Acronis, the globally renowned company in cyber protection, has released its annual Cyber Readiness Report, providing a comprehensive overview of the modern cyber security landscape and the key pain points faced by businesses and remote employees worldwide, amid the global COVID-19 pandemic. Acronis’ Cyber Readiness Report Acronis’ Cyber Readiness Report revealed that more than 80% of global companies admitted they were not prepared to transition to remote work, exposing key vulner...
Fugue, a cloud security SaaS company, announces support for Kubernetes security prior to deployment. Using policy as code automation built on the open source Regula policy engine, Fugue provides a unified platform for securing infrastructure as code (IaC) and cloud runtime environments using a single set of policies, saving cloud teams significant time and ensuring consistent policy enforcement across the development life cycle. With this release, organisations can now use Fugue to secure infra...
The past year has elevated consumer awareness about personal safety, from COVID-19 issues to social unrest, making safety top-of-mind and the need for personal safety solutions, even more prevalent. In addition, consumers spent more time at home, as schools closed, events were canceled and remote work increased. This prompted two major shifts that, in my opinion, most significantly opened the need for and raised the popularity of mobile safety solutions. Demand for grocery and food delivery...
Pyronix is pleased to announce the release of two Enforcer tablet kits; providing the easiest and most convenient way of purchasing the Enforcer V11 control panel with the brand-new 10-inch touchscreen control station, the AndroidTablet and HomeControlHUB app. Enforcer Tablet Kit 1 (Partcode: ENF-TAB/KIT1-UK) contains: 1 x Enforcer V11 all-in-one two-way wireless control panel with Wi-Fi built onboard the main PCB 1 x AndroidTablet (compatible with HomeControlHUB app) 2x KX10DP-WE - wirele...
Nice, a global manufacturer of smart home, security, home and building automation solutions, has announced that it has acquired Nortek Security & Control, LLC from Melrose Industries. Nortek Security & Control, LLC is a globally renowned developer of technology for security, home automation, control, power, AV and entertainment, access control, health, and Artificial Intelligence (AI) systems, for residential and commercial markets. Strategic acquisition With this acquisition and addi...
Today, we live in a technology-obsessed age. Whichever way you look, it’s hard to avoid the increasing number applications, products and solutions that continue to redefine the boundaries of what we previously thought possible. From autonomous vehicles and edge computing to 5G and the Internet of Things, all facets of our lives are continuing to evolve, thanks to an endless stream of differentiated innovations. In this article, we’ll be focusing on the latter of these - the Internet...
DigiCert, Inc., the provider of TLS/SSL, IoT and other PKI solutions, releases its 2021 State of PKI Automation survey that shows the typical enterprise manages over 50,000 publicly and privately trusted PKI certificates. Manually managing this volume of certificates can lead to costly outages if not handled correctly. Two-thirds have experienced outages caused by certificates expiring unexpectedly and 25% have experienced five to six such outages in the past six months alone. Due to these issues and others, there is strong interest in adopting PKI automation. Self-reporting deficiencies Pioneering organisations are six times more likely to have already implemented automation. They’re meeting PKI SLAs and doing a better job at self-reporting deficiencies. Nearly two-thirds of enterprises are concerned about how much time is spent managing certificates Nearly two-thirds of enterprises are concerned about how much time is spent managing certificates. They also lack visibility. Thirty-seven percent of enterprises use more than three departments to manage certificates, leading to confusion. The typical enterprise says as many as 1,200 of the certificates are actually unmanaged, and nearly half (47%) say they frequently discover so-called ‘rogue’ certificates (certificates that were implemented without IT’s knowledge or management). Digital certificate workflows “The volume of certificates has grown dramatically,” said Brian Trzupek, SVP of Product at DigiCert. “Further, validity periods for public TLS certificates have dropped from three years to one year since 2018. As a result, enterprises are finding it increasingly difficult to manually manage digital certificate workflows. They are looking for certificate automation, but need reassurance on how to do it and an understanding of the long-term costs and security benefits.” “Service failures due to PKI certificate expiry are a constant risk for all organisations, doubly so now with the shorter required renewal cycle,” said Michele Liberman, SaaS Operations Manager at Smart Communications. “There are high overheads for managing certificates, as each one needs to be monitored for expiry, requested, created and deployed. Automating to reduce risk and internal engineering grind makes great business sense.” Considering PKI automation The survey included a series of questions to determine how well (or poorly) each respondent was doing Most enterprises are considering PKI automation, with 91% at least discussing it. Only 9% say they are not discussing it and have no plans to do so. Most (70%) expect to implement a solution within 12 months. A quarter (25%) are actually at the stage where they're already implementing or maybe even finished implementing a solution. The survey included a series of questions to determine how well (or poorly) each respondent was doing across a wide range of PKI metrics. After the scores were totalled, the respondents were split into three groups: Leaders: Organisations that are doing the very best Laggards: Organisations that are doing the worst Middle: Organisations that are doing okay Minimising PKI security risks The Leaders and Laggards were then compared to examine the differences and explore what the Leaders were doing better. Leaders are performing two to three times better than Laggards in every area, including minimising PKI security risks, avoiding PKI downtime and meeting PKI-related SLAs. PKI Leaders are more likely to say PKI automation is important to their organisation’s future Laggards are seeing a wide range of PKI-related penalties, including lost productivity, compliance issues, loss of customers and even lost revenue. PKI Leaders are more likely to say PKI automation is important to their organisation’s future. Further, PKI Leaders are twice as concerned about the time it takes to manage PKI certificates. Learn more in the report about what Leaders are doing and the difference it’s making in their business. Certificate management processes DigiCert recommends that companies begin to address automation of their certificate management processes, including their business workflows, to ensure they continue to adhere to best practices in PKI deployments. This includes the following: Certificates: Identify and create an inventory of the entire certificate landscape, from TLS to code signing, client certificates and more. Remediate keys and certificates that are not compliant with corporate policy. Protect with best practices for issuance and revocation. Standardise and automate enrolment, issuance and renewal. Manual certificate workflows Certificate Workflows: Address unmanaged or manual certificate workflows, such as code signing, document signing, email certificates or other identity and access solutions, with software that centralises visibility and control and automates workflows. The survey was conducted by ReRez Research of IT professionals within 400 enterprise organisations of 1,000 or more employees in North America, EMEA, Asia Pacific and Latin America.
Keyless Technologies, the next-generation biometric authentication company, announces that they have been granted a non-provisional patent by the U.S. Patent and Trademark Office, for how they authenticate and preserve the privacy of a user's digital identity. The technology prevents organisations, third parties and even Keyless from accessing a person's biometric data as it is not stored on a device or any centralised location - a market first. That means the technology exceeds regulation, such as GDPR and CCPA. In the current era where security and privacy concerns are running high, this fundamental shift from the current approach for biometric authentication will have meaningful value for many industries and individuals concerned with privacy for digital identities. Utilising innovative cryptography "Our mission at Keyless is to provide people and organisations with a passwordless future, where the user is the key. We want to do it in a way that lets people login to any app or service, from any device, easily and safe in the knowledge that they have the privacy they deserve, and for organisations to maintain security and compliance for their systems and users. This patent demonstrates our commitment to that mission," says Andrea Carmignani, CEO and Co-Founder. The Keyless privacy-by-design technology utilises innovative cryptography and secure multi-party computing on the edge. When a user enrols with Keyless, their biometric template is encrypted, broken up into ‘shards’ and stored across multiple servers. Even if a server is compromised, the attackers would never have access to the complete dataset. Personally identifiable information The way Keyless technology processes and stores data means that it exceeds GDPR The user's template is also deleted from the device they used to enrol. When next they are asked to authenticate, the user looks into a forward-facing camera and their details are matched against the stored ‘shards;’ at no time is the full template ever restored. The way Keyless technology processes and stores data means that it exceeds GDPR (no personally identifiable information is stored) and in conjunction with partners, adheres to PSD2 SCA requirements. This is especially useful for highly regulated industries, such as financial services, or for industries that struggle with revenue leakage due to credential sharing, such as streaming media services. Keyless' technology ensures that it is the person and not a device, being authenticated in a private and secure manner. Subsequent authentication process The simple enrolment and subsequent authentication process is also designed to be as intuitive for the user as possible, to enhance user experience. "The intersection of user experience, privacy and security is a very hot space, right now," says Paolo Gasti, CTO. "There are multiple vendors and analysts out there talking about it, but no one has yet solved that conundrum. By investing in the research and developing our technology in a privacy-first way, we believe we've taken a big step in addressing it. And as we look ahead to up-and-coming technologies that will one day 'be the norm,' such as blockchain and services offering Self-Sovereign Identity, where privacy-by-design is a key tenet, Keyless technology will be able to support those too."
National Training Center (NTC) study books are commonly used by security technicians, locksmiths, and life-safety professionals, for self-improvement, company education, and to prepare for examinations of all kinds. From October 6 to October 8, 2021, save on NTC training book purchases, as the National Training Center has announced a flash sale on its publications. The sale applies to all the NTC training books and guides, including: Red Book | Fire Alarm Certification Guide Orange Book | Fire Codes at a Glance Blue Book | Low Voltage Systems Yellow Book | Video Security Systems Brown Book | Fire Alarm Systems Handbook Purple Book | Access Control Systems Handbook NTC’s distinguished lineup of training materials NTC's entire lineup of training materials is top shelf and highly respected, across the board NTC's entire lineup of training materials is top shelf and highly respected, across the board. They're often adopted by US states, as examination references and by commercial companies, as study guides for certification. For example, in the State of Florida, starting in October, 2021, the ‘Blue Book’ will replace two references that Florida State officials have traditionally allowed into the Electrical Contractors’ License Exam. The older reference materials were written in 1992 and 1999. State of New Jersey uses NTC's ‘Blue Book’ and ‘Yellow Book’ The State of New Jersey also allows use of NTC's ‘Blue Book’ and ‘Yellow Book’, in the State of New Jersey’s administered examinations and combinations of the same, including in electronic security system, fire alarm, burglar alarm, and locksmith exams. The State of Connecticut allows ‘Blue Book’ references, with the following state examinations, L-5 Limited Electrical Contractor and L-6 Limited Electrical Journey-Person exams. In addition, the State of Tennessee allows use of NTC's ‘Blue Book’, as a reference for their Burglar Alarm Qualifying Agent examination. Low-voltage examination books at reduced price For those individuals facing a low-voltage examination that involves security, access control, locksmith and life safety studies, all NTC training books are available at a reduced price, for a limited time only. They can buy one book for US$ 125 and buy five or more books for US$ 110 each.
Johnson Controls, the globally renowned company in smart, healthy, and sustainable building solutions is announcing the addition of body-worn cameras and autonomous robots to its physical security portfolio, along with the integration of package screening technology, powered by RaySecur. Intelligent technologies These intelligent technologies further strengthen Johnson Controls comprehensive building security portfolio and enable customers to extend the power of their systems, far beyond the capabilities of traditional access control and video surveillance. At Johnson Controls, we continue to enhance building technologies through digital transformation" “At Johnson Controls, we continue to enhance building technologies through digital transformation, by leveraging Edge AI devices that power the OpenBlue Platform," said Vijay Sankaran, the Chief Technology Officer (CTO) at Johnson Controls. Smart, autonomous buildings Vijay Sankaran adds, “Smart, autonomous buildings that continuously learn, adapt and automatically respond to the needs of occupants, and the environment are safer, more sustainable and more secure.” Johnson Controls Body-Worn Camera provides powerful personal protection, along with new methods for accountability, regulatory compliance and evidence management. Tightly integrated into Johnson Controls’ video management solutions, the body-worn camera offers optimised, live video streams, using Wi-Fi or cellular networks for applications, where real-time visibility is important. For recorded video, the body-worn camera automatically transfers its encrypted, secure recorded video into the video management platform. This allows operators to seamlessly search through body cam footage, as well as traditional camera footage, for a more complete picture of their organisation’s security. Johnson Controls Security Robots, powered by Ava Robotics, are a workforce multiplier for an organisation’s security staff, autonomously conducting event response, along with routine patrols and inspections, providing 360-degree video coverage and SIP audio communication capabilities. The robots improve situational awareness for security staff to diagnosis or diffuse an incident remotely. Equipped with video analytics that can monitor building occupancy levels, mask compliance, and object detection, the robots can promote a healthy and safe building environment, by measuring temperature, humidity, air quality and combustible gases, during inspections, with solutions, such as Johnson Controls C•CURE and Victor event alerts. Physical goods and packages often enter premises unchecked. These threats are now commonplace across many industries. RaySecur’s MailSecur all-in-one screening technology detects liquid, powder, weapons, explosives, radiation and suspected materials, with its safe electromagnetic radio waves. The integration with Johnson Controls’ security solutions means that scan results can now automatically trigger configurable responses, across building systems, in order to help mitigate incidents, for example, building lockdown or evacuation and communications with the building’s HVAC system, to prevent the potential spread of contaminants or smoke. The combination of these innovations provides a powerful improvement to overall security management. Combining mail screening technology, robotics, edge intelligence and deep integrations into building systems vastly improves an organisation’s ability to dynamically respond to new threats while enhancing building security and performance. Johnson Controls Security Robot The Johnson Controls Security Robot can be autonomously dispatched to the mail room, based on a threat For example, the Johnson Controls Security Robot can be autonomously dispatched to the mail room, based on a threat, where the onboard cameras can provide remote viewing from angles, which are not covered by fixed cameras. A security operator can control the main robot’s movable front-facing camera, thereby evaluating the need for a human response to the threat area, prior to dispatch. The command centre can employ the new Johnson Controls’ video wall solution, with its large format displays for optimal viewing of the robot footage, combined with streams from the MailSecur software, body worn cameras and other cameras, so as to quickly assess the threat. Leveraging Artificial Intelligence, IoT and robotics “Leveraging Artificial Intelligence, IoT and robotics in our security solutions will enable us to provide our customers with new levels of operational visibility, situational awareness and autonomous operation,” said Osvaldo San Martin, Vice President and General Manager, Johnson Controls Security Products. Osvaldo adds, “These technologies are among the first to be released from the OpenBlue Innovation Centers to accelerate bringing new technologies to market with our partners.” These technologies are expected to be available from Johnson Controls by the end of 2021.
Buyers who are serious about protecting the public and rooting out rogue elements in their security provision, at a time when events are restarting in earnest after over a year of lockdowns, should ask their security companies to evidence their approval to the code of practice for the ‘Provision of Labour in the Security and Events Sectors’. Mindful to maximise the benefit industry-wide and in the interest of all security providers and event organisers - and the public attending those events -– certification bodies operating in this sector and appointed by the SIA have come together to offer a labour provision scope of approval to their approved companies, protecting the public from rogue security workers, and security workers from the risk of exploitation. Rogue labour deployment NSI, ACM-CCAS and SSAIB share the view that the widest adoption of this code of practice for labour provision will best serve the public to good effect in deterring rogue labour deployment. Anyone involved in the delivery of security services, particularly in the events sector, will know the industry is immensely flexible in managing licenced security officer resources to accommodate its clients. The fundamental distinction between the two is often misunderstood or not even recognised by buyers It does this through two key proven methods a) Subcontracting and b) Labour provision. The fundamental distinction between the two is often misunderstood or not even recognised by buyers. The second – labour provision - falls outside the scope of ACS (Approved Contractor Scheme), even for ACS approved companies - and therein lies the loophole and the risk. A risk particularly in the events sector where their security may unwittingly be being compromised by the deployment of untrained, underpaid, unlicensed, non-security screened or worse – terrorism-motivated individuals. Less scrupulous operators The risk is compounded by less scrupulous operators undercutting the professional industry in labour provision at rates that strongly suggest immoral and, in some cases, illegal employment practices. Social media posts evidencing this are not hard to find. The over 800 security companies who maintain ACS approval granted by the Security Industry Authority are mindful that ACS signals to buyers a degree of professionalism and competence they rely on. Yet as with all approval schemes the devil is in the detail, and in the case of ACS whilst robust in its assessment process, its reach is limited to contractors themselves, and not their labour providers. Therein lies the ‘loophole’. Identifying this as a growing concern over the last few years, and one which many in the sector recognise, NSI developed a code of practice which has enabled approved companies to specify approval to the code as a requirement within their labour supply chain. Three assessing bodies NSI has also proposed the code be adopted by BSI in a new industry standard NSI has also proposed the code be adopted by BSI in a new industry standard. In addition to NSI, the code of practice is now being adopted and offered by ACM-CCAS and SSAIB which will result in a wider reach of labour providers being required to hold approval. Now, any company operating as a labour provider can apply for approval to this scope and will be audited annually against the requirements which include such checks as: PAYE being operated for all staff, national minimum or living wages is being paid, holiday pay and pension being provided, identity and right to work checks, screening to BS 7858 and ongoing SIA licencing checks. The three assessing bodies will be requiring all approved companies to use only labour providers approved to the code of practice or actively audit them to the requirements of the code – and evidence it – as part of their own ongoing approval.
Pyronix announces that the Enforcer on Tour is back to talk to the UK and Ireland professional installers about its latest all-in-one security solution, the new Enforcer V11, with AndroidTablet, HomeControlHUB app, and SmartPlug, as well as its extensive support services. Hosted at various distribution centres across the UK and Ireland (UK&I) throughout October and November, alongside online meetings, Pyronix Account Managers will be highlighting all the innovative new features, added-value, and upsell opportunities the brand-new solution delivers, with attending professional installers also able to claim a FREE £20 voucher (subject to terms and conditions). Innovative new features of Enforcer system “We can’t wait to bring the Enforcer on Tour back with our award-winning Enforcer system and the full capabilities the V11 brings, alongside the extensive full-package support we offer installers through GAP.” “With the unprecedented circumstances of the COVID-19 pandemic, it’s been a long time since we’ve been able to do this and we’re excited to bring it back with such a solution,” Laurence Kenny, Pyronix Marketing Director, said. One-on-one sessions With Account Managers not only on-hand at selected distributor outlets across the UK&I, but also available for one-on-one sessions and Zoom presentations, this is the most accessible Enforcer on Tour yet - giving professional security installers unprecedented access to see the latest evolution of the multi-award-winning “installer’s choice” Enforcer system. Professional security installers can see all the events taking place and register to attend via the company link. Covers installation requirements Incorporating security, automation, and video in one platform, Enforcer V11 takes security and control to new heights Incorporating security, automation, and video in one platform, which is conveniently accessed via the tablet interface, the Enforcer V11 takes security and control to new heights for homes and businesses. Featuring a range of new innovative features, including enhanced installation, Wi-Fi built onboard its PCB, unsupervised zones, and occupancy timers on zones, the Enforcer V11 practically covers any installation requirement. HomeControlHUB and SmartPlug The AndroidTablet enables users to surf the web, as well as open the dedicated HomeControlHUB app for complete control of the Enforcer V11. The installer can also use the interface as a portable keypad on maintenance visits while existing ProControl+ and Hik-Connect accounts can be connected to pull other Pyronix/Hikvision cameras on the property into view via HomeControlHUB. Meanwhile, the addition of the new SmartPlug provides value-added integration; enabling users to manage any plug-in appliance via HomeControlHUB on the android tablet, where they can also access their cameras and security. One-platform solution Enforcer V11 is a one-platform solution that provides access to camera streams and the controlling of smart devices “The Enforcer V11 marks a significant milestone in the development of the Enforcer system; a complete one-platform solution that protects the property, its occupants, the perimeter, vans, elderly relatives and much more, while providing access to camera streams and the controlling of smart devices around the home,” Laurence said. He continued, “The capabilities aren’t going to stop here either, as we’re already working on innovations that will continue to add value and longevity to the Enforcer V11 system, for both the professional installer and their customers.” By registering and attending one of the tour dates, professional installers can also claim a FREE £20 All4One voucher.
Most consumers are enjoying the convenience brought by electronic locks. With the existence of electronic locks, people no longer need to be restricted by keys. There are a variety of unlocking methods and more convenient remote control unlocking options. Suppose, you are going on vacation, and with the presence of an electronic lock, you can easily enter your house with your babysitter, without a spare key. Of course, not only smart homes, but also some infrastructure and commercial buildings are enjoying the convenience, brought by electronic locks. Passive electronic lock access control system This article will introduce a smart electronic lock used in the infrastructure industry, named passive electronic lock access control system. In traditional manufacturing, mechanical locks are commonly used in all walks of life, to protect the safety of property and facilities. However, the mechanical lock has caused many practical problems in the long-term application. For example, the keys are duplicated randomly, the unlocking authority cannot be controlled, the user's operation records cannot be known, and the remote control is not possible. Imagine that if you are in a remote telecom base station, it happens that you have the wrong key in your hand and cannot open the front door. In such a situation, this lock, maybe the worst scenario. In some industries, with a wide scope and large working area, more attention must be paid to access control systems Therefore, in some industries, with a wide scope and large working area, more attention must be paid to access control systems. In some outdoor scenarios, such as base stations and electric power cabinets, the requirements for access control systems are quite strict. Due to the particularity of its environment, ordinary power-based access control systems will no longer be applicable. Therefore, the emergence of passive access control systems has solved these problems. Electronic locks offer intelligent management function Based on years of in-depth field research, Vanma has developed the Vanma passive electronic lock access control system, based on the current situation of the industry. This system is different from other electronic lock systems, as it integrates the advantages of both mechanical locks and electronic locks. It not only has the simplicity of mechanical locks, but also has the intelligent management function of electronic locks. The term ‘passive’ of passive electronic locks means that no power is needed. Passive electronic locks have the same appearance as ordinary mechanical locks, so they can be installed anywhere, just like common mechanical locks. They also have a variety of practical functions of electronic locks. Authorised remote access control The Vanma management software allows security managers to assign access rights to specific areas, for different technical personnel. In order to facilitate real-time access control, the electronic key can be used in conjunction with the mobile phone app, in order to send information about its access rights to the technicians, in real time. Vanma management software can provide access to all operations performed by technicians Vanma management software can provide access to all operations performed by technicians, including complete audit reports. Access attempts outside the specified time range or outside the specified area can be obtained through the report, so as to analyse any abnormal situations. Access control in extreme weather conditions In the access control system, the lock (lock cylinder) maintains an extremely high standard and its protection level is IP67, to ensure the greatest degree of protection. Infrared induction technology is used in the electronic key, even if the surface of the lock is wet, the electronic key can also transfer the access authority to the lock cylinder. Ensure stable exchange of information between the key and the lock cylinder. In other words, a poor connection cannot prevent the transmission of information between the key and the lock. At present, this kind of passive electronic lock is widely used in many fields, such as telecom, electric power, water utilities, public utilities, medical emergency and so on in Europe.
Household adoption of smart home systems currently sits at 12.1% and is set to grow to 21.4% by 2025, expanding the market from US$ 78.3 billion to US$ 135 billion, in the same period. Although closely linked to the growth of connectivity technologies, including 5G, tech-savvy consumers are also recognising the benefits of next-generation security systems, to protect and secure their domestic lives. Biometric technologies are already commonplace in our smartphones, PCs and payment cards, enhancing security without compromising convenience. Consequently, manufacturers and developers are taking note of biometric solutions, as a way of levelling-up their smart home solutions. Biometrics offer enhanced security As with any home, security starts at the front door and the first opportunity for biometrics to make a smart home genius lies within the smart lock. Why? Relying on inconvenient unsecure PINs and codes takes the ‘smart’ out of smart locks. As the number of connected systems in our homes increase, we cannot expect consumers to create, remember and use an ever-expanding list of unique passwords and PINs. Indeed, 60% of consumers feel they have too many to remember and the number can be as high as 85 for all personal and private accounts. Biometric solutions strengthen home access control Biometric solutions have a real opportunity to strengthen the security and convenience of home access control Doing this risks consumers becoming apathetic with security, as 41% of consumers admit to re-using the same password or introducing simple minor variations, increasing the risk of hacks and breaches from weak or stolen passwords. Furthermore, continually updating and refreshing passwords, and PINs is unappealing and inconvenient. Consequently, biometric solutions have a real opportunity to strengthen the security and convenience of home access control. Positives of on-device biometric storage Biometric authentication, such as fingerprint recognition uses personally identifiable information, which is stored securely on-device. By using on-device biometric storage, manufacturers are supporting the 38% of consumers, who are worried about privacy and biometrics, and potentially winning over the 17% of people, who don’t use smart home devices for this very reason. Compared to conventional security, such as passwords, PINs or even keys, which can be spoofed, stolen, forgotten or lost, biometrics is difficult to hack and near impossible to spoof. Consequently, homes secured with biometric smart locks are made safer in a significantly more seamless and convenient way for the user. Biometric smart locks Physical access in our domestic lives doesn’t end at the front door with smart locks. Biometrics has endless opportunities to ease our daily lives, replacing passwords and PINs in all devices. Biometric smart locks provide personalised access control to sensitive and hazardous areas, such as medicine cabinets, kitchen drawers, safes, kitchen appliances and bike locks. They offer effective security with a touch or glance. Multi-tenanted sites, such as apartment blocks and student halls, can also become smarter and more secure. With hundreds of people occupying the same building, maintaining high levels of security is the responsibility for every individual occupant. Biometric smart locks limit entry to authorised tenants and eliminate the impact of lost or stolen keys, and passcodes. Furthermore, there’s no need for costly lock replacements and when people leave the building permanently, their data is easily removed from the device. Authorised building access Like biometric smart locks in general, the benefits extend beyond the front door Like biometric smart locks in general, the benefits extend beyond the front door, but also throughout the entire building, such as washing rooms, mail rooms, bike rooms and community spaces, such as gyms. Different people might have different levels of access to these areas, depending on their contracts, creating an access control headache. But, by having biometric smart locks, security teams can ensure that only authorised people have access to the right combination of rooms and areas. Convenience of biometric access cards Additionally, if building owners have options. The biometric sensors can be integrated into the doors themselves, thereby allowing users to touch the sensor, to unlock the door and enter. Furthermore, the latest technology allows biometric access cards to be used. This embeds the sensor into a contactless keycard, allowing the user to place their thumb on the sensor and tap the card to unlock the door. This may be preferable in circumstances where contactless keycards are already in use and can be upgraded. Smarter and seamless security In tandem with the growth of the smart home ecosystem, biometrics has real potential to enhance our daily lives, by delivering smarter, seamless and more convenient security. Significant innovation has made biometrics access control faster, more accurate and secure. Furthermore, today’s sensors are durable and energy efficient. With the capacity for over 10 million touches and ultra-low power consumption, smart home system developers no longer have to worry about added power demands. As consumers continue to invest in their homes and explore new ways to secure and access them, biometrics offers a golden opportunity for market players, to differentiate and make smart homes even smarter.
Small and medium businesses of all kinds encountered unprecedented challenges during the COVID-19 pandemic. And now that businesses have reopened, they are facing new obstacles through each stage of recovery. Business owners need to look for solutions that can help them manage these issues now and beyond. Challenges ranging from lack of cash flow to staffing challenges to IT security issues for businesses with remote workers can be lessened by security and automation solutions. One of the main challenges following the height of the COVID-19 pandemic for small and medium businesses is cash flow. Mitigating negative effects In the aftermath of the pandemic, both demand and supply chains continue to be disrupted, causing implications for cash flow across industries. Business owners can help mitigate negative effects to cash flow by finding more ways to save money A particularly impacted industry is retail, which continues to struggle due to reduced foot traffic. Business owners can help mitigate negative effects to cash flow by finding more ways to save money and helping prevent other crisis-level situations before they occur. Security and automation devices are an ideal solution to manage energy and monitor for situations that could cause damage or loss. Energy management: Smart lighting: With an automated security system, lights can be programmed to go on and off to give the illusion of an occupied storefront or can be easily turned off remotely if left on by accident. This can help keep energy costs down by only using lighting when needed. Smart thermostat: Business owners can also manage energy usage at one or many locations by using a smart thermostat and setting up automated schedules. For example, they can set their thermostat according to their open and close hours and lower the use of energy from those devices while the store is empty. Temperature and flooding alerts: Devices to measure unanticipated temperature changes or detect flooding can help a business owner act quickly to prevent damage or loss to stock and equipment due to extreme heat, cold, or a flood. After the crisis already endured during the pandemic, it is important that business owners have the chance to prevent further unexpected disasters. Medium business owners Staffing challenges are a prevalent issue for businesses across the nation Staffing challenges are a prevalent issue for businesses across the nation. Due to the lack of employees, small and medium business owners now must work more to help keep their businesses running. Security and automation solutions like remote system management, instant alerts and activity reports and professional monitoring can help them keep their business functional and protected even if they need to step away or check on another location. Remote system management: Business owners can use an app to lock and unlock their businesses or arm and disarm their security system 24/7 from virtually anywhere in the world. They can also ensure all doors are locked after the last employee has left for the night. This can allow them to keep their security level consistent even with fewer employees. With security cameras, business owners can take a live look into their business from anywhere using their mobile app. This is an especially helpful feature if a small business owner has multiple locations and wants to check in at another location from work or home. Instant alerts and activity reports: With an automated security system, business owners can get instant alerts to keep them up to date on what is happening at the business while they’re away. This helps owners stay in control even with reduced staffing or while new employees are being trained. Professional monitoring: Security systems with professional monitoring can help save lives and protect property, whether a burglar alarm or a fire alarm is set off in the business. When an alarm sounds, a live person will respond immediately and ensure emergency services are on the way. This can give business owners peace of mind while they are away from their business, knowing that their livelihood and life’s work is always protected. Physical security systems Cyberattacks increased dramatically during the pandemic, according to the FBI Another key change for small and medium businesses due to the pandemic is more employees working remotely. What many businesses overlook, however, is that remote workers that aren’t properly protected can cause a major threat to a business’s network. In addition to that, cyberattacks increased dramatically during the pandemic, according to the FBI, and small businesses need to stay alert. Just as with physical security systems, employing the right cybersecurity solutions can reduce the risk of cyberattacks. Cybercriminals are just like burglars-looking for easy victims without protection in place. Cybersecurity solutions like firewalls and VPNs (virtual private networks) can help protect the business network and beyond. Shielding business computers Managed firewall: Firewalls help protect against bad actors by shielding business computers or the overall network from malicious Internet traffic. Just one small error in the configuration could result in a hacker gaining access to credit card transactions, or other sensitive patient or customer data. A managed firewall service allows companies to receive the benefits of sophisticated firewall solutions and outsource the complexity associated with operating them. VPNs: Businesses can extend their firewall protection to wherever employees are working, including their homes, with VPN This is a crucial need in limiting risk due to the expanded post-pandemic remote workforce, which is expected to double pre-pandemic numbers by 2025, according to Upwork. Medium business owners As small and medium business owners encounter the difficulties of the post-pandemic ‘new normal,’ they can look to security and automation solutions to help keep them on their feet. Beyond that, security systems and cybersecurity solutions are a great investment to help ensure the protection of a small business both online and physically, while also providing convenience, insight and peace of mind to business owners.
Convergint Technologies’ rapid growth has come through a combination of organic growth and acquisitions — they have acquired 35 companies since 2014. Growth has been a focus since day one when the founders started the systems integration company with 10 colleagues in a basement. Today, the diverse company includes more than 5,000 employees globally. As technology has advanced and business practices have evolved, Convergint’s core values and beliefs have guided their path forward. Customer-centric approach Convergint’s culture is a critical aspect of the company, from the executive level to frontline colleagues. “It is essential that the companies we look to acquire and develop partnerships with directly align with our people-first, customer-centric, inclusive culture centered on colleagues and customers,” says Mike Mathes, Executive Vice President, Convergint Technologies. “This approach has allowed us to maintain and grow our number of colleagues across our acquisitions and enables us to continue being our customers’ best service provider.” Integration practices Many practices have to be form-fitted to each individual acquisition A simple but important consideration as Convergint grows through acquisitions is: No two companies are the same. While some integration practices can be standardised across the company, many practices have to be form-fitted to each individual acquisition, says Mathes. “Our objective is not to come in and immediately implement change. We want to build on what has already been successful within the local market and share our learned experiences. There is plenty we can learn from each other and create a much better organisation.” Mathes says that Convergint’s view of a successful acquisition is that 1+1=3. “The end result is always much more impactful than what we anticipated,” he says. “Every acquisition brings with it an experienced leadership team, dedicated and skilled colleagues, vertical market and technological expertise. Most acquisitions are in geographies where we do not already operate, so with every acquisition, we increase our capability to serve our customers much better.” Also, the network of Global Convergint Technology Centres (CTCs) helps expand clientele, and the Convergint Development Centre (CDC) offers new support capabilities allowing acquisitions to grow at a very high rate. Expanding service Are there more acquisitions to come? Mathes says Convergint is always open to further expanding its footprint across the globe, improving its ability to service customers, deepening their technical expertise, and continuing to expand service offerings across the current and new vertical markets. However, the current focus remains on several key factors: service to colleagues, customers, and communities. “While obviously, acquisitions fuel our growth, the addition of these organisations to Convergint has really improved our ability to service clients on a global basis,” says Mathes. Acquiring ICD Security Solutions in Asia, for example, made Convergint a pioneer in that market for U.S.-based multi-national companies. Meeting customers demand “Convergint does not weigh market conditions when making an acquisition decision,” says Mathes. Rather, they are primarily focused on meeting or exceeding their customer’s needs on a local to a global level. They see acquisitions as a potential way to extend their geographic reach so they can be closer to customers. An acquisition might also expand technological or vertical market expertise. “The end goal is for us to enhance our service capabilities by attracting and retaining talented colleagues and leaders to better service our customers,” says Mathes. Enhancing and expanding services Convergint identifies how to leverage the expertise to further enhance and expand current service options “Economies of scale” have not been a consideration. They have never sought to acquire companies and restructure them in the process, for example. Rather, each company brings forth a unique skillset, is carefully vetted by the executive team, and provides purpose in the company's mission and vision for the future.” “Frontline colleagues are Convergint’s most valuable assets,” says Mathes. Rather than restructuring and eliminating skilled, knowledgeable colleagues, Convergint identifies how they can leverage the expertise to further enhance and expand current service options for customers. “Our colleagues and their skill sets are our competitive advantage—they remain an essential element to our success,” says Mathes. Demand for integrator services “We continue to experience a growing demand for innovative solutions across electronic security, fire alarm, and life safety,” says Mathes. “As companies innovate further and rely on technologies such as artificial intelligence, cybersecurity, IoT, and cloud solutions, we expect to see an increased demand for integrator services. Our customers demand a local service provider who is responsive and can meet their needs, which is why Convergint aims to be its customers’ best service provider.” This year, Convergint is celebrating its 20th anniversary. In 2021, they will continue to focus on the same critical components that have dominated since day one taking care of colleagues, customers, and the communities where they operate.
Zigbee is a familiar name in the smart home arena, and the Zigbee Alliance is expanding its technology approach to address the challenges of the Internet of Things. As the Internet of Things (IoT) has evolved, the need has become obvious for stronger unity among brands and ecosystems to enable products within smart environments to work together more easily. Working to serve that need is the Zigbee Alliance, which seeks to promote collaboration in the Internet of Things by creating, evolving, and promoting universal open standards that enable all objects to connect and interact. Shifting the smart home market Their IoT effort took off when Amazon, Apple, Google and the Zigbee Alliance announced an industry working group in December 2019 to take the ‘best of market’ technologies from smart home standards, portfolios and ecosystems and to develop a ‘super spec’ that will be open, inclusive and a significant industry shift in the smart home market. Zigbee Alliance has been for a while now working on openness and interoperability" “Zigbee Alliance has been for a while now working on openness and interoperability, which has led us to the Project Connected Home over IP (CHIP), which is looking to unify the environment, under one technology, one certification program and one logo,” says Chris LaPré, Zigbee Alliance’s IoT Solutions Architect. “It really does fuel IoT possibilities, whether in security or any other sectors.” Project CHIP is a royalty-free connectivity standard that unifies brands and ecosystems into a single smart home automation system that operates any other technology based on Internet Protocol (IP). Simplifying product development The intent is to simplify product development for device manufacturers, broaden consumer choice, and to ensure easy discoverability, deployment and engagement to fuel connected living. “We have noticed that, as the IoT has evolved, there is a stronger need for unity, which is why we are developing Project Connected Home over IP,” says Jon Harros, Zigbee Alliance’s Director of Certification and Testing Programs. “It fits with the Zigbee Alliance’s goal to unify systems, and to focus on everyone using the same application at the top. It unifies that environment, whether you are integrating your system with Amazon Echo devices or connecting to Google Home.” Participating in development of Project CHIP are 125 companies of various types from around the world working together with more than 1,100 of their experts serving across sub-committees to formulate specifications and fine-tune the project. Home system technologies The original Zigbee protocol is used for many applications around the world, including smart homes Although the technology is being developed for the home market, the specifications have been formulated with an eye toward expanding into the commercial market in the future. Development of open, interoperable systems provides greater freedom for consumers to choose among the many technology choices on the market, without being tied to a single brand or ecosystem. Zigbee Alliance certifications and memberships span the globe, with roughly a third in Europe, a third in North America and a third in Asia. Involvement in Europe is slightly higher than the other regions. Alliance members represent manufacturing sites all over the world. Project CHIP is a newer initiative of the Zigbee Alliance, which previously developed Zigbee Pro to enable home system technologies to operate using IEEE 802.15.4 wireless signals on the 2.4GHz radio band over a self-healing true mesh network. The original Zigbee protocol is used for many applications around the world, including smart homes. Certification transfer programme Among the strengths of the Zigbee Alliance are years of experience certifying products, which includes testing them and confirming that they comply with the promoted specifications and functionality. The specifications are open standards that are developed in cooperation with all the companies that are Zigbee Alliance members. Another route is the certification transfer programme, in which a company chooses a certified white-label product, becomes a member of the Alliance, and then rebrands the product while retaining the certification. “It helps them get products on the market quickly while they build their own knowledge base,” says Harros. “All our work is focused on standardising the behaviour and functionality of products and making sure everyone is following the same standard to get interoperability,” says Harros. “Members all contribute to the standards.”
The COVID-19 pandemic has provided a double challenge to physical security systems integrators. For one thing, they have had to adapt their own businesses to survive and thrive during the pandemic. On the other hand, they have also been faced with new challenges to serve their customer’s changing needs. Global pandemic effects One integrator company, North American Video (NAV) took the now-familiar steps most companies confronted to adapt their business model to operations in a global pandemic – they suspended all non-essential travel and face-to-face meetings. At one point, NAV had a single employee in the New Jersey headquarters and another one in the Las Vegas office. The rest worked from home, with other offices opening as needed over the following weeks. Another integrator, Convergint Technologies, was able to adapt its approach to the pandemic, location by location, across the United States. The integrator benefitted from its leadership structure, with local managers in various regions who are autonomous and could react to what was happening in each region. Virtual workforce “We saw a dip in April and May, but since then, we have seen business pick back up,” said Mike Mathes, Executive Vice President, Convergint Technologies. The Business of Integration virtual conference sponsored by the Security Industry Association (SIA) “We already had tools and infrastructure deployed to support a virtual workforce. We had the software and the right equipment, and that has allowed us some flexibility to approach the repopulation of our offices in a gradual way.” The impact of COVID-19 on integrators and their customers was the main topic of discussion at a session on The Business of Integration at the Securing New Ground virtual conference sponsored by the Security Industry Association (SIA). Remote monitoring North American Video also benefitted from having technical personnel spread across the United States. By assigning work duties on the basis of geography, they could travel by car with less risk than air travel. They also increased their use of remote monitoring and support to avoid extra visits to customer sites. With 80% of the business in the gaming industry, North American Video saw a profound impact on their customers with the almost complete shutdown of casinos during the early days of the pandemic. Even though gaming was impacted particularly badly by the virus, NAV stayed engaged working on four or five large casino construction projects that continued throughout the shutdown. Revenue shortfalls State legislatures will approve more casinos to help plug the holes in their budgets Other casinos took advantage of empty facilities to make needed upgrades without worrying about disrupting casino operations. “A lot of our strong, long-term clients have sought to perform upgrades during the downtime, including needed service and maintenance,” said Jason Oakley, President and CEO, North American Video (NAV). “When gaming was closed, you were allowed in the facilities to work.” Oakley also sees long-term optimism for the casino business, which will offer a means for state and local governments to make up revenue shortfalls. “State legislatures will approve more casinos to help plug the holes in their budgets,” Oakley predicted. Demands for technology Oakley and NAV have seen an evolution in customer demands for technology in light of the pandemic. The trick is to differentiate between demand that is an immediate reaction versus technology trends that have more staying power. Although customers were keen on purchasing thermal cameras, for example, NAV did the research and recommended against the use of the technology to some of their customers. Artificial Intelligence for social distancing The use of artificial intelligence (AI) for a variety of applications seems to have more staying power. “One area of interest at a high level is modification and repurposing of AI for face mask detection, social distancing and people tracing, including integration into existing cameras,” said Oakley. “If the hospitality industry comes to terms with the new normal with smaller restaurant capacities, there may be an opportunity to use AI for social distancing.” Contact tracing and visitor management technology Mathes of Convergint sees a massive change as customers move toward managed services, accelerating the change with new use cases. We have an entire group that focuses on new solutions and what customers are looking for" As offices seek to repopulate when the pandemic subsides, customers are looking for new uses of existing technologies, added Mathes. “We have an entire group that focuses on new solutions and what customers are looking for,” he said. “They need to understand who is in the building and where they go in the building. If we know someone was only in the cafeteria from 10 to 11 a.m., we can know who was in the cafeteria at that time.” Opportunity for vertical markets to move forward He predicts technologies for contact tracing and visitor management tracking who’s in the building and where will be around for a long time to come. "Various customers and vertical markets are looking at the slowdown differently," said Mathes. "For example, while airlines have slowed down, the view from the airport market is more long-term." “They have 15-year plans, and [the slowdown] is an opportunity to move forward. In the technology space, data centres are expanding. “We try to focus our resources on areas where the money is being spent,” said Mathes. “Our K-12 group has seen an 80% growth over 2019. The money is tied to bonds, so there hasn’t been a slowdown relative to revenue.” He said Convergint is cautiously optimist about 2021.”
Dentsu International is an advertising and digital marketing organisation. With a clear passion for making the world a safer place, Dentsu is the only advertising holding company to be a member of RE100, a global initiative bringing together the world’s most influential businesses committed to 100% renewable electricity, which they achieved for all their global offices in 2020. “Our Resilience team has an ambitious target to reach 90% of staff and secure a 70% response rate when any critical event occurs. During a June 2020 earthquake in Mexico, our team reached 100% of the 400 employees affected with a 70%+ response rate in 20 minutes with the help of Everbridge.” Global threat landscape “As another example, during the early stages of COVID-19 in the Republic of Korea, our local management team saw the potential for a spike in cases and swiftly created a daily pandemic check-in to continually monitor the health and work arrangements of its employees. This poll has occurred every day for 7 months and is still receiving a 90%+ response rate,” said Adam Barrett. Dentsu needed capabilities to consistently communicate with people and protect assets Navigating an increasingly volatile and uncertain global threat landscape, Dentsu needed capabilities to consistently communicate with people and protect assets across its global operations when critical events occurred. Incidents such as the London Bridge attacks, civil unrest in Hong Kong, and natural disasters in Australia, the Philippines, and South America highlight the growing need to protect people in all locations. Missing enhanced capabilities Existing tools were used to send communications to employees, but were missing enhanced capabilities such as: Holistic reporting capabilities to show whether messages were being received and responded to. Distinct emergency communications, distinguishable from ‘ordinary’ communication tools. Internal collaboration tools to give security teams a holistic risk picture and plan the correct response. Streamlined structures and processes in place to help reduce the time of incident Furthermore, there was a requirement to not only provide risk intelligence, but to automate the validation of hyper localised incident alerts and their issuing. When it came to wider security incidents, there was a desire to introduce further automation and efficiencies in escalation. Critical event management Dentsu International deployed Everbridge to provide a step change to its critical event management capabilities. With Everbridge, Dentsu began leveraging tools that provided effective communication capabilities, robust visibility, operational efficiency, and real-time intelligence, including: 20+ new incident templates to prepare for the most likely critical events, such as extreme weather, natural disaster, contagious diseases, terrorist attack, and IT incidents. Streamlined processes across email, voice messaging, SMS, and the EVBG app starting from least intrusive/ personal to most, sending 3 cycles in 4 hours to maximise the potential for employee response. Internal collaboration tools and reporting for a proactive resilience practice, when incidents occur within a 1-mile radius of each business location, automated alerts sent via the Everbridge platform inform the appropriate local responder to assess the danger, take action, and communicate back, while informing a central team. Wider security alerts and communications to the appropriate regional security team depending on the time of day, that ultimately escalate right through to the leadership team if required. As a result, the Mean Time To Respond (MTTR) to these alerts has reduced to near guaranteed minutes. Minimising personal inconvenience Dentsu launched the service with an extensive internal staff awareness campaign which included direct communications from its leadership teams and utilised everything from townhalls and digital posters to pop-up games and competitions. The campaign familiarised employees with the service, how to update their contact details and reaffirmed their control of their personal data. Dentsu launched the service with an extensive internal staff awareness campaign The campaign raised awareness of the new security procedures, why they’re important and what staff should do when they receive an emergency communication. Events in Hong Kong (HK) are one testament to the impact Everbridge and Dentsu’s partnership continues to have on employees. At the beginning of the protests in June 2019, the HK incident team swiftly utilised the multi-modal capabilities of the Everbridge platform to communicate immediate changes in working arrangements to colleagues, thus minimising personal inconvenience, disruption and ensuring their safety. Monitoring local cases Similarly, in January 2020, the HK team informed colleagues of adaptations to working arrangements as the Coronavirus pandemic took hold. In March 2020, when infections were spiking and little was still known about the virus, the HK team moved quickly as part of a global recovery strategy to monitor local cases, change office access arrangements, provide clear guidance on next steps, quarantine protocols and further protect its employees - while other businesses were awaiting respective local governments for guidance. Dentsu International was recently recognised in the Everbridge Impact Awards 2020 as the winners of the best overall response to COVID-19 category. This forward thinking organisation has a clear passion and purpose for achieving meaningful progress for its clients as a force for growth and good, and is gaining a reputation among its employees, partners, and peers as a pioneer.
Dahua Technology, a globally renowned video-centric smart IoT solutions and service provider, will hold its 2nd online Dahua Technology Partner Day, from October 13 - 14, 2021, with the theme - ‘Building a digital future’. Dahua Technology Partner Day Adhering to its strategy of open cooperation, Dahua Technology is committed to creating a win-win ecosystem, with major technology partners around the world. This year, Dahua Technology will join hands with its 22 global partners, in order to discuss interoperability, share industry trends and explore the future of digitalisation and intelligence together. “We are excited to host our second virtual technology partner day. Technologies have evolved fast in the past year and the needs of digitisation, and diversified challenges facing different industries today, are driving the integration of security companies,” said Mr. Jiaqi Gao, Overseas Marketing Director at Dahua Technology. Jiaqi Gao adds, “It is a great opportunity to show how we can build a digital future together with our partners and through which, we can jointly provide the right solution for our customers.” Smart solutions for IoT and security on show A number of Dahua regional experts will showcase the latest Dahua innovations and products, in 6 different hubs During the 2-day event, Dahua Technology and its partners, including Vanderbilt, AxxonSoft, Immix and Optex, will unveil how their smart solutions benefit the field of security and IoT (Internet of Things). It will focus on Artificial Intelligence (AI), cloud solutions and alarm monitoring, as well as specific vertical markets, such as retail, smart building & facilities, critical infrastructure, transportation, etc. This year’s event will also include a section that demonstrates outstanding Dahua products and their compatibility with third-party solutions. A number of Dahua regional experts will showcase the latest Dahua innovations and products, in 6 different hubs, including cyber security & privacy protection, full-colour 2.0 and TiOC 2.0, WizMind portfolio, and more. Attendees can register free of charge, connect with presenters and get product information. Behaviour analytics in Artificial Intelligence (AI) “The Dahua Partner Day event offers a great platform for AxxonSoft, to present our solutions. We successfully exhibited on last year’s Traffic & Parking session and are excited to share more information about behaviour analytics in the AI hub, this year,” said Alan Ataev, AxxonSoft’s Chief Executive Officer (CEO), adding “Together with Dahua, we are enthusiastic about creating joint solutions that grow our value proposition for both our partners and clients.” With its mission of ‘Enabling a safer society and smarter living’, Dahua Technology will continue to focus on ‘Innovation, Quality and Service’, so as to serve its partners and customers around the world.
Property developers and residents at luxury apartment development - Live Oasis Deansgate, are the first to benefit from an all-encompassing building automation system, which is operable from one single app, designed by GET Dynamic, in partnership with Comelit and ASSA ABLOY Global Solutions. Smart mobile-first solution The new smart mobile-first solution, being debuted at Live Oasis in Manchester, enables property owners, YPP Lettings and Management Company Ltd, to more efficiently manage the 60-apartment site, via cloud-based technology. Apartment owners can also control all aspects of their home, including video entry calls, door opening and apartment automation, using just one single resident building application. Live Oasis Deansgate Located in the aspiring Deansgate district, Live Oasis is designed for students and young professionals Located in the aspiring Deansgate district, Live Oasis is designed for students and young professionals. With fully furnished studio, one- and two-bed apartments, it also features a concierge service, together with on-site security, all available for residents through the working week and supported by 24-hour CCTV. YPP Managing Director, Omar Al-Nujaifi, said “Manchester is a vibrant, creative and innovative city, and our latest development offers apartments for a modern generation of residents, who are not only looking for a stylish abode, but somewhere that is technology rich, sustainable and a connected place to live.” Access control and digital key functionality He adds, “For this to occur, we worked with each company, right from pre-project launch to achieve the desired, integrated result. GET Dynamic specified Comelit to provide fully-functional video door entry, without compromising on style or security, together with advanced access control and digital key functionality by ASSA ABLOY Global Solutions, all now operable from the main building app, ResiCentral.” Omar further stated, “The result is a unified experience that encompasses all the smart living features, expected by our future residents. The uptake of usage of the platform provides us with a unique window, into how we can better our delivery in the future.” Built-in smart hub and app capability Residents can benefit from the built-in smart hub and app capability, in order to control door entry security and access control, together with lighting, TV, blind automation and room temperature monitoring, and benefit from additional features, such as air quality, energy efficiency and occupancy monitoring. GET Dynamic’s Group CEO, James Baird, said “Our technology and platform is capable of bringing together every aspect of smart building automation in one system. Controlled by a single bespoke app, available in both iOS and Android, additional options provide customisable in-room tablet and streamlining, with our very own automation products.” Partnership with Comelit and ASSA ABLOY Global Solutions When selecting our specialist security partners, we have a long-established relationship with Comelit" He adds, “When selecting our specialist security partners, we have a long-established relationship with Comelit and know its video door entry systems are well-designed, robust and offer the latest smart video technology.” James further said, “The same is true for ASSA ABLOY Global Solutions. When brought together, Live Oasis presented the perfect opportunity to integrate the complete security operation into our app and offer an all-encompassing solution for a more enhanced user experience.” Integration with ResiCentral platform The virtual door entry and access control was integrated into the ResiCentral platform, with ASSA ABLOY Global Solutions’ technology for the building’s access control solutions, from perimeter protection to individual apartments. This also includes the ability for residents to gain convenient access to their accommodations, by using personal devices as a secure digital key. Comelit, with whom GET Dynamic has a close working partnership, was responsible for the IP door entry system installed at Live Oasis, operating from its renowned VIP technology. The system specified comprised two module video VIP entrance panels, together with a multi-user gateway, to allow for visual and audio individual apartment access. Smart home automation Stephen Wragg, Comelit’s Business Development Manager, said “Live Oasis is a development that really epitomises the bustling and vibrant nature at the heart of Manchester, being a city where work and lifestyle balance is central to a commitment to evolve faster and smarter, with modern technology and community spirit.” He concludes, “Right from the specification process, the objective was to utilise latest smart solutions, to enable property owners and residents alike, a unified mobile experience. This is where ResiCentral, together with the advances of home automation, inclusive of Comelit’s video door entry, combined to provide a single cloud-based solution. The result helps property developers create safer, smarter buildings and at the same time, enhance the resident experience, taking all-inclusive mobile capability to a whole new level.”
To keep an automotive manufacturing operation running 24 hours a day, auto manufacturers have utilised Kanban systems, lean manufacturing and just-in-time manufacturing (JIT) however these business processes require tracking of the inventory and materials within a manufacturing facility. Manufacturers that truly want to automate the replenishment process utilise automatic identification such as RFID to create real-time visibility into their manufacturing and inventory management process. One such automatic RFID replenishment system is from MSM Solutions called PortalTrack. This automated RFID and customisable software solution provides real-time visibility without disrupting workflow and can be seamlessly integrated into current manufacturing processes. Accurate inventory control The end result also provides for more accurate inventory control and will prevent lost revenue in mission-critical applications. MSM's PortalTrack system was successfully implemented in an automotive production site of a premium car manufacturer. MSM Solutions was able to work within the existing process flows without disrupting work in process and tailoring its PortalTrack Software to provide the required reporting and metrics that enabled real-time visibility for more informed decision making. As an automotive manufacturer, maintaining production without interruption is paramount As an automotive manufacturer, maintaining production without interruption is paramount. Having accurate real-time visibility allows the customer to know exactly what they have on hand, along with its precise location. PortalTrack enables visibility throughout the entire internal supply chain, thus enabling employees to make smarter decisions faster to insure production keeps running. Integrated RFID solution The goal of the premium car manufacturing project was to provide an automated real-time visibility solution utilising RFID to track and visually report work in process replenishment inventory to maximise uptime for a mission-critical 24x7 automotive manufacturing operation. The manual processes currently in place relied too much on human intervention resulting in production delays, inaccurate inventory counts and lost revenue. After an initial site assessment of a premium car manufacturer, MSM Solutions provided the customer with a completely integrated RFID solution. What drove this integration was finding a durable metal mount hard tag that provided reliable read ranges up to 20', develop a network strategy that entailed not directly interfacing the hardware and software components with the customer's network but utilising an IoT Network solution to manage the RFID read data, reduce deployment time, and provide a secure independent network. Cloud-based software MSM Solutions was able to overcome all of these challenges using their cloud-based software Also, it is important to note that the traditional ways of running hardware and software solutions directly on a customer's network are becoming increasingly more stringent due to security concerns, infrastructure costs, lack of IT resources and complexity of deployment. However, MSM Solutions was able to overcome all of these challenges using their cloud-based software and IoT network technology which takes the burden off of internal IT support, reduces costs, has zero maintenance for the end-user, along with providing security and allowing for rapid deployment. With a new car rolling off the line roughly every 80 seconds it is imperative that the right parts and the right counts be at each designated work station in the process. The parts replenishment process flow for the production facility works in a continuous cycle with parts flowing from the supply side of the facility to the manufacturing lines. Target inventory level Parts are placed on racks and assigned to a specific part number with a specific count per rack. The racks are equipped with durable metal mount RFID tags that identify the part number. Once the racks are loaded, multiple racks are then hooked to an automated tug which moves the parts from the supply side to the manufacturing lines. Each part number has a target inventory level that must always be on hand in the manufacturing facility As the tug travels, it passes 2 sets of RFID fixed readers and antennas; one set of RFID readers monitors inbound inventory to the manufacturing lines and another set of RFID readers monitors empty racks returning from manufacturing back to the supply side to be reloaded. Each part number has a target inventory level that must always be on hand in the manufacturing facility. As items enter the manufacturing side via the automated tug, the RFID tags are read and the inventory is automatically increased. Flat-panel monitors On the other hand, as empty racks exit the manufacturing side the RFID tags are read again, and the inventory is automatically deducted. The real-time inventory counts are displayed on large monitors throughout the facility and on a web-based dashboard for viewing on any device. Once a date was determined for the physical install of RFID, MSM Solutions installed all the readers, cabling, mounts, cellular devices and flat-panel monitors in a 2-day period. The PortalTrack customised software solution was live within 24 hours of the hardware installation. One key metric that was uncovered by MSM Solutions during this process was that once the system was in place, they were able to provide some travel and real-time analytics that drastically changed the customer's stated expectations. Real-time visibility The return on investment for the system was less than three months For example, the customer's perceived expectation for a particular parts cycle rate from supply-side to manufacturing was deemed to be on the replenishment cycle of ‘X’ when in reality the system showed the real cycle rate was ‘Y’. This was a key discovery in that MSM Solutions found parts that were not being replenished at the required cycle rate, parts that were not moving at all, and others that were traveling on paths that went against the workflow. The net gain of having real-time visibility into the production flows instantaneously allows management to react and institute the corrective measures so that production stays on schedule and replenishment efforts remain focused on the most critical parts at any given time. The return on investment for the system was less than three months and the project continues to expand to more applications within the facility. Internal security protocols A few key requirements for this installation were that the entire solution needed to operate independent of the customer's network based on internal security protocols, limited available IT support, infrastructure concerns and the need for rapid deployment. MSM Solutions bundled the company's new RFID module with its existing solutions MSM Solutions was able to customise a cloud-based Cradlepoint IOT Network coupled with the PortalTrack software that provided a solution that was secure, completely manageable outside the 4 walls, reduced the infrastructure costs, required no internal IT support and was easily deployable and expandable. By eliminating the manual data entry system, MSM Solutions bundled the company's new RFID module with its existing solutions. The result provided a fully automated system of goods receiving, automatic inventory updating, real-time visibility of production line consumption, and automated warehouse and vendor replenishment. Target inventory level The products and technologies suggested to the premium car manufacturing company included Zebra FX7500 readers, Times 7 5010 flat panel antennas, CradlePoint IoT devices, Xerafy Cargo Trak RFID hard tags, and 50" flat-panel commercial monitors. In many cases, customers have asked about dashboards that can easily display a real-time visual inventory report. The visual inventory report created by Portal Track is represented by 3 columns. Column A shows the actual real-time inventory count for a part on hand in manufacturing and provides a visual representation with a real-time count and a colour code of either green (target level met or exceeded) or red (inventory level low) when compared to the target inventory level. Column B displays the target count for an item to always be maintained in manufacturing, and column C displays the total count of all the racks available for an item. Improving inventory accuracy RFID adoption rates in the auto industry are steadily increasing and the applications are expanding RFID adoption rates in the auto industry are steadily increasing and the applications are expanding. Traditional barcode technologies rely too much on human interaction and are no longer sufficient in today's data-driven global economy. Having access to real-time information and analytics drives informed decision making that results in less downtime, increased sales, improved inventory accuracy and knowing an item's location instantly. RFID and PortalTrack enable connectivity that allows companies to identify, track, count and manage all of their assets from point of origin to point of sale. Due to the success of this initial project, MSM Solutions is piloting a new supplier-level project with the same automaker. For this project, MSM's PortalTrack software manages the printing and encoding, reading and analytics for an estimated 500,000 supplier totes that will be read at the receiving dock doors at the automotive manufacturer.
Fingerprint Cards AB (Fingerprints™) announces that the company’s new biometric solution for the PC market is integrated in the power button of the Latitude 5000 and 7000 Series of laptops from Dell. Thus far, Fingerprints has been awarded design wins with three of the world’s top five PC manufacturers. Consequently, they expect to be able to announce further PC models in the near future, which feature Fingerprints’ new biometric PC solution. Supporting different designs The solution is tailored for use across a growing number of different form factors and use cases “This product launch by Dell confirms the positive trend in demand for biometric authentication in consumer and enterprise PCs. Fingerprints is poised for continued growth in this segment, providing the perfect way to add convenient and secure authentication to PCs,” comments Ted Hansson, Senior VP Business Line Mobile at Fingerprints. Fingerprints’ new solution for PCs interfaces with Windows Hello and is compliant with Microsoft Enhanced Sign-in (SecureBio), meeting both the biometrics and security requirements of Microsoft. It can be used in combination with a broad range of Fingerprints’ touch sensors, and its software is compatible with the Windows 10 operating system. The solution is tailored for use across a growing number of different form factors and use cases, including notebooks, 2-in-1 convertibles, and PC accessories. Fingerprints’ portfolio of compatible touch sensors is available in various shapes, coatings and customisable colours to support different designs and placements.
Hyde Park is a premium residential complex of BI Group, a renowned construction holding company in Kazakhstan. This high-end project is located in one of the elite and ecologically safe neighbourhoods of Almaty, combining modern solutions and quality services with elegant British architecture. In addition to the traditional British mansion features, one of the main attractive qualities of this residential complex is its high level of security, thanks to a range of modern and smart solutions made by Yasar LLP (Yasar Group), which includes the intelligent residential solution from Dahua Technology. Dahua Intelligent Residential Solution The Dahua Intelligent Residential Solution provides an interconnected platform for property managers While bringing high-quality living experience to residents, the Dahua Intelligent Residential Solution provides an interconnected platform for property managers, to simplify operations and improve management efficiency in a visual way. To help Yasar LLP achieve their tasks, which include ensuring the safety of the residents, keeping the property of the apartment owners safe, as well as home owners’ requests for visual intercom with visitors, the project must be able to provide a video intercom system that supports both audio and video, integrates with third-party smart home apps, supports IP camera integration and preview, and allows several door opening methods, etc. Video intercom system with two-way audio support It required high-performance products with modern video technologies and quality services, which were successfully fulfilled and accomplished by Dahua products and solutions. Based on the client’s requirements, the Dahua team customised a complete solution including the successful development of a 10-inch Android indoor monitor that supports two-way audio intercom, video recording, remote door opening, message features, as well as installation and access to third-party smart home apps. Android indoor monitor installed This indoor monitor offers high brightness, high contrast and high sound intensity. It can provide a clear display interface, even in a strong-light environment and transmit clear two-way intercom sound, despite noise interference. In addition, the indoor monitor is equipped with dual network cards that can work at the same time. The wired network card is used to access the video intercom system, while the wireless network card is for third-party smart home systems. Flexible door opening options In the Hyde Park residential area, two different parking areas are provided for residents and their guests In order to bring modern and high-tech living experience to home owners, the solution provides flexible door opening options, including cards, fingerprint recognition, password, etc., in case they forgot to bring their key or access card. Alternatively, they can also open the door remotely using the mobile app or enter via facial recognition. In the Hyde Park residential area, two different parking areas are provided for residents and their guests. These parking areas are both under constant round-the-clock monitoring using the Dahua ANPR camera. At the same time, the camera’s real-time recognition algorithm allows vehicles to enter and exit automatically, without stopping and waiting, greatly improving traffic efficiency. 24/7 uninterrupted video surveillance Public areas and common spaces are comprehensively protected by a combination of 2 MP IR Mini Dome Network Camera, 2 MP WDR IR Mini Bullet Network Camera, 4MP IR Mini Dome Network Camera and other equipment. At the same time, the Dahua DSS platform was selected for centralised management, operation and maintenance. The Dahua Intelligent Residential Solution provides a highly secured and comfortable community for Hyde Park residential complex. It has 24/7 uninterrupted video surveillance, covering the whole residential area, including public areas, playground and lobbies. The Dahua Intelligent Residential Solution provides a highly secured community for Hyde Park residential complex It enables the communication between the residents and security system operators, as well as touchless access control to parking lots and residential buildings in addition to card, password and a physical lock. Advanced AI technology Now, residents can enjoy a smart and convenient living experience brought by advanced AI technology, make video conversations with guests, call security personnel for help, or manage all smart home control systems remotely. The Dahua indoor monitor integrates a visual intercom system and smart home system, which simplifies the tedious configuration process and saves input costs for integrators. Remote and visual management of properties Security guards at the entrance are not needed anymore, to manage entering and exiting vehicles, which saves labour costs, reduces the waiting time, and improves traffic efficiency. Moreover, it assists remote and visual management of properties, and improves the services and facilities offered in the residential community. “Thanks to smart residential solution of Dahua Technology, the safety and functionality of this residential complex has become more efficient. The cameras of the entire residential complex meet the latest innovations and instantly transmit data to the central observation point,” said Bagdan, a Yasar LLP Executive Employee.
Round table discussion
Residential security and smart homes are rapidly changing facets of the larger physical security marketplace, driven by advances in consumer technology and concerns about rising crime rates. During the COVID-19 pandemic, many people spent more time at home and became more aware of the need for greater security. As workplaces opened back up, returning workers turned to technology to help them keep watch over their homes from afar. We asked this week’s Expert Panel Roundtable: What are the trends in residential security in 2021?
Perimeter security is the first line of defence against intruders entering a business or premises. Traditionally associated with low-tech options such as fencing, the field of perimeter security has expanded in recent years and now encompasses a range of high-tech options. We asked this week’s Expert Panel Roundtable: What are the latest trends in perimeter security technology?
The topic of video analytics has been talked and written about for decades, and yet is still one of the cutting-edge themes in the physical security industry. Some say yesterday’s analytics systems tended to overpromise and underdeliver, and there are still some skeptics. However, newer technologies such as artificial intelligence (AI) are reinvigorating the sector and enabling it to finally live up to its promise. We asked this week’s Expert Panel Roundtable: What new technologies and trends will shape video analytics in 2021?
Protecting dormitory residents and assetsDownload
Protecting Critical Infrastructure through facial recognitionDownload
12 questions to ask your access control providerDownload
Providing frictionless cloud Video Storage as a Service (VSaaS)Download