Current security and hygiene-protocols require special measures for access to buildings and rooms. This can lead to bottlenecks especially when there are large numbers of people and poses special challenges for many companies. Protecting the health of employees, visitors and customers have a top priority. The risk of production downtime in the event of a quarantine measure is very high. Hygiene concepts reduce the risk of infection, but also tie up valuable human resources. Vital tasks of IRM...
Already established as a renowned provider of high-quality door closers, UNION has further strengthened its range with the launch of three dynamic new solutions. Innovative and properly certified, the three new door closers all bring incredible value to the market, by solving a number of critical challenges faced by installers to meet the needs of their customers. With the launch of the CE26V, SC-CE3F and CE4F-E, UNION now meets almost every door closer requirement - whether for light or heavy...
Safeture announced a partnership with Sweden-based Safehotels to provide users of Safeture’s software platform with flagged locations of certified hotels around the world. Safety and security Since 2001, Safehotels independently verifies world-class standards of safety, security and now COVID hygiene for business, conference and leisure hotels, with certified hotels in over 170 cities and more than 65 countries. The certification standard consists of over 270 safety and security element...
ASSA ABLOY Door Group, a unit of ASSA ABLOY Opening Solutions UK & Ireland, leads the way with its range of high-performance timber doors for the public, commercial & high-end residential market. Fire door quality Fire Door Safety Week reported 60% of local authorities experienced delays in their fire door programmes, leaving safety to chance and impacting over 16,500 fire doors recently. With local authorities still playing catch-up from these delays, it is vitally important for buil...
With the ever-changing post coronavirus world, the ability to communicate virtually has never been more important. This is why ASSA ABLOY Opening Solutions UK & Ireland is improving its customer experience and launching the ASSA ABLOY Customer Support app. Free to download on Apple and Android mobile devices, the app enables customers to quickly and conveniently contact the right customer service team within ASSA ABLOY in the UK. The app provides customers with remote technical produc...
New research has found that nearly half (49%) of urban design professionals believe that the recent rise of pedestrianisation in city and town centres is making public spaces more vulnerable to attack. The coronavirus pandemic has had a devastating impact on urban economies, with local authorities left in the novel position of needing to find ways to encourage people back into city centres. Temporary pedestrianisation of key locations has suddenly become commonplace as a result, offering an eff...
IT and security systems integrators across the Middle East and Africa can now deliver more efficient, off-the-shelf integration of complete corporate systems - including access control, visitor management, security and building management - following a distribution agreement between Quanika and NIT, an Ingram Micro Company. Quanika’s modular, ready-made approach is designed to make integration straightforward, even for the most complex, multi-site projects, enabling organisations to adapt their on-site operations quickly to meet rapidly changing circumstances, and run them efficiently from a single interface. A1001 and A1601 controllers The company works with systems integrators, consultants, and end-user enterprises globally to leverage seamless integration with Axis Communications’ A1001 and A1601 controllers for unlimited doors and users, network cameras and audio devices. Quanika also allows integrators to scale up AXIS Camera Station VMS to encompass more cameras and cover multiple sites as well as giving them the extensibility choice of Milestone’s powerful XProtect for video management. Quanika’s portfolio of solutions is designed to eliminate the inefficiencies of siloed solutions Quanika’s portfolio of solutions is designed to eliminate the inefficiencies of siloed solutions to enable more productive connections between people, physical infrastructure, and corporate systems. Quanika Compact is a practical and affordable choice for small-to-medium applications in healthcare, retail, manufacturing, logistics and similar locations, giving users the ability to tie together and flexibly manage multiple sites. Visitor management solution Quanika Enterprise is designed for larger scale facilities and corporate enterprises, including multi-purpose buildings, hotels, transportation hubs, hospitals, and universities, giving organisations complete control and situational awareness across their entire estates globally. The Quanika VisitorPoint visitor management solution streamlines and automates operations. Delivering a frictionless and contactless experience, Quanika VisitorPoint is becoming essential during the COVID-era to minimise interaction and risks to frontline staff and reduce contact with doors and surfaces, while acting as a force multiplier for the efficient management, control and tracking of visitors and contractors access and movements throughout facilities. Building management systems As well as providing new technology application routes for security systems integrators, the distribution agreement opens up extensive project options for NIT’s customer base of IT systems integrators, allowing them to deliver modular, commerical off-the-shelf (COTS) security and safety solutions with an extensive choice of third-party systems - everything from intruder alarms, fire, and building management systems to individual, operations-specific business management databases, systems, or devices. Welcoming the deal, Bassel Al Fakir, Managing Director NIT, an Ingram Micro Company, said that Quanika’s solutions are expected to make it easier for NIT customers to deliver solutions with a single, intuitive, security and safety management interface. Integrators and consultants Our customers will be able to use Quanika’s off-the-shelf solutions and 24/7 support to integrate best-in-class technologies" “NIT’s distribution agreement with Quanika will provide major opportunities for ICT integrators and consultants across the Middle East and Africa,” he said. “Our customers will be able to use Quanika’s off-the-shelf solutions and 24/7 support to integrate best-in-class technologies and deliver new levels of insight and control.” Quanika Managing Director, Leo Cook, said the agreement would also help integrators and their customers improve operational efficiency and meet the unprecedented challenges now facing them. Seamless operational efficiency “It’s never been more important for organisations to be able to manage their operations efficiently, and to let their people to work safely, flexibly and securely,” he said. “Quanika is already helping customers globally to meet today’s rapidly evolving challenges." "We are helping organisations to pivot their operations, including managing their people and networks more efficiently, and improving the way they use their buildings. We now look forward to working with NIT customers across the region to deliver seamless, advanced solutions here.”
Similar to a human fingerprint, every vehicle has its own unique identity - a "fingerprint" unlike any other car or truck in the world. UVeye, a renowned developer of vehicle threat-detection systems for the security industry, is introducing technology that can create a virtual "fingerprint" for any vehicle after a UVeye underbody scan. The company will host a free SIA (Security Industry Association) webinar on "How to Fingerprint Vehicles Using Computer Vision" at 12:00 p.m. EDT. The company's CEO Amir Hever and Chief Marketing Officer Yaron Saghiv plan to discuss how computer-learning and artificial-intelligence technology can be used to identify vehicle fraud and security threats based on underbody scans. Digital fingerprints "A vehicle with stolen licence plates, for example, could easily be identified in the future with a UVeye underbody scan," Hever notes. "We'll also be discussing how digital fingerprints can be used at data centres, correctional facilities, airports, border crossings, hotel entrances and seaports to name just a few potential use cases." The company earlier this year introduced UV Inspect-technology that for the first time can instantly identify bombs, weapons, drugs and other security threats concealed in the undercarriage of new or unfamiliar vehicles. Threat-detection systems First introduced in 2016, UVeye undercarriage threat-detection systems can scan vehicles traveling up to 25 mph The company's mobile and stationary Helios underbody scanning systems when equipped with UV Inspect software now can provide law enforcement agencies and security professionals with the ability to automatically pinpoint threats on vehicles that are not in security databases, offering an entirely new level of protection. UVeye's Helios inspection systems currently are deployed at hundreds of high-security locations throughout the world and have generated millions of vehicle scans. The company's proprietary algorithms, cloud architecture, sensor fusion, artificial intelligence and machine-learning technologies complete necessary vehicle checks within seconds. First introduced in 2016, UVeye undercarriage threat-detection systems can scan vehicles travelling up to 25 mph (35 km/h), helping to improve traffic flow at check points and border crossings even under extreme weather conditions. Licence plate recognition Stationary Helios systems utilise five high-resolution multi-directional cameras, which work under extreme weather conditions, support single and multi-lane traffic configurations and can support vehicle weights of up to 20 tons per axle. In addition to Helios and UV Inspect, the company's arsenal of detection technologies includes UV Compare, a deep-learning system that monitors traffic trends to identify changes that might signal safety concerns and licence plate recognition (LPR) software to assist with vehicle fingerprinting.
The Safe Passage Module now available as part of the Connect ONE cloud-hosted platform from Connected Technologies is a framework for a one-time or periodic self-approval process for facility access control. Perfect for back-to-work strategies during the pandemic or to ensure health and safety compliance, it provides an automated self-attestation method to ensure a user is safe to be at the site. The Safe Passage Mobile Badge displays the current access status of the user with the words Approved (green); Expired (orange); and Declined (red) so management can verify their credentials at a glance. At construction sites, for example, management knows immediately upon viewing a contractor’s Safe Passage credential if they have satisfied requirements to ensure they aren’t sick or in contact with someone with COVID-19. Multiple profile templates In addition, 24-hour fitness centers along with multi-tenant, hotel and hospitality vertical markets can use Safe Passage to ascertain users have signed waivers necessary for workouts; it can also query visitors regarding their potential exposure to the contagion and add other necessary documentation workflows for access approval. Safe Passage, accessed through the Connect ONE interface, allows administrators to create multiple profile templates, each customised to the user and their level(s) and area(s) of access within the facility. Templates can establish specific options, such as checkpoints, protected areas, approval and re-approval processes, custom messages and other requirements or documentation necessary for entry. The ability to create multiple templates provides multifold benefit to the user. Alternate door trigger Administrators may apply Safe Passage to targeted areas only - while permitting general access to user In an industrial setting Safe Passage ensures the user has completed necessary safety training required to enter a hazardous location; in other areas of the facility their access could be contingent on following mandated health records or other prerequisites. A checkpoint option means facility access must be at a designated area and requires passing an additional condition such as a temperature scan. Users who try to enter an alternate door trigger an immediate violation to the administrator or management via email, text message or push notification. Administrators may apply Safe Passage to targeted areas only - while permitting general access to the user as required. All documents, approvals and statuses are applied and stored to each user profile. Critical environmental monitoring Connect ONE, an award-winning service and management platform from Connected Technologies, continues to add critical services tailored to the security dealer and custom integration installer. The integrated security management solution uses one user interface to control intrusion, access control, video surveillance, critical environmental monitoring and energy management. Connect ONE integrates with pioneering security and access control panel manufacturer’s products and many video surveillance platforms.
Systems consultants and end-users who want to use products from Axis Communications now have a choice of easy, off-the-shelf options, following a distribution agreement between Ingram Micro and Quanika. Quanika’s latest portfolio of software solutions, already being used in the NHS and at major distribution and manufacturing sites, is designed to make integration more straightforward. The company’s modular, ready-made approach means that it is now simple to deploy Axis Communications’ full range of network cameras, video management software, access control, and audio products into any system, of any size, from stand-alone sites to multi-location projects. Integration of third-party systems Quanika’s seamless technology range – which includes Quanika Compact, Quanika Enterprise, and Quanika VisitorPoint - also allows an extensive choice of third-party systems to be integrated. This can include everything from intruder alarms, fire, and building management systems to individual, operations-specific business management databases, systems, or devices. As well as providing new integration routes for security systems integrators, the distribution agreement with Quanika opens up extensive project options for Ingram Micro’s customer base of ICT systems integrators, allowing them to deliver modular, off-the-shelf security solutions using Axis Communications’ highly regarded security products for the first time. Security and safety management interface This development is so important because it will unlock new opportunities for ICT integrators and consultants" Welcoming the deal, Raj Pandya, Director Specialty Solutions, Ingram Micro, said that Quanika’s solutions would help customers with a wide range of applications, from small and medium scale projects up to enterprise-level, providing a single, intuitive, security and safety management interface. “This development is so important because it will unlock new opportunities for ICT integrators and consultants,” he said. “For the first time it allows Ingram Micro customers to bring together best-in-class video, access and security products from Axis Communications, as part of a complete integrated system, under the easy, off-the-shelf Quanika umbrella.” Operational efficiency Quanika Compact is a practical and affordable choice for small-to-medium applications in healthcare, retail, manufacturing, logistics and similar locations, giving users the ability to tie together and flexibly manage multiple sites. Quanika Enterprise is designed for larger-scale facilities and corporate enterprises, including multi-purpose buildings, hotels, transportation hubs, hospitals, and universities, giving organisations complete control and situational awareness across their entire estates globally. And the Quanika VisitorPoint visitor management solution streamlines and automates reception operations, and delivers significant operational efficiency by eliminating manual tasks. Integrated solutions “The ready availability of Quanika solutions from Ingram Micro will be welcome news for all those who want the choice to use Axis Communications’ highly regarded hardware as part of their integrated solutions,” says Quanika European sales director, Phil Campbell. “In short, this opens up exciting new options for systems consultants, integrators and their customers.”
In the current landscape where reduced touch-points and low operating costs are nothing short of paramount, security expert Mul-T-Lock is offering a tailored access control solution to all hotel, holiday park and short-break property owners. SMARTair® is a modular and fully scalable access control system that offers an intelligent, yet simple, step up from keys. For hotels and home rental properties in particular, SMARTair® will replace inconvenient keys with a wireless locking system operated by smartcards and even smartphones when used in conjunction with Mul-T-Lock’s Openow™ app. Leisure and tourism industry solution With so many businesses in the leisure and tourism industry needing to cut operational costs and provide a safe and hygienic service to customers, SMARTair® does away with the need for manned receptions and touchscreens by putting the onus of checking in right in guests’ hands, with security still being closely monitored and operated by system managers. With SMARTair®, lost cards can be cancelled and replacement cards reprogrammed for increased guest security. The system can be tailored to meet each building’s needs and can be reprogrammed using the latest in access control management software as those needs evolve, without having to replace any physical locking systems – making it a cost-effective and straightforward solution for all hospitality venues. Monitor and control access rights With no hardwiring, the system can be installed at low cost with minimal disruption to a business. Designated system managers can also monitor and control access rights – allowing guests access when needed and revoking access once they check-out. The SMARTair® product portfolio also includes energy-saving devices for mounting on guest room walls and in-room safes. By utilising the Openow™ app, business owners, facilities managers and security administrators can instantly send, revoke or update virtual keys from the designated SMARTair® software or web browser allowing guests to access properties and rooms via their smartphone. System managers can be anywhere in the world when controlling access rights; making the whole process more convenient and secure for everyone. This also significantly reduces whole life costing, as it removes the need to replace key cards when they are lost or accidentally taken home by guests. Virtual keys mobile access An added bonus, Openow™ makes it easy for business owners to organise virtual keys inside the app, check how long they are valid, and protect them further with an individual PIN. If they have virtual keys from multiple sites or premises, Openow™ easily handles those too, with no time wasted wondering where key cards were left and no more appointments to pick them up or have them revalidated. Mul-T-Lock’s SMARTair® system with Openow™ app is the perfect solution for hotels and holiday parks with a high volume of visitors and subcontractors. It is built for businesses where third-party contractors are always on-site, hospitality venues that offer rooms for hire and boutique hotels or home rental with no manned receptions.
A hotel environment is fast-paced and ever-changing, with staff and guests coming and going 24 hours a day. Despite this, it is a business owner’s job to ensure that the building - and everyone in it - is safe and secure. CLIQ® technology from security provider Mul-T-Lock offers a smart security solution for all types of hotels, resorts, holiday parks, B&Bs and short-break properties. eCLIQ for hotel chains and resorts Mul-T-Lock’s eCLIQ access control system utilises CLIQ® technology to allow hotel chains and holiday park resorts to manage access permissions remotely, from one central location, anywhere in the world. This includes the ability to schedule individual access permissions for each key, as well as to provide time-limited access. This is ideal for hotel chains with complex access and security requirements, as it allows tailored access for members of staff who may be coming and going at various times of the day, and also enables administrators to grant time-limited access to contractors and delivery drivers. If a key is lost or a member of staff leaves, access can also be revoked, which is particularly useful for chains and parks with a high staff turnover, or those that employ seasonal staff for busier times of the year. This not only offers enhanced security but also significantly reduces whole life costing, as it removes the need to replace physical locks; and keys can be validated daily, weekly or monthly to keep them continuously secure. The system’s audit trail capabilities also allow business owners to access comprehensive data Access Data can be used for audit The system’s audit trail capabilities also allow business owners to access comprehensive data illustrating who accesses which lock and when; ideal for those who are concerned about staff shrinkage or those who want to determine who should have access to certain assets. Working on a modular system, eCLIQ locks are quick and easy to install with no cabling required. Not only is maintenance not required for up to 200,000 cycles, but key batteries are also fast and easy to replace once every 30,000 operations, at a nominal cost to the business, with no need for specialist tools. CLIQ Go for B&Bs and short-break properties Just one key can access doors, cupboards, elevators, machines and many other locking devices With short-break properties, access is needed by a variety of personnel who all have their own individual requirements. Business owners, delivery drivers, cleaning staff and of course guests themselves, are just a few examples of people who each require specific access permissions. Mul-T-Lock’s CLIQ Go access control system allows small to medium-sized short-break property owners to remotely manage security ‘on the go’. It boasts all the benefits of eCLIQ, but can be managed by a designated administrator via the CLIQ Go app. This includes the ability to schedule individual access permissions for each key, provide time-limited access, and revoke access to particular keys as and when needed - making it particularly useful for properties that have a constant turnover of guests. One key for multiple access devices The high security locks are easy to configure, are suitable for all door types and can be easily fitted by a local locksmith. With no cabling, the cylinders can be retrofit to existing doors without causing any mess or disruption. All eCLIQ cylinders are suitable for a number of different applications, from drawers and cabinets housing confidential documents to all-weather padlocks for exterior gates. In fact, just one key can access doors, cupboards, elevators, machines and many other locking devices.
You are not alone: operators everywhere are asking themselves what are they going to do? How are they going to get back to business, and fast? How are they going to cost-effectively operate with all the new safety requirements that have arisen as a result of COVID? How are they going to ensure it all gets done for the safety of customers and staff? How are they going to protect their brand from the negative exposure of being identified as a property with a reputation for COVID? The economic impact of COVID is expected to hit brick and mortar businesses the worst, as their businesses are dependent on people being physically present. According to a recent report by RBC, it is estimated that 70% of Americans expect to avoid public spaces, 57% of Canadians will be unwilling to attend conferences without a vaccine and 63% of people will prefer to drive vs fly. This means, that for those of you in the business of travel, conferences, co-working spaces, retail stores, museums, art galleries, restaurants, sports arenas, hotels, cruises, airlines, resorts, theme parks, long-term care, education, etc. in the blink of an eye your approach to on-site safety just changed. To ensure your property is safe and secure, it is no longer just about access control, video surveillance and intruder alarms; it is also about sanitisation To get back to business and operating at full capacity after COVID, operations must find a way to eliminate the fear, uncertainty and doubt in the minds of their customers and employees. The affect of COVID-19 on safety and security To safely get back to business, the Centers of Disease Control and Prevention (CDC) emphasis that all operations need a pandemic response planJust like cybersecurity has had a direct impact on the IT strategy and budget, COVID will have a direct hit on the operations strategy and budget. To ensure your property is safe and secure, it is no longer just about access control, video surveillance and intruder alarms; it is also about sanitisation, the lines between the security and maintenance just blurred. From customers, to employees, to government regulators, to management, the focus is now on operations and the sanitisation policies, procedures and actions of the team. To put this change of priority into perspective, six months ago, sanitisation was not top of mind for people. Why, because it was not a life or death issue, we had other first world problems to garner our attention. From an operations perspective if we enabled a sanitisation issue to become significant enough to impact the safety of customers and staff and therefore the brand, then that was an operational choice versus a mistake. Standards for sanitisation Just like cybersecurity has had a direct impact on the IT strategy and budget, COVID will have a direct hit on the operations strategy and budgetThe issue is, today while the operating priority of sanitisation has significantly increased, it is not measured and managed to the same standard as the other safety and security concerns across a business. Also, important to consider, while people may not hold an operation liable during this first wave, we can guarantee they are not going to be as understanding during the second wave or a future pandemic. To safely get back to business, the Centers of Disease Control and Prevention (CDC) and the Occupational Health and Safety regulators emphasis that all operations need a pandemic response plan and should follow these simple guidelines: Develop your plan Implement your plan Maintain and revise your plan While this sounds simple enough, keep in mind that requirements are constantly evolving and will continue to do so for the foreseeable future, or at least until all the research is in. To create an emergency response plan for a pandemic, properties must first determine what needs to be sanitised. The current requirements dictate that most surfaces and objects will just need a normal routine cleaning, it is only the frequently touched surfaces and objects like light switches and COVID has changed the game and made the digital transformation of operating procedures not a ‘nice-to-have’ but a must-havedoorknobs that will need to be cleaned and then disinfected to further reduce the risk of germs on surfaces and objects. The challenge is when you step back and consider what people touch in a day; the list quickly grows. After only 30 minutes, I easily came up with a list of over 60 items that one could call ‘high touch’! If you think about it, the list is extensive; telephones, doorknobs, drawer handles, counters, pens, keypads, computers, etc. and the list is only going to get longer as the research comes in. The challenge is when you step back and consider what people touch in a day; the list quickly grows Operating efficiency If we don’t change our ways, not only will we be doomed to continue making the same mistakes, but we will continue to be lost in paper and filing cabinetsTo scope the impact on operations as part of the plan, we must then find and identify all of those high touch things across the property. If we then combine that with the fact that CDC requires that all high touch locations must not only be cleaned more often, but that they also require that each location is first cleaned with soap and water, and then disinfected for one minute before finally being wiped down. This means a one-minute task just turned into a 4-minute task, that must now be completed multiple times a day. From a resourcing perspective this adds up quickly, and operating efficiency must be a priority. Not to mention it is going to get very complicated to measure and manage especially. Post COVID rules Getting back to business is going to be complicated; lots to do, lots of moving parts and no technology to help. The fundamental challenge to keep in mind is not that the sanitisation requirements have evolved, the real issue is that for most businesses this area has been left unchanged for generations. Still today most rely on checklists, logbooks and inspections to manage the responsibilities of our front-line workers, which might have been fine before COVID. Post-COVID the rules have changed and so should the approach to managing physical operating compliance on the front lines. COVID like most physical operating requirements is tactical, detailed and specific; broad strokes, the honor system and inspections are not going to cut it. The digital transformation COVID has changed the game and made the digital transformation of operating procedures not a ‘nice-to-have’ but a must-have. If we don’t change our ways, not only will we be doomed to continue making the same mistakes, but we will continue to be lost in paper, filing cabinets filled with checklists, never to be seen again. Only with the right data can we significantly improve the operational decisions necessary to accelerate our return to full operating capacity. At the end of the day, to fully recover, operations must eliminate the fear, uncertainty and doubt in the minds of customers and employees, only then can we really get back to business.
Surveillance systems can track the locations of mobile phone users and spy on their calls, texts and data streams. The Washington Post has reported on such systems that are being turned against travellers around the world, according to security experts and U.S. officials. The summer season highlights the need to take extra precautions when travelling. When travelling anywhere in the world, for business or pleasure, citizens need to be aware of and alert to looming physical and cybersecurity threats. To elaborate on expert security tips, strategies and advice for traveling this summer, we presented several questions to The Chertoff Group, a global security advisory firm that enables clients to navigate changes in security risk, technology and policy. Chris Duvall, Senior Director at The Chertoff Group, offers insights into cybersecurity concerns, physical security precautions, and recommends digital resources/apps for consumers while traveling. Q: How are security risks – physical and digital – changing? Why are threats greater today than five years ago? The exponential number of headlines over the past few years is a strong indication that both physical and digital risks are evolving and increasing Duvall: The exponential number of headlines over the past few years is a strong indication that both physical and digital risks are evolving and increasing. The scope, severity and complexity of physical and cyber risks are increasing and becoming more dangerous and destructive. This is especially true for those travelling outside the U.S. On the physical side, threat actors are actively seeking “soft targets” – public events, social settings, mass audience venues, etc. – to communicate their message, sow chaos and inflict catastrophic harm. On the digital or cyber side, we have seen a shift from “thrill hacking,” to an increase of “hacking as a business” (through credential compromise and ransomware), to an increase in “hacking for harm” - with the rise of “nuke ware” and ransomware without a clear financial motivation. Q. What specific precautions should a traveller take to protect their calls, texts and data streams from being spied on? Duvall: When travelling abroad, we recommend to our clients that their personnel and executives should practice good internet and social media hygiene. Some best practices include: Avoid using public Wi-Fi services—unless you use private VPN service for encryption Increase the privacy setting on your technical devices Disable location identifiers on apps Create a new (unlinked) email for internet correspondence Consider purchasing international MyFi devices to decrease the risk of getting your personal identification information (PII) or protected healthcare information (PHI) stolen Use temporary (i.e. burner) phones to protect your data and your contacts Q. What cybersecurity concerns are likely to impact travellers? Are the threats greater outside the United States or in any specific parts of the world? Significant precautions should be taken to protect personal electronic devices (PEDs) and the data connected to PEDs Duvall: The international cybersecurity landscape has grown increasingly dynamic, with threats posed by government authorities (in some countries), terrorists, insurgents, and criminals, requiring travelers to be proactive and vigilant. U.S. citizens, particularly executives of U.S.-based technology companies, must be aware that they are considered high-value targets for nation-state intelligence services and criminally-motivated bad actors. Many countries will go to great lengths and expense to acquire and exploit proprietary information from U.S.-based companies, and views U.S. executives visiting the country as “soft” targets of opportunity. As such, significant precautions should be taken to protect personal electronic devices (PEDs) and the data connected to PEDs. The tactics, techniques and procedures (TTPs) utilised by bad actors are often covert and nearly undetectable by the affected person. Threat actors routinely access, monitor and utilise Wi-Fi networks at hotels and in public spaces to compromise target devices. Other targeting methods include luggage searches, extensive questioning, and unnecessary inspection and downloading of information from personal electronic devices. There are numerous, high-risk countries for which the U.S. Government warns travellers to be wary of mobile malware, mobile device privacy attacks and hot spots for mobile botnets. The U.S. Department of State has the most recent and up-to-date list. For example, the U.S. Government has investigated numerous incidents in which U.S. travellers’ PEDs (personal and company devices) have been compromised by Russian authorities while transiting Russian airports, left unattended in public spaces and in travellers’ hotel rooms. When travelling to an unfamiliar place, research your destination to understand the local roads and transportation, geography, local roads, culture, etiquette and laws Q: What physical security precautions should a traveller take? Duvall: Here are some useful precautions: When traveling to an unfamiliar place, research your destination to understand the local roads and transportation, geography, local roads, culture, etiquette and laws. Protect your personal information and travel itinerary as much as possible. Limit the amount of jewelry worn, cash, credit cards and electronic devices carried while traveling. Avoid staying on the ground floor of a hotel. Consider choosing a room on the 2nd through 7th floors as these rooms may be more difficult to break into than those on the ground level, but still able to be accessed by fire/emergency response equipment. Never answer your hotel room door for anyone until you’ve determined who they are, why they are at your door, and if it is necessary for you to open the door to interact with them. Carry a rubber door stop/wedge with you to install on the room side of the door before you go to bed. Vary your patterns and routines when venturing out in to a new location, do not become predictable. Politely decline offers of food or drink from strangers (If you do accept beverages, ensure that they are in sealed containers and that there is no evidence of tampering). Never discuss your itinerary, personal, business or other sensitive information where others can hear you. Q: How can companies be proactive in protecting their business travellers? Companies should educate their employees on the importance of maintaining good internet hygiene while travelling abroad Duvall: When travelling on business, companies should provide their employees with clean computers and cell phones before departure. Upon return, the company should immediately wipe the computer clean to prevent any malicious threats from penetrating the company’s internal, cyber-infrastructure. Additionally, companies should educate their employees on the importance of maintaining good internet hygiene and recommend their employees disconnect from social media platforms while travelling abroad. Some general tips to recommend to your employees when travelling abroad include: Register in the Smart Traveler Enrollment Program (https://step.state.gov/step/) Visit Travel.State.Gov to view travel related information specific to the country or countries you’re visiting, including local US Embassy or Consulate contact information, as well as current travel advisories and alerts. Always leave a copy of your transportation and hotel itinerary and driver’s license (or passport if travelling internationally) with a family member or trusted friend. Always use a baggage tag with a protective cover Avoid using public Wi-Fi services Q: What digital resources and/or apps might a traveller benefit from (and how)? Duvall: The Chertoff Group recommends researching the below travel-related apps before departing on a trip: TravWell: This app provides destination-specific vaccine recommendations, a checklist of what you need to do to prepare for travel, and a customisable healthy travel packing list. The app can store travel documents, keep records of medications and immunisations, and set reminders to get vaccine booster doses or take medicines. My TSA: This app provides real-time updates on airport delays. It includes how long security lines are at various airports; information about what you can and cannot bring onto an airplane; and a frequently-asked question list, including new advanced imaging technology. Border Wait Time: The app provides estimated wait times and open-lane status at land ports of entry, which may be particularly helpful when in an area with multiple crossings. Mobile Pass: The Mobile Passport app speeds you through U.S. Customs and Border Protection at (1) cruise port and (24) airports Q: As a security expert, what’s your best advice for travellers? Duvall: At the end of the day, travel security is not rocket science. Simply put, travellers need to: Be aware and situationally alert at all times. Be aware and situationally alert to the location of your luggage and carry-ons at all times. Don’t access unknown, unsecured or public Wi-Fi if at all possible. Turn off “auto connect” features and institute stringent privacy controls as much as possible. Try to “blend in” – you don’t have to try to look like a local but travellers should avoid gaudy and expensive attire wherever possible. Use your common sense – if an offer, invitation or opportunity seems to good to be true... it probably is.
The optical speed lane and turnstile sector of the security market has had a very busy 2017. Growth in commercial construction has provided more opportunity. Innovations in technology have given speed lane manufacturers an opportunity to deliver a better product. Orion sales increase and company growth Orion Entrance Control, Inc., had a great 2017 as sales increased and our company grew. We attribute our success to the unique approach we have taken since day one: providing customised products that offer customers more than a “one-size-fits-all” solution. We offer the line of turnstiles that you would expect from any reputable manufacturer in the marketplace, but we know that when dealing with lobby security or entrance control, one size definitely does not fit all. By providing various options to supplement our core line, we give our customers a solution that best suits their needs.The ability for security technologies and their manufacturers to work together is becoming increasingly more important to our customers One area that we will continue to build upon in the development of our products is in technology integrations. The ability for security technologies and their manufacturers to work together is becoming increasingly more important to our customers. The manufacturers that can future proof their products to allow the addition of new technologies and to protect a client’s investment from obsolescence will be the big winners in 2018 and beyond. Integration in entrance control Orion ECI’s products are built with technology and designs that have this vision for the future. For example, we work with the leaders in biometrics and Point of Sale (POS) solutions to integrate these systems into our entrance control products. Oftentimes, with just a wave of the hand or the right credential, approved users can enter with no hassle or even ring up a purchase. From a business standpoint, Orion ECI experienced a year of continued process improvement and design in 2017. We reached record sales revenues as we continued to receive orders from our existing enterprise clients and new customers. For 2018, we plan to add personnel in key growth areas. This will include additional inside and outside sales positions and product production and engineering roles.
Simultaneous suicide bombings at several churches and hotels in Sri Lanka on April 21 were of a scale, sophistication and level of coordination that hasn’t been seen since 9/11. Nine suicide bombers targeted three churches and three hotels on Easter morning, and the resulting casualties numbered 359 dead, including 45 children, and about 500 injured. The complexity of the attacks suggests the bombers received help from an outside organisation, likely the Islamic State (IS). Sadly, security warnings from Indian intelligence officials, which might have helped to prevent or minimise the attacks, were ignored by Sri Lanka security weeks earlier. In the wake of the massacre, two of Sri Lanka’s top security officials were asked to resign, and Sri Lanka’s president promised to completely restructure state security. Contradiction to the terrorism report The twin calamities provide a dramatic counterpoint to an observed global decrease in terrorist attacksA motivation for the Sri Lanka tragedy is thought to be the March 15 shootings at two mosques in Christchurch, New Zealand, where 50 people were killed and 50 more were injured. A 28-year-old Australian white supremacist was arrested and charged with murder. Taken together, the twin calamities provide a dramatic counterpoint to an observed global decrease in terrorist attacks, as documented in a recent report. The suicide bombers in Sri Lanka were eight men and one woman, most of them well-educated and coming from the middle or upper class. One was the leader of National Thowheeth Jamaath, the homegrown militant Islamist group the government has blamed with carrying out the attacks. There is also evidence to corroborate a claim of responsibility by IS. Some 60 people have been arrested in the investigation. Even days later, police continued to find explosives and said there was still danger. Multiple attacks One explosion on Easter morning occurred at St. Sebastian’s Church in Negombo, 20 miles north of Colombo, where more than 100 were killed. Another bomb killed 28 people at the Zion Church in Batticaloa, and an unknown number died at St. Anthony’s Shrine, a Roman Catholic church in Colombo. The three hotels that were attacked were all in Colombo – the Shangri-La, the Cinnamon Grand and the Kingsbury The three hotels that were attacked were all in Colombo – the Shangri-La, the Cinnamon Grand and the Kingsbury. Two more explosions happened Sunday afternoon, one at a small guest house and another at the suspects’ safe house, where three officers were killed. Security at houses of worship has been a high-profile concern in the United States in recent years following incidents such as an attack at Emanuel African Methodist Episcopal (AME) Church in downtown Charleston in 2015 that killed nine people. Just last October, 11 people were killed and six others injured in a shooting at a synagogue in Pittsburgh. Hardening security at churches “It’s no longer enough to pray for a safe and secure environment,” commented Patrick Fiel of PVF Security Consulting in an Expert Panel Roundtable discussion. “Churches are soft targets. Clergy and parishioners will need to work closely with security consultants and local law enforcement to harden their facilities.” Access control, CCTV solutions and mass notification systems are all helpful and can be placed unobtrusively so as not to interfere with aesthetics of the church, Fiel adds. The scale and scope of the bombings in Sri Lanka provide a wakeup call to the global likelihood of terrorist attacksIt doesn’t appear technology would have made much difference in the case of the Sri Lanka attacks, although awareness and vigilance can have an impact. At Zion Church in Batticaloa, for example, a bomber was stopped by pastors from entering the congregation area where some 500 people gathered. Because of their suspicions, the bomb was instead detonated in a courtyard where children were eating breakfast; 28 people died. The scale and scope of the bombings in Sri Lanka provide a dramatic wakeup call to the continuing global likelihood of terrorist attacks. The last territory of the Islamic State in Syria fell in March, but IS and its ideology live on, and continue to be a global terrorism threat. And that’s just one among many possible sources of terrorism worldwide. Hopefully, the recent incidents do not foreshadow more attacks that are even more deadly.
The 2018 FIFA World Cup tournament is bringing 32 national teams and more than 400,000 foreign football fans from all over the world to 12 venues in 11 cities in Russia. Fans are crowding into cities including Moscow, St. Petersburg and Kazan. Given continuing global concerns about terrorism, security is top-of-mind. Protection of the World Cup games in Russia is focusing on an “integrated safety, security and service approach,” according to officials. Combining the term “security” with the terms “safety” and “service” is not an accident. An aggressive security stance is necessary, but at the end of the day, fan safety is paramount, and a service-oriented approach ensures a positive fan experience. Medical responders will be working side-by-side with police and antiterrorism personnel. Risk management best practices We asked Sean T. Horner and Ben Joelson, directors of the Chertoff Group, a global advisory firm focused on best practices in security and risk management, to comment on security at FIFA World Cup 2018. Although not involved in securing the 2018 World Cup, the Chertoff Group is experienced at securing large events and enterprises using risk management, business practices and security. Integration is another important aspect of protecting the games, says Horner. The use of multiple resources, including Russian military, intelligence and law enforcement, will be closely integrated to provide the best security for the large-scale event in each of the host cities, he says. The approach will be centralised and flexible, with resource deployment guided by effective situational awareness. Primary security and emergency operations centres will be dispersed throughout each host city “There is a unified command structure at the Russian Federation level, and they will keep resources in reserve and shift them as needed to various events and venues based on any specific intelligence, in effect deploying resources where threats are greatest,” says Joelson. “There will also be some regional commands, and resources will incorporate a spectrum of police and military personnel ranging from the ‘cop on the beat’ to the Spetsnaz, the Russian ‘special forces'.” Primary security and emergency operations centres will be dispersed throughout each host city, and additional forces can be shifted as necessary, he notes. Role of law enforcement In Russia, the lines of separation between law enforcement and the military are not as stark as in the United States, for example, where military forces are restricted from deployment for domestic law enforcement by the Posse Comitatus Act. In Russia, there is no such restriction. A broad range of technology will play a role at the World Cup, Horner and Joelson agree. Technology will be used primarily as a force multiplier and a decision-support tool for security personnel. There are robust CCTV systems in many Russian cities, and mobile CCTV systems, such as camera towers or mobile security centres on wheels, will also be deployed. Technologies will include infrared cameras, flood lights, and ferromagnetic screening systems to scan hundreds of individuals as they walk by. In some locations, facial recognition systems will be used, tied into various intelligence, military and law enforcement databases of known bad actors. Behaviour analytics will be used as a decision-support tool. In addition to security in public areas, private CCTV systems in hotels, at transportation hubs, and inside the venues themselves will be leveraged. Video analytics and detection will help personnel review live view of people who may be acting suspiciously or who leave a bag unattended. In some locations, facial recognition systems will be used, tied into various intelligence, military and law enforcement databases of known bad actors Rigorous anti-terrorism measures A Fan ID card is required to enter the 2018 World Cup Tournament, even for Russian residents. The Russians have an aggressive stance against domestic terrorism, which will also help ensure the safety of the World Cup games, say Horner and Joelson. Terrorist group ISIS has promised “unprecedented violence” at the games, but they make similar threats at every major global event. Russia has been an active force disrupting ISIS in Syria, and experts suggest that losing ground geographically could lead to addition “asymmetric” terrorist attacks. However, Russia is leveraging all their intelligence resources to identify any plots and deploying their security apparatus to disrupt any planned attacks, experts say. Russia’s rigorous anti-terrorism measures include a total ban on planes and other flying devices (such as drones) around the stadiums hosting the World Cup. Private security In addition to military, intelligence and law enforcement personnel, private security will play a have a high profile during the 2018 World Cup in Russia. Private security personnel will be on the front lines in hotels and in “fan zones.” They will operate magnetometers at entrances, perform bag checks, enforce restrictions on hand-carried items, etc. Private security will be especially important to the “guest experience” aspects of protecting the games. Private security will be especially important to the “guest experience” aspects of protecting the games Another private security function at the World Cup is executive protection of dignitaries and high-net-worth individuals who will be attending. Executive protection professionals will arrive early, conduct advanced security assessments before VIPs arrive, and secure trusted and vetted transportation (including armoured cars in some cases.) VIPs will include both Russian citizens and foreign (including U.S.) dignitaries attending the games. Private security details will be out in force. Aggressive security approach Overeager and outspoken fans are a part of the football culture, but Russia will deploy a near-zero tolerance policy against hooliganism and riots. An overwhelming force presence will take an aggressive approach to curbing any civil disturbances, and offenders will be removed quickly by Russian security forces. Strict restrictions on the sale and consumption of alcohol will be enforced in the venue cities before and after the matches. Officials will also be cognisant of the possibility of a riot or other event being used as a distraction to draw attention from another area where a terrorist event is planned. It will be a delicate balance between deploying an aggressive security approach and preserving the fan experience. Joelson notes that freedom of speech is not as valued in Russia as in other parts of the world, so the scales will be even more tipped toward security. “The last thing they want is for things to get out of control,” says Horner. “The event is putting Russia on the world stage, and they want visitors to walk away safely after having a great time and wanting to go back in the future.” Attendees should also have good situational awareness, and keep their heads up, scanning crowds and identifying unsafe situations" Precautions for World Cup attendees Attendees to the World Cup in Russia should take some basic precautions, Horner and Joelson agree. For example, Russia requires a translated, notarised letter explaining any prescription drugs. The country has a more aggressive foreign intelligence environment, so visitors cannot depend on their data being private. Joelson recommends the usual “social media hygiene” and privacy settings. Visitors should not post information about their travel plans or locations, and it’s best to travel with a disposable mobile phone that does not contain personal information. Location tracking should be deactivated. Travellers should also beware of talking and sharing information with others, or of saying anything derogatory. “They should also have good situational awareness, and keep their heads up, scanning crowds and identifying unsafe situations,” says Joelson. “If you bring a personal electronic device, you should expect that it has been compromised,” says Horner. Text messages and email will not be private, and he suggests creating an email address used only for travel. Don’t leave drinks unattended. Travellers from the U.S. should register at the Smart Traveler Enrollment Program (STEP) operated by the U.S. State Department. “Plan before you travel and before you get to the airport,” says Horner.
The massacre in Las Vegas is both sadly familiar and terrifyingly novel. Because of the recent series of violent attacks on innocent people gathered in public places, high body counts are no longer unheard-of, although the 59 dead after the Las Vegas tragedy sets a depressing new record. These news stories have become so grimly commonplace as to dull our collective sensitivity to their shock. However, the modus operandi of the latest attack, apparently by a “lone wolf” – carefully planned and involving a stockpile of nearly two dozen guns gathered in a hotel room – prompts new soul-searching about how public events are secured, not to mention a re-evaluation of security in the hospitality sector. Public events at risk from attack The sniper attack from a 32nd-floor room at Mandalay Bay, overlooking 22,000 people attending a country music festival, has been compared to “shooting fish in a barrel.” When the bullets rained down, there was nowhere to hide. The attack came from outside the “perimeter” of the event, so any additional screening of attendees would not have prevented it. Such attacks are not unheard of, but to what extent might it have been foreseen in this instance? It’s a new concern to add to the mounting list of possible risks at public events, such as a car in the crowd or a bomb in a backpack. Add to the list a firearm assault from above. If security is supposed to protect against that which is reasonable and foreseeable, this tragedy clearly expands the list. Preventative measures for sniper attacks Certainly, there are measures that can prevent sniper attacks, such as police officer sharpshooters positioned on nearby rooftops scanning the windows of nearby buildings for potential threats. Such measures are routinely employed for high-security events such as a Presidential visit, but not generally for a country music concert. Should organisers of public events reevaluate the level of risk, now that the dangers have been demonstrated in a dramatic and deadly fashion? Broadly speaking, nearby buildings with lines-of-sight to public areas are a new security risk to be considered. Might public events need to be located somewhere else? What about parades down city streets, or Times Square at New Year’s Eve? New York’s Police Commissioner James O’Neill may have said it best: “We do understand that no city or town in this country is completely immune.” Security in hospitality sector The implication of the Las Vegas massacre for the hospitality industry is an additional issue. Hotels and resorts such as Mandalay Bay have not generally embraced technologies like the explosives scanners or X-ray machines used at airport terminals, at least not in the United States. Most hospitality companies keep their focus on things like limiting theft, controlling unruly guests, or keeping strangers from roaming the halls. In contrast, hotels in the Middle East and Asia, where there has historically been more chance of violence, have a higher level of security. Hotels and resorts such as Mandalay Bay have not generally embraced technologies like the explosives scanners or X-ray machines used at airport terminals Even in Las Vegas, where the gaming and hospitality industries embrace video in a big way, the emphasis is not on watching guests who may be stockpiling firearms. What might the impact of greater security be on guests and, by extension, a hotel’s business? In a competitive market that emphasises the guest experience, any negativity suggested by additional security measures would likely be evaluated carefully lest it impact the bottom line. Anything perceived as invasive of a guest’s privacy would be frowned upon. Our appetite and/or tolerance for tighter security in the wake of a tragedy will inevitably dissipate over time. In short, the hospitality industry is likely to continue to be a “soft target” for years to come. New security training and technologies Might a higher level of training among hotel staff to promote awareness of suspicious behavior make a difference? It’s a low-profile, comparatively low-cost possibility many hospitality professionals will be looking at in the days to come. There are less obtrusive technologies on the market that could help. For example, Steve Wynn, CEO of Wynn Resorts, has said they have installed “non-visible” metal detectors at every entrance. One manufacturer of such equipment is PatriotOne Technologies, which offers a “cognitive microwave radar technology” embedded in a wall or stand-alone unit at a controlled access point. The company made news at last week’s ASIS show by announcing integration of its system with March Networks’ video recording solution. Concerns for security trade shows The latest tragedy hits especially close to home for those in the security industry who travel to Las Vegas every year for the ISC West show. Mandalay Bay is at the other end of the strip from much of the ISC West activity, but the attack still seems to hit directly in our neighbourhood. Next year, the security market will be going to Vegas at least twice, for ISC West in the spring and again for the ASIS 2018 show in the fall. Somewhere in the midst of those events may be a solution that could help prevent such tragedies. We can all hope so. Meanwhile, our thoughts are with the victims of the Las Vegas massacre, their families and friends.
A networked surveillance system has been installed at Petwood Hotel in Lincolnshire, the former home of members of 617 Squadron, more famously known as The Dambusters, during World War 2. The hotel, situated in the village of Woodhall Spa, was originally built in 1905, as a country house for a wealthy Baroness, and after serving as a military convalescence hospital during World War 1, was converted into a hotel in 1933. Located among magnificent lawns and landscaped gardens, the Grade II-listed hotel has 53 bedrooms, a Squadron Bar filled with World War II memorabilia, a restaurant and terrace bar, and function rooms. Dahua Smart PSS viewing platform The system at the Petwood Hotel comprises 12 HFW5431-ZE bullet cameras, four HDBW5431-ZE dome cameras, and 13 HDBW2421R-ZS mini dome cameras. Images are recorded and processed on to a central server, while viewing is managed by a Dahua Smart PSS viewing platform. Some 29 Dahua bullet, dome and mini-dome network cameras have been installed by Videcom Security around the hotel. Externally, cameras monitor the car parks, where previously there were incidents of damage to vehicles. With the new system, however, the source of any damage can be quickly located, so helping with guests’ insurance claims. Other cameras are positioned so that the hotel’s management has coverage of the entire perimeter. Perimeter protection Inside, cameras are located in public areas such as reception, the bar area and function rooms Inside, cameras are located in public areas such as reception, the bar area and function rooms. They are designed to help resolve payment discrepancies and to deter any unwarranted behaviour. Images from the cameras go back to a secure room in the hotel’s separate office block, while staff at reception is able to view live images. “The Dahua system delivers all the benefits we were looking for,” said George Kane, General Manager at the Petwood Hotel. It is reliable, easy to use, and provides excellent quality recorded images, which can be accessed quickly and easily. The cameras are discreet and sensitively installed in and around the listed building. Video surveillance system The technology is great and Videcom Security have handled the project well and sensitively, considering the building is more than 100 years’ old and the hotel remained open throughout the period of installation. “The new surveillance system has been brilliant. The high image quality will enable us to resolve any liability issues in the car parks, while the system reassures guests and staff about internal and external security,” said Danny Harsley, Northern Engineering Manager at Videcom Security. Danny adds, “The Dahua equipment was ideal for this project and, as we have found on many other projects, was easy to install and commission. It’s also a great system to use.”
Based in High Wycombe, Lata Lata opened in 2018, with the express purpose of combining the best produce The Chilterns have to offer, together in one neighbourhood restaurant. Like many businesses especially in the hospitality sector, Lata Lata suffered from the impact of COVID-19, with lockdown preventing restaurants from opening as usual. However, determined to stay open they concentrated all efforts on their takeaway service, with support from the likes of Wycombe Wanderers, which helped keep the restaurant running during this critical time. Temperature monitoring terminal Now that the government has given the green light for restaurants to open fully, Lata Lata has been meticulously planning re-opening and taking every step to ensure staff and customer safety. Along with social distancing measures, seating, booking systems and hand sanitisers, Lata Lata has gone a step further than many by deploying a temperature monitoring terminal at the entrance of their premises. Staff and all customers are using this device to check their temperature before entering. The temperature monitoring terminal deployed by ANT Telecom is very accurate, reliable and contactless. The solution is also discreet to ensure minimal disruption to the restaurant’s service and atmosphere – meeting, or even exceeding, guidelines for COVID-secure premises. As guests arrive their temperature is automatically checked and confirmed by the camera and terminal. Customers are also advised to sanitise their hands, keep to social distancing measures and use card payment only. Extra layer of security They understood what we were after from the very beginning and made the perfect solution for us" Customers so far have embraced the technology and are pleased with the additional assurance this provides, with customers commenting on how the restaurant felt safe with COVID precautions that were easy to follow. Ross Hunt, Co-Owner, Lata Lata, comments: “We found working with ANT Telecom really easy. They understood what we were after from the very beginning and made the perfect solution for us. An unobtrusive instrument that adds an extra layer of security making our customers feel safe and ready to come back.” Temperature monitoring solution Klaus Allion, MD, ANT Telecom, adds: “It’s been great to work with Lata Lata to implement a solution to get the restaurant up and running with a COVID-secure environment.” “Although the measures put in place to keep everyone safe may seem like dining out has fundamentally changed, the temperature monitoring solution is designed to cause as little impact on the experience as possible. And with the knowledge that risk-reducing initiatives are in place, customers can enjoy their meals with peace of mind that they are within a safe environment.”
Iris ID, a provider of iris recognition technology, announced its contactless IrisAccess® biometric technology is being used for employee time and attendance at hotels in Iraq which are part of Millennium & Copthorne Hotels, a London-based hotel company that manages and operates 135 luxury hotels in 80 locations worldwide. The Millennium hotels – the Millennium Kurdistan, the Copthorne Hotel Baranan and Millennium Kurdistan Hotel and Spa – are located in the Sulaymaniyah province in the country’s Kurdistan region. Biometric readers The process takes a second to complete and is highly intuitive, requiring virtually no employee training to use" Mohammed Murad, vice president, global sales and business development, Iris ID, said iCAM 7S series biometric readers provide a quick and accurate way to record the time employees work each day. “The process takes a second to complete and is highly intuitive, requiring virtually no employee training to use,” he said. “The iCAM 7S platform automatically tilts to locate a person’s face and iris patterns. Also, it’s important in the COVID-19 era, that the technology is contactless and not impacted by employees wearing personal protective equipment such as gloves, masks and goggles.” Integrate with the payroll management system The iCAM 7S time and attendance units integrate with the hotels’ payroll management system to ensure accurate reporting of hours worked without any manual processes. Iris ID’s highly accurate identity verification technology eliminates a costly payroll fraud scheme known as buddy punching – when one employee signs in or out for another. InfoMet Technologies, an Istanbul, Turkey-based integrator of security and building management systems, installed the Iris ID system in the three Iraqi hotels.
Since the spread of COVID-19 started in Denmark, the Danish government has closed all restaurants, bars and other business areas. In order to comply with the back-to-business policies of the government, Arkaden Food Hall, a popular food court located in Odense, needs to keep the number of guests within a specific limit per square meter – 308 people in their case. Being responsible for their customers and staff, the Food Hall deployed the People Counting and Flow Control Solution from Dahua Technology, to ensure a smooth and safe reopening after the pandemic. People count solution With 14 food stalls and 2 bars, the Food Hall has two entrances. The people count from these two entrances needs to be combined and displayed on screens to determine if there is any more room for customers to enter or will have to temporarily wait at the door. The solution consists of: 2 Entrances with 5 Series IPC (HDW5442E-ZE) 2 DPB18-AI 2 DHL32-F600 1 DSS Pro License 64 Channels + BI Module People counting and flow control The Dahua AI-powered people counting camera can automatically and accurately calculate the real-time number of people entering the restaurant, avoiding congestion and helping to mitigate the spread of the pandemic. The DSS PRO platform with People Counting and Flow Control, together with monitors and DPB18A helps send different videos/pictures and editable content for guests to see. When the number of guests exceeds the set value, the platform and monitors will notify and display ‘the limit is reached’ on the digital signage at the entrance of the Food Hall, reminding incoming customers to wait at the door. In addition, the people counting cameras are simple and easy to install, which allowed the installer to complete the entire project in just 1 day. Enhancing the safety level The People Counting solution has given us statistics and data about the behaviour of our customers" “The People Counting solution has given us statistics and data about the behaviour of our customers, which saves us a lot of resources since we do not have to physically count the number customers at the door. Furthermore, we can provide them with important information at the entrance using the monitors. We are very happy with our cooperation.” “There seem to be lots of innovative solutions out there that we would be more than happy to try out since we feel this will benefit us to be smarter and more efficient in many ways,” said Sanne Brigsted, Business Development Manager of the Food Hall. Faced with the impact of COVID-19, the Dahua People Counting and Flow Control Solution enhances the safety level and competitiveness of business establishments like Arkaden Food Hall, while creating a comfortable dining environment for their guests. Restaurant management efficiency Most importantly, it has helped the restaurant to successfully achieve its primary task of reopening its food hall by allowing an operator to monitor the customer traffic in real time so that timely security measures can be taken before the place becomes packed with customers. With this smart system, no additional employees are needed to count customers manually at the door, which can significantly reduce labour costs and improve restaurant management efficiency. Moreover, its monitor can serve as a notice board to inform customers or as a multi-purpose advertising screen with event marketing and planning based on the DSS Pro's intelligent data analysis, providing a platform with huge expansion potential and creating business opportunities for the restaurant.
In the emirate of Ajman, the real-estate developer is AQAAR. AQAAR’s construction projects represent 90% of all developments in the region, and include more than 200 towers and buildings, over 18,000 apartments, five hotels, two schools and a university. More buildings are still under construction. This burgeoning portfolio of buildings provides housing, work and recreation for some 120,000 people and counting. And AQAAR recognises its duty to keep these locations safe. “Our aim is to become the safest community in the UAE,” says Ghaleb Jaber, Executive Director, AQAAR. Networked video security solution “We want to prevent crime, and to help people to continue to live and work peacefully in the buildings that we construct. To support this, we needed a specialised provider that was capable of delivering a cutting-edge, 24 hour networked video security solution featuring tens of thousands of cameras.” Hikvision products are excellent: the intelligent AI-based technology was exactly what we were looking for" During AQAAR’s search for an ideal video technology supplier, Hikvision stood out from all the rest. “Hikvision products are excellent: the intelligent AI-based technology was exactly what we were looking for,” says Ghaleb Jaber. “But just as importantly, Hikvision demonstrated excellent credibility in deploying large-scale video security projects of this type.” AI-based video security solution Working with the AQAAR team, Hikvision and its partners designed a comprehensive AI-based video security solution comprising different types of cameras. The majority of these are Hikvision 2MP IP cameras. These AI-enabled cameras offer a wealth of intelligent functionality, such as perimeter protection, and are being installed throughout all public areas and buildings. They are also installed at construction sites to help prevent theft of expensive building materials. The AQAAR solution also features Hikvision ANPR IP Cameras installed at the entrances to the parking lots of Ajman’s hotels. These use Automatic Number Plate Recognition to ‘read’ a car’s license plate, and will only lift the barrier to authorised vehicles. Centralised management system For added peace of mind, AQAAR chose to install a network of Hikvision Under Vehicle Surveillance Systems, for automatic security checks at key locations. Furthermore, the AQAAR team chose the Hikvision 16 Channel NVR for video recording, coupled with the Hikvision iVMS-5200E Centralised Management System in the control center. “For public security installations such as this, we always adopt a multi-phase approach," explains Mohammed Barakat, Account Manager for Hikvision MENA. This will unlock their intelligent features such as intrusion detection and facial recognition" “The first phase is the hardware installation. Phase two involves setting up the Centralised Management System, and creating one main control room that unites all video feeds. Then at phase three, we will switch on the AI capabilities of the cameras. This will unlock their intelligent features such as intrusion detection and facial recognition.” Intelligent parking management “Some of this, such as the intelligent parking management, has already been enabled. But which other capabilities AQAAR chooses has yet to be decided; it will depend on the needs of the urban planning and its residents as the project unfolds,” Mohammed explains. With the end of the installation now in sight, Ghaleb Jaber at AQAAR is eager to test the full potential of Hikvision’s proactive, comprehensive security solution. “We look forward to exploring how all elements can work in harmony together, to help AQAAR ensure the safety of residents and workers as our development continues to grow.”
LILIN announced that Aida traffic management solution will be released and unveiled at ISC West 2020. With the success of LILIN Aida number plate recognition (ANPR), LILIN Aida adds AI traffic management to Aida product line. LILIN Aida can be installed on the edge for traffic analysis where the metadata gets sent to remote Navigator Control Centre. LILIN Aida ANPR and traffic management can integrate with LILIN Navigator VMS products including Navigator Control Centre, Navigator Corporate, and Navigator Enterprise for event notifications, statistics, and system automation. Both LILIN Aida and LILIN Navigator products utilise Intel Media SDK for Windows and maximise the GPU processing power for video decoding and rendering. LILIN offer Aida ANPR, traffic management, VMS software, and AI recorders (NAV2000AI and NAV3000AI series) which can run on Intel CPU, GPU, VPU, and NVidia Cuda on Windows OS. LILIN Aida traffic management LILIN Aida software is able to run Multiple AI models on distributed AI CPU, GPU, and VPUs of a Server. LILIN Aida ANPR series and Aida traffic management use the latest deep learning technology. LILIN Aida traffic management by deep learning technology requires thousands of pictures for image labelling Aida traffic management can provide accurate AI traffic object recognition for parking spot detection, parking violation, turn left violation and turn right violation, wrong way detection with number plate recognition, truck, motorbike and pedestrian violations, queuing detection, average speed detection, and loitering detection. LILIN Aida traffic management by deep learning technology requires thousands of pictures for image labelling and machine training of object datasets. These processes are time consuming tasks. The datasets are then used for traffic managements. Intelligent video surveillance Image labelling needs more attention for inference accuracy. LILIN deep learning processes consist of image labelling, video recognition, and accuracy validation. LILIN design and developed AI-enhanced software combined with intelligent video surveillance edge devices can optimise traffic system. Mr. Steve Hu, Product Manager of LILIN, said, “We are very pleased to show Aida traffic management solution at ISC West 2020, since our development engineers focused on the AI development for years. Other than AI products, LILIN will demonstrate products for custom install, facial recognition system, QR code for B&B, campus solution, building automation, access control for hotel, and LILINHome app.”
Round table discussion
Hospitality businesses work to provide a safe and pleasant customer experience for their guests. Hotels offer a “home away from home” for millions of guests every day around the world. These are businesses of many sizes and types, providing services ranging from luxury accommodations to simple lodging for business travelers to family vacation experiences. Hospitality businesses also include restaurants, bars, movie theaters and other venues. Security needs are varied and require technologies that span a wide spectrum. We asked this week’s Expert Panel Roundtable: What are the security challenges of the hospitality market?