To reduce installation difficulty and extend the effective monitoring range of cameras, Dahua Technology, a video-centric smart IoT solution and service provider, launches mini PT/PTZ series, a small-sized IP cameras with various pan and tilt ranges. Boasting compact design and excellent product performance, the mini PT/PTZ series offers a cost-effective solution for various small- and medium-sized applications such as retails, hotels, casinos, supermarkets, entrances, etc. Effective monitorin...
You don’t need to continue using keys and key cards. When you want effective first-line security for private doors in public spaces, you no longer need cumbersome kit. To keep opportunist hands off your belongings, the Code Handle 4-digit code-operated electronic handle locks without any wires, expensive hardware or software, mechanical keys or changes to your existing doors. PIN codes unlock so many features of our daily lives, from a smartphone to your online bank account. Now you can u...
SALTO Systems, a manufacturer of wire-free smart electronic locking solutions, and INTEREL, the award-winning hospitality guest room management solution, announces the integration of SALTO’s BLUEnet technology into INTEREL’s guest room control solutions, using BLE wireless radios to allow hotels to minimise their infrastructure investment, optimise energy consumption, and take advantage of SALTO’s next-generation products. The new SALTO and INTEREL BLE integration replaces tra...
DITEK, the quality standard in commercial surge protection, announces the launch of the DTK-HDMI family of compact HDMI surge protectors designed for professional use. These rugged single- and dual-channel units combine state-of-the-art circuit technology with tough powder-coated aluminium housings to provide robust surge protection that is ideal for commercial multi-screen installations. The units are compatible with the latest high-definition formats, including HDMI 2.0a, HDCP 2.2, and 4K UHD...
According to Ms Regina Tsai, the Deputy General Manager of Messe Frankfurt New Era Business Media Ltd, the key for exhibitors is to tap into the diverse pool of trade visitors that will be filtering through the halls of the fair next month: “As Vietnam’s largest business platform for safety, security, fire and smart building products, the fair is able to attract the right mix of decision makers and purchasing managers from across the region’s growing vertical markets. From the...
The ASSA ABLOY Door Hardware & Access Control Group has launched an innovative new door closer that offers unrivalled performance for user flexibility and fire safety for buildings in the healthcare, education and hospitality sectors. Unlike any other door closer in its class, the new DC300G-HF is a responsive solution, satisfying multiple door control issues for healthcare professionals, students, customers and staff. This includes flexible operation and use, while also maintaining full ce...
From June 11th to 13th Gradiant has an important appointment in London. For a few days, the city is becoming the capital of identity recognition technologies to transact in a seamless, yet secure manner. Identity Week is the largest technology fair focused on the concept of identity in Europe and this year brings together more than 3,000 international industry actors in three world-class events: Digital:ID, Planet Biometrics and Security Document Week. Forensic and face recognition solutions In this international scenario, Gradiant is showing forensic technologies and face recognition solutions at booth D28 (Digital: EXPO, ExCel London) to automate digital onboarding and Know Your Customer (KYC) processes in a reliable way, as well as prevent document fraud on Internet. Providing security when we need access to personal data is fundamental in order to incorporate technology into the day-to-day activities we carry out in the actual digital society. Facial recognition is positioned as one of the most reliable techniques to incorporate into user registration processes Facial recognition is positioned as one of the most reliable techniques to incorporate into user registration processes, both to register new customers and to provide secure access to personal data in digital onboarding processes (electronic identification of the customer that allows the remote goods and services contract). Most of the time, these processes require to verify that the ID document - ID, passport or driver's license - registered in the system matches with the user's identity in an unmistakable way; but it is also important to incorporate other techniques that collect more information about the client and analyse possible manipulations carried out in the identity document, in order to ensure secure remote client's discharge. Valida by Gradiant forensic tool “In London we are going to show Valida, our forensic tool to detect manipulations in digital documents. In January we received our second selection to present this solution at the CES in Las Vegas and we continue to show it at MWC in Barcelona and RSA in San Francisco,” explains Daniel Ramos, International Business Development Manager at Gradiant. "Now it's time to bring Valida to the UK, to Identity Week, where the world's leading document security vendors come together.” Valida by Gradiant’s main goal is to evaluate the authenticity of digital documents to prevent fraud in online user verification, digital on boarding and Know Your Customer (KYC) processes. This technology developed by Gradiant, in collaboration with atlanTTic research center of Universidade de Vigo, allows companies to offer an extra level of security in this operations, as it automatically analyses any type of identity document (and other PDF and JPEG files such as payroll, invoices, receipts, etc.) to detect possible spoofing attacks and forgeries in the data present in these files. faceIDNN facial recognition technology Gradiant is also showing in London faceIDNN to verify user’s identity by comparing the face with the photograph in his/her ID In addition to forgery detection technology for digital documents, Gradiant is also showing in London faceIDNN to verify user’s identity by comparing the face with the photograph in his/her ID, driver’s license or passport. Using both images, techniques developed by Gradiant verify in real time if they belong to the same person. The company’s experience in facial recognition has allowed to develop techniques for anti-spoofing attacks, as well as guaranteeing verification despite significant appearance changes have happened against the photo in the ID card, or if the person has aged. faceIDNN has been co-funded by Xunta de Galicia (Galician Regional Government) by Ignicia Programme (IN8555A IGNICIA Proba de Concepto) Biometric technologies In order to complement this verification, Gradiant has developed biometrics of signature, voice and video (liveness detection) to be incorporated in the processes of digital onboarding as a second authentication factor, in order to prove the customer is who he claims to be. “Our solution focuses on taking advantage of digital onboarding process in order to collect other types of information that provide us with a higher level of security in their verification, such as their signature, voice or video," says Ramos. "We have these three biometric technologies and we can implement them together or separately.” More and more businesses are born 100% digital and more traditional ones are joining the digitised world. Some of these businesses need to verify the identity of their customers remotely and ensure. This is the case of banks, which currently can register new customers without them physically going to bank offices. Biometric verification solutions These entities have a legal obligation to know the identity of their customers as required by the 4th European Anti-Money Laundering Directive In addition, these entities have a legal obligation to know the identity of their customers as required by the 4th European Anti-Money Laundering Directive, in order to comply with the Know Your Customer (KYC) and Anti-Money Laundering (AML) requirements. This European directive aims to prevent problems such as corruption, illegal financing, and money laundering, among others, to combat illegal transactions in the digital environment. Gradiant's biometric verification solutions are a complete choice to ensure security through face, signature or voice customer identification and to prevent fraud in digital files. These solutions can also be effective in sectors such as gambling (to identify if users are old enough to access these services), sharing economies (where there is a digital transaction between at least two people), dating, telcos, insurance, e-commerce and hotels.
Pivot3, a provider of intelligent infrastructure solutions, experienced continued growth in Q1 2019 with enterprise and Fortune 1000 customers representing nearly 80-percent of bookings. This growth has been driven by organisations seeking simple, easy-to-deploy IoT and hybrid cloud solutions that address industry-specific challenges. Pivot3 is architected for extreme resilience and is able to manage massive volumes of data, making the company uniquely positioned to handle IoT use cases. Pivot3’s developments in Q1 2019: Continued growth in the quarter, with enterprise and Fortune 1000 customers delivering nearly 80-percent of sales in Q1, as well as continued expansion of deployments with existing Pivot3 customers; Expansion of its executive leadership team with former Dell EMC and Panasonic executive Rance Poehler joining as Vice President of Global Sales and former Dell EMC executive Dan Flood joining as Vice President of U.S. Sales; Continued growth of customers deploying multiple use cases on Pivot3’s platform, with deal sizes of multi-use case deployments averaging two to three times larger than single use case implementations; Continued growth in IoT use cases, in conjunction with the company’s Lenovo partnership, to deliver mission-critical solutions such as video-based Smart Cities and Safe Campus deployments across the globe. Through the partnership, Lenovo and Pivot3 helped a leading Middle East hospitality customer secure their sprawling hotel complex, meeting their mission-critical requirements for resilience, security and manageability. Together, they delivered a successful security solution, efficiently capturing and managing their security video data. The project protects their valuable brand, reduces their risk of data loss and system failure, and lowers cost of ownership, while also reducing their need for advanced technical skills; Common Criteria certification for its Acuity hyperconverged infrastructure (HCI) software platform under an Evaluation Assurance Level (EAL) 2+, assuring government agencies around the world that Pivot3 provides the infrastructure necessary to mitigate emerging threats without compromising security and resilience; Advanced certification of its HCI platform with Genetec Security Center to deliver a robust security and IoT solution designed to support video-intensive, mission-critical environments with triple the performance of prior generations. Intelligent video-based solutions “Seventy-five percent of new data is created in video format. We see enormous market potential for video-based infrastructure solutions like security and surveillance,” said Wilfredo Sotolongo, Chief Customer Officer, Lenovo Data Center Group. “With Pivot3, we are bringing unique, intelligent video-based solutions to market that solve real customer challenges. We are pleased to be going to market with Pivot3 in these critical use cases.”
Delivering another high-value benefit to users, the Maxxess eFusion security management platform now integrates off-the-shelf and seamlessly with the widely used range of deister electronic key management systems. With this latest off-the-shelf integration, eFusion users can now manage all their keys from their centralised security management platform, reducing the risk of security breaches and streamlining their day-to-day operations. Modular and scalable, the deister electronic systems encompass a range of cabinets which can store anything from 8 keys to thousands. They can be used stand-alone or as part of a global corporate solution, in applications ranging from hotels and leisure settings to retail and up-scale residential developments. Knowing who has a particular key at any given moment significantly reduces the risk of losses and criminal activity" Reduces criminal activity “Knowing who has a particular key at any given moment significantly reduces the risk of losses and criminal activity,” says Lee Copland, Managing Director, Maxxess EMEA. “The deister electronic systems make that task much simpler. And with real-time reports logging all system usage, users can be held accountable for any misuse, theft of loss of keys – better protecting buildings and assets.” The integration with deister electronic systems is just the latest example of how the eFusion platform gives users the freedom to integrate, customise and adapt their security systems to meet both current needs and emerging risks. eFusion’s open technology software supports more than 60 off-the-shelf integrations from leading vendors, providing complete freedom to customise solutions combining surveillance, access control, fire and intruder systems with back-office processes. Making premises more secure Off-the-shelf integration between our key management systems and eFusion will deliver major benefits to customers"Crucially, integration with Maxxess eFusion also reduces complexity for installers and their customers and offers unlimited future scalability at affordable price points. “Off-the-shelf integration between our key management systems and eFusion will deliver major benefits to our customers,” says Darren Harrold, Head of UK Operations at deister electronics. “This means they can now link their essential systems together – including their surveillance, intruder, access and fire detection systems – making a wide range of premises easier to manage and more secure.” Visitors to IFSEC International can see Maxxess eFusion and deister key management in action, where both companies will be exhibiting on stand IF2120 and IF410 respectively from 18th to 20 June at London’s ExCel.
Risk management ‘must prepare for the worst’ is the latest stark warning from the UK Environment Agency, which suggests that, with global temperatures set to rise by up to four degrees Centigrade by 2100, some £1bn a year might be needed to be spent on flood management. Insurance statistics reveal that the most likely cause of claims in commercial buildings, retail premises, hotels and apartment blocks is water damage. UK insurers conﬁrm that water leakage is now the costliest and most common claim made by commercial customers with a total loss in the UK alone approaching £800 million. Damages due to water leakage Vimpex advises risk management that the efficient way to mitigate the risk of water damage is to continuously monitor for water leaksThe financial sector is particularly vulnerable to such potential losses with Data Centre outages costing an average of £12,000 per minute, hourly losses on the Stock Exchange around £4.5 million and Credit Card Clearance around £1.8 million. Water leakage damage costs alone can be significant and it is not just the obvious cost of physical damage to IT equipment and the fabric of the building, because even a minor water leak can result in significant business interruption including temporary relocation, increased employment costs and loss of proﬁts. Vimpex, an independent manufacturer and distributor of Life Safety products in the UK, advises risk management that the efficient way to mitigate the risk of water damage is to continuously monitor for water leaks. Leading the way in Water Detection technology is the Vimpex Hydrosense system, which, with its Vimpex Hydro-Cryer voice sounders, comprises the most sophisticated configurable water leak detection system on the market. Monitoring water leaks 24/7 Hydrosense systems deliver a new standard in Water Leak Detection to protect areas where water ingress could seriously damage electrical, communication and computer networks. It continuously monitors for water leaks around the clock, year in year out, with the facility for 72-hour battery standby in the event of power failure. Vimpex life safety technology provides the reliability and integrity of BSi approved fire detection systems, meaning there is virtually no risk of failure, downtime and significantly fewer false alarms. Hydrosense is on show at Firex International on Stand FX940 (18-20 June Excel London).
Important advances in video technology, including a range of exciting new cameras and smarter deep learning analytics, will be showcased by IDIS at IFSEC International (18-20 June) stand IF1110. The selection of advanced cameras to be unveiled include an easy-to-install 2MP micro-dome (86pi x 58), designed for speedy set-up and rapid deployment. It features in-built IR illumination with a range of 15m and with no cable whip (pigtail) to enable easier and quicker installation. The 2MP micro-dome’s neat appearance makes it ideal for locations where aesthetics are important, such as high-end retail stores and restaurants. Optimum image quality The IDIS LightMaster PTZ features a powerful 36x optical zoom, an auto-iris and a Hall sensor for optimum image qualityThe IDIS LightMaster PTZ features a powerful 36x optical zoom, an auto-iris and a Hall sensor for optimum image quality, and installers can choose between PoE and 24VAC power supplies. In operation, the camera benefits from highly accurate auto-return positioning that ensures the positioning index is never lost, even if the camera has been forced to change angle. And a new range of 5MP IP cameras will also be revealed, meeting demand from end-users for a wider range of high definition options. The range includes a choice of fixed- and motorised-focus domes for indoor and outdoor use and outdoor motorised bullets. Innovations in IDIS Deep Learning Analytics delivering 97% accuracy will also be on show, including: IDIS AI in the Box (DV-2116), IDLA-ready hardware allowing analysis of up to 16 channels that comes with an embedded NVDIA GTX1060 GPU chipset; and IDIS Intelligent Search, which allows tracking by colour, object and number. In addition, Re-ID makes it easy to search for specific individuals within selected time and location parameters. Launch of privacy masking software Visitors to the IDIS stand will also learn about end-to-end solutions for retail applications, the flagship plug-and-play offering DirectIP and IDIS’ choice of video management software (VMS) including the totally cost-free IDIS Center and the award-winning IDIS Solution Suite. IDIS is set to launch its latest privacy masking software that is more accurate and easier to use than competitive offeringsDuring the IFSEC, IDIS is also set to launch its latest privacy masking software that is more accurate and easier to use than competitive offerings, allowing video clips to be provided for evidential purposes in compliance with privacy laws. Together, these advances offer end-users, installers, consultants and distributors new levels of system-building flexibility, along with significant cost advantages and enhanced security. Lower total cost of ownership IDIS will also be welcoming visitors to its annual Happy Hour Party from 3 PM on June 19th. Guests will get the chance to try out special ‘lights out’ and ‘buzzer wire’ games that test agility, speed and accuracy highlighting the outstanding video results delivered by IDIS technology. Players will be in with a chance to win one of two European mini-break holidays. “Once again IDIS will be at IFSEC showcasing the most innovative video technology,” says James Min, Managing Director, IDIS Europe. “For end-users, we’ll be demonstrating how IDIS can lower the total cost of ownership and strengthen cybersecurity, and for installers, we’ll explain how to IDIS tech can improve profitability.” One can see IDIS tech in action throughout IFSEC on 18-20 June on stand IF1110.
Matrix, a manufacturer and provider of Telecom and Security Solutions, to showcase its solutions at Indelex Smart Home Expo in collaboration with PowerTech Electronics. Matrix will be showcasing an enterprise-grade IP video surveillance solution designed, engineered and built specifically for growing multi-location organisations. The entire solution focuses on automating processes, easy integration with access control and enhancing efficiency of organisations. They will also be showcasing a range of audio compatible and compact Professional and Project Series IP cameras powered by SONY STARVIS series sensors with Exmor technology. This gives the cameras an edge over others in terms of exceptional low light performance, consistent image quality during varying light conditions (True WDR), better bandwidth optimisation and many other features. We will also be showcasing our PTZ Cameras for 360° security. Showcasing Extreme series of NVRs These latest NVRs are backed with an intelligent software that helps detect threats and send instant notificationsFurthermore, they will be displaying their new Extreme series of Network Video Recorder (NVRX) at the event. This NVR is equipped with 4K decoding capacity and characteristics like Cascading (up to 20 NVRs), Camera-wise Recording Retention and Database Level Integration. Moreover, these latest NVRs are also backed with an intelligent software that helps detect threats and send instant notifications for real-time security. In the event, Matrix will showcase futuristic technologies from the security domain. Matrix Access Control and Time-Attendance domain will showcase its newly launched Face Recognition technology for authentication through IP Cameras/Tablet/Mobile. The technology enables contactless authentication with precise and accurate authentication. Apart from this, they will display their high-end cloud-based Time-Attendance and Access Control solution. Mobile based access control solution Mobile being the next generation technology in the security domain, they will showcase mobile based access control solution whereby user can either scan QR code or just twist his/her phone for authentication. User can mark attendance automatically using GPS or Wi-Fi through mobile application. Thus, Matrix being the front face in innovation, they are going to show some extraordinary biometric door controllers useful for applications in Time-Attendance, Access Control, Visitor Management, Cafeteria Management and many more. Furthermore, access control being the prime requirement in terms of security, Matrix will present its Standalone Access Control solution with License Free Environment, whereby a single panel can handle up to 255 doors and 25,000 users. Get a glimpse into the cutting-edge Matrix biometric solutions with multiple credentials such as face, fingerprint, palm vein, RF card and PIN options. Unified Communication Platform Matrix will highlight ETERNITY NENX, their newly launched Unified Communication Platform for SOHO and SMBAt the event, Matrix will highlight ETERNITY NENX, their newly launched Unified Communication Platform for SOHO and SMB. Increasing number of small and medium organisations are migrating to leverage benefits of IP. For such applications, Matrix ETERNITY NENX is a perfect fit. Matrix Telecom domain will also be showcasing its comprehensive telecom solutions which includes IP-PBX, Communication Endpoints, Media Gateways, Mobile Application and much more. Along with that, Matrix Hospitality solution, which is specifically designed to enhance guest experience at hotels, will also be one of the major highlights. Hotel staff can enhance guest experience and improve staff productivity with hospitality features, front desk, PMS integration, staff mobility extensions and voicemail with personalised greetings. “With a portfolio of innovative Security and Telecom products, Matrix can cater a wide spectrum of industries. We are looking forward to meeting our existing and prospect end customers at Indelex Smart Home Expo,” said Jatin Desai, Marketing Manager.
Surveillance systems can track the locations of mobile phone users and spy on their calls, texts and data streams. The Washington Post has reported on such systems that are being turned against travellers around the world, according to security experts and U.S. officials. The summer season highlights the need to take extra precautions when travelling. When travelling anywhere in the world, for business or pleasure, citizens need to be aware of and alert to looming physical and cybersecurity threats. To elaborate on expert security tips, strategies and advice for traveling this summer, we presented several questions to The Chertoff Group, a global security advisory firm that enables clients to navigate changes in security risk, technology and policy. Chris Duvall, Senior Director at The Chertoff Group, offers insights into cybersecurity concerns, physical security precautions, and recommends digital resources/apps for consumers while traveling. Q: How are security risks – physical and digital – changing? Why are threats greater today than five years ago? The exponential number of headlines over the past few years is a strong indication that both physical and digital risks are evolving and increasing Duvall: The exponential number of headlines over the past few years is a strong indication that both physical and digital risks are evolving and increasing. The scope, severity and complexity of physical and cyber risks are increasing and becoming more dangerous and destructive. This is especially true for those travelling outside the U.S. On the physical side, threat actors are actively seeking “soft targets” – public events, social settings, mass audience venues, etc. – to communicate their message, sow chaos and inflict catastrophic harm. On the digital or cyber side, we have seen a shift from “thrill hacking,” to an increase of “hacking as a business” (through credential compromise and ransomware), to an increase in “hacking for harm” - with the rise of “nuke ware” and ransomware without a clear financial motivation. Q. What specific precautions should a traveller take to protect their calls, texts and data streams from being spied on? Duvall: When travelling abroad, we recommend to our clients that their personnel and executives should practice good internet and social media hygiene. Some best practices include: Avoid using public Wi-Fi services—unless you use private VPN service for encryption Increase the privacy setting on your technical devices Disable location identifiers on apps Create a new (unlinked) email for internet correspondence Consider purchasing international MyFi devices to decrease the risk of getting your personal identification information (PII) or protected healthcare information (PHI) stolen Use temporary (i.e. burner) phones to protect your data and your contacts Q. What cybersecurity concerns are likely to impact travellers? Are the threats greater outside the United States or in any specific parts of the world? Significant precautions should be taken to protect personal electronic devices (PEDs) and the data connected to PEDs Duvall: The international cybersecurity landscape has grown increasingly dynamic, with threats posed by government authorities (in some countries), terrorists, insurgents, and criminals, requiring travelers to be proactive and vigilant. U.S. citizens, particularly executives of U.S.-based technology companies, must be aware that they are considered high-value targets for nation-state intelligence services and criminally-motivated bad actors. Many countries will go to great lengths and expense to acquire and exploit proprietary information from U.S.-based companies, and views U.S. executives visiting the country as “soft” targets of opportunity. As such, significant precautions should be taken to protect personal electronic devices (PEDs) and the data connected to PEDs. The tactics, techniques and procedures (TTPs) utilised by bad actors are often covert and nearly undetectable by the affected person. Threat actors routinely access, monitor and utilise Wi-Fi networks at hotels and in public spaces to compromise target devices. Other targeting methods include luggage searches, extensive questioning, and unnecessary inspection and downloading of information from personal electronic devices. There are numerous, high-risk countries for which the U.S. Government warns travellers to be wary of mobile malware, mobile device privacy attacks and hot spots for mobile botnets. The U.S. Department of State has the most recent and up-to-date list. For example, the U.S. Government has investigated numerous incidents in which U.S. travellers’ PEDs (personal and company devices) have been compromised by Russian authorities while transiting Russian airports, left unattended in public spaces and in travellers’ hotel rooms. When travelling to an unfamiliar place, research your destination to understand the local roads and transportation, geography, local roads, culture, etiquette and laws Q: What physical security precautions should a traveller take? Duvall: Here are some useful precautions: When traveling to an unfamiliar place, research your destination to understand the local roads and transportation, geography, local roads, culture, etiquette and laws. Protect your personal information and travel itinerary as much as possible. Limit the amount of jewelry worn, cash, credit cards and electronic devices carried while traveling. Avoid staying on the ground floor of a hotel. Consider choosing a room on the 2nd through 7th floors as these rooms may be more difficult to break into than those on the ground level, but still able to be accessed by fire/emergency response equipment. Never answer your hotel room door for anyone until you’ve determined who they are, why they are at your door, and if it is necessary for you to open the door to interact with them. Carry a rubber door stop/wedge with you to install on the room side of the door before you go to bed. Vary your patterns and routines when venturing out in to a new location, do not become predictable. Politely decline offers of food or drink from strangers (If you do accept beverages, ensure that they are in sealed containers and that there is no evidence of tampering). Never discuss your itinerary, personal, business or other sensitive information where others can hear you. Q: How can companies be proactive in protecting their business travellers? Companies should educate their employees on the importance of maintaining good internet hygiene while travelling abroad Duvall: When travelling on business, companies should provide their employees with clean computers and cell phones before departure. Upon return, the company should immediately wipe the computer clean to prevent any malicious threats from penetrating the company’s internal, cyber-infrastructure. Additionally, companies should educate their employees on the importance of maintaining good internet hygiene and recommend their employees disconnect from social media platforms while travelling abroad. Some general tips to recommend to your employees when travelling abroad include: Register in the Smart Traveler Enrollment Program (https://step.state.gov/step/) Visit Travel.State.Gov to view travel related information specific to the country or countries you’re visiting, including local US Embassy or Consulate contact information, as well as current travel advisories and alerts. Always leave a copy of your transportation and hotel itinerary and driver’s license (or passport if travelling internationally) with a family member or trusted friend. Always use a baggage tag with a protective cover Avoid using public Wi-Fi services Q: What digital resources and/or apps might a traveller benefit from (and how)? Duvall: The Chertoff Group recommends researching the below travel-related apps before departing on a trip: TravWell: This app provides destination-specific vaccine recommendations, a checklist of what you need to do to prepare for travel, and a customisable healthy travel packing list. The app can store travel documents, keep records of medications and immunisations, and set reminders to get vaccine booster doses or take medicines. My TSA: This app provides real-time updates on airport delays. It includes how long security lines are at various airports; information about what you can and cannot bring onto an airplane; and a frequently-asked question list, including new advanced imaging technology. Border Wait Time: The app provides estimated wait times and open-lane status at land ports of entry, which may be particularly helpful when in an area with multiple crossings. Mobile Pass: The Mobile Passport app speeds you through U.S. Customs and Border Protection at (1) cruise port and (24) airports Q: As a security expert, what’s your best advice for travellers? Duvall: At the end of the day, travel security is not rocket science. Simply put, travellers need to: Be aware and situationally alert at all times. Be aware and situationally alert to the location of your luggage and carry-ons at all times. Don’t access unknown, unsecured or public Wi-Fi if at all possible. Turn off “auto connect” features and institute stringent privacy controls as much as possible. Try to “blend in” – you don’t have to try to look like a local but travellers should avoid gaudy and expensive attire wherever possible. Use your common sense – if an offer, invitation or opportunity seems to good to be true... it probably is.
The optical speed lane and turnstile sector of the security market has had a very busy 2017. Growth in commercial construction has provided more opportunity. Innovations in technology have given speed lane manufacturers an opportunity to deliver a better product. Orion sales increase and company growth Orion Entrance Control, Inc., had a great 2017 as sales increased and our company grew. We attribute our success to the unique approach we have taken since day one: providing customised products that offer customers more than a “one-size-fits-all” solution. We offer the line of turnstiles that you would expect from any reputable manufacturer in the marketplace, but we know that when dealing with lobby security or entrance control, one size definitely does not fit all. By providing various options to supplement our core line, we give our customers a solution that best suits their needs.The ability for security technologies and their manufacturers to work together is becoming increasingly more important to our customers One area that we will continue to build upon in the development of our products is in technology integrations. The ability for security technologies and their manufacturers to work together is becoming increasingly more important to our customers. The manufacturers that can future proof their products to allow the addition of new technologies and to protect a client’s investment from obsolescence will be the big winners in 2018 and beyond. Integration in entrance control Orion ECI’s products are built with technology and designs that have this vision for the future. For example, we work with the leaders in biometrics and Point of Sale (POS) solutions to integrate these systems into our entrance control products. Oftentimes, with just a wave of the hand or the right credential, approved users can enter with no hassle or even ring up a purchase. From a business standpoint, Orion ECI experienced a year of continued process improvement and design in 2017. We reached record sales revenues as we continued to receive orders from our existing enterprise clients and new customers. For 2018, we plan to add personnel in key growth areas. This will include additional inside and outside sales positions and product production and engineering roles.
When we contemplate where and how our food is made, cleanliness and hygiene are typically at the top of the list of necessities. And when it comes to production facilities, strict regulations and sanitation requirements are in place to ensure that the highest levels of food safety are met. This white paper by Oncam explores the different aspects of food safety and defence in the production, manufacturing and catering environments. It also offers practical guidance to the types of food certification available making safety equipment compliant and what to look out for. Oncam is an independent, specialised IP video and technology company with a reputation for being one of the most innovative firms in today's market. Oncam's sole focus is on 360-degree smart IP video - working with partners to deliver high-value business solutions for customers that leverage Oncam's award-winning technology. Oncam has deep industry knowledge combined with specialised expertise in Healthcare, Retail, Transport, Maritime and Ports, Banking, Casinos and Hospitality. Find out more about: Food safety by numbers Food safety and food defence Protective technology for harsh conditions A guide to food certifications The future of food safety
Simultaneous suicide bombings at several churches and hotels in Sri Lanka on April 21 were of a scale, sophistication and level of coordination that hasn’t been seen since 9/11. Nine suicide bombers targeted three churches and three hotels on Easter morning, and the resulting casualties numbered 359 dead, including 45 children, and about 500 injured. The complexity of the attacks suggests the bombers received help from an outside organisation, likely the Islamic State (IS). Sadly, security warnings from Indian intelligence officials, which might have helped to prevent or minimise the attacks, were ignored by Sri Lanka security weeks earlier. In the wake of the massacre, two of Sri Lanka’s top security officials were asked to resign, and Sri Lanka’s president promised to completely restructure state security. Contradiction to the terrorism report The twin calamities provide a dramatic counterpoint to an observed global decrease in terrorist attacksA motivation for the Sri Lanka tragedy is thought to be the March 15 shootings at two mosques in Christchurch, New Zealand, where 50 people were killed and 50 more were injured. A 28-year-old Australian white supremacist was arrested and charged with murder. Taken together, the twin calamities provide a dramatic counterpoint to an observed global decrease in terrorist attacks, as documented in a recent report. The suicide bombers in Sri Lanka were eight men and one woman, most of them well-educated and coming from the middle or upper class. One was the leader of National Thowheeth Jamaath, the homegrown militant Islamist group the government has blamed with carrying out the attacks. There is also evidence to corroborate a claim of responsibility by IS. Some 60 people have been arrested in the investigation. Even days later, police continued to find explosives and said there was still danger. Multiple attacks One explosion on Easter morning occurred at St. Sebastian’s Church in Negombo, 20 miles north of Colombo, where more than 100 were killed. Another bomb killed 28 people at the Zion Church in Batticaloa, and an unknown number died at St. Anthony’s Shrine, a Roman Catholic church in Colombo. The three hotels that were attacked were all in Colombo – the Shangri-La, the Cinnamon Grand and the Kingsbury The three hotels that were attacked were all in Colombo – the Shangri-La, the Cinnamon Grand and the Kingsbury. Two more explosions happened Sunday afternoon, one at a small guest house and another at the suspects’ safe house, where three officers were killed. Security at houses of worship has been a high-profile concern in the United States in recent years following incidents such as an attack at Emanuel African Methodist Episcopal (AME) Church in downtown Charleston in 2015 that killed nine people. Just last October, 11 people were killed and six others injured in a shooting at a synagogue in Pittsburgh. Hardening security at churches “It’s no longer enough to pray for a safe and secure environment,” commented Patrick Fiel of PVF Security Consulting in an Expert Panel Roundtable discussion. “Churches are soft targets. Clergy and parishioners will need to work closely with security consultants and local law enforcement to harden their facilities.” Access control, CCTV solutions and mass notification systems are all helpful and can be placed unobtrusively so as not to interfere with aesthetics of the church, Fiel adds. The scale and scope of the bombings in Sri Lanka provide a wakeup call to the global likelihood of terrorist attacksIt doesn’t appear technology would have made much difference in the case of the Sri Lanka attacks, although awareness and vigilance can have an impact. At Zion Church in Batticaloa, for example, a bomber was stopped by pastors from entering the congregation area where some 500 people gathered. Because of their suspicions, the bomb was instead detonated in a courtyard where children were eating breakfast; 28 people died. The scale and scope of the bombings in Sri Lanka provide a dramatic wakeup call to the continuing global likelihood of terrorist attacks. The last territory of the Islamic State in Syria fell in March, but IS and its ideology live on, and continue to be a global terrorism threat. And that’s just one among many possible sources of terrorism worldwide. Hopefully, the recent incidents do not foreshadow more attacks that are even more deadly.
The 2018 FIFA World Cup tournament is bringing 32 national teams and more than 400,000 foreign football fans from all over the world to 12 venues in 11 cities in Russia. Fans are crowding into cities including Moscow, St. Petersburg and Kazan. Given continuing global concerns about terrorism, security is top-of-mind. Protection of the World Cup games in Russia is focusing on an “integrated safety, security and service approach,” according to officials. Combining the term “security” with the terms “safety” and “service” is not an accident. An aggressive security stance is necessary, but at the end of the day, fan safety is paramount, and a service-oriented approach ensures a positive fan experience. Medical responders will be working side-by-side with police and antiterrorism personnel. Risk management best practices We asked Sean T. Horner and Ben Joelson, directors of the Chertoff Group, a global advisory firm focused on best practices in security and risk management, to comment on security at FIFA World Cup 2018. Although not involved in securing the 2018 World Cup, the Chertoff Group is experienced at securing large events and enterprises using risk management, business practices and security. Integration is another important aspect of protecting the games, says Horner. The use of multiple resources, including Russian military, intelligence and law enforcement, will be closely integrated to provide the best security for the large-scale event in each of the host cities, he says. The approach will be centralised and flexible, with resource deployment guided by effective situational awareness. Primary security and emergency operations centres will be dispersed throughout each host city “There is a unified command structure at the Russian Federation level, and they will keep resources in reserve and shift them as needed to various events and venues based on any specific intelligence, in effect deploying resources where threats are greatest,” says Joelson. “There will also be some regional commands, and resources will incorporate a spectrum of police and military personnel ranging from the ‘cop on the beat’ to the Spetsnaz, the Russian ‘special forces'.” Primary security and emergency operations centres will be dispersed throughout each host city, and additional forces can be shifted as necessary, he notes. Role of law enforcement In Russia, the lines of separation between law enforcement and the military are not as stark as in the United States, for example, where military forces are restricted from deployment for domestic law enforcement by the Posse Comitatus Act. In Russia, there is no such restriction. A broad range of technology will play a role at the World Cup, Horner and Joelson agree. Technology will be used primarily as a force multiplier and a decision-support tool for security personnel. There are robust CCTV systems in many Russian cities, and mobile CCTV systems, such as camera towers or mobile security centres on wheels, will also be deployed. Technologies will include infrared cameras, flood lights, and ferromagnetic screening systems to scan hundreds of individuals as they walk by. In some locations, facial recognition systems will be used, tied into various intelligence, military and law enforcement databases of known bad actors. Behaviour analytics will be used as a decision-support tool. In addition to security in public areas, private CCTV systems in hotels, at transportation hubs, and inside the venues themselves will be leveraged. Video analytics and detection will help personnel review live view of people who may be acting suspiciously or who leave a bag unattended. In some locations, facial recognition systems will be used, tied into various intelligence, military and law enforcement databases of known bad actors Rigorous anti-terrorism measures A Fan ID card is required to enter the 2018 World Cup Tournament, even for Russian residents. The Russians have an aggressive stance against domestic terrorism, which will also help ensure the safety of the World Cup games, say Horner and Joelson. Terrorist group ISIS has promised “unprecedented violence” at the games, but they make similar threats at every major global event. Russia has been an active force disrupting ISIS in Syria, and experts suggest that losing ground geographically could lead to addition “asymmetric” terrorist attacks. However, Russia is leveraging all their intelligence resources to identify any plots and deploying their security apparatus to disrupt any planned attacks, experts say. Russia’s rigorous anti-terrorism measures include a total ban on planes and other flying devices (such as drones) around the stadiums hosting the World Cup. Private security In addition to military, intelligence and law enforcement personnel, private security will play a have a high profile during the 2018 World Cup in Russia. Private security personnel will be on the front lines in hotels and in “fan zones.” They will operate magnetometers at entrances, perform bag checks, enforce restrictions on hand-carried items, etc. Private security will be especially important to the “guest experience” aspects of protecting the games. Private security will be especially important to the “guest experience” aspects of protecting the games Another private security function at the World Cup is executive protection of dignitaries and high-net-worth individuals who will be attending. Executive protection professionals will arrive early, conduct advanced security assessments before VIPs arrive, and secure trusted and vetted transportation (including armoured cars in some cases.) VIPs will include both Russian citizens and foreign (including U.S.) dignitaries attending the games. Private security details will be out in force. Aggressive security approach Overeager and outspoken fans are a part of the football culture, but Russia will deploy a near-zero tolerance policy against hooliganism and riots. An overwhelming force presence will take an aggressive approach to curbing any civil disturbances, and offenders will be removed quickly by Russian security forces. Strict restrictions on the sale and consumption of alcohol will be enforced in the venue cities before and after the matches. Officials will also be cognisant of the possibility of a riot or other event being used as a distraction to draw attention from another area where a terrorist event is planned. It will be a delicate balance between deploying an aggressive security approach and preserving the fan experience. Joelson notes that freedom of speech is not as valued in Russia as in other parts of the world, so the scales will be even more tipped toward security. “The last thing they want is for things to get out of control,” says Horner. “The event is putting Russia on the world stage, and they want visitors to walk away safely after having a great time and wanting to go back in the future.” Attendees should also have good situational awareness, and keep their heads up, scanning crowds and identifying unsafe situations" Precautions for World Cup attendees Attendees to the World Cup in Russia should take some basic precautions, Horner and Joelson agree. For example, Russia requires a translated, notarised letter explaining any prescription drugs. The country has a more aggressive foreign intelligence environment, so visitors cannot depend on their data being private. Joelson recommends the usual “social media hygiene” and privacy settings. Visitors should not post information about their travel plans or locations, and it’s best to travel with a disposable mobile phone that does not contain personal information. Location tracking should be deactivated. Travellers should also beware of talking and sharing information with others, or of saying anything derogatory. “They should also have good situational awareness, and keep their heads up, scanning crowds and identifying unsafe situations,” says Joelson. “If you bring a personal electronic device, you should expect that it has been compromised,” says Horner. Text messages and email will not be private, and he suggests creating an email address used only for travel. Don’t leave drinks unattended. Travellers from the U.S. should register at the Smart Traveler Enrollment Program (STEP) operated by the U.S. State Department. “Plan before you travel and before you get to the airport,” says Horner.
The massacre in Las Vegas is both sadly familiar and terrifyingly novel. Because of the recent series of violent attacks on innocent people gathered in public places, high body counts are no longer unheard-of, although the 59 dead after the Las Vegas tragedy sets a depressing new record. These news stories have become so grimly commonplace as to dull our collective sensitivity to their shock. However, the modus operandi of the latest attack, apparently by a “lone wolf” – carefully planned and involving a stockpile of nearly two dozen guns gathered in a hotel room – prompts new soul-searching about how public events are secured, not to mention a re-evaluation of security in the hospitality sector. Public events at risk from attack The sniper attack from a 32nd-floor room at Mandalay Bay, overlooking 22,000 people attending a country music festival, has been compared to “shooting fish in a barrel.” When the bullets rained down, there was nowhere to hide. The attack came from outside the “perimeter” of the event, so any additional screening of attendees would not have prevented it. Such attacks are not unheard of, but to what extent might it have been foreseen in this instance? It’s a new concern to add to the mounting list of possible risks at public events, such as a car in the crowd or a bomb in a backpack. Add to the list a firearm assault from above. If security is supposed to protect against that which is reasonable and foreseeable, this tragedy clearly expands the list. Preventative measures for sniper attacks Certainly, there are measures that can prevent sniper attacks, such as police officer sharpshooters positioned on nearby rooftops scanning the windows of nearby buildings for potential threats. Such measures are routinely employed for high-security events such as a Presidential visit, but not generally for a country music concert. Should organisers of public events reevaluate the level of risk, now that the dangers have been demonstrated in a dramatic and deadly fashion? Broadly speaking, nearby buildings with lines-of-sight to public areas are a new security risk to be considered. Might public events need to be located somewhere else? What about parades down city streets, or Times Square at New Year’s Eve? New York’s Police Commissioner James O’Neill may have said it best: “We do understand that no city or town in this country is completely immune.” Security in hospitality sector The implication of the Las Vegas massacre for the hospitality industry is an additional issue. Hotels and resorts such as Mandalay Bay have not generally embraced technologies like the explosives scanners or X-ray machines used at airport terminals, at least not in the United States. Most hospitality companies keep their focus on things like limiting theft, controlling unruly guests, or keeping strangers from roaming the halls. In contrast, hotels in the Middle East and Asia, where there has historically been more chance of violence, have a higher level of security. Hotels and resorts such as Mandalay Bay have not generally embraced technologies like the explosives scanners or X-ray machines used at airport terminals Even in Las Vegas, where the gaming and hospitality industries embrace video in a big way, the emphasis is not on watching guests who may be stockpiling firearms. What might the impact of greater security be on guests and, by extension, a hotel’s business? In a competitive market that emphasises the guest experience, any negativity suggested by additional security measures would likely be evaluated carefully lest it impact the bottom line. Anything perceived as invasive of a guest’s privacy would be frowned upon. Our appetite and/or tolerance for tighter security in the wake of a tragedy will inevitably dissipate over time. In short, the hospitality industry is likely to continue to be a “soft target” for years to come. New security training and technologies Might a higher level of training among hotel staff to promote awareness of suspicious behavior make a difference? It’s a low-profile, comparatively low-cost possibility many hospitality professionals will be looking at in the days to come. There are less obtrusive technologies on the market that could help. For example, Steve Wynn, CEO of Wynn Resorts, has said they have installed “non-visible” metal detectors at every entrance. One manufacturer of such equipment is PatriotOne Technologies, which offers a “cognitive microwave radar technology” embedded in a wall or stand-alone unit at a controlled access point. The company made news at last week’s ASIS show by announcing integration of its system with March Networks’ video recording solution. Concerns for security trade shows The latest tragedy hits especially close to home for those in the security industry who travel to Las Vegas every year for the ISC West show. Mandalay Bay is at the other end of the strip from much of the ISC West activity, but the attack still seems to hit directly in our neighbourhood. Next year, the security market will be going to Vegas at least twice, for ISC West in the spring and again for the ASIS 2018 show in the fall. Somewhere in the midst of those events may be a solution that could help prevent such tragedies. We can all hope so. Meanwhile, our thoughts are with the victims of the Las Vegas massacre, their families and friends.
Located at the very heart of Amman, Jordan, Landmark Amman Hotel is one of the most renowned 5 star hotels in the city, as well as a true local landmark in more than one ways. Boasting seventeen flexible event spaces for everything from small intimate meetings to large-scale exhibitions and 258 rooms that are among the largest hotel accommodation in Jordan, Landmark Amman Hotel is an ideal choice for high-end customers of many types. Dahua Technology, a video-centric smart IoT solution and service provider, is trusted, for the first time in Amman, with the job of keeping Landmark Amman Hotel safe in its phase 2 CCTV improvement. Need of a competent surveillance system The other challenge concerned old system’s storage, which couldn’t meet the requirement of local policeIt is difficult for a large-scale hotel like Landmark Amman to patrol the grounds and premises of the hotel relying only on security personnel. Moreover, there might be no standardised evidence for the police to check without a competent surveillance system when an accident happens. There are two aspects of the old system to be improved. The analogue system the hotel was using was not easy to manage, the problem which was exacerbated by the condition that a great number of cameras were broken. The other challenge concerned old system’s storage, which couldn’t meet the requirement of local police. IP camera and NVR solution Dahua Technology’s CCTV solution comprising IP camera and NVR solves the problems just right. IPC-HDW1431S, the 4MP WDR IR Eyeball Network Camera, supports Smart Coding (H.265+ & H.264+), Intelligent Video Analysis(IVS), Wide Dynamic Range(WDR), Smart IR Technology, etc., which is fully capable of smartly capturing the 4MP resolution images in hotels. NVR4216-4KS2, the 32 Channel 1U 4K&H.265 Lite NVR can be served as edge storage, central storage And NVR4216-4KS2, the 32 Channel 1U 4K&H.265 Lite Network Video Recorder, which supports 4K and H.265 encoding technology, can be served as edge storage, central storage or backup storage with an intuitive shortcut operation menu for remote management and control. Compatible with ONVIF 2.4 protocol Easy to install, it is compatible with numerous third-party devices making it the perfect solution for surveillance systems that work independently of video management system (VMS). It features an open architecture that supports for multi-user access and is compatible with ONVIF 2.4 protocol, enabling interoperability with IP cameras. Dahua surveillance system has helped Landmark Amman Hotel find a new way to enhance the guest experience through improving the level of security with reduced property damage and thefts in hotel. It also improved team cohesion and work efficiency of the hotel employees. Furthermore, the hotel could increase revenue by monitoring and invoicing according to actual numbers of guests, and be compliance with local authorities’ security and safety regulations.
Around 30 IP video entry systems from Castel have been installed on the stunning new £330 million University of Northampton campus. The Waterside campus, developed on the site of a former power station bordering the town centre and River Nene, is designed for 21st century teaching and a low environmental impact. It has a full range of integrated learning environments and a 24/7 library and learning zone. The campus, which opened in autumn 2018 and can accommodate 14,000 students, has been developed in the Waterside area of the town and includes a learning hub, creative hub, sports centre, senate building, hotel and student accommodation village. Integrated with Salto access control system The entry stations have been integrated with the site’s Salto access control system Castel video entry stations, installed by Protec Fire & Security Group, have been fitted at the entrances to the senate building, the learning hub, car parks and service yards, while master stations have been fitted in the main security room, backup security room, at the senate reception desk and at the learning hub reception. The entry stations have been integrated with the site’s Salto access control system so that authorised cardholders can gain access using a key fob, while visitors seek entry via the video intercom. All entry points are single button and a Castel server is installed to handle unanswered calls via call routing and forwarding to other Castel IP handsets. Vandal-proof entry panels The Xellip IP solution delivers IP audio-video access across a PoE cabling network. Features such as a built-in induction loop, audio/call progress feedback and coloured LED pictograms help the university to comply with disability discrimination legislation. The entry panels are vandal-proof and the master stations feature a colour video touchscreen Features of the system include call waiting and priority calls, echo and noise cancellation, audio conferencing, group calls, privacy settings, call overflow, call forwarding and voice messaging. The entry panels are vandal-proof and the master stations feature a colour video touchscreen. Efficiently manage building access “The Castel video entry system complements the 21st century approach to university life reflected in our stunning new campus,” said Becky Bradshaw, Head of Campus Services at the University of Northampton. “We are very pleased with the way the system helps us manage access and security to our buildings in an efficient and relatively effortless way.” Simon Key, Project Manager at Protec Fire & Security Group, said: “The installation of the Castel system was trouble-free as everything was installed on an IP network, with PoE obviating the need for additional power supply cabling. We are delighted to have worked on this cutting-edge project, showcasing the role of state-of-the-art security systems on a brand new and impressive campus.”
It is one of Moscow’s most ambitious building projects: the VTB Arena Park was built on the site of the old Dynamo Stadium and revitalises the entire surrounding area with a multi-purpose concept. At an estimated cost of US$ 1.5 billion, the modern VTB Arena Park combines sports, entertainment, commercial and residential facilities. A first challenge arises from the sheer size of the project: The football stadium, known as Dynamo Central Stadium and home to FC Dynamo Moscow football club, hosts league matches with a capacity of over 26,000 spectators. The park’s indoor arena holds more than 12,000 guests during ice hockey matches, basketball games and rock concerts, while the 300,000 square-meter park area also offers retail facilities, a five-star hotel and 1,600-car parking garage. Protecting residential areas Considering the wide range of very different purposes served by these various buildings, it was clear from the project’s inception that a multitude of vendors and providers would be needed to cover all security needs. VTB Arena Park was looking for a partner able to tackle that key challenge From the security manager’s perspective, the main challenge was to ensure that these disparate systems would function together and allowed for central management of a wide array of functions such as: access control for tens of thousands of football fans entering the stadium on match days, monitoring the vast perimeter with its park zones, and protecting residential areas against intrusion. VTB Arena Park was looking for a partner able to tackle that key challenge – integration of all parts into one platform – and chose Bosch as its provider of end-to-end video security and access control. Intelligent video analytics Aside from the project’s complex technical ramifications, there was a particular system design challenge: Residents of the Arena Park should feel at home enjoying the highest quality of living, while the area also needs to accommodate for the influx of thousands of visitors within short periods. As the Bosch experts learned, the multi-purpose character of VTB Park leads to an equally wide range of different security needs among its users. Catering to the video security needs, Bosch installed a total of more than 2,000 video cameras, fixed as well as moving cameras, both indoors and outdoors, to safeguard the vast perimeter of the Arena Park premises and secure the homes and offices. One of the camera types installed for perimeter protection is the AUTODOME IP starlight 7000 HD. This high-definition camera offers excellent low-light performance thanks to starlight technology and also features built-in Intelligent video analytics. Access control systems The video analytics function automatically detects deviations from standard moving patterns The video analytics function automatically detects deviations from standard moving patterns, like a person entering a restricted area, and triggers an alarm that is sent to the control rooms where security staff can then zoom into a scene for closer investigation. As required by VTB Arena, all 2,000 cameras and connected video storage on Bosch recording units are managed centrally via the Bosch Video Management System (BVMS). Another particular challenge consisted of aligning the three different access control systems of the stadium running at the same time. The ticketing system is the first layer of access control, managing the turnstiles that permit entry of thousands of visitors during events with paper tickets. This access control system needed to integrate with the employee access control system that relies on proximity cards (the Access Engine provided by Bosch), as well as a third, offline access control system used at specific stadium facilities. Integrated security system As the Bosch experts in Moscow found out, such an integration was without historic precedent. Because no standard solution existed, the team devised a highly customised set-up managed centrally on the Building Integration System (BIS) from Bosch. “We were fully aware that the multifunctional character of the VTB Arena Park would lead to complexity that could hardly be topped. We needed integration power, a partner who knew how to bind all loose ends into one solution that had never existed before. Creating this one integrated security system catering to all the various purposes has made Bosch our main security partner,” said Alexander Kravchenkov, Deputy Head of Security Systems Maintenance Group IT Department at VTB Arena.
In mid-2009, Melco Resorts & Entertainment Limited opened City of Dreams, Macau – a casino and resort complex that quickly become one of the world’s premier entertainment and leisure destinations. The complex brings together a collection of world-renowned hotel brands, including Crown, Grand Hyatt, and Hard Rock, along with a casino area of approximately 448,000 square-feet and over 20 restaurants and bars. Also comprising an audio-visual multimedia experience, and ‘The House of Dancing Water’ – the world’s largest water-based extravaganza showcased in the purpose-built Dancing Water Theater. These unique and innovative entertainment, shopping, food and beverage offerings realise the company’s vision of bringing world-class integrated resort and entertainment experiences to Macau and Asia. Need of a robust security solution Melco Resorts was looking for a robust security solution capable of protecting high-value assetsHaving thousands of staff moving around the site meant that effective people management needed to be a significant part of the security solution. With a large site encompassing multiple areas and a staff of approximately 13,000, Melco Resorts was looking for a robust security solution capable of protecting high-value assets while providing a reliable and flexible system to support daily operations. In the years leading up to the opening of City of Dreams, Gallagher worked directly alongside Melco Resorts, and security partner Certis Security (Macau) Ltd, during the design and construction phases. The Gallagher team were highly involved in discussions and developments relating to software customisations and the final commissioning of critical security areas. MIFARE Classic card technology Part of the City of Dreams philosophy from day one was to operate a one-card, single service entity per staff member – not only for high-level security but across all system requirements. According to Billups, a lot of decisions around system choice were based on meeting the one-card philosophy. Utilising MIFARE Classic card technology, 1700 access controlled doors were set up across the complex. Utilising MIFARE Classic card technology, 1700 access controlled doors were set up across the complex Gallagher’s ability to encode the cards with data from multiple system providers was crucial in delivering the one-card policy. Along with Gallagher access data, third-party ASCII data encoding was also provided on the card for use by other on-site systems to achieve the objective of a single card philosophy. Latest generation data security The original system, comprising MIFARE Classic card technology, is now being upgraded to the latest MIFARE DESFire EV1 across all Melco Resorts properties. MIFARE DESFire EV1 provides the latest generation data security and encryption ensuring Melco Resorts globally stays at the forefront of technology. To further meet their one-card philosophy, Melco Resorts wanted a single card technology utilised across all three of their Macau complexes – City of Dreams, Altria Macau, and Studio City. In addition to enabling access across multiple properties, there was a requirement for a central monitoring system that could manage alarms escalated from any of the properties and register such alarms centrally in a main command structure. Highly integrated and expansive platform Gallagher’s multi-server technology delivers this, with seamless connection between all systems and across all sitesFuture-proofing was an important consideration of the security solution. “City of Dreams needed a system that catered well to growth, particularly in the areas of people management and access control. Gallagher provided us with the highly integrated and expansive platform we were looking for,” said Kelly Billups, Director of Security Technology & Administration for Melco Resorts. Gallagher’s multi-server technology delivers this, with seamless connection between all systems and across all sites. If communication between the facilities should fail due to a network fault or similar incident, each site’s security system will continue to function independently. According to Billups, the multi-server system has resulted in reduced labour costs due to the consolidation of security administration. Efficient movement of people The Gallagher system provides rapid response times to access requests ensuring the efficient movement of people in and out of areas. The instant dissemination of cardholder access and configuration data also ensures people have appropriate access delivered in real time. If cardholder access needs to be denied, this information is communicated and applied instantly across the site. In addition to door access activity, 5300 detection points are also monitored throughout the complexIn order to provide Melco Resorts with an audit trail of security events, all site activity is logged in a secure database. In addition to door access activity, 5300 detection points are also monitored throughout the complex. Reports are generated using a simple wizard-based system which steers the report generator through a step-by-step process ensuring the relevant data is retrieved. The City of Dreams site required integration with a number of external systems and Gallagher’s Command Centre central management software provided the platform to deliver this. Cameras integrated with Command Centre As surveillance is a key requirement for a casino, City of Dreams has thousands of cameras throughout the complex. A number of these cameras monitor critical back of house operations and are integrated with Command Centre to provide additional layers of security and enable further administrative functionality. A number of lower-level security points throughout the complex – which utilise traditional keys – integrate Command Centre with an electronic key management system. Keys are electronically released to personnel depending on their access permissions. Two high-level interfaces provide communication to all elevators connected to Command Centre There are approximately 80 elevator shafts located throughout the City of Dreams complex. Two high-level interfaces (Schindler and Otis) provide communication to all elevators connected to Command Centre where access control groups manage access to each of the floors. This integration is particularly important for heart-of-house elevators where access can be highly restricted to only authorised personnel. HR system integrated with Command Centre An integration between City of Dreams Human Resources (HR) system and Command Centre was established. The active connection between the two ensures that basic personnel information is automatically communicated from the HR system to Command Centre without the need for manual intervention. Because of this, the process of updating cardholder information and assigning access to cardholders is a quick and simple procedure – a must for a database of this size. The Gallagher system provides rapid response times to access requests ensuring the efficient movement of people in and out of areas. Where high-level (software) interfaces are not available, the Gallagher system connects with other services including: boom gates, motorised vehicle and pedestrian doors, and turnstiles, using what is commonly referred to as a low-level interface. A control relay in Gallagher’s Command Centre platform activates the door or gate, and in turn the status of the door or gate (open, closed) is reported back. Salto integrated guest locking system Melco Resorts requirement is to seamlessly integrate hotel guest-room locks with the Command Centre platformThe delivery of a high-level integration with a hotel guest-room locking solution is currently in development and will be a world first. Melco Resorts requirement is to seamlessly integrate hotel guest-room locks with the Command Centre platform in order to deliver high-level security across the entire complex. To deliver this solution, Gallagher is working with long-term partner Salto. The Salto integrated guest locking system is required to operate in conjunction with Melco Resorts high-security card encryption and encoding, while complimenting the hotel décor. Melco Resorts and Gallagher maintain an ongoing relationship which brings together Melco Resorts evolving requirements and Gallagher’s product development road map. “The relationship is key for us” said Billups, “having a team based in the region who meet with us regularly and having a level of engagement over development is very important.”
Guests at some of Dubai’s newest hotels will enjoy more efficient and memorable service thanks to eFusion technology from Maxxess. Improving control The eFusion solution is being used for comprehensive streamlining of security and safety – tying together front-of-house and back-of-house operations – at a number of landmark hotel developments in Dubai. The result will be a smoother check-in experience for guests, with minimal queuing, no cumbersome paperwork, and more attentive service. By integrating front and back of house operations at busy hotels, eFusion reduces problems with inefficiency and human error and improves situational awareness and control capability for management teams. Among the latest five-star destinations to adopt eFusion, the Taj Exotica Resort & Spa on Palm Jumeirah, which is due to open later this year, comprises seventeen floors with 200-plus rooms and suites, along with recreational and dining facilities. The Taj Jumeirah Lake Towers, another development by the Indian Hotels Company due to open this year, will also benefit from Maxxess integration technology. Seamless integration eFusion allows rapid integration - off-the-shelf - with a wide choice of security, safety and business-critical technologies eFusion allows rapid integration – off-the-shelf – with a wide choice of security, safety and business-critical technologies. It provides an umbrella management system and allows the highest level of service efficiency by removing the need for operators to continually switch between systems. The systems and IT integrator for the new-build project, PACC Information and Communication Technology LLC, says eFusion was specified because it met requirements for the most robust solution and one that would be easy to adapt going forward. Delivering guest satisfaction “Guest satisfaction is the hotel’s top priority and the eFusion system will let them focus their efforts on delivering it,” says PACC spokesman Shantanu Mukherjee. “Visitors to these new hotels will really notice the difference.” At the Taj Exotica, eFusion will integrate the front of house system from ASSA ABLOY; the Honeywell Simplex fire system controls; the Honeywell Building Management System connected via a Bacnet gateway; and a combination of 403 Hanwha Technwin Wisenet IP internal and external cameras, installed by ISS CCTV and operated through SecureOS video management software (VMS). ASSA ABLOY VingCard access control The ASSA ABLOY VingCard access control system, securing almost 300 doors, will be managed from the eFusion platform alongside other key services due to be added, including the OTIS elevator controls. eFusion will allow the hotel’s management to define events of interest – such a particular door being unlocked, or alarms being set or unset – and provide transactional information to improve security for guests, and accountability. The solution also enables centralised management of room safes, mini-bars and cupboards, and the control of all alarm transactions. Integration with access control system Using eFusion off-the-shelf integration modules, ID badging and building management systems are also fully integrated Cameras linked to door access will allow video pop-up to be triggered by pre-defined events, and operators will have complete PTZ control, playback and video functionality. Using eFusion off-the-shelf integration modules, ID badging and building management systems are also fully integrated, allowing easy operation and control of a wide range of functions including heating, ventilation and air conditioning. A further 300 rooms are expected to be added to the Taj Exotica Resort & Spa system in a phase-two development scheduled for 2021. Modular, building block approach “The eFusion platform was chosen for these major projects because it offers the advantages of a modular, building block approach and gives IHCL maximum freedom to integrate, customise and adapt to future needs,” says Lee Copland, Managing Director EMEA, Maxxess Systems. He adds, “This success positions Maxxess as a clear leader in linking front-and-back of house operations to enable seamless facilities management, safety and security operations in often complex and busy hotel environments. Visitors to IFSEC International will have the opportunity to see the power of eFusion integration on our stand IF2120,” added Copland. As well as the new IHC Taj hotels, Maxxess eFusion is also being implemented at six upcoming Dubai developments, including major hotel, leisure and retail destinations, with several other projects underway in the wider region as well as in London, UK.
Times Square in New York City is arguably one of the most popular attractions in the world, with restaurants, stores, energetic crowds and pulsing lights from towering digital billboards. It’s also home to AC Hotel New York Times Square, a recently opened property that’s part of the AC Hotels by Marriott brand, located on West 40th Street. The one-year-old hotel has 21 floors with 290 rooms and suites, with options including high views, floor-to-ceiling windows and full balconies. It also has more than 3,500 square feet of event space, a 24/7 fitness centre, an AC Library, and Castell Rooftop Lounge on the 21st floor. The hotel, which was designed by Helpern Architects of New York City, is detailed with original artwork in the hotel’s shared spaces – from sculptures to abstract paintings – by a mix of local, national and international artists. The photography in the guestrooms is by Richard Silver, featuring NYC’s iconic architecture. OTO Development, part of The Johnson Group, owns and operates AC Hotel New York Times Square. Requirements for entrance solution A Boon Edam BoonAssist manual assist revolving door met all the requirements and moreOn average, more than 1,000 people enter the hotel each day, says General Manager Ben Britton. The property’s design team sought a main entrance solution that would not only accommodate pedestrian traffic but would also fit with the hotel’s soaring glass exterior and all-white entrance with its large, cantilevered awning extending over the sidewalk. The solution also needed to filter outside noise and other sensory distractions to help create an “oasis of calm, a retreat from New York City’s hustle and bustle,” Britton says. In addition, the entrance solution needed to coordinate with the overall hotel brand, based on providing a harmonious, modern and discerning guest experience. A Boon Edam BoonAssist manual assist revolving door met all of those requirements and more, including a custom-made, all-white colour that matches the exterior entrance decor. The door’s dimensions are built to complement the scale of the entry at 10 feet diameter and almost 14 feet tall. Power assist feature for easy usage “Due to the size of the door, we chose the manual assist option to reduce strain on the motor,” explains Britton. “The door has a weight to it that provides a sense of grandeur as you enter the hotel, while the power assist feature makes it easy for our guests to use.” The revolving door also helps ensure that hotel guests are connected with the full experience that the hotel aims to provide. “We are very keen on providing a sensory experience,” Britton says. The hotel’s operations team is pleased with how the Boon Edam revolving door controls pedestrian traffic “The lobby exudes the AC Hotel's brand signature scent. We work to ensure the lobby space is quiet and calm so that our business guests can conduct a business conversation. Considering the environment outside on the street, the revolving door helps us achieve these goals – it also provides a brief transition experience for the customer as they pass through it, sort of ‘washing the street off you’,” Britton observes. The revolving door's smooth maintenance Britton notes that maintenance of the Boon Edam revolving door has been seamless, with no issues to date. The hotel’s engineering team is fully trained on the door’s operation, including its regular maintenance schedule. The hotel’s operations team is pleased with how the Boon Edam revolving door controls pedestrian traffic and creates an ideal transition into the peaceful lobby; the design team is happy with how the door design and special colour add to the beauty of the hotel exterior. “AC Hotel Times Square has gotten a lot of attention both nationally and internationally,” Britton says. “I believe that this type of sleek, modern design is the future. Hotel chains will update their design elements to be more in line with what our hotel has already accomplished. Boon Edam provided a great solution.”
Round table discussion
Hospitality businesses work to provide a safe and pleasant customer experience for their guests. Hotels offer a “home away from home” for millions of guests every day around the world. These are businesses of many sizes and types, providing services ranging from luxury accommodations to simple lodging for business travelers to family vacation experiences. Hospitality businesses also include restaurants, bars, movie theaters and other venues. Security needs are varied and require technologies that span a wide spectrum. We asked this week’s Expert Panel Roundtable: What are the security challenges of the hospitality market?