NEC Corporation, a pioneer in the integration of IT and network technologies, announces that its face recognition technology achieved the highest matching accuracy in the Face Recognition Vendor Test (FRVT) 2018 performed by the U.S. National Institute of Standards and Technology (NIST), with an error rate of 0.5% when registering 12 million people. NEC's technology ranked No. 1 in NIST testing for the fifth time, following its top placement in the face recognition testing for video in 2017. Th...
Door Group, a unit of ASSA ABLOY Opening Solutions UK & Ireland, launches two new high performance steel doorsets within its Powershield Security Doorset range. The new SR3 and SR4 steel door ranges, also known as Torr and Titan, have been developed from scratch to offer a product compatible with increased frame and ironmongery options, allowing greater freedom of design for architects and specifiers. Complete doorset solution The doors are suitable for an extensive range of sectors, incl...
The healthcare market is rife with opportunity for security systems integrators. Hospitals have a continuous need for security, to update their systems, to make repairs, says David Alessandrini, Vice President, Pasek Corp., a systems integrator. “It’s cyclical. Funding for large projects might span one to two years, and then they go into a maintenance mode. Departments are changing constantly, and they need us to maintain the equipment to make sure it’s operating to its full po...
When violence or a life-threatening incident occurs, hospitals and other healthcare institutions are often in the crosshairs. Hospitals increasingly face a reality of workplace violence, attacks on patients, and threats to doctors and other support staff. And even if violence happens outside a hospital – such as an active shooter at a public place – the local hospital must be prepared to respond to an influx of injured victims. When conflicts arise inside a hospital, there is an urg...
Manufacturer of security and access solutions dormakaba is pledging its support to National Fire Door Safety Week 2019, to raise awareness around fire door safety and robust specification. Launched in 2013 in response to a legacy of fire door neglect, Fire Door Safety Week is a mass awareness campaign designed to increase public understanding of the role that fire doors play in protecting life and property. Showing signs of wear and tear Aligned with British Woodworking Federation, dormakaba...
Everbridge, Inc., a pioneer in critical event management and enterprise safety software applications to help keep people safe and businesses running, announced a partnership with RiskBand, a provider of wearable, live-monitored safety devices for organisations and their workers. The alliance is part of Everbridge’s strategy to reach the broadest set of workers, including those that may not always have ready access to a mobile phone, such as a hospitality employee, in-home healthcare provid...
Access control manufacturer Inner Range is increasing its presence in the Middle East by taking on a dedicated sales advisor for the region. The company, which has an EMEA regional head office near Reading, Berkshire, has delivered several major projects in the Middle East in recent years. Issam Alhamdan has now joined the Inner Range team as regional sales manager for the Middle East and Africa and will cover sales leads and project delivery throughout the region. Growing business opportunities in Middle East Inner Range General Manger Tim Northwood, said: “I’m delighted to welcome Issam to our team. The success of our recent projects in the Middle East and the fact we were so well received at this year’s Intersec event made it a natural progression to expand our team and take on someone to manage local sales activity and grow our business opportunities in the region. I look forward to Issam having every success.” For Inner Range, Issam will continue to work from Abu Dhabi, covering clients and business leads across the MEAIssam Alhamdan began his career in sales with Alpha Data, a security integrator in Abu Dhabi, before working with access control manufacturers for more than ten years. For Inner Range, he will continue to work from Abu Dhabi, covering clients and business leads across the Middle East and Africa. Promoting Inner Range products He said: “I’m really excited to join Inner Range. It’s a great brand and suite of products and there are already leads from potential and existing clients to follow-up. There’s already a sense of momentum and I can hit the ground running. Initially, the focus will be on promoting Inner Range products more widely by approaching security integrators and consultants to ensure they understand the power, sophistication and scalability that Inner Range systems offer.” Inner Range has been a pioneer in the design and manufacture of intelligent security solutions since it was established in 1988. More than 150,000 Inner Range systems have been installed in over 30 countries. Customers include hospitals and high-security units, colleges, distribution centres and pharmaceutical companies, government and critical national infrastructure.
In a world where many electronic access systems offer greater convenience and flexibility than mechanical keys, what can really make the difference? Instead of being tied to mains electricity, what if one could carry the power with them? With a CLIQ wireless access control system, a battery inside each key powers all electromechanical CLIQ cylinders and padlocks. Authorised key-holders carry a single battery-powered key programmed with only their pre-defined access permissions. Keeping the solution’s power source independent of the locks and padlocks makes CLIQ management and operation more efficient. No need of cabling or electrical wiring Keys have a typical battery life of 5 years. When it is time to change the battery, anyone can do it. No expert needed, and no need to visit all CLIQ locks to reprogram or check their power. With CLIQ, all the power one needs is in their key. Because CLIQ devices are wireless and battery-powered, one does not need cabling around the doorCLIQ locks have other advantages, too. Because CLIQ devices are wireless and battery-powered, one does not need cabling around the door. There is no need for any invasive electrical wiring when one installs CLIQ key access control. And thanks to CLIQ’s menu of software options, one can decide how to manage users’ access rights. CLIQ Local Manager can administer their system via a local software installation; the CLIQ Web Manager runs securely in the cloud. ASSA ABLOY also offers a convenient Software as a Service solution option with round-the-clock support, maintenance and incident reporting as standard, and Service Level Agreements delivering data redundancy and up to 99.5% availability. eCLIQ wireless access system A fully electronic addition to the CLIQ portfolio, the eCLIQ wireless access system is built around secure microelectronics with AES encryption. Robust and durable, eCLIQ electronic cylinders are available for doors, cabinets, lifts, alarm boxes, machines and entrance gates. An integrated lubricant reservoir ensures they remain maintenance-free for up to 200,000 cycles. “This evolution of our award-winning CLIQ technology is already protecting businesses and public services across Europe,” says Stephan Schulz, CLIQ Product Manager at ASSA ABLOY Opening Solutions EMEA. “Organisations in a range of sectors, and with differing building types – from Italy’s Creval Bank to University Hospital Frankfurt – have learned that eCLIQ provides the control and flexibility their premises need.”
What could real-time access control do for your building security? In an instant, upgrading to real-time control boosts the intelligence of an access system, relaying live event reports and enabling you to change the security status of any door or user at any time. Real-time access control with wireless online locking provides options that do not exist with offline systems. With real-time functionality, facility managers get audit trails and change access rights for any door, user or credential instantly. You can lock or unlock any door remotely from the central admin software — which means no walking to the door in person and no delays when you need to take action at short notice. In schools, real-time wireless online access control enables security managers to remotely lock and open doors in any emergency, or whenever they choose. In hospitals equipped with real-time access control, staff see immediately who had access to drug stores or valuable equipment. Many more building types already benefit from real-time access control. Alerts are monitored in real-time, so you track and prevent any attempted unauthorised access Access anytime, anywhere Real-time access control relies on a network of communications hubs. These operate as a bridge between admin system software and access control door devices. In a SMARTair® Pro Wireless Online system, one communications hub links up to 30 wireless locking devices to the central system. Information is exchanged via an existing or new TCP/IP network, protected with AES-128 and SSL encryption. You can pass updates or read the event logs of any battery-powered SMARTair® escutcheon, knob cylinder, lock or wall reader anytime you choose. With real-time access control from SMARTair®, you can view the status of every door in your building at a glance. Alerts are monitored in real-time, so you track and prevent any attempted unauthorised access before it even happens. A real-time SMARTair® system alerts a facility manager in cases of intrusion, doors left open, low battery status, denied access or attempted use of any cancelled card or mobile credential.To amend door or time validity of any user credential takes a couple of clicks in SMARTair® admin software which you can access anytime and from anywhere. Plus SMARTair® gives you the option to combine wireless online and offline doors in the same system. You can fine-tune where you deploy real-time access control in different areas of your premises. Benefits for schools In an emergency, the school can remotely lock and open doors in real time via the admin softwareReal-time access control can impact your security and access management no matter what size or type your premises. At Westbridge Special Residential School, SMARTair® Wireless Online management proved a simple electronic solution for greater control and school security. Each staff member carries one RFID credential card programmed with access rights personalized to their role. In an emergency, the school can remotely lock and open doors in real time via the admin software.In Denmark, Vejle Friskole’s mechanical keys have been replaced by a SMARTair® online access control system. Over 80 doors and cabinets around the school are locked with SMARTair® wireless devices. Using the intuitive SMARTair® software, managers always have an overview of who has been at the school, and when. Audit trails are generated and monitored in real time using the SMARTair® system.
Contamination of clean environments could soon become a thing of the past, as Remsdaq launches its EntroPad range of access control readers, keypads and request to exit buttons with antimicrobial protection built in. Third party testing to ISO 22196:2011 proves the high-rated coating on the new EntroPad devices kills up to 99.99% of E. coli and Staphylococcus aureus bacteria over a 24-hour period. This makes the EntroPad range ideal for use in access-controlled areas in hospitals, laboratories, surgeries, and food manufacturing & preparation companies. Preserving the integrity of secure environments Robin Koffler, sales and marketing director at Remsdaq says: “Without antimicrobial protection, access control devices can become a breeding ground for a wide range of highly infectious bacteria. “Every card reader, keypad or request to exit button touched by an infected person becomes a virtual petri dish, incubating and potentially distributing bacteria to anybody who comes into contact with the device next. The new EntroPad access control devices help to eliminate this issue, reducing sick days caused by bacteria transmission and preserving the integrity of secure environments.” System agnostic, the EntroPad range is designed to work with any Wiegand-compatible access control system, including the Remsdaq Entro range of 2-door and 8-door controllers. An OSDP version will be made available later in the year.
Honeywell, a global pioneer in smart building technology and services, introduced the next generation of Enterprise Building Integration (EBI), Command and Control Suite (CCS), and Digital Video Manager (DVM), a suite of solutions enabled by the Honeywell Forge for Buildings platform, that help drive facility efficiency and oversight, streamline complex functions, and deliver savings across an enterprise. A key component to making this all work is keeping facilities and occupants safe. Along with EBI, CCS and DVM, Honeywell is launching a portfolio of enhanced cybersecurity solutions to help companies protect against the rising risk of unexpected attacks on data, network systems and building infrastructure. Keeping people safe and secure Our building operation teams help customers address building use and critical infrastructure challenges"“For buildings to be smarter, more efficient and effective, an operating system must be in place that works to constantly improve resource management,” said Mark Verheyden, president, Honeywell Building Solutions. “These systems help keep people safe and secure, enhance the building experience, and protect the data and processes that drive operations. The overall health of the building ecosystem can impact business success – just like great talent and experience. Our building operation teams help customers address building use and critical infrastructure challenges.” Transforming inputs into actionable outcomes These technologies leverage IoT connectivity, interoperable systems and data sharing, and adaptive workflows to help transform inputs and information into actionable outcomes. Key enhancements include: EBI R600 – The Honeywell building management system that helps connect, monitor and manage core building functions, from comfort to security to safety, and can help reduce upfront capital costs. The open IoT platform integrates with numerous third-party systems and equipment as well as cloud and mobile applications. With more than 23 years of market implementation, EBI has more than 150 million IoT connections in buildings worldwide. DVM R700 – An enhanced digital surveillance system that delivers a detailed view of operations and enterprise-wide integrated protection. Improved camera servers enhance views and reduce storage needs and hardware costs. CCS R300 – Facility visualisation application with intuitive interface that brings performance data to building personnel through enhanced map navigation and editing capabilities. Honeywell Forge for Buildings Honeywell Forge for Buildings is an integrated platform that connects operational data from assets, processesEBI600, DVM700 and CCS300 integrate with Honeywell Forge for Buildings, an enhanced category of software developed by Honeywell called Enterprise Performance Management. Honeywell Forge for Buildings is an integrated platform that connects operational data from assets, processes, third-party applications and people with machine learning to help customers improve their building performance and enhance performance and productivity with actionable insights. “Commercial building and critical infrastructure customers are often driving toward similar facility outcomes: streamlined operations, reduced costs, improved safety and security,” Verheyden said. “Efforts to reach these goals are markedly different for a hospital or an airport, for example. Within our enhanced integrated platform of offerings, operations teams can tailor services to help meet specific needs through new multi-windows and interactive options that are just a fingertip away.” Information Technology (IT) often receives the most attention when it comes to safeguarding the integrity of data and assets. Operational Technology (OT) – systems that monitor, control and protect processes, equipment and operational environments – can be another entry point, and often needs similar or more care in today’s ever-connected technology landscape. Honeywell Forge Cybersecurity solutions Honeywell is extending its cybersecurity services and products for the buildings OT environment to enable customers to better protect their assets and people. The Honeywell Forge Cybersecurity solutions include: Cybersecurity Assessment – A professional review of buildings OT systems using industry best practices to identify potential vulnerabilities or gaps. A detailed report is developed to establish a cyber-status baseline and a prioritised action list. Secure Design and Configuration – Design or modify existing OT infrastructure to enhance the physical, network and application layers and help reduce risk and mitigate unexpected costs. Cybersecurity Appliances and Software – The installation and maintenance of cybersecurity hardware and software including firewalls, Secure Media Exchange (SMX), advanced end-point security, and backup/restore appliances, to help monitor and protect OT systems, Cybersecurity Monitoring and Remote Management – Enables monitoring of OT systems and push alerts regarding performance or security issues. This can be extended to include Remote Management services, as well as Honeywell’s 24/7 Security Operation Centre (SoC) monitoring. Incident Readiness and Advisory – Establishes incident response processes that enable more efficient containment, triage and resolution to regain normal business operations in the event of an incident. “Increasing connectivity to OT systems typically enhances security, promoting visibility, and allowing previously unidentified security issues to be more efficiently realised. It is a more proactive approach to monitoring and maintaining the systems to be undertaken – the days of leaving OT systems unmanaged, unpatched and unmonitored are over,” said David Trice, vice president and general manager, Honeywell Connected Enterprise, Buildings.
Pelco, Inc., a provider of intelligent video surveillance solutions, releases the Sarix Professional (Pro) Series 3 Fixed IP cameras. Offered in mini-dome, bullet, box, and wedge configurations, these IP cameras deliver a balanced set of features and performance at affordable price points that allow for deployment across a wide range of indoor and outdoor applications, including low light and wide dynamic range capabilities with options of 1MP, 2MP, 3MP, and 5MP resolutions. Bi-directional audio communication Sarix Pro 3 cameras are ideal for industries such as commercial, government, healthcare, and education that demand a robust set of features, superior performance, and image clarity in an easily installed and maintained camera system. The Sarix Pro 3 Series delivers cost-savings with less bandwidth and storage requirements" “The Sarix Pro 3 IP Camera Series solves real security video challenges in a broad range of industries by providing more security detail in challenging scenes with excellent low light and wide dynamic range performance,” said Kevin Saldanha, Principal Product Manager. “In Healthcare and Education verticals, where vandalism and bi-directional audio communication is required, this camera series has models with IK10 vandal resistance and built-in microphones that can meet those requirements seamlessly. For Commercial industry-related needs that require several hundreds to thousands of high-resolution cameras with 24/7 monitoring on a limited budget, the Sarix Pro 3 Series delivers cost-savings with less bandwidth and storage requirements supported by h.265 video encoding and Pelco Smart Compression,” he concluded. Video compression standard Sarix Pro 3 IP camera series offers these key features: Clear detail in low light conditions with Up to 120dB True Wide Dynamic Range: These cameras can bring out detail in both very bright and dark areas to maximise visibility and are especially useful in environments that have both dark and light areas in one scene, such as entrances. Adaptive IR Illumination (Up to 50m for dome cameras and up to 80m for bullet cameras): With capabilities that produce detailed images in zero light, the adaptive IR Illuminator avoids overexposure that can hinder detection as objects approach the camera. One camera can provide wide, yet detailed coverage with resolutions up to 5MP at 30 FPS. This level of clarity allows customers to view license plate numbers and faces. Capture fast moving objects in Traffic, Gaming, Banking, and Commercial industries: 5MP camera models can stream 60 FPS for up to 4MP resolution. Conserve/minimise bandwidth and storage costs via h.265, the highest video compression standard, and Pelco smart compression technology. Flexible recording and viewing of video with three streams and optimised streams to save on costs. All three independent streams are configurable with video encoding (H.265/H.264/MJEPG), resolution, and frame rate. Enhanced detection and faster response ability by way of bi-directional audio with audio line-in and line-out. A built-in microphone is also included in the indoor dome camera. Flexible deployment in challenging environments with IK10, IP66, and IP67 ratings and a wide operating temperature. The cameras’ housings are built using metal construction and select camera models are ideal for areas prone to tampering and vandalism, like correctional facilities, hospitals, and schools. IP66 and IP67-rated models are available for water and dust protection, while environmental models can operate in extreme temperature environments (between –40° to 60°C). Faster, easier, and lower-cost installation with a single-wire PoE connection. 24VAC and 12VDC power options are also available for flexibility in installation. Integrated and industry standard compliant. These cameras work with VideoXpert on both H.264/H.265 and with Endura and Digital Sentry along with VxToolbox. They are also ONVIF Profile S, G, Q, and T compliant and work with well with third-party video management systems that conform to these ONVIF Profiles. Sarix Pro Series 3 cameras are available to be ordered now. Dome and bullet models ship in August, box cameras ship in September, and wedge models ship in October.
The healthcare sector is a crucial part of a functioning society as it provides life-saving care and reassurance to the population. A key part of ensuring the professionals in this industry have the best work environment is the ongoing security of the facilities. Overcoming environmental challenges Hospitals are challenging environments for security integrators. There is little room for mistakes because staff, patients and assets cannot be compromised. Medical centres and their facilities can be vast complexes and security teams must be confident in their ability to identify and nullify threats as soon as possible. Chubb provided Queensland Children’s Hospital's security team with a simple and easy-to-use tool Chubb Fire & Security offers a range of intelligent video and access control systems to solve these challenges. The Queensland Children’s Hospital in Australia, formerly named Lady Cilento Children’s Hospital, is the major specialist children’s hospital for families living in Queensland and Northern New South Wales. The facility not only provides care to the local families but also the state’s sickest and most critically injured children who need highly specialised care. This state-of-the-art hospital, coupled with a leading academic and research facility and the high calibre staff, provides a platform to continue to develop as a leader in paediatric health care, education and research. Comprehensive security solution Chubb developed a solution for Queensland Children’s Hospital that included access control, video management, communications and asset tracking. By creating a common infrastructure for all security systems managed through a comprehensive user interface, Chubb provided the hospital’s security team with a simple and easy-to-use tool that enables them to resolve situations as they happen and action events automatically on command. Chubb also developed a 3D model of the building that allows the security team to respond quickly to a wide variety of events. The protection of patients and staff is naturally a hospital's number one priority Also crucial to the implementation of security systems in a hospital is minimal disruption to its everyday operations. Professionals in hospitals are working 24/7 so there is little time when it comes to disabling security systems for maintenance or repairs. Continued maintenance and upgrades are vital elements to Chubb’s work and key to this is a great deal of collaboration with clinical and operational stakeholders. Securing mission-critical environment Hospital facilities are not always state-of-the-art and often face the slow upgrade process that a limited budget imparts. However, through the audit and update of security systems, steps can be taken to ensure continued operations without external disruption. The protection of patients and staff is naturally a hospital's number one priority and Chubb shares the same commitment to making sure the environment is safe and secure. Carrying out a technically demanding project in a large, mission-critical environment like a hospital takes strong teamwork, including expert strategic partners, and collaboration between stakeholders.
Managing IT and data risk is a challenging job. When we outsource our IT, applications and data processing to third-parties more and more every day, managing that risk becomes almost impossible. No longer are our data and systems contained within an infrastructure that we have full control over. We now give vendors our data, and allow them to conduct operations on our behalf. The problem is, we don’t control their infrastructure, and we can never fully look under the hood to understand and vet their ability to protect our data and operations. We have to fully understand how important this issue is, and ensure we have the right governance, processes and teams to identify and mitigate any risks found in our vendors. No longer are our data and systems contained within an infrastructure that we have full control over Today, everything is connected. Our own networks have Internet of Things (IoT) devices. We have VPN connections coming in, and we aren’t always sure who is on the other end of that connection. It is a full-time job just to get a handle on our own risk. How much harder, and how much larger should our teams and budgets be, to truly know and trust that our vendors can secure those devices and external connections? For every device and application we have internally, it is very difficult to even keep an accurate inventory. Do all of our vendors have some special sauce that allows them to overcome the traditional challenges of securing internal and vendor-connected networks? They are doing the same thing we are – doing our best with the limited human and financial resources allocated by our organisation. Risk stratification and control objectives The benefits of outsourcing operations or using a vendor web application are clear. So how can we properly vet those vendors from an IT risk perspective? The very first thing we need to put in place is Risk Stratification. Risk Stratification presents a few targeted questions in the purchasing process. These questions include – what type of data will be shared? How much of this data? Will the data be hosted by a vendor? Will this hosting be in the US or offshored? Has the vendor ever had a data breach? These questions allow you to quickly discern if a risk assessment is needed and if so, what depth and breadth. Risk stratification allows you to make decisions that not only improve your team’s efficiency, but also ensure that you are not being a roadblock to the business Risk stratification allows you to make decisions that not only improve your team’s efficiency, but also ensure that you are not being a roadblock to the business. With risk stratification, you can justify the extra time needed to properly assess a vendor’s security. And in the assessment of a vendor’s security, we have to consider what control objectives we will use. Control objectives are access controls, policies, encryption, etc. In healthcare, we often use the HITRUST set of control objectives. In assessing against those control objectives, we usually use a spreadsheet. Today, there are many vendors who will sell us more automated ways to get that risk assessment completed, without passing spreadsheets back and forth. These solutions are great if you can get the additional budget approved. Multi-factor authentication Even if we are using old-fashioned spreadsheets, we can ensure that the questions asked of the vendor include a data flow and network/security architecture document. We want to see the SOC2 report if they are hosting their solution in Amazon, etc. If they are hosting it within their own datacentre, we absolutely want to see a SOC2 Type II report. If they haven’t done that due diligence, should that be a risk for you? Today, we really need to be requiring our vendors to have multi-factor authentication on both their Internet-facing access, as well as their privileged internal access to our sensitive data. I rate those vendors who do not have this control in place as a high risk. We’ve recently seen breaches that were able to happen because the company did not require administrators or DBAs to use a 2-factor authentication into sensitive customer data sources. In the assessment of a vendor’s security, one has to consider what control objectives to use This situation brings up the issue of risk acceptance. Who in your organisation can accept a high risk? Are you simply doing qualitative risk assessment – high, medium and low risks? Or are you doing true quantitative risk analysis? The latter involves actually quantifying those risks in terms of likelihood and impact of a risk manifesting, and the dollar amount that could impact your organisation. So is it a million dollars of risk? Who can accept that level of risk? Just the CEO? These are questions we need to entertain in our risk management programs, and socialised within your organisation. This issue is so important – once we institute risk acceptance, our organisation suddenly starts caring about the vendors and applications we’re looking to engage. If they are asked to accept a risk without some sort of mitigation, they suddenly care and think about that when they are vetting future outsourced solutions. Quantitative risk analysis involves quantifying risks in terms of likelihood and impact of a risk manifesting Risk management process In this discussion, it is important to understand how we think of, and present, the gaps we identify in our risk management processes. A gap is not a risk. If I leave my front door unlocked, is that a control gap or a risk? It is a gap – an unlocked door. What is the risk? The risk is the loss of property due to a burglary or the loss of life due to a violent criminal who got in because the door was unlocked. When we present risks, we can’t say the vendor doesn’t encrypt data. The risk of the lack of encryption is fines, loss of reputation, etc. due to the breach of data. A gap is not a risk. Once we’ve conducted our risk analysis, we must then ensure that our contracts protect our organisation? If we’re in healthcare, we must determine if the vendor is, in fact, a true HIPAA Business Associate, and if so we get a Business Associate Agreement (BAA) in place. I also require my organisation to attach an IT Security Amendment to these contracts. The IT Security Amendment spells out those control objectives, and requires each vendor to sign off on those critical controls. We are responsible for protecting our organisation’s IT and data infrastructure – today that often means assessing a 3rd-party’s security controls One final note on risk assessments – we need to tier our vendors. We tier them in different ways – in healthcare a Tier 1 vendor is a vendor who will have our patient information on the Internet. Tiering allows us to subject our vendors to re-assessment. A tier 1 vendor should be re-assessed annually, and may require an actual onsite assessment vs. a desk audit. A tier 2 vendor is re-assessed every 2 years, etc. We are responsible for protecting our organisation’s IT and data infrastructure – today that often means assessing a 3rd-party’s security controls. We must be able to fully assess our vendors while not getting in the way of the business, which needs to ensure proper operations, financial productivity and customer satisfaction. If we truly understand our challenge of vendor risk management, we can tailor our operations to assess at the level needed, identify and report on risks, and follow-up on any risks that needed mitigated.
When asked about what the market should be thinking about in 2018, I am left offering an answer that serves as an urgent call to action: prepare yourself for change! The security industry is soon likely to see a dramatic shift from the traditional segmentation of commercial and residential security. Smart phones, mobile technologies, cloud computing, and having everything provided ‘as a service’ in peoples’ lives means users of buildings have a new set of expectations. In many ways, the coming crosspollination of residential and commercial security offerings means we will have a better idea of best practices. The convenience of residential spaces will combine with the robust security of commercial facilities, for example. But this also means a higher level of demand will be placed on security integrators, facility managers and owners. Operations groups may need to change drastically to offer new technologies. Security as a service is likely to become more common. And new technologies are emerging that will facilitate this change and require new skillsets and expertise. So, what the market should be thinking about right now is: how do we all, collectively, keep up? More critical is finding ways to offer or utilise new technologies and total solutions that make operations easier Ensuring security preparedness As it stands now, in terms of physical security for doors and openings, we are currently in a world where we can secure almost anything. Be it hospital, school, file cabinet, server rack, grain silo or barn that is off the electrical grid, we have a solution for that. So being hyper-aware of your industry, its offerings, and how the products work together is important, as it means every location that needs security can have security. But perhaps more critical is finding ways to offer or utilise new technologies and total solutions that make operations easier, moving security components deeper into a building, facility or campus, and building and leveraging on partnerships where everyone is invested in the other’s success. Here are a few suggestions for addressing these issues. Training in new security solutions Perhaps the biggest change in the near term will be emerging technologies that will alter how we currently use security solutions. Be it cloud-based security, intelligent keys, new types of credentials, or simply a better software for management, the need to be well-versed on these offerings is key. To this end, it is important to not only know what offerings exist in the security world, but also be well-trained on them. Seek out a manufacturer that is willing to offer training and education on products, strategies and solutions. While it is important to secure server rooms at the point of entry, it might also make sense to provide a cabinet lock with audit capabilities on the rack or cabinet itself Identifying an end goal Further, approach the integration and implementation of these technologies with a collaborative mindset. For dealers and integrators this means utilising new technologies to better secure a facility for a client. As a building owner or manager, it means making tenant and occupant life better while streamlining your own operations. The ultimate goal of any new technology is to meet customer needs in the very best possible way. And that goal should trickle down from manufacturer to integrator to the facility manager and ultimately the end user. Don’t just implement technology for the sake of doing so. Do it with purpose by identifying an end goal and utilising these amazing solutions to achieve that. Identifying an end goal also means seeking out the core requirements a building has to provide users with the expected level of security and service. This is obviously dependent on the building, and it doesn’t always mean physically moving into a building, but rather looking at ways to move further into the operations of a business. Securing access to buildings Government facilities are undergoing a transition to security requirements dictated by the FICAM programme For some businesses, keeping server racks or file cabinets secure can be critical. And while it is important to secure these rooms at the point of entry, it might also make sense to provide a cabinet lock with audit capabilities on the rack or cabinet itself. New opportunities also fall into this category. Government facilities are currently undergoing a transition to security requirements dictated by the Federal Government’s Identity, Credential, and Access Management (FICAM) programme. FICAM sets standards for implementation of secure access to all government facilities and mandates the use of FIPS 201 Personal Identity Verification (PIV) for federal employees and contractors. This means that PIV enabled access points will be required on the perimeters, interiors and other openings. Finding ways to retrofit these affordably, efficiently and effectively means offering more secure openings on what is likely to be a tight budget. This can also apply to offsite facilities. Earlier I mentioned barns and grain silos – locations that are often left off electrical grids but can come with the need for auditing capabilities – and a solution exists for that. So, while a corporate headquarters might be under robust lock and key, it is always good to ask about other locations that could use a simple security upgrade. Personal Identity Verification-enabled access points will be required on the perimeters, interiors and other openings Establishing security partnerships Again, the best way to achieve readiness with this approach is to be aware of the market and its offerings, and to engage in collaborative partnerships. Collaborative partnerships are critical for everyone who is tasked with protecting the people and places that matter most. Manufacturers rely on the integrators and building supervisors to understand the new and developing needs in the industry. Integrators then must rely on manufacturers to provide these solutions, offer education and training, and be in constant contact about the newest technologies available. Collaborative partnerships are critical for everyone who is tasked with protecting the people and places that matter mostAnd building owners or managers must both be aware of their tenant and end user needs and demands – be it for new technologies or even seeking out sustainability solutions. In turn, they need to know they can rely on a collaborative approach from an integrator and manufacturer who is invested in their success. Industry collaboration for a secure future Again, the biggest thing we must all need to consider now is how to prepare for the future. Treading water is simply not enough in the security market anymore. New technologies and performance expectations are forcing us to consider ways to better serve our clients – whether we are a manufacturer, integrator or in charge of facilities. And the best way to do this is together. We are all invested in the success of one another, and in the people who use the places we strive to keep safe. By seeking out, developing, and cultivating these partnerships in collaboration and innovation, we are able to help one another prepare for the future that is becoming more complex, intriguing and exciting every day.
For the security market, the ‘fine ranging’ capabilities of ultra-wideband (UWB) technology opens up a range of new uses based on the ability to determine the relative position and distance of two UWB-equipped devices with pinpoint accuracy – within centimetres. UWB is more accurate and secure, even in challenging environments full of interference, compared to narrow band wireless technologies. UWB technology transmits a large amount of data over short distances using a small amount of energy. It will be used in seamless access control, location-based services, and device-to-device services across industries including smart homes, cities, retail services, and healthcare. Increasing the accuracy of ranging measurements UWB technology will support any application that benefits from knowing the precise location of a connected deviceUltra-wideband is a mature radio technology that transmits information spread over a large bandwidth, as described by the IEEE 802.154 standard. A new, enhanced amendment to the standard – IEEE 802.15.4z – focusses on improvements to existing modulations to increase the integrity and accuracy of ranging measurements. Moving forward, UWB technology will support any application that benefits from knowing the precise location or presence of a connected device or object. This reflects a move from data communication to secure sensing. New capabilities of UWB are largely unfamiliar to the market, but a new Consortium – the FiRa Consortium – has a mission to educate the market, provide use cases, and promote UWB technology. Delivering interoperability across devices “With a consortium, we can better deliver interoperability across devices, software, and chipsets,” says Ramesh Songukrishnasamy, Director and Treasurer of the FiRa Consortium, and SVP & CTO of HID Global. “This creates a frictionless experience for the user, which is vitally important with a new technology. People are more likely to adopt emerging technology when it runs smoothly without interruptions or errors.” The FiRa consortium is ensuring new use cases for fine ranging capabilities can thrive" An industry consortium can create a UWB ecosystem of interoperable technologies instead of individual companies launching products that consumers struggle to make work together, says Songukrishnasamy. “Simply, the FiRa consortium is ensuring new use cases for fine ranging capabilities can thrive.” Founding members of the FiRa consortium ASSA ABLOY and HID Global, pioneers in secure access and identity solutions, are founding members of the consortium. Their technology manages access to physical and digital places, things, and identities. Another founding consortium member, NXP Semiconductors, is a pioneer in secure connectivity solutions for embedded applications. Other founding members are Samsung, which creates top-of-the-line TVs, smartphones, wearables, and other connected devices; and the Bosch Group, a global supplier of technology and services that is at the forefront of IoT innovations. Sony Imaging Products & Solutions Inc., LitePoint and the Telecommunications Technology Association (TTA) are the first companies to join the newly formed organisation. Immune to radio frequency interference UWB is also immune to radio frequency interference, so it functions in high traffic settingsUWB introduces higher levels of accuracy in positioning capabilities and increased security for ranging data exchange compared to existing technologies. Fine ranging with UWB technology can localise devices and objects to 10 centimetres of accuracy with or without line of sight. UWB is also immune to radio frequency interference, so it functions in high traffic settings. These capabilities will enable a variety of use cases like secure, hands-free access control in hospitals, location-based services for ride sharing, and targeted marketing for retailers. FiRa will demonstrate UWB technology at upcoming trade shows. The FiRa Consortium aims to build on IEEE’s work with an interoperable high rate physical layer (HRP) standard, including defining an application layer that discovers UWB devices and services and configures them in an interoperable manner. The consortium also plans to develop service-specific protocols for multiple verticals and define necessary parameters for applications including physical access control, location-based services and device-to-device services. Promoting the adoption of UWB solutions As a consortium, FiRa is not just setting standards but actively championing use cases for UWB technology. Creating the consortium addresses the need to develop interoperability and implementation standards; brings key players together to create a rich UWB ecosystem; allows for the sharing of intellectual property; and promotes the adoption of UWB solutions. The FiRa Consortium is committed to educating and promoting new use cases" “Since UWB is a mature technology with new potential uses, there is a general lack of awareness of potential applications that take advantage of the technology,” says Songukrishnasamy. “The FiRa Consortium is committed to educating and promoting new use cases.” The FiRa name comes from Fine Ranging to highlight UWB technology’s use cases and distinction from older UWB technologies and solutions. Enhanced security in challenging environments Fine ranging powered by UWB can outperform other technologies in terms of accuracy, power consumption, robustness in wireless connectivity, and security, especially in challenging, high density environments. UWB previously served as a technology for high data rate communication and as such was in direct competition with Wi-Fi. Since then, UWB has undergone several transformations: UWB has evolved from an OFDM-based data communication to an impulse radio technology specified in IEEE 802.15.4a (2ns pulses with Time of Flight); and A security extension being specified in IEEE 802.15.4z (at PHY/MAC level) makes it a unique secure fine ranging technology. Moving from data communication to secure ranging allows ‘spatial context capability’ to be utilised by a variety of applications: seamless access control, location-based services, and device-to-device (peer-to-peer) services. Information is available at firaconsortium.org.
Critical infrastructure facilities are vulnerable to many security challenges, from terrorism to natural disasters. Challenges also include vandalism, theft, employee identification and verification, access control, regulations, and the increasing infiltration of connectivity and the Internet of Things. In addition, many critical infrastructure facilities are housed in harsh and hazardous environments, which adds to the challenges to keep employees and facilities secure. The security risks facing a utility, telecom provider or other critical infrastructure facilities can have far-reaching consequences, including major disruption of core services. It’s essential to minimise the risk of any incidents that could disturb operations and lead to a loss of income or fines. Providing security to critical infrastructure often requires incorporating legacy systems, integrating siloed solutions and automating error-prone manual operations. Data capture form to appear here! Locks remain essential CLIQ locking system from ASSA ABLOY can simplify security and workflow for critical infrastructure entitiesAs a tool to address the complex security scenarios facing critical infrastructure, locks are indispensable. In critical infrastructure environments, locks are often required to be resistant to extreme temperatures, dust and toxic substances, fire and explosions. Locks must also perform in environments that are even more challenging, including rain and manipulation. Critical infrastructure facilities can benefit from a high-security locking system that combines electronic and mechanical security; in effect, providing an intelligent combination of both. CLIQ locking system from ASSA ABLOY can simplify security and workflow for critical infrastructure entities. With terrorism posing a serious threat, perimeter fencing, doors and their locks are the first line of defense against potential intruders at installations such as chemical and power plants, gas terminals, oil refineries, utilities, transport, hospitals, research facilities and other major areas which need controlled access. With terrorism posing a serious threat, perimeter fencing, doors and their locks are the first line of defense against potential intruders CyberLock smart keys CyberLock electromechanical lock cylinders and smart keys record access details of who opened, or attempted to open, every lock, providing critical information when investigating a security breach. In addition, CyberLock enables users to instantly add or delete electronic keys. This eliminates exposure due to lost or stolen keys, and also allows users to assign customised access privileges based on time, date, and authority level. CyberLock cylinders are designed to operate in a variety of applications where high security is required, such as entry gates, chemical feed areas, watersheds, and other water sources. The system’s electronic keys cannot be duplicated or copied, and can be deactivated if lost or stolen, thus reducing the risk of unauthorised entry. Key management solutions Traka has been a source of key management solutions, providing asset protection and process controlThe flexibility and protection of key management is another area of improvement that critical infrastructure companies are benefitting from. With multiple facilities sited at different locations, staff can quickly be granted authorisation to access keys with the press of a button, allowing supervisors to adjust their security based on the needs of the business. Because of the customisation ability, the use of key management systems is continuing to grow throughout the utility sectors as assets increase and varying levels of access management can be set through the system. Traka has been a source of key management solutions, providing asset protection and process control for the industry with smart cabinets and lockers integrated alongside efficient software.
Facial recognition has seen huge breakthroughs since the U.S. National Institute of Standards and Technology (NIST) first began testing in 2010. Accuracy has seen massive gains, especially from 2013-2018. In the 2018 test, the most accurate algorithm was 20 times more accurate than the 2013 equivalent. Essentially, 95 percent of the matches that failed in 2013 now yield correct results. Compare that to 2010-2013, when the most accurate algorithm reduced its error rate by 30 percent. This reduction in error rates since 2013 is due to wholesale replacement of the old algorithms with new ones based on deep convolutional neural networks — completely revolutionising the technology. Optimal recognition results SAFR says it delivers optimal recognition results with 99.86 percent accuracy in under 100 milliseconds One entrant in the newly energised market is RealNetworks, whose SAFR for Security is an AI-based facial recognition solution for live video that integrates video management system (VMS) solutions. With 24/7 monitoring, SAFR detects and matches millions of faces accurately in real time, enabling teams to manage a watchlist across any number of video feeds. SAFR says it delivers optimal recognition results with 99.86 percent accuracy in under 100 milliseconds, even in real-world conditions where faces are in motion, at different angles, under poor lighting, or partially obscured. SAFR builds on RealNetworks’ 23-year history in video technologies. Launched in July 2018, SAFR — secure, accurate facial recognition — is enabling new applications for security, convenience, and analytics. Create security responses “We seek to be the world’s most trusted facial recognition platform and are delighted to partner with customers in the security industry and elsewhere to shape a more secure, convenient future worldwide,” says Dan Grimm, Vice President of Computer Vision and General Manager of SAFR at RealNetworks. “Security professionals are asked to keep us safe 24/7, monitoring a burgeoning number of cameras, and we help make them more effective.” SAFR targets facial recognition for live video, identifying camera-unaware faces moving in real-world conditions. In the April 2019 NIST results, SAFR tested as the fastest and most compact solution among algorithms with less than 0.022 False Non-Match Rate — 62 percent faster than the average speed, according to the company. SAFR now provides capabilities such as live video overlays alerting security professionals to events in real time, automatic bookmarks with rich metadata for investigative work, and alerts that can be customised to create security responses. SAFR uses one-sixth the compute power of competing facial recognition solutions Facial recognition algorithms Five years ago, facial recognition algorithms would struggle to match forward-facing people from still images, let alone camera-unaware moving faces from live video with variations in rotation and tilt. SAFR says they have achieved a balance of accuracy and performance for live video. A contributor to this accuracy is consistency across a range of skin tones. The algorithm was trained on a highly diverse global set of over 10 million non-simulated real-world faces. SAFR was optimised for speed and can sample a face multiple times during the same period of time as other algorithms, subsequently increasing its accuracy. SAFR achieves the performance through edge processing. Distributed architecture enables efficient bandwidth consumption, reducing the roundtrip latency of facial recognition speed to under 100 milliseconds. The savings lower total cost of ownership (TCO): SAFR uses one-sixth the compute power of competing facial recognition solutions, equating to $500,000 or so in savings on a 250-camera deployment. Integrated experience SAFR also uses off-the-shelf hardware and is optimised to leverage inexpensive GPUs SAFR also uses off-the-shelf hardware and is optimised to leverage inexpensive GPUs. SAFR can be deployed on premises or in the cloud, and supports Windows, Linux, macOS, iOS, and Android. When SAFR is paired with a VMS, such as Milestone XProtect or Genetec Security Center, the integrated experience includes 24/7 monitoring to detect and match faces in real-time. Features include live video overlays within the VMS to identify strangers, threats, concerns, unrecognised persons, VIPs, employees, or other tagged individuals in live video. Real-time alerts can be customised for when persons of interest appear on a video camera feed. Additionally, automatic bookmarks with rich metadata make for easier investigative review of security footage. Facial recognition technology is increasingly in demand to improve safety across various industry verticals. Better customer experience Large enterprises with high-visitor flows and heightened security — such as transportation hubs, stadiums, universities, and hospitals — need to know in real time when persons of interest or those on watchlists appear on camera. Sports stadiums could apply facial recognition to deny entry to banned patrons, locate lost children, or recognise VIPs to deliver a better customer experience. Hospitals need access control to restricted areas and pharmaceutical storage closets Hospitals need access control to restricted areas and pharmaceutical storage closets. Airports and transit centres value traffic flows, demographic composition, and dwell times to help improve scheduling. SAFR for Security is available worldwide, and the company partners with VMS providers such as Milestone, Genetec, Digifort, and IPConfigure by Paliton Networks. They are actively working to support additional VMS solutions and have sales teams located in major metropolitan cities around the world. Security professionals “The job of the security professional is critical in today’s world,” says Grimm. “SAFR for Security helps mitigate the challenges of the important work security professionals do to keep us all safe.” In designing and developing SAFR, RealNetworks considered diversity and the uniqueness of each person; Grimm says their massive global training data set is a competitive advantage. SAFR is designed with privacy in mind. All facial images and signatures are AES-256 encrypted in transit or at rest. “SAFR is powerful enterprise-grade software that is continuously improving through innovation and many years of expertise,” says Grimm.
As in every health facility, security for the Haute Savoie region’s new hospital presented a complex challenge. Access control required multiple checkpoints and access rights tailored to individual staff and contractors. Real-time control, enabling managers to respond proactively including by opening and closing doors remotely, was another essential. To meet their security challenges, managers selected Aperio® locking technology integrated online with an ARD access management system. Because Aperio® locks are wireless, the hospital could introduce many more layers of security and secure doors without incurring excessive installation or operating costs, including for sensitive offices and drug stores. Central access system software Secure 128-bit AES encryption protects communications between Aperio® lock, hub and system Now staff no longer carry key bunches or waste valuable time hunting down relevant keys. All their individual permissions are stored on a single, programmable RFID credential. Alongside standard wired locking, the hospital chose 1,300 Aperio® wireless escutcheons, 10 Aperio® wireless handles with integrated RFID reader, and 301 Aperio® wall readers. A network of 228 Aperio® communications hubs connects every Aperio® lock wirelessly to the central access system software. All these battery-powered Aperio® devices integrate natively with the centralised access system, so wired and wireless access points at Centre Hospitalier Métropole Savoie (CHMS) are managed together, with real-time management logs, remote door opening and free time slot management. Secure 128-bit AES encryption protects communications between Aperio® lock, hub and system. Maintaining access control autonomously “Having just a single badge — and not having to carry around heavy keys — has been a major advantage for us,” says Béatrice Dequidt, Health Executive at CHMS. “This solution's advantage is it represents a single site from an authorisation management and systems perspective,” explains Aurélien De Riols, ARD’s Eastern Region Director. One single, intuitive management interface enables security teams to administer and maintain access control autonomously, as well as streamline laborious everyday tasks. “We have implemented internal HR management procedures, creating badges that are automatically integrated into ARD's operating software,” adds Alain Gestin, CHMS’s IT Systems Architect. Aperio and ARD maintain compatibility of credentials with the French government’s electronic Health Professional Card (CPS), for added staff convenience. For every site user, the advantages of carrying a single RFID-enabled badge — instead of multiple keys — are clear.
Leon Medical Centers is a privately-owned healthcare organisation with seven state-of-the-art facilities serving over 46,000 elderly and Medicare patients in Miami and neighbouring communities in Dade County, Florida. Established in 1996 by Benjamin Leon Jr., Leon Medical Centers is one of the largest and most prestigious primary healthcare organisations in the state. However, what really sets it apart is its rigorously enforced service philosophy of ‘personal attention at all times’ and its commitment to treating its patients with the ‘dignity, respect, compassion and human kindness that they deserve.’ Mobile video recorders Leon Medical Centers began deploying previous-generation March Networks mobile video recorders in 2011 In keeping with its commitment to exceptional service, Leon Medical Centers operates a fleet of 230 buses that pick up patients, take them to their appointments and return them home. To ensure their safety in transit and monitor compliance with its service philosophy, it relies on an integrated March Networks® RideSafe™ video surveillance solution. Leon Medical Centers began deploying previous-generation March Networks mobile video recorders in 2011. “We had another vendor’s equipment up to that point, but the system couldn’t support IP video,” said Erick Martinez, Leon Medical Centers’ Security Systems Manager. “At the time, we were using analogue cameras and wanted to upgrade to higher definition video. We were also experiencing a lot of issues with hard drive failures.” Hybrid network video recorders In 2014, Martinez began upgrading to RideSafe GT Series Hybrid Network Video Recorders (NVRs), and now has 120 of the new mobile recorders in addition to almost 200 older March Networks mobile DVRs. The RideSafe GT Series recorders are available in 8, 12, 16 or 20-channel models with hybrid capability allowing end users to migrate from 100 percent analog to 100 percent IP video. An embedded Linux-based operating system, ruggedised design offering protection against shock, vibration, dust and moisture, solid state electronics, and internal battery backup make the RideSafe GT Series recorders ideal for reliable operation in punishing mobile conditions. A hard drive mirroring capability ensures redundancy and storage flexibility, while health monitoring proactively alerts system administrators to hard drive failures, irregular temperatures or synching issues with cameras. Safety of our passengers Our patients are elderly, so if there’s a slip and fall incident, we want to have evidence of what happened" Each Leon Medical Centers bus is equipped with six March Networks cameras. Five of the cameras are mounted to capture interior views and the last is used externally to capture video of passenger entry and exit points. “Our focus is on the safety of our passengers,” said Martinez. “Our patients are elderly, so if there’s a slip and fall incident, we want to have evidence of what happened. We also use the system to confirm compliance with our service standards. Our drivers are the first and last points of interaction with our patients, so if there’s an issue, we want to be able to review and rectify it.” In the event of an incident in transit, the driver is able to push a button on the dashboard to tag the associated video. Diagnostic imaging services When the bus arrives at one of the clinics, the tagged video automatically down-loads through a Wi-Fi hotspot to a server for immediate review by Leon Medical Centers risk management personnel. While in range of a Wi-Fi hotspot, the system also downloads health alerts and can also upload any scheduled software updates or new device settings. For routine video downloads, there’s hardly ever a need for Martinez’s staff to board a bus. “Wireless downloading saves us a lot of time,” he said. “It makes incident reporting much more efficient when we need to have an issue resolved. It helps a lot.” The seven Leon Medical Centers are one-stop-shop facilities with onsite labs, pharmacies, diagnostic imaging services and dental clinics. Traveling to multiple locations Leon Medical Centers operates four Healthy Living Centers with modern gyms, exercise and yoga classes This convenient service model enables patients to see their family doctor or a specialist, have blood work done, get an X-ray and fill prescriptions without having to spend time traveling to multiple locations. Each center has a café, where patients can have a coffee and socialise. And to help patients stay fit, Leon Medical Centers operates four Healthy Living Centers with modern gyms, exercise and yoga classes, seminars and other programs. Patients who require surgery or a hospital procedure are picked up and delivered by Leon Medical’s bus transportation service. On arrival, they’re greeted and escorted to their destination by staff from Leon Medical’s Hospital Service Centers, which are located within all of the major Miami-Dade County hospitals. Aside from the seven centers and four Healthy Living Centers, Leon Medical operates a fleet maintenance garage and a 300,000 square-foot corporate headquarters. Video management software Martinez says that the fixed facilities are also being equipped with March Networks 8000 Series Hybrid NVRs, which are managed using the same March Networks Command video management software powering the mobile recorders. Having a single software solution to access and manage video - regardless of whether it’s recorded on a bus or in one of the medical centers - means that Leon Medical Centers doesn’t have to train staff on multiple software systems. It also provides the organisation with complete oversight of its clients and operations. Once again, it’s all about patient safety and service excellence. “If a patient loses a purse or a wallet, for example, we’ll be able to find it for them on one of our buses or in a clinic. Or if they have an issue with an employee, we’ll be able to review the video and take care of it,” said Martinez. Video surveillance infrastructure Martinez and his staff are trained to take full advantage of all the Command software functionality A Microsoft certified engineer, Martinez heads up a department solely focused on overseeing Leon Medical’s video surveillance infrastructure. “This department didn’t exist four years ago,” he said. “I was part of the IT department responsible for PC support. Mobile security was handled by transportation at the time. I thought it would be a good idea to create a separate department with IT expertise to look after mobile security, and senior management agreed.” Martinez and his staff are trained to take full advantage of all the Command software functionality. For example, they’re able to manage video viewing privileges to ensure users have access only to those cameras corresponding to their roles or responsibilities. They’re also able to take advantage of Command’s support for Microsoft Active Directory integration, which collects established user account information from Leon Medical’s corporate network directory. Patient safety and service excellence This allows them to select users from the company directory, assign a profile and customise their user interface to display the tools needed for their role. Looking ahead, Martinez and his team will be busy this year, as Leon Medical Centers continues to expand. We have four construction build-outs planned, including a four-story, 80,000 square-foot building" “We have four construction build-outs planned, including a four-story, 80,000 square-foot building and two parking garages - one six-floor and one seven-floor garage - so there will be opportunities for additional fixed video surveillance systems. Because we lease our buses for three years, we’re also always adding to our transportation fleet, so we’ll continue swapping out our 5308 recorders in favour of the newer GT Series.” “March Networks has served us well,” said Martinez. “Without a high-quality, reliable video surveillance system, we would have a much more difficult time fulfilling our commitment to patient safety and service excellence. It’s that simple.”
King Chulalongkorn Memorial Hospital (KCMH) is a public medical facility in Bangkok, Thailand. The hospital is operated by the Thai Red Cross Society and functions as the teaching/training medical center for Chulalongkorn University’s Faculty of Medicine as well as the Thai Red Cross College of Nursing. With 1,479 in-patient beds, it is one of the largest hospitals in Thailand. Bhumi Siri Mangalanusorn Building (BSMB) is the largest Centre for Medical Excellence in Thailand. The building has 34 floors and total area of 225,000m. Gallagher security solution benefits Can integrate with other systems, such as Symphony video management software, building automation, parking and fire alarm systems Has a user-friendly Graphical User Interface (GUI) Is highly reliable and scalable, to meet future security needs Can meet increasing compliance requirements Supported IT industry standards for integration, XML, SQL, OPC, BACnet, etc Gallagher and AES Group Ltd, the local Gallagher system integrator, worked closely with the designer to ensure that the proposed system met the tender requirements of securing the hospital and protecting staff, patients and assets. The system is fully integrated, scalable and expandable, digital-based, user-friendly and crucially, a combination of enhanced operational efficiency and cost saving. Gallagher Command Centre Through Command Centre, Gallagher’s site management solution, KCMH is able to integrate multiple systems Through Command Centre, Gallagher’s site management solution, KCMH is able to integrate multiple systems, including fire alarm, video management system, building automation and parking, and feed the information into Command Centre. KCMH Security Manager, Adul Karutbumrung, says having one central monitoring platform ensures operational staff quickly identify, locate and respond to any risks on site. “The Gallagher system provides us with a higher level of validated access control in critical areas”. Centralised operation platform Gallagher’s system streamlines operations for KCMH to lower total cost of operation through its centralised operation platform. The user-friendly GUI also delivers the best value to reduce training time. In addition to meeting KCMH’s requirements for security, privacy and compliance, Gallagher provides additional benefits and features not available in other systems. Its scalability ensures that future expansion requirements can be addressed in a cost effective manner.
The London Clinic has installed bespoke Traka solutions to ensure accountable authorised access and instant audit control capability for keys across its state-of-the-art hospital facilities. Harley Street’s globally renowned London Clinic is one of the UK’s largest private hospitals, dedicated to providing the best, personalised healthcare with a breadth of surgical and medical expertise. With hundreds of keys and access points in operation across the hospital, the Security and Operations team was reliant on a manual logging in and out system, which was proving inefficient and risked time delays to patient care. In sourcing a more innovative way to keep track of authorised access, especially to drugs cabinets and the Clinic’s 10 specialist theatre areas, Traka was installed and networked across the site. The benefits of instant audit control capability and additionally being able to set curfews for different staff rotas has already made a significant difference in the efficient running of the Clinic. Ensuring safety of staff and patients Traka’s system is a breath of fresh air to monitor keys and instantly be aware of their location"“The vision and values of the Clinic have been developed through working with our Trustees, management teams and staff. As part of this process, we pride ourselves on being ‘pioneering’ not only in our attention to medical care but also in establishing better and more efficient ways of working,” says Lee Humphries, General Manager Security Operations at The London Clinic. “This is across every aspect of The Clinic, right down to daily operations. Security and key management are integral not only to the efficient running of the Clinic but also to ensure the safety of our staff, patients and guests. Traka’s system is a breath of fresh air to monitor keys and instantly be aware of their location; allowing our staff to focus on delivering high-quality service.” In total, Traka has installed four networked key cabinets, which utilise its flagship Traka32 technology to provide all the administration tools needed for the Clinic to effectively manage operations from its server and still provide extensive real-time data capture. Enhancing the hospital functionality Within the system, the Security team has now set curfews so that keys not returned will automatically trigger a notificationWithin the system, the Security team has now set curfews so that keys not returned will automatically trigger a notification, sent via email and text. There is also an opportunity for authorised personnel to pre-book keys in advance, so they are reserved, which has proven especially useful to manage contractor access and work programmes. Ben Farrar, Traka Marketing Development Manager added: “Providing key management solutions for a hospital environment, such as The London Clinic, involves more than a choice of high-quality products and services – it encompasses best practices and an integrated approach to ensure the safety and security of staff, patients and visitors. “We worked in partnership with the Security and Operations team, right from the initial design process to create a bespoke Traka solution that could instantly enhance the smooth running of the hospital, without compromising on ease of use in emergency situations. And by adding Traka32 software, we achieved the requirements with the flexibility to create own central control over authorised access to critical keys.”
Ports of Jersey operate the island’s busy harbours and airports, providing high-quality services and facilities to enrich the experiences and journeys of their customers, with Jersey Marinas offering 1,000 berths across three award-winning locations close to the vibrant waterfront at St Helier. At very busy times of the year, such as the annual Jersey Regatta, the sheer volume of visitor traffic arriving from both land and sea can present serious problems. With particular challenges arising from managing car parking, and the issuance of port entry digital keys for boats harbouring. Smart access control solution Ports of Jersey needed a smart access control solution capable of managing short-term parking at St Helier harbour Ports of Jersey needed a smart access control solution capable of managing short-term parking at St Helier harbour. The system needed to be intelligent enough to manage complex bookings for use by berth and mooring holders dropping off and loading gear onto boats, before parking elsewhere long-term. The existing solution was no longer cost effective, and was open to abuse by some users. In addition, Ports of Jersey also required an upgrade to the out of date Jersey Marinas security gate access control system. At peak times this system needed to be able to cope with rapid, high capacity issuance of smart cards to vessel owners and boat crews wishing to access the marina and marina hospitality faculties. Smart installation SALTO partner JMH Technology was asked to provide a new car park access control solution and resolve the looming problem of needing to issue 1,000 cards, at a cost of over £100,000. A replacement car park access control system was installed based on new technology smart cards and 2,000 cards issued. This project was highly cost-effective with installation and card issuance totalling less than just card issuance on the previous system. Future savings also assured thanks to a choice of more cost-effective cards. Abuse of short-term parking has been cut, and the experience for visitors is improved. JMH Technology is in the process of adding more reader-controlled doors To drive yet more efficiency and further reduce overheads the system has subsequently been updated at both St Helier and Albert Pier car park, with smart installation of the latest SALTO access control technology. The upgrade continues, and JMH Technology is in the process of adding more reader-controlled doors and smart handles across the facility. Security assessment A full security assessment was carried out at Jersey Marinas, and a decision taken to replace all of the expensive and temperamental mechanical code locks with a full online access control system. By engineering a bespoke solution that integrated a SALTO kiosk system with a touch screen unit interface, Jersey Marinas staff are now able to allocate more than 500 cards during the high-tide window. With extra capacity on tap when they need it to cope with high demand at peak times, and valuable cost savings made. The SALTO system provided is technically robust and cost-effective to expand. As a partitioned system Ports of Jersey now have a global overview, with each department able to see the section relevant to them. This enables micro management of cost savings across equipment and cards and allows staff to get permissioned access to all necessary parts of the Ports infrastructure without delay.
Evelina has had many different brands of door entry system, as is often the case with NHS Hospitals spread across the UK. Managers at Evelina wished to have a standardised system across the wards in order to improve operating efficiency and reduce maintenance costs. Upgrades needed to be quick problem free and cost-effective. Each independent ward utilises a self-contained door entry system to control security critical access to their busy nursing area. The Maternity Ward provides a good example of a security critical area that requires an intuitive and cost-effective system to control access with the ability of a ward receptionist to permit entry and exit via an audio-video communication link. User-friendly features Fermax Area Manager Andy Saxton worked closely with Evelina’s nominated installation company to ensure that the Fermax system design using DUOX and VEO met the hospital’s needs. Based on 2 wires with aesthetically pleasing profiles and user-friendly features and functionality the Fermax DUOX system with VEO video monitors was a perfect match for the hospitals requirements. Purely digital in nature, the DUOX 2 wire system functions perfectly using most types of cable which meant that it could be retro-fitted onto the existing system infrastructure, thereby avoiding the excessive costs of re-cabling. Equipped with the Photocaller function which allows for the time and date stamping of visitors, the Fermax DUOX VEO monitor delivered the ideal solution.
Round table discussion
The ability to treat patients in a secure environment is a base requirement of hospitals and other healthcare facilities. Whether facilities are large or small, security challenges abound, including perimeter security, access control of sensitive areas, video surveillance, and even a long list of cyber-risks. We asked this week’s Expert Panel Roundtable: What are the security challenges of hospitals and the healthcare industry?
The new year 2019 is brimming with possibilities for the physical security industry, but will those possibilities prove to be good news or bad news for our market? Inevitably, it will be a combination of good and bad, but how much good and how bad? We wanted to check the temperature of the industry as it relates to expectations for the new year, so we asked this week’s Expert Panel Roundtable: How optimistic is your outlook for the physical security industry in 2019? Why?
For many years, cybersecurity was the unmentioned elephant in the room. Possible vulnerability of IP-connected devices to a cyber-attack was seldom, if ever, mentioned, and even the most basic measures to prevent such an attack were not implemented. For the last couple of years, however, the physical security industry has begun talking more about cybersecurity, in some cases with an abounding enthusiasm typical of the newly-converted. Have our discussions sufficiently addressed the long-standing lack of awareness? We asked this week’s Expert Panel Roundtable: Are we talking enough about cybersecurity? Or too much? (And why?)