Understanding access control technology has surpassed its core application as a security tool and is helping protect individuals from infection, Anviz has announced the release of a strategic addition to its product line, Go Touchless - FaceDeep 5 and FaceDeep 5 IRT face recognition terminals. Safely Returning to work and school during the post COVID-19 pandemic period leaves people with a key question - With what health and safety precautions? AI-based facial recognition terminal Anviz has i...
Armis®, the agentless device security platform, and Viakoo®, a pioneer in automated IoT cyber hygiene, announce a partnership that brings together IoT device discovery and remediation. The number of connected Enterprise IoT devices used in workplaces across all industries is exploding. Experts say that by 2025, one should expect more than 40 billion of these devices interwoven into our everyday lives. And although these devices help improve efficiency and reliability, they lack the mana...
In response to gaps in the short-range air defence radar market, Numerica Corporation (Numerica), a globally renowned company in designing and deploying state-of-the-art defence technology, has announced the development of a new USA-made, 3D radar solution for Counter Unmanned Aircraft Systems (C-UAS) and other short-range defence missions, Spyglass short-range surveillance radar system. Spyglass 3D radar Designed to fill the need for exceptional C-UAS detection and tracking performance, Spygl...
DICE Corporation (The New DICE Corporation) is empowering security integration companies with Matrix Integrator, a cloud-based video event monitoring, surveillance, and alarm notification suite for any video system, anywhere, and at any time. Interactive video monitoring For the first time, security integrators can directly provide end-users with automatic and managed interactive video monitoring services, while also controlling their business operations at the same time. “In the p...
Videx Security appoints James Rose, an experienced professional in the access control and door entry market, to National Projects Manager. In the newly created role, James is responsible for Videx’s large-scale access control and entry projects, predominately in the social and private residential sector. A key element of his role involves onsite leadership for the project team, taking ownership of the full project life cycle from initiation to completion. Developing strong relationships...
Evolv Technology, a globally renowned provider of artificial intelligence (AI)-based touchless security screening systems, announced the appointment of digital transformation executive Merline Saintil to its Board of Directors. The 20-year technology industry veteran is widely respected for providing world-class innovators and market makers with strategic leadership, insightful guidance and operational expertise to dominate the markets they serve. Saintil has a proven track record of developing...
Anomali, the globally renowned company in intelligence-driven cyber security solutions, has announced that Anomali Match is now integrated with Microsoft Azure Sentinel. By bridging the gap between these two major security solutions, Anomali and Microsoft have created an automated solution that significantly enhances and speeds joint customers’ threat detection, alerting and response capabilities. Azure Sentinel and Anomali Match integration Azure Sentinel is a cloud-native security information and event manager (SIEM) platform that uses built-in AI (Artificial Intelligence) to help analyse large volumes of data across an enterprise fast. Azure Sentinel aggregates data from all sources, including users, applications, servers, and devices running on-premises or in any cloud, giving users access over millions of records in a few seconds. Anomali Match is a high-performance threat detection and response solution. It continuously correlates all collected security event and log data against millions of globally observed indicators of compromise (IOCs) to expose previously unknown adversaries that have already penetrated networks. Match retrospective analysis capabilities stretch back as far as five years. Bi-directional data flow With this integration, Microsoft and Anomali have created a bi-directional data flow With this integration, Microsoft and Anomali have created a bi-directional data flow that allows users to easily export Azure Sentinel logs into match for correlation with Anomali global intelligence. Combining IOC matching at a massive scale together with other innovative techniques provides the precision detection needed to investigate and prioritise matched threats for ingestion back into Azure Sentinel, where Security Operation Centre (SOC) analyst teams can then triage. Enhancing cyber and data security “Most enterprises have dozens of cybersecurity tools deployed and access to mass volumes of related information. Despite this, many continue to fall victim to attackers who have figured out how to slip through holes that disparate systems and siloed data leave open,” said Mark Alba, Anomali Chief Product Officer. Mark adds, “Azure Sentinel and Anomali have bridged a gap that allows our joint customers to consolidate essential security technologies, providing them with the information and capabilities needed to identify and mitigate threats that are impacting their networks.” Cloud adoption and threat intelligence “To remain protected, organisations need visibility over what’s going on across their infrastructures, which are expanding rapidly due to things like cloud adoption, growing remote workforces and increasing levels of mobile connections,” said Jason Wescott, Principal PM Manager, Azure Sentinel. Jason adds, “With match enabled, enterprises will gain access to threat intelligence that will allow them to know more about what they are up against and then take smarter steps to further reduce risk.”
Heavily used interior and exterior doors need an access solution that’s both robust and intelligent. The new SMARTair i-max Escutcheon from ASSA ABLOY ensures only authorised users pass through these doors, via a range of credentials including virtual keys stored on a smartphone. Fast, wire-free installation makes it easy to implement or extend a SMARTair access control system in any building. This new wireless escutcheon with an inbuilt RFID reader and Bluetooth compatibility handles the punishment of high-traffic, frequent-use doors. It meets standard EN 1906 Category of use: Grade 4 for robustness — the highest level, recommended for doors ‘which are subject to frequent violent use.’ Wire-free installation This hard-wearing, resistant build quality makes the SMARTair escutcheon ideal for busy doors at education establishments like universities and schools; healthcare sites including hospitals and nursing homes; offices and co-working spaces; apartment complexes and multifamily residences; and public institutions like government buildings, sports centres, and libraries. Its robust design, redefined aesthetics and wire-free installation are perfect for these high-traffic environments — facilities with busy students and teachers, or doctors, nurses, visitors, and subcontractors always on the move. The SMARTair i-max escutcheon is also available with an antibacterial coating, for healthcare and other sterile settings. Proximity credential technologies The new escutcheon is battery powered and works with all standard proximity credential technologies The new escutcheon is battery-powered and works with all standard proximity credential technologies, including MIFARE®, DESFire, and iCLASS®. An optional integrated PINpad provides the opportunity to add another layer of security with multi-factor authentication. One can specify individual doors to open with PIN verification or credential verification — or to require both. The new i-max sacrifices none of its style in pursuit of functionality. The new escutcheon comes in a variety of contemporary finishes and handles options — with up to 16 different combinations. A multi-coloured LED gives visual warning signals at a glance. This new SMARTair escutcheon fits glass, wooden, or aluminium doors — including fire and emergency exit doors — and is available for Scandinavian, Euro, Finnish, and Australasian door profiles. System management options The new escutcheon is compatible with all SMARTair system management options: Standalone, for basic access control functionality; Update on Card; Openow and Pro Wireless Online, for real-time management of every door and system user. The i-max escutcheon also offers another way to open doors: the SMARTair Mobile App to open doors remotely and the SMARTair Openow mobile app. With Openow, users no longer carry a separate card or fob credentials. Instead, their smartphone stores secure virtual keys which can be issued, amended, or cancelled at any time. So, users no longer need to waste time collecting or validating an access card to open doors locked with a new SMARTair i-max escutcheon. With Openow, if one has their phone, they are already carrying the keys.
PSA, one of the world’s largest consortium of professional systems integrators, announced the addition of Dedrone to its Managed Security Service Provider Program (MSSP). Dedrone is a solution provider in the airspace security. “Dedrone provides early warning, identification, location, and mitigation against all drone threats,” said Tim Brooks, PSA’s Vice President of Sales and Vendor Management. “As the market and technology leader in airspace security, Dedrone is an important addition to our lineup of products.” Critical infrastructure facilities Drone technology has advanced tremendously, aiding in surveying, disaster relief, delivery, and a myriad of business and consumer applications. However, in the wrong hands, a drone’s accessibility, capabilities, and ease of flying makes it especially suitable for hacking, surveillance, and terrorism. Dedrone protects organisations from malicious and unauthorised drones by securing the airspace using sensors and software technology. Drones pose a physical and cyber security threat to enterprises and critical infrastructure facilities" “Dedrone is proud to be a part of PSA’s MSSP programme, where together with PSA, we will deliver complete airspace security,” shares Dedrone CEO Aaditya Devarakonda. “Drones pose an increasing and escalating physical and cyber security threat to enterprises and critical infrastructure facilities. PSA’s network of security providers now has access to Dedrone’s market-leading solution to ensure their customers are protected against unwanted or malicious drones.” Drone detection sensors Dedrone smart airspace security utilises best-in-class drone detection sensors to feed data into Dedrone’s cutting-edge software platform. Airspace activity data, including drone type, flight time, flight speed and flight path / location, are automatically reported, enabling security providers to assess their airspace activity in real-time, and prevent drone-based interruptions. Dedrone’s smart airspace security is delivered through their proprietary Airspace Security-as-a-Service (ASaaS) programme and starts with a diagnostic threat assessment. Organisations can determine the scope of their drone activity, and from there, work with PSA and Dedrone to build out a comprehensive airspace security programme that meets the specific threat. PSA’s MSSP programme hinges on uniting pioneering partners in cyber security and cloud-based security solutions, offering training and certification opportunities and financing options with assistance from PSA.
Ping Identity, the Intelligent Identity solution for the enterprise, announced Project COVID Freedom which leverages its recent acquisition of ShoCard personal identity to allow healthcare providers, businesses, and individuals to easily share proof of COVID test results and vaccinations. Project COVID Freedom creates a secure and privacy enabled way for healthcare providers, businesses, and individuals to verify test and vaccination results, while keeping users up to date on vaccination status overtime via private encrypted messages. Receive digital proof Individuals instantly receive a digital proof of their vaccinations in their secure ShoCard mobile wallet from enrolled healthcare providers, then can securely share with participating employers, restaurants, entertainment arenas, friends, family, and more, using a QR code. Using Ping Identity’s solution, vaccine providers can send timely reminders directly to customers Unlike other vaccination passports, Ping Identity’s solution provides a secure way to continuously manage test results and vaccination status, speeding up the time it takes to demonstrate proof of vaccination, and providing a more versatile and trustworthy solution over paper certifications. Using Ping Identity’s solution, vaccine providers can send timely reminders directly to customers when they are due for a second dose. Users' digital identity Or, if a batch of vaccines is discovered to lack efficacy, providers can revoke the proof and instantly communicate corrective actions. “Achieving normalcy post-pandemic will demand a level of verifiable safety in the places where people come together most,” said Andre Durand, CEO and Founder of Ping Identity. “Using secure and private technology that’s easily accessible from a smartphone, Project COVID Freedom helps simplify the vaccination process so individuals, businesses and healthcare providers can increase in-person safety without compromising users' digital identity.” Decentralised identity technology The complete end-to-end solution requires no integration or coding to begin issuing or verifying proof of vaccination “A return to normal requires secure and trusted ways to share and verify vaccination status,” said Gautam M Shah, Vice President of Platform and Marketplace at Change Healthcare. “Supporting Project COVID Freedom is a natural extension of Change Healthcare and Ping Identity’s common goal to use secure, highly accurate identity to enable trusted healthcare interactions for patients, healthcare providers, and payers alike.” Ping Identity’s COVID Passport uses decentralised identity technology based on the ShoCard platform to provide verifiable proof of test results and vaccinations, which may be securely shared when a user permits through facial or fingerprint biometrics. The complete end-to-end solution requires no integration or coding to begin issuing or verifying proof of vaccination. Individuals are only required to download an iPhone or Android app. Early access testing The service is early access testing being offered for free to all governments, businesses, healthcare providers, and individuals, and will become widely available after early access testing is complete. Additional and advanced use-cases will be available to Ping Identity customers already leveraging the Ping Identity platform for identity, but it is not required. Healthcare providers, Businesses, or individuals can sign up to receive early access at ShoCard’s official website. ShoCard is a trademark and service of Ping Identity.
Strategic Security Solutions (S3), the provider of information security consulting services for identity and access management (IAM), governance, risk and compliance, and SAP Security, announces it has formed an advisory board to provide support and guidance for S3’s strategic growth initiatives. The initial members include two widely renowned cybersecurity industry experts, Peter Tran and Michael Brown, Rear Admiral, USN (Retired), who will apply their experience to help S3 identify new strategic and tactical identity security solution opportunities and provide expert guidance on growth execution and customer delivery excellence. Information security challenges “We are proud to welcome two highly esteemed cybersecurity experts to our growing advisory board roster,” said Johanna Renee Baum, CPA, CISA, CEO and founder of S3. “At S3, we define ourselves by the experience and strength of our consultants. Tran and Brown’s technical backgrounds and deep knowledge of the cybersecurity space will bolster our group of experts and the innovative approaches we take to solving complex information security challenges and producing strategic results.” Tran is currently CISO and head of cyber and product security solutions at InferSight Tran is currently CISO and head of cyber and product security solutions at InferSight, responsible for global product security, breach response, enterprise active cyber defence operations and applied counter threat innovation, techniques, tactics, and analysis. He possesses more than 20 years of demonstrated field experience focused on developing, implementing, and growing cutting-edge cyber counter threat and exploitation solutions to address new innovations, applications, and applied cybersecurity defence methods. Cyber defence operations Prior to InferSight, Tran was vice president for Worldpay’s cyber defence operations and security strategy. He was founder, general manager, and senior director for RSA Security’s Advanced Cyber Defense (ACD) practice where he focused on next-generation information security operations designs, tactical field deployments, exploitation discovery and response solutions. Brown is the founder and president of Spinnaker Security LLC and managing partner at Resilient Advisors. Prior to his current position, he was president of RSA Federal LLC and vice president/general manager Global Public Sector of RSA Security LLC, where he oversaw RSA Information Technology, Security and Enterprise Risk Management portfolios. Cybersecurity mission activities Brown joined RSA after a career of more than 31 years in the United States Navy, where he held leadership positions within the Department of Defense (DOD) and Department of Homeland Security (DHS) regarding cybersecurity. Brown joined RSA after a career of more than 31 years in the United States Navy His last position on active duty was as the director, cybersecurity coordination for DOD and DHS, where he was responsible for increasing interdepartmental collaboration in strategic planning for the nation’s cybersecurity, mutual support for cybersecurity capabilities development, and synchronisation of current operational cybersecurity mission activities. “I am incredibly excited to be working with S3 as a member of its advisory board,” said Michael Brown. Delivering innovative solutions “The vision and capabilities that S3 brings to today’s complex situations are exactly what is necessary to solve the business and security problems of today and tomorrow. Their wealth of experience in delivering innovative solutions to their customers will allow them to continue to grow and ensure their critical place in the cybersecurity and IAM ecosystem.” “S3 is in a unique position as an industry leader within the IAM solutions space,” said Peter Tran. “Their proven IAM strategic approach, designs, and implementations across multiple technology platforms has proven to stand the test of time for some of the most notable Fortune 500 and Global 1000 companies around the word. I am thrilled to be a member of S3’s advisory board as the demand for IAM solutions continues to accelerate.”
Openpath, a provider of renowned touchless access control and security automation for the built environment, has reimagined the ideal digital badge for today’s modern workforce and workplace. As an industry disruptor, Openpath first revolutionised mobile access control by studying user behaviour to add obvious, simple, yet powerful tools that ensure a frictionless user experience while making organisations more secure. Now, Openpath’s new reimagined digital badge gives system administrators new ways to address their company’s security policies and procedures with greater focus, flexibility and features such as: Customised digital badge design tool so the user’s physical ID badge and picture now match their Digital Credential Call or email for help feature to eliminate lock outs “at the door” Single Sign-On App authentication through Okta to ensure security compliance Door auto-detect technology recognises closest door on the home screen Dynamic Status tags can change the user’s work group or vaccination status in real-time Streamlined support options to determine where and how employee questions are answered, either via Openpath or directly to their company’s security operations center (SOC). Touchless access control They are transforming traditional access control into an experience that is modern and seamless “As an enterprise customer of Openpath, we’ve been impressed with their ability to innovate and deliver a product that is both highly secure and that elevates the employee experience. They are transforming traditional access control into an experience that is modern, seamless, and meets the need of the new workplace," said Brooke Lierman, Senior Director of Workplace Technologies at Okta. At LabFellows, which offers remote lab spaces and cloud-based software automation for companies working on vaccine research for COVID-19, Openpath’s remote management, touchless access, and mobile credentials have heightened the security, reduced administrative burdens and improved the overall experience of their smartlab workspaces. Physical keycard “We have so much intellectual property housed inside our laboratories, and a constantly rotating roster of customer tenants. Adding to that are reduced occupancy guidelines and heightened safety concerns due to COVID-19. With all of these challenges, Openpath has been key to the operational success, safety and security of both LabFellows and our HomeLab members,” said Julio de Unamuno IV, LabFellows Founder & CEO. The long-standing legacy of a physical keycard for identification being more secure than a digital keycard is no longer true. Mobile security has advanced, and the security vulnerabilities of a physical keycard, which are easily lost or cloned, still remain. Physical ID badge Furthermore, mobile badging ensures a pervasive, unified safety and security experience across all of an organisation’s company apps, whether on browser or mobile, and for the first time, notifies companies right at the door if there is a cyber security issue, and gives them the appropriate steps to resolve it easily, quickly and efficiently. Many enterprise companies require staff to wear a physical credential for compliance purposes While there will always be a role for the physical ID badge, Openpath has chosen to improve upon it by giving it a digital twin with features that other mobile solutions simply don’t offer, and customised solutions tailored to accommodate a company’s size, scale, and specific security needs. For example, many enterprise companies require staff to wear a physical credential for compliance purposes. Access control system Supplementing that with a digital credential offers a fail-safe in the event the physical badge is damaged or a second form of ID is needed to show an updated photo or other pertinent information, such as vaccination status. “The beauty of the Openpath’s open architecture system is that it allows us to continuously innovate and create new options for companies that weren’t thought to be possible with older technologies,” said Alex Kazerani, CEO and Co-Founder of Openpath. “We have been breaking barriers to mobile access control since day one and today we are so excited to deliver a new digital badge that surpasses the security of a physical badge, plus offers custom features and extensive functionality for system administrators of all types of companies and sizes.”
Urban populations are expanding rapidly around the globe, with an expected growth of 1.56 billion by 2040. As the number of people living and working in cities continues to grow, the ability to keep everyone safe is an increasing challenge. However, technology companies are developing products and solutions with these futuristic cities in mind, as the reality is closer than you may think. Solutions that can help to watch over public places and share data insights with city workers and officials are increasingly enabling smart cities to improve the experience and safety of the people who reside there. Rising scope of 5G, AI, IoT and the Cloud The main foundations that underpin smart cities are 5G, Artificial Intelligence (AI), and the Internet of Things (IoT) and the Cloud. Each is equally important, and together, these technologies enable city officials to gather and analyse more detailed insights than ever before. For public safety in particular, having IoT and cloud systems in place will be one of the biggest factors to improving the quality of life for citizens. Smart cities have come a long way in the last few decades, but to truly make a smart city safe, real-time situational awareness and cross-agency collaboration are key areas which must be developed as a priority. Innovative surveillance cameras with integrated IoT Public places need to be safe, whether that is an open park, shopping centre, or the main roads through towns Public places need to be safe, whether that is an open park, shopping centre, or the main roads through towns. From dangerous drivers to terrorist attacks, petty crime on the streets to high profile bank robberies, innovative surveillance cameras with integrated IoT and cloud technologies can go some way to helping respond quickly to, and in some cases even prevent, the most serious incidents. Many existing safety systems in cities rely on aging and in some places legacy technology, such as video surveillance cameras. Many of these also use on-premises systems rather than utilising the benefits of the cloud. Smart programming to deliver greater insights These issues, though not creating a major problem today, do make it more challenging for governments and councils to update their security. Changing every camera in a city is a huge undertaking, but in turn, doing so would enable all cameras to be connected to the cloud, and provide more detailed information which can be analysed by smart programming to deliver greater insights. The physical technologies that are currently present in most urban areas lack the intelligent connectivity, interoperability and integration interfaces that smart cities need. Adopting digital technologies isn’t a luxury, but a necessity. Smart surveillance systems It enables teams to gather data from multiple sources throughout the city in real-time, and be alerted to incidents as soon as they occur. Increased connectivity and collaboration ensures that all teams that need to be aware of a situation are informed instantly. For example, a smart surveillance system can identify when a road accident has occurred. It can not only alert the nearest ambulance to attend the scene, but also the local police force to dispatch officers. An advanced system that can implement road diversions could also close roads around the incident immediately and divert traffic to other routes, keeping everyone moving and avoiding a build-up of vehicles. This is just one example: without digital systems, analysing patterns of vehicle movements to address congestion issues could be compromised, as would the ability to build real-time crime maps and deploy data analytics which make predictive policing and more effective crowd management possible. Cloud-based technologies Cloud-based technologies provide the interoperability, scalability and automation Cloud-based technologies provide the interoperability, scalability and automation that is needed to overcome the limitations of traditional security systems. Using these, smart cities can develop a fully open systems architecture that delivers interoperation with both local and other remote open systems. The intelligence of cloud systems can not only continue to allow for greater insights as technology develops over time, but it can do so with minimal additional infrastructure investment. Smart surveillance in the real world Mexico City has a population of almost 9 million people, but if you include the whole metropolitan area, this number rises sharply to over 21 million in total, making it one of the largest cities on the planet. Seven years ago, the city first introduced its Safe City initiative, and ever since has been developing newer and smarter ways to keep its citizens safe. In particular, its cloud-based security initiative is making a huge impact. Over the past three years, Mexico City has installed 58,000 new video surveillance cameras throughout the city, in public spaces and on transport, all of which are connected to the City’s C5 (Command, Control, Computers, Communications and Citizen Contact) facility. Smart Cities operations The solution enables officers as well as the general public to upload videos via a mobile app to share information quickly, fixed, body-worn and vehicle cameras can also be integrated to provide exceptional insight into the city’s operations. The cloud-based platform can easily be upgraded to include the latest technology innovations such as licence plate reading, behavioural analysis software, video analytics and facial recognition software, which will all continue to bring down crime rates and boost response times to incidents. The right cloud approach Making the shift to cloud-based systems enables smart cities to eliminate dependence on fibre-optic connectivity and take advantage of a variety of Internet and wireless connectivity options that can significantly reduce application and communication infrastructure costs. Smart cities need to be effective in years to come, not just in the present day, or else officials have missed one of the key aspects of a truly smart city. System designers must build technology foundations now that can be easily adapted in the future to support new infrastructure as it becomes available. Open system architecture An open system architecture will also be vital for smart cities to enhance their operations For example, this could include opting for a true cloud application that can support cloud-managed local devices and automate their management. An open system architecture will also be vital for smart cities to enhance their operations and deliver additional value-add services to citizens as greater capabilities become possible in the years to come. The advances today in cloud and IoT technologies are rapid, and city officials and authorities have more options now to develop their smart cities than ever before and crucially, to use these innovations to improve public safety. New safety features Though implementing these cloud-based systems now requires investment, as new safety features are designed, there will be lower costs and challenges associated with introducing these because the basic infrastructure will already exist. Whether that’s gunshot detection or enabling the sharing of video infrastructure and data across multiple agencies in real time, smart video surveillance on cloud-based systems can bring a wealth of the new opportunities.
The global pandemic has created a working environment filled with uncertainty and, at times, fear, as COVID-19 cases surge yet again and businesses continue to navigate a complex web of infectious disease mitigation protocols and managing the distribution of a potential vaccine. Organisations are operating in an environment where a critical event, posing significant risk to its employees and daily operations, could occur at any moment. Even with a vaccine showing light at the end of a very dark tunnel, the pandemic unfortunately may be far from over, and the communication of accurate public health information to a widely distributed, often remote workforce is vital to keeping employees safe and businesses running. Organisations that plan ahead, invest in an emergency management system and share key updates quickly, reliably and securely, can keep employees safe while ensuring business continuity when it matters most. Taking time to plan and prepare Throughout the pandemic, U.S. offices have gone through alternating stages of reopening and re-closing Throughout the pandemic, U.S. offices have gone through alternating stages of reopening and re-closing. However, whether businesses are operating at a limited or full capacity, medical experts are expecting continuous waves of COVID-19 cases, as community transmission continues to hit record highs. The only way for businesses to keep their employees and customers safe, protect their operations, and retain trust with their key stakeholders during these tumultuous times is to be proactive in nature. Organisations need to put a business resiliency plan in place now that outlines key actions to take if (or when) an issue relating to local spread of the novel coronavirus arises. By having a plan in place and practicing it regularly, organisations can minimise risks and maximise employee safety surrounding critical events, such as suspected or confirmed exposure to COVID-19 in the workplace. Context of emergency management Ensuring the safety of employees (and others within the company’s facilities) needs to be the number one priority for organisations; and in any crisis scenario, a prepared and practiced plan maximises a company’s chances of success. In PwC's 2019 Global Crisis Survey, business leaders across a range of industries shared their experiences, expectations, and top strengths and weaknesses in the context of emergency management. By a wide margin (54% vs. 30%), organisations that had a crisis response plan in place fared better post-crisis than those who didn’t. When it comes to ensuring the wellbeing of staff, businesses need to think through a comprehensive, iterative infectious disease mitigation and operational continuity strategy and practice it as often as possible. Investing in proper technology A vital step in adequate critical event management planning is investing in the proper technology infrastructure For today’s modern organisation, a vital step in adequate critical event management planning is investing in the proper technology infrastructure to streamline the communication of vital information. Organisations should explore risk intelligence, critical communication and incident management software to keep their people safe, informed, and connected during critical events - and, thankfully, decision-makers are starting to take note. The Business Continuity Institute 2020 Emergency Communications Report found that 67% of organisations at least use emergency notification and/or crisis management tools. Reliable risk intelligence system Building upon that trend, a reliable risk intelligence system can anticipate and analyse the potential impact of incidents, such as increases in local cases of COVID-19, send vital updates to a distributed workforce of any size on multiple devices regarding infectious disease mitigation protocols and public health directives, and then help incident response teams virtually collaborate while maintaining compliance standards. Automating as much of this process as possible through technology allows human decision makers to efficiently and effectively focus their time, effort and expertise on what matters most in a crisis situation - implementing sound operational continuity strategies and, more importantly, ensuring employees’ safety and well-being are prioritised and appropriately considered when stress rises. Communicating vital updates This is the cultural component of incident management based on emotional intelligence, empathy, effective employee engagement, and authentic listening that makes or breaks an organisation’s response to challenging situations. Employees must be aware at a moment’s notice to stay away from or exit contaminated areas If employees are exposed in the workplace to a confirmed or suspected case of COVID-19, employers must be prepared to quickly update staff on vital next steps, as outlined by the CDC and other public health authorities, and arm key functions - such as security operations, HR, facility management, legal and compliance - with the information they need to mitigate potential spread of the virus, including: Closing/cleaning the office: Employees must be aware at a moment’s notice to stay away from or exit contaminated areas. From there, it is critical that businesses communicate clearly with cleaning staff to follow procedure, use the right disinfecting products and sanitise high-touch surfaces. Alerting key groups that may have been exposed: Employers have a duty to rapidly notify workers of potential exposure to COVID-19. Having the proper communication infrastructure in place can streamline contact-tracing as well as the subsequent testing process, and save vital time. Ensuring work-from-home continuity or diverting workflows to alternative physical environments: Every work environment looks different today. Whether an organisation is managing a distributed workforce, full-capacity essential workers or something in between, there needs be a communication system in place to ensure business continuity. Outlining next steps for reopening: After a potential exposure, employees require the proper reassurance that they will be returning to a safe working environment in an organised, thoughtful manner, which is aligned to public health best practices. Whether it is coordinating a limited capacity return to the office or outlining new infectious disease mitigation protocols - such as steps for receiving a vaccine in the coming months - employees must continue to be updated quickly, comprehensively, and often. Incident management technology There is no doubt that organisations will continue to face a myriad of challenges as they navigate business operations during the pandemic into 2021, as the general public awaits the broad deployment of a vaccine. Public and private sector leaders still have months ahead of them before daily operations even begin to resemble “business as usual.” To best prepare for the next chapter of the global pandemic, organisations should outline a plan tailored to infectious disease mitigation protocols; explore augmenting their crisis management policies with risk intelligence, crisis management and incident management technology; and focus employee communications on containing and rapidly resolving events associated with COVID-19 exposure. Keeping employees safe, informed, and connected during critical events are mandatory considerations for leaders as they analyse existential threats to their business in 2021 and beyond.
Several major players vigorously employ biometric recognition technologies around the globe. Governments use biometrics to control immigration, security, and create national databases of biometric profiles. Being one of the most striking examples, the Indian Aadhaar includes face photos, iris, and fingerprints of about 1.2 billion people. Financial institutions, on their part, make use of biometrics to protect transactions by confirming a client's identity, as well as develop and provide services without clients visiting the office. Besides, biometric technology ensures security and optimises passenger traffic at transport facilities and collects data about customers, and investigates theft and other incidents in retail stores. Widespread use of biometrics Business, which suddenly boosted the development of biometrics, is an active user of biometric technology Business, which suddenly boosted the development of biometrics, is another active user of biometric technology. Industries choose biometric systems, as these systems are impossible to trick in terms of security, access control, and data protection. Being in demand in business, these three tasks are also relevant for the industry. However, the use of biometrics at industrial sites is discussed unfairly seldom. Therefore, it is the face identification that is the most convenient there, as workers often use gloves, or their hands may be contaminated, and the palm pattern is distorted by heavy labour. All these features make it difficult to recognise people by fingerprints or veins and significantly reduce identification reliability. Therefore, industries seek facial recognition solutions. Thus, let us demonstrate the application of face recognition technology at different enterprises, regardless of the area. Facial recognition use in incident management Facial biometric products are known to automate and improve the efficiency of security services by enriching any VMS system. These systems provide an opportunity of instantly informing the operator about recognised or unrecognised people, and their list membership, as well as save all the detected images for further security incident investigation. Furthermore, some sophisticated facial biometric systems even provide an opportunity to build a map of the movements of specific people around a site. Besides, it is relevant not only for conducting investigations but also in countering the spread of the COVID-19 virus. Identifying and tracking COVID-19 positive cases Therefore, if an employee or visitor with a positive COVID-19 test enters a facility, the system will help to track his/her movement and identify his/her specific location. It will also help to take the necessary measures for spot sanitary processing. Thus, the introduction of biometric facial recognition at the industrial enterprise can improve and speed up the incidents’ response and investigations without spending hours watching the video archive. Access control system to secure physical assets The right access control system can help industries secure physical and informational assets The right access control system can help industries secure physical and informational assets, cut personnel costs, and keep employees safe. Facial recognition systems may enrich access control systems of any company by providing more security. As biometric characteristics, by which the system assesses the compliance of a person with the available profiles in the database, cannot be faked or passed. The human factor is also reduced to zero, due to the fact that while identity documents can be changed, the inspector can make a mistake or treat his/her task carelessly, be in collusion with an intruder, the biometric system simply compares a person in front of the camera with the biometric profiles database. Biometric facial identification software For example, RecFaces product Id-Gate, a specialised software product for reliable access control to the site, checks the access rights by using biometric facial identification alone or in conjunction with traditional IDs (electronic passes, access keys, etc.), which means that there is almost a zero probability of passing to the site by someone else's ID. The access control system’s functionality allows one to strictly account the number and time of all the facility’s visitors and also track their movement. When unauthorised access is attempted or a person from the stop list is detected, Id-Gate sends an automatic notification to the access control system and operator. Enhanced data and information security Even despite the division of access to different industrial enterprise areas, the security service needs to provide independent information system security. Employees with the same facility access rights may have different access rights to data. However, in that case, a personal password is not enough, as an employee may forget it, write it down and leave it as a reminder, tell a colleague to do something for him/her during the vacation, or just enter it at another person’s presence. Password-free biometric authentication systems make the procedure user-friendly and secure Password-free biometric authentication Password-free biometric authentication systems make the procedure user-friendly and secure. Such systems usually provide an option of two-step verification when successful password entry is additionally confirmed by biometric recognition. Hence, it is particularly relevant due to the current lockdown in many countries. To sum up, the application of biometric technologies solves several issues of the industry, such as: Optimises and partially automates the work of the security service, as it provides reliable identification and verification of visitors/employees, reduces the amount of time spent on finding a person on video and making a map of his/her movements, without spending hours on watching video archive in case of investigation. Provides a high level of reliability and protection from unauthorised access to the enterprise and the information system. Provides a two-step verification of the user/visitor (including password and biometric data) and almost eliminates the risk of substitution of user data/ID.
Convergint Technologies’ rapid growth has come through a combination of organic growth and acquisitions — they have acquired 35 companies since 2014. Growth has been a focus since day one when the founders started the systems integration company with 10 colleagues in a basement. Today, the diverse company includes more than 5,000 employees globally. As technology has advanced and business practices have evolved, Convergint’s core values and beliefs have guided their path forward. Customer-centric approach Convergint’s culture is a critical aspect of the company, from the executive level to frontline colleagues. “It is essential that the companies we look to acquire and develop partnerships with directly align with our people-first, customer-centric, inclusive culture centered on colleagues and customers,” says Mike Mathes, Executive Vice President, Convergint Technologies. “This approach has allowed us to maintain and grow our number of colleagues across our acquisitions and enables us to continue being our customers’ best service provider.” Integration practices Many practices have to be form-fitted to each individual acquisition A simple but important consideration as Convergint grows through acquisitions is: No two companies are the same. While some integration practices can be standardised across the company, many practices have to be form-fitted to each individual acquisition, says Mathes. “Our objective is not to come in and immediately implement change. We want to build on what has already been successful within the local market and share our learned experiences. There is plenty we can learn from each other and create a much better organisation.” Mathes says that Convergint’s view of a successful acquisition is that 1+1=3. “The end result is always much more impactful than what we anticipated,” he says. “Every acquisition brings with it an experienced leadership team, dedicated and skilled colleagues, vertical market and technological expertise. Most acquisitions are in geographies where we do not already operate, so with every acquisition, we increase our capability to serve our customers much better.” Also, the network of Global Convergint Technology Centres (CTCs) helps expand clientele, and the Convergint Development Centre (CDC) offers new support capabilities allowing acquisitions to grow at a very high rate. Expanding service Are there more acquisitions to come? Mathes says Convergint is always open to further expanding its footprint across the globe, improving its ability to service customers, deepening their technical expertise, and continuing to expand service offerings across the current and new vertical markets. However, the current focus remains on several key factors: service to colleagues, customers, and communities. “While obviously, acquisitions fuel our growth, the addition of these organisations to Convergint has really improved our ability to service clients on a global basis,” says Mathes. Acquiring ICD Security Solutions in Asia, for example, made Convergint a pioneer in that market for U.S.-based multi-national companies. Meeting customers demand “Convergint does not weigh market conditions when making an acquisition decision,” says Mathes. Rather, they are primarily focused on meeting or exceeding their customer’s needs on a local to a global level. They see acquisitions as a potential way to extend their geographic reach so they can be closer to customers. An acquisition might also expand technological or vertical market expertise. “The end goal is for us to enhance our service capabilities by attracting and retaining talented colleagues and leaders to better service our customers,” says Mathes. Enhancing and expanding services Convergint identifies how to leverage the expertise to further enhance and expand current service options “Economies of scale” have not been a consideration. They have never sought to acquire companies and restructure them in the process, for example. Rather, each company brings forth a unique skillset, is carefully vetted by the executive team, and provides purpose in the company's mission and vision for the future.” “Frontline colleagues are Convergint’s most valuable assets,” says Mathes. Rather than restructuring and eliminating skilled, knowledgeable colleagues, Convergint identifies how they can leverage the expertise to further enhance and expand current service options for customers. “Our colleagues and their skill sets are our competitive advantage—they remain an essential element to our success,” says Mathes. Demand for integrator services “We continue to experience a growing demand for innovative solutions across electronic security, fire alarm, and life safety,” says Mathes. “As companies innovate further and rely on technologies such as artificial intelligence, cybersecurity, IoT, and cloud solutions, we expect to see an increased demand for integrator services. Our customers demand a local service provider who is responsive and can meet their needs, which is why Convergint aims to be its customers’ best service provider.” This year, Convergint is celebrating its 20th anniversary. In 2021, they will continue to focus on the same critical components that have dominated since day one taking care of colleagues, customers, and the communities where they operate.
The coronavirus pandemic had a monumental impact on all aspects of the business world, including the security industry. However, amid the gloom and doom, many security professionals also saw opportunity: New ways the industry’s products could be applied to address the challenges of coping with the virus. This article will review some of those opportunities, based on our reporting throughout the year and including links back to the original articles. During and after the pandemic, security systems are an important asset when it comes to helping to keep occupants and buildings safe as employees return to work. For example, video analytics can provide insight into how spaces have previously been used and can help to predict where and when occupants encounter each other or congregate. Role of thermal cameras These foot-traffic patterns can inform settings for a variety of devices - like ventilation and temperature controls - and even help owners create social distancing plans and monitor personal protective equipment (PPE) compliance. Thermal surveillance, a mainstay of traditional physical security and outdoor perimeter detection, began being deployed early in the pandemic to quickly scan employees, contractors and visitors as part of a first line of defence to detect COVID-19 symptoms. These systems provide flexibility and can offer integrations with multiple VMS platforms and access control devices These systems provide flexibility and can offer integrations with multiple VMS platforms and access control devices. Thermal cameras can be a tool for detecting fever, but any use of the technology for this purpose is full of qualifications and caveats. Importantly, how the camera system is configured makes all the difference in whether temperature readings are accurate, and the downside of inaccurate readings is obvious - and potentially deadly. Temperature detection systems FDA guidelines limit how the cameras are used, not to mention guidance from other regulatory/government bodies such as the CDC. One of our Expert Roundtable panelists compares the market to a “wild west scenario,” and almost all the panelists are clear about how customers should approach the market: Buyer beware. There are many companies jumping into selling temperature detection systems to the state, local governments, hospitals, airports and local businesses, but do they know how to drive one? Anyone can get behind a car and drive it into a wall by accident. The same can happen with a temperature detection system. Customers need to know what questions to ask to ensure they maximise the accuracy of body temperature detection systems. Rise of contactless Spread of the novel coronavirus has jolted awareness of hygiene as it relates to touching surfaces such as keypads. No longer in favor are contact-based modalities including use of personal identification numbers (PINs) and keypads, and the shift has been sudden and long-term. Both customers and manufacturers were taken by surprise by this aspect of the virus’s impact and are therefore scrambling for solutions. Immediate impact of the change includes suspension of time and attendance systems that are touch-based Immediate impact of the change includes suspension of time and attendance systems that are touch-based. Some two-factor authentication systems are being downgraded to RFID-only, abandoning the keypad and/or biometric components that contributed to higher security, but are now unacceptable because they involve touching. "Users do not want to touch anything anymore,” says Alex Zarrabi, President of Touchless Biometrics Systems (TBS). Facial recognition system Another contactless system that benefits from concerns about spread of COVID-19 is facial recognition. New advancement in software, specifically in the areas of algorithms, neural networks and deep learning and/or artificial intelligence (AI), have all dramatically improved both the performance and accuracy of facial recognition systems, further expanding its use for an increasing number of applications. A low-tech solution - the face mask - became a leading preventative measure during the pandemic. But, a high-tech solution is necessary to ensure that everyone is wearing them. Cameras powered by artificial intelligence can now identify whether or not people entering a facility are wearing facemasks and help enforce adherence to mask mandates. This technology is proving to be a cost-effective solution that reduces risks of confrontations over masks policies and gives managers the data they need to document regulatory compliance and reduce liability. Smart video analytics Other technology approaches, including artificial intelligence (AI), were also brought to bear during the pandemic. The German data analytics powerhouse G2K, for example, has developed a Corona Detection and Containment System (CDCS) that is ready for immediate use in record time. Detection takes place in combination with AI-supported data analysis to specifically identify virus hotspots and distribution routes, as well as to identify other potentially infected persons. One specific AI application fuels the reopening of the world and successfully keeps the spread of the virus abated One specific AI application fuels the reopening of the world and successfully keeps the spread of the virus abated. A “collaborative security” application includes a synthesis of smart video analytics, facial recognition, object identification/detection, and thermal cameras that can support the reopening of businesses globally when installed within those facilities frequented by customers. Enforcing social distancing Several applications have been successful to date and will increase in usability in the foreseeable future, creating “smart cities” working together towards a safer, more secure world. The site of one pilot programme is the 250,000-square-foot HID Global facility in Austin. For the pilot programme, 80 HID Location Services readers were installed in a wide area in the facility, including a variety of environments. Initially 30 badges and 30 fobs, all BLE-enabled, were issued to employees. If a badge identifies another nearby beacon (suggesting a social distancing failure), it emits a blinking LED light, which can be seen by the offending co-worker. To ensure social distancing, a Bluetooth Low Energy (BLE) beacon is emitted from an employee’s fob (or from a badge that has the same functionality). The beacon communicates peer-to-peer with a beacon emitted by another employee’s fob or badge to alert if the location of the two employees is less than six feet apart. For contact tracing, the beacons communicate via a nearby “reader” (a BluFi BLE-to-Wi-Fi gateway) to the Bluzone cloud-based software-as-a-service. COVID-19 white papers In addition, we published several White Papers in 2020 that addressed various aspects of the coronavirus pandemic. They included: The top five security lessons learned that apply across all industries navigating COVID-19. Using video analytics to keep staff, visitors and customers safe by enforcing social distancing. How antimicrobial treatment on door handles and levers can reduce disease spread. How companies can put in extra precautions that will continue to grow and adapt with their environment over the long-term. Determining the practicalities and capabilities of today's thermal cameras to accurately detect body temperature.
Close collaboration with customers has been a hallmark of the physical security industry for decades. And yet, less ability to collaborate face-to-face to discuss customer needs has been a consequence of the COVID-19 pandemic. “True innovation, which comes from close collaboration with customers, is more difficult to achieve remotely,” said Howard Johnson, President and COO, AMAG Technology, adding “Not being able to visit in person has not been helpful. Kurt John, Chief Cyber Security Officer at Siemens USA, adds “We need to plan intentionally with a strategic approach for collaboration and innovation.” Securing New Ground virtual conference Security experts from three manufacturers reflected on the impact of COVID-19 on the physical security industry Security experts from three manufacturers reflected on the impact of COVID-19 on the physical security industry at a ‘View from the Top’ session, during the Securing New Ground virtual conference, sponsored by the Security Industry Association. Their comments covered business practices during the pandemic and the outlook for technology innovation in response. “We had to pivot quickly on business models and create a cross-portfolio team task force to discuss how we can leverage technologies to help customers [during the pandemic],” said John, adding “We are having outcome-based conversations with customers about their businesses and operations, and how we can combine short-term benefits with long-term growth and flexibility.” But some of those conversations are happening from a distance. Results-oriented approach in remote work environment After the pandemic took hold, Siemens shifted rapidly to remote work and embraced other infrastructure changes. “We had to refocus and lead with empathy, flexibility and trust,” said John, adding “We gave our staff flexibility to set their hours and used a results-oriented approach.” There is also a social element missing in the work-from-home model. “Virtual coffee machines do not replace being there in person,” said Pierre Racz, President and CEO, Genetec, adding “Small talk about the weather is important psychological elements.” Positives in using multi-factor identity management He predicts that, in the future, office hours may be reduced, but not floor space, with space needed for in-person collaboration and long-term social distancing. Employees will come to the office to do collaborative work, but can work from home to accomplish individual tasks that may be ‘deferred’ to after-hours, when the kids have been fed. When the pandemic hit, Genetec had resumed 95% of their operations within 36 hours, thanks to their use of multi-factor identity management. They did not suffer from malware and phishing issues. “Multi-factor is really important so that well-engineered phishing campaigns are not successful,” said Pierre Racz. Shift to ‘Zero Trust’ model All three panelists noted a coming skills gap relating both cyber security and systems integration Remote working technologies are shifting to a ‘zero trust’ model, in which access to systems is granted adaptively based on contextual awareness of authorised user patterns based on identity, time, and device posture. For example, an office computer might have more leeway than a home computer and a computer at Starbucks would be even less trusted. The approach increases logical access security while providing users their choice of devices and apps. Skills gap in cyber security and systems integration A growing skills gap has continued throughout the pandemic. “Where we have vacancies, we have struggled to find candidates,” said Howard Johnson. All three panelists noted a coming skills gap relating both cyber security and systems integration. New technologies will clearly require new skills that may currently be rare in the workforce. Cyber security will become even more important with growth in new technologies such as AI, machine learning, 5G and edge computing. A workforce development plan is needed to address the technologies and to enable companies to pivot to new business needs, said John. Adoption of temperature sensing solutions From a technology viewpoint, Johnson has seen attention shift to the reception area and portal, away from touch technologies and embracing temperature sensing as a new element. There have also been new requests for video and audio at the portal point, to create methods of access and egress that do not require security personnel to be present. “Some customers are early adopters, and others are waiting for the market to mature before investing,” Howard Johnson said. “Security companies have been faced with the need to respond rapidly to their customers’ needs during the pandemic, but without seeming like ‘ambulance chasers’,” said Pierre Racz. In the case of Genetec, the company offered new system capabilities, such as a 'contamination report', to existing customers for free. Move to a hybrid and flexible work environment In the new normal, the pendulum will swing back to the middle with more flexibility and a hybrid approach" An immediate impact of the pandemic has been a reduction in required office space, as more employees have worked from home, raising questions about future demand for office space. “The pendulum tends to swing to the extremes,” said Kurt John, adding “In the new normal, the pendulum will swing back to the middle with more flexibility and a hybrid approach.” “Users will be much more careful about letting people into their space, which requires more policies and procedures,” said Lorna Chandler, CEO, Security by Design, who participated in a panel at Securing New Ground about how the pandemic is changing commercial architecture and access control. “Users should also be careful in the rush to secure premises from COVID-19 that they don’t violate HIPAA laws or create other potential liabilities,” adds Chandler. Continuum of mechanical and electromechanical devices Mark Duato, Executive Vice President, Aftermarket, ASSA ABLOY Opening Solutions, said a “Continuum of mechanical and electromechanical devices is needed to protect premises and ensure convenient operation of an access control operation.” “First and foremost, the immediate reaction to the impact of COVID-19 is to rush to educate and invest in technologies to increase the ability to analyse people,” said Duato, who also participated in the access control panel. Shift to touchless, frictionless access control “The move to touchless, frictionless access control “is really a collaboration of people, process and technology,” said Valerie Currin, President and Managing Director, Boon Edam Inc., adding “And all three elements need to come together. Touchless and frictionless have been in our market for decades, and they’re only going to become heightened and grow. We’re seeing our business pivot to serve markets we have not served in the past." More and more data is a feature of new systems, but is only helpful when it is analysed. “We all live in a world of data, or IoT and sensor technology,” said ASSA ABLOY’s Mark Duato, adding “But we don’t want to be crushed by data. Data is only helpful when you can reduce it to functional benefits that will help us innovate. We have to take the time to squeeze the value out of data.”
Domino's Pizza is one of the largest and fastest growing food service company in India with a network of 850+ restaurants in more than 200 cities. The Pizza delivery expert is a renowned provider of the organised pizza market with 70% market share in India. With its most famous half an hour delivery strive, Domino's Pizza marks the importance of communication and time growing towards its vision of exceptional people on a mission to be the best pizza delivery company in the world. Today's retail supply chain executives are moving more products farther and faster than ever before. Communication is a critical parameter when it comes to the Pizza industry as it directly affects, delivery on time, order noting, supply chain relationship and most importantly food management process. In the era of fast life, demanding consumers putting pressure on the supply chain process, Domino's Pizza required all its branches to work in synchronisation managing food delivery on time. Advanced communication system The major challenge was to connect multiple branch offices with headquarters for day-to-day communication. Following it, Domino's Pizza also required 30+ lines as a trunking solution for voice calling at all the branch offices with minimum infrastructure cost. Products And Solutions Offered: Matrix and its channel partner Sun Line Communications Systems worked together and provided an IP enabled PBX solution - ETERNITY GE for all multi-site telephony needs of Domino's Pizza. ETERNITY GE is an advanced communication system offering convenient features and flexible functionalities in line with the changing needs of organisations. The reliable architecture and easy to use platform delivers the unmatched performance to meet the needs of controlling costs and managing operational expenses. ETERNITY GE supports any combination of TDM, IP, GSM PRI trunks and subscribers along with networking of multiple systems across locations. Centralised management of IP-PBX System With IP telephony, Domino's Pizza saves telecom costs by any call placed between head office and branch offices Peer-to-Peer connectivity over IP between IP-PBX at HO and 15+ ETERNITY GE located in branch offices for seamless connectivity. With installation of 15+ ETERNITY GE at branch offices, Matrix connected all the locations with head office over IP to provide seamless integration all over India for Domino's employees for quick connectivity. With IP telephony, Domino's Pizza saves telecom costs by any call placed between head office and branch offices. IP telephony feature of ETERNITY GE provides simple 3-digit dialling, call transfer, conference, voice mail access and other call management features for inter-branch communications With the requirement of 30+ trunks at every branch location for voice calling, PRI acts as a perfect network to not only save telephony cost but also saves cabling cost as 30 channels are offered on a single line. Unified communication for workforce With the web based Remote Management feature, all the systems can be centrally managed by the IT administrators from a single location without visiting any branch offices. Innovative SPARS M2S - Mobile Softphone application enables supervisors to carry office extensions wherever they go. They can reach each other by simply dialling an extension number or browsing through the corporate directory. Enhanced collaboration with video calling, instant messaging and presence sharing, voice mail features. Results : Unified Communication for workforce collaboration and better customer responsiveness Low terminating cost of PRI lines as compared to analogue lines for each user Reduced call traffic as high as 40% Future-proof solution with scalability for further expansion plans
Johan Cruijff ArenA will utilise innovative video analytics to improve visitor flow, optimise parking utilisation and offer fans an anonymous way to provide feedback about the stadium experience, among other uses. The Security & Safety Things IoT platform for smart cameras will integrate into the ArenA’s operational software to provide key insights into stadium operations and ongoing health and safety measures, especially useful since the pandemic. The partnership will provide a potential model for other organisations looking to deploy technology solutions to safely reopen. IoT platform for smart cameras Security and Safety Things GmbH and the Johan Cruijff ArenA are partnering up and will deploy S&STs IoT platform for smart surveillance cameras to enhance overall fan experience, optimise ArenA operations and increase visitor security and privacy. The ArenA is home to AFC Ajax and the internationally renowned Amsterdam Innovation ArenA (AIA), a living lab established by the ArenA and the City of Amsterdam to enable development and testing of innovative stadium and smart city solutions. Security & Safety Things IoT platform S&ST IoT platform and network of cameras is integrated into the ArenA’s dashboard software The Security & Safety Things (S&ST) IoT platform and network of cameras is integrated into the ArenA’s dashboard software to provide information and analysis for safety and security as well optimisation of stadium operations and visitor engagement. “Every technology selected for our innovation environment is strategic because of the potential benefits not only to our ArenA, but to the City of Amsterdam and other stadiums and large event venues seeking technological solutions to help to re-open safely and operate their facility more intelligently,” said Sander van Stiphout, Director International, Johan Cruijff ArenA. Sander van Stiphout adds, “The unique flexibility of the Security & Safety Things approach enables us to simultaneously deploy COVID-19 health and safety analytics along with business optimisation tools and easily re-equip the cameras with other analytic applications as our needs change.” AI-enabled video analytic applications A series of smart cameras on the S&ST IoT platform are installed in key areas throughout the stadium. Using specialised, Artificial Intelligence-enabled video analytic applications from the S&ST Application Store that run directly on each camera, each device will provide the ArenA with valuable operational insights. When the stadium reopens, crowd detection analytics will monitor social distancing compliance and visitor flow around entrances and food or merchandise kiosks. License plate recognition cameras will assist with real-time occupancy monitoring for parking and traffic flow optimisation. Queue detection applications Queue detection applications can be employed to reduce visitor wait times by directing fans to less busy areas and by providing the insights required to optimise staffing levels at peak times. In one specific area, a camera also provides the ability for visitors to provide feedback about their stadium experience in an anonymous and contact-free way by detecting the visual of a ‘thumbs-up’ or ‘thumbs-down’ from a visitor, collecting only the rating without disrupting people flow. Smart camera platform We’re honoured to be joining the Johan Cruijff ArenA as an innovation partner" “The flexibility of our smart camera platform and the ArenA’s mission of innovation are very well matched to produce the intelligence necessary to address real world issues of privacy, health and safety but also new and creative ideas for stadium and event management,” said Hartmut Schaper, Chief Executive Officer (CEO), Security & Safety Things GmbH. Hartmut adds, “We’re honoured to be joining the Johan Cruijff ArenA as an innovation partner and to help them provide a seamless and safe visitor experience.” Smart surveillance camera system The camera system and how it is used complies with all European and Dutch privacy regulations. Furthermore, there are various advantages to this camera system, when it comes to privacy. These cameras are equipped with powerful processors that analyse the images directly on the camera, reducing the need for a constant video stream to be passed on to a central location, where it can be monitored or further processed. Instead, the cameras can be configured to send only the information about relevant events such as when a long queue is forming, groups of people gather too closely, or individuals are not wearing face coverings as required. Only then will respective images be passed along. This reduces the processing of visitors’ personal information to an absolute minimum as opposed to a traditional set-up where all footage is transmitted and centrally processed at all times.
HID Global, a globally renowned company in trusted identity solutions, has announced that the American School of Guatemala has selected its Seos credential technology to modernise its physical access system. Enhanced campus security The solution significantly improves campus security and traffic efficiency for students and parents, along with enabling staff to easily issue and manage access credentials. “We’ve significantly improved the management of vehicle traffic by reducing the time it takes for parents to access the parking lot. We’ve been able to improve evacuation and emergency processes for our students and staff,” said a spokesperson for the Security Office, American School of Guatemala. Seos credential technology The spokesperson adds, “And, best of all, we have an automated system to manage the entry and exit times of our employees to know where everyone is located on our large campus.” The American School of Guatemala is a private K-12 college preparatory school in Guatemala City, Guatemala. The school partnered with local security integrator, Grupo RQM and HID Global to replace its legacy system, which consisted of written documentation and fingerprint logs. HID readers installed at access points The new system includes HID readers installed at pedestrian and vehicle access points The new system includes HID readers installed at pedestrian and vehicle access points and 1,500 Seos smart cards issued to students, parents and staff. In addition to automating and streamlining access to the school’s buildings, the solution has led to a reduction in the average student drop-off time from 40 to 18 minutes. The school also launched a pilot with HID Mobile Access to allow secure access to the school’s parking lot via mobile IDs stored on smartphones. To gain entry, users simply drive up and hold their mobile phone to a reader, an important feature since most students travel in bulletproof armored vehicles that lack the ability to lower windows. Upgraded security and authentication solutions “The American School of Guatemala’s access control system has all the hallmarks of HID’s industry-renowned security and authentication solutions,” said Harm Radstaak, Senior Vice President and Head of Physical Access Control Solutions with HID Global. Harm Radstaak adds, “From flexibility and security to ease-of-use, HID’s unique combination of forward-looking technology and intuitive design helps create a robust solution that fortifies the school’s campuses and elevates the user experience.” Due to the successful deployment, school officials plan to replace its traditional key system with Seos smart cards for additional use cases, such as library and student payment services.
AZ Alma was a brand new hospital, created by merging two other hospitals. It needed an access control system that could cope with the demands of high levels of employees and visitors, varying access rights and the flexibility to respond in emergencies. The new hospital also had a vision of being completely keyless. Opportunities offered by AEOS AZ Alma installed Nedap Security Management’s AEOS access control system and implemented several useful features. LEDs on readers, for example, instantly show nurses which rooms they can’t access. AZ Alma installed Nedap Security Management’s AEOS access control system By integrating Mace readers, AZ Alma can give patients a QR code that gives access to parking, doors and elevators, so they can go straight to the right department. And, in line with its keyless vision, even the electrical cabinets have card readers. Key benefits High security & convenience Significant time and money saved by going keyless Option to trigger emergency settings that change access rights immediately Use of QR codes increases convenience for patients Easy to allocate and manage access rights, even for high volumes of people Freedom to integrate a specific choice of readers and other hardware Future-proofed access control that can be easily extended and adapted AEOS access control system AEOS access control system, developed by Nedap Security Management, is a software-based access control system, operated via a web-based dashboard, offering remote log-in from anywhere to control and monitor access. To add more functionality to the system, users can simply select extra options from their access control software. As AEOS is built on open standards, it integrates with a wide range of technologies, including video monitoring and biometric readers. And it has the flexibility to scale easily, so users can build and grow their access control system.
Aeroturn LLC, a globally renowned turnstile manufacturer that offers 100% Made in the USA turnstiles, has announced that it has been selected to deploy its turnstiles by one of the nation’s largest family housing finance leader. Contactless biometric technology Currently, the multiple building campus consists of five buildings and is in the middle of a major security upgrade that includes the latest contactless biometric technology. The finance lender was looking for a turnstile manufacturer who was up to the challenge of developing a customised solution that could integrate easily with brand new biometric facial recognition readers with high throughput capabilities. Aeroturn was the clear winner and joined forces with Siemens to ensure a successful deployment. Aeroturn also designed, fabricated, and delivered a single lane test rig prior to the project commencement to help with a seamless integration to the new biometric technology. Aeroturn X-wing turnstiles Aeroturn has been working closely with Siemens to ensure a seamless installation of our X-wing turnstile" “We are thrilled to have been selected by this financial giant for this important upgrade as the best turnstile solution in the industry to meet their security needs,” states Michael Stoll, Vice President of Technical Sales & Marketing at Aeroturn. Michael adds, “Aeroturn has been working closely with Siemens to ensure a seamless installation of our X-wing turnstile, which offers durability, reliability our 5-year warranty & zero maintenance mechanisms, and a 10 million passages guarantee.” Customised biometric reader interface The project currently consists of 15 lanes of Aeroturn X-wing turnstiles with a customised biometric reader interface being installed within a one-year timeframe. Additional HQ buildings are in the initial specifying stages. Aeroturn continues to raise the bar on quality turnstile solutions and help high-profile facilities in multiple vertical markets improve safety and security.
Singapore’s Changi Airport Group, one of the most innovative and technologically advanced airports in the world, has selected Genetec, Inc. (Genetec), a globally renowned technology provider of unified security, public safety, operations, and business intelligence solutions to enhance and upgrade its security system. Genetec Security Center The three-year project, which is expected to be completed by the end of 2023, will see Genetec Security Center, a unified security platform that blends IP security systems within a single intuitive interface, underpinning the airport’s security operations, with a specific focus on the video surveillance system across its terminals. The contract for Changi Airport Group was awarded to Genetec following a rigorous competitive tender process. “Increasingly, our airport customers are understanding the deep business insights that Genetec Security Center is capable of delivering, its ability to inform and create value for multiple areas of an airport business operation and improve the overall passenger and employee experience,” said Giovanni Taccori, Commercial Lead Transportation, APAC at Genetec, Inc.
Round table discussion
Retrofit projects provide new levels of physical security modernisation to existing facilities. However, retrofits come with their own set of challenges that can frustrate system designers and defy the efforts of equipment manufacturers. We asked this week’s Expert Panel Roundtable: What are the biggest challenges of retrofit projects, and how can they be overcome?
Ten years is a long time, but it seems to pass in an instant in the world of security. In terms of technology, 2010 is ages ago. Changes in the market have been transformative during that decade, and we called on our Expert Panel Roundtable to highlight some of those changes. We asked this week’s panelists: What was the biggest change in the security industry in the 2010-2019 decade?
Products are the building blocks of the security industry. Historically much of the industry’s sales effort has been focused on highlighting product features and functionality. At the end of the day, however, an end user is less interested in the performance of any individual system component than in the system as a whole. Lately, the industry has embraced a changing sales approach by emphasising systems rather than products. We asked this week’s Expert Panel Roundtable: What are the benefits of a transition from selling security products to selling security solutions?
How to ramp up perimeter security with license plate reader technologyDownload
Solve access control challenges in the healthcare sectorDownload
Shifting trends in operation centers and control rooms for 2021Download