A free cyber audit tool has been released to its customers by a global technology leader in integrated access control, intruder alarms management and perimeter protection, in what it believes is an industry first. Gallagher Security has unveiled its Security Health Check (SHC) tool to help its customers identify and understand potential vulnerabilities within their security system. Security risks and system vulnerabilities SHC identifies system vulnerabilities, assesses the severity of the th...
The statistics are staggering. The death tolls are rising. And those who now fear environments that were once thought to be safe zones like school campuses, factories, commercial businesses and government facilities, find themselves having to add the routine of active-shooter drills into their traditional fire drill protocols. The latest active shooter statistics released by the FBI earlier this year in their annual active-shooter report designated 27 events as active shooter incidents in 2018...
The healthcare market is rife with opportunity for security systems integrators. Hospitals have a continuous need for security, to update their systems, to make repairs, says David Alessandrini, Vice President, Pasek Corp., a systems integrator. “It’s cyclical. Funding for large projects might span one to two years, and then they go into a maintenance mode. Departments are changing constantly, and they need us to maintain the equipment to make sure it’s operating to its full po...
Traka, the provider of intelligent management solutions for keys and equipment, is at the International Corrections & Prisons Association (ICPA)’s annual conference, presenting a new solution for distributing medications safely, securely and accurately within prison environments. Exhibiting in partnership with the pioneer in prison and community corrections software applications provider Unilink, Traka will be demonstrating its specialist medication distribution lockers, designed to m...
When violence or a life-threatening incident occurs, hospitals and other healthcare institutions are often in the crosshairs. Hospitals increasingly face a reality of workplace violence, attacks on patients, and threats to doctors and other support staff. And even if violence happens outside a hospital – such as an active shooter at a public place – the local hospital must be prepared to respond to an influx of injured victims. When conflicts arise inside a hospital, there is an urg...
Sisense, the analytics platform for builders, achieves a series of new security compliance standards that will provide its customers with the highest levels of protection for their data. Sisense and Periscope Data, who merged with Sisense this spring, both achieved ISO 27001 compliance, the internationally recognised standard for information security programs. ISO 27001 is a systematic approach to managing sensitive information and assets so they remain secure. Continual improvement of securit...
Everbridge, Inc., a pioneer in critical event management and enterprise safety software applications to help keep people safe and businesses running, announced a partnership with RiskBand, a provider of wearable, live-monitored safety devices for organisations and their workers. The alliance is part of Everbridge’s strategy to reach the broadest set of workers, including those that may not always have ready access to a mobile phone, such as a hospitality employee, in-home healthcare provider, or lone worker in the field. With the additional modality and simple access of the RiskBand wearable device, Everbridge is expanding its addressable market for protecting employees regardless of their physical location, whether inside the office, working remotely, or travelling the globe. Critical events such as assaults and active shooter incidents are threatening lives and causing major business disruptions. Fatal work injuries have increased over the last decade, with 5,147 occupational fatalities recorded in the U.S. in 2017. Emergency response strategy The rise in smart technology is drastically improving operations for businesses across the globe" This challenge is only magnified by an increasingly mobile workforce, as well as the prevalence of lone worker scenarios across multiple industries served by both Everbridge and RiskBand, including healthcare, banking, retail, energy and utilities, hospitality, and higher education. Designed for enterprise-level personal safety and security, RiskBand’s wearable devices bolster an organisation’s emergency communication and response strategy. A single push of a button provides two-way voice, user profile data, images, and geolocation, in near real-time to your organisation’s security operations centre. As part of the partnership, Everbridge will integrate its award-winning Safety Connection™ platform with RiskBand’s wearables, allowing both Everbridge and RiskBand customers to receive emergency messaging and provide detailed reporting of their location. The data from an employee’s RiskBand device is shared back to the Everbridge platform, allowing an organisation to deploy the appropriate emergency response. The rise in smart technology and connected devices is drastically improving operations for businesses across the globe, and bringing about new opportunities to keep people safe,” said David Meredith, CEO of Everbridge. Immediate access to phones The collaborative partnership will enable us to enhance employee safety through state-of-the-art wearable devices" “Our partnership with RiskBand is advancing our existing connected safety ecosystem, offering employees without immediate access to a mobile phone with a direct line for emergency communication that they can utilise anywhere.” As part of the expansion of that ecosystem, Everbridge is looking to introduce additional wearables into the marketplace, and integrate further with IoT devices, sensors, and smart building technology, all to better protect employees from an increasing array of workplace threats. "It is especially gratifying that a respected industry leader like Everbridge recognises the powerful solution of the RiskBand ARIES device and platform. We believe that this collaborative partnership will enable us to empower businesses to enhance employee safety through state-of-the-art wearable devices that are fully integrated with the most comprehensive critical event management solutions,” explained Jim Van Law, CEO and Co-founder of RiskBand. RiskBand will be fully integrated into Everbridge’s platform. Individuals attending the Global Security Exchange (GSX) conference next week in Chicago can visit the Everbridge Booth #124 to learn more about the joint offering.
Ping Identity, a pioneer in Intelligent Identity, announced two new white papers from its CISO Advisory Council on securing customer data and combating insider threats. The Ping Identity CISO Advisory Council is made up of security experts from a range of markets—spanning healthcare, banking, travel and leisure, energy, technology, consulting and education. These CISOs illuminate the current challenges and opportunities impacting today’s security leaders. Members of the 2019 council represent organisations including Allegiant Air, American Red Cross, BlueCross BlueShield Tennessee, Carlson Wagonlit Travel, City National Bank, Gates Corporation, GCI, PowerSchool Group LLC, TechnipFMC, Vertafore and Vista Consulting Group. Securing customer data The Council addressed some of the industry’s most pressing challenges, including managing insider threats and securing customer data. It’s clear that few enterprises are immune to these issues. According to a report from Crowd Research Partners, 90% of organisations feel vulnerable to insider attacks, while a separate PwC report cites 32% of consumers will leave a brand they love after just one bad experience. In Ping Identity’s newly-published white papers, the CISO Advisory Council shares actionable advice for how enterprises can maneuver these complex challenges. "The CISO Advisory Council provides a unique perspective into the obstacles facing today's security leaders and the steps they're taking to address them," said Robb Reck, chief information security officer, Ping Identity. "These papers provide the blueprints for other enterprises to solve these critical problems within their own organisations, while the guidance from the leaders who make up our Council helps drive the evolution of our products and services.”
On September 8–12 in Chicago, ASSA ABLOY will show GSX 2019 attendees the latest innovations in their security and life safety offerings. They’ll also hold special events and educational opportunities for conference attendees at their booth, #1303. “New challenges are always on the horizon, so security professionals need to stay ahead of changing conditions and have access to cutting-edge solutions,” said Mark Duato, Executive Vice President of Aftermarket Solutions at ASSA ABLOY Door Security Solutions. “We’re proud to be at GSX again this year and support professionals across education, government, healthcare, commercial and multi-family security in staying ahead of what’s next for the industry.” Proactive solutions for security ASSA ABLOY is making access more convenient by extending electronic solutions to openings in commercial facilities At GSX 2019, visitors to the ASSA ABLOY booth will experience the latest products to help them better secure, manage and control their spaces. ASSA ABLOY is making access more convenient by extending electronic solutions to openings in commercial facilities and multi-family residences. For example, the award-winning Adams Rite G100 digital glass door lock with Aperio wireless technology offers a surface-mount solution for interior all-glass doors that integrates with existing software. Now glass openings can utilise single-card or dual-factor authentication without the need for cutting and drilling to install the lock. The latest keypad access product by Yale, the nexTouch Keypad Exit Trim, easily upgrades exit devices with keyless technology in commercial, multi-use and multi-family spaces. This scalable solution functions as a stand-alone keypad lock, or it can be integrated with a data-on-card or wireless access system. Enhancing security in educational facilities ASSA ABLOY combines security with cost effectiveness so that safety solutions can be implemented at scaleASSA ABLOY also remains committed to enhancing security in educational facilities. Their award-winning attack-resistant doors are tested according to the FBI’s active shooter report and can withstand a four-minute attack by an assailant using a variety of tools and weapons. ASSA ABLOY combines security with cost effectiveness so that safety solutions can be implemented at scale. “GSX 2019 is a great opportunity to show a range of stakeholders in various industries how ASSA ABLOY can help them strengthen life safety and security at their facilities,” explained Jeff Huggins, VP Government Programs & National Accounts, ASSA ABLOY, Door Security Services. “Our activities and interactive displays onsite will also allow visitors to deepen their knowledge and discover new ways to better secure their spaces, and they’ll even have the opportunity to give back to our brave military members.” Contributing for military ASSA ABLOY will feature hands-on activities and informational opportunities at their booth. On September 11, they will offer an opportunity for GSX attendees to give back to those who sacrifice for our freedoms by hosting a USO Bag Build in their booth. Attendees can pack supplies for military, who transit through the Chicago USO centresFrom 12 – 4 p.m. CT, attendees can pack supplies for military, who transit through the Chicago USO centres, including weekly graduates from the US Navy’s boot camp at Great Lakes and transiting troops who may be en route to or returning from deployments at locations across the globe. Training and education resources At the in-booth Technology Center, visitors can explore the: Customer Support App center, where attendees can view interactive videos, chat with technicians and review troubleshooting resources. BILT app kiosk, which showcases easy-to-use 3D installation instructions for ASSA ABLOY products. ASSA ABLOY Academy for training and education resources. Openings StudioTM kiosk, where attendees can preview integrative BIM software tools for designing, building and managing openings that can be used throughout the lifecycle of a building. ASSA ABLOY Group companies will also be onsite, including ABLOY (booth#2523), Ameristar Perimeter Security (booth#1413), HID Global (booth#1503) and Traka (booth#1213).
HID Global®, a provider of trusted identity solutions, announces that its IdenTrust™ digital certificates are now certified members of the Adobe Approved Trust List (AATL) program, the world’s largest trust service for electronic documents. AATL certification allows millions of users to create digital signatures that are automatically identified as being trusted whenever the document is signed with Adobe® Acrobat® DC, Acrobat Reader® DC or Adobe Sign. Digital signature transactions “We are very pleased to be part of Adobe’s trust initiative for its ubiquitous Adobe Document Cloud solutions that are used to process more than six billion electronic and digital signature transactions each year,” said Brad Jarvis, vice president and managing director with HID Global, Identity and Access Management. The digital signature can be validated each time the document is opened “When authors sign their Adobe documents with IdenTrust certificates, they can now provide recipients who open those documents using Adobe Acrobat and Acrobat Reader the confidence that the signatures can be trusted without requiring any specialised software or custom configuration.” When using Adobe Acrobat DC or Acrobat Reader for digital signing, the digital signature that has been created using an identity-based certificate can be validated each time the document is opened. Trusted identity solutions If multiple digital signatures are applied to the same document, each signature is validated independently when the document is accessed. In addition to confirming that users can trust the sender’s identity, the Adobe software also verifies that the IdenTrust credential was valid when the signature was applied and that any changes to the document met the document author’s specifications. The digital Certification Authority, IdenTrust has more than 5.7 million certificates in active production and supports more than 18 billion validations per year. Its digital certificates establish the basis for trusted identity solutions recognised by financial institutions, healthcare providers, government agencies and enterprises around the world.
Vaion, just a few months out of stealth mode, today announces its launch into the North American market with comprehensive demonstrations at GSX 2019. Vaion will exhibit in booth #1819 with a rapidly expanding commercial team ready to provide custom demos. Visitors will examine real-world scenarios which showcase how machine learning delivers operator efficiency, provides a rich understanding of surroundings, and offers new operational benefits for improved ROI. Embedded machine learning Vaion quickly deployed Proof of Concepts (PoCs) across a range of verticals with immediate results Vaion seeks to answer a single question: what if companies could detect threats at their earliest stages, mitigating risk instead of merely responding to security threats when they occur? It’s the basis behind Vaion’s innovative end-to-end security system, which brings together video, hardware, and software with embedded machine learning for proactive, rather than reactive, security operations. Highlighting early customer and partner demands for new experiences, Vaion quickly deployed Proof of Concepts (PoCs) across a range of verticals with immediate results. Commercial building operators are taking advantage of intelligent maps with Vaion’s Smart Presence™. The operational insights are providing the opportunity for enhanced workplace productivity and energy management based on occupancy awareness. K-12 administrators are finding Vaion’s real-time anomaly detection to be vital for complete school security. Vaion’s real-time detection gives schools the opportunity to take immediate action in stopping imminent threats from escalating. Healthcare facility operators are using interactive maps powered by Smart Presence™ to safely monitor patients, visitors, and employees. Vaion’s Smart Search™ allows operators to quickly identify a situation and person of interest. Retailers are benefiting from the granular awareness of the people present in their store. Heat mapping customer behaviour provides multi-layered solutions beyond strengthening security, and understanding customer activity helps improve the customer experience and increase sales. Enabling surveillance solutions Vaion’s active PoC engagements are an essential step in the company’s continued growth, with real, on-the-ground opportunities to test these advanced solutions and guarantee that Vaion products deliver on what they promise. Ambarella, a chipset manufacturer specialising in intelligent security applications, can attest to the viability of Vaion’s PoC solutions. Machine learning and integrated analytics are set to transform conventional video surveillance systems" Vaion uses Ambarella’s SoC for its ability to deliver powerful deep neural network processing, image processing, and video encoding. “Machine learning and integrated analytics are set to transform conventional video surveillance systems. Vaion’s advanced neural network-based algorithms running on Ambarella’s CVflow AI processors enable surveillance solutions that detect threats in their earliest stages and perform fast and effective investigations,” said Chris Day, VP Marketing & Business Development at Ambarella. Integrated AI analytics At GSX 2019, Vaion’s North American market representatives will provide an up-close look at how integrated AI analytics are set to fundamentally disrupt traditional video surveillance systems. “We are excited to show how artificial intelligence differentiators can safeguard businesses, schools, and entire communities. The positive response received during our PoC engagements proves that our approach to video surveillance uniquely helps our customers react to threats before they escalate, delivers increased situational awareness, and helps reduce resolution time dramatically. Come get the whole picture at booth #1819,” said Tormod Ree, Vaion CEO.
Applying a quarter century of software experience, technology pioneer Rod Whisnant has joined System Surveyor as its CTO. He will lead the next stage of development for System Surveyor, an intelligent system design platform. The mobile, SaaS-based platform enables virtual teams to work together to better plan, install, and maintain the systems required in all commercial, education, healthcare, and government facilities. “Rod’s diverse background, strong focus on the user experience, and record of delivering robust competitive solutions to the market is an ideal fit for our vision for System Surveyor,” said Chris Hugman, CEO of System Surveyor. Delivering mobile products Whisnant has experience in SaaS, big data, analytics, machine learning, and e-commerce “His leadership will enable more powerful functionality and collaboration for the system professionals using our platform. His first order of business is expanding our technical team.” Whisnant has experience in SaaS, big data, analytics, machine learning, and e-commerce. He has held engineering and product leadership roles at both corporate teams and start-ups including Predictive Science, ExpressDigital, Cubic Corporation, Viewcast, and Dell Technologies. His work has included delivering web and mobile products with rich user interfaces to companies such as Verizon, the NFL, and Home Depot. Benefitting business and organisation “I’ve seen firsthand how much value System Surveyor brings to our customers, and the potential to further benefit their businesses and organisations is huge,” said Whisnant. “I look forward to building out our team and evolving the product to deliver innovative and powerful experiences for anyone involved in system design, delivery, and maintenance.” System Surveyor will be exhibiting at the Global Security Exchange (GSX) taking place Sept. 10-12 in Chicago. Meet Whisnant, Hugman, and the team in booth #1680 and test drive the digital map for IoT.
There’s a lot of hype around the term ‘digital transformation.’ For some, it’s the integration of digital technology into everyday tasks. For others, it’s the incorporation of innovative processes aimed at making business optimisation easier. In most cases, digital transformation will fundamentally change how an organisation operates and delivers value to its customers. And within the security realm, the age of digital transformation is most certainly upon us. Technology is already a part of our day-to-day lives, with smart devices in our homes and the ability to perform tasks at our fingertips now a reality. No longer are the cloud, Internet of Things (IoT) and smart cities foreign and distant concepts full of intrigue and promise. Enhancing business operations We’re increasingly seeing devices become smarter and better able to communicate with each other These elements are increasingly incorporated into security solutions with each passing day, allowing enterprises the chance to experience countless benefits when it comes to enhancing both safety and business operations. The term ‘connected world’ is a derivative of the digital transformation, signifying the increasing reliance that we have on connectivity, smart devices and data-driven decision-making. As we become more familiar with the advantages, flaws, expectations and best practices surrounding the connected world, we can predict what issues may arise and where the market is heading. We’re increasingly seeing devices become smarter and better able to communicate with each other through the IoT to achieve both simple goals and arduous tasks. Within our homes, we’re able to control a myriad of devices with commands (‘Hey Google...’ or ‘Alexa...’), as well as recall data directly from our mobile devices, such as receiving alerts when someone rings our doorbell, there’s movement in our front yard or when a door has been unlocked. Analytics-driven solutions The focus is now shifting to the business impacts of connectivity between physical devices and infrastructures, and digital computing and analytics-driven solutions. Within physical security, connected devices can encompass a variety of sensors gathering massive amounts of data in a given timeframe: video surveillance cameras, access control readers, fire and intrusion alarms, perimeter detection and more.As the data from each of these sensors is collected and analysed through a central platform, the idea of a connected world comes to fruition, bringing situational awareness to a new level and fostering a sense of proactivity to identifying emerging threats. The connected world, however, is not without its challenges, which means that certain considerations must be made in an effort to protect data, enhance structured networking and apply protective protocols to developing technology. Physical security systems We can expect to see the conversations regarding data privacy and security increase as well As the use of connected devices and big data continue to grow, we can expect to see the conversations regarding data privacy and security increase as well. Connectivity between devices can open up the risk of cyber vulnerabilities, but designing safeguards as technology advances will lessen these risks. The key goal is to ensure that the data organisations are using for enhancement and improvements is comprehensively protected from unauthorised access. Manufacturers and integrators must be mindful of their products' capabilities and make it easy for end users to adhere to data sharing and privacy regulations. These regulations, which greatly affect physical security systems and the way they're managed, are being implemented worldwide, such as the European Union's General Data Protection Regulation (GDPR). In the United States, California, Vermont and South Carolina have followed suit, and it can be expected that more countries and U.S. states develop similar guidelines in the future. Technology is already a part of our day-to-day lives, with smart devices in our homes and the ability to perform tasks at our fingertips now a reality Automatic security updates Mitigating the concerns of the ‘connected world’ extends beyond just data privacy. IoT technology is accelerating at such a pace that it can potentially create detrimental problems for which many organisations may be ill-prepared - or may not even be able to comprehend. The opportunities presented by an influx of data and the IoT, and applying these technologies to markets such as smart cities, can solve security and operational problems, but this requires staying proactive when it comes to threats and practicing the proper protection protocols. As manufacturers develop devices that will be connected on the network, integrating standard, built-in protections becomes paramount. This can take the form of continuous vulnerability testing and regular, automatic security updates. Protocols are now being developed that are designed to ensure everything is encrypted, all communications are monitored and multiple types of attacks are considered for defensive purposes to provide the best security possible. IoT-connected devices Hackers wishing to do harm will stop at nothing to break into IoT-connected devices Built-in protection mechanisms send these kinds of systems into protection mode once they are attacked by an outside source. Another way for manufacturers to deliver solutions that are protected from outside threats is through constant and consistent testing of the devices long after they are introduced to the market. Hackers wishing to do harm will stop at nothing to break into IoT-connected devices, taking every avenue to discover vulnerabilities. But a manufacturer that spends valuable resources to continue testing and retesting products will be able to identify any issues and correct them through regular software updates and fixes. ‘IoT’ has become a common term in our vocabularies and since it’s more widely understood at this point and time, it's exciting to think about the possibilities of this revolutionary concept. Providing critical insights The number of active IoT devices is expected to grow to 22 billion by 2025 — a number that is almost incomprehensible. The rise of 5G networks, artificial intelligence (AI) and self-driving cars can be seen on the horizon of the IoT. As more of these devices are developed and security protocols are developed at a similar pace, connected devices stand to benefit a variety of industries, such as smart cities. Smart cities rely on data communicated via the IoT to enhance processes and create streamlined approaches Smart cities rely on data communicated via the IoT to enhance processes and create streamlined approaches to ensuring a city is well-run and safe. For example, think of cameras situated at a busy intersection. Cameras at these locations have a variety of uses, such as investigative purposes in the event of an accident or for issuing red-light tickets to motorists. But there are so many other possible purposes for this connected device, including providing critical insights about intersection usage and traffic congestion. These insights can then be used to adjust stoplights during busy travel times or give cities valuable data that can drive infrastructure improvements. Physical security market The impact of connected devices on cities doesn’t stop at traffic improvement. The possibilities are endless; by leveraging rich, real-time information, cities can improve efficiencies across services such as transportation, water management and healthcare. However, stringent protections are needed to harden security around the networks transmitting this kind of information in an effort to mitigate the dangers of hacking and allow this technology to continuously be improved. Whether you believe we’re in the midst of a digital transformation or have already completed it, one thing is certain: businesses must begin thinking in these connectivity-driven terms sooner rather than later so they aren’t left behind. Leveraging smart, connected devices can catapult organisations into a new level of situational awareness, but adopting protections and remaining vigilant continues to be a stalwart of technological innovation within the physical security market and into the connected world.
The healthcare sector is a crucial part of a functioning society as it provides life-saving care and reassurance to the population. A key part of ensuring the professionals in this industry have the best work environment is the ongoing security of the facilities. Overcoming environmental challenges Hospitals are challenging environments for security integrators. There is little room for mistakes because staff, patients and assets cannot be compromised. Medical centres and their facilities can be vast complexes and security teams must be confident in their ability to identify and nullify threats as soon as possible. Chubb provided Queensland Children’s Hospital's security team with a simple and easy-to-use tool Chubb Fire & Security offers a range of intelligent video and access control systems to solve these challenges. The Queensland Children’s Hospital in Australia, formerly named Lady Cilento Children’s Hospital, is the major specialist children’s hospital for families living in Queensland and Northern New South Wales. The facility not only provides care to the local families but also the state’s sickest and most critically injured children who need highly specialised care. This state-of-the-art hospital, coupled with a leading academic and research facility and the high calibre staff, provides a platform to continue to develop as a leader in paediatric health care, education and research. Comprehensive security solution Chubb developed a solution for Queensland Children’s Hospital that included access control, video management, communications and asset tracking. By creating a common infrastructure for all security systems managed through a comprehensive user interface, Chubb provided the hospital’s security team with a simple and easy-to-use tool that enables them to resolve situations as they happen and action events automatically on command. Chubb also developed a 3D model of the building that allows the security team to respond quickly to a wide variety of events. The protection of patients and staff is naturally a hospital's number one priority Also crucial to the implementation of security systems in a hospital is minimal disruption to its everyday operations. Professionals in hospitals are working 24/7 so there is little time when it comes to disabling security systems for maintenance or repairs. Continued maintenance and upgrades are vital elements to Chubb’s work and key to this is a great deal of collaboration with clinical and operational stakeholders. Securing mission-critical environment Hospital facilities are not always state-of-the-art and often face the slow upgrade process that a limited budget imparts. However, through the audit and update of security systems, steps can be taken to ensure continued operations without external disruption. The protection of patients and staff is naturally a hospital's number one priority and Chubb shares the same commitment to making sure the environment is safe and secure. Carrying out a technically demanding project in a large, mission-critical environment like a hospital takes strong teamwork, including expert strategic partners, and collaboration between stakeholders.
The industry faces numerous challenges in the coming year. Physical and cyber security threats continue to become more complex, and organisations are struggling to manage both physical and digital credentials as well as a rapidly growing number of connected endpoints in the Internet of Things (IoT). We are witnessing the collision of the enterprise with the IoT, and organisations now must establish trust and validate the identity of people as well as ‘things’ in an environment of increasingly stringent safety and data privacy regulations. Meanwhile, demand grows for smarter and more data-driven workplaces, a risk-based approach to threat protection, improved productivity and seamless, more convenient access to the enterprise and its physical and digital assets and services. Using smartphone apps to open doors Cloud technologies give people access through their mobile phones and other devices to many new, high-value experiencesEnterprise customers increasingly want to create trusted environments within which they can deliver valuable new user experiences. A major driver is growing demand for the ‘digital cohesion’ of being able to use smartphone apps to open doors, authenticate to enterprise data resources or access a building’s applications and services. Cloud technologies are a key piece of the solution. They give people access through their mobile phones and other devices to many new, high-value experiences. At the same time, they help fuel smarter, more data-driven workplace environments. With the arrival of today’s identity- and location-aware building systems that recognise people and use deep learning analytics to customise their office environment, the workplace is undergoing dramatic change. Improved fingerprint solutions Cloud-based platforms and application programming interfaces (APIs) will help bridge biometrics and access control in the enterprise, overcoming previous integration hurdles while providing a trusted platform that meets the concerns of accessibility and data protection in a connected environment. At the same time, the next generation of fingerprint solutions will deliver higher matching speed, better image capture quality and improved performance. The next generation of fingerprint solutions will deliver higher matching speed, better image capture quality and improved performance Liveness detection will ensure that captured data is from a living person. Biometrics authentication will also gain traction beyond access control in immigration and border control, law enforcement, military, defence and other public section use cases where higher security is needed. Flexible subscription models Access control solutions based on cloud platforms will also change how solutions are deployed. Siloed security and workplace optimisation solutions will be replaced with mobile apps that can be downloaded anywhere across a global ecosystem of millions of compatible and connected physical access control system endpoints. These connections will also facilitate new, more flexible subscription models for access control services. As an example, users will be able to more easily replenish mobile IDs if their smartphones are lost or must be replaced. Generating valuable insights with machine learning Machine learning analytics will be used to generate valuable insights from today’s access control solutionsEducation, finance, healthcare, enterprise, and other niche markets such as commercial real-estate and enterprises focussed on co-working spaces will benefit from a cloud-connected access control hardware foundation. There will be a faster path from design to deployment since developers will no longer have to create an entire vertically integrated solution. They will simply add an app experience to the existing access control infrastructure. New players will be drawn to the market resulting in a richer, more vibrant development community and accelerated innovation. Data analytics will be a rapidly growing area of interest. Machine learning analytics will be used to generate valuable insights from today’s access control solutions. Devices, access control systems, IoT applications, digital certificates and location services solutions, which are all connected to the cloud, will collectively deliver robust data with which to apply advanced analytics and risk-based intelligence. As organisations incorporate this type of analytics engine into their access control systems, they will improve security and personalise the user experience while driving better business decisions.
For the security market, the ‘fine ranging’ capabilities of ultra-wideband (UWB) technology opens up a range of new uses based on the ability to determine the relative position and distance of two UWB-equipped devices with pinpoint accuracy – within centimetres. UWB is more accurate and secure, even in challenging environments full of interference, compared to narrow band wireless technologies. UWB technology transmits a large amount of data over short distances using a small amount of energy. It will be used in seamless access control, location-based services, and device-to-device services across industries including smart homes, cities, retail services, and healthcare. Increasing the accuracy of ranging measurements UWB technology will support any application that benefits from knowing the precise location of a connected deviceUltra-wideband is a mature radio technology that transmits information spread over a large bandwidth, as described by the IEEE 802.154 standard. A new, enhanced amendment to the standard – IEEE 802.15.4z – focusses on improvements to existing modulations to increase the integrity and accuracy of ranging measurements. Moving forward, UWB technology will support any application that benefits from knowing the precise location or presence of a connected device or object. This reflects a move from data communication to secure sensing. New capabilities of UWB are largely unfamiliar to the market, but a new Consortium – the FiRa Consortium – has a mission to educate the market, provide use cases, and promote UWB technology. Delivering interoperability across devices “With a consortium, we can better deliver interoperability across devices, software, and chipsets,” says Ramesh Songukrishnasamy, Director and Treasurer of the FiRa Consortium, and SVP & CTO of HID Global. “This creates a frictionless experience for the user, which is vitally important with a new technology. People are more likely to adopt emerging technology when it runs smoothly without interruptions or errors.” The FiRa consortium is ensuring new use cases for fine ranging capabilities can thrive" An industry consortium can create a UWB ecosystem of interoperable technologies instead of individual companies launching products that consumers struggle to make work together, says Songukrishnasamy. “Simply, the FiRa consortium is ensuring new use cases for fine ranging capabilities can thrive.” Founding members of the FiRa consortium ASSA ABLOY and HID Global, pioneers in secure access and identity solutions, are founding members of the consortium. Their technology manages access to physical and digital places, things, and identities. Another founding consortium member, NXP Semiconductors, is a pioneer in secure connectivity solutions for embedded applications. Other founding members are Samsung, which creates top-of-the-line TVs, smartphones, wearables, and other connected devices; and the Bosch Group, a global supplier of technology and services that is at the forefront of IoT innovations. Sony Imaging Products & Solutions Inc., LitePoint and the Telecommunications Technology Association (TTA) are the first companies to join the newly formed organisation. Immune to radio frequency interference UWB is also immune to radio frequency interference, so it functions in high traffic settingsUWB introduces higher levels of accuracy in positioning capabilities and increased security for ranging data exchange compared to existing technologies. Fine ranging with UWB technology can localise devices and objects to 10 centimetres of accuracy with or without line of sight. UWB is also immune to radio frequency interference, so it functions in high traffic settings. These capabilities will enable a variety of use cases like secure, hands-free access control in hospitals, location-based services for ride sharing, and targeted marketing for retailers. FiRa will demonstrate UWB technology at upcoming trade shows. The FiRa Consortium aims to build on IEEE’s work with an interoperable high rate physical layer (HRP) standard, including defining an application layer that discovers UWB devices and services and configures them in an interoperable manner. The consortium also plans to develop service-specific protocols for multiple verticals and define necessary parameters for applications including physical access control, location-based services and device-to-device services. Promoting the adoption of UWB solutions As a consortium, FiRa is not just setting standards but actively championing use cases for UWB technology. Creating the consortium addresses the need to develop interoperability and implementation standards; brings key players together to create a rich UWB ecosystem; allows for the sharing of intellectual property; and promotes the adoption of UWB solutions. The FiRa Consortium is committed to educating and promoting new use cases" “Since UWB is a mature technology with new potential uses, there is a general lack of awareness of potential applications that take advantage of the technology,” says Songukrishnasamy. “The FiRa Consortium is committed to educating and promoting new use cases.” The FiRa name comes from Fine Ranging to highlight UWB technology’s use cases and distinction from older UWB technologies and solutions. Enhanced security in challenging environments Fine ranging powered by UWB can outperform other technologies in terms of accuracy, power consumption, robustness in wireless connectivity, and security, especially in challenging, high density environments. UWB previously served as a technology for high data rate communication and as such was in direct competition with Wi-Fi. Since then, UWB has undergone several transformations: UWB has evolved from an OFDM-based data communication to an impulse radio technology specified in IEEE 802.15.4a (2ns pulses with Time of Flight); and A security extension being specified in IEEE 802.15.4z (at PHY/MAC level) makes it a unique secure fine ranging technology. Moving from data communication to secure ranging allows ‘spatial context capability’ to be utilised by a variety of applications: seamless access control, location-based services, and device-to-device (peer-to-peer) services. Information is available at firaconsortium.org.
Virtualisation offers multiple benefits to video surveillance systems, but the technology has been slow to adapt to the needs of video. However, the tide is turning. At ISC West, BCDVideo introduced a hyperconverged infrastructure tailored to video surveillance (HCI-VS) that answers the demand for higher and more efficient operating performance while also lowering the total cost of ownership for the integrator and end user. Hyperconverged infrastructure solution “ISC West attendees were able to get their hands on our hyperconverged solution and immediately see how easy it is to use and the benefit of adding virtual machines,” says BCDVideo’s Chief Technology Officer Tom Larson. Security integrators were impressed that BCDVideo continues to adapt technologies" Virtualisation was just one of the innovations in BCDVideo’s demo room. Many integrators and end users found their way to the conference room, located not far from the exhibition hall, and BCDVideo was also featured at partners’ booths on the show floor. “Security integrators were impressed that BCDVideo continues to adapt technologies to the video surveillance space,” says Larson. “BCDVideo ‘gets’ them, but often IT does not. The HCI solution is purpose-built for video, and it works.” Server, storage and networking BCDVideo’s HCI-VS is a virtualised, video-optimised and highly available infrastructure. It combines the server, storage and networking into one platform. Powered by Scale Computing’s HC3 software, BCDVideo’s HCI is a scalable, node/cluster-based infrastructure that enables integrators to virtualise their physical security appliances and software, meaning fewer devices need to be deployed and maintained. Physical security integrators can create an infrastructure that provides high availability to the VMS" “More importantly, our HCI makes it easier than ever before both to quickly create and deploy virtual machines, and to manage video surveillance infrastructure,” says Larson. Some of the unique needs that HCI-VS serves are those of multi-faceted projects involving video recording, access control, building management, etc. With HCI-VS, separate appliances are not needed for each of these tasks, which enables better use of hardware, reduces overall rack space and power/cooling costs. Essentially, this solution eliminates the “pizza box” model and serves the need in the marketplace where always-on video and high availability are necessary, and especially in situations where loss of video data cannot be tolerated, says Larson. Simplified graphical user interface (GUI) makes it easy for integrators to implement systems that use hyperconverged technology Tolerant to hardware failure “By leveraging the concepts of hyperconvergence, physical security integrators can create an infrastructure that provides high availability to the video management system,” he says. “When components within a video management system are tolerant to hardware failure, it results in less loss of data and continual access to the data from the failed component. You always have access to the video data even if the hard drive fails.” Defining virtualisation Virtualisation is the act of creating virtual copies of physical resources, including, but not limited to, compute, memory, storage, and network resources. This is achieved by employing software to manage all physical resources, known as a hypervisor. As servers become more powerful, the discrepancy between software and hardware capabilities result in inefficient use of resources. “By partitioning the hardware resources into smaller virtual environments, we can create multiple virtualised servers that share a common set of resources,” says Larson. “By sharing this common set of resources, the virtualised servers utilise the resources more efficiently with less waste.” Integrators and end users flocked to BCDVideo's demo room at ISC West to try out the new hyperconverged solution Education and physical security Learning about the benefits of why to virtualise and applications will be a first step” A challenge to greater adoption of virtualisation in the physical security industry is education. “Some security integrators will need to step out of their comfort zone,” says Larson. “Virtualisation for video has been slow to adapt, and other solutions are complicated. IT technology applications traditionally have not worked in the space either. Learning about the benefits of why to virtualise and applications will be a first step.” HCI-VS in new verticals While HCI-VS is vertical-market-agnostic, the solution is suitable for school districts looking to consolidate their hardware, for hospitals and the healthcare industry in general, for the rapidly growing cannabis industry, any mass transit system, as well as for Fortune 1000 companies, to name a few. “Our virtualised solution especially appeals to these verticals because of the number of cameras, the need for 24/7/365 video recording and extensive data retention requirements, and where loss of video data cannot be afforded,” says Larson. Purpose-built solutions BCDVideo’s HCI-VS is the latest example of products BCDVideo is creating for the physical security industry. “We purpose-build and engineer our solutions specifically for video surveillance with the ability to scale-out as needed,” says Kelly Kellen, BCDVideo’s Director of Marketing. “We engineer new products to address problems in the marketplace. Our CTO is really looking at the market and studying the security integrator’s pain points. Then we engineer solutions to best serve them.”
Effective access control can be achieved without the use of cards using a new generation of secure facial authentication enabled by artificial intelligence and machine learning. Alcatraz AI is introducing a system that deploys a sensing device, about the size of a badge reader, with multiple colour and infrared cameras that can detect facial features and confirm an identity. Real-time 3D facial mapping avoids anyone using a photograph, video or mask to spoof the system and confirms there is a real person that matches the stored facial image. System helps in tailgating mitigation Deep neural networks, powered by NVIDIA, enable the system to achieve new levels of frictionless access control, says Vince Gaydarzhiev, CEO of Alcatraz AI. Computer processing is achieved at the edge to ensure speedy and secure access control. We saw an opportunity to create a system that solves issues of tailgating and addresses the need for security without increasing friction"“We saw an opportunity to create a system that solves issues of tailgating and addresses the need for security without increasing friction,” says Gaydarzhiev. The accuracy of the system lessens the need for security guards, he says. The Silicon Valley startup, currently with 20 employees, was founded in early 2016 by a team from Apple, NVIDIA and Lily Robotics with a goal of targeting mid- to large-sized corporations that currently have deployed badging systems. The company has raised close to $6M from venture capital firms and individuals, and Johnson Controls/Tyco has invested in the startup. Alcatraz AI’s sensor device, mounted near a door, confirms a user’s identity and communicates the user’s badge number to the existing access control infrastructure. “The system improves the facial profile every time, using the neural network to be even more accurate in the future,” says Gaydarzhiev. He says it is the industry’s first “instant one-factor authentication for multi-person in-the-flow sensing.” The system is less expensive than previous facial authentication systems and does not require users to be very close to the reader Easy enrolment and deployment Enrolment in the system is easy. Companies can deploy a separate enrolment station, or any reader can be used for enrolment. After badging in a couple of times, the face matching system “enrols” the face with the associated badge number, thus allowing the user to dispense with the badge altogether. In the future, the frictionless system simply recognises the user and opens the door. A user company can quickly deploy the system at locations where thousands of employees have access, without requiring employees to go to HR for enrolment. Gaydarzhiev says accuracy of the system is no less than that of iris scanning, and the accuracy is configurable for specific needs. He says the system is less expensive than previous facial authentication systems and does not require users to be very close to the reader. Facial authentication is also more flexible than iris scanning or fingerprinting. Detecting intent from positioning of eyes The system detects intent from the positioning of the eyes and body to avoid opening a door unintentionallyIn contrast to near field communication (NFC) or Bluetooth systems, the technology does not require a compatible smart phone or have issues of communication range. There is no need for users to stop and perform an action or gesture to signal intent. The system detects intent from the positioning of the eyes and body to avoid opening a door unintentionally, says Gaydarzhiev. Alcatraz AI is targeting high-tech enterprises, including healthcare, government and eventually banks. Currently they have three pilot installations among large global software companies and are undergoing trials with some government agencies. Today, they sell direct to end users, but the intent is to develop a dealer channel that will account for most of the sales.
As in every health facility, security for the Haute Savoie region’s new hospital presented a complex challenge. Access control required multiple checkpoints and access rights tailored to individual staff and contractors. Real-time control, enabling managers to respond proactively including by opening and closing doors remotely, was another essential. To meet their security challenges, managers selected Aperio® locking technology integrated online with an ARD access management system. Because Aperio® locks are wireless, the hospital could introduce many more layers of security and secure doors without incurring excessive installation or operating costs, including for sensitive offices and drug stores. Central access system software Secure 128-bit AES encryption protects communications between Aperio® lock, hub and system Now staff no longer carry key bunches or waste valuable time hunting down relevant keys. All their individual permissions are stored on a single, programmable RFID credential. Alongside standard wired locking, the hospital chose 1,300 Aperio® wireless escutcheons, 10 Aperio® wireless handles with integrated RFID reader, and 301 Aperio® wall readers. A network of 228 Aperio® communications hubs connects every Aperio® lock wirelessly to the central access system software. All these battery-powered Aperio® devices integrate natively with the centralised access system, so wired and wireless access points at Centre Hospitalier Métropole Savoie (CHMS) are managed together, with real-time management logs, remote door opening and free time slot management. Secure 128-bit AES encryption protects communications between Aperio® lock, hub and system. Maintaining access control autonomously “Having just a single badge — and not having to carry around heavy keys — has been a major advantage for us,” says Béatrice Dequidt, Health Executive at CHMS. “This solution's advantage is it represents a single site from an authorisation management and systems perspective,” explains Aurélien De Riols, ARD’s Eastern Region Director. One single, intuitive management interface enables security teams to administer and maintain access control autonomously, as well as streamline laborious everyday tasks. “We have implemented internal HR management procedures, creating badges that are automatically integrated into ARD's operating software,” adds Alain Gestin, CHMS’s IT Systems Architect. Aperio and ARD maintain compatibility of credentials with the French government’s electronic Health Professional Card (CPS), for added staff convenience. For every site user, the advantages of carrying a single RFID-enabled badge — instead of multiple keys — are clear.
In all medical settings, people are coming and going all day. Therapists leave their personal belongings in changing rooms, patients want privacy in consulting rooms, open or unlocked doors can be an invitation to opportunists. Yet keeping track of mechanical keys can be a tiresome task for a small practice. There is a solution: the Code Handle PIN lock from ASSA ABLOY. In Irun, in Spain’s Basque country, Fylab sought easy electronic door security for their consulting rooms. These rooms house expensive specialist equipment for the various therapeutic disciplines offered by Fylab. Requirements were straightforward: a simple, secure, keyless access solution designed to work in a facility that gets a lot of daily traffic from professionals and the public. They needed a locking device that is easy to retrofit and incorporates a contemporary device design to match with Fylab’s modern medical workplace. Adding electronic security to room doors The Code Handle PIN-locking door handle added electronic security to three consulting-room doors at FylabThe Code Handle PIN-locking door handle added electronic security to three consulting-room doors at Fylab – without wires or cables. Two screws fit a Code Handle to almost any interior door (between 35mm to 80mm thick). One doesn’t even need to change their existing door cylinder. “I am no artist or handyman, but I managed to fit the handles within 10 minutes,” says Fylab founder, Borja Saldias Retegui. Code Handle adds electronic security to almost any interior door without disrupting its aesthetics. If one needs to secure a door facing a public space, Code Handle does it subtly and with zero hassle. At Fylab, Code Handle devices locks both wooden and glass doors, keeping equipment and therapists’ personal belongings safe. Allows up to 9 different PIN numbers “We like the solution a lot because we can do away with keys,” adds Borja. Code Handle removes the need to track cumbersome keys or install expensive access control. Because every Code Handle allows up to 9 different PIN numbers (4 to 6 digits), all authorised staff at Fylab can have their own security code. Two standard batteries (CR2) slot inside the handle, typically lasting 30,000 lock/unlock cycles before replacement The practice manager cancels or amends PINs at any time using the master PIN. Two standard batteries (CR2) slot inside the handle, typically lasting 30,000 lock/unlock cycles before replacement. It’s simple. “Code Handle is unique in comparison to common code door locks: it has the code function and battery incorporated inside its handle, so you don’t need to make extra modifications to your door,” explains Lars Angelin, Business Development Manager for Code Handle at ASSA ABLOY EMEA. Auto-locking feature of Code Handle Auto-locking is another helpful feature. When the door closes, Code Handle locks it automatically. One doesn’t need to put down whatever they are carrying, and no one can open it from the outside while they are not looking. To keep the door open briefly, one can simply hold Code Handle down for 5 seconds and it remains temporarily unlocked. For convenience, Code Handle always opens freely from the inside. “Code Handle provides the simplest solution for access control in a small facility,” says Borja.
Leon Medical Centers is a privately-owned healthcare organisation with seven state-of-the-art facilities serving over 46,000 elderly and Medicare patients in Miami and neighbouring communities in Dade County, Florida. Established in 1996 by Benjamin Leon Jr., Leon Medical Centers is one of the largest and most prestigious primary healthcare organisations in the state. However, what really sets it apart is its rigorously enforced service philosophy of ‘personal attention at all times’ and its commitment to treating its patients with the ‘dignity, respect, compassion and human kindness that they deserve.’ Mobile video recorders Leon Medical Centers began deploying previous-generation March Networks mobile video recorders in 2011 In keeping with its commitment to exceptional service, Leon Medical Centers operates a fleet of 230 buses that pick up patients, take them to their appointments and return them home. To ensure their safety in transit and monitor compliance with its service philosophy, it relies on an integrated March Networks® RideSafe™ video surveillance solution. Leon Medical Centers began deploying previous-generation March Networks mobile video recorders in 2011. “We had another vendor’s equipment up to that point, but the system couldn’t support IP video,” said Erick Martinez, Leon Medical Centers’ Security Systems Manager. “At the time, we were using analogue cameras and wanted to upgrade to higher definition video. We were also experiencing a lot of issues with hard drive failures.” Hybrid network video recorders In 2014, Martinez began upgrading to RideSafe GT Series Hybrid Network Video Recorders (NVRs), and now has 120 of the new mobile recorders in addition to almost 200 older March Networks mobile DVRs. The RideSafe GT Series recorders are available in 8, 12, 16 or 20-channel models with hybrid capability allowing end users to migrate from 100 percent analog to 100 percent IP video. An embedded Linux-based operating system, ruggedised design offering protection against shock, vibration, dust and moisture, solid state electronics, and internal battery backup make the RideSafe GT Series recorders ideal for reliable operation in punishing mobile conditions. A hard drive mirroring capability ensures redundancy and storage flexibility, while health monitoring proactively alerts system administrators to hard drive failures, irregular temperatures or synching issues with cameras. Safety of our passengers Our patients are elderly, so if there’s a slip and fall incident, we want to have evidence of what happened" Each Leon Medical Centers bus is equipped with six March Networks cameras. Five of the cameras are mounted to capture interior views and the last is used externally to capture video of passenger entry and exit points. “Our focus is on the safety of our passengers,” said Martinez. “Our patients are elderly, so if there’s a slip and fall incident, we want to have evidence of what happened. We also use the system to confirm compliance with our service standards. Our drivers are the first and last points of interaction with our patients, so if there’s an issue, we want to be able to review and rectify it.” In the event of an incident in transit, the driver is able to push a button on the dashboard to tag the associated video. Diagnostic imaging services When the bus arrives at one of the clinics, the tagged video automatically down-loads through a Wi-Fi hotspot to a server for immediate review by Leon Medical Centers risk management personnel. While in range of a Wi-Fi hotspot, the system also downloads health alerts and can also upload any scheduled software updates or new device settings. For routine video downloads, there’s hardly ever a need for Martinez’s staff to board a bus. “Wireless downloading saves us a lot of time,” he said. “It makes incident reporting much more efficient when we need to have an issue resolved. It helps a lot.” The seven Leon Medical Centers are one-stop-shop facilities with onsite labs, pharmacies, diagnostic imaging services and dental clinics. Traveling to multiple locations Leon Medical Centers operates four Healthy Living Centers with modern gyms, exercise and yoga classes This convenient service model enables patients to see their family doctor or a specialist, have blood work done, get an X-ray and fill prescriptions without having to spend time traveling to multiple locations. Each center has a café, where patients can have a coffee and socialise. And to help patients stay fit, Leon Medical Centers operates four Healthy Living Centers with modern gyms, exercise and yoga classes, seminars and other programs. Patients who require surgery or a hospital procedure are picked up and delivered by Leon Medical’s bus transportation service. On arrival, they’re greeted and escorted to their destination by staff from Leon Medical’s Hospital Service Centers, which are located within all of the major Miami-Dade County hospitals. Aside from the seven centers and four Healthy Living Centers, Leon Medical operates a fleet maintenance garage and a 300,000 square-foot corporate headquarters. Video management software Martinez says that the fixed facilities are also being equipped with March Networks 8000 Series Hybrid NVRs, which are managed using the same March Networks Command video management software powering the mobile recorders. Having a single software solution to access and manage video - regardless of whether it’s recorded on a bus or in one of the medical centers - means that Leon Medical Centers doesn’t have to train staff on multiple software systems. It also provides the organisation with complete oversight of its clients and operations. Once again, it’s all about patient safety and service excellence. “If a patient loses a purse or a wallet, for example, we’ll be able to find it for them on one of our buses or in a clinic. Or if they have an issue with an employee, we’ll be able to review the video and take care of it,” said Martinez. Video surveillance infrastructure Martinez and his staff are trained to take full advantage of all the Command software functionality A Microsoft certified engineer, Martinez heads up a department solely focused on overseeing Leon Medical’s video surveillance infrastructure. “This department didn’t exist four years ago,” he said. “I was part of the IT department responsible for PC support. Mobile security was handled by transportation at the time. I thought it would be a good idea to create a separate department with IT expertise to look after mobile security, and senior management agreed.” Martinez and his staff are trained to take full advantage of all the Command software functionality. For example, they’re able to manage video viewing privileges to ensure users have access only to those cameras corresponding to their roles or responsibilities. They’re also able to take advantage of Command’s support for Microsoft Active Directory integration, which collects established user account information from Leon Medical’s corporate network directory. Patient safety and service excellence This allows them to select users from the company directory, assign a profile and customise their user interface to display the tools needed for their role. Looking ahead, Martinez and his team will be busy this year, as Leon Medical Centers continues to expand. We have four construction build-outs planned, including a four-story, 80,000 square-foot building" “We have four construction build-outs planned, including a four-story, 80,000 square-foot building and two parking garages - one six-floor and one seven-floor garage - so there will be opportunities for additional fixed video surveillance systems. Because we lease our buses for three years, we’re also always adding to our transportation fleet, so we’ll continue swapping out our 5308 recorders in favour of the newer GT Series.” “March Networks has served us well,” said Martinez. “Without a high-quality, reliable video surveillance system, we would have a much more difficult time fulfilling our commitment to patient safety and service excellence. It’s that simple.”
Airbus provided secure communications technology to French security forces (police, gendarmerie, and fire brigades) during the long-awaited socio-economic and political summit which took place in the Southwestern coastal town of Biarritz between the 24th and 26th August.With the high-security measures promised by Christophe Castaner, French Minister of the Interior, 13 200 police officers and gendarmes, as well as over 400 firefighters, were involved in safeguarding the high-profile event. The high security and resilience of the dedicated networks and terminals provided by Airbus to the teams in charge of securing the G7 summit was an essential aspect to protecting both the government officials from over the world taking part in the summit, the venue and its perimeter, and the people working on-site. Full interoperability between forces Airbus is also a long-term provider of INPT, the nationwide radio communications network for the French police On top of providing the necessary equipment and secure mission-critical communications technology through a dedicated network overlay deployed for this major event, Airbus is also a long-term provider of INPT, the nationwide radio communications network for the French police, fire brigades, emergency healthcare services, customs, national defense forces, mobile gendarmerie, prefectural authorities and penitentiary administration for prisoner transfers. This network allows full interoperability between forces. Furthermore, Airbus has been a reliable provider of the French gendarmerie’s secure communications network RUBIS, as well as portable material, and other essential communication equipment for their vehicles, for over 30 years.“With various kinds of threats that weigh in on political gatherings of this kind, optimal security conditions are an absolute priority. Through its state-of-the-art technology and highly reliable networks implemented to support secure communications operations, Airbus was able to ensure the smooth running of the communication between each member entrusted to protect and secure the G7 summit”, declared Olivier Koczan, Head of Secure Land Communications of Airbus.
The National Health Insurance Fund (NHIF) is a Social Health Insurance Scheme established by CAP 395 with the main objective of ensuring accessibility of health care services to all Tanzanians. The Fund has managed to expand its coverage to include councils, private companies, religious and educational institutions, private individuals, children under 18 (TOTO Afya) as well as mutual groups, whereby all members can equally access health services in all accredited health facilities. The Fund is also administering the Bunge Health Insurance Scheme, on behalf of the National Assembly. NHIF is a prestigious public institution that serves people all over Dar es Salaam and Tanzania. It has multiple sites spread over these regions. Their current surveillance platform had a few limitations of integrating third-party cameras and was not facilitating centralised monitoring for multiple locations. Matrix Sataya Samas is designed to meet diverse needs of large enterprises connected to a central location or a single site This posed a problem in managing and monitoring all sites from a single location. For this, they needed a surveillance platform that could easily integrate with multi-brand cameras as well as facilitate multi-location monitoring. Moreover, they needed a system with monitoring capacity of over 500 cameras with the facility of remote management for real-time security. Specifically designed solutions To the above challenges, Matrix Offered Sataya Samas Video Management System. It is a Video Surveillance management solution specifically designed to meet the diverse and complex needs of large enterprises having multiple sites connected to a central location or a large, single site. The system was able to integrate with 56 AXIS cameras available at its Head Quarters and other 16 cameras available at its district branch offices. All the cameras were managed at a single central server located at the NHIF HQ office. Matrix VMS provided real-time security with Intelligent Video Analytics such as Motion Detection, Intrusion Detection, Trip Wire etc. Additionally, VMS enabled monitoring and managing video surveillance from mobile phones and tablets remotely by using Matrix Mobile Application: SATATYA VISION. These features made monitoring much more reliable and easier for them. Project highlights : VMS Simultaneous User Licence - 3 Qty Mobile App (SATATYA VISION) Intelligent Video Analytics Benefits : Retention of existing Security infrastructure Reduces storage consumption with cost-saving features Centralised monitoring and management Real-time security
Health services and their funding have long been in the news, with social care and mental health coming in for particular attention. Both of these core areas are seeing a growing need for their services. While nationally this is a problem, there is good news in East Anglia with the opening of the 16 bedroom Samphire Ward at Chatterton House, a new acute care mental health facility in King’s Lynn, Norfolk. The build comprised of a refurbishment of two redundant wards linked to create one modern compliant 16 bed facility at a cost of £4m which is operated by North and West Norfolk Care Group, part of Norfolk and Suffolk NHS Foundation Trust (NSFT). NSFT provides inpatient and community-based mental health services in both Norfolk and Suffolk. It is also commissioned to provide in some of its localities, learning disability services, along with other specialist services including medium and low secure services and wellbeing. Continuim access control system Many of these sites use a legacy building access control system called Continuim The new facility is one of many sites across Norfolk and Suffolk that fall under management of the trust. Managing over 4,000 staff and controlling over 1500 access controlled doors across multiple sites. Many of these sites use a legacy building access control system called Continuim which is a bolt on module to Trend BMS, where all doors on this system are required to be wired on-line. Several years ago the trust wanted a more modern contactless access control solution for their facilities in Norfolk and Suffolk. They specifically wanted a solution that offered cost savings by not having to wire all doors. SALTO access control was chosen for fitting to new and refurbishment projects, with a view to possibly retro-fitting the new solution across all the existing sites on a rolling upgrade basis as time and future budgets allow. SALTO access control solution Security and Infrastructure Manager for the Strategic Estates department at the trust, Paul Evans, says “By choosing SALTO the trust were able to specify a mix of online and offline equipment. The cost saving for offline equipment enables the trust to specify more internal offline doors to become controllable as part of the access control system, thus giving us greater flexibility and security for our facilities.” Evans continues “Given the nature of our work and that some of our service users can have really challenging behaviour issues, it is vital that for their safety and that of the staff, we are able to control access simply and easily yet securely into and around the many different areas of the ward, the administration area and indeed the rest of the rooms in the building.” Contactless smart access control Reduced-ligature hardware working with contactless smart access control was needed in the user areas A standard off-the-shelf access control solution was not suitable as reduced-ligature hardware working with contactless smart access control was needed in the user areas together with anti-barricade doors, vision panels, automatic lockdown abilities, locker locks and a host of other special items and so we wanted a company with specialist experience in this field to carry out the supply and installation.” After going out to a competitive open tending process, local security specialist and certificated SALTO partner AC Leigh, based in Norwich, won the contract to secure the new facility. One of their lead designers, Simon Clarkson, worked with Paul and his team to design and deliver the system. Central monitoring system Clarkson, Health and Safety Director at AC Leigh says “We listened to what Paul and his team needed and especially how they wanted to manage and control the building and delivered a completely focused solution that allows central administration of the facility using hardware and software from SALTO Systems as the core of the solution.” On-line wall readers are used to control access into and around the building and these have been installed on main entry points, alongside bedroom doors and in ‘airlocks’ to control access from one area to another. SALTO slave control units Paul Evans says, “The latest SALTO online CU4200 control units were used on this project where data can be shared to SALTO slave control units via a single master control unit. This reduced the load on the already exhausted IT infrastructure which has meant that more online doors can be added to the SALTO system.” Bedroom doors are all fail secure with mechanical key override and are also anti-barricade. The facility has the bespoke ability to operate a standard 8 male, 8 female bedroom configurations. However, the trust wanted the flexibility to extend either male or female bedrooms to 10 bedrooms. This was achieved by two swing corridor doors. Electro-magnetic locks In standard operation, these powered swing doors are held open with electro-magnetic locks In standard operation, these powered swing doors are held open with electro-magnetic locks. In their swing scenario a key switch can be operated which releases the hold open magnet and energises the SALTO system powering a separate electronic locking device on the door. This enables the trust to easily maintain the required gender separation within the bedroom areas. Paul Evans comments “AC Leigh were able to configure the required solution easily and train the staff in its operation accordingly.” Aelement Fusion smart locks Other doors are fitted with Aelement Fusion smart locks. AC Leigh worked closely with the trust to design and manufacture special reduced ligature handles and reader covers to ensure that ligature points were reduced in conjunction with DHF technical specification TS001:2013 enhanced requirements and test methods for anti-ligature hardware. “The consultation between AC Leigh and the trust took several months with multiple prototypes being presented to the trust for approval.”, Evans says, adding “After looking at all the various options, the trust is happy that the best solution for this type of battery operated offline door has been chosen and installed at Chatterton house.” He also confirms that the bespoke design would be used as their preferred solution on future projects for this type of door. XS4 Mini locks Meanwhile in staff areas XS4 Mini locks are fitted. In open common areas, lockers are equipped with smart XS4 locker locks enabling each service user to have a secure storage place for their individual personal items. To operate the various doors, staff use their smartcard ID badges to gain access while service users use wristbands to access their bedroom, locker and certain permissible doors. SALTO SPACE electronic locking Tying all this together is SALTO SPACE a flexible, fully integrated electronic locking and software platform Tying all this together is SALTO SPACE a flexible, fully integrated electronic locking and software platform that enables operators to effectively manage every door and user access plan on-site via powerful web-based access control management software. Audit trail information from the doors is held for 31 days before deletion in accordance with the trust data policy. Simon Clarkson concludes “The client needed precise tailoring of access levels and the SALTO access control solution has empowered them with an intuitive, easy to use but adaptive system. The use of this standalone largely battery operated access control system will provide significant cost savings over the years to come compared with other systems, and will deliver a reduction in engineer call-outs and simplify system administration making for a long term secure and reliable access control solution for the trust.”
Round table discussion
Passwords are one of the most familiar elements of information systems, but also one that can be overlooked or underutilised. New alternatives are emerging, and the role of passwords is evolving in the age of the Internet of Things. We asked this week’s Expert Panel Roundtable: How is the role of passwords changing in physical security systems?
Artificial intelligence is on the verge of changing the face of multiple industries – from healthcare to entertainment to finance, from data security to manufacturing to the cars we drive (or that will drive themselves!) In the physical security market, AI has garnered a lot of attention as a buzzword and as a harbinger of things to come. We asked this week's Expert Panel Roundtable: What security markets are most likely to embrace artificial intelligence (AI)?
The ability to treat patients in a secure environment is a base requirement of hospitals and other healthcare facilities. Whether facilities are large or small, security challenges abound, including perimeter security, access control of sensitive areas, video surveillance, and even a long list of cyber-risks. We asked this week’s Expert Panel Roundtable: What are the security challenges of hospitals and the healthcare industry?