Maxxess will be at Intersec 2019 showcasing its latest advances in corporate risk reduction, improved people management and smarter hospitality access solutions - including new releases in its popular eFusion and Ambit solutions. eFusion security management The latest version of the VisitorPoint module within the eFusion security management platform will be showcased, offering a host of new streamlined functions for efficient people and visitor management. Harnessing current advances in cloud...
Maxxess will be at Intersec 2019 showcasing its latest advances in corporate risk reduction, improved people management and smarter hospitality access solutions - including new releases in its popular eFusion and Ambit solutions. The latest version of the VisitorPoint module within the eFusion security management platform will be showcased, offering a host of new streamlined functions for efficient people and visitor management. Harnessing current advances in cloud computing and mobile communic...
With smart city projects on the rise across Thailand, international security brands have converged at the 6th edition of Secutech Thailand in a bid to connect with regional buyers and project owners. Stricter fire and safety regulations enacted by the government have also led to heightened demands for fire and safety equipment, which will be a popular product category during the show. The high demand has translated into an expansion in show scale at Secutech Thailand, which continues its year o...
For over a century, IEEE's mission has been to advance technology for the benefit of humanity. As the world’s largest technical professional organisation, IEEE’s global community includes over 420,000 members in engineering, computing and technology, collaborating on communications, consumer electronics, robotics, sustainable energy, aerospace, life sciences, and many other critical initiatives. Dave George felicitated with IEEE Life Membership Dave George has been an active IEEE me...
Alcatel-Lucent Enterprise and BCDVideo, a provider of innovative, purpose-built IP video storage solutions, announces they are working together to address the growing demand of businesses to enhance public security and safety via video surveillance and networking. Advances in video surveillance are helping cities, hospitals, hotels, sporting and entertainment venues focus on improving public safety, deterring crime and helping police solve crimes, and providing first responders with situational...
The SM-6300 is LEGIC’s latest reader IC to secure ID and Internet of Things applications. Thanks to the embedded certified secure element (SE), the new reader chip is also ideal for ID and IoT applications with the highest security. Another advantage of the SM-6300 is the very compact “System-in-Package” design. ID and IoT solutions The SM-6300 includes a tamperproof hardware secure element (SE), where all key material is stored. This enables a wide range of innovative ID an...
LEGIC’s trusted service Connect enables everyone to securely use mobile services on smart devices – at the touch of a button. Mobile services like mobile access, sharing economy, cashless payment or identification serve new individual or corporate concepts in daily life. Those concepts address the increasing need for efficiency and individuality as well as customer loyalty – all by integrating users via a simple app download. Security against cybercrime LEGIC Connect is a unique trusted service for the secure creation and instant deployment of virtual credentials to smart devices. It is a security enabler for any mobile service and fulfills their current and future need for security against hacker attacks or cybercrime. Mobile services based on smart devices as user interface are quickly and successfully integrated anywhere to maximise convenience By integrating LEGIC Connect into existing system infrastructures, a smartphone or smartwatch can become anything – a door opener, train ticket, time & attendance tracker, car key and much more. Reliable data analysis Mobile services based on smart devices as user interface are quickly and successfully integrated anywhere to maximise convenience and improve customer loyalty. All of them share three important, but difficult challenges: Protection of “things” (and credentials) might be the most important issue when it comes to mobile service providers and is crucial when connecting users via smart devices to sensitive assets. Fully automated business models rely on 24/7 real-time processing of credentials. They require dynamic changes in business logic and need seamless integration of an unlimited number of users. Improved service quality and transparency due to verified and reliable data analysis which contribute to the user's business knowledge. This is the key to today’s and future service success. End-to-end data security Service processes are facilitated and open in respect of technology and user interface Integrity, meaning that data must not be modified in the whole processing, is very important. Any change must be authorised, transparent and understandable. With its sophisticated end-to-end security, LEGIC Connect is the perfect choice for all services where security matters. Personalisation, such as the choice between iOS and Android or the possibility of integrating a second factor of authentication such as PIN and/or fingerprint, is of high importance for providers and users. Service processes are facilitated and open in respect of technology and user interface. A 24x7 availability completes a convenient mobile service. LEGIC Connect offers all these features to simplify mobile business models. Convenient security integration LEGIC Connect is a SaaS solution, which can be used as a security enabler for any mobile service model: LEGIC’s offering combines standardised basic components, which can be simply integrated into any mobile business model. By directly interfacing with the user's mobile business model, LEGIC’s solution serves as the easiest connection of users, things and the respective service business logics. LEGIC’s concept offers highest individual security standards — and so protects you against the increasing threat of hacker attacks. With LEGIC Connect, customer specific data packages are transferred securely. Hence, interaction is not limited to a predefined set of commands. LEGIC’s technology platform allows customers to combine RFID or NFC-HCE and BLE technology on the same eco-system or upgrade their business model with one or the other. Mobile access solutions Corporate access – Mobile ID is an addition to existing smartcard infrastructures and makes the dynamic assignment and withdrawal of access rights much easier and cost-efficient. Temporary access can be given to visitors, customers or contractors within seconds. With LEGIC Connect, these scenarios can easily be realised. Thanks to the innovative and multi-technology platform, every user can be connected with his smart device to any “thing” Hospitality – In the hotel industry, customer experience is most important. Mobile room keys are fundamental for several major benefits: Guests don’t need to check-in at the reception and wait for their key cards. Booking their favourite room in advance and receiving the keys directly on their smartphones or changing a room without waiting again in line at the reception are just a few to mention. Mobility – Mobility business models like vehicle sharing, e-charging or fleet management serve new concepts for individual or corporate mobility. All of these services integrate any user via a simple app download. LEGIC Connect allows the secure creation and instant deployment of virtual car keys, fleet access rights, e-charging credentials or the like on smart devices. Individual application – Corporate access, hospitality, mobility, residential access, etc. are just a few possible use cases. Thanks to the innovative and multi-technology platform, every user can be connected with his smart device to any “thing”. iOS or Android integration LEGIC Connect ensures operational security with a range of features and benefits: All-inclusive security enabling service Securely and easily connects any user to any “things” Specialised on mobile business models Integration of LEGIC mobile SDK in iOS or Android apps Simple integration within existing service Supports BLE and NFC, no matter if smart devices management system via API and/or “things” are online or offline Highly scalable for any size of project Immune against man-in-the-middle and replay attacks Contactless credentials can be personalised “over-the-air” Secure business operations LEGIC Connect integrates into customer back-end via API and supports any kind of credentials or data packages LEGIC Connect integrates into customer back-end via API and supports any kind of credentials or data packages. LEGIC mobile SDK enables easy integration of users with smart devices into LEGIC secured business models. It fully supports customer specific apps and white labelling solutions. LEGIC reader ICs come with an EAL 5+ certified secure element and allow you to combine RFID, NFC and BLE technologies. LEGIC Orbit provides customer specific key management for convenient and secure management and distribution of application keys and configurations.
Professional grade access control technology developer and manufacturer Essex Electronics recently announced the release of the revolutionary iRox-T Turnstile Reader. The iROX-T is a multi-technology reader designed for high-security turnstile systems. It provides streamlined migration for upgrading to the most secure credential technologies by closing the gap to growing security threats with powerful, cost-effective embedded HID iCLASS SE technology that supports a wide range of credentials. The solution meets the increased demand for the highest security in busy lobbies and other environments, without sacrificing functionality or speed. Secure credential reading technology “Lobby security is an increasing concern for organisations that want to close security gaps, especially in smarter and more connected environments,” said Michael Chaudoin, Vice President of Product Management and Marketing, Extended Access Technologies business unit with HID Global. “The New Essex solution with proven HID credential reading technology underscores our shared commitment to helping customers step up their access control systems with a turnstile solution that increases security while also providing efficient access for users.” The Essex Electronics dual-frequency iROX-T turnstile reader supports low frequency proximity cards The Essex Electronics dual-frequency iROX-T turnstile reader supports low frequency proximity cards, HID’s breakthrough 13.56MHz Seos credentials for advanced security, iCLASS SE, iCLASS and other high frequency formats. The reader enables easy upgrades from existing low frequency (and low security) readers to the latest flexible, most secure technology--solving the issues facing many turnstile applications by maximising the read range necessary for high security credentials and maintaining the highest levels of turnstile throughput. Certified high-security turnstile solution “The iROX-T is already tested & certified with eight of the leading global turnstile manufacturers who have embraced the value of the solution, which features a rugged design, and encapsulated electronics for streamlined upgrades that meets the higher security requirements for turnstiles,” shared Garrett Kaufman, President of Essex Electronics. “Additionally, the iRox-T is designed with the lowest possible profile to retrofit and conceal for various turnstile manufacturers and models.” Attendees can see the iRox-T in action by visiting one of the 9 global security manufacturers at GSX 2018. HID Global - Booth # 1737 Alvarado - Booth # 1023 Automatic Systems- Booth # 2535 Boon Edam- Booth # 1715 Com Infosec- Booth # 3529 Delta- Booth # 711 Gunnebo- Booth # 1431 Orion - Booth # 521 Smarter Security - Booth # 1043
Inventor and entrepreneur Scott D'Avanzo, CEO of Adrenalin Technologies LLC, wants to improve security response time in the wake of mass shootings. His new patent-pending technology monitors and detects window vibration and breakage in high-rise hotels and other buildings. The system, known as Safe Place, is designed to immediately notify management of the room or suite number in the event of window vibration beyond a certain threshold or breakage. Safe Place technology One of the biggest challenges in the Las Vegas shooting was being able to identify just exactly where the shooter was at the time One of the biggest challenges in the Las Vegas shooting was being able to identify just exactly where the shooter was at the time. Even when it was pinpointed to the Mandalay Bay hotel, law enforcement still had to clear floors and find the specific room. During that time, the shooting continued. While shootings from high-rise hotels and buildings have been rare, they pose additional complications for law enforcement to detect and stop. D'Avanzo was in Las Vegas during the tragedy that occurred in 2017. It happened just a few blocks from his office. He was at his condo during the incident and was listening to a scanner app as police searched multiple floors and hotel rooms trying to find the room in which the shooter was located. Enhanced security in shoot-out incidents “As I was listening to the incident unfold, I was motivated to develop a device that could both save lives and prevent this type of tragedy from happening or at least minimise its overall impact,” explains D'Avanzo. “The system includes a sensor that is applied to an existing window that can detect vibration and breakage. The system also has other applications. For instance, it can go on an emergency exit door to indicate something is obstructing it, like in the case of the Capital Gazette shooting that just occurred in June.” Adrenalin Technologies is currently seeking investors to continue development and the launch of this technology. Ideally, they would like to connect with a security company that is already providing commercial security services.
VisitorPoint from Maxxess is a smart visitor management solution that offers an easy but powerful upgrade for a wide range of users. For those needing to replace a basic signing-in book for the first time, VisitorPoint is an attractive, user-friendly solution with a choice of useful features. And for larger organisations looking for a multi-site visitor management solution, it provides control and audit features that are future proof, flexible, and designed to complement security, fire and building management operations. It can be integrated with Maxxess software and eFusion range of modules, or adapted with a customised integration, plus it allows users to manage everything from visitor pre-registration, to SMS notification, identity verification and car park occupancy. Easy & efficient visitor management Putting more control in the hands of front-of-house teams, VisitorPoint allows pre-registered visitors to be viewed any time in advance. Visitor badges can be pre-printed for a smoother and more efficient welcome, and sign-in for large groups can be managed in seconds. Visitors check themselves in easily and efficiently using either an iPad or the VisitorPoint free standing touch-screen kiosk. The pre-registered visitor’s details are confirmed when they enter a reference code, passport number, QR code or any specified ID. A photo can be taken with the iPad or kiosk, printed onto the badge and/or saved to the record. Visitors can also be asked to read and sign any non-disclosure agreement (NDA), health and safety or safeguarding instructions on screen, The allocation and control of visitor car parking also becomes much more efficient as specific spaces can be easily assigned to specific vehicles in advance. Automatic email notifications and/or SMS messaging reduce the burden on front-of-house staff, with employees automatically alerted when their visitors arrive. The system can be set up so that both hosts and visitors receive a friendly reminder text ahead of the visit, at check in and check out. Useful information such as directions and meeting details can be added. Hosts can also check out a visitor, helping front-of-house staff to maintain up-to-date site occupancy records. For enhanced security, alerts can be sent when a visitor forgets to check out, or when a pre-specified visit is due VisitorPoint security enhancement For enhanced security, alerts can be sent when a visitor forgets to check out, or when a pre-specified visit is due. For senior security managers real time reports can be generated to show who is currently on site, where they are authorised to visit, as well as who been on site during any given timeframe. The smart VisitorPoint badge printer allows individual badge customisation so that details can be easily changed and added – for example with Wi-Fi codes, meeting room details and specific courtesy messages. This feature also makes it ideal for multiple tenancy sites, with individual badge branding and messaging, available to each tenant. “VisitorPoint is a highly flexible solution that can be used for both single and multiple sites,” says Lee Copland, Managing Director, Maxxess EMEA. “It allows a practical, easily managed upgrade from more basic solutions and it can be easily adapted to the organisation’s changing requirements in future years.”
Pelco by Schneider Electric, a global provider of video surveillance solutions made two announcements that improve the user experience for video surveillance operators by enhancing visibility of events and enabling faster response. Feature-packed VideoXpert Software Release with Enhanced Panomersive Viewing Pelco’s VideoXpert Video Management System, version 2.5 (VX v2.5), is packed with numerous new capabilities including enhanced ‘Panomersive’ immersive context viewing when using Pelco’s Optera camera with Pelco Camera-Link technology and a Pelco ‘Enhanced’ series Pan Tilt Zoom (PTZ) camera. This new feature allows system users to automatically and seamlessly shift from the panoramic view of Optera to a targeted subject or object within the same view using a nearby Pelco PTZ camera. The operator simply clicks on the panoramic view in Optera, and the PTZ instantly moves to the same spot" Combining immersive context viewing with PTZ cameras “Combining immersive cameras with PTZs has been attempted by competitors in the past, but our ability to easily link separate Optera and PTZ cameras provides security directors with a great deal of flexibility in how they design their system while potentially saving money by using previously deployed cameras,” said Robert Beliles, Pelco Chief Marketing Officer. “The operator simply clicks on the panoramic view in Optera, and the PTZ instantly moves to the same spot. This combination of immersive context viewing combined with PTZ detail and tracking at distance allows operators to spend less time locating the object or person of interest, and more time recording their movements.” Flexible Monitor Wall enhancement VideoXpert v2.5 is one of the larger releases in terms of long sought-after features in a video management system (VMS). VX v2.5 delivers a new Rules Engine User Interface and a new flexible Monitor Wall enhancement to make the creation of any size monitor wall and the ability to send events to any specific monitor quickly and easily. The Evolution 180 camera provides a dewarped view without blind spots to capture the areas of greatest interest Beliles concluded, “Several features in the VX v2.5 release significantly advance Pelco’s efforts to drive relevant and contextual video where and when it's needed, enabling impactful responses as well as effective automation. New analytics overlays in the VX v2.5 Ops Center Client allows operators to easily view and then export relevant video footage with the same analytics overlays to law enforcement far more efficiently than what is available in the market today.” Fisheye Evolution 180 panoramic camera Pelco also announced the release of a new camera, the Evolution 180, which provides a dewarped view without blind spots to capture the areas of greatest interest, making it ideal for crowded areas like banks, hotels, malls, schools and eateries, as well as hospital and clinic waiting rooms. Typically, ceiling-mounted fisheye cameras present less detail on faces and objects that are situated at the periphery of the camera’s field of view, or captures the tops of subjects’ heads when located directly below the camera. Available in indoor and outdoor versions, the wall-mounted Pelco Evolution 180 with true day and night capability is built by Oncam and is specifically designed to deliver a high-definition panoramic view, including a detailed eye-level view of people and vehicles. The Evolution 180 focusses on areas of interest while providing 12 percent more pixels per foot and minimising storage and bandwidth requirements" Minimising storage and bandwidth requirements “In contrast to conventional fisheye panoramic cameras that waste pixels on low interest views of ceilings and floors, the Evolution 180 focusses on areas of interest while providing 12 percent more pixels per foot and minimising storage and bandwidth requirements. Thus, the Evolution 180 is an affordable solution that further helps price-sensitive customers,” said Kevin Saldanha, Principal Product Manager for the Evolution 180. Both the Pelco Evolution 180 and VideoXpert v2.5 are available now.
Global Gaming Expo (G2E) Asia, the marketplace for the Asian gaming and entertainment industry, officially came to a conclusion at The Venetian Macao. The Expo’s 12th edition was its largest to date, boasting a 33,000 square meters of show floor and a globally renowned showcase of more than 220 exhibitors with cutting-edge products, services and technologies. It additionally hosted 16,358 local and international trade visitors, at an annual increase of 17.2 percent. Josephine Lee, Chief Operating Officer of Reed Exhibitions Greater China, notes, “We’re proud to have concluded our largest, most exciting and successful expo to date! G2E Asia truly gets bigger and better each year. We never rest on our laurels and always recognize the need for growth and improvement. Our dedicated teams, both on and off the show floor, work hard throughout the year to ensure the event’s continued growth. Of course, G2E Asia also depends on the collaboration of our partners and participants. Our loyal exhibitors and thousands of visitors complete the show’s formula for success. We’d like to thank them for their contributions and their dedication to the industry, and to G2E Asia! Here’s to even more success in 2019!” G2E Asia 2018 event highlights included: New Product Hot Hits presented real-time rankings of the most popular products and services showcased by G2E Asia exhibitors New Product Hot Hits Returning as the most popular digital item at G2E Asia 2018, New Product Hot Hits presented real-time rankings of the most popular products and services showcased by G2E Asia exhibitors. This year’s grand champion and winning product was WeChat mini games, presented by Rolling Bet Technology Company Limited. Macau SAR Legislators Tour As Macao’s meetings, incentives, conferences and exhibitions (MICE) industry increasingly elevates its status in the international arena, G2E Asia’s enriched and diversified non-gaming content continues to provide a vital platform for the region’s ongoing development. The aim of the inaugural Macau SAR Legislators Tour was to further enhance understanding of the long-term goal to develop and expand Macao SAR into a global tourism and leisure hub. This year, several members of the Legislative Council of Macao took part at the invitation of the Macau Convention & Exhibition Association and Reed Exhibitions. Cotai Trek, exclusively reserved for G2E Asia Privileges members, included a customised tour to three integrated resorts located along Macau’s Cotai Strip G2E Asia Cotai Trek The half-day G2E Asia 2018 Cotai Trek, exclusively reserved for G2E Asia Privileges members, included a customised tour to three integrated resorts located along Macau’s famed Cotai Strip, including MGM COTAI, Galaxy Macau and Wynn Palace. The “Trek” comprised a guided VIP tour of gaming and non-gaming amenities, together with each property’s unique highlights including a peek at MGM Cotai’s permanent art collection of Macau and Eight Views of Macau Series; the Galaxy Macau’s Fortune Diamond and Wave Pool; and Wynn Palace’s Penthouse Gaming Salon and eclectic Fontana Buffet. “I was thoroughly impressed by the tour. Our guides, all members of top management, took the time out of their busy schedules to show us their amazing properties. With such a diverse selection of gaming and non-gaming options, all three were a truly defined the modern integrated resort." Mr. Anton Ivanov, general manager of Grand Hotel Varna JSC. “The trek gave us a unique and first-hand glimpse of both the front and back of the house. It was fascinating to see how these massive properties worked ‘behind the scenes’. Their design and features were so innovative and remarkable. Just when you thought they had thought of everything, these resorts are proof that creativity and innovation are alive and well in the industry!” Ms Michelle Elliott, senior cash operations and collections executive of Les Ambassadeurs Club UK Ltd. G2E Asia 2019 returns to The Venetian Macao from May 21-23, 2019. Its expanded exhibition space aims to deliver a larger and more comprehensive event.
Surveillance systems can track the locations of mobile phone users and spy on their calls, texts and data streams. The Washington Post has reported on such systems that are being turned against travellers around the world, according to security experts and U.S. officials. The summer season highlights the need to take extra precautions when travelling. When travelling anywhere in the world, for business or pleasure, citizens need to be aware of and alert to looming physical and cybersecurity threats. To elaborate on expert security tips, strategies and advice for traveling this summer, we presented several questions to The Chertoff Group, a global security advisory firm that enables clients to navigate changes in security risk, technology and policy. Chris Duvall, Senior Director at The Chertoff Group, offers insights into cybersecurity concerns, physical security precautions, and recommends digital resources/apps for consumers while traveling. Q: How are security risks – physical and digital – changing? Why are threats greater today than five years ago? The exponential number of headlines over the past few years is a strong indication that both physical and digital risks are evolving and increasing Duvall: The exponential number of headlines over the past few years is a strong indication that both physical and digital risks are evolving and increasing. The scope, severity and complexity of physical and cyber risks are increasing and becoming more dangerous and destructive. This is especially true for those travelling outside the U.S. On the physical side, threat actors are actively seeking “soft targets” – public events, social settings, mass audience venues, etc. – to communicate their message, sow chaos and inflict catastrophic harm. On the digital or cyber side, we have seen a shift from “thrill hacking,” to an increase of “hacking as a business” (through credential compromise and ransomware), to an increase in “hacking for harm” - with the rise of “nuke ware” and ransomware without a clear financial motivation. Q. What specific precautions should a traveller take to protect their calls, texts and data streams from being spied on? Duvall: When travelling abroad, we recommend to our clients that their personnel and executives should practice good internet and social media hygiene. Some best practices include: Avoid using public Wi-Fi services—unless you use private VPN service for encryption Increase the privacy setting on your technical devices Disable location identifiers on apps Create a new (unlinked) email for internet correspondence Consider purchasing international MyFi devices to decrease the risk of getting your personal identification information (PII) or protected healthcare information (PHI) stolen Use temporary (i.e. burner) phones to protect your data and your contacts Q. What cybersecurity concerns are likely to impact travellers? Are the threats greater outside the United States or in any specific parts of the world? Significant precautions should be taken to protect personal electronic devices (PEDs) and the data connected to PEDs Duvall: The international cybersecurity landscape has grown increasingly dynamic, with threats posed by government authorities (in some countries), terrorists, insurgents, and criminals, requiring travelers to be proactive and vigilant. U.S. citizens, particularly executives of U.S.-based technology companies, must be aware that they are considered high-value targets for nation-state intelligence services and criminally-motivated bad actors. Many countries will go to great lengths and expense to acquire and exploit proprietary information from U.S.-based companies, and views U.S. executives visiting the country as “soft” targets of opportunity. As such, significant precautions should be taken to protect personal electronic devices (PEDs) and the data connected to PEDs. The tactics, techniques and procedures (TTPs) utilised by bad actors are often covert and nearly undetectable by the affected person. Threat actors routinely access, monitor and utilise Wi-Fi networks at hotels and in public spaces to compromise target devices. Other targeting methods include luggage searches, extensive questioning, and unnecessary inspection and downloading of information from personal electronic devices. There are numerous, high-risk countries for which the U.S. Government warns travellers to be wary of mobile malware, mobile device privacy attacks and hot spots for mobile botnets. The U.S. Department of State has the most recent and up-to-date list. For example, the U.S. Government has investigated numerous incidents in which U.S. travellers’ PEDs (personal and company devices) have been compromised by Russian authorities while transiting Russian airports, left unattended in public spaces and in travellers’ hotel rooms. When travelling to an unfamiliar place, research your destination to understand the local roads and transportation, geography, local roads, culture, etiquette and laws Q: What physical security precautions should a traveller take? Duvall: Here are some useful precautions: When traveling to an unfamiliar place, research your destination to understand the local roads and transportation, geography, local roads, culture, etiquette and laws. Protect your personal information and travel itinerary as much as possible. Limit the amount of jewelry worn, cash, credit cards and electronic devices carried while traveling. Avoid staying on the ground floor of a hotel. Consider choosing a room on the 2nd through 7th floors as these rooms may be more difficult to break into than those on the ground level, but still able to be accessed by fire/emergency response equipment. Never answer your hotel room door for anyone until you’ve determined who they are, why they are at your door, and if it is necessary for you to open the door to interact with them. Carry a rubber door stop/wedge with you to install on the room side of the door before you go to bed. Vary your patterns and routines when venturing out in to a new location, do not become predictable. Politely decline offers of food or drink from strangers (If you do accept beverages, ensure that they are in sealed containers and that there is no evidence of tampering). Never discuss your itinerary, personal, business or other sensitive information where others can hear you. Q: How can companies be proactive in protecting their business travellers? Companies should educate their employees on the importance of maintaining good internet hygiene while travelling abroad Duvall: When travelling on business, companies should provide their employees with clean computers and cell phones before departure. Upon return, the company should immediately wipe the computer clean to prevent any malicious threats from penetrating the company’s internal, cyber-infrastructure. Additionally, companies should educate their employees on the importance of maintaining good internet hygiene and recommend their employees disconnect from social media platforms while travelling abroad. Some general tips to recommend to your employees when travelling abroad include: Register in the Smart Traveler Enrollment Program (https://step.state.gov/step/) Visit Travel.State.Gov to view travel related information specific to the country or countries you’re visiting, including local US Embassy or Consulate contact information, as well as current travel advisories and alerts. Always leave a copy of your transportation and hotel itinerary and driver’s license (or passport if travelling internationally) with a family member or trusted friend. Always use a baggage tag with a protective cover Avoid using public Wi-Fi services Q: What digital resources and/or apps might a traveller benefit from (and how)? Duvall: The Chertoff Group recommends researching the below travel-related apps before departing on a trip: TravWell: This app provides destination-specific vaccine recommendations, a checklist of what you need to do to prepare for travel, and a customisable healthy travel packing list. The app can store travel documents, keep records of medications and immunisations, and set reminders to get vaccine booster doses or take medicines. My TSA: This app provides real-time updates on airport delays. It includes how long security lines are at various airports; information about what you can and cannot bring onto an airplane; and a frequently-asked question list, including new advanced imaging technology. Border Wait Time: The app provides estimated wait times and open-lane status at land ports of entry, which may be particularly helpful when in an area with multiple crossings. Mobile Pass: The Mobile Passport app speeds you through U.S. Customs and Border Protection at (1) cruise port and (24) airports Q: As a security expert, what’s your best advice for travellers? Duvall: At the end of the day, travel security is not rocket science. Simply put, travellers need to: Be aware and situationally alert at all times. Be aware and situationally alert to the location of your luggage and carry-ons at all times. Don’t access unknown, unsecured or public Wi-Fi if at all possible. Turn off “auto connect” features and institute stringent privacy controls as much as possible. Try to “blend in” – you don’t have to try to look like a local but travellers should avoid gaudy and expensive attire wherever possible. Use your common sense – if an offer, invitation or opportunity seems to good to be true... it probably is.
The optical speed lane and turnstile sector of the security market has had a very busy 2017. Growth in commercial construction has provided more opportunity. Innovations in technology have given speed lane manufacturers an opportunity to deliver a better product. Orion sales increase and company growth Orion Entrance Control, Inc., had a great 2017 as sales increased and our company grew. We attribute our success to the unique approach we have taken since day one: providing customised products that offer customers more than a “one-size-fits-all” solution. We offer the line of turnstiles that you would expect from any reputable manufacturer in the marketplace, but we know that when dealing with lobby security or entrance control, one size definitely does not fit all. By providing various options to supplement our core line, we give our customers a solution that best suits their needs.The ability for security technologies and their manufacturers to work together is becoming increasingly more important to our customers One area that we will continue to build upon in the development of our products is in technology integrations. The ability for security technologies and their manufacturers to work together is becoming increasingly more important to our customers. The manufacturers that can future proof their products to allow the addition of new technologies and to protect a client’s investment from obsolescence will be the big winners in 2018 and beyond. Integration in entrance control Orion ECI’s products are built with technology and designs that have this vision for the future. For example, we work with the leaders in biometrics and Point of Sale (POS) solutions to integrate these systems into our entrance control products. Oftentimes, with just a wave of the hand or the right credential, approved users can enter with no hassle or even ring up a purchase. From a business standpoint, Orion ECI experienced a year of continued process improvement and design in 2017. We reached record sales revenues as we continued to receive orders from our existing enterprise clients and new customers. For 2018, we plan to add personnel in key growth areas. This will include additional inside and outside sales positions and product production and engineering roles.
When we contemplate where and how our food is made, cleanliness and hygiene are typically at the top of the list of necessities. And when it comes to production facilities, strict regulations and sanitation requirements are in place to ensure that the highest levels of food safety are met. This white paper by Oncam explores the different aspects of food safety and defence in the production, manufacturing and catering environments. It also offers practical guidance to the types of food certification available making safety equipment compliant and what to look out for. Oncam is an independent, specialised IP video and technology company with a reputation for being one of the most innovative firms in today's market. Oncam's sole focus is on 360-degree smart IP video - working with partners to deliver high-value business solutions for customers that leverage Oncam's award-winning technology. Oncam has deep industry knowledge combined with specialised expertise in Healthcare, Retail, Transport, Maritime and Ports, Banking, Casinos and Hospitality. Find out more about: Food safety by numbers Food safety and food defence Protective technology for harsh conditions A guide to food certifications The future of food safety
The 2018 FIFA World Cup tournament is bringing 32 national teams and more than 400,000 foreign football fans from all over the world to 12 venues in 11 cities in Russia. Fans are crowding into cities including Moscow, St. Petersburg and Kazan. Given continuing global concerns about terrorism, security is top-of-mind. Protection of the World Cup games in Russia is focusing on an “integrated safety, security and service approach,” according to officials. Combining the term “security” with the terms “safety” and “service” is not an accident. An aggressive security stance is necessary, but at the end of the day, fan safety is paramount, and a service-oriented approach ensures a positive fan experience. Medical responders will be working side-by-side with police and antiterrorism personnel. Risk management best practices We asked Sean T. Horner and Ben Joelson, directors of the Chertoff Group, a global advisory firm focused on best practices in security and risk management, to comment on security at FIFA World Cup 2018. Although not involved in securing the 2018 World Cup, the Chertoff Group is experienced at securing large events and enterprises using risk management, business practices and security. Integration is another important aspect of protecting the games, says Horner. The use of multiple resources, including Russian military, intelligence and law enforcement, will be closely integrated to provide the best security for the large-scale event in each of the host cities, he says. The approach will be centralised and flexible, with resource deployment guided by effective situational awareness. Primary security and emergency operations centres will be dispersed throughout each host city “There is a unified command structure at the Russian Federation level, and they will keep resources in reserve and shift them as needed to various events and venues based on any specific intelligence, in effect deploying resources where threats are greatest,” says Joelson. “There will also be some regional commands, and resources will incorporate a spectrum of police and military personnel ranging from the ‘cop on the beat’ to the Spetsnaz, the Russian ‘special forces'.” Primary security and emergency operations centres will be dispersed throughout each host city, and additional forces can be shifted as necessary, he notes. Role of law enforcement In Russia, the lines of separation between law enforcement and the military are not as stark as in the United States, for example, where military forces are restricted from deployment for domestic law enforcement by the Posse Comitatus Act. In Russia, there is no such restriction. A broad range of technology will play a role at the World Cup, Horner and Joelson agree. Technology will be used primarily as a force multiplier and a decision-support tool for security personnel. There are robust CCTV systems in many Russian cities, and mobile CCTV systems, such as camera towers or mobile security centres on wheels, will also be deployed. Technologies will include infrared cameras, flood lights, and ferromagnetic screening systems to scan hundreds of individuals as they walk by. In some locations, facial recognition systems will be used, tied into various intelligence, military and law enforcement databases of known bad actors. Behaviour analytics will be used as a decision-support tool. In addition to security in public areas, private CCTV systems in hotels, at transportation hubs, and inside the venues themselves will be leveraged. Video analytics and detection will help personnel review live view of people who may be acting suspiciously or who leave a bag unattended. In some locations, facial recognition systems will be used, tied into various intelligence, military and law enforcement databases of known bad actors Rigorous anti-terrorism measures A Fan ID card is required to enter the 2018 World Cup Tournament, even for Russian residents. The Russians have an aggressive stance against domestic terrorism, which will also help ensure the safety of the World Cup games, say Horner and Joelson. Terrorist group ISIS has promised “unprecedented violence” at the games, but they make similar threats at every major global event. Russia has been an active force disrupting ISIS in Syria, and experts suggest that losing ground geographically could lead to addition “asymmetric” terrorist attacks. However, Russia is leveraging all their intelligence resources to identify any plots and deploying their security apparatus to disrupt any planned attacks, experts say. Russia’s rigorous anti-terrorism measures include a total ban on planes and other flying devices (such as drones) around the stadiums hosting the World Cup. Private security In addition to military, intelligence and law enforcement personnel, private security will play a have a high profile during the 2018 World Cup in Russia. Private security personnel will be on the front lines in hotels and in “fan zones.” They will operate magnetometers at entrances, perform bag checks, enforce restrictions on hand-carried items, etc. Private security will be especially important to the “guest experience” aspects of protecting the games. Private security will be especially important to the “guest experience” aspects of protecting the games Another private security function at the World Cup is executive protection of dignitaries and high-net-worth individuals who will be attending. Executive protection professionals will arrive early, conduct advanced security assessments before VIPs arrive, and secure trusted and vetted transportation (including armoured cars in some cases.) VIPs will include both Russian citizens and foreign (including U.S.) dignitaries attending the games. Private security details will be out in force. Aggressive security approach Overeager and outspoken fans are a part of the football culture, but Russia will deploy a near-zero tolerance policy against hooliganism and riots. An overwhelming force presence will take an aggressive approach to curbing any civil disturbances, and offenders will be removed quickly by Russian security forces. Strict restrictions on the sale and consumption of alcohol will be enforced in the venue cities before and after the matches. Officials will also be cognisant of the possibility of a riot or other event being used as a distraction to draw attention from another area where a terrorist event is planned. It will be a delicate balance between deploying an aggressive security approach and preserving the fan experience. Joelson notes that freedom of speech is not as valued in Russia as in other parts of the world, so the scales will be even more tipped toward security. “The last thing they want is for things to get out of control,” says Horner. “The event is putting Russia on the world stage, and they want visitors to walk away safely after having a great time and wanting to go back in the future.” Attendees should also have good situational awareness, and keep their heads up, scanning crowds and identifying unsafe situations" Precautions for World Cup attendees Attendees to the World Cup in Russia should take some basic precautions, Horner and Joelson agree. For example, Russia requires a translated, notarised letter explaining any prescription drugs. The country has a more aggressive foreign intelligence environment, so visitors cannot depend on their data being private. Joelson recommends the usual “social media hygiene” and privacy settings. Visitors should not post information about their travel plans or locations, and it’s best to travel with a disposable mobile phone that does not contain personal information. Location tracking should be deactivated. Travellers should also beware of talking and sharing information with others, or of saying anything derogatory. “They should also have good situational awareness, and keep their heads up, scanning crowds and identifying unsafe situations,” says Joelson. “If you bring a personal electronic device, you should expect that it has been compromised,” says Horner. Text messages and email will not be private, and he suggests creating an email address used only for travel. Don’t leave drinks unattended. Travellers from the U.S. should register at the Smart Traveler Enrollment Program (STEP) operated by the U.S. State Department. “Plan before you travel and before you get to the airport,” says Horner.
The massacre in Las Vegas is both sadly familiar and terrifyingly novel. Because of the recent series of violent attacks on innocent people gathered in public places, high body counts are no longer unheard-of, although the 59 dead after the Las Vegas tragedy sets a depressing new record. These news stories have become so grimly commonplace as to dull our collective sensitivity to their shock. However, the modus operandi of the latest attack, apparently by a “lone wolf” – carefully planned and involving a stockpile of nearly two dozen guns gathered in a hotel room – prompts new soul-searching about how public events are secured, not to mention a re-evaluation of security in the hospitality sector. Public events at risk from attack The sniper attack from a 32nd-floor room at Mandalay Bay, overlooking 22,000 people attending a country music festival, has been compared to “shooting fish in a barrel.” When the bullets rained down, there was nowhere to hide. The attack came from outside the “perimeter” of the event, so any additional screening of attendees would not have prevented it. Such attacks are not unheard of, but to what extent might it have been foreseen in this instance? It’s a new concern to add to the mounting list of possible risks at public events, such as a car in the crowd or a bomb in a backpack. Add to the list a firearm assault from above. If security is supposed to protect against that which is reasonable and foreseeable, this tragedy clearly expands the list. Preventative measures for sniper attacks Certainly, there are measures that can prevent sniper attacks, such as police officer sharpshooters positioned on nearby rooftops scanning the windows of nearby buildings for potential threats. Such measures are routinely employed for high-security events such as a Presidential visit, but not generally for a country music concert. Should organisers of public events reevaluate the level of risk, now that the dangers have been demonstrated in a dramatic and deadly fashion? Broadly speaking, nearby buildings with lines-of-sight to public areas are a new security risk to be considered. Might public events need to be located somewhere else? What about parades down city streets, or Times Square at New Year’s Eve? New York’s Police Commissioner James O’Neill may have said it best: “We do understand that no city or town in this country is completely immune.” Security in hospitality sector The implication of the Las Vegas massacre for the hospitality industry is an additional issue. Hotels and resorts such as Mandalay Bay have not generally embraced technologies like the explosives scanners or X-ray machines used at airport terminals, at least not in the United States. Most hospitality companies keep their focus on things like limiting theft, controlling unruly guests, or keeping strangers from roaming the halls. In contrast, hotels in the Middle East and Asia, where there has historically been more chance of violence, have a higher level of security. Hotels and resorts such as Mandalay Bay have not generally embraced technologies like the explosives scanners or X-ray machines used at airport terminals Even in Las Vegas, where the gaming and hospitality industries embrace video in a big way, the emphasis is not on watching guests who may be stockpiling firearms. What might the impact of greater security be on guests and, by extension, a hotel’s business? In a competitive market that emphasises the guest experience, any negativity suggested by additional security measures would likely be evaluated carefully lest it impact the bottom line. Anything perceived as invasive of a guest’s privacy would be frowned upon. Our appetite and/or tolerance for tighter security in the wake of a tragedy will inevitably dissipate over time. In short, the hospitality industry is likely to continue to be a “soft target” for years to come. New security training and technologies Might a higher level of training among hotel staff to promote awareness of suspicious behavior make a difference? It’s a low-profile, comparatively low-cost possibility many hospitality professionals will be looking at in the days to come. There are less obtrusive technologies on the market that could help. For example, Steve Wynn, CEO of Wynn Resorts, has said they have installed “non-visible” metal detectors at every entrance. One manufacturer of such equipment is PatriotOne Technologies, which offers a “cognitive microwave radar technology” embedded in a wall or stand-alone unit at a controlled access point. The company made news at last week’s ASIS show by announcing integration of its system with March Networks’ video recording solution. Concerns for security trade shows The latest tragedy hits especially close to home for those in the security industry who travel to Las Vegas every year for the ISC West show. Mandalay Bay is at the other end of the strip from much of the ISC West activity, but the attack still seems to hit directly in our neighbourhood. Next year, the security market will be going to Vegas at least twice, for ISC West in the spring and again for the ASIS 2018 show in the fall. Somewhere in the midst of those events may be a solution that could help prevent such tragedies. We can all hope so. Meanwhile, our thoughts are with the victims of the Las Vegas massacre, their families and friends.
Technology is a valuable tool for increasing security, but occasionally technology can create a threat. An example is the threat 3D printing technology poses to one of the most mature security technologies, mechanical locks and keys. The ability of 3D printing to duplicate keys presents new challenges for lock manufacturers, and new vulnerabilities to end users. Keys that could previously only be duplicated by skilled thieves can now easily be copied using off-the-shelf technologies and information widely available on the Internet. In this case, technology offers a solution, too. A new kind of key cannot be duplicated by 3D printing. Ironically, it is manufactured using 3D printing techniques. UrbanAlps Stealth Key A Swiss company called UrbanAlps has introduced the Stealth Key, a key that is designed and manufactured from the inside out. The mechanical elements that enable the key to uniquely open a matching lock are hidden away inside the key beneath a pair of narrow ledges, where they are not susceptible to being scanned and duplicated using 3D printing. UrbanAlps offers a range of cylinder locks and keys based on the Stealth Key concept. A high-tech padlock incorporates additional security features such as a shrouded shackle to avoid cutting, anti-drill capabilities, and resistance to lock picking. Stealth Keys are made using 3D printing and a laser to fuse together successive layers of metallic powder added in a manufacturing process called "successive layer melting." Manufactured from the inside out, complex internal features are "printed" and then covered over later with a solid layer that shields the complex inner workings from being duplicated. Unveiled at the Intersec show in Dubai earlier this year, the Stealth Key is aimed at retailers, hotels and other commercial entities. It is less expensive than other technologies designed to shore up the security vulnerabilities of 3D printing, such as keys that combine both mechanical and electronic components. The company’s website touts “simple and affordable key copy protection.” Unveiled at the Intersec show in Dubai earlier this year, the Stealth Key is aimed at retailers, hotels and other commercial entities 3D printing challenge Locks and keys are among the oldest security technologies, dating back to Egyptians and the Romans. Their value has been proven over the centuries and they continue to provide security in many applications, even in today's high-tech environment. However, 3D printing presents a challenge. 3D duplication became a high-profile problem in 2015 when 3D printable computer-aided design (CAD) files for Transportation Security Administration (TSA) master keys were published on the Internet. Those are the keys used by airport security staff to open private suitcases for inspection. The files allow the keys to be duplicated and used to successfully open TSA-approved locks. The hacking of security systems is nothing new—most electronic security systems have been hacked, or have the potential to be hacked in the future. Increasingly, security involves an ongoing one-upmanship between the good guys and the bad guys – the programmers and the hackers, the white hats and the black hats – whether the technology is computer systems or even the locks and keys that have been around for centuries.
Access control system specialist Nortech has recently seen a luxury hotel in Bath update its car park by replacing its existing Nortech FeeMaster system with the latest specification. Nortech’s FeeMaster range was installed by access control system experts APT Security Systems, which is currently updating its past application of the FeeMaster system, so that staff can continue to monitor use of the hotel’s car park. APT Security Systems is the provider of vehicle access control and traffic management systems in the UK. Using its experience in designing and delivering practical and cost-effective solutions, APT installed the updated system which includes the FeeMaster Smart Entry Station, FeeMaster Smart Exit Station, and a FeeMaster Smart Console inside the building. The console allows the staff to control any misuse of the car park and ensures that there are enough parking spaces for its guests. Upgrading car parking system to latest version Nortech’s FeeMaster Smart parking management system is a flexible, simple and cost-effective way of managing car parking accessMary Lynskey, Operations Manager at APT Security Systems commented, “Nortech’s systems have been used on our projects for a number of years and as with this hotel we are currently updating the equipment at these sites to the latest versions. We have worked with Nortech for more than 20 years and are very pleased with its equipment.” She continued, “The FeeMaster range has always worked well for the hotel and they were happy to renew the system as it’s the right fit for their business. The client likes how the products work and we will always recommend Nortech to others looking to upgrade their car parking systems.” Nortech’s FeeMaster Smart parking management system is a flexible, simple and cost-effective way of managing car parking access and controlling validity periods using Mifare smart cards. This avoids the need for expensive cabling between components and minimises disruption. Functioning of the FeeMaster system The FeeMaster Smart exit station prevents unauthorised vehicles leaving a car park or entering restricted areasThe FeeMaster entry station is designed to be used to record the date and time that a vehicle enters a car park. Located at the entrance of the car park, it issues tickets to visitors as they arrive, with each ticket containing a barcode, serial number and the date and time. Dispensing the ticket triggers an ‘open’ signal to the entry barrier. The ticket is then taken to the hotel’s reception desk where the date and time is used in conjunction with the FeeMaster Smart Console. The FeeMaster Smart exit station prevents unauthorised vehicles leaving a car park or entering restricted areas. Located at the exit of the car park or the entrance to a restricted area, it validates the Mifare smart cards and exit tokens. The exit station is equipped with a barcode scanner to read exit tokens issued by the FeeMaster Smart console, as well as entry tickets issued at the entry station. Each ticket is valid for single use at the exit station during the validity period assigned to it. The exit station controller checks the details on the barcode ticket and sends an ‘open’ signal to the barrier. Encoding reusable Mifare access control cards The FeeMaster Smart Console is a compact and easy-to-install device that reads barcode tickets issued at the entry stationThe FeeMaster Smart Console is a compact and easy-to-install device that reads barcode tickets issued at the entry station, calculates the fees based on pre-programmed tariff details, and encodes reusable Mifare access control cards with validity data. If necessary, the console can print customer receipts and/or barcode exit tokens. It can also control a till drawer and can optionally provide a relay output signal which can be used by third equipment i.e. barrier control whenever a card has been encoded or an exit ticket printed. The console may also be connected to a PC so that transactions can be analysed and additional tariff management features may be used. Nortech has supplied products and solutions to the security industry for over 25 years as an independent British company. The company uses extensive experience and expertise to create new security products to fit their clients’ needs and designs everything with the customer in mind.
One of the world’s most famous hotel-chains, DoubleTree by Hilton, part of Hilton Worldwide, has selected a high-performance fire system from Advanced Fire Systems Inc. at their eight-storey, 366 room hotel in Boston, Massachusetts. The challenge was to replace an existing system, integrate speakers to all guest rooms and ensure that all audio messages and strobes were fully synchronised across the hotel, in the event of a fire situation, without the need for costly re-wiring. Advanced audio system The Axis AX system was the preferred choice of the client too thanks to its voice communication system, coupled with PerfectSync" An Advanced audio system was specified by the stylish, four-star, DoubleTree by Hilton Boston North Shore as it met regulatory requirements for the low frequency 520 Hz warning tones necessary for the sleeping areas of the hotel and its award-winning emergency communications system, PerfectSync, synchronised tones and digital messages to ensure compliance with local codes. Christopher Whitmarsh, President at Hayden Systems, Inc., commented: “I was confident that the Advanced equipment could meet the application requirements based on my knowledge and experience with the equipment. In this case, the Axis AX system was the preferred choice of the client too thanks to its voice communication system, coupled with PerfectSync, ensuring the hotel adhered to strict guidelines. The system integrated seamlessly into the fabric of the building and provided the client with a solution that met their needs as well as satisfying the rigorous demands of the local fire authority.” PerfectSync emergency communications system PerfectSync automatically synchronises audio, voice and strobe signals across Advanced’s Axis AX fire alarm networks dynamically, as conditions change. Synchronisation of audio and visual signals across multiple notification zones, floors & areas, prevents confusion in an emergency situation and aids in meeting intelligibility standards. Using high performance, distributed, digital amplifiers that come standard with an integral backup amplifier and power source, should a fire spread to an adjacent floor or area, audio and visual indicators come on immediately, and the audio messages will quickly synchronise with any identical audio message on the system. Advanced’s Axis AX fire alarm system Advanced’s Axis AX system has been designed to offer enhanced power and performance in a user-friendly format Advanced’s Axis AX system has been designed to offer enhanced power and performance in a user-friendly format, offering a vast range of configurations, control and interface options all with simple set-up and operation. The Axis AX systems includes easily networked panels, audio panels and command centers, DynamixSmoke smoke control and a huge range of peripherals, devices and interfaces that make it ideal to suit almost any fire and life safety application. Advanced fire systems Mike Troiano, President and CEO of Advanced in the USA, said: “Advanced fire systems are specified in some of the most famous and prestigious hotels across the world and it was a pleasure to work with our customer Hayden Systems, Inc. to provide a system that will meet the rigorous standards required and ensure that the DoubleTree by Hilton’s staff and guests alike are safeguarded.” “PerfectSync insures synchronisation of audio, paging and strobe signals without the need for special wiring or programming, it’s all done automatically by the Axis AX system. Since its introduction in 2014, Award Winning PerfectSync has built a solid reputation with engineering firms and fire authorities alike for its ability to deliver superior performance. The end result is a technologically advanced, easy to use audio and visual communications system that improves life safety for all of the occupants of a building in an emergency situation.”
Apstec Systems announces that its Human Security Radar (HSR), the first fully automatic real-time mass people screening solution, has been selected by Esenboga Airport, Ankara, to significantly boost security in land side areas. Chosen following a rigorous selection process, including a pilot installation, HSR will be installed at the terminal entrances as part of ongoing security enhancement measures by the Turkish State Airports Authority. It will enable people screening without slowing down the flow of traffic, with each system capable of scanning up to 10,000 individuals per hour. The technology was deployed in partnership with local distributer AKBA. Cost-effective solution The devastating attacks on Ataturk Airport in Istanbul and Brussels Airport highlighted the vulnerability of the land side of airports to terrorism The devastating attacks on Ataturk Airport in Istanbul and Brussels Airport highlighted the vulnerability of the land side of airports to terrorism. Since these events there has been global interest in securing the land side of airports, but traditional aviation style security checkpoints or manual searches, which scan one individual at a time, are not suited to purpose and result in large queues of passengers, which are vulnerable to attack in their own right. With existing approaches to security screening providing impractical, inconvenient and expensive to operate, terminals have remained susceptible to attack, or are subject to intrusive and disruptive security screening regimes. HSR was designed to address this challenge, and offers a practical and cost-effective solution to security screening in such high footfall scenarios. Enhanced security measures The first fully automated, real-time mass screening solution, HSR provides seamless security to protect public places from terrorist attacks. The walkthrough system uniquely combines unparalleled high throughput, speed and accuracy, simultaneously screening multiple subjects in real-time for threats, without the need for an operator to inspect suspect materials. With 40,000 passengers traveling through Esenboga Airport every day, the deployment of HSR will be instrumental in improving security for millions of people. Through deploying HSR as part of its commitment to terminal safety and enhanced security measures" “HSR constitutes a major breakthrough in the way airports protect the land side of terminals,” commented Osman Aksoy & Sirzat Balin,Co-Founders, AKBA. “Through deploying HSR as part of its commitment to terminal safety and enhanced security measures, the Turkish Airport Authority has taken a major step to prevent the reoccurrence of terrorist attacks.” Mass transport hubs Esenboga Airport’s uptake of HSR is the latest major deployment of the technology, which is currently utilised by some of the world’s largest airports, as well as sports stadiums, entertainment venues, mass transport hubs and networks, places of worship, hotels and high-end retail and entertainment centres. “HSR is proven to dramatically improve safety in crowded public spaces, and enables venue owners to close a critical security capability gap,” added Gregory Labzovsky, CEO, Apstec. “We’re therefore delighted to be working with Esenboga Airport to enhance safety for millions of travellers. AKBA, our distributor in Turkey, were instrumental in helping the Turkish Authorities understand the potential of HSR.”
One of Fortaleza's largest hotels, the Gran Marquise Hotel, which hosts thousands of people each year and holds hundreds of events, has reinvented itself and converted analog technology to IP surveillance. Upon project completion, it is expected that the Gran Marquise will have 250 VIVOTEK network cameras installed, integrated and linked with all other hotel devices under Genetec’s cloud-based video-surveillance-as-a-service (VSaaS) solution, Stratocast. About Gran Marquise The Gran Marquise is a five-star hotel of 18 thousand square meters located on the seafront of Fortaleza (Ceará). With a 23 year history, the hotel has a large infrastructure of 230 apartments ranging in size from 29 to 131 square meters, two presidential suites and 21 floors in total, of which 14 are dedicated to guest rooms 7 are retained for events, recreation and administration. The Gran Marquise realised that its security system needed to be renewed It is one of the most in-demand destinations among national and international authorities, artists and athletes, such as Bill Clinton, former president of the United States, Vladimir Putin, current president of Russia, singer Paul McCartney, rapper Snoop Dogg, as well as the fighters of the Ultimate Fighting Championship. In addition, the Gran Marquise was the first hotel in Brazil to achieve the ISO 22000, certificate that ensures adherence to extremely high standards of food quality and safety. Unified security and operations The Gran Marquise realised that its security system needed to be renewed. The hotel had 500 analog cameras and 22 digital video recorders installed – an extensive system, but one which only provided low-quality images and demanded heavy workload when it was necessary to locate and retrieve footage of a recorded event. "We looked at the hotel and realised that we had good internet, excellent rooms, perfect service, but if a customer asked for footage from security cameras, the only thing we could offer were noisy images," said Jussieudo Gomes, Security and Information Technology Division chief of the Hotel Grand Marquise Fortaleza. To solve this dilemma and improve the management and security of the hotel, a plan was formulated to develop a pilot project with VIVOTEK – a global provider of network cameras, PoE switches, and network video recorders, and Genetec, a global provider of IP surveillance software, access control and license plate recognition solutions. Installing VIVOTEK network cameras Divided into four stages, the goal of the project was to enable the total unification of management, security, marketing and commercial operations Divided into four stages, the goal of the project was to enable the total unification of management, security, marketing and commercial operations. In the first phase, 250 analogue cameras were replaced by a mere 48 VIVOTEK network cameras. Also installed was the Genetec Stratocast software, a cloud-based video recorder tool that eliminates the need for any local server, making it possible to monitor and share images with fully encrypted data. Two models of network cameras were installed throughout the hotel: one is the IB8369A, a 2-megapixel camera capable of capturing high quality video, with IR illuminators effective up to 30 meters for superior image quality throughout the day and night. The camera also features Smart Stream II technology, which optimises image quality for the most important regions in any scene; in doing so it can reduce network bandwidth consumption and storage requirements by up to 50%. The other camera installed was the small-scale, but big-featured FD8166, an ultra-mini fixed dome network camera with a tiny diameter of only 90mm. Genetec Security Center solution "Because of the ‘L’ shaped layout of the hotel, we previously had five analog cameras installed on each floor: two in the corridor, because the distance from one side to the other was too long to be monitored by a single analog camera; one in front of the elevator; another covering the 'L' and one more covering the maid’s service area. "Now, each floor has only three cameras: one camera that serves the 'L' and the elevator; another that serves the corridor and one more observing the service area. At the reception area, the same thing happens, we put a different camera on the ceiling, and with just that solution we managed to cover the lobby, the bar, a part of the reception and the stairs of the restaurant, "explained Gomes. The Genetec Security Center solution was implemented for the internal parts of the hotel In the second phase, the Genetec Security Center solution was implemented for the internal parts of the hotel. With this platform, Gran Marquise can unify operations by combining all IP surveillance systems into one interface. Now all access control and video surveillance are connected to, and accessible through, the cloud. Unified access control and fire security The third and fourth stages are still in progress. The goal is to install 250 network cameras in total and unify the security system with access controls and the fire alarm system. In addition, the KiwiVision analytical software was also installed, a system which counts people automatically through cameras and 3D sensors and detects objects added or removed from a scene. This way it is possible to automatically detect if a dangerous object has left behind or if something has been stolen from a particular area. "The new security system has come to improve the image quality of surveillance, the layout of the hotel and the promptness of response to the customer. In the past, if we needed an image we had to expend great effort in searching whole files and spend hours watching videos to be able to select and retrieve the relevant event - not to mention the impact power failures, and malfunctions issues in power supplies, recorders and hard disk drives. ", said Gomes. Video security integration The new IP surveillance infrastructure has already proven effective during a wedding held at the hotel The new IP surveillance infrastructure has already proven effective during a wedding held at the hotel. The bride had been in the spa area enjoying the luxurious Day of the Bride service. However, when she went to dress up for the ceremony, she did not find the jewelry she had prepared for the wedding. Security staffs were triggered to investigate the occurrence. “Through descriptions of the bag that carried the jewelry and the time when the bride last saw it, we were able to locate the footage though the synergy of VIVOTEK’s camera and the Genetec system, and then proceed to point of precise relevance in the video. We noticed that the bride carried the purse into the car, but on exiting the car she was no longer carrying it. When we showed her the pictures, she went to the car and the purse was there. If it wasn’t for the new IP surveillance solution, we would not have been able to ascertain what had happened, the bride would remember and find the jewelry only after the ceremony, and her day would have been ruined. This entire investigation process, finding the images and resolve the case, took only 15 minutes, but saved a very important day" said the security chief. Genetec public-private partnership The Hotel Gran Marquise’s new security system is part of Genetec's private-public sharing initiative The Hotel Gran Marquise’s new security system is part of Genetec's private-public sharing initiative, which enables the sharing of certain cloud-recorded images with police forces. The Military Police, the Ceará State Government and the ABIH (Brazilian Hotels Industry Association in Ceará) are partners in this project along with the hotel. The purpose of this private-public partnership is that, with the monitoring carried out by private companies, the public sector can achieve a more effective action, speedily curbing the action of criminals in monitored places. The private-public partnership is founded on the belief that such sharing of private company surveillance with the public sector will enable a more expedient and effective curbing of criminal activity in such monitored areas. In this way, it is possible to expand monitored areas and reduce crime without direct public sector investment. Recorded images are transmitted in real time to the police, and a two-way relationship benefits both sectors. "The goal of projects with public-private partnerships is prevention. It is possible to increase public safety with little investment from the private sector," explained Country Manager of Genetec Brazil, Denis André Côté. With such initiatives, we are beginning to see the benefits of advances in total surveillance systems expand beyond those companies who take the initiative to invest in them and begin to serve the broader public.
3xLOGIC, Inc., a provider of integrated, intelligent security solutions, and a three-time Deloitte Technology Fast 500 winner, announced that Panda Restaurant Group, Inc. (parent of Panda Express, Panda Inn, and Hibachi-San) has completed deployment of 3xLOGIC’s VIGIL Trends Business Intelligence software to all of its North American locations. Interface Security Systems, headquartered in St. Louis, Missouri, is the integrator and overall project manager for this ambitious endeavour. Panda Express is the largest family-owned restaurant in America, with more than 2,000 stores globally, 35,000 associates and $3 billion in sales. Since it was established in 1983, Panda has steadily grown with roughly 125 stores opening each year. Privately owned and operated, the restaurant is guided by the core values of its co-founders and co-CEO, Andrew and Peggy Cherng and is dedicated to developing its team members and giving back to the community. As of today, Trends is deployed at 1,960 locations and has been integrated with existing Interface video surveillance and alarm systems Business intelligence solution “As an industry leader, Panda Express’s culture sets an expectation of best-in-class results,” explained Lyle Forcum, executive director of asset protection at Panda Express. “Accordingly, we needed a state-of-the-art business intelligence solution to provide us with truly actionable information. Intelligence we can act on is central to Panda’s business strategy, which focuses on meeting high standards through continuous operational improvement.” Starting in August 2017, 3xLOGIC and Interface Systems worked with Panda Express to customise Trends to meet the company’s unique, comprehensive needs. Interface began system deployment in QI 2018 with the first location going live in March 2018. As of today, Trends is deployed at 1,960 locations and has been integrated with existing Interface video surveillance and alarm systems. Integration with intrusion and video systems “It was impressive that we were able to integrate Trends so seamlessly with existing intrusion and video systems,” said Sean Foley, senior vice president of national accounts at Interface Systems, “and the entire solution was rolled out without a single technician visiting any store.” Unlike many retail BI implementations, the focus at Panda Restaurant Group is not solely on loss prevention, but also on tracking and improving all operations at every store. Here are some of the key elements of store operations that Trends enables Panda to monitor, track, and improve: Trends provides intrusion data, which shows when stores are opened and closed, deliveries are made, and whether the store is being remotely armed and disarmed People Development. To set its people up for success, store managers are able to review all transactional behaviour and address opportunity areas with employees within two days. Comparing Store Performance. The store managers’ Trends dashboard shows very clearly how the restaurant is performing compared to other stores in the region and to their prior month’s performance. Optimising Store Efficiency. Trends visually displays how many people are working per hour, what job they are facilitating, and the revenue generated per hour. Monitoring Intrusion Data. Trends provides intrusion data, which shows in a very simple display when stores are opened and closed, deliveries are made, cleaning is done, and whether the store is being remotely armed and disarmed. Tracking Cash. Panda Express can track currency, how much is in the safe and when it was last counted, as well as petty cash spend along with scanned receipts for purchases. Custom Dashboards. The system provides an array of dashboards for all levels in the organisation that give an at-a-glance or drilled-down overview of an employee’s priorities and responsibilities. “At Panda, safety and loss prevention are key priorities in executing great operations,” said Lyle Forcum, executive director of asset protection at Panda Express. “We worked with 3xLOGIC and Interface for over a year to implement a highly-customised solution to meet these priorities. Now, we have a cutting-edge tool deployed across the entire enterprise that we can all be proud of.”
Cherokee Nation Entertainment (CNE) is the gaming and hospitality arm of the Cherokee Nation, operating multiple casinos and hotels across northeast Oklahoma, USA, including the prestigious Hard Rock Hotel & Casino Tulsa. Concerned that their security team was spending an overly large number of person-hours reviewing video recordings searching for a single person of interest, CNE sought to reduce the time it took to review security footage, so their security team could remain focused on proactive tasks, and optimise their day-to-day efficiency. CNE also wanted to obtain and assess accurate data on occupancy and visitor trends for business intelligence purposes. Furthermore, CNE wanted to be alerted to security-related events in real-time, in order to handle security issues as they developed. savVi’s video surveillance solution CNE selected savVi, Agent Vi’s on premise video analytics solution, due to the wide range of video analytics capabilities that savVi offers. Over 1,000 savVi licenses were purchased, allowing cameras at CNE’s ten Oklahoma-based casinos to be enabled with different combinations of real-time event detection, video search and business intelligence capabilities. CNE utilises the video search capability most widely – to enable rapid search through the surveillance video to pinpoint events of interest – and therefore video search capabilities are enabled on the majority of cameras at the sites. Business intelligence capabilities are mostly deployed around the various gaming machines, and at entrance and exit points, to show traffic patterns and real-time people counts. Real-time event detection capabilities are used largely for the high-security areas to ensure that CNE’s security team is informed regarding situations, as they unfold. savVi is deployed through integration with a range of Axis network cameras, primarily the AXIS P3225 and Q3505 fixed cameras, the AXIS P5635, Q6044 and Q6045 PTZ cameras, and for outdoor vehicle search, the AXIS Q3708 fixed camera with three sensors. CNE uses Milestone XProtect Corporate Video Management System (VMS), which is fully and seamlessly integrated with savVi, a Milestone Certified Solution. savVi’s video search capabilities allow for verification of personal injury claims by customers who may be trying to defraud the casino savVi’s real-time event detection savVi’s video search capabilities are of considerable importance to CNE. There is a prevailing need for the casinos to be able to swiftly locate specific events within masses of footage (“incident remediation” as it is known within the entertainment industry). Among other things, this allows for verification of personal injury claims by customers who may be trying to defraud the casino. Previously, the security team’s time was heavily occupied by observing hours of footage in search of a specific person or incident. savVi now enables CNE to run the search automatically, allowing far more effective use of the operators’ time, and reduced search time from as much as 16 hours for a single search, down to a matter of minutes. savVi’s real-time event detection capabilities are primarily used by CNE to ensure a safer and more secure environment within the casino parking facilities. By immediately alerting to any suspicious event, such as people loitering or cars moving in an unauthorised direction, the security team can monitor events and act accordingly as they unfold. savVi’s heat mapping capabilities savVi also allows CNE to gather and analyse essential business intelligence data on occupancy and visitor trends. savVi delivers accurate headcounts, meaning that the security team is constantly aware of how many people are on-site and using the casino facilities. This provides essential knowledge in the case of an emergency where a facility might need to be evacuated, and also helps prevent over-crowding. By utilising savVi’s heat mapping capabilities, CNE has knowledge of which areas of the casino are more heavily populated, and at what times. CNE can then leverage the data collected in a number of ways, including negotiating leasing deals for externally-owned casino equipment and knowing which internal locations require heavier investment of machines and personnel. This puts CNE well ahead of its competitors, as it is one of, if not the, first gaming company to employ Business Intelligence through video analytics. SavVi’s deployment in CNE’s casinos is an endorsement of the great benefit that savVi’s video analytics capabilities" savVi’s video analytics capabilities “It was savVi’s swift and effective video search that caught CNE’s attention when searching for an enhanced security solution, in particular due to the automated query ability,” said Joshua Anderson, Director of Surveillance and Technology, Cherokee Nation Entertainment. “We have been extremely impressed with savVi’s capabilities and the quality of its performance, and fully expect savVi to increase efficiencies and provide true ROI which will have a major impact on the bottom line.” “Cherokee Nation Gaming Commission’s approval of savVi’s deployment in CNE’s casinos is an endorsement of the great benefit that savVi’s video analytics capabilities offer to gaming concerns,” commented AJ Frazer, VP Business Development, Agent Vi. “Having selected to deploy the full range of savVi video analytics functionalities, savVi offers CNE valuable insights into the activities and customer experience at their multiple sites, benefitting both CNE and their customers.”