The healthcare sector is a crucial part of a functioning society as it provides life-saving care and reassurance to the population. A key part of ensuring the professionals in this industry have the best work environment is the ongoing security of the facilities. Overcoming environmental challenges Hospitals are challenging environments for security integrators. There is little room for mistakes because staff, patients and assets cannot be compromised. Medical centres and their facilities can...
Access control manufacturer Inner Range will be rewarding lucky visitors to its stand with a drone every day of IFSEC International (June 18-20). Delegates who watch a demonstration of an Inner Range product will be invited to enter their details into the manufacturer’s flagship product, Integriti, and the system will randomly select a winner at the end of each day. Winners will receive a Holy Stone Mercury 3 racing drone, which can travel at 45km an hour and transmit HD video and aerial...
Craig Birch, Product Category Manager at UNION, outlines what the new grade 5 for BS 8607 includes, why it has been introduced and the benefits that it can help deliver. At present, mechanically operated push button locksets are not typically security products, but rather access control ones. For example, think about the last time you went to your local doctor’s surgery. No doubt there will have been a lock on the door behind the receptionist, protecting the sensitive information they hol...
Facial recognition has seen huge breakthroughs since the U.S. National Institute of Standards and Technology (NIST) first began testing in 2010. Accuracy has seen massive gains, especially from 2013-2018. In the 2018 test, the most accurate algorithm was 20 times more accurate than the 2013 equivalent. Essentially, 95 percent of the matches that failed in 2013 now yield correct results. Compare that to 2010-2013, when the most accurate algorithm reduced its error rate by 30 percent. This reduc...
Knightscope’s long-term mission is to “make America the safest country in the world,” says William Santana Li, Chairman and CEO. “The company was started six years ago as we had grown tired and horrified by the ongoing violence in our country and decided to do something about it.” But are security robots the solution to crime and violence in the United States? “There are 2+ million law enforcement and security professionals trying to secure 328+ million peopl...
Security expert Abloy UK is inviting visitors to IFSEC 2019 to learn more about its innovative new global vision, ‘Abloy - For Trust’, and meet the company’s new brand ambassador, Finnish motor racing icon Valtteri Bottas. Held on 18th – 20th June 2019 at ExCeL London, IFSEC International is Europe's leading security event and the only global stage committed to the future of integrated security. Valtteri Bottas - who is currently top of the Formula 1 leaderboard - will...
As one recent market report highlights, more and more organisations are switching to wireless access control to secure premises. Their motivations are well rehearsed. Wireless devices offer greater flexibility without sacrificing security. With integrated RFID readers, they are easy to retrofit to existing doors and buildings, giving security managers much more control over a site. And because they are battery powered and use almost no electricity when idle, wireless access control helps companies reduce energy bills. But choosing to cut the cables is only the first of many welcome choices when you switch to wireless. Wireless access control solutions Electromechanical CLIQ and fully electronic eCLIQ cylinders are available for doors, cabinets, lifts, alarm boxes, and entrance gatesWireless access control — including Aperio, SMARTair and CLIQ wireless locking from ASSA ABLOY — gives you the widest possible choice of credentials. You don’t even need to abandon physical keys. In ASSA ABLOY’s CLIQ key-based access control system, programmable keys with batteries power the cylinder or padlock via an encrypted interface. Electromechanical CLIQ and fully electronic eCLIQ cylinders are available for doors, cabinets, lifts, alarm boxes, machines and entrance gates. Users reprogram or revalidate their key access rights at wall devices, with portable programming devices or making a Bluetooth connection between the key and the CLIQ Connect mobile phone app. Compatible with RFID proximity protocols Card-based access control leaves your credential options wide open. Both Aperio wireless locking devices for upgrading access control systems and SMARTair access control systems are compatible with all leading RFID proximity protocols, including MIFARE, DESFire and iCLASS. Users can pick from standard smart-cards, tags, bracelets and other convenient formats, tailored to the site. Wireless escutcheons come with optional PINpads, for doors where multi-factor authentication is needed for upgraded security. In addition, a SMARTair system offers mobile-ready access. With SMARTair, administrators can open electronic door locks remotely. At the user end, the Openow app stores validated virtual keys on a smartphone, so there’s no need for anyone to visit a security office to physically collect or update a credential. SMARTair virtual keys can be sent or revoked over the air — for maximum, time-saving flexibility. Users just tap the SMARTair lock to open up via Bluetooth. Protection for various sectors ASSA ABLOY wireless access control protects single-unit shops and whole shopping mallsWhatever size your premises, and no matter what work you do, a wireless access control system fits. In the healthcare sector, our card-based access systems manage huge hospitals and small doctors’ surgeries — where optional anti-bacterial coatings preserve hygienic environments. ASSA ABLOY wireless access control protects single-unit shops and whole shopping malls; care homes and corporate headquarters. From Helen Oy power stations in Helsinki to ULab, Alicante’s newest co-working space, wireless is the right solution. Key-based access system CLIQ, for example, caters to complex, multi-location businesses with thousands of locks securing hundreds of employees, plus contractors who need access round the clock. Many utilities operate remote sites, miles from reliable mains electricity, and often at the mercy of extreme weather. None of these challenges stops CLIQ cylinders and padlocks delivering the trusted security critical infrastructure demands. CLIQ is not just for the giants. One user-friendly extension of the technology, CLIQ Go enables small business owners to manage an access system from a mobile app. A few taps on the screen is all it takes to cancel, issue or change the door permissions for an employee’s CLIQ key. Software accessibility via PC or smartphone Aperio devices integrate online or offline (or both) with access systems from over 100 different manufacturersWireless access control does not restrict your system management workflows. The backbone of every ASSA ABLOY wireless access system is intuitive software which makes it easy for facility managers to control, identify and update exactly who can open every door. For all ASSA ABLOY wireless access ecosystems, a user-friendly software interface is accessible from almost any standard PC, tablet or smartphone. It gives facility managers an instant overview of their site’s security status from anywhere. With Aperio wireless locks, you manage the new doors from the same interface as your existing access control system. Aperio devices integrate online or offline (or both) with access systems from over 100 different manufacturers. System administrators see only one, familiar admin interface. SMARTair offers a menu of management options from standalone operation through offline and Update on Card control to real-time control via SMARTair Wireless Online functionality. With wireless, the choice is yours.
Memoreyes, the developer of a smart, first-of-its-kind outdoor video surveillance system, is looking for qualified integrators to participate in its national dealer program. The company will provide integrators with training that centers on its patent-pending, Megapixel/HD–quality, pan-tilt-zoom camera system with machine learning. Memoreyes’ unique video offering provides an unprecedented set of advanced, almost human-like capabilities. Deter criminal activity “Integrators are a key part of our business plan,” says Memoreyes Founder and CEO John Collings. “Our Entrance System (Model 100) and All Property System (Model 360) go far beyond traditional outdoor cameras and opens up new opportunities for them to improve safety and deter criminal activity at multi-family housing, hospitals, campuses, office complexes, malls, and retail outlets and offer an entirely new category of managed services.” The Memoreyes system can quickly differentiate between authorised individuals and potentially hostile targets Thanks to this new technology, the Memoreyes system can quickly differentiate between authorised individuals and potentially hostile targets. Through machine learning (AI), it also intuitively anticipates potential risks and proactively responds to evolving situations using light, sound, and voice messages. Over time the system learns the habits and trends associated with each camera within a specific setting, enabling it to quickly identify departures from the norm. Strategically positioned cameras Collings, the original designer and founder of Uplink cellular service, says that one of the company’s biggest hurdles was to create a facility-wide WiFi system that would reliably work in an outside environment. With that solved, strategically positioned cameras now work in tandem to provide 360-degree tracking of residents, visitors, and vehicles on the property on an as-need basis. This means that the system can cover large outdoor areas with a handful of cameras as opposed to traditional systems that often require dozens or even hundreds to do the same job. While the primary objective of the Memoreyes Outdoor Video Surveillance System is to deter crime, a second benefit is the documentation of data collected before, during, and after an event has taken place. With its high-definition video, law enforcement can rely on this data for arrest purposes and a conviction in court of law. Concise license plate reading We have adopted comprehensive privacy policies, which protects owners, property managers, and residents" “We don’t rely on standard pixel-following methodology. Our sophisticated software is continually sampling the environment, analysing visual and auditory inputs against known patterns,” explains Memoreyes Co-Founder and CTO David Tattersall. “At the same time, we have adopted comprehensive privacy policies, which protects owners, property managers, and residents alike.” The complete system includes the entry/exit monitoring Entrance System that provides video of all oncoming, passing, and departing vehicles. This includes clear and concise license plate reading, even at night or in bad weather. Beyond the revolutionary technology is the price point. Because the system can cover large outdoor areas with only a handful of cameras, the cost savings can be substantial, as much as 75 percent less than alternative systems. The company offers an affordable leasing program which will save end users money in both the short and long term.
RealNetworks, Inc., global provider of digital media software and services, has announced SAFR for Security, a new solution that integrates SAFR, the world’s premier facial recognition platform for live video, with leading video management systems (VMS) to provide enhanced visibility and situational awareness for security professionals. Announced at ISC West in Las Vegas, SAFR for Security is immediately available for worldwide deployment. SAFR for Security Heads of security at hospitals, stadiums, corporate campuses, airports, and other enterprises must maintain high awareness over large areas via a growing number of security cameras. To know whether a familiar person, employee, VIP, perceived threat, concern, or stranger is onsite, security professionals must rely on their ability to focus on key details and then make accurate assessments. SAFR for Security makes it simple to maintain higher security in public and restricted areas in our facility" “It’s been a challenge to maintain awareness of who is present at Shelby American, whether those are specific individuals of concern or aggregate demographics of museum visitors,” said Richard Sparkman, Director of Technology, Fleet & Facilities at Shelby American car museum in Las Vegas. “SAFR for Security makes it simple to maintain higher security in public and restricted areas in our facility and helps us understand who is moving through our museum by age, gender, and time of day – allowing us to better tailor our museum experience." 24/7 video monitoring Available as a standalone solution or integrated with market-leading video management systems, SAFR for Security provides vigilant 24/7 monitoring to detect and match millions of faces in real time, delivering a 99.86 percent accuracy rate. In the April 2019 National Institute of Standards and Technology (NIST) test results, the SAFR algorithm tested as both the fastest and most compact amongst algorithms for wild images with less than 0.025 FNMR. When SAFR for Security is paired with a VMS, the integrated experience includes video overlays within the VMS to identify strangers, threats, concerns, unrecognised persons, VIPs, employees, or other tagged individuals in live video. Security teams can customise real-time alerts to automatically notify them when persons of interest appear on a video camera feed or make use of automated bookmarking to conduct forensic analysis. SAFR for Security attaches rich metadata to video footage so security professionals can search by time range, location, category, person type, and registered individual instead of sifting through hours of video to find a specific person. All data passed through SAFR is protected with AES 256 encryption in transit and at rest “Security professionals are inundated with hours of raw footage, much of which must be evaluated in real time by a limited number of human eyes,” said Dan Grimm, Vice President and General Manager of Computer Vision at RealNetworks. “SAFR for Security helps these professionals maintain higher awareness by combining our highly accurate AI-based facial recognition service with the software they currently use.” Facial recognition systems The underlying SAFR platform has been optimised to detect and recognise faces in live video based on its industry-leading excellence in accuracy and performance. The SAFR platform can be deployed on a single PC to monitor a handful of IP cameras or scaled to thousands of cameras in a distributed architecture hosted on-premises, in the cloud, or hybrid. All data passed through SAFR is protected with AES 256 encryption in transit and at rest. The platform also provides actionable data for live analytics of traffic volumes, demographic composition, dwell times, and data exports for further reporting. “We’re delighted to partner with RealNetworks to extend our intelligent IP video system with SAFR for Security’s highly accurate facial recognition,” said Thomas Lausten, CEO, MOBOTIX AG. “The combination of SAFR and our innovative camera technologies opens up a new set of applications and use cases for MOBOTIX customers around the world, especially in retail, healthcare and education.”
RS2 Technologies, globally renowned security and access control systems provider firm, has been named as a new Strategic Alliance Partner in the United States by Zenitel Group, the global provider of Intelligent Communication solutions. Integrated systems “Zenitel’s continued innovative approach to simple but powerful integrated systems provides a complete unified solution to customers of all sizes”, said Dave Barnard, Director of Dealer Development for RS2. “Zenitel has been established as the industry leader in integrated intelligent communications. Our companies have had a long-standing relationship where integration was valued, but we believe it is now time to go beyond simple integration to providing a full-service solution.” According to Barnard, RS2 Technologies has a reputation as a “one-stop” solution for the access management needs of customers in a wide variety of applications. RS2 delivers cost-effective access management solutions to customers in industries as diverse as ship-building, energy, hospitals, education, defense, banking, government (federal, state and municipal), museums, and a variety of diverse manufacturing companies. From small office buildings to large industrial facilities, RS2 has the products to meet the needs of business and industry. RS2 is known for having a rich feature set, continuous integrations, and the lowest total cost of ownership Intelligent Communication “The Intelligent Communication market is targeted to exceed $150 billion by 2021”, said Jim Hoffpauir, President, Zenitel Americas. “To continue to provide innovative solutions that exceed our customers’ expectations, we are creating new strategic partnerships with complimentary technology leaders in the security industry. With our recent release of the new IC-Edge system, partnering with RS2 provides Zenitel with sales channel alignment to emphasise smaller system sales, providing organisations of all sizes an easily accessible and cost-effective solution for highly intelligible audio.”
An innovative technology is changing the way law enforcement agencies combat crime and ensure public safety. Footprint, a web-based situational awareness software, aggregates, analyses and monitors data from multiple video monitoring systems and other sensors in one intuitive platform. The tool enables law enforcement to solve cases quicker using data-driven decisions, while minimising manpower and driving down costs as a result. Copp Integrated Systems, a Dayton, Ohio-based security systems supplier, is one of the licensees of Footprint and introduced the product to the global market. Bill DeFries, CEO of Copp Integrated Systems, says Footprint is a game changer for law enforcement agencies of any size. Footprint provides a 21st-century crime data and video analytics infrastructure that is easily deployed and visually useful" Deterring and preventing crimes “For the first time, law enforcement has total situational awareness,” said DeFries. “Footprint provides a 21st-century crime data and video analytics infrastructure that is easily deployed and visually useful. By leveraging crime data and using predictive analysis, Footprint users can deploy resources more efficiently, catch criminals faster and deter and prevent crimes before they happen.” Developed in partnership with the University of Dayton Research Institute’s (UDRI) Software Systems Group, Footprint is at the forefront of ensuring the highest level of public safety. Seamless video analysis experience “Footprint is a force multiplier,” said DeFries. “It brings together any number of disparate data sources, including public and private video, CAD 911, RMS and arrest records, and visualises it all on ESRI heat maps. Because Footprint can be accessed via smartphones, tablets, laptops and other devices, it allows law enforcement officers to rapidly gather critical information at the scene of a crime.” With the Milestone integration, Footprint can ingest and store live and recorded video from multiple sources and locations" Footprint combines several industry-leading technologies into a single operating platform. In partnership with video management solutions provider, Milestone Systems, Footprint provides a seamless video analysis experience. Jeremy Scott, Strategic Alliance Manager at Milestone Systems, said, “With the Milestone integration, Footprint can ingest and store live and recorded video from multiple sources and locations, including CCTV footage. The open platform software operates with many different brands of access control, analytics and IoT devices as well, making it a flexible tool for law enforcement.” Video content analytics platform Footprint’s extensive video content analytics capabilities are provided by BriefCam, which enables users to review hours of video surveillance footage in minutes and rapidly search and identify people or objects of interest. BriefCam’s video content analytics platform saves law enforcement agencies precious time and resources, said Stephanie Weagle, Chief Marketing Officer at BriefCam. “BriefCam takes raw video content and transforms it into actionable data that is searchable, actionable and quantifiable. Video surveillance footage has never been more valuable with the ability to efficiently and effectively review and analyse its content to accelerate investigations, attain situational awareness and derive operational intelligence,” she said. Integrated for seamless user experience It is projects like Footprint that help foster collaboration between multiple platforms for best-of-breed solutions that make a real difference"Because BriefCam and Milestone are deeply integrated for a seamless user experience in the XProtect Smart Client, the partnership with Footprint was a natural fit. As Scott explains, “It is projects like Footprint that help foster collaboration between multiple platforms for best-of-breed solutions that make a real difference. This illustrates the power of what we can do together with a third party such as Footprint.” One law enforcement agency that has deployed Footprint is the Walton County Sheriff’s Office (WCSO) in Defuniak Springs, Florida. Dave Markham, President of Copp Integrated Systems, has been working closely with WSCO on the implementation of the crime-fighting software. “I have seen first-hand how the implementation of Footprint has become a force multiplier and enabled WCSO to maximise their resources and focus on keeping all their citizens safe,” Markham said. Higher level of situational awareness Footprint could be used to deliver a higher level of situational awareness and public safety in any populated environment such as hospitals, airports"He added, “With Footprint tightly integrated with both Milestone and BriefCam, WCSO can now work closer with their local community in a private-public partnership analysing video crime data from both WCSO cameras as well as independent owners’ video feeds.” While Footprint was initially developed with law enforcement in mind, the technology can also be adapted for other environments, said DeFries. “Since Copp Integrated Systems first introduced Footprint to the market, it has garnered attention from national and international state and countrywide public safety agencies,” he said. DeFries added, “Beyond law enforcement, Footprint could be used to deliver a higher level of situational awareness and public safety in any populated environment such as hospitals, airports, arenas, stadiums, office or school campuses and military bases.”
Videx Security has appointed a new Regional Sales Manager for the London and South East region. Mabs Alam has vast sales and management experience and understands the access control and door entry market well. He takes on the role to help drive business opportunity and growth specifically in the South East region including London. Mabs will be focused on generating new business opportunities as well as maintaining positive relationships with existing customers. Improving relationships with distributors A key focus of my role is to maintain and improve existing relationships with security distributors, wholesalers and security installers" Talking about his new role, Mabs said: “A key focus of my role is to maintain and improve existing relationships with security distributors, wholesalers and security installers as well as bring in new clients and business opportunities. I am also concentrating on offering ongoing support to customers including site visits and surveys in partnership with customers so that the most appropriate systems are installed and used to meet specific and relevant entry needs. “It’s great to join Videx as they have an outstanding reputation in the industry and are highly regarded as a leading door entry and access control manufacturer in the UK.” Experience and knowledge of access control Mabs’ role is heavily proactive and sales focused where a lot of time will be spent cultivating new and existing relationships with a wide range of installers, consultants, surveyors, developers and architects across key sectors for Videx including local authorities, housing associations, schools, hospitals and universities. Neil Thomas, National Sales Manager at Videx, added: “Mabs is a great addition to our sales team and has fitted in really well with the rest of the team. His experience and knowledge both of the access control market and from a sales and business development perspective is second to none and we can’t wait to see the impact of his hard work and skill set throughout the new year. “As well as generating new business, it’s vital Mabs develops a good relationship with our existing clients and that’s something that’s already got off to a positive start which is great to see.”
Managing IT and data risk is a challenging job. When we outsource our IT, applications and data processing to third-parties more and more every day, managing that risk becomes almost impossible. No longer are our data and systems contained within an infrastructure that we have full control over. We now give vendors our data, and allow them to conduct operations on our behalf. The problem is, we don’t control their infrastructure, and we can never fully look under the hood to understand and vet their ability to protect our data and operations. We have to fully understand how important this issue is, and ensure we have the right governance, processes and teams to identify and mitigate any risks found in our vendors. No longer are our data and systems contained within an infrastructure that we have full control over Today, everything is connected. Our own networks have Internet of Things (IoT) devices. We have VPN connections coming in, and we aren’t always sure who is on the other end of that connection. It is a full-time job just to get a handle on our own risk. How much harder, and how much larger should our teams and budgets be, to truly know and trust that our vendors can secure those devices and external connections? For every device and application we have internally, it is very difficult to even keep an accurate inventory. Do all of our vendors have some special sauce that allows them to overcome the traditional challenges of securing internal and vendor-connected networks? They are doing the same thing we are – doing our best with the limited human and financial resources allocated by our organisation. Risk stratification and control objectives The benefits of outsourcing operations or using a vendor web application are clear. So how can we properly vet those vendors from an IT risk perspective? The very first thing we need to put in place is Risk Stratification. Risk Stratification presents a few targeted questions in the purchasing process. These questions include – what type of data will be shared? How much of this data? Will the data be hosted by a vendor? Will this hosting be in the US or offshored? Has the vendor ever had a data breach? These questions allow you to quickly discern if a risk assessment is needed and if so, what depth and breadth. Risk stratification allows you to make decisions that not only improve your team’s efficiency, but also ensure that you are not being a roadblock to the business Risk stratification allows you to make decisions that not only improve your team’s efficiency, but also ensure that you are not being a roadblock to the business. With risk stratification, you can justify the extra time needed to properly assess a vendor’s security. And in the assessment of a vendor’s security, we have to consider what control objectives we will use. Control objectives are access controls, policies, encryption, etc. In healthcare, we often use the HITRUST set of control objectives. In assessing against those control objectives, we usually use a spreadsheet. Today, there are many vendors who will sell us more automated ways to get that risk assessment completed, without passing spreadsheets back and forth. These solutions are great if you can get the additional budget approved. Multi-factor authentication Even if we are using old-fashioned spreadsheets, we can ensure that the questions asked of the vendor include a data flow and network/security architecture document. We want to see the SOC2 report if they are hosting their solution in Amazon, etc. If they are hosting it within their own datacentre, we absolutely want to see a SOC2 Type II report. If they haven’t done that due diligence, should that be a risk for you? Today, we really need to be requiring our vendors to have multi-factor authentication on both their Internet-facing access, as well as their privileged internal access to our sensitive data. I rate those vendors who do not have this control in place as a high risk. We’ve recently seen breaches that were able to happen because the company did not require administrators or DBAs to use a 2-factor authentication into sensitive customer data sources. In the assessment of a vendor’s security, one has to consider what control objectives to use This situation brings up the issue of risk acceptance. Who in your organisation can accept a high risk? Are you simply doing qualitative risk assessment – high, medium and low risks? Or are you doing true quantitative risk analysis? The latter involves actually quantifying those risks in terms of likelihood and impact of a risk manifesting, and the dollar amount that could impact your organisation. So is it a million dollars of risk? Who can accept that level of risk? Just the CEO? These are questions we need to entertain in our risk management programs, and socialised within your organisation. This issue is so important – once we institute risk acceptance, our organisation suddenly starts caring about the vendors and applications we’re looking to engage. If they are asked to accept a risk without some sort of mitigation, they suddenly care and think about that when they are vetting future outsourced solutions. Quantitative risk analysis involves quantifying risks in terms of likelihood and impact of a risk manifesting Risk management process In this discussion, it is important to understand how we think of, and present, the gaps we identify in our risk management processes. A gap is not a risk. If I leave my front door unlocked, is that a control gap or a risk? It is a gap – an unlocked door. What is the risk? The risk is the loss of property due to a burglary or the loss of life due to a violent criminal who got in because the door was unlocked. When we present risks, we can’t say the vendor doesn’t encrypt data. The risk of the lack of encryption is fines, loss of reputation, etc. due to the breach of data. A gap is not a risk. Once we’ve conducted our risk analysis, we must then ensure that our contracts protect our organisation? If we’re in healthcare, we must determine if the vendor is, in fact, a true HIPAA Business Associate, and if so we get a Business Associate Agreement (BAA) in place. I also require my organisation to attach an IT Security Amendment to these contracts. The IT Security Amendment spells out those control objectives, and requires each vendor to sign off on those critical controls. We are responsible for protecting our organisation’s IT and data infrastructure – today that often means assessing a 3rd-party’s security controls One final note on risk assessments – we need to tier our vendors. We tier them in different ways – in healthcare a Tier 1 vendor is a vendor who will have our patient information on the Internet. Tiering allows us to subject our vendors to re-assessment. A tier 1 vendor should be re-assessed annually, and may require an actual onsite assessment vs. a desk audit. A tier 2 vendor is re-assessed every 2 years, etc. We are responsible for protecting our organisation’s IT and data infrastructure – today that often means assessing a 3rd-party’s security controls. We must be able to fully assess our vendors while not getting in the way of the business, which needs to ensure proper operations, financial productivity and customer satisfaction. If we truly understand our challenge of vendor risk management, we can tailor our operations to assess at the level needed, identify and report on risks, and follow-up on any risks that needed mitigated.
When asked about what the market should be thinking about in 2018, I am left offering an answer that serves as an urgent call to action: prepare yourself for change! The security industry is soon likely to see a dramatic shift from the traditional segmentation of commercial and residential security. Smart phones, mobile technologies, cloud computing, and having everything provided ‘as a service’ in peoples’ lives means users of buildings have a new set of expectations. In many ways, the coming crosspollination of residential and commercial security offerings means we will have a better idea of best practices. The convenience of residential spaces will combine with the robust security of commercial facilities, for example. But this also means a higher level of demand will be placed on security integrators, facility managers and owners. Operations groups may need to change drastically to offer new technologies. Security as a service is likely to become more common. And new technologies are emerging that will facilitate this change and require new skillsets and expertise. So, what the market should be thinking about right now is: how do we all, collectively, keep up? More critical is finding ways to offer or utilise new technologies and total solutions that make operations easier Ensuring security preparedness As it stands now, in terms of physical security for doors and openings, we are currently in a world where we can secure almost anything. Be it hospital, school, file cabinet, server rack, grain silo or barn that is off the electrical grid, we have a solution for that. So being hyper-aware of your industry, its offerings, and how the products work together is important, as it means every location that needs security can have security. But perhaps more critical is finding ways to offer or utilise new technologies and total solutions that make operations easier, moving security components deeper into a building, facility or campus, and building and leveraging on partnerships where everyone is invested in the other’s success. Here are a few suggestions for addressing these issues. Training in new security solutions Perhaps the biggest change in the near term will be emerging technologies that will alter how we currently use security solutions. Be it cloud-based security, intelligent keys, new types of credentials, or simply a better software for management, the need to be well-versed on these offerings is key. To this end, it is important to not only know what offerings exist in the security world, but also be well-trained on them. Seek out a manufacturer that is willing to offer training and education on products, strategies and solutions. While it is important to secure server rooms at the point of entry, it might also make sense to provide a cabinet lock with audit capabilities on the rack or cabinet itself Identifying an end goal Further, approach the integration and implementation of these technologies with a collaborative mindset. For dealers and integrators this means utilising new technologies to better secure a facility for a client. As a building owner or manager, it means making tenant and occupant life better while streamlining your own operations. The ultimate goal of any new technology is to meet customer needs in the very best possible way. And that goal should trickle down from manufacturer to integrator to the facility manager and ultimately the end user. Don’t just implement technology for the sake of doing so. Do it with purpose by identifying an end goal and utilising these amazing solutions to achieve that. Identifying an end goal also means seeking out the core requirements a building has to provide users with the expected level of security and service. This is obviously dependent on the building, and it doesn’t always mean physically moving into a building, but rather looking at ways to move further into the operations of a business. Securing access to buildings Government facilities are undergoing a transition to security requirements dictated by the FICAM programme For some businesses, keeping server racks or file cabinets secure can be critical. And while it is important to secure these rooms at the point of entry, it might also make sense to provide a cabinet lock with audit capabilities on the rack or cabinet itself. New opportunities also fall into this category. Government facilities are currently undergoing a transition to security requirements dictated by the Federal Government’s Identity, Credential, and Access Management (FICAM) programme. FICAM sets standards for implementation of secure access to all government facilities and mandates the use of FIPS 201 Personal Identity Verification (PIV) for federal employees and contractors. This means that PIV enabled access points will be required on the perimeters, interiors and other openings. Finding ways to retrofit these affordably, efficiently and effectively means offering more secure openings on what is likely to be a tight budget. This can also apply to offsite facilities. Earlier I mentioned barns and grain silos – locations that are often left off electrical grids but can come with the need for auditing capabilities – and a solution exists for that. So, while a corporate headquarters might be under robust lock and key, it is always good to ask about other locations that could use a simple security upgrade. Personal Identity Verification-enabled access points will be required on the perimeters, interiors and other openings Establishing security partnerships Again, the best way to achieve readiness with this approach is to be aware of the market and its offerings, and to engage in collaborative partnerships. Collaborative partnerships are critical for everyone who is tasked with protecting the people and places that matter most. Manufacturers rely on the integrators and building supervisors to understand the new and developing needs in the industry. Integrators then must rely on manufacturers to provide these solutions, offer education and training, and be in constant contact about the newest technologies available. Collaborative partnerships are critical for everyone who is tasked with protecting the people and places that matter mostAnd building owners or managers must both be aware of their tenant and end user needs and demands – be it for new technologies or even seeking out sustainability solutions. In turn, they need to know they can rely on a collaborative approach from an integrator and manufacturer who is invested in their success. Industry collaboration for a secure future Again, the biggest thing we must all need to consider now is how to prepare for the future. Treading water is simply not enough in the security market anymore. New technologies and performance expectations are forcing us to consider ways to better serve our clients – whether we are a manufacturer, integrator or in charge of facilities. And the best way to do this is together. We are all invested in the success of one another, and in the people who use the places we strive to keep safe. By seeking out, developing, and cultivating these partnerships in collaboration and innovation, we are able to help one another prepare for the future that is becoming more complex, intriguing and exciting every day.
2017 was an incredible year for VuTeur and the industry as a whole, as security has become a primary focus for stakeholders, now more than ever. VuTeur introduced its proprietary IRIS (Internal Real-time Intelligence Software) technology this year, which is part of its emergency management and asset protection solution. IRIS leverages real-time location services (RTLS) technology and utilises the existing WiFi infrastructure in a building to create a personal, mobile safety device built to save lives — all while reducing infrastructure and cost. Tragedy informing the industry The tragic and unfortunate events that occurred in 2017 and in the years prior, such as mass shootings and natural disasters, have made adding layers of security a prominent trend in 2017. Soft targets have unexpectedly become the focus of many attacks, placing an even more significant emphasis on determining how to protect individuals within a campus. Visitor management was a key trend VuTeur focused on this year and will continue to concentrate on, as many security issues tend to stem from an uncertainty of who is in a building at any given time. Securing all types of campuses will continue to be crucial into 2018. Schools, healthcare facilities, stadiums and arenas, and other organisations face the challenge of maintaining a welcoming and friendly environment, while understanding and monitoring who is in the facility and properly safeguarding the area. Stadiums and arenas face the challenge of maintaining a welcoming and friendly environment, while properly safeguarding the area The security industry will continue to trend upward, which will help push new technologies, such as VuTeur's, that augment perimeter and building safety in every vertical. What’s to come Next year, VuTeur's technology portfolio will expand, and we plan to establish deployments in a variety of applications, such as on educational campuses, hospitals, arenas, corporate campuses and government facilities. Communication will remain critically important in the event of an emergency, making RTLS technology extremely valuable for conveying routine- and threat-based messages. Integration will also be a significant trend in 2018, as it is vital for security systems to "talk" to each other, such as RTLS talking to access control and mobile devices, to create a more holistic approach to protecting assets and people.
Virtualisation offers multiple benefits to video surveillance systems, but the technology has been slow to adapt to the needs of video. However, the tide is turning. At ISC West, BCDVideo introduced a hyperconverged infrastructure tailored to video surveillance (HCI-VS) that answers the demand for higher and more efficient operating performance while also lowering the total cost of ownership for the integrator and end user. Hyperconverged infrastructure solution “ISC West attendees were able to get their hands on our hyperconverged solution and immediately see how easy it is to use and the benefit of adding virtual machines,” says BCDVideo’s Chief Technology Officer Tom Larson. Security integrators were impressed that BCDVideo continues to adapt technologies" Virtualisation was just one of the innovations in BCDVideo’s demo room. Many integrators and end users found their way to the conference room, located not far from the exhibition hall, and BCDVideo was also featured at partners’ booths on the show floor. “Security integrators were impressed that BCDVideo continues to adapt technologies to the video surveillance space,” says Larson. “BCDVideo ‘gets’ them, but often IT does not. The HCI solution is purpose-built for video, and it works.” Server, storage and networking BCDVideo’s HCI-VS is a virtualised, video-optimised and highly available infrastructure. It combines the server, storage and networking into one platform. Powered by Scale Computing’s HC3 software, BCDVideo’s HCI is a scalable, node/cluster-based infrastructure that enables integrators to virtualise their physical security appliances and software, meaning fewer devices need to be deployed and maintained. Physical security integrators can create an infrastructure that provides high availability to the VMS" “More importantly, our HCI makes it easier than ever before both to quickly create and deploy virtual machines, and to manage video surveillance infrastructure,” says Larson. Some of the unique needs that HCI-VS serves are those of multi-faceted projects involving video recording, access control, building management, etc. With HCI-VS, separate appliances are not needed for each of these tasks, which enables better use of hardware, reduces overall rack space and power/cooling costs. Essentially, this solution eliminates the “pizza box” model and serves the need in the marketplace where always-on video and high availability are necessary, and especially in situations where loss of video data cannot be tolerated, says Larson. Simplified graphical user interface (GUI) makes it easy for integrators to implement systems that use hyperconverged technology Tolerant to hardware failure “By leveraging the concepts of hyperconvergence, physical security integrators can create an infrastructure that provides high availability to the video management system,” he says. “When components within a video management system are tolerant to hardware failure, it results in less loss of data and continual access to the data from the failed component. You always have access to the video data even if the hard drive fails.” Defining virtualisation Virtualisation is the act of creating virtual copies of physical resources, including, but not limited to, compute, memory, storage, and network resources. This is achieved by employing software to manage all physical resources, known as a hypervisor. As servers become more powerful, the discrepancy between software and hardware capabilities result in inefficient use of resources. “By partitioning the hardware resources into smaller virtual environments, we can create multiple virtualised servers that share a common set of resources,” says Larson. “By sharing this common set of resources, the virtualised servers utilise the resources more efficiently with less waste.” Integrators and end users flocked to BCDVideo's demo room at ISC West to try out the new hyperconverged solution Education and physical security Learning about the benefits of why to virtualise and applications will be a first step” A challenge to greater adoption of virtualisation in the physical security industry is education. “Some security integrators will need to step out of their comfort zone,” says Larson. “Virtualisation for video has been slow to adapt, and other solutions are complicated. IT technology applications traditionally have not worked in the space either. Learning about the benefits of why to virtualise and applications will be a first step.” HCI-VS in new verticals While HCI-VS is vertical-market-agnostic, the solution is suitable for school districts looking to consolidate their hardware, for hospitals and the healthcare industry in general, for the rapidly growing cannabis industry, any mass transit system, as well as for Fortune 1000 companies, to name a few. “Our virtualised solution especially appeals to these verticals because of the number of cameras, the need for 24/7/365 video recording and extensive data retention requirements, and where loss of video data cannot be afforded,” says Larson. Purpose-built solutions BCDVideo’s HCI-VS is the latest example of products BCDVideo is creating for the physical security industry. “We purpose-build and engineer our solutions specifically for video surveillance with the ability to scale-out as needed,” says Kelly Kellen, BCDVideo’s Director of Marketing. “We engineer new products to address problems in the marketplace. Our CTO is really looking at the market and studying the security integrator’s pain points. Then we engineer solutions to best serve them.”
No doubt about it, the ASIS International show is smaller than in years past. And there is (the usual) grumbling about slow attendee traffic (and the also predictable counter-arguments about “the quality of the leads.”) Some of the security and safety technology being featured was introduced earlier at ISC West, but there is still plenty to see in the exhibit hall. Growth of mobile credentials Mobile credentials are a hot topic again, and Lenel has joined the growing number of companies supplying a mobile credentialing system to the market. Lenel’s Blue Diamond mobile credentials are based on technology developed by United Technologies sister company Supra. The use of a cell phone (by Supra) to open a real estate key box has already been adapted to the hospitality industry (with a deployment at Hilton Hotels), and now as an access control credential, part of Lenel’s OnGuard Version 7.3 release for the commercial and industrial security market. The components of the system are a Bluetooth reader, a virtual credential provided through a smart phone app, a cloud-based credentialing portal, and integration with the latest version of OnGuard. Offering a full solution is simpler to implement, and Lenel even has an “in-line” Bluetooth reader that can be used to add Bluetooth capabilities to existing systems. It’s just one aspect of the OnGuard 7.3 release that also is “reinventing the OnGuard experience,” according to Ross McKay, Lenel Systems International’s Director of Project Management. Future adoption Mobile credentials are big talk at ASIS, but how long before they will be widely used? Estimates are all over the map, but research firm IMS has projected the percentage adoption of mobile credentialing at 19 percent by 2020 (according to McKay of Lenel). "Our industry is slow to adopt, but if you show mobile credentialing to end users, they get it immediately, anything you can give them on a phone, they will use" But Steve Van Till, president and CEO of Brivo, which launched its mobile credentialing system at last year’s ASIS, sees a range of possibilities in terms of adoption. Witnessing the fast adoption of smart phones as alternatives to perform a large number of daily tasks, some say mass adoption could only be a couple of years away. On the other hand, in our market, a lot of people are still using proximity cards (despite introductions of superior alternatives over the years). That legacy argues for slow adoption indeed. “Our industry is slow to adopt, but if you show mobile credentialing to end users, they get it immediately,” says Van Till. “Anything you can give them on a phone, they will use.” Because ASIS is an end user show, exhibitors tend to reflect on the changing dynamic of selling to end users. Changing purchasing dynamics How end users buy products may be changing -- obviously the IT department is having a greater influence than ever before. But what hasn’t changed is the importance of creating a system that will keep end users satisfied as they use it day-to-day for years after the installation is complete. IT may be yielding more influence, but at the end of the day, it’s the security customers -- the attendees at ASIS -- who must be satisfied. “While the IT infrastructure and personnel are involved in how decisions are made, security personnel are still heavily involved,” says Sharad Shekhar, CEO of Pelco by Schneider Electric. “On a day-to-day operations level, it’s the security user who either truly benefits or gets truly hurt by the product. We face IT challenges up front, but the day-to-day utility of our products in the market is judged by the security people, not the IT people.” Shekhar says feedback from those day-to-day end users is one factor that makes a show like ASIS so important. “We need to get continuous feedback to guide our future product development,” says Shekhar. “The type of people who do security -- they like stability. They like certainty because it’s the nature of the business. They want to apply solutions that have been vetted, that are proven. Customers can’t afford to make a mistake.” "The type of people who do security - they like stability. They like certainty because it’s the nature of the business" At ASIS, Pelco is showing its VideoXpert open video management system (VMS) platform, integrated with the Optera multi-sensor panoramic camera. The ability of the VMS to display a seamless multi-sensor image is getting good feedback from customers. Pelco’s core strategy is to focus on four major verticals -- gaming, city surveillance, oil and gas, and ports. They devote a range of resources to each of the major verticals, including multi-functional teams including research and development, engineering, product support and marketing personnel. A fifth core vertical in the United States is corrections, and Pelco also sells in secondary verticals such as education, healthcare, etc., although they are focusing more on the core verticals. Education and training Education is an important aspect of the ASIS show, there are rooms and rooms of educational sessions on a range of topics going on concurrently with the trade show. But education is also happening on the show floor, often in the form of presentations from vendors in theatre-like areas of their booths. Promise Technology, a manufacturer of storage systems, is a first-time ASIS exhibitor that is providing educational sessions in their presentation theatre in cooperation with VMS partners. “There is a lot of information in education and training,” says John van den Elzen, Managing Director, Worldwide Surveillance Business Unit, Promise Technology. “End users like to know how a solution is working. They don’t want to hassle with it if it doesn’t work. We qualify all the VMS vendors before the product comes to market. We know it works. We have a good relationship with the VMS vendors and work together if there is a problem -- no finger-pointing.” Promise provides RAID storage systems that are specifically targeted to the security market, and promote the products using security terms rather than IT terms. And they listen to feedback, whether at a trade show or at the many education events they have held globally to growing numbers of attendees. “This is very successful,” says van den Elzen. “People have a lack of knowledge and we look to fill in that gap.” There’s more knowledge to be had, and more exhibitors to visit in the second day of ASIS.
End users are looking to expand access control beyond its traditional role securing perimeter doors. Innovations such as wireless locks, wi-fi, power-over Ethernet (PoE) and panel-less IP architectures are yielding more flexible solutions for a larger range of locking needs both inside and at the perimeter of an enterprise. Donna Chapman, an ASSA ABLOY Integrated Solutions Specialist, notes that new technologies are increasing how many openings are secured in a building from the current 5 to 15 percent to as many as 25 to 40 percent of openings. Access control for data centres Openings don’t just mean doors – it could mean a lock for a prescription drug cabinet in a hospital or physical access to a server in a data centre. I caught up with ASSA ABLOY at AMAG’s Security Engineering Symposium (SES) 2016. AMAG and ASSA ABLOY are technology partners – AMAG’s Symmetry access control system is integrated with ASSA ABLOY’S IP-enabled locks. Our discussion covered changing locking trends – and new opportunities for consultants, integrators and end users. “It used to be enough to secure the perimeter of a data centre, for example” says Jim Crowley, ASSA ABLOY’s Electronic Access Control (EAC) OEM Business Development Manager. “But now customers want to be able to secure the actual rack the server blades are in. In a co-located data centre, you have data from various companies stored together at one facility, and you want to control who’s getting physical access to the data.” Regulations are driving some needs for new locking solutions. In the data centre scenario, protection of medical information required by HIPAA [the U.S. Health Insurance Portability and Accountability Act of 1996] is driving the need to secure various openings – there are hefty fines for any violations of HIPAA rules. "It used to be enough to secure the perimeter of a data centre, but in a co-located data centre, you have data from various companies stored together at one facility, and you want to control who’s getting physical access to the data" “If you look at the regulatory environment we’re in today, NERC (for the electric utility market) and HIPAA and those types of regulations are requiring that openings have auditability,” says Crowley. “You need to know which people have access to openings both proactively and on a forensic basis. That’s driving access control further into the enterprise and onto openings that you historically didn’t see.” [NERC is the North American Electric Reliability Corp.] Wired vs wireless locks “There’s no one-size-fits-all solution,” adds Chapman. “You want to be able to offer a locking solution based on needs and budget, and you have a lot of options.” While every lock cannot be wired, it’s also true that many applications don’t lend themselves to wireless solutions. A strategic mixture is the best approach. “We are not trying to displace all hard-wired doors with wireless,” says Crowley. “There will always be a need for wired and wireless – they’re complementary, and not mutually exclusive.” He also notes that wireless locks use AES 128-bit encryption to ensure security. “We are always looking to improve the security of that wireless transmission, but some people have it in their head that wireless is not secure, which isn’t the case.” However, because concerns persist, ASSA ABLOY just came out with Wiegand wired versions of its cabinet locks and server cabinet locks. Some data centres just don’t want wireless locks in their facility. Adopting cloud security solutions Another development is cloud applications for the light commercial market, which offer an attractive price point that combines security and convenience. “When folks talk to me about being concerned about security in the cloud, I ask them: How do you do your banking? If you’re using your bank’s Web-based services, your entire financial life is in the cloud.” When developing its variety of locking solutions, ASSA ABLOY is always listening to the voice of the customer, says Chapman. “We want our solutions to be innovative and customer-centric, with everyone having a good user experience – including our OEM partners, channel partners, integrators and end users.” The company has teams of people who constantly call on integrators, security consultants and architects, as well as owners and users. “We are constantly evolving, and we want to take whatever necessary steps to make doing business with ASSA ABLOY easier.”
The London Clinic has installed bespoke Traka solutions to ensure accountable authorised access and instant audit control capability for keys across its state-of-the-art hospital facilities. Harley Street’s globally renowned London Clinic is one of the UK’s largest private hospitals, dedicated to providing the best, personalised healthcare with a breadth of surgical and medical expertise. With hundreds of keys and access points in operation across the hospital, the Security and Operations team was reliant on a manual logging in and out system, which was proving inefficient and risked time delays to patient care. In sourcing a more innovative way to keep track of authorised access, especially to drugs cabinets and the Clinic’s 10 specialist theatre areas, Traka was installed and networked across the site. The benefits of instant audit control capability and additionally being able to set curfews for different staff rotas has already made a significant difference in the efficient running of the Clinic. Ensuring safety of staff and patients Traka’s system is a breath of fresh air to monitor keys and instantly be aware of their location"“The vision and values of the Clinic have been developed through working with our Trustees, management teams and staff. As part of this process, we pride ourselves on being ‘pioneering’ not only in our attention to medical care but also in establishing better and more efficient ways of working,” says Lee Humphries, General Manager Security Operations at The London Clinic. “This is across every aspect of The Clinic, right down to daily operations. Security and key management are integral not only to the efficient running of the Clinic but also to ensure the safety of our staff, patients and guests. Traka’s system is a breath of fresh air to monitor keys and instantly be aware of their location; allowing our staff to focus on delivering high-quality service.” In total, Traka has installed four networked key cabinets, which utilise its flagship Traka32 technology to provide all the administration tools needed for the Clinic to effectively manage operations from its server and still provide extensive real-time data capture. Enhancing the hospital functionality Within the system, the Security team has now set curfews so that keys not returned will automatically trigger a notificationWithin the system, the Security team has now set curfews so that keys not returned will automatically trigger a notification, sent via email and text. There is also an opportunity for authorised personnel to pre-book keys in advance, so they are reserved, which has proven especially useful to manage contractor access and work programmes. Ben Farrar, Traka Marketing Development Manager added: “Providing key management solutions for a hospital environment, such as The London Clinic, involves more than a choice of high-quality products and services – it encompasses best practices and an integrated approach to ensure the safety and security of staff, patients and visitors. “We worked in partnership with the Security and Operations team, right from the initial design process to create a bespoke Traka solution that could instantly enhance the smooth running of the hospital, without compromising on ease of use in emergency situations. And by adding Traka32 software, we achieved the requirements with the flexibility to create own central control over authorised access to critical keys.”
Ports of Jersey operate the island’s busy harbours and airports, providing high-quality services and facilities to enrich the experiences and journeys of their customers, with Jersey Marinas offering 1,000 berths across three award-winning locations close to the vibrant waterfront at St Helier. At very busy times of the year, such as the annual Jersey Regatta, the sheer volume of visitor traffic arriving from both land and sea can present serious problems. With particular challenges arising from managing car parking, and the issuance of port entry digital keys for boats harbouring. Smart access control solution Ports of Jersey needed a smart access control solution capable of managing short-term parking at St Helier harbour Ports of Jersey needed a smart access control solution capable of managing short-term parking at St Helier harbour. The system needed to be intelligent enough to manage complex bookings for use by berth and mooring holders dropping off and loading gear onto boats, before parking elsewhere long-term. The existing solution was no longer cost effective, and was open to abuse by some users. In addition, Ports of Jersey also required an upgrade to the out of date Jersey Marinas security gate access control system. At peak times this system needed to be able to cope with rapid, high capacity issuance of smart cards to vessel owners and boat crews wishing to access the marina and marina hospitality faculties. Smart installation SALTO partner JMH Technology was asked to provide a new car park access control solution and resolve the looming problem of needing to issue 1,000 cards, at a cost of over £100,000. A replacement car park access control system was installed based on new technology smart cards and 2,000 cards issued. This project was highly cost-effective with installation and card issuance totalling less than just card issuance on the previous system. Future savings also assured thanks to a choice of more cost-effective cards. Abuse of short-term parking has been cut, and the experience for visitors is improved. JMH Technology is in the process of adding more reader-controlled doors To drive yet more efficiency and further reduce overheads the system has subsequently been updated at both St Helier and Albert Pier car park, with smart installation of the latest SALTO access control technology. The upgrade continues, and JMH Technology is in the process of adding more reader-controlled doors and smart handles across the facility. Security assessment A full security assessment was carried out at Jersey Marinas, and a decision taken to replace all of the expensive and temperamental mechanical code locks with a full online access control system. By engineering a bespoke solution that integrated a SALTO kiosk system with a touch screen unit interface, Jersey Marinas staff are now able to allocate more than 500 cards during the high-tide window. With extra capacity on tap when they need it to cope with high demand at peak times, and valuable cost savings made. The SALTO system provided is technically robust and cost-effective to expand. As a partitioned system Ports of Jersey now have a global overview, with each department able to see the section relevant to them. This enables micro management of cost savings across equipment and cards and allows staff to get permissioned access to all necessary parts of the Ports infrastructure without delay.
Evelina has had many different brands of door entry system, as is often the case with NHS Hospitals spread across the UK. Managers at Evelina wished to have a standardised system across the wards in order to improve operating efficiency and reduce maintenance costs. Upgrades needed to be quick problem free and cost-effective. Each independent ward utilises a self-contained door entry system to control security critical access to their busy nursing area. The Maternity Ward provides a good example of a security critical area that requires an intuitive and cost-effective system to control access with the ability of a ward receptionist to permit entry and exit via an audio-video communication link. User-friendly features Fermax Area Manager Andy Saxton worked closely with Evelina’s nominated installation company to ensure that the Fermax system design using DUOX and VEO met the hospital’s needs. Based on 2 wires with aesthetically pleasing profiles and user-friendly features and functionality the Fermax DUOX system with VEO video monitors was a perfect match for the hospitals requirements. Purely digital in nature, the DUOX 2 wire system functions perfectly using most types of cable which meant that it could be retro-fitted onto the existing system infrastructure, thereby avoiding the excessive costs of re-cabling. Equipped with the Photocaller function which allows for the time and date stamping of visitors, the Fermax DUOX VEO monitor delivered the ideal solution.
The client is a prestigious purpose-built skin, laser and cosmetic surgery clinic based in central Birmingham. In 2018, they relocated to a Georgian building following an expansion of the practice to welcome new professional associates and provide a greater range of patient services. Their upgraded and refurbished building includes a larger operating room with dedicated recovery areas, treatments rooms, consultation rooms and waiting areas. At this clinic, plastic, reconstructive and aesthetic experts carry out surgical and non-surgical procedures for the face and body as well as cosmetic dentistry, IV nutritional therapy and advanced spa treatments. IGNIS Fire Protection Services installed Inception for this popular cosmetic surgery practice in Birmingham As well as a team of renowned doctors and practitioners and their administration team, the new premise is also accessed by numerous patients and their families visiting the clinic for pre-treatment and post-treatment consultations, as well as for the procedures themselves. Access control and intruder detection system In their new premises, the practice required an access control and intruder detection system that delivered: Hassle-free access for staff with various levels of authority, from surgeons to administrators, for e.g. restricted access to consultation/treatment rooms and post-procedure recovery areas Limited access to patient information, drugs, high value surgical equipment and other high-risk assets Simple and reliable off-site management by permitted personnel, at any time and via their own computer, tablet or smartphone A secure yet serene and private experience for patients and visitors, for e.g. easy entry and exit for visitors to/from the main reception area Safety of staff and visitors IGNIS Fire Protection Services installed Inception for this popular cosmetic surgery practice in Birmingham. With nearly 100 years of combined experience installing security systems, the IGNIS team delivers on its reputation for quality of service, knowledge, reliability and honesty. An integrated system gives the client reassurance, simplicity and ease of use IGNIS works with integrated access control and intruder detection manufacturer Inner Range to deliver a cost effective, reliable service every time, with safety of staff, customers and visitors of paramount importance. Inner Range provided Inception, the core access control and intruder detection system used by IGNIS Fire Protection Services on this site. Inception was the perfect choice for this customer because it hangs off the same infrastructure with a single user interface. An integrated system gives the client reassurance, simplicity and ease of use. Offers smart building management A pioneer of integrated access control and intruder detection systems, Inner Range has been a pioneer in the design and manufacture of intelligent security solutions since it was established in 1988. More than 150,000 Inner Range systems have been installed in over 30 countries. Inner Range’s award-winning integrated security systems offer smart building management at local, national and global levels. Inception is Inner Range’s powerful yet affordable access control and intruder detection system, now featuring a range of extra reporting functions, anti-pass back protocols and interlocking doors. The system provides this dynamic clinic with the integrated access control they need to run their business with the utmost efficiency, safety and security. Key features available with Inception: A web-based interface that can be controlled by authorised staff using existing smartphones, tablets or computers Various entry points starting at 2 or 4 doors and 16 users and can be expanded if required up to 32 doors and 512 users Universal inputs and outputs that can be used independently of each other, to directly control door locks and powered sirens modules Secured alarm communication is using 128Bit AES encryption to ensure data privacy Interactive Commissioning Checklist IGNIS installed the Inception system using its interactive Commissioning Checklist that ensures no steps are missedIGNIS installed the Inception system using its industry-first interactive Commissioning Checklist that ensures no steps are missed. That process includes core programming, custom automation, changing default credentials, backing up the database and downloading commissioning reports. Inception’s wireless adaptability not only gives users flexibility, it means technicians don’t need to find an IP address or connect to the user’s local network. They can also use an adaptor as a service tool to perform maintenance on site. Benefits for client: Peace of mind – 24/7/365 access and intruder detection solutions to keep patients, staff, visitors and assets safe and secure Convenience – the system can be controlled at all times via any mobile device No forgotten codes to interrupt the sensitive day to day running of the business or cause issues out of hours Value for money - no costly additional hardware and no need for a set on-site administrator or security guard Easy access and security means reception and support staff can focus on other responsibilities such as patient care
Comprising a large tertiary and secondary hospital, along with three rural hospitals, Waikato DHB is a substantial healthcare operator which employs approximately 6,000 staff throughout the region. With security needs that include protecting staff from verbal and physical abuse, safely securing high-dependency patients in dementia wards, restricting unauthorised access to medication and medical equipment, and protecting high-risk facilities such as newborn intensive care units, Waikato DHB required security systems that could be applied to both high and low security areas and found the solution in Gallagher’s range of innovative security products. Serving a large geographical area of the North Island of New Zealand, the Waikato District Health Board (Waikato DHB) provides hospital and community-based health services to a population of nearly 400,000 people. Controlling access areas within hospital Gallagher’s system enables us to make changes quickly and push that information out to the card readers instantly"Gallagher’s access control system and Command Centre central management platform provide Waikato DHB with control over access in and out of areas within the hospital. With access profiles that change on a daily basis, as medical staff – predominantly nurses – move between different departments on different days, it’s vital that the system can be updated simply and efficiently. “Gallagher’s system enables us to make changes quickly and push that information out to the card readers instantly, ensuring that staff can approach doors with the confidence that they can enter or leave areas as necessary,” said David Wilson, Manager of Security and Parking for Waikato DHB. The safe and secure storage of medication and medical equipment, ranging from syringes and surgical tools, to large expensive machinery, is a legal requirement of all hospitals in New Zealand. Single access card system Gallagher’s access control solution forms a part of the security system that delivers this for Waikato DHB facilities. Utilising a single access card system where permissions can be set to allow different access ensures the efficient movement of staff, reduces the risks associated with handling keys, and provides a comprehensive audit trail that identifies access movements by employee. Utilising a single access card system where permissions can be set to allow different access ensures the efficient movement of staff Waikato DHB is proud to put people at the centre of what they do, and strives to ensure staff and patient safety at all times. A number of Waikato DHB’s wards require high-level security either for the protection of the patients – as in the case of dementia facilities – or staff. Duress buttons located throughout the hospital and its high-risk areas automatically notify security staff of the exact location where a duress alarm has been activated. Lock-down system Gallagher’s Command Centre Mobile application delivers these duress notifications directly to a guard’s mobile device – speeding up the delivery of urgent information directly to security personnel. The ability to lock-down areas of the hospital for safety reasons is paramount. “Command Centre gives us the ability to isolate areas and restrict access. This is a critical requirement for us and the reliability of that lock-down system is hugely important,” said Wilson. With so many visitors and staff coming and going from the hospital, carpark management is an important aspect of facilities administration for Waikato DHB. In choosing a solution, the DHB selected Gallagher’s Carkpark Management system - an optional licence feature. Streamlined parking processes Through an integration with Gallagher’s Command Centre security management software, staff are able to badge their access card at one of the many staff and public carparks on site, and have their parking fee deducted from their pre-paid account. The programme has in-built intelligence including the ability for staff to exit and re-enter during a set period without being recharged The programme has in-built intelligence including the ability for staff to exit and re-enter during a set period without being recharged. This system has streamlined parking processes, particularly for part-time and shift-work staff who have irregular parking requirements. According to Wilson, “One of the real strengths of this system is the reporting. By managing the pre-paid carpark system through Command Centre and linking it to staff access cards, we are able to effortlessly extract detailed reports.” Electronic Tag Boards Waikato DHB’s facilities are continually expanding and this means a large number of contractors may be present on site within a 24 hour period. By utilising another Gallagher licence feature - electronic Tag Boards - contractors can easily sign on and off of the site. A key driver for this was health and safety, “It’s really important for us to know who is on site in case of an emergency,” said Wilson. “Making this process as simple as possible for contractors is the best way to ensure it is used.” A number of other system integrations appear across the site, including CCTV. Waikato DHB’s largest hospital facility, Waikato Hospital, has over 250 CCTV cameras connected to Gallagher’s Command Centre platform. As Waikato DHB’s requirements continue to evolve, Gallagher’s systems expand alongside them. Security Ward Standard The Security Ward Standard details the minimum security equipment required for new buildings, including access control, duress alarms, and camerasTo remain at the forefront of technology, Waikato DHB has a software maintenance agreement with Gallagher, to ensure they operate the very latest software available. “Any advancement in technology will make life easier, that’s a straightforward investment for us,” said Wilson. Through Waikato DHB’s experience with Gallagher products, the team developed a ‘Security Ward Standard’. This standard details the minimum security equipment required for new buildings, including access control, duress alarms, and cameras. The Security Ward Standard has greatly reduced the time involved by Waikato DHB staff in producing specification documents and gathering approvals. “Gallagher gives us a complete and total security package that is expandable and easy to manage,” said Wilson. “We are confident that a high-standard of security is being consistently applied across our sites for the safety of our staff, patients, and visitors.”
Texas A&M University-San Antonio (A&M-SA) has become the first university in the world to deploy an Indoor Positioning Solution across its entire campus for the purpose of providing the safest possible environment. The SafeZone indoor positioning solution, provided by CriticalArc, provides the campus police with an unprecedented three-dimensional view of multi-story buildings. For example, instead of receiving an alert about ‘an incident somewhere in the student union building’, they get pinpoint specifics, such as ‘it’s on the fourth floor, west wing, outside room 410’. "With indoor positioning and SafeZone, we're able to provide a faster response time, whether it's a medical emergency or an active shooter,” says Roger Stearns, A&M-SA’s assistant chief of Police, featured in this video. The entire police department benefits from advanced features such as heat mapping and incident playback to optimise performance" Safer environment for students The university’s Chief of Police Ron Davidson wanted to innovate with this full-coverage system because the campus was expanding, including a newly completed residence hall, which meant having students around the clock for the first time in A&M-SA’s history. He was committed to ensuring a safer environment for students, staff and visitors. In addition, Chief Davidson was in search of a common operating view that would provide the Emergency Operations Center and all officers on patrol a real-time location of all available officers and volunteers, as well as showing the location of all incidents ̶ essential for coordinating first responders and the Campus Community Emergency Response Team (CCERT). Heat mapping and incident playback “SafeZone is essential technology to position your organisation on the cutting edge of campus law enforcement. The real-time common operating view both enhances officer safety and acts a force multiplier. Plus, the entire police department benefits from advanced features such as heat mapping and incident playback to optimise performance,” Davidson said. Texas A&M-San Antonio has adopted the indoor positioning solution as a standard and will deploy it in all future buildings on campus. The solution is fully supported by the University’s Information Technology department and has been assessed for additional applications to enhance the student experience including wayfinding and research by academics in the newly completed Science and Technology building. Easy to maintain wireless installation The process to get the SafeZone indoor positioning solution deployed is a simple one, as it’s a wireless installation and easy to maintain"SafeZone was easy to deliver with no disruption to the campus. It was deployed in a matter of weeks during the summer break. “The process to get the SafeZone indoor positioning solution deployed is a simple one, as it’s a wireless installation and easy to maintain,” added Stearns. Organisations can install wireless, wearable duress alarms able to pinpoint anyone anywhere on campus as an alternative to fixed, expensive, wired panic alarms. Among other capabilities, SafeZone allows users to get the most rapid help simply by activating an alert, using an app or a wearable duress alarm. As soon as the alert is triggered, the location and details of the user are streamed to the monitoring team, allowing officers to coordinate a smarter, more targeted response. By enabling responders to visualise the precise location of an incident, anywhere on campus, SafeZone is much more powerful than traditional, fixed panic alarms and blue light telephones, which are more expensive to install and less accurate in operation. SafeZone public safety solution Glenn Farrant, Chief Executive Officer, CriticalArc, notes; “I’m delighted by the close partnership between A&M-SA and CriticalArc resulting in this ground-breaking implementation of the SafeZone public safety solution. Chief Davidson and his team are at the forefront of using this technology and we are pleased to be helping them improve the quality of life, and the learning experience, for everyone on their campus.” The SafeZone indoor positioning solution is commercially available worldwide for a range of university, hospital, enterprise and finance applications and is being deployed in more than 80 countries worldwide.
Round table discussion
The new year 2019 is brimming with possibilities for the physical security industry, but will those possibilities prove to be good news or bad news for our market? Inevitably, it will be a combination of good and bad, but how much good and how bad? We wanted to check the temperature of the industry as it relates to expectations for the new year, so we asked this week’s Expert Panel Roundtable: How optimistic is your outlook for the physical security industry in 2019? Why?
For many years, cybersecurity was the unmentioned elephant in the room. Possible vulnerability of IP-connected devices to a cyber-attack was seldom, if ever, mentioned, and even the most basic measures to prevent such an attack were not implemented. For the last couple of years, however, the physical security industry has begun talking more about cybersecurity, in some cases with an abounding enthusiasm typical of the newly-converted. Have our discussions sufficiently addressed the long-standing lack of awareness? We asked this week’s Expert Panel Roundtable: Are we talking enough about cybersecurity? Or too much? (And why?)
Hospitals and healthcare facilities are an important vertical sector in the physical security market. Protecting healthcare facilities is a rich opportunity to leverage the value of physical security systems that range from video to access control to newer location and asset protection systems. But understanding how technology can excel in the healthcare vertical requires that we first identify and understand what these institutions need. Therefore, we asked this week’s Expert Panel Roundtable: What are the physical security challenges of hospitals and healthcare?