identity and verifiable credentials. David Chadwick will join Crossword as Product Director for verifiable credentials products. David Chadwick incorporated VCL in April 2019 and it has been assigned the intellectual property from the University of Kent. David will be joined at Crossword by VCL’s specialist development team. Bidding for grants in the UK, EU and overseas VCL has successfully bid for a number of prestigious grants in the United Kingdom, the European Union and overseas. For the 18 months ended 30 September 2020, VCL made a loss of 2,842 pounds and had a deficiency of assets of 2,742 pounds, at that date. Crossword Cybersecurity Plc first started working with VCL when David Chadwick, as Professor of Information Systems Security at the University of Kent, brought his academic team to participate in the InnovateUK / UKRI CyberASAP programme in 2019. Training for cyber security startups Crossword was, and still is, a provider of training to the cyber security academic startups that go through that programme. Jake Holloway, Crossword’s Chief Product Officer (CPO) maintains close relationships with the CyberASAP alumni, and it became obvious that with the opportunities in the W3C standard and Identiproof, David Chadwick and his talented team would be an incredible asset to Crossword for entering this new and exciting market. Issue of Ordinary Shares: Crossword will issue the vendors 423,730 ordinary shares of 0.5p each (Ordinary Shares) at a price of 35.4p per share, in consideration of the initial payment of shares worth 150,000 pounds. Application has been made for the admission of the 423,730 ordinary shares to trading on AIM (Admission), with admission expected to take place on or around 2 June 2021. Total Voting Rights Crossword Cybersecurity Plc will have 58,042,630 ordinary shares in issue with voting rights attached For the purposes of the Financial Conduct Authority's Disclosure Guidance and Transparency Rules (DTRs), following Admission, Crossword Cybersecurity Plc will have 58,042,630 ordinary shares in issue with voting rights attached. Crossword holds no shares in treasury. This figure of 58,042,630 may be used by shareholders in the company as the denominator for the calculations, by which they will determine if they are required to notify their interest in, or a change to their interest in the company, under the DTRs. Digital, secure and privacy-respecting credentials Tom Ilube, the Chief Executive Officer (CEO) of Crossword Cybersecurity plc, commented, “VCL has unique knowledge and a fantastic product in the new era of W3C verifiable credentials, which can and should power COVID-19 certificates, as well as all manner of digital, secure and privacy-respecting credentials, certificates, tickets and proofs of ownership.” Tom adds, “We know Professor Chadwick and his start-up team well from CyberASAP and believe Identiproof is a perfect fit for Crossword as our third product. This acquisition comes at a time when we are experiencing great success from strategies to increase Rizikon market penetration, particularly the launch of Rizikon Pro. In the last 6 months this has increased 10 fold, with the number of Rizikon users exceeding 250.” David Chadwick, the Chief Executive Officer (CEO) of Verifiable Credentials Limited, commented, “Identiproof is unique in the market and with Crossword’s great structure, connections and sales team, we’re expecting to achieve excellent revenue growth.”
SAFR from RealNetworks, Inc. announces a partnership with Convergint Technologies. Under the terms of the agreement, Convergint will add the SAFR computer vision platform to their portfolio of integrated security solutions to offer its US customers the facial recognition platform for live video intelligence. Convergint is a $1.4 billion global systems integrator with over 150 locations spanning the globe. By teaming up with SAFR, Convergint will have access to the fastest and most accurate facial recognition platform for live video with the lowest bias available. Powerful computer vision SAFR is also an incredibly compact Facial Recognition (FR) solution with the ability to be deployed on the edge and within cameras. SAFR’s relentless focus on the ethical use of FR technology makes it easy for customers around the world to comply with existing standards such as GDPR. SAFR’s powerful computer vision SDK and web APIs makes it easy for companies like Convergint to provide integrations to meet the exact needs of any organisation. From watchlists, to access control, and perimeter protection, the solution can be deployed for a wide variety of use cases. Customers own their own database and can manage opt-in/opt-out enrolment easily with a simple, but powerful user interface. Best service provider Convergint is a trusted supplier and service provider to many well-known customers" “Convergint is a trusted supplier and service provider to many well-known customers in North America. By choosing SAFR as a preferred FR partner, they’ve made a commitment to their customers that builds on that trust, knowing that SAFR is designed with privacy in mind,” said Mitch Fagundes, Sales and Business Development, SAFR. “We chose to partner with SAFR for many reasons, key among them is the trusted performance of their FR algorithm,” said Amir Shechter, Executive Director of Advanced Solutions for Convergint Technologies. “We look forward to working together with their team on innovation solutions that enable us to be our customers’ best service provider.” Safer work environment Convergint is hosting its InSight Innovation Summit, an exclusive digital event for safety and security thought leaders, innovators, and technologists. The event will be open daily from May 18th-20th, 2021. It will provide organisations with the strategies and tools required to optimise business performance and create a safer work environment. The Insight Innovation Summit will feature 1:1 meeting tracks with Convergint experts and partners, live innovation demos showcasing the latest transformative solutions, and strategy sessions with industry thought leaders discussing the latest game-changing technology. SAFR’s Mitch Fagundes will be giving a presentation on leveraging facial recognition in the real world.
The transition to remote working has been a revelation for many traditional office staff, yet concerns over data security risks are rising. Mark Harper of HSM explains why businesses and their remote workers must remain vigilant when it comes to physical document security in homes. Pre-pandemic, home offices were often that neglected room in people’s homes. But now things are different. After the initial lockdown in 2020, 46.6% of UK workers did some work at home with 86% of those doing so because of the pandemic. Semi-permanent workspaces Since then, many have found that over time, those semi-permanent workspaces have become slightly more permanent – with official hybrid working coming into effect for an assortment of businesses and their teams. The adoption of hybrid working can in fact be seen as one of the few positives to come from the pandemic, with less travel, more freedom and higher productivity top of the benefits list for businesses and their employees. The handling of sensitive documents, is a growing concern for office managers But those welcomed benefits don’t tell the whole story. The transition to remote working has undoubtedly impacted workplace security, with various touch points at risk. The handling of sensitive documents for example, is a growing concern for office managers. In simpler times, sensitive data was more or less contained in an office space, but with millions of home setups to now think about, how can businesses and their office managers control the issue of desk data? Physical document security As of January 2021, it’s said that one in three UK workers are based exclusively at home. That’s millions of individuals from a variety of sectors, all of which must continue in their efforts to remain data secure. With that, reports of cyber security fears are consistently making the news but that shouldn’t be the sole focus. There is also the underlying, but growing, issue of physical document security. The move to remote working hasn’t removed these physical forms of data – think hard drives, USBs and paper based documentation. A recent surge in demand for home printers for example, only exemplifies the use of physical documents and the potential security issues home offices are facing. Adding to that, research conducted in 2020 found that two out of three employees who printed documents at home admitted to binning those documents both in and outside of their house without shredding them. Data security concern Without the right equipment, policies and guidance, businesses are sure to be at risk Those findings present a huge data security concern, one that must be fixed immediately. The Information Commissioner’s Office (ICO) has since released guidance for those working from their bedrooms and dining tables. Designed to help overcome these challenges, the ‘security checklists’ and ‘top tips’ should be the first port of call for many. Yet throughout, the ICO make reference to ‘following your organisation’s policies and guidance’ – highlighting that the onus isn’t solely on the individuals working from their makeshift offices. Office managers have a monumental task on their hands to ensure teams are well equipped within their home setups. Without the right equipment, policies and guidance, businesses are sure to be at risk. But it would be wrong to insinuate that unsecure desk data has only now become an issue for organisations. Modern office spaces Keeping clear desks has long been a battle for many office managers. In fact, clear desk policies are practised in most modern office spaces, with it recognised as a key preventative to personal information being wrongly accessed and so falling foul of GDPR legislation. Throwing sensitive documents in the bin was never an option pre-pandemic However, the unsupervised aspect of home working has led to a potentially more lax approach to these policies, or in some cases, they can’t be followed at all. For those taking a more laid back approach, organisation leaders must remind staff of their data security responsibilities and why clear desk policies have previously proven effective. Ultimately, throwing sensitive documents in the bin was never an option pre-pandemic and this must be carried through to home workspaces now. Securely destroy documents There are also concerns over the equipment people have access to at home. For example, without a reliable home shredding solution, data security suddenly becomes a tougher task. To add to that, several recommendations state that employees working from home should avoid throwing documents away by instead transporting them to the office for shredding once lockdown rules ease. While this is an option, it does pose further issues, with document security at risk of accidental loss or even theft throughout the transportation period, not to mention the time spent in storage. The best and most effective way to securely destroy documents is at the source, especially in environments where higher levels of personal data is regularly handled. Correct shredding equipment The recent findings on home office behaviour represent a true security risk Only when home workers implement their own clear desk policies alongside the correct shredding equipment (at the correct security level), can both home office spaces and regular offices become data secure. Realistically, these solutions should, like the common home printer, become a staple in home office spaces moving forward. The likelihood is that many UK workers will remain in their home offices for the foreseeable future, only to emerge as hybrid workers post-pandemic. And while the current working environment is more ideal for some than others, the recent findings on home office behaviour represent a true security risk to organisations. With this in mind, it’s now more key than ever for business leaders, their office managers and homeworkers to all step up and get a handle on home data security policies (as well as maintaining their standards back at the office) – starting with the implementation of clear desk policies. After all, a clear desk equals a clear mind.
Q: Mr. Seiter, Mr. Ekerot, you both joined Bosch Building Technologies’ business unit Video Systems & Solutions as Senior Vice Presidents in March 2020, when the Coronavirus pandemic was just beginning. How did your business unit get through 2020? Magnus Ekerot: The crisis was also felt at Bosch. At the same time, demand has risen for solutions that keep businesses open and protect people's health. We offer corresponding video solutions that can make a significant contribution to containing the pandemic. Michael Seiter: Overall, we managed the past year well despite the challenges and have been growing again since the third quarter compared to 2019. We see good opportunities for further growth in 2021. Q: Has the Corona crisis again accelerated the development of smart technologies in the security technology market, and does the security market in contrast to most industries benefit from the crisis more than it suffers? Michael Seiter: The Corona crisis has definitely demonstrated that the future lies in data-driven solutions. Thanks to our product development strategy already being based on this, we at Bosch were very quickly able to develop new products for the ‘New Normal’ and to expand existing products accordingly. To give one or two examples: in cooperation with Philips, we very quickly developed a people counting solution for retail operations – smart Philips displays in conjunction with smart cameras from Bosch that provide protection for staff and customers. The In-Store Analytics software solution was also implemented with additional features. Shop owners can now make decisions based on customer movement data such as “Where do we position products to avoid queues or crowds?” HTD involves a touch-free monitoring system to accurately and speedily identify people with heightened skin temperature The latest highlight is the Bosch Human Skin Temperature Detection solution, in short HTD. This involves a touch-free monitoring system to accurately and speedily identify people with heightened skin temperature at control points in offices, factory floors, or airports. The benefits of previously existing solutions on the market are sometimes called into question. Competitors are often unable to deliver what they promise because, for example, the measured temperature of the skin does not correspond to the core temperature of the person, or fluctuates, due to environmental influences. Therefore, we developed a software-based solution that, in compliance with GDPR, first allows people with potentially elevated body temperatures to be filtered out, and in a second step, allows medical personnel to perform a more targeted fever measurement. Q: You see a lot of potential for the video security industry in new technologies such as Artificial Intelligence and the Internet of Things. What specific opportunities do you mean, and how are you leveraging these technologies at Bosch Building Technologies? Michael Seiter: Bosch has committed itself fully to an “AIoT” – AI meets IoT – strategy. The development of AI algorithms and software, in general, is at Bosch significantly driven in the security space. By AIoT, we specifically mean the networking of physical products and the deployment of artificial intelligence. With AI we aim to enable clients to understand events at an ever-deeper level and predict them in the future – the keyword being predictive – so that they can act proactively. This is particularly important for health and safety. An example is the Intelligent Insights solution where the user can anticipate potentially dangerous situations, for instance in maintaining social distance and a maximum number of people numbers in any one area. Q: From your point of view do you have an advantage over other suppliers when it comes to AI-based products in the video arena? Michael Seiter: The analysis and utilisation of video data have long been front and centre with us. Since 2016 we’ve been following the strategy of offering AI applications in the form of integrated intelligent video analytics as a standard in our network cameras. Data such as colour, object size, object speed, and direction are all measured. Simply put, you can say this is seeing and understanding – which is the principle behind smart security cameras. Today it’s much more a question of intelligent, data-based solutions than collecting high-quality pictures and storing them for the record. Bosch has been investing heavily in AI for years, from which we can benefit greatly in our area. In the first quarter, for example, we will launch a vehicle detector based on deep learning that is already running on our cameras. This will create significant added value for our customers in the area of intelligent traffic control. Q: Mr. Ekerot, what advantages do customers have in AI-based video security from Bosch? Magnus Ekerot: A key advantage is strong customer focus with tailored solutions that are at the same time modular and scalable through new AI algorithms A key advantage is our strong customer focus with tailored solutions that are at the same time modular and scalable through new AI algorithms. Take the example of Camera Trainer, a machine learning software that can be directly uploaded to Bosch network cameras. The camera is thus trained up on recognising objects and situations – tailored to the specific needs of our customers. If the camera detects the defined scenario, it performs a predefined action in real-time – for example, a count or an alarm. The latest example is our new camera platform Inteox. As a completely open camera platform, Inteox combines Bosch's intelligent video analytics with an open operating system. This allows programmers to develop specific software applications - or apps - for various application purposes. These can then be loaded onto cameras – the same principle as an app store for smartphones. To sum up, Bosch AI applications support customer-specific needs related to data analysis while enabling totally new applications within and beyond the video security market. Q: Can you name a specific current project where Bosch has deployed an AI-based solution? Magnus Ekerot: A current ground-breaking project using our smart cameras is being implemented as a pilot in the USA. Smart Ohio enables users to configure more intelligent traffic flows and thus ensure mobility, safety, and the efficient use of roads today and tomorrow. The new vehicle detector mentioned by Mr. Seiter also plays a central role here. Our overall goal is to provide connected smart sensor solutions for public and private transportation agencies to enable them to operate their roads safely and efficiently. The Intelligent Insights can anticipate potentially dangerous situations, for instance in maintaining social distance and a maximum number of people numbers in any one area Q: Mr. Seiter, you have been involved with the topic of mobility for some time. What experience from your previous job in the automotive business of Bosch might help you when it comes to further develop the video portfolio of Bosch Building Technologies? Michael Seiter: There's a lot to tell. First of all, the development of core algorithms for video-based solutions, whether for autonomous driving, for vehicle interior monitoring, or for our Bosch Building Technologies video systems, all come together at Bosch's Hildesheim location. This gives us considerable synergies and allows us to bring R&D results to market faster and more flexibly. Essentially, assisted driving systems use AI algorithms that process ever-increasing volumes of video data. Attempts are being made to imitate the human being and enable the vehicle to understand better the surrounding environment with its ‘eyes’. This predictive capability is especially critical with autonomous driving. For example, key questions include: “How should the car respond and what could potentially happen next?” “What kind of environment does it find itself in?” etc. There are many activities in this area at Bosch that in my new role in security we can also strongly benefit from. I am now bringing a lot of this experience and existing R&D achievements to Bosch Video Systems & Solutions, which also results in further synergies with our mobility division: At Stuttgart Airport, autonomous driving is already being implemented together with Mercedes-Benz and the parking garage operator Apcoa as part of the "Automated Valet Parking" project, or AVP for short, in which intelligent video systems from Bosch Building Technologies are making a significant contribution. Mr. Ekerot, you have a lot of experience in the video security area. Where do you position Bosch Building Technologies now in this market and what specific goals are you pursuing? Magnus Ekerot: Our clients are looking for reliable partners and products. We are a strong brand; you can rely on Bosch products. Bosch is a thought leader in video and a pioneer in AI applications in this field since 2016. Data security is everything to us: Our products conform to the EU’s GDPR regulations. Beyond that, we have an extensive camera portfolio that complies with the US National Defense Authorization Act (NDAA) for video security devices. This enables our portfolio to be deployed for example within US government buildings. We are planning to conclude more software maintenance agreements with our clients in 2021. These deliver investment and future security for our customers and include for example a ‘patch guarantee’ along with regular updates with new functionalities. This is the first step in a comprehensive plan to access new revenue channels for us and our partners delivering the best technology and excellent service to the end-user! Overall, many new products will be launched this year and this trend will intensify. Our goal is to establish new product families that follow a simple principle: “The development and delivery of disruptive, predictive video solutions that every user can trust because of the underlying sustainable forward-thinking mindset.” It’s been much discussed of late that Bosch is one of the very first companies globally that operates on a CO2-neutral basis. How does sustainability impact your business? Magnus Ekerot: IoT solutions are actually sustainable and contribute to environmental protection Our IoT solutions are actually sustainable and contribute to environmental protection. For example, our cameras are sustainable in that they remain up-to-date through software updates and needn’t be constantly exchanged for new ones. Our systems demonstrate sustainability also operationally as they can be managed remotely. System integrators don’t need to be physically present, thus avoiding unnecessary travel with its accompanying emissions. All in all, Bosch Building Technologies develops ways to accompany and support our clients in reaching their climate goals via new technologies. This can be done, for example, through improved energy efficiency, the total cost of ownership models, organising and simplifying the supply chain, and helping our customers meet their social responsibilities. The Power of Bosch helps us here to leverage company-wide research to be two steps ahead, a shade faster, when it comes to new technologies and initiatives that our and future generations will benefit from. I should also say that I am personally very proud to work for a company that set an ambitious climate goal for itself and achieved it! Can you already share a preview of your technology innovations in 2021? Michael Seiter: We see great market potential for our cameras that use artificial intelligence and can be updated flexibly throughout their lifecycles. I have already mentioned the deep learning-based vehicle detector in our cameras. More such solutions – also for other applications where object and person recognition are important – will follow in the course of the year. And the best part is: with AI, the more data we collect and the more intelligently we use it, the better the solutions become and the more added value they bring to the customer. This will revolutionise our industry! Another example is our cloud-based solutions, for example for alarm monitoring. Here, we can now also integrate third-party cameras and, building on this, offer and jointly develop our intelligent software-based solutions. This gives our customers more opportunities to take advantage of the opportunities created by AI. The trend towards integration of the various security technologies seems to be driven mostly by the rapid progress in software development. Does this affect full-range suppliers such as Bosch and what specific plans for fully integrated security solutions do you have for the future? Michael Seiter: Naturally, this suits us as a full-scope supplier. Bosch solutions are deployed in many cross-domain client projects. We have experts for the different domains under one roof and a strong brand with the same quality promise for all areas. Nevertheless, it is always also about specific domain excellence. Only when you master all different areas and have profound and proven expertise in each of them you can succeed in integrated cross-domain projects. The respective business units craft their future strategies and innovation roadmaps with this in mind – as we do in the field of Video Systems & Solutions. Our business unit offers fully integrated Bosch video solutions that can be extended and operated on open systems. This is why we drive open platforms such as Inteox, to offer customers from a wide range of industries the right solutions. Our Bosch Integration Partner Program that we launched in 2012 is also heading in this direction – every product can be integrated into multiple other systems and VMS solutions. In summary: At Bosch, we are both a one-stop-shop, but also an open-system, meaning we offer customers maximum flexibility in their choice of products and services.
Recently contacted by your credit card company because of a data breach or were you a victim of identity theft? Many of us have either been affected by identity theft or know someone who has been affected. Many consumers are seeking a secure environment that is also user-friendly. Businesses are seeking the same, with absolute certainty, that only valid users can access critical data. How can your company tackle these security and usability requirements while ensuring customer satisfaction? Today's three primary biometric modalities are fingerprint, facial and iris, and each has its own strengths and weaknesses but due to the global COVID-19 pandemic, touchless is highly preferred. Any company claiming their technology is best for all applications is likely being disingenuous. The key is to first prove a biometric is required, and once decided, the following five steps will help select the best biometric modality and supplier. Today's three primary biometric modalities are fingerprint, facial and iris, and each has its own strengths and weaknessesBiometrics can provide a mechanism to tackle these issues head-on by moving from what you know (password) and have (ID card) to who you are (your biometric), which dramatically increases the level of security while also being user-friendly. But how is the best biometric modality selected for an upcoming product? User interaction Start by defining the planned customer usage model, including the typical user, normal or desired interaction, and product in-field environment and placement, as well as any strategic plans. Think through the clothing the users will wear (e.g., face masks), the height of the users, hygiene requirements and opt-in requirements. Decide how quickly the biometric must respond and test this during the POC testing. The better the enrollment image (template), the better the matching performance and overall user experience. Biometric storage Start by defining the planned customer usage model, including the typical user, normal or desired interaction, and product in-field environment and placement, as Due to the global COVID-19 pandemic, touchless is highly preferredwell as any strategic plans. Think through the clothing the users will wear (e.g., face masks), the height of the users, hygiene requirements and opt-in requirements. Decide how quickly the biometric must respond and test this during the POC testing. The better the enrollment image (template), the better the matching performance and overall user experience. Cost and security Start by selecting which product lines will use the biometric and establishing the desired price point(s). Decide how the biometric will fit into the product and get bulk pricing to understand unit costs at volume. Software is typically handled as a license fee and often negotiable. The production cost per unit decreases as volumes increase. Choose the biometric modality that best meets functional and security requirements while hitting the targeted price. The biometric security level required depends on the assets being protected and the matching usage model. A 1:1 model, such as a cellphone, may be fine with a low-security biometric application. However, in a 1:N model, such as airport security, requires a more secure biometric such as iris. To select the best biometric for the product, compare each company's false acceptance rate (FAR) and false rejection rate (FRR). FAR indicates the biometrics ability to keep intruders out, while FRR indicates the biometrics ability to allow enrolled users in. Ensure that all biometric companies being considered can provide this information at a minimum. It is better to get each company's detection error trade-off (DET) curve, which shows how FAR and FRR vary relative to each other. Criminal activity Hackers and criminals are always trying to break technology, including biometrics. Be certain each technology has robust presentation attack detection (PAD), which ideally is third-party certified. Understand what if any personally identifiable information (PII) needs to be captured, and decide how the PII will be handled, including who will manage the data (i.e., your company, the biometric supplier or another third party). Be certain that whoever controls the PII uses the latest encryption standards and employs techniques to secure this data in memory, crossing the network and in the biometric database. Understanding the European GDPR Compliance standards if applicable will also be important. Supplier consideration Each supplier being considered should be evaluated throughout the POC testing process. Ensure the supplier is trustworthy, provides good customer support and meets its commitments. Evaluate the supplier's engineering capability and support model to ensure it can support any desired design changes and support your Be certain each technology has robust presentation attack detection (PAD)engineers to deliver the best functioning product. Selecting the best biometric for your exact use case will take some time and effort, but it has the potential to grow your business and delight your customers. Do not shortchange the process and go with the cheapest solution without doing some research. As the saying goes, you get what you pay for.
Many employers faced a need to ramp up hiring of drivers to meet a higher demand for product deliveries and transportation logistics during the COVID-19 pandemic. To meet the demand for drivers, employers had to make quick hiring decisions while also ensuring products were still being delivered in a timely fashion. Safe work environment Businesses have a duty of care to provide a safe working environment for their employees and contractors. It is therefore important to limit exposing drivers to risk, to put in place proper safety and security protocols, and to clearly outline them in company policies. Whether an employee or contractor, these drivers represent the brand they work for. If they do not adhere to company-mandated safety and security rules, because the business did not make them aware or they intentionally did not comply by acting with malice, this can put the drivers, other employees, customers and the company at risk financially, legally and with regard to their reputation. Adherence to safety protocols Operating in haste typically results in forced errors and mistakes within the business" “This need to hire drivers quickly resulted in many businesses lowering their standards and accepting certain risks to meet the increased demand. Operating in haste typically results in forced errors and mistakes within the business, potentially leading to harmful events and a damaged brand reputation,” stated Thomas Kopecky, Chief Strategy Officer and Co-Founder, Ontic Technologies (Ontic), a unified protective intelligence software platform. In the conversation presented below, Kopecky outlines the safety and compliance requirements needed to manage the risks while meeting the demand for drivers. Q: What risks do employers face as they ramp up hiring to meet higher demand for drivers? Thomas Kopecky: There have been instances in which a transportation contractor with multiple violations has simply established the business under a new name but continues to operate dangerously. Hastily hiring such a firm without proper enhanced vetting increases the risk from a safety, as well as a business continuity standpoint. Having to terminate a contract and replace a contractor midway can also have significant financial repercussions. In addition to problems created by executing too quickly, employers are now required both to mitigate their own general liability risks and to manage the perceived risk they may create due to the pandemic. For example, if a delivery driver tests positive for COVID-19, there is the potential they have also exposed customers. Employers must consider contactless delivery or other methods and protocols to mitigate this presumed risk of the pandemic. Q: What are the elements of safety and compliance involved in onboarding new drivers? Thomas Kopecky: When onboarding new drivers, corporations must think about more than clean background checks and adequate infrastructure. Whether employees or contractors, organisations must focus on what other risks the drivers bring with them. As part of this review, an open source scrub should be conducted at the outset to discover the driver’s online activity. Through this exercise, a whole host of questions can be addressed including, for example, whether their morals and values align with those of the company. Are they involved with fringe or radical interest groups? Do their actions conflict with the culture of the organisation, and could they have a negative impact? These are all questions that employers should be considering when hiring new drivers or contracting a new company. Q: What tools are available to help companies vet their driver fleets and how can these tools make a difference? Employers should also consider State Business Records for potential red flags Thomas Kopecky: To vet their driver fleets, corporations can use several tools and resources that will strengthen the organisation’s overall security. Ideally this is a software platform that brings all this information into one place so vetting, real-time data and concerning activities are not siloed but can be connected in order to assess potential risks and threats. Logically, businesses should consider reviewing Department of Transportation Records, which allow organisations to check whether drivers are licenced and appropriately insured. Employers should also consider State Business Records for potential red flags, such as whether an organisation is delinquent or no longer functioning in a given state. Finally, it’s beneficial to review civil records as these can highlight any active or past cases associated with an organisation. This includes fraud, bankruptcy, poor business practices, and more. Q: What should be the standard methodology to investigate and collect data on new driver programs? Thomas Kopecky: Corporate culture and company policies impact the level of vetting required (determined by company policy), which varies from business to business. Quite often, most valuable investigative content is associated with an actual fleet company owner and not a recently created business entity so it behooves corporations to research this information first. Then verify the information provided is correct, and whether any other conflicting information exists. As previously noted, employers should review civil and criminal records at the state level and cases at the federal level, as it is often the fleet company or owner involved in litigation that could reflect negatively on a brand. Media coverage and consumer complaints are another critical source for negative mentions that may not always appear in public records. You should also ask if the Department of Transportation (DOT) regulates this contract or driver; and if they were once a provider and are now re-applying, is it under a new name? If the answer is yes to either question, it will be necessary to check DOT records for adequate licencing or insurance coverage to ensure providers applying under a new name aren’t trying to circumvent the vetting process. Q: What are the privacy concerns, and how can potential employers ensure they do not violate issues of privacy as they vet drivers (and/or other employees)? Businesses must conduct their operations in a fair, lawful, and transparent manner Thomas Kopecky: Businesses must conduct their operations in a fair, lawful, and transparent manner. Employers often dictate their own guidelines and requirements from company to company. Companies must ensure they follow the law and handle data used for vetting driver fleets in a manner compliant with General Data Protection Regulation (GDPR), Health Information Portability and Accountability Act (HIPAA), and the Fair Credit Reporting Act (FCRA). When utilising software platforms, those that aggregate public record data in real-time and efficiently to provide actionable insights will be key for protecting corporate driver fleets and businesses overall. Q: How is addressing these issues different in the case of a contracted service versus a company employee? Thomas Kopecky: Addressing these issues will vary from company to company, but it will be important for clients' legal counsel to help interpret the law in the respective state they operate in and make this final determination. This will help shape policy and the employer’s compliance requirements in the area of operation. In some jurisdictions, contractors are vetted and treated like employees who are protected by FCRA. In contrast, there are more broad interpretations of what level of vetting and continuous monitoring can take place on contractors versus employees in other jurisdictions. Q: What is at risk if companies fail to address these issues? Thomas Kopecky: If companies fail to address security issues with managing their driver fleets, they risk major liability, business continuity and brand reputation. Every employee and contractor is in essence an ambassador of the brand, and in many instances, they are the only customer-facing representative for the enterprise. Imagine you are a contractor driving for a major delivery service. If you were to get into an accident and tragically kill someone driving their branded truck, the repercussions of that accident would harm the brand as opposed to the small contracting company by which you are employed. This can have a disastrous impact on the enterprise, both from a reputation and financial standpoint. When proactive steps are not taken to evaluate fleet companies or their owners, this can be viewed as negligence. Consider another example: A brand hires a driver company that has committed fraud while operating under another company’s name. What is the brand’s cost to conduct an initial onboarding assessment of this company versus the cost of investigating an issue, terminating the contract, and dealing with any potential litigation that might follow? The latter is clearly the financial burden. Corporations must proactively address risk associated with their driver fleets to mitigate risk before it occurs. Q: What is the biggest misconception (in the industry and/or the public at large) about employee vetting requirements? Enhanced vetting today often includes looking into a contractor’s background or its company Thomas Kopecky: We have passed the days where everything is all about criminal background checks and instant alerts when a driver receives a DUI. We are entering a world where business continuity and resiliency are necessary. Companies are so reliant on contracted services or seasonal employee pools that if that roster of operators were found to be unsuitable, the business itself would not meet the demands of its customers. Before the digital age, people only understood the driver vetting process to be based around a search of felony convictions. Enhanced vetting today often includes looking into a contractor’s background or its company from a different vantage point. Employers must begin to think about litigation history, negative media coverage and vocal social platforms, history of poor business practices or fraud, and more. These are factors that need to be considered for a business to mitigate risk and maintain continuity of service in an era where timeliness and instant gratification are highly valued.
Securing New Ground, the security industry’s annual executive conference this week in New York, offered food for thought about current and future trends in the security marketplace. Highlights from SNG 2019 included keynote remarks from security leaders at SAP, Johnson Controls and the Consumer Technology Association, discussions on how CSOs mitigate security risks, topic-focused thought leadership roundtables and a lively networking reception. Top trends observed at the event include cybersecurity, data privacy, facial recognition and artificial intelligence. A "View from the Top" session covered the need for companies to consider responsible use and ethics around technology; responsibility should extend throughout the organisation. A panel of security leaders emphasised the need to understand the diversity of risks that end users face. As the Internet of Things (IoT) expands connectivity, the inputs, outputs and "attack surface" also expand. It's critical to have security "baked" into products themselves, and also to undertand the mission of the organisation being protected, the context and correlation. Technologies transforming security market Keynote speaker Gary Shapiro, President and CEO of the Consumer Technology Association, listed the many technologies that will impact the consumer electronics market – and the security market – in the near future: artificial intelligence (AI), voice recognition, the transition to 5G and self-driving cars.As the Internet of Things expands connectivity, the inputs, outputs and "attack surface" also expand “What we're seeing today is a huge turning point in where the world is going,” said Shapiro, whose organisation presents the giant CES trade show each year in Las Vegas. “It’s not just about jobs and technology, but who we are and how we address fundamental human rights.” Privacy is a component of human rights, but “in the world of AI, there is a tradeoff between innovation and privacy”. Balance between security standards Shapiro sees Europe as representing one extreme of privacy, epitomised by General Data Protection Regulation (GDPR), which he sees as stifling innovation. Meanwhile, China is pushing innovation using massive amounts of data with no regard to privacy. The United States, therefore, should look for a balance that acknowledges the inevitability of innovation while respecting privacy and realising it is “always situational.”With new technologies, biometric ID and cybersecurity issues, your business is in a strong and growing place" Too much concern for privacy comes at a cost, Shapiro said. “Privacy zealots are killing facial recognition, step by step by step,” he said. “Regulators should not throw away the baby with the bathwater. Every technology in history has been used to cause evil and to do good. Throughout history any new technology could have been banned and made illegal.” Shapiro offered encouraging words to the security marketplace, even in the wake of large tech firms such as Amazon entering the market. “With new technologies, biometric ID and cybersecurity issues, your business is in a strong and growing place,” he said. “There is opportunity. There will be increasing new things people want, and always new threats. People will want what you're providing, which is physical and technology security in their facility.” Scott Schafer, Chairman of the Board of the Security Industry Association (R), interviewed Steve Jones, CEO, Allied Universal, on stage about the importance of merging technology with security officers Allied Universal CEO Steve Jones discussed holistic approach Steve Jones, CEO, Allied Universal, was interviewed on stage about the importance of merging technology with security officers for a holistic approach to securing a facility. “Today, customers are asking us to look at their facility holistically and asking: What is my best approach?” said Jones. A holistic approach includes protecting people, the facility, intellectual property (IP), and how to handle visitors. Manguarding perspective on security Allied Universal looks at security from a manguarding perspective and also from a technology perspective, based on their daily experience managing security for 40,000 customer sites across the United States and Canada.Allied Universal has a new handheld technology platform that uses AI “We are in a unique position in the channel,” said Jones. “We know the stats at any customer site. We know the last time there were repairs on cameras, which card reader is malfunctioning, how long the systems company takes to respond to a call. We are at these locations 24/7 and have an intimate relationship with customer. We are a significant influencer in the decision-making process. We have an opportunity to have a voice, and to build a business around it.” Predictive security “We are looking for technology that will enhance the security of the customer,” said Jones, including situational awareness and analysis of data to predict patterns. Allied Universal has a new handheld technology platform that uses artificial intelligence (AI) to analyse data, predict outcomes, and prescribe optimum responses. Workforce development – hiring and training new employees – is a big issue for Allied Universal, which last year interviewed more than a million applicants to find around 100,000 employees. They are targeting every demographic, and last year hired 33,000 veterans. The company is using technology to help with the massive recruiting effort, including AI to analyse applicant qualifications and a computer-generated avatar to conduct the first online interview. Future security challenges Jones sees the rapid increase in the homeless population in the United States as one of the biggest security challenges of coming years. The rapid increase in the US homeless population is one of the biggest security challengesMany businesses face the prospect of homeless individuals living in front of their buildings, possibly using drugs or approaching customers. “It has become a real threat,” he said. “When they are living in front of your buildings, in many cases, there are ordinances that allow them to be there so the police will not get involved. It falls on the facility owner and private security to address the problem. Given the large homeless population we have now during good economic times, I don’t know what it will look like in an economic downturn.” Human side of security An SNG session on the human side of security observed that people are the biggest source of vulnerability. Companies should foster a "safety climate" in which security is integral to operations and viewed as something that helps employees rather than create hassles. Human resources is now a technology field and should work together with security to achieve shared goals. At the consumer and small business level, cybersecurity must also be top-of-mind and built into a security companies' DNA. SNG attendees heard about opportunities to move beyond providing products and devices to providing experiences, by partnering with customers to protect what matters most to them. While a bit of inconvenience comes along with security, products should be built in a way that is easy to use, with security baked in. The results are systems people are comfortable engaging with every day. Securing New Ground is presented by the Security Industry Association (SIA).
Ethics is a particularly important subject in an industry such as fire and security because the result of unethical actions might make the difference in life and death. For example, if an employee acts unethically when servicing a fire extinguisher, the result could be to burn down the building. Although ethics is not a common topic of discussion in the fire and security industry, perhaps it should be. Chubb Fire and Security is a company that provides an example of how an emphasis on ethics can benefit a company, their employees, their customers and the whole world. Fire safety and security risks “The fire and security industry is different than others because lives and people’s safety are on the line,” says Harv Dulay, Director of Ethics and Compliance at Chubb Fire and Security. “Our purpose is to protect clients from fire safety and security risks. This is a business where no one should take short cuts. It is important to do the right thing all the time, every time, and it’s about protecting lives and property.” At Chubb, we have a code of ethics, our ‘bible,’ that is issued to employees when they start" “At Chubb, we have a code of ethics, our ‘bible,’ that is issued to employees when they start,” says Dulay. “Within the bible are core fundamental rules about what’s acceptable and not acceptable. We lay it out for employees very specifically. They understand and embrace the code of ethics, which is based on trust, integrity, respect, innovation and excellence.” “If you get those right, the business moves in the right direction. A key piece of our ethics policy is based on trust. We relate to others with openness, transparency, and empathy. It makes Chubb a better place to work and enables us to provide better service to customers.” Fire audit For Chubb, ethics is not just theoretical, but ethical concepts play out every day in practical ways. An example might be an engineer who goes to a customer’s site and is asked to do a task that is outside his or her duties and/or not allowed under the ethics policy. The pressure might be even greater if the employee is struggling to meet a sales figure. The code of ethics addresses specific situations and outlines the behaviour that is expected. In another example, a customer asked a Chubb technician to forge a certificate saying the customer had previously passed a fire audit in order to validate his previous year’s insurance. Showing ethical integrity, the technician was able to cite the company’s Code of Ethics and refuse to do it. The technician also reported the situation to his Ethics and Compliance Officer. Customers benefit, too. Delivering ethics excellence It’s a message heard from the top down, from everyone in the company" One of Chubb’s sales associates immediately reporting a situation in which all the tenders and competitors’ prices were visible as they prepared a tender for upload to a customer portal. Not only did the sales associate deliver ethics excellence by reporting the issue, he also helped a grateful customer who thereby avoided anti-trust issues, says Dulay. “Ethics is not just a current issue,” says Dulay. “It’s embedded in our values and has been since the beginning. Ethics is making sure people do the right things.” Ethics is integrated into the Chubb business model, and everyone knows what is expected of them. “It’s a message heard from the top down, from everyone in the company.” On-line training modules Ethics discussions begin for employees at Chubb when they join the company; clear instructions about ethics are included as part of employee induction. There are nine modules of ethics training during employee orientation, and a discussion with an Ethics and Compliance Officer is part of the onboarding process. The training program includes information about ethics, company expectations around ethics, where to go for questions about ethical issues, and details of the anonymous ombudsman program. Additionally, field staff are trained by their supervisors via regular face-to-face ethics toolbox talks. Office staff complete a series of on-line ethics training modules regularly. A series of supervisor-led trainings encourage managers to deliver face-to-face ethics training to their team, citing real-life examples. Healthy discussions are encouraged to deal with any ‘gray areas.’ Worldwide implementation of data security Some 14,000 employees globally have multiple options when it comes to reporting an issue Dulay estimates that ethics and compliance officers spend about half their time answering questions and clarifying for employees what’s expected in the code of ethics. Some 14,000 employees globally have multiple options when it comes to reporting an issue, and there are full-time Ethics and Compliances Officers in every country where Chubb does business. A reflection of Chubb’s global approach to compliance is their worldwide implementation of data security requirements of Europe’s General Data Protection Regulation (GDPR); the company saw the benefits of the program for any jurisdiction. Training and education are part of Chubb’s investment in ethics. For example, a recent module on ‘respect in the workplace’ covered the need to create a company culture in which everyone feels respected. “Training and continuous communication are embedded in the organisation,” says Dulay. Managing potential conflicts proactively “We invest in the process,” says Dulay. “We have had employees who left the company and then come back. They realised the importance of ethics and rejoined us. We start with the foundation that we would rather lose business than give up our ethical standards,” says Dulay. Some business is not worth getting if you don’t adhere to your values" “We won’t abandon our policies even if there is money at stake. Some business is not worth getting if you don’t adhere to your values. We manage potential conflicts proactively by creating and instituting methods in which employees have access to tools they can use to be successful and adaptable in times of change,” says Dulay. “Also, we will not tolerate retaliation against any employee who reports wrongdoing – regardless of the outcome of the investigation.” Forming good ethics behaviour And while there is no specific monetary value assigned to good ethical practices, success can be measured. “We measure it by people’s conduct, the number of cases we have, and awareness,” says Dulay. “It’s good for employee morale, and it’s good for customers and our business. It’s not measurable, but it is fundamental for business and customers.” “The work we do as a company can impact people’s lives so it is important that everyone has an understanding of the importance of their role,” says Dulay. A common misconception about ethics is: “If no one is watching, it must be ok.” However, Dulay says it is the things employees do when no one is watching or checking in on them that form good ethics behaviour. During training, Chubb emphasises that ethics is about doing the right thing, all the time even if no one is watching.
Vision-Box, a world pioneer in biometrics seamless travel, automated border control, and digital identity solutions has announced the launch of a Frontex awarded trial to implement an innovative pilot project at two land borders in Bulgaria, in the context of the EU Entry/Exit System (EES). The EES is a landmark framework set to replace traditional border controls of Third-Country Nationals with interoperable digital data processing and automated biometric data collection in 2022. The Frontex pilot, which went live in June 2021 in Bulgaria in collaboration with the Ministry of Interior and the Border Police will be for coaches, cars, and pedestrians at the entry of Kapitan Andreevo BCP from Turkey for phase 1, and exit at Kalotina BCP to Serbia for phase 2. Impact on border crossing points The implementation of the EES will influence the flow of travellers and the technology deployed at the border to collect the required data, to cope with the variety of sites and related complexities. This effect will possibly be more important at the EU land border crossings, which are more constrained environments as compared with airports and ports, as many travellers arrive in their vehicles. Therefore, the introduction of EES will have a significant impact on travellers’ flow at those border crossing points (BCP). Self-Service Enrolment System Self-Service Enrolment System executes real-time intensive queries into the Bulgarian national border control systems The purpose of the pilot project is to deliver a Self-Service Enrolment System to enable travellers to perform a self-service collection of travel document data, biometric data, and other information (e.g., questionnaire on entry conditions). It also executes real-time intensive queries into the Bulgarian national border control systems, in combination with an EU EES backend simulator. After the enrollment, travellers are invited to go to an open corridor and be identified on the move to directly cross the border, or to be redirected to the manual control booth to be verified by a border guard with last generation Coppernic handheld technology. EES Frontex pilot The secured linkage and encrypted communications with the national and EU border control systems, performing border checks on all travellers and EES registration/verification on third-country nationals, are jointly performed by Vision-Box and the respective border agencies. The EES Frontex pilot applies to short-stay visa and visa-exempt third-country nationals as well as EU citizens entering or leaving the European Union. Eliminates manual data collection and verification The pilot ecosystem (enrolment kiosks, biometric corridor, handheld tablets) is powered by Vision-Box’s award-winning Orchestra™ Identity & Border Management Platform. Orchestra™ removes the time-consuming task of manual data collection and verification, meaning that travellers do not need to physically interact with touchpoints or manually exchange travel documents and biometrics at counters. Touchless process The whole process leverages identity and biometrics tokenisation to digitise the operation in a touchless manner. This also reduces long queuing at checkpoints and curtails crowding at clearance hotspots, allowing travellers to navigate the border a lot quicker and safely with biometric recognition technology. Facial recognition & fingerprint sensors Facial recognition biometrics offers the highest level of convenience for traveller identity proofing Facial recognition biometrics offers the highest level of convenience for traveller identity proofing, in compliance with the EU regulations, combined with touchless fingerprint sensors for combined verification against the EU EES biometric backend systems. The solution drives significant improvements over the traditional manual and touch-based identification procedures in terms of hygiene, accuracy, and privacy protections. EU GDPR compliant The powerful Orchestra™ Service Platform is compliant with EU GDPR through its unique Privacy-by-Design certification. It operates under user-centric business rules and is the kernel of the advanced management of Identity proofing and flow monitoring of traveller processes at the border. The platform’s powerful capability allows it to process the full extent of national border passenger volume, thanks to its future-proof scalable design and resilient architecture. Maintaining the pilot For this pilot delivery, Vision-Box has hired the services of PwC Luxembourg, to help sustain the definition of the use cases, their testing, and overall pilot reporting. In addition, Bulgarian system integrator - Global Sat, is supporting Vision-Box in the deployment of the solution on the ground and its maintenance during the overall 6 months’ operation of the two pilot phases at the two different land borders. Exploring Frontex pilot Speaking about the pilot project, Jeff Lennon, Vice President Strategic Sales & Global Partnerships at Vision-Box, said: “We are thrilled to run this Frontex pilot for exploring the future of EES in Bulgaria and Europe, in partnership with the Ministry of Interior and the Border Police as long-time customers, PwC and Global Sat.” Maximises process efficiency “This innovative undertaking will allow all of us to stress-test ground-breaking technology in a very challenging environment, yet at a small scale. It will also help us establish the foundations for expanding the technology at the national level for any type of land border environment, minimising the footprint of the solution at stake while maximising the process efficiency for the border guards and the travellers.” “This is also a great opportunity for understanding the flow of border-crossings at two of the largest EU land border sites, to effectively expand our solutions in the EU context for Smart Borders as we are already doing in Finland since 2019 among other EES projects with additional member states.” Collaborative testing with EES Frontex and Bulgarian's authorities collaborate in testing the European EES at two critical land border control points" Serge Hanssens, Partner at PwC for Smart Borders said: “Frontex and Bulgarian's authorities collaborate in testing the European Entry-Exit System (EES) at two critical land border control points in Europe.” “This is a unique opportunity and milestone to try out these new processes in real conditions. PwC Luxembourg is so pleased to be part of the adventure supporting Frontex and Bulgarian's authorities to make the EES deployment a success; securing the entry and exit to the European Schengen Area of all third-country nationals." Automated border control Tsvetan Mutafchiev, Executive Director at Global Sat said: “We at Global Sat are excited to be part of this very innovative PoC project. EU land border crossings create several new challenges for automated border control due to the specifics introduced by different types of vehicles used by passengers.” System integration “We do believe that the pilot project will successfully prove the concept of the Vision Box‘s platform and will also provide valuable feedback from Bulgarian border police officers. The implementation of self-service enrolment systems, when applied in full scale at the EU's external borders, will facilitate efforts against illegal migration and will contribute to the security of European countries with a full commitment to personal data protection.” “The Global Sat team is proud to be at the forefront of this endeavour. With our experience as a system integrator, we will continue to contribute to its success.” Safe and efficient travel Vision-Box’s technology is proving crucial in guaranteeing safe and efficient travel processes With the industry expected to resume travel as restrictions begin to ease, Vision-Box’s technology is proving crucial in guaranteeing safe and efficient travel processes. Over the past months, Vision-Box has also inaugurated Automated Border Control eGates at Malta International Airport in collaboration with the Malta Police Force, implemented an integrated Biometric experience for Emirates Airline at Terminal 3 of Dubai International Airport, and secured a regional strategic partnership with AirAsia Group, to implement industry-leading, identity management technology across its network of 152 airports.
Gujarat Medical and Education Research Society is an initiative taken up by the State Government of Gujarat to improve the Human Development Index in the state by establishing new medical colleges. This, in turn, will increase the availability of qualified doctors and ensure the spread of health care services and medical knowledge. GMERS Ahmedabad is also one such initiative. Spread across five buildings, the campus has a hospital setup with a capacity of 720 beds. Challenge faced Centralised monitoring and management - Being aware of the various security challenges that an education hub faces, GMERS Ahmedabad had already installed 400+ cameras to secure the campus. However, they faced difficulty while centrally monitoring the entire system. Also, since the campus is divided into five buildings, it was challenging to manage all at once. Real-time security - Due to the large area, it was difficult to extend quick and real-time security to various parts of the campus. Being a medical college, they needed a technically sound system that could provide notifications in real-time during critical situations. Matrix VMS VMS allowed the flexibility of incorporating other brand’s cameras and integration with other security systems Matrix offered SATATYA SAMAS as the solution. It is a video management software that provides a common platform for all the existing security systems. Existing 400+ cameras were configured in the software and thus, could be centrally monitored from a dedicated room. Apart from this, VMS allowed the flexibility of incorporating other brand’s cameras and integration with other security systems as well, like Fire Alarms. User-control Moreover, with the availability of user-based control, it was ensured that the surveillance system is being managed by the right security personnel. For example, the security guard was restricted to viewing rights, and only the IT personnel was given administrator rights. This assures data security. SMS and Email alerts for notification were also configured to provide prompt support in case of urgency. Furthermore, features like E-Map enabled swift notifications about the health status of cameras and devices. Results Unified platform for centralised control Instant aid during urgency The flexibility of future expansion
SATO, a global company in the development of auto-ID and labelling solutions, has announced the launch of its innovative TEMPCHECK TouchFree solution to enable a 100% contactless approach to verify the identity, health, and safety of all on-site employees and visitors. The fully automated solution combines a tablet device, which has facial recognition and temperature scanning capabilities, with the SATO CT4-LX intelligent label printer to facilitate triple confirmation at the point of entry. With full track and trace capabilities, the TEMPCHECK TouchFree solution records and stores data electronically, deleting it after a set period of time to comply with HIPPA and GDPR policies. Rapid and accurate solution The TEMPCHECK TouchFree solution from SATO is designed to protect, prevent and limit the spread of infection Paul McIntyre, Industrial & Retail Sales Executive at SATO, said, “The health and safety of employees and visitors at any workplace or venue should always be a top priority. Now, with the COVID-19 pandemic, it has become vital that entrance points should become the focal point of information gathering to ensure the safety and security of all those in the building.” “The TEMPCHECK TouchFree solution from SATO is designed to protect, prevent and limit the spread of infection, should an outbreak occur. Not only can our technology help to identify which entrance the individual arrived from, but it can also pinpoint who was in front and behind the person in a queue, alongside where they are seated in a stadium environment. This means it can rapidly and accurately identify any potential infection cluster, with all data firmly secured in a local network requiring zero cloud access.” Contactless solution To use the TEMPCHECK TouchFree solution, individuals simply scan a QR, NFC, RFID, or barcode and allow the device to scan their face – with or without a mask – to verify their identity. Their temperature is then recorded and sent via Bluetooth to the label printer, which displays their name, date, time entered, and their assigned location in the building on the printed label. The label also features a QR code that can be scanned by any peripheral device for ID checking and access rights. “At SATO, we continuously strive to innovate with ceaseless creativity,” added McIntyre. “Our contactless auto-identification and temperature checking solution is a superb replacement for the thumbprint, palm print, or keypad entry systems that are required as part of overall security protocols, as well as health and safety regulations. Its end-to-end touch-free access, combined with data gathering and secure retrieval, makes for a value-added solution that is ideal for large corporate, sporting events and more when physical social restrictions lift.”
Enjoy a bird's eye view of Cologne! Every year, over half a million passengers soar over the Rhine at a height of 30 metres with the Cologne Cable Car – and are rewarded with an unparalleled view of the city and cathedral. For ensuring the safety of the carrying rope construction, Kölner Seilbahn relies on the Panomera® camera technology of Regensburg-based manufacturer Dallmeier. The Cologne Cable Car offers an unrivalled view of the Cologne Old Town and its cathedral. Riding in gondolas at a height of 30 metres above the ground, visitors enjoy a bird's eye view of Cologne, the Old Town, the River Rhine, and the beautiful city environs. Video security technology The Cologne Cable Car has been featured as an established attraction of the city for over 60 years, and every year more than half a million passengers enjoy the 930-metre-long aerial trip over the Rhine. In order to ensure that the 44 cars reach the end stations in Riehl and Deutz safely from spring to autumn, the operators have decided to install video security technology from Dallmeier. The Cologne Cable Car has featured as an established attraction of the city for over 60 years The Cologne Cable Car project is the first undertaking anywhere in the world in which the patented Panomera® camera technology is used to monitor a cable car carrying rope. In order to guarantee the passengers' safety at all times, the operators require rapid visual detection of possible technical problems, particularly in the structure of the carrying cable. Preventing technical problems Carlos Castro, Operations Manager of Kölner Seilbahn, explains: "Besides the approach of the gondolas to the stations, we observe the way they run onto the pylons. 30 metres up in the air, it is quite possible that a good gust of wind can set the cable and the pylons swinging. To enable early detection of incidents that cause the gondolas to approach the sensitive points out of alignment and to prevent technical problems, we decided to introduce video surveillance using the proven, patented Panomera® camera technology." The carrying rope is supported on a total of three pylons over the entire distance of just under one kilometre. The resulting distances between the stations and the pylons range in length from 100 metres up to a considerable span of 480 metres over the Rhine itself. Extremely high quality The operators of the Cologne Cable Car found exactly the right solution in Panomera® technology Consequently, their project partner VTS Video Technik Systeme GmbH, which was responsible for erection operations, only had access to a few installation points, but at the same time, the specification in respect of imaging and resolution quality was extremely high. Simply put, this meant that images must be recorded over very long distances, but at the same time, the image material must still be of extremely high quality. Together with the VTS, the operators of the Cologne Cable Car found exactly the right solution in Panomera® technology. VTS GmbH has been a reliable, capable business partner to Dallmeier for many years, and brings the necessary expertise to the project based on long experience. Multifocal sensor system The Panomera® multifocal sensor system is considered to have revolutionised video surveillance. It was developed specifically to provide full area coverage with video protection for large spaces and long distances. The particular feature of the technology is that multiple sensors having different focal lengths are installed in a single housing and a special software program compiles a total image in high resolution. This technical advantage gave us the decisive edge in view of the specified infrastructure" In this way, huge distances and expanses can be captured with a uniform resolution raster over the entire area of interest in real-time. Jürgen Vahlenkamp, managing director of VTS GmbH explains in more detail: "This technical advantage gave us the decisive edge in view of the specified infrastructure. For video observation with the Panomera®, we managed extremely well with the small number of installation points available.” Potential hazard situations “Thanks to the special lens and sensor concept we do not fall below the specified resolution value even in the more distant image areas. The ideal prerequisite for surveillance over very long distances!” The rollers themselves are also monitored using Dallmeier IR box cameras. The operator has full control over the entire situation over the entire length of the cables between the pylons, live and in high-resolution video images. In potential hazard situations, he can view details in a separate zoom image without losing sight of the overall action. In theory, any number of operators would be able to ‘take a close look’ at a wide range of image areas at the same time. Analysing detailed picture We have succeeded in ensuring that the process of cable car operation is as safe as possible" "The operator has the situation under control at all times! He has access to an uninterrupted total view of the cables and the pylons while analysing a detailed picture of a certain area, at the same time if necessary,” continues Vahlenkamp, "We have succeeded in ensuring that the process of cable car operation is as safe as possible, to the complete satisfaction of our customer." The wind that blows against the masts and cables 30 metres above the ground can cause them to start rocking and poses certain challenges not only for the operation of the gondolas but also for the installation of the cameras. To ensure that the camera systems – each weighing more than ten kilos – are not damaged or themselves become a hazard, the cameras were secured to the pylons using special plates. Real-life implementation The lenses themselves are installed immovably inside the camera housing and are unaffected by any swinging motion. In view of the special requirement of this project, the Dallmeier 3D planning team first simulated a digital twin of the entire surrounding area. With this approach, the manufacturer Dallmeier ensures that planning and real-life implementation match each other as closely as possible, and the customer benefits from the highest certainty regarding both the plan and their investment. The next step in the project execution was to construct and test the finished system The next step in the project execution was to construct and test the finished system, consisting of cameras and a high-performance recording appliance. In Dallmeier's own Factory Acceptance Test (FAT) Centre in Regensburg, the systems were pre-set according to the customer's specification. The ‘FAT test run’ which follows ensures that project partner VTS will be able to install and commission the preconfigured system quickly and without difficulties. Reliable technical monitoring Carlos Castro sums up: "We're delighted. At last, we are in a position to monitor the entire span of 930 metres during operation. The images delivered are of outstanding quality. With this system we now have a good, additional tool which enables the system to be displayed visually, complementing the existing, reliable technical monitoring and control systems." In public areas, data protection and EU GDPR are important topics. Dallmeier's technology is compliant with all required criteria for data protection and data security, including during application in public areas. Roland Deja, Operations Manager Sales Backoffice at Dallmeier: "With the Dallmeier solution, we have given the go-ahead for cable car monitoring projects. The integrated approach adopted in Dallmeier solutions means that both the cameras and software can be upgraded, e.g., with AI-based assistance systems, at a later time as well. Thus, systems will remain viable for many years into the future and guarantee investment security for the Kölner Seilbahn."
Located in the heart of west London, Ealing Council serves the residents and businesses of the UK capital's fourth largest borough. With a vast housing portfolio and a commitment to keeping residents as safe and secure as possible, Ealing Council benefits from the use of PAC’s innovative cloud-based access control solution, PAC Residential Cloud. The London Borough of Ealing comprises seven major towns, Ealing, Acton, Greenford, Hanwell, Northolt, Perivale and Southall. Ealing Council’s task is to provide a diverse range of services to the 350,000 residents residing across the area. It is committed to improving its performance, while ensuring value for money and serving a key part of this is the provision of good quality housing that meets the highest possible standards. Ensuring safety and security of residents In addition to carrying out property allocation, repairs, rent collection, homelessness services and estate management, Ealing Council is responsible for ensuring the security and safety of the tenants living in its 300+ housing blocks. As a longstanding PAC customer, we chose the PAC Residential Cloud as the central hub of our access control system" Daljit Gill, an Electrical Services Manager at Ealing Council commented, “When it comes to administering our multi-site housing portfolio, Ealing Council recognises the advantages that access control technology brings in terms of our ability to effectively access information, issue and configure key fobs and check occupancy status.” He adds, “As a longstanding PAC customer, we chose the PAC Residential Cloud as the central hub of our access control system, which currently comprises around 1,100 doors and 500 controllers.” PAC Residential Cloud Over the last few years the cloud has proven to be a game changer in the way access control technology is designed, configured and used. The PAC Residential Cloud leads the way in allowing organisations to remotely manage and monitor their access control systems. Meanwhile, the PAC controllers, which are being used as part of the Ealing Council’s access control system, utilise the general packet radio service (GPRS) platform, which is a faster and cost-effective means of connecting remote sites via a mobile network. Key fob management and remote diagnostics Sam Flowers, Regional Sales Manager at PAC GDX, explains “Daljit and his team can address technical issues, deal with key fob management, examine diagnostics, view system status, set and unset a system, and gain access to event logs and reports, all from a remote location.” Without the cloud, any problems and issues would need to be dealt with by office-based individuals" Sam adds, “Without the cloud, any problems and issues would need to be dealt with by office-based individuals, which is obviously restrictive and can lead to a delayed response. We provide a full online training programme to help customers get the best out of their systems and also offer full technical support.” Asked on how the PAC Residential Cloud makes his day to day working life easier, Ealing Council’s Daljit Gill responded by stating, “I can address connection issues, manage the system and troubleshoot from wherever I happen to be, using my PC, tablet or smartphone. Not only is this convenient, it also saves me a huge amount of time, as I don’t have to go into the office to log-in.” Fully auditable system He adds, “Two of my colleagues also have permission to use the system remotely, although we could share access with up to 15 administrators if required, with each person only given access to information that relates directly to their role.” Daljit further said, “One of the main features of the system is that it is fully auditable, meaning that any activity can be monitored in real time and traced directly back to a specific user via their unique password.” Adherence to GDPR and strong data protection policy Ealing Council strictly adheres to the General Data Protection Regulation (GDPR) and has implemented a strong data protection policy. PAC Residential Cloud is hosted with The Bunker, a trusted PAC partner, whose UK data centres are located in former nuclear bunkers and certified to the ISO 27001 standard for information security management. If an alert is activated, measures can then be taken to deactivate a specific key fob" PAC Residential Cloud also offers Ealing Council some less obvious benefits. Sam Flowers comments, “The data collected by the access control system can be used to issue an alert if a resident’s key fob hasn't been used during a specific period, identify patterns of behaviour that could suggest illegal activity, flag-up if someone is subletting a property or even detect if a tenant is using a cloned key fob.” Sam adds, “If an alert is activated, measures can then be taken to deactivate a specific key fob. Furthermore, the PAC Residential Cloud has also helped Ealing Council adopt a business as usual approach during the coronavirus pandemic by limiting physical interaction, while still enabling a prompt and effective response.” Fully IP-based access control system As well as enjoying the operational advantages of the PAC Residential Cloud, Ealing Council is also planning to advance its transition to a fully internet protocol (IP) based access control system by upgrading to PAC’s 512DCi digital networkable access controllers. Daljit Gill concludes by stating, “Installing the PAC 512DCi’s will allow us to maximise operational effectiveness through our investment in the PAC Residential Cloud. We will also be able to utilise PAC’s high frequency OPS MIFARE DESFire EV1 readers, which have been tested to meet Advanced Encryption Standard (AES) 128 bit compliance. This will further reduce the risk of key fob cloning and ensure that our tenants benefit from improved levels of security.”
Václav Havel Airport Prague (PRG), with its prime location in the Centre of Europe, is the largest and most important international airport in the Czech Republic. Prague Airport handled 17.8 million passengers in 2019 and received the Airport Service Quality Award 2019 awarded by ACI1 for the second time in a row. At Prague Airport, there are different types of areas restricted to authorised personnel. These are governed by an access control system fitted with approximately 1,000 readers and over 1,500 secured points (doors, locks, etc.). Mifare Desfire cards are predominantly in use for the time being. Among these, Security Restricted Areas (SRAs) are the highest security areas, with 60 access points of high importance. Contactless biometric technology Due to the critical nature of those areas, Prague Airport needed a very high level of security, and decided to implement a biometric solution, as the card itself (including with the use of a PIN code), would not be deemed as secure enough. The biometric system had to be able to cope with over 20,000 individuals, with the capability to increase to up to 30,000 users in the future. Prague Airport decided to keep the existing access cards but to add a biometric verification level for the SRAs. This means that the biometric solution would have to be used in combination with the existing cards through a two-step process. In order to avoid any physical contact with the devices, for user convenience as well as for hygienic considerations, it was decided to deploy a contactless biometric technology. Access control system The readers were installed at existing control points and are fully integrated into the airport access control system Prague Airport tested two technologies capable of connecting to its access control system, among which IDEMIA’s MorphoWave Compact contactless fingerprint terminal. After a thorough testing period, the choice was to go for IDEMIA’s technology for a number of reasons including: great user experience with an easy and quick hand gesture, as well as a strict GDPR compliance with users’ biometric information stored only in their cards. Prague Airport deployed more than 60 MorphoWave Compact in its SRAs. The readers were installed at existing control points and are fully integrated into the airport access control system. More than 20,000 users now have their biometric data in their access cards and the system is fully operational. Embedded card reader IDEMIA’s seamless biometric technology helps address health and safety issues. Employees appreciate the user experience provided by the solution deployed: it is easy to tap the access card onto the embedded card reader situated at the top of the reader and then to just wave the hand in a quick simple movement to get 4 fingerprint verified in less than 1 second, without the need to touch any part of the device. Airports is a key vertical among the many different ones served by IDEMIA. The biometric devices are used by 35+ of them throughout the world for staff access control, as here in Prague. The company’s biometric solutions are also used for border control and passenger flow facilitation, in more than 30 different airports.
Round table discussion
During the coronavirus lockdown, employees worked from home in record numbers. But the growing trend came with a new set of security challenges. We asked this week’s Expert Panel Roundtable: What is the impact of the transition to remote working/home offices on the security market?
In the digital age, software is a component of almost all systems, including those that drive the physical security market. A trend toward hardware commoditisation is making the role of software even more central to providing value to security solutions. Software developments make more things possible and drive innovation in the market. We asked this week's Expert Panel Roundtable: How do software improvements drive physical security?
The definition of a standard is “an authoritative principle or rule that usually implies a model or pattern for guidance, by comparison with which the quantity, excellence, correctness, etc., of other things may be determined.” In technology markets, such as physical security, standards are agreed-upon language, specifications or processes that are used across the board by multiple stakeholders to enable easier interconnectivity and smoother operation of systems. We asked this week’s Expert Panel Roundtable: How are standards shaping change in the physical security market?