RealNetworks, Inc., global provider of digital media software and services, has announced SAFR for Security, a new solution that integrates SAFR, the world’s premier facial recognition platform for live video, with leading video management systems (VMS) to provide enhanced visibility and situational awareness for security professionals. Announced at ISC West in Las Vegas, SAFR for Security is immediately available for worldwide deployment. SAFR for Security Heads of security at hospitals...
RS2 Technologies, globally renowned security and access control systems provider firm, has been named as a new Strategic Alliance Partner in the United States by Zenitel Group, the global provider of Intelligent Communication solutions. Integrated systems “Zenitel’s continued innovative approach to simple but powerful integrated systems provides a complete unified solution to customers of all sizes”, said Dave Barnard, Director of Dealer Development for RS2. “Zenitel ha...
An innovative technology is changing the way law enforcement agencies combat crime and ensure public safety. Footprint, a web-based situational awareness software, aggregates, analyses and monitors data from multiple video monitoring systems and other sensors in one intuitive platform. The tool enables law enforcement to solve cases quicker using data-driven decisions, while minimising manpower and driving down costs as a result. Copp Integrated Systems, a Dayton, Ohio-based security systems su...
Videx Security has appointed a new Regional Sales Manager for the London and South East region. Mabs Alam has vast sales and management experience and understands the access control and door entry market well. He takes on the role to help drive business opportunity and growth specifically in the South East region including London. Mabs will be focused on generating new business opportunities as well as maintaining positive relationships with existing customers. Improving relationships with dis...
Access control manufacturer Inner Range has announced a new integration with ANPR company Tattile. Inner Range’s award-winning access control and intruder detection system, Integriti, can now integrate with Tattile’s ANPR system, Vega Smart HD/2HD. The Italian manufacturer’s Vega Smart HD/2HD system is designed for security, free flow tolling and traffic monitoring. It offers high levels of accuracy in reading number plates, including at speeds of over 150mph. The system can...
You can work smarter and more sustainably when electronic locks and keys power your security. An electronic locking solution minimises security risks when keys go missing. With an eCLIQ system from ASSA ABLOY, you can manage everyone’s access from anywhere, at any time — electronically, securely and wirelessly. Based on award-winning CLIQ access control technology, the eCLIQ system is built around precise locking mechanics and high-end microelectronics. A battery inside each program...
IDIS video surveillance technology features strongly in the 2019 Safety & Health Excellence Awards, with its high-performance solutions shortlisted in two popular categories. The contested awards, organised by Western Business Exhibitions and incorporating the British Safety Industry Federation Awards, received more than 200 entries in 10 categories. IDIS has been shortlisted for both ‘Innovation of the Year for Security’ and ‘Best Health & Safety Project’, which are among the most competitive awards. The ‘Best Health & Safety Project’ category, which IDIS entered alongside its systems integration partner ISD Tech, recognises the undertaking which has delivered the most significant improvements to the health, safety or wellbeing of people and/or premises. Video surveillance solution Last year Southern Health embarked on one of the biggest video upgrades The joint nomination between IDIS and ISD Tech highlighted their successful work to deliver video surveillance solution at child and adolescent mental healthcare facilities run by Southern Health NHS Foundation Trust. Last year Southern Health embarked on one of the biggest video upgrades ever undertaken in the NHS and its security department identified IDIS technology as the best for the project following a demanding proof-of-concept comparison. The ‘Innovation of the Year for Security’ category recognises products that have been developed to improve security standards across a wide range of technologies, from perimeter protection to cybersecurity. IDIS’s strong performance in this category is spearheaded by its 12MP Super Fisheye Camera which, since its launch 18 months ago, has become its high-selling model. 12MP Super Fisheye camera The camera has been developed with the needs of both installers and end-users in mind, and for everyone it delivers improved system performance and security. For the installer, the Super Fisheye camera gives a better choice for wide area protection applications, including lobbies, auditoriums, corridors, open rooms and storage areas, and helps their customers to achieve more within their budgets. IDIS Super Fisheye delivers lower equipment cost and maintenance For the end-user the IDIS Super Fisheye delivers lower equipment costs (it can typically replace three or four fixed cameras), lower installation fees, a reduced maintenance burden and affordable operation (it records the full scene without the need for an operator 24/7) with intuitive and smooth de-warping in both live view and playback. “We are delighted that our 12MP Super Fisheye has performed so strongly in these competitive awards,” says James Min, Managing Director, IDIS Europe. “As a growing number of projects across the region and globally is now proving, this camera allows much more to be done within all budgets. It gives both integrators and end-users a whole new level of cost and performance benefits.” Video surveillance manufacturer IDIS is Korea’s in-country video surveillance manufacturer and, since opening its European headquarters in 2013, it has established a reputation as a leading one-stop video solutions supplier and worked hard to develop sustainable partnerships with end users, integrators and distributors.
MOBOTIX and Konica Minolta are currently developing a new camera platform that specifically meets the requirements of deep learning methods and will lead to innovative recurring revenue models for both companies: MOBOTIX camera platform The new MOBOTIX camera platform, jointly developed with Konica Minolta, is based on the distributed intelligence in our camera system and is crucial for artificial intelligence and at the same time the key for the communication of our products with other sensors and devices in the network to enable "Beyond Human Vision" solutions. These solutions include the reliable detection of threats through the combination of different sensor technologies as well as the independent initiation of measures to counter such threats. Increased process efficiency The state-of-the-art analysis methods located on the camera itself helps users increase process efficiency and develop new business and revenue models The state-of-the-art analysis methods located on the camera itself helps users increase process efficiency and develop new business and revenue models. Future software updates will enable completely new functions based on deep learning methods, such as the recognition of human behavior, moods or voices. In order to make this possible, a so-called "plug-in concept" is being further developed that goes far beyond what is available on competing products. This allows customers to easily create new features similar to developing apps for mobile devices while taking full advantage of the system's performance, including full CPU and GPU power and programmable logic. Examples could be analysing customer behaviour in retail situations and detect emergency situations in elderly homes and hospitals or analyse quality in production lines. The first products based on the new camera platform will be launched in the first quarter of our financial year 2019/20.
Evolis announces the formation of a wholly-owned subsidiary in Tokyo, Evolis Japan K.K. The globally renowned French card issuance company designs, manufactures and commercialises a complete range of personalisation and issuance solutions for plastic cards in various markets such as retail, hospitality, banking or public administrations across the globe.Evolis has been present since 2008 in Japan through a distributor. The creation of a local subsidiary aims at strengthening relations with local partners in order to accelerate the group's business development and establish a long-term presence in Japan. Evolis Japan K.K. Operational since January 7, 2019, Evolis Japan will market the entire Evolis product range and offer technical support by Japanese speakers Operational since January 7, 2019, Evolis Japan will market the entire Evolis product range and offer technical support by Japanese speakers, expand the traditional distribution network, develop channels dedicated to new industry sectors, and strengthen response to the demands of government bodies and financial institutions."Japan is one of the world's leading economies with more than 125 million people. We therefore see strong potential for card personalisation in several markets. The creation of a Japanese company will help in our existing business relationships and facilitate the development of new partnerships" says Eirik Bakke, Managing Director, Evolis APAC. On-site encoding and securing key cards Evolis systems allow for the on-site personalisation, encoding and securing of cards that support various applications, such as access control badges, debit and credit cards, ID cards, resident permits, drivers' licenses, transport passes, student IDs, as well as product tags for the retail and hospitality market.Evolis' solutions support any requirement in card personalisation, from basic printing in small runs up to the personalisation of advanced and secured cards in large volumes. Numerous governments, financial institutions and large retail chains are using Evolis' card personalisation systems to issue their cards. Card personalisation systems Due to its flexible manufacturing capabilities and technical expertise, Evolis meets stringent customer demands in terms or technical features, quality and delivery lead times. A project team is dedicated to designing specific and tailored solutions, recognised at national and international levels.
Videonetics, global visual computing platform development company, is all set to launch its latest Artificial Intelligence & Deep Learning-enabled Unified Video Computing Platform for vertical markets, including enterprise, industrial, education, IT Parks, healthcare and hospitality at FSIE 2019, India’s most comprehensive event for fire safety & security, scheduled from 28th February to 2nd March in Mumbai, India. AI and Deep Learning framework Powered by its patented and award-winning AI & Deep Learning Framework, Videonetics will be showcasing its Unified Video Computing Platform which is custom built for securing enterprise workplace and workforce. Videonetics Unified Video Computing Platform encompassing Intelligent VMS & video analytics like dire & smoke detection, safety gears like helmets, glasses and apron detection, graffiti and vandalism detection, property cleanliness detection & garbage management, crowd detection, perimeter protection, object classification, vehicle movement monitoring using ANPR and speed detection, vehicle entry-exit monitoring for gate management and facial recognition, will be demonstrated live during the show. FSIE Show will be an appropriate platform to launch Videonetics solutions for Enterprise, Industrial and Commercial verticals" Expressing on the participation, Mr. Avinash Trivedi, VP-Business Development Videonetics said that, “FSIE Show will be an appropriate platform to launch Videonetics solutions for Enterprise, Industrial and Commercial verticals and meet consultants, end users, decision makers and other stakeholders of the eco-system. We are looking forward to the show and very sure of its grand success.” Mitigating safety and security risks “Field-proven and tested with real-time video data of varied environment, our solutions are well-competent to solve their day-to-day challenges as well as address critical needs such as mitigating safety & security risks, improving work environment, reducing production loss and improving profitability, improve workers/employees occupational safety, create situational awareness, maintaining business continuity and optimising operations for organisations, assets and infrastructure.” The pavilion will be having a demo zone to provide live & hands-on experience of our technology to visitors. Videonetics customer interface and technical team will be providing live demos to the visitors and prospective customers on the operations, flow and utility of its solutions.
Integrated access control system manufacturer, Inner Range, has announced customers with Concept systems should migrate to Integriti as Concept nears End of Life. Award-winning Integriti is compatible with Concept so migrating is easy, efficient and extremely cost-effective at only a fraction of the cost of an entire system replacement. Concept systems and parts are available to buy until the end of April 2019. Inner Range will continue to provide technical support for existing customers, repairing or replacing parts from existing stock or suitable alternatives as necessary. However, the system’s underlying technology is no longer economical to maintain in comparison with modern platforms like Integriti, and Inner Range has found it increasingly difficult to source the required electrical components. Cost-effective migration path Integriti is a brilliant product for enterprise spaces and offers a very cost-effective migration path for our Concept customers"Concept systems use Insight software. Insight follows the same End of Life timeline as Concept. Tim Northwood, General Manager at Inner Range, said: “We owe much of our success to the Concept system and we remain very proud of our flagship product. But technology always moves forward. Integriti is a brilliant product for enterprise spaces and offers a very cost-effective migration path for our Concept customers. “We’ll continue to provide technical support for Concept users but we’re urging them to migrate to Integriti. This will futureproof their system and give them access a whole host of additional benefits.” Benefits of migrating to Integriti Integriti is an award-winning intelligent integrated security solution ideal for managing and controlling single and multiple sites at local, national and global levels. Benefits for Concept users migrating to Integriti include more integrations with current manufacturers for security, building automationBenefits for Concept users migrating to Integriti include more integrations with current manufacturers for security, building automation, people and business continuity processes, superb graphics, enhanced reporting, more flexibility around global programming and permissions as well as being compatible with current and future IT platforms, such as Windows and Vista. Systems installed in over 30 countries Concept 2000 was Inner Range’s flagship system. It was designed by three of the four founders of Inner Range: Doug Frazer, David Baughan, and Alan Winch. First installed in 1989, the system was updated to the Concept 3000 and later the Concept 4000; thousands of Concept systems have been installed around the globe. Inner Range has been a pioneer in the design and manufacture of intelligent security solutions since it was established in 1988. More than 130,000 Inner Range systems have been installed in over 30 countries. Customers include hospitals and high-security units, colleges, distribution centres and pharmaceutical companies. government and critical national infrastructure.
People and vehicle access control specialists Nortech will be exhibiting some exciting new products at Parkex 2019 this April. Ideal for businesses that want to know more about people and vehicle access solutions and their benefits, the South Wales-based company will be launching its new 8 Series detector range, debuting its next generation Nedap ANPR Access V2 and showing its popular Variable Message Sign (VMS) system. Extensive experience Nortech has supplied products and solutions to the security industry for over 25 years as an independent British company. The company uses extensive experience and expertise to create new security products to fit their clients’ needs and designs everything with the customer in mind. The 8 Series is Nortech’s new flagship boxed detector range and boasts both intuitive and innovative detection technology packaged in a compact The company offers a range of products in vehicle detection, vehicle tagging and parking control management and are designed to ensure easy management of multiple vehicles. The 8 Series is Nortech’s new flagship boxed detector range and boasts both intuitive and innovative detection technology packaged in a compact, slimline housing - which bucks the trend of its predecessors. Dual channel detectors The 8 Series range of single and dual channel detectors is set to cater to market demand for detectors that facilitate ‘plug-and-play’ installation whilst still allowing full site configuration using the state-of-the-art DU800 diagnostics device and mobile app for the more tech savvy. The sleek new housing is a result of a conscious move away from the traditional 11-pin relay base to a slimline DIN Rail mount housing which exposes more physical connection options. The 8 Series detectors incorporate Nortech’s cutting-edge modular design, allowing for the expansion of channels, outputs and communication interfaces via the ingenious expansion port. The ANPR Access V2 short-range keeps up with the rapid growing demand for effective number-plate reading. Vehicle access control It is purposely designed for vehicle access control applications with built-in Wiegand modes whilst ensuring customers benefit from the latest developments in ANPR technology. Nedap’s ANPR cameras identify vehicles by capturing their number plates, making it the perfect solution for applications where it is undesirable or not possible to issue (RFID) tags. It is ideal in situations where vehicles need to be granted continual or temporary access to a site such as in employee or visitor parking applications. Nortech’s Variable Message Sign (VMS) is a high intensity, full colour SMD LED sign Nortech’s Variable Message Sign (VMS) is a high intensity, full colour SMD LED sign that is fully compliant with the European VMS standard EN12966, and offers bright, clear messages indicating available spaces and status messages. Carry corporate branding Contained in a robust weatherproof IP65 aluminium housing, the VMS comes either as a compact, single display sign or as a single/multi-level information sign complete with artwork. The multi-level signs are available with one to five level counts as standard, with customers specific count levels also available, making them ideal for many applications including highways, hotels, car parks, corporate offices, airports and hospitals. They can also carry corporate branding as required. Visit Nortech at Parkex 2019 on 2-4 April at Birmingham’s NEC to find out more about the many systems available and how they can benefit the future of people and vehicle control solutions.
Managing IT and data risk is a challenging job. When we outsource our IT, applications and data processing to third-parties more and more every day, managing that risk becomes almost impossible. No longer are our data and systems contained within an infrastructure that we have full control over. We now give vendors our data, and allow them to conduct operations on our behalf. The problem is, we don’t control their infrastructure, and we can never fully look under the hood to understand and vet their ability to protect our data and operations. We have to fully understand how important this issue is, and ensure we have the right governance, processes and teams to identify and mitigate any risks found in our vendors. No longer are our data and systems contained within an infrastructure that we have full control over Today, everything is connected. Our own networks have Internet of Things (IoT) devices. We have VPN connections coming in, and we aren’t always sure who is on the other end of that connection. It is a full-time job just to get a handle on our own risk. How much harder, and how much larger should our teams and budgets be, to truly know and trust that our vendors can secure those devices and external connections? For every device and application we have internally, it is very difficult to even keep an accurate inventory. Do all of our vendors have some special sauce that allows them to overcome the traditional challenges of securing internal and vendor-connected networks? They are doing the same thing we are – doing our best with the limited human and financial resources allocated by our organisation. Risk stratification and control objectives The benefits of outsourcing operations or using a vendor web application are clear. So how can we properly vet those vendors from an IT risk perspective? The very first thing we need to put in place is Risk Stratification. Risk Stratification presents a few targeted questions in the purchasing process. These questions include – what type of data will be shared? How much of this data? Will the data be hosted by a vendor? Will this hosting be in the US or offshored? Has the vendor ever had a data breach? These questions allow you to quickly discern if a risk assessment is needed and if so, what depth and breadth. Risk stratification allows you to make decisions that not only improve your team’s efficiency, but also ensure that you are not being a roadblock to the business Risk stratification allows you to make decisions that not only improve your team’s efficiency, but also ensure that you are not being a roadblock to the business. With risk stratification, you can justify the extra time needed to properly assess a vendor’s security. And in the assessment of a vendor’s security, we have to consider what control objectives we will use. Control objectives are access controls, policies, encryption, etc. In healthcare, we often use the HITRUST set of control objectives. In assessing against those control objectives, we usually use a spreadsheet. Today, there are many vendors who will sell us more automated ways to get that risk assessment completed, without passing spreadsheets back and forth. These solutions are great if you can get the additional budget approved. Multi-factor authentication Even if we are using old-fashioned spreadsheets, we can ensure that the questions asked of the vendor include a data flow and network/security architecture document. We want to see the SOC2 report if they are hosting their solution in Amazon, etc. If they are hosting it within their own datacentre, we absolutely want to see a SOC2 Type II report. If they haven’t done that due diligence, should that be a risk for you? Today, we really need to be requiring our vendors to have multi-factor authentication on both their Internet-facing access, as well as their privileged internal access to our sensitive data. I rate those vendors who do not have this control in place as a high risk. We’ve recently seen breaches that were able to happen because the company did not require administrators or DBAs to use a 2-factor authentication into sensitive customer data sources. In the assessment of a vendor’s security, one has to consider what control objectives to use This situation brings up the issue of risk acceptance. Who in your organisation can accept a high risk? Are you simply doing qualitative risk assessment – high, medium and low risks? Or are you doing true quantitative risk analysis? The latter involves actually quantifying those risks in terms of likelihood and impact of a risk manifesting, and the dollar amount that could impact your organisation. So is it a million dollars of risk? Who can accept that level of risk? Just the CEO? These are questions we need to entertain in our risk management programs, and socialised within your organisation. This issue is so important – once we institute risk acceptance, our organisation suddenly starts caring about the vendors and applications we’re looking to engage. If they are asked to accept a risk without some sort of mitigation, they suddenly care and think about that when they are vetting future outsourced solutions. Quantitative risk analysis involves quantifying risks in terms of likelihood and impact of a risk manifesting Risk management process In this discussion, it is important to understand how we think of, and present, the gaps we identify in our risk management processes. A gap is not a risk. If I leave my front door unlocked, is that a control gap or a risk? It is a gap – an unlocked door. What is the risk? The risk is the loss of property due to a burglary or the loss of life due to a violent criminal who got in because the door was unlocked. When we present risks, we can’t say the vendor doesn’t encrypt data. The risk of the lack of encryption is fines, loss of reputation, etc. due to the breach of data. A gap is not a risk. Once we’ve conducted our risk analysis, we must then ensure that our contracts protect our organisation? If we’re in healthcare, we must determine if the vendor is, in fact, a true HIPAA Business Associate, and if so we get a Business Associate Agreement (BAA) in place. I also require my organisation to attach an IT Security Amendment to these contracts. The IT Security Amendment spells out those control objectives, and requires each vendor to sign off on those critical controls. We are responsible for protecting our organisation’s IT and data infrastructure – today that often means assessing a 3rd-party’s security controls One final note on risk assessments – we need to tier our vendors. We tier them in different ways – in healthcare a Tier 1 vendor is a vendor who will have our patient information on the Internet. Tiering allows us to subject our vendors to re-assessment. A tier 1 vendor should be re-assessed annually, and may require an actual onsite assessment vs. a desk audit. A tier 2 vendor is re-assessed every 2 years, etc. We are responsible for protecting our organisation’s IT and data infrastructure – today that often means assessing a 3rd-party’s security controls. We must be able to fully assess our vendors while not getting in the way of the business, which needs to ensure proper operations, financial productivity and customer satisfaction. If we truly understand our challenge of vendor risk management, we can tailor our operations to assess at the level needed, identify and report on risks, and follow-up on any risks that needed mitigated.
When asked about what the market should be thinking about in 2018, I am left offering an answer that serves as an urgent call to action: prepare yourself for change! The security industry is soon likely to see a dramatic shift from the traditional segmentation of commercial and residential security. Smart phones, mobile technologies, cloud computing, and having everything provided ‘as a service’ in peoples’ lives means users of buildings have a new set of expectations. In many ways, the coming crosspollination of residential and commercial security offerings means we will have a better idea of best practices. The convenience of residential spaces will combine with the robust security of commercial facilities, for example. But this also means a higher level of demand will be placed on security integrators, facility managers and owners. Operations groups may need to change drastically to offer new technologies. Security as a service is likely to become more common. And new technologies are emerging that will facilitate this change and require new skillsets and expertise. So, what the market should be thinking about right now is: how do we all, collectively, keep up? More critical is finding ways to offer or utilise new technologies and total solutions that make operations easier Ensuring security preparedness As it stands now, in terms of physical security for doors and openings, we are currently in a world where we can secure almost anything. Be it hospital, school, file cabinet, server rack, grain silo or barn that is off the electrical grid, we have a solution for that. So being hyper-aware of your industry, its offerings, and how the products work together is important, as it means every location that needs security can have security. But perhaps more critical is finding ways to offer or utilise new technologies and total solutions that make operations easier, moving security components deeper into a building, facility or campus, and building and leveraging on partnerships where everyone is invested in the other’s success. Here are a few suggestions for addressing these issues. Training in new security solutions Perhaps the biggest change in the near term will be emerging technologies that will alter how we currently use security solutions. Be it cloud-based security, intelligent keys, new types of credentials, or simply a better software for management, the need to be well-versed on these offerings is key. To this end, it is important to not only know what offerings exist in the security world, but also be well-trained on them. Seek out a manufacturer that is willing to offer training and education on products, strategies and solutions. While it is important to secure server rooms at the point of entry, it might also make sense to provide a cabinet lock with audit capabilities on the rack or cabinet itself Identifying an end goal Further, approach the integration and implementation of these technologies with a collaborative mindset. For dealers and integrators this means utilising new technologies to better secure a facility for a client. As a building owner or manager, it means making tenant and occupant life better while streamlining your own operations. The ultimate goal of any new technology is to meet customer needs in the very best possible way. And that goal should trickle down from manufacturer to integrator to the facility manager and ultimately the end user. Don’t just implement technology for the sake of doing so. Do it with purpose by identifying an end goal and utilising these amazing solutions to achieve that. Identifying an end goal also means seeking out the core requirements a building has to provide users with the expected level of security and service. This is obviously dependent on the building, and it doesn’t always mean physically moving into a building, but rather looking at ways to move further into the operations of a business. Securing access to buildings Government facilities are undergoing a transition to security requirements dictated by the FICAM programme For some businesses, keeping server racks or file cabinets secure can be critical. And while it is important to secure these rooms at the point of entry, it might also make sense to provide a cabinet lock with audit capabilities on the rack or cabinet itself. New opportunities also fall into this category. Government facilities are currently undergoing a transition to security requirements dictated by the Federal Government’s Identity, Credential, and Access Management (FICAM) programme. FICAM sets standards for implementation of secure access to all government facilities and mandates the use of FIPS 201 Personal Identity Verification (PIV) for federal employees and contractors. This means that PIV enabled access points will be required on the perimeters, interiors and other openings. Finding ways to retrofit these affordably, efficiently and effectively means offering more secure openings on what is likely to be a tight budget. This can also apply to offsite facilities. Earlier I mentioned barns and grain silos – locations that are often left off electrical grids but can come with the need for auditing capabilities – and a solution exists for that. So, while a corporate headquarters might be under robust lock and key, it is always good to ask about other locations that could use a simple security upgrade. Personal Identity Verification-enabled access points will be required on the perimeters, interiors and other openings Establishing security partnerships Again, the best way to achieve readiness with this approach is to be aware of the market and its offerings, and to engage in collaborative partnerships. Collaborative partnerships are critical for everyone who is tasked with protecting the people and places that matter most. Manufacturers rely on the integrators and building supervisors to understand the new and developing needs in the industry. Integrators then must rely on manufacturers to provide these solutions, offer education and training, and be in constant contact about the newest technologies available. Collaborative partnerships are critical for everyone who is tasked with protecting the people and places that matter mostAnd building owners or managers must both be aware of their tenant and end user needs and demands – be it for new technologies or even seeking out sustainability solutions. In turn, they need to know they can rely on a collaborative approach from an integrator and manufacturer who is invested in their success. Industry collaboration for a secure future Again, the biggest thing we must all need to consider now is how to prepare for the future. Treading water is simply not enough in the security market anymore. New technologies and performance expectations are forcing us to consider ways to better serve our clients – whether we are a manufacturer, integrator or in charge of facilities. And the best way to do this is together. We are all invested in the success of one another, and in the people who use the places we strive to keep safe. By seeking out, developing, and cultivating these partnerships in collaboration and innovation, we are able to help one another prepare for the future that is becoming more complex, intriguing and exciting every day.
2017 was an incredible year for VuTeur and the industry as a whole, as security has become a primary focus for stakeholders, now more than ever. VuTeur introduced its proprietary IRIS (Internal Real-time Intelligence Software) technology this year, which is part of its emergency management and asset protection solution. IRIS leverages real-time location services (RTLS) technology and utilises the existing WiFi infrastructure in a building to create a personal, mobile safety device built to save lives — all while reducing infrastructure and cost. Tragedy informing the industry The tragic and unfortunate events that occurred in 2017 and in the years prior, such as mass shootings and natural disasters, have made adding layers of security a prominent trend in 2017. Soft targets have unexpectedly become the focus of many attacks, placing an even more significant emphasis on determining how to protect individuals within a campus. Visitor management was a key trend VuTeur focused on this year and will continue to concentrate on, as many security issues tend to stem from an uncertainty of who is in a building at any given time. Securing all types of campuses will continue to be crucial into 2018. Schools, healthcare facilities, stadiums and arenas, and other organisations face the challenge of maintaining a welcoming and friendly environment, while understanding and monitoring who is in the facility and properly safeguarding the area. Stadiums and arenas face the challenge of maintaining a welcoming and friendly environment, while properly safeguarding the area The security industry will continue to trend upward, which will help push new technologies, such as VuTeur's, that augment perimeter and building safety in every vertical. What’s to come Next year, VuTeur's technology portfolio will expand, and we plan to establish deployments in a variety of applications, such as on educational campuses, hospitals, arenas, corporate campuses and government facilities. Communication will remain critically important in the event of an emergency, making RTLS technology extremely valuable for conveying routine- and threat-based messages. Integration will also be a significant trend in 2018, as it is vital for security systems to "talk" to each other, such as RTLS talking to access control and mobile devices, to create a more holistic approach to protecting assets and people.
No doubt about it, the ASIS International show is smaller than in years past. And there is (the usual) grumbling about slow attendee traffic (and the also predictable counter-arguments about “the quality of the leads.”) Some of the security and safety technology being featured was introduced earlier at ISC West, but there is still plenty to see in the exhibit hall. Growth of mobile credentials Mobile credentials are a hot topic again, and Lenel has joined the growing number of companies supplying a mobile credentialing system to the market. Lenel’s Blue Diamond mobile credentials are based on technology developed by United Technologies sister company Supra. The use of a cell phone (by Supra) to open a real estate key box has already been adapted to the hospitality industry (with a deployment at Hilton Hotels), and now as an access control credential, part of Lenel’s OnGuard Version 7.3 release for the commercial and industrial security market. The components of the system are a Bluetooth reader, a virtual credential provided through a smart phone app, a cloud-based credentialing portal, and integration with the latest version of OnGuard. Offering a full solution is simpler to implement, and Lenel even has an “in-line” Bluetooth reader that can be used to add Bluetooth capabilities to existing systems. It’s just one aspect of the OnGuard 7.3 release that also is “reinventing the OnGuard experience,” according to Ross McKay, Lenel Systems International’s Director of Project Management. Future adoption Mobile credentials are big talk at ASIS, but how long before they will be widely used? Estimates are all over the map, but research firm IMS has projected the percentage adoption of mobile credentialing at 19 percent by 2020 (according to McKay of Lenel). "Our industry is slow to adopt, but if you show mobile credentialing to end users, they get it immediately, anything you can give them on a phone, they will use" But Steve Van Till, president and CEO of Brivo, which launched its mobile credentialing system at last year’s ASIS, sees a range of possibilities in terms of adoption. Witnessing the fast adoption of smart phones as alternatives to perform a large number of daily tasks, some say mass adoption could only be a couple of years away. On the other hand, in our market, a lot of people are still using proximity cards (despite introductions of superior alternatives over the years). That legacy argues for slow adoption indeed. “Our industry is slow to adopt, but if you show mobile credentialing to end users, they get it immediately,” says Van Till. “Anything you can give them on a phone, they will use.” Because ASIS is an end user show, exhibitors tend to reflect on the changing dynamic of selling to end users. Changing purchasing dynamics How end users buy products may be changing -- obviously the IT department is having a greater influence than ever before. But what hasn’t changed is the importance of creating a system that will keep end users satisfied as they use it day-to-day for years after the installation is complete. IT may be yielding more influence, but at the end of the day, it’s the security customers -- the attendees at ASIS -- who must be satisfied. “While the IT infrastructure and personnel are involved in how decisions are made, security personnel are still heavily involved,” says Sharad Shekhar, CEO of Pelco by Schneider Electric. “On a day-to-day operations level, it’s the security user who either truly benefits or gets truly hurt by the product. We face IT challenges up front, but the day-to-day utility of our products in the market is judged by the security people, not the IT people.” Shekhar says feedback from those day-to-day end users is one factor that makes a show like ASIS so important. “We need to get continuous feedback to guide our future product development,” says Shekhar. “The type of people who do security -- they like stability. They like certainty because it’s the nature of the business. They want to apply solutions that have been vetted, that are proven. Customers can’t afford to make a mistake.” "The type of people who do security - they like stability. They like certainty because it’s the nature of the business" At ASIS, Pelco is showing its VideoXpert open video management system (VMS) platform, integrated with the Optera multi-sensor panoramic camera. The ability of the VMS to display a seamless multi-sensor image is getting good feedback from customers. Pelco’s core strategy is to focus on four major verticals -- gaming, city surveillance, oil and gas, and ports. They devote a range of resources to each of the major verticals, including multi-functional teams including research and development, engineering, product support and marketing personnel. A fifth core vertical in the United States is corrections, and Pelco also sells in secondary verticals such as education, healthcare, etc., although they are focusing more on the core verticals. Education and training Education is an important aspect of the ASIS show, there are rooms and rooms of educational sessions on a range of topics going on concurrently with the trade show. But education is also happening on the show floor, often in the form of presentations from vendors in theatre-like areas of their booths. Promise Technology, a manufacturer of storage systems, is a first-time ASIS exhibitor that is providing educational sessions in their presentation theatre in cooperation with VMS partners. “There is a lot of information in education and training,” says John van den Elzen, Managing Director, Worldwide Surveillance Business Unit, Promise Technology. “End users like to know how a solution is working. They don’t want to hassle with it if it doesn’t work. We qualify all the VMS vendors before the product comes to market. We know it works. We have a good relationship with the VMS vendors and work together if there is a problem -- no finger-pointing.” Promise provides RAID storage systems that are specifically targeted to the security market, and promote the products using security terms rather than IT terms. And they listen to feedback, whether at a trade show or at the many education events they have held globally to growing numbers of attendees. “This is very successful,” says van den Elzen. “People have a lack of knowledge and we look to fill in that gap.” There’s more knowledge to be had, and more exhibitors to visit in the second day of ASIS.
End users are looking to expand access control beyond its traditional role securing perimeter doors. Innovations such as wireless locks, wi-fi, power-over Ethernet (PoE) and panel-less IP architectures are yielding more flexible solutions for a larger range of locking needs both inside and at the perimeter of an enterprise. Donna Chapman, an ASSA ABLOY Integrated Solutions Specialist, notes that new technologies are increasing how many openings are secured in a building from the current 5 to 15 percent to as many as 25 to 40 percent of openings. Access control for data centres Openings don’t just mean doors – it could mean a lock for a prescription drug cabinet in a hospital or physical access to a server in a data centre. I caught up with ASSA ABLOY at AMAG’s Security Engineering Symposium (SES) 2016. AMAG and ASSA ABLOY are technology partners – AMAG’s Symmetry access control system is integrated with ASSA ABLOY’S IP-enabled locks. Our discussion covered changing locking trends – and new opportunities for consultants, integrators and end users. “It used to be enough to secure the perimeter of a data centre, for example” says Jim Crowley, ASSA ABLOY’s Electronic Access Control (EAC) OEM Business Development Manager. “But now customers want to be able to secure the actual rack the server blades are in. In a co-located data centre, you have data from various companies stored together at one facility, and you want to control who’s getting physical access to the data.” Regulations are driving some needs for new locking solutions. In the data centre scenario, protection of medical information required by HIPAA [the U.S. Health Insurance Portability and Accountability Act of 1996] is driving the need to secure various openings – there are hefty fines for any violations of HIPAA rules. "It used to be enough to secure the perimeter of a data centre, but in a co-located data centre, you have data from various companies stored together at one facility, and you want to control who’s getting physical access to the data" “If you look at the regulatory environment we’re in today, NERC (for the electric utility market) and HIPAA and those types of regulations are requiring that openings have auditability,” says Crowley. “You need to know which people have access to openings both proactively and on a forensic basis. That’s driving access control further into the enterprise and onto openings that you historically didn’t see.” [NERC is the North American Electric Reliability Corp.] Wired vs wireless locks “There’s no one-size-fits-all solution,” adds Chapman. “You want to be able to offer a locking solution based on needs and budget, and you have a lot of options.” While every lock cannot be wired, it’s also true that many applications don’t lend themselves to wireless solutions. A strategic mixture is the best approach. “We are not trying to displace all hard-wired doors with wireless,” says Crowley. “There will always be a need for wired and wireless – they’re complementary, and not mutually exclusive.” He also notes that wireless locks use AES 128-bit encryption to ensure security. “We are always looking to improve the security of that wireless transmission, but some people have it in their head that wireless is not secure, which isn’t the case.” However, because concerns persist, ASSA ABLOY just came out with Wiegand wired versions of its cabinet locks and server cabinet locks. Some data centres just don’t want wireless locks in their facility. Adopting cloud security solutions Another development is cloud applications for the light commercial market, which offer an attractive price point that combines security and convenience. “When folks talk to me about being concerned about security in the cloud, I ask them: How do you do your banking? If you’re using your bank’s Web-based services, your entire financial life is in the cloud.” When developing its variety of locking solutions, ASSA ABLOY is always listening to the voice of the customer, says Chapman. “We want our solutions to be innovative and customer-centric, with everyone having a good user experience – including our OEM partners, channel partners, integrators and end users.” The company has teams of people who constantly call on integrators, security consultants and architects, as well as owners and users. “We are constantly evolving, and we want to take whatever necessary steps to make doing business with ASSA ABLOY easier.”
We all know that security video cameras are becoming smarter. The IP cameras at the edge of today’s video surveillance systems contain computer chips that can potentially change how cameras are used. However, despite the changing technology and greater intelligence at the edge, today’s systems mostly use video cameras for one thing – to provide video. In some cases, the cameras provide hours and hours of video that no one will ever watch. Re-examining the role of video cameras Prism Skylabs is helping to drive a re-evaluation of the role of video cameras in the market. Founded in 2011, the San Francisco cloud service company thinks of IP cameras as sensors that are capable of providing a range of data that can be managed and processed in the cloud to provide more useful information to end-user customers. Prism’s current implementations of the “software as a service” approach focuses on retail merchandising and marketing applications, but Prism Co-Founder and Senior Vice President Bob Cutting sees many other opportunities too. The cloud infrastructure provides a “reliable and continuously connected way to monitor and get data from cameras that is extremely robust and reliable,” Cutting says. Information from cameras “trickles up” to the cloud where data is “pre-extracted and available,” helping retailers optimise their store designs and marketing. Prism provides a blend of complementary visual and analytics data. "We looked at the camera andreimagined what it can do as a realsensor – a sensor with intelligencethat is cloud-ready, cloud-enabledand easy to install. How we think ofvideo has to change" Retail applications of video analytics In the retail world, the approach enables marketers and merchandisers to constantly observe and monitor retail displays and customer activity from around the world in real time. Store owners can tell, for example, if their stores opened on time. Did a new product launch effectively? “There are hundreds of questions that retailers want to answer, and they don’t want to watch streaming video from the store,” Cutting says. “They just want answers to questions.” He says the system provides “an easy way to navigate and access data.” If you think of a camera as an intelligent sensor, the data provided by that sensor can take many different forms (and only one of them is “streaming video,” which may not be the most useful for a specific end user need). Cutting says the data is “privacy enabled,” and does not contain personal information. Integrating with CCTV manufacturers Prism has integrated its cloud system with cameras from Digital Watchdog, and announced integration with Axis cameras at the recent ASIS International show in Anaheim. The company is also in the process of integrating with several other large camera manufacturers in the video surveillance market. Employing intelligent cameras at the edge, the company “saw overnight a shift from server-based solution to an edge-based camera solution.” “It’s the right form factor,” says Cutting. “We looked at the camera and reimagined what it can do as a real sensor – a sensor with intelligence that is cloud-ready, cloud-enabled and easy to install. How we think of video has to change.” Role of video analytics in store security Security cameras are capable of providing up to a dozen additional outputs, combining data with visual elements, says Cutting. For example, intelligent cameras can count people, and can track movement of customers in a store based on defined rules. An end user can know how many people go down a certain aisle, how long they dwell in front of a display, how many people visit a certain area in a given time. Cameras can also provide “visual summaries” of activity in a store, showing graphically who went where over a certain period of time, providing retail traffic maps, heat maps, and other visual outputs to guide store owners and managers. Cameras can also provide “visualsummaries” of activity in a store,showing graphically who wentwhere over a certain period of time,providing retail traffic maps, heatmaps, and other visual outputs toguide store owners and managers Finally, cameras can provide a variety of visual data (in addition to streaming video). These include video snapshots (high-resolution images taken periodically and delivered in high resolution to the cloud). Visual outputs might also include “background models,” which are images of retail shelves presented without the customers moving in front of them to provide a detailed view of products and how they are arranged on the shelf. There are also other types of visual outputs, such as time-lapse video, and thumbnail images taken one frame per second. In effect, the visual output is matched specifically to what the end user wants to see – and one camera can be used for multiple outputs to meet the needs of various stakeholders. (Cameras can also provide outputs focused on the needs of loss prevention and security departments.) Examples and applications of retail analytics Lolli and Pops, a 26-store candy chain, is using the system to change the candy store experience. Using the Prism Skylabs system, the company tests multiple combinations of merchandising displays, and measures the effectiveness (and maximises the benefit) of each. The company employs A/B testing – one display in one store and a different display in a second store – to measure which approach works best, in effect fine-tuning the retail experience for customers. Another Prism customer is a large retailer deploying the system throughout Europe, leveraging the system’s ability to count, provide visual insight and understanding, and real-time visibility into the effectiveness of merchandising displays (using a 25-point checklist to ensure compliance). Other potential end-markets include retail banking, hospitality and even casinos – “anyone who wants a better understanding of their space,” says Cutting. He says there is a growing opportunity for physical security integrators in the area of retail analytics, and use of cameras as sensors conforms to emerging industry trends such as “Big Data” and the “Internet of Things” (IoT). He asks: “How can we break down video into core components that are IoT-friendly and that a wider audience can use?”
Comprising a large tertiary and secondary hospital, along with three rural hospitals, Waikato DHB is a substantial healthcare operator which employs approximately 6,000 staff throughout the region. With security needs that include protecting staff from verbal and physical abuse, safely securing high-dependency patients in dementia wards, restricting unauthorised access to medication and medical equipment, and protecting high-risk facilities such as newborn intensive care units, Waikato DHB required security systems that could be applied to both high and low security areas and found the solution in Gallagher’s range of innovative security products. Serving a large geographical area of the North Island of New Zealand, the Waikato District Health Board (Waikato DHB) provides hospital and community-based health services to a population of nearly 400,000 people. Controlling access areas within hospital Gallagher’s system enables us to make changes quickly and push that information out to the card readers instantly"Gallagher’s access control system and Command Centre central management platform provide Waikato DHB with control over access in and out of areas within the hospital. With access profiles that change on a daily basis, as medical staff – predominantly nurses – move between different departments on different days, it’s vital that the system can be updated simply and efficiently. “Gallagher’s system enables us to make changes quickly and push that information out to the card readers instantly, ensuring that staff can approach doors with the confidence that they can enter or leave areas as necessary,” said David Wilson, Manager of Security and Parking for Waikato DHB. The safe and secure storage of medication and medical equipment, ranging from syringes and surgical tools, to large expensive machinery, is a legal requirement of all hospitals in New Zealand. Single access card system Gallagher’s access control solution forms a part of the security system that delivers this for Waikato DHB facilities. Utilising a single access card system where permissions can be set to allow different access ensures the efficient movement of staff, reduces the risks associated with handling keys, and provides a comprehensive audit trail that identifies access movements by employee. Utilising a single access card system where permissions can be set to allow different access ensures the efficient movement of staff Waikato DHB is proud to put people at the centre of what they do, and strives to ensure staff and patient safety at all times. A number of Waikato DHB’s wards require high-level security either for the protection of the patients – as in the case of dementia facilities – or staff. Duress buttons located throughout the hospital and its high-risk areas automatically notify security staff of the exact location where a duress alarm has been activated. Lock-down system Gallagher’s Command Centre Mobile application delivers these duress notifications directly to a guard’s mobile device – speeding up the delivery of urgent information directly to security personnel. The ability to lock-down areas of the hospital for safety reasons is paramount. “Command Centre gives us the ability to isolate areas and restrict access. This is a critical requirement for us and the reliability of that lock-down system is hugely important,” said Wilson. With so many visitors and staff coming and going from the hospital, carpark management is an important aspect of facilities administration for Waikato DHB. In choosing a solution, the DHB selected Gallagher’s Carkpark Management system - an optional licence feature. Streamlined parking processes Through an integration with Gallagher’s Command Centre security management software, staff are able to badge their access card at one of the many staff and public carparks on site, and have their parking fee deducted from their pre-paid account. The programme has in-built intelligence including the ability for staff to exit and re-enter during a set period without being recharged The programme has in-built intelligence including the ability for staff to exit and re-enter during a set period without being recharged. This system has streamlined parking processes, particularly for part-time and shift-work staff who have irregular parking requirements. According to Wilson, “One of the real strengths of this system is the reporting. By managing the pre-paid carpark system through Command Centre and linking it to staff access cards, we are able to effortlessly extract detailed reports.” Electronic Tag Boards Waikato DHB’s facilities are continually expanding and this means a large number of contractors may be present on site within a 24 hour period. By utilising another Gallagher licence feature - electronic Tag Boards - contractors can easily sign on and off of the site. A key driver for this was health and safety, “It’s really important for us to know who is on site in case of an emergency,” said Wilson. “Making this process as simple as possible for contractors is the best way to ensure it is used.” A number of other system integrations appear across the site, including CCTV. Waikato DHB’s largest hospital facility, Waikato Hospital, has over 250 CCTV cameras connected to Gallagher’s Command Centre platform. As Waikato DHB’s requirements continue to evolve, Gallagher’s systems expand alongside them. Security Ward Standard The Security Ward Standard details the minimum security equipment required for new buildings, including access control, duress alarms, and camerasTo remain at the forefront of technology, Waikato DHB has a software maintenance agreement with Gallagher, to ensure they operate the very latest software available. “Any advancement in technology will make life easier, that’s a straightforward investment for us,” said Wilson. Through Waikato DHB’s experience with Gallagher products, the team developed a ‘Security Ward Standard’. This standard details the minimum security equipment required for new buildings, including access control, duress alarms, and cameras. The Security Ward Standard has greatly reduced the time involved by Waikato DHB staff in producing specification documents and gathering approvals. “Gallagher gives us a complete and total security package that is expandable and easy to manage,” said Wilson. “We are confident that a high-standard of security is being consistently applied across our sites for the safety of our staff, patients, and visitors.”
Texas A&M University-San Antonio (A&M-SA) has become the first university in the world to deploy an Indoor Positioning Solution across its entire campus for the purpose of providing the safest possible environment. The SafeZone indoor positioning solution, provided by CriticalArc, provides the campus police with an unprecedented three-dimensional view of multi-story buildings. For example, instead of receiving an alert about ‘an incident somewhere in the student union building’, they get pinpoint specifics, such as ‘it’s on the fourth floor, west wing, outside room 410’. "With indoor positioning and SafeZone, we're able to provide a faster response time, whether it's a medical emergency or an active shooter,” says Roger Stearns, A&M-SA’s assistant chief of Police, featured in this video. The entire police department benefits from advanced features such as heat mapping and incident playback to optimise performance" Safer environment for students The university’s Chief of Police Ron Davidson wanted to innovate with this full-coverage system because the campus was expanding, including a newly completed residence hall, which meant having students around the clock for the first time in A&M-SA’s history. He was committed to ensuring a safer environment for students, staff and visitors. In addition, Chief Davidson was in search of a common operating view that would provide the Emergency Operations Center and all officers on patrol a real-time location of all available officers and volunteers, as well as showing the location of all incidents ̶ essential for coordinating first responders and the Campus Community Emergency Response Team (CCERT). Heat mapping and incident playback “SafeZone is essential technology to position your organisation on the cutting edge of campus law enforcement. The real-time common operating view both enhances officer safety and acts a force multiplier. Plus, the entire police department benefits from advanced features such as heat mapping and incident playback to optimise performance,” Davidson said. Texas A&M-San Antonio has adopted the indoor positioning solution as a standard and will deploy it in all future buildings on campus. The solution is fully supported by the University’s Information Technology department and has been assessed for additional applications to enhance the student experience including wayfinding and research by academics in the newly completed Science and Technology building. Easy to maintain wireless installation The process to get the SafeZone indoor positioning solution deployed is a simple one, as it’s a wireless installation and easy to maintain"SafeZone was easy to deliver with no disruption to the campus. It was deployed in a matter of weeks during the summer break. “The process to get the SafeZone indoor positioning solution deployed is a simple one, as it’s a wireless installation and easy to maintain,” added Stearns. Organisations can install wireless, wearable duress alarms able to pinpoint anyone anywhere on campus as an alternative to fixed, expensive, wired panic alarms. Among other capabilities, SafeZone allows users to get the most rapid help simply by activating an alert, using an app or a wearable duress alarm. As soon as the alert is triggered, the location and details of the user are streamed to the monitoring team, allowing officers to coordinate a smarter, more targeted response. By enabling responders to visualise the precise location of an incident, anywhere on campus, SafeZone is much more powerful than traditional, fixed panic alarms and blue light telephones, which are more expensive to install and less accurate in operation. SafeZone public safety solution Glenn Farrant, Chief Executive Officer, CriticalArc, notes; “I’m delighted by the close partnership between A&M-SA and CriticalArc resulting in this ground-breaking implementation of the SafeZone public safety solution. Chief Davidson and his team are at the forefront of using this technology and we are pleased to be helping them improve the quality of life, and the learning experience, for everyone on their campus.” The SafeZone indoor positioning solution is commercially available worldwide for a range of university, hospital, enterprise and finance applications and is being deployed in more than 80 countries worldwide.
Like many inpatient health facilities around Europe, the Centre Psychothérapique de Nancy (CPN) in France had a persistent problem with lost physical keys. If a key went missing — lost or misplaced, by a resident or staff member — multiple cylinders in a unit would need to be replaced. The expense in terms of staff time and money was significant, and never-ending. And like many other health centres, CPN turned to Aperio wireless technology for a solution. Over 160 Aperio wireless escutcheons have been installed across the CPN premises integrated with the access control system from Delta Security Solutions, most on the doors to patients’ rooms. Now, everyone the ability to circulate freely without needing to carry a cumbersome key. Tracking door security in real time Because the Aperio integration at CPN is online, security staff can now keep track of all door security in real timeBecause the Aperio integration at CPN is online, security staff can now keep track of all door security in real time — which was not possible with the old mechanical master-key system. If a resident loses their credential, facilities staff simply cancel it instantly and reissue another, ensuring security at the site remains intact. Some dorm-style rooms at CPN have multiple beds; in these, Aperio escutcheons secure cupboards for every inpatient, so their personal belongings are kept safe without physical keys or needing to remember PIN codes. The old key-operated safes have been removed, saving CPN the recurring cost of re-keying or replacing safe locks. Securing pharmacy and medicine store The Aperio H100 handle packs the power and flexibility of Aperio wireless access control into one slim interior door handle“Previously when a unit key was lost, we would have to change every cylinder it opened — which for some keys would be very expensive,” says Cédric Marchal, technical services engineer at CPN. At CPN, Aperio devices also secure areas where residents are not permitted, including staff rooms, offices and sensitive zones like the pharmacy and medicine store. Alongside the escutcheons deployed at CPN, the Aperio device range includes online and offline Aperio cylinders; an online security lock; a wireless lock for bringing server racks and cabinets into the same access control system as doors; and the new Aperio H100 handle, which packs the power and flexibility of Aperio wireless access control into one slim interior door handle. Every year since 2011, CPN have budgeted for an expansion in their Aperio system. Every year, more doors at their site are covered — enhancing the safety and well-being of patients. Enabled by Aperio wireless access control technology, the upgrading process continues.
3xLOGIC, Inc., a provider of integrated, intelligent security solutions, and a three-time Deloitte Technology Fast 500 winner, announced Estill County Emergency Medical Services, located in Irvine, KY, is successfully using infinias access control from 3xLOGIC to improve security and give hard-working staff needed peace of mind to focus on their important work. Bates Security, Lexington, Kentucky, designed, installed, and oversees the system. Shelia Wise, in charge of accounting and training for Estill EMS, oversaw the process to upgrade security at the County’s EMS facility. “We were looking to secure a building that is in operation 24/7/365.” Working on behalf of the County EMS’s Board of Directors, Wise and her team assembled three bids and in the process got a real education on access control, what different systems can do, and what their real security needs were. Securing the medical room Our main goals were to secure our medical room, per DEA regulations, and to make our facility safe when staff are here"“Our main goals were to secure our medical room, per DEA regulations, and to make our facility safe when staff are here, but also when they need to clear out at a moment’s notice,” explained Wise. Ultimately, the Board of Directors choose inifinias access control because it met the wide-ranging needs of the County EMS. “We chose the best system for the price and the feature set,” said Wise. Installation was completed about two years ago and the infinias system manages a total of six doors at the main EMS building, two of which are internal, including the medical room where drugs are stored. Later, two more doors were added at a sub-station location. “A top concern is the medical room,” said Wise, “I have to be notified when someone is accessing that door. Now, I get an alert anytime someone is attempting to access that secure room anywhere I am, I don’t need to be onsite. Wise and other staff manage their eight doors from a single interface, by any computer with an Internet connection—anytime, anywhere. Access management for employees “It was important that I could easily operate the system software without help from anyone else. And Sean Moberly from Bates is always available for questions and any maintenance that’s needed. It’s a great feeling to know that when we’re away doing our jobs all our worldly possessions back at the facility are protected and we don’t have to worry,” said Wise. The infinias system manages access for all employees, some outside contractors, and the Chairman of the Board of DirectorsEstill County EMS has 35-40 employees and at any given time upwards to 15 people are at the main station on a daily basis. The infinias system manages access for all employees, some outside contractors, who do radio and computer maintenance, and the Chairman of the Board of Directors. Ms. Wise also grants temporary access to hospital staff who use the facility for training. User-friendly access control system As the main administrator, Ms. Wise has created five different sub-groups among all employees and visitors, providing each group with the access privileges they need to do their jobs, while ensuring that only a few individuals have full access to all doors and areas. “I think the system works really well. There was a short learning curve, but it’s quite user-friendly and we’ve not had any problems. From what I was told at our original meeting with Bates through operations today, we got exactly what we were told, and we’re very satisfied,” Wise concluded.
Omagh Hospital and Primary Care Complex opened in 2017, designed by Todd Architects has recently won Building of the Year – Public Award at the Building & Architect of the Year Awards. The complex presents two wards with 40 single in-patient rooms and aims to promote patient privacy and dignity whilst complying with the latest infection prevention and control standards. A further 22 recovery beds are available for patients recuperating from Day Case Surgery. Working with Building Protection Systems and the Primary Health Trust, Comelit Group created a solution to allow access to visitors after ‘normal hours’ when a Department or entrance is locked-down. Ability to communicate There were many different elements that had to be considered carefully when researching how to effectively manage the hospital security systems" The main requirement was for combined Access and Intercom system to divert to a separate location and provide the same ability to communicate with the caller and release the door remotely. Clive Kinnear, Senior Manager – F&S Systems Sales At Building Protection Systems added: “There were many different elements that had to be considered carefully when researching how to effectively manage the hospital security systems. Not least to provide a welcoming and calming environment that supports patients, staff and visitor health and well-being.” “Any security technology must be strategically placed, unobtrusive and not affect the aesthetics. And it is with the intention of creating this balance Comelit Group really showed their true market leading ability in the sector, to understand our intentions and ensure the best, centrally managed door entry solution was installed throughout the complex.” Emergency call points The overall solution was the integration of an Intercom to communicate across the Trust’s IT Network. Door entrance panels were connected and the system programmed to ensure out of hours calls are automatically transferred. This covers main entrances to the building and also Car Parking Barrier Help Stations to assist with car park barrier issues. Comelit Group provided over 50 systems across the whole site, using both its renowned ViP and Simplebus system technologies Comelit Group provided over 50 systems across the whole site, using both its renowned ViP and Simplebus system technologies. A mix of Vandalcom and Ikall Entry panels were used, calling Icona Video monitors. A further range of emergency call points are located in the car park, all centrally managed and provided with a concierge unit facility and off site monitoring, using Comelit’s C-Bridge to connect to the South Western Area Hospital in Enniskillen. Integrated approach Mike Campbell. Business Development Manager at Comelit Group UK concluded: “Providing security for hospitals involves more than the best choice of products and services – it also requires best practices and an integrated approach to ensure security incorporating door entry, safety and convenience.” “The adaptability of our ViP technology allowed us to work with the contractors to supply a high-¬quality system and offer greater flexibility and reliability. By installing this together with our flagship Simplebus solution, Omagh Hospital & Primary Care Complex can achieve maximum communication with no signal loss over the complete grounds. And this is on a 24 / 7 / 365 basis, including car park facilities, for the benefit and security of all staff, patients and visitors.”
The North East Ambulance Service (NEAS) is the first Ambulance Service to trial body worn video cameras in a scheme that launches this week. Approximately 40 of the Trust’s frontline staff will be trying out the use of body cameras in a bid to offer them greater support against the rise of incidents of violence and aggression. Alan Gallagher, Head of Risk, said: “The health, safety and welfare of our staff are of utmost importance. We want to take every precaution possible to ensure that our employees are safe whilst at work.” NEAS staff adorn body worn cameras “Our staff are reporting more incidents of this nature and we are working closely with the police and other partners to respond to those perpetrators with warning letters and, where necessary, criminal action. From previous reports, we know that most of these circumstances happen away from CCTV covered areas so using body worn video cameras will mean that our staff can record evidence of abuse or assaults when they happen, such as when they are in a residential property attending to a patient." We will continue to work on measures to reduce assaults and liaise with police colleagues" "This move is designed to help us bring more prosecutions against people who put our staff at risk and reduce the assaults and abuse they are currently facing in the line of their work. There really is nothing more disheartening than being hurt by someone that you’ve gone to help, particularly when they already work in such challenging circumstances.” Fighting crime “We will continue to work on measures to reduce assaults and liaise with police colleagues to ensure action is taken following any criminal acts against staff or the Trust. We encourage all valuable NHS colleagues not to tolerate such behaviour.” The number of reported physical assaults on NEAS staff has increased by 23% compared to last year. The numbers of addresses across the North East flagged for the potential caution or violence has also increased. This sits against a backdrop of more than 350 prosecutions that have been brought for attacks on ambulance staff over the last year nationally. The scale of the problem is believed to be much greater. Emergency workers’ safety This follows a new law that was recently introduced, the Assaults on Emergency Workers (Offences) Bill, in which individuals who assault, or attack emergency workers will face longer jail terms if found guilty. The Bill was designed to recognise the debt of gratitude the public feels towards emergency services, and for the courage, commitment and dedication they show every day in carrying out their duties. Footage will be admissible as evidence in the court of law utilising Edesix VideoManager software platform Mr. Gallagher continued, “We welcome anything that will help to deter people from abusing or assaulting our staff and we hope that by reporting incidents and providing credible evidence where we can, courts might be able to be much tougher when sentencing those found guilty of assaulting and threatening our staff, prosecuting those people to the full extent of the law.” Edesix VideoManager software Footage obtained in the event of an assault or abuse will be admissible as evidence in the court of law utilising the features available in the Edesix VideoManager software platform. It will only be used for the purposes of providing evidence to the Police in any enquiry intended for the health, safety and protection of staff. The tamper proof cameras, software and support for the three-month trial have been provided free by Edesix. Richie McBride, Chief Executive Officer of Edesix commented, "We're pleased to provide the North East Ambulance Service with our cameras to enhance the protection of staff and to deter any aggressive behaviour towards NEAS workers."
Round table discussion
The new year 2019 is brimming with possibilities for the physical security industry, but will those possibilities prove to be good news or bad news for our market? Inevitably, it will be a combination of good and bad, but how much good and how bad? We wanted to check the temperature of the industry as it relates to expectations for the new year, so we asked this week’s Expert Panel Roundtable: How optimistic is your outlook for the physical security industry in 2019? Why?
For many years, cybersecurity was the unmentioned elephant in the room. Possible vulnerability of IP-connected devices to a cyber-attack was seldom, if ever, mentioned, and even the most basic measures to prevent such an attack were not implemented. For the last couple of years, however, the physical security industry has begun talking more about cybersecurity, in some cases with an abounding enthusiasm typical of the newly-converted. Have our discussions sufficiently addressed the long-standing lack of awareness? We asked this week’s Expert Panel Roundtable: Are we talking enough about cybersecurity? Or too much? (And why?)
Hospitals and healthcare facilities are an important vertical sector in the physical security market. Protecting healthcare facilities is a rich opportunity to leverage the value of physical security systems that range from video to access control to newer location and asset protection systems. But understanding how technology can excel in the healthcare vertical requires that we first identify and understand what these institutions need. Therefore, we asked this week’s Expert Panel Roundtable: What are the physical security challenges of hospitals and healthcare?