LOCKEN’s latest innovation in cable free access control, powered by contactless technology, wins certification from health & safety regulator ATEX, in accordance with new explosive atmosphere requirements. Approved to ATEX II 2 G Ex ib IIB T4, the solution is suitable for gas delivery and regulation stations, specific hydrocarbon processing and distribution infrastructures and chemical factory enclosures. It is also suitable for areas where an explosive mixture of gas, vapour or mist...
Shepherd Lock, a new keyless smart lock for the home, launched on Kickstarter. Shepherd Lock uses the same technology found in the automotive industry and is the first smart lock that detects lock-picking attempts to protect homes against burglaries. Shepherd Lock is equipped with a keyless entry system, making it convenient to enter the home. The lock’s automotive grade touch™ technology allows users to unlock their door with just a touch. Shepherd Lock also transforms existing loc...
DHF has announced the launch of its Best Practice Guide entitled: How to obtain Key Copy Protection: security and protection advice regarding copying of keys which offers information on minimising the risk of a security breach by preventing the unauthorised copying of keys. To copy a key, it is necessary to obtain a suitable key “blank” onto which the individual key code can be copied. Many generic key blanks are readily available to UK locksmiths and key cutters, making obtai...
Synectics commences the roll-out of Synergy 3 2019, the latest release of its command and control platform for demanding surveillance and security environments. Introducing enhanced customisable mapping, camera management, and third-party integration capabilities, the feature-rich platform is the most customer-centric iteration of the software to date and aims to make the Synergy 3 experience more user-friendly. The new release will be available across Synectics’ key markets, spanning tra...
Honeywell announces the launch of new category of software, Enterprise Performance Management for Operations Technology, that will improve the way a variety of companies collect, analyse and act on data from their operations. The software solution, called Honeywell Forge, will leverage the company's more than 100 years of expertise in asset and process control technology and will transform the way work gets done by owners and operators of buildings, airlines, industrial facilities and other crit...
Morse Watchmans, the industry pioneer in key control and asset management systems, is showcasing the benefits of their KeyWatcher Touch and AssetWatcher key and asset management solutions at IFSEC International 2019 (stand no. IF620) in London, from June 18-20. The company is also introducing KeyWatcher Fleet, a key control system specifically for fleet management, to IFSEC attendees. “We’re thrilled to once again showcase the exciting features of our AssetWatcher and KeyWatcher Tou...
PAC & GDX, providers of access control and door entry solutions, are showcasing the range and depth of their innovative technology on Stand IF2930 at IFSEC International 2019. From a single door installation to a fully integrated network based system, the company’s extensive portfolio provides unbeatable reliability and robust functionality, at a price point that enables installation in a diverse range of residential and commercial buildings. In order to provide integrators and end users with the highest level of flexibility and ease of operation, PAC & GDX have joined forces with STid, the principal manufacturer of instinctive, contactless security technologies. NFC based readers By incorporating STid’s Bluetooth and NFC based readers with PAC or GDX controllers, a mobile phone can be used to gain access. To enjoy all the benefits of a handsfree option, all an individual has to do is tap their phone twice and the Bluetooth signal is sent to the reader to unlock a door. By downloading the STid app a virtual credential can be configured in a smartphone wallet By downloading the STid app a virtual credential can be configured in a smartphone wallet, allowing the user to have multiple virtual ‘keys’ for different areas or sites. The system can also be configured to use proximity based near field communication (NFC) instead of Bluetooth, or a combination of the two. Furthermore, it is available with a PAC or PAC 64 output and, when using a PAC 512 or PAC 212 access controller, two readers can be connected to provide true read in/out from a single channel. Access control systems Also on display is the PAC Residential Cloud solution, which leads the way in allowing organisations to remotely manage and monitor their access control systems in a secure, modern and cloud based environment. Users can address technical issues, deal with key fob management, view status, set and unset a system, and gain access to an event log more easily than ever before – all from a remote location. Various site communication options are available including PSTN, GSM and GPRS and it can be configured and managed via a smartphone, tablet or PC. At IFSEC PAC is demonstrating how Residential Cloud can be integrated with 3xLOGIC cameras to provide a fully hosted solution, which is perfect for the residential sector. This system allows designated personnel to be notified if, for example, a door is forced or left open. Network switches By sending an alarm to the camera, it starts to record and transmits images to a mobile device via a push notification. This allows the system to provide vital information that elicits a fast response and immediate action. With an optional camera, a backlight LED to provide clear visitor images in low light levels Sharing the limelight with STid and Residential Cloud is GDX7 – a next generation IP based door entry system that offers integrated access control for up to 1,000 keyholders using a standard two-core cable. With an optional camera, a backlight LED to provide clear visitor images in low light levels, and an inbuilt reader, GDX7 has an incredibly high level of functionality and enables integrators to install an IP system without being skilled in IT or familiar with network switches. Identification devices The GDX7 door entry panel can be provided with multiple button options, including those that meet the requirements of the Equality Act, and its readers and identification devices have also been approved by Secured by Design – a police service initiative that aims to improve the security of buildings. Already a huge success, GDX7 has a new seven-inch apartment station and a new landing card, which enables it to provide up to 96 handset connections. It too has recently been augmented with STid integration providing property owners, engineers or contractors with a flexible way of gaining access to remote properties. “PAC & GDX are driven by constant innovation and the desire to push the boundaries of what’s possible with access control,” commented David Hughes, the company’s global product manager. “We also pride ourselves on our customer service and technical support, which includes the provision of a new online training platform that offers a great way to get the most out our products.”
SimonsVoss Technologies GmbH, part of the Allegion group - a pioneer in digital locking and physical access control systems - enters a technology partnership in Europe with Morphean. The new technology partnership, that will utilise SimonsVoss’ digital access control system SmartIntego, extends Morphean’s cloud-based capabilities beyond video surveillance and into the access control-as-a-service (ACaaS) market, forecast to reach US$2.8b by 2024. Integrated security system We are seeing considerable growth in demand for wireless locks" The secure Morphean platform informs decision making and drives efficiencies for organisations by generating unique and actionable insights from a multitude of data sources. The combination of an integrated security system hosted in the cloud that now combines video surveillance and access control promises not only greater security with two factor authentication but also a wealth of rich data. This will help businesses optimise operations and processes, such as by gaining greater insight into customer and employee behaviours or how office space is utilised. Martyn Ryder, VP Sales & Marketing at Morphean says, “We are seeing considerable growth in demand for wireless locks so we welcome this timely agreement to partner with SimonsVoss. This will allow us to extend our current access control offering and meet growing market and customer demand for both wired and wireless locking solutions via our cloud managed access control solution. The powerful combination of video security and access control as-a-service will bring many operational and business benefits for our customers across Europe and beyond.” Access control data The advance of smart cities, a more stringent regulatory environment and rising crime rates are some of the factors behind the appeal of ACaaS and outsourcing access control functions to guarantee accurate maintenance of key cards. Digital access control systems are valued highly in security technology for buildings" With this system set up, only access control hardware systems are deployed on premise while the software and access control data are shifted to a remote location and provided as a service to users on a recurring monthly subscription. The benefits of such an arrangement are numerous but include avoiding large capital investments and shifting the onus of cybersecurity and firmware updates to the vendor. “Digital access control systems are valued highly in security technology for buildings,” commented Evert te Pas, International Sales Manager at SimonsVoss. Snap-in installation “SmartIntego by SimonsVoss is a state-of-the-art digital access control solution that is easy and simple to deploy into existing physical and digital infrastructure such as doors and IT networks. The cable free and snap-in installation means it is compatible with most doors with no drilling of holes, so is scalable and flexible without limitation.” Morphean’s ACaaS system utilises door controllers from Axis Communications, namely the AXIS A1001 and the AXIS A1601, that serve as the interface between the cloud and the SimonsVoss’ SmartIntego system. Stephanie Hensler, Director Business Development at Axis Communications, said, “Axis is totally committed to this market and creating innovative solutions based on its open standards that allow partners to integrate different types of software and hardware for a fully scalable, flexible and future proof solution. We look forward to working even more closely with Morphean.” Morphean will be attending IFSEC 2019, 18-20 June, ExCel, London (Axis stand IF920).
Cable-free access control provider, LOCKEN has launched a new website, which reflects its position as a market pioneer, showcasing its expertise and commitment to innovation and future technologies. Following the company’s merger with ISEO, LOCKEN is increasing its activity within new and emerging markets and is continuing to create innovative solutions that are tailored to its clients’ individual demands and requirements. Industries served by LOCKEN With 15 years’ knowledge and experience, the new website provides information about the variety of specialist industries which LOCKEN services, including water, utilities, telecoms, transport and local government. Testimonials from some of LOCKEN’s flagship clients demonstrate the international reach of its expertise and the ability to meet customer requirements. Catherine Laug, Marketing & Communication Manager at LOCKEN explains: “Our new website is the face of our commitment: there, you'll find all of our specialist industries, customer testimonials and our software solutions, product ranges and news.”
Percepto, the global market provider for autonomous industrial drone solutions, announces that it will operate and broadcast live overseas autonomous drone missions from its stand (IF2146) at IFSEC International 2019 in London. The company will also launch the next generation of its industrial and enterprise grade drone-in-a-box system solution, including new software improvements and enhanced all-weather base station. This is the first time that Percepto, which last week announced a Round A completion, has brought its autonomous drone solution to the UK and Europe's leading security event. The company will give security practitioners the opportunity to discover how the technology can be used to improve security and safety, reduce risk and optimise operations. Aerial surveillance On Wednesday 19th June at 11.00am, Percepto will host an exclusive media event to get up-close to the Percepto Solution and watch a live broadcast of an autonomous drone mission being carried out in Israel. There will also be a question and answer session with the Co-Founder and Chief Commercial Officer of Percepto, Ariel Avitan, who comments: “We will demonstrate how the Percepto solution delivers aerial surveillance through patrols, real-time detection and tracking of humans and vehicles, as well as anomaly detection, all without the need for an on-site operator or pilot.” Sparrow drones can also be used as first responders when launched on-demand by an operator Visitors to IFSEC International will witness how our Sparrow drones take-off automatically to perform pre-scheduled missions such as patrolling a perimeter. Should a drone detect an object of interest (i.e. a person or a vehicle in a restricted area), an alert is automatically triggered and the control room operator is able to instantly view the real-time camera footage as the drone tracks the object. In addition, Sparrow drones can also be used as first responders when launched on-demand by an operator, or when triggered via an integrated system such as a smart fence. Fast battery charging Once a mission has been completed it returns to its base station - a highly secure enclosed weather-proof box, stationed in the field - where automated post flight checks and fast battery charging is completed, ensuring the drone is primed for the next mission. Percepto’s all new base station is a key feature of its next generation release and will be on display for the first time at IFSEC International. “Drones will become part of the fabric of security and surveillance operations,” adds Avitan. “Whether deployed stand-alone or fully integrated with the control room VMS or other security systems, Percepto provide security teams with a level of aerial surveillance that was inconceivable and unattainable for the vast majority of large enterprises until recently.”
SALTO is excited to be showcasing the latest in access control technology at IFSEC, the UK’s premier security event, taking place at ExCeL London 18-20 June. SALTO is on Stand IF2810. SVN-Flex provides access management with increased security, more convenience and at lower cost. It makes hard-wired update point’s obsolete, thus introducing completely wire-free access control with online functionalities. It provides a range of benefits to operators and end users, especially by removing the need to go to specific doors or locations to update cards. Now users can update their access rights anytime and anywhere as any wireless door can be activated as an SVN-Flex updater. Making mobile keys SVN-Flex is based on two core technologies, the SALTO Virtual Network and SALTO BLUEnet SVN-Flex is based on two core technologies, the SALTO Virtual Network and SALTO BLUEnet. Since all new SALTO escutcheons are equipped with Bluetooth for mobile access, SVN-Flex combines SVN and BLUEnet in such a way that updated access rights can be transferred wirelessly via Bluetooth to defined escutcheons and cylinders. SALTO has also strengthened its position as the cloud access provider with additional functionality in its SALTO KS app. Now, with new SALTO KS Mobile keys and any SALTO BLE lock, SALTO KS users can select a floating button in the app and just tap their smart phone on the lock to securely open a door. It enables their smart phone to operate as a tag, opening the lock without the need for an active internet connection; making Mobile Keys as secure and easy to use as a physical tag. Cloud-based technology Other innovations at the show include the brand new SALTO NEO Cylinder which is built with the absolute latest in technology. Compatible SALTO SVN, SALTO BLUEnet Wireless and SALTO KS – Keys as a Service – cloud-based technology, it enables users to decide which technology fits better with their security, operational and IT needs. The SALTO NEO Cylinder is one of the few; if not the only, electronic cylinder to be BLE enabled which makes it compatible with both with iOS and Android mobile phones. So whether you use Salto KS in a co-working space or are a student in a university that uses JustIN mobile, you will be able to use your mobile phone to get access into the door you need. Communication technology What’s really impressive is that one set of batteries can last for up to four years The SALTO NEO Cylinder will be available in a variety of local standards including European, ANSI, UK, Swiss, Australian, RIM, Deadbolts, etc. It will also be available for different applications like padlocks, swing handles for server racks, cam locks, and the like and is also IP66 rated meaning its built to withstand even the harshest environments. But what’s really impressive is that one set of batteries can last for up to four years! Joining these innovations are updates to the SALTO KS product platform, which is now more complete than ever with the integration of SALTO BLUEnet communication technology and a new opening mode based on Personal Identification Number Codes (PIN) in order to offer more convenience to users. With these new features SALTO KS now offers 4 different ways to access a building: SALTO KS tag, Mobile key, Remote opening and PIN code.
Delivering another high-value benefit to users, the Maxxess eFusion security management platform now integrates off-the-shelf and seamlessly with the widely used range of deister electronic key management systems. With this latest off-the-shelf integration, eFusion users can now manage all their keys from their centralised security management platform, reducing the risk of security breaches and streamlining their day-to-day operations. Modular and scalable, the deister electronic systems encompass a range of cabinets which can store anything from 8 keys to thousands. They can be used stand-alone or as part of a global corporate solution, in applications ranging from hotels and leisure settings to retail and up-scale residential developments. Knowing who has a particular key at any given moment significantly reduces the risk of losses and criminal activity" Reduces criminal activity “Knowing who has a particular key at any given moment significantly reduces the risk of losses and criminal activity,” says Lee Copland, Managing Director, Maxxess EMEA. “The deister electronic systems make that task much simpler. And with real-time reports logging all system usage, users can be held accountable for any misuse, theft of loss of keys – better protecting buildings and assets.” The integration with deister electronic systems is just the latest example of how the eFusion platform gives users the freedom to integrate, customise and adapt their security systems to meet both current needs and emerging risks. eFusion’s open technology software supports more than 60 off-the-shelf integrations from leading vendors, providing complete freedom to customise solutions combining surveillance, access control, fire and intruder systems with back-office processes. Making premises more secure Off-the-shelf integration between our key management systems and eFusion will deliver major benefits to customers"Crucially, integration with Maxxess eFusion also reduces complexity for installers and their customers and offers unlimited future scalability at affordable price points. “Off-the-shelf integration between our key management systems and eFusion will deliver major benefits to our customers,” says Darren Harrold, Head of UK Operations at deister electronics. “This means they can now link their essential systems together – including their surveillance, intruder, access and fire detection systems – making a wide range of premises easier to manage and more secure.” Visitors to IFSEC International can see Maxxess eFusion and deister key management in action, where both companies will be exhibiting on stand IF2120 and IF410 respectively from 18th to 20 June at London’s ExCel.
The past decade has seen unprecedented growth in data creation and management. The products and services that consumers use every day – and the systems businesses, large and small, rely on – all revolve around data. The increasing frequency of high-profile data breaches and hacks should be alarming to anyone, and there’s a danger data security could worsen in the coming years. According to DataAge 2025, a report by IDC and Seagate, by 2025, almost 90% of all data created in the global datasphere will require some level of security, but less than half of it will actually be secured. Nuanced approach to data security Security is a circle, not a line. Every actor involved in the handling and processing of data has responsibility for ensuring its securityThe rapid proliferation of embedded systems, IoT, real-time data and AI-powered cognitive systems – as well as new legislation like the European Union’s GDPR – means that data security has to be a priority for businesses like never before. With data used, stored and analysed at both the hardware and software level, we need a new and more nuanced approach to data security. Security is a circle, not a line. Every actor involved in the handling and processing of data has responsibility for ensuring its security. What this means in practice is renewed focus on areas of hardware and software protection that have previously not been top of mind or received large amounts of investment from businesses, with security at the drive level being a prime example. The importance of data-at-rest encryption In a world where data is everywhere, businesses need always-on protection. Data-at-rest encryption helps to ensure that data is secure right down to the storage medium in which it is held in a number of ways. Hardware-level encryption, firmware protection for the hard drive, and instant, secure erasing technology allow devices to be retired with minimal risk of data misuse. Data-at-rest encryption helps to ensure that data is secure right down to the storage medium in which it is held in a number of ways A recent report from Thales Data Threat found that data-at-rest security tools can be a great way to help protect your data. However, it’s important to note that this must be used in conjunction with other security measures to ensure that those that fraudulently gain access to your key management system can’t access your data. Ensuring drives to be Common Criteria compliant One straightforward test any business can do to ensure its storage is as secure as possible is to check whether the drives are Common Criteria compliantDespite the clear benefits, this kind of encryption lags behind other areas, such as network and endpoint security, in terms of the investment it currently receives. The same Thales Data Threat report found that data-at-rest security was receiving some of the lowest levels of spending increases in 2016 (44%), versus a 62% increase for network and a 56% increase for endpoint security. One straightforward test any business can do to ensure its storage is as secure as possible is to check whether the drives are Common Criteria compliant. Common Criteria is an international standard for computer security certification, and drives that meet this standard have a foundational level of protection which users can build on. Providing an additional layer of security The retail industry has seen a spate of security breaches recently, with several major US brands suffering attacks over the busy Easter weekend this year. As frequent handlers of consumer card information, retailers are particularly vulnerable to attack. Data-at-rest encryption could enhance security in these instances, providing an additional layer of security between customer records and the attacker The advanced threats retailers face can often evade security defences without detection. Such a breach could grant attackers unrestricted access to sensitive information for possibly months – some breaches are known to have been detected only after consumer payment details appeared on the dark web. These types of undetected attacks are highly dangerous for retailers, which are relatively helpless to protect consumer information once their defences have been compromised. Data-at-rest encryption could significantly enhance security in these instances, providing an additional layer of security between customer records and the attacker which has the potential to make the stolen data valueless to cyber criminals. Industries in need of data-at-rest encryption Healthcare organisations, which hold highly sensitive customer and patient information, have a strong use case for data-at-rest encryption. With the widespread adoption of electronic patient health records, that data is increasingly more vulnerable to attack. Recent research from the American Medical Association and Accenture revealed that 74% of physicians are concerned over future attacks that may compromise patient records. With the widespread adoption of electronic patient health records, that data is increasingly more vulnerable to attack The financial sector would also benefit from further investment in data-at-rest encryption, given 78% of financial services firms globally are planning on increasing their spending on critical data, according to Thales’ Data Threat Report. It’s helpful to view security as a circle in which every piece of hardware and software handling the data plays its part SMEs and enterprises are not immune to security threats either – with growing numbers of people traveling for work or working remotely, the risk of sensitive business data becoming exposed via device theft is heightened. Usernames and passwords have little use if thieves can simply remove unencrypted hard drives and copy data across. Securing every hardware and software Technology vendors often focus on aspects of hardware and application security that are within their control. This is understandable, but it risks proliferating a siloed approach to data security. There is no single line for data security -- rather, it’s helpful to view it as a circle in which every piece of hardware and software handling the data plays its part. There’s a clear need for more industry dialogue and collaboration to ensure data security is effectively deployed and connected throughout the security circle and across the value chain.
Considering how much the modern smartphone has become a common everyday tool and cultural icon, it’s hard to believe it has only been with us for a relatively short space of time. The first Apple iPhone was launched in 2007 and yet in a little over a decade the smartphone has become as essential as our keys or wallet. From its conception as a multi-faceted communications device, it has morphed into something far more integrated in our daily lives. Services such as Apple Pay, Android Pay and PayPal have seen the smartphone become a credible replacement for cash and cash cards, but equally, it is possible to replace access cards and keys as well.Smartphones can easily receive authentication credentials remotely and access can be confirmed or denied instantly The ability to accurately authenticate an individual and the applications this offers for security purposes, is something that the security industry needs to continue to embrace and further promote to our customers. Considerable advantages Most security professionals understand the potential benefits of using mobile device authentication, with flexibility being the key advantage. Smartphones can easily receive authentication credentials remotely and access can be confirmed or denied instantly. Equally, smartphones already contain many secure options to ensure they are only used by the authorised user – fingerprint and face recognition, as well as pattern authentication and PIN, being prime examples. Unfortunately, there is still a lack of awareness amongst some security operators, customers and the public of these exciting benefits. Potentially there may also be some reluctance, in certain quarters, to trusting a mobile device with physical security. A lack of trust in seemingly ‘unproven’ technology is not unusual, but the security industry needs to demonstrate reliability along with the considerable security and convenience benefits of using it. Trusted part of security network Many smart devices already securely bind the mobile device with the right person by using 2-factor authenticationMobile device security needs to earn its trust, in much the same way as any other new ground-breaking application. In fairness to the doubters, it’s not hard to imagine how much of a risk a badly protected mobile device could be to any secure network! There are two key obstacles that smartphones need to clear before they can become a trusted part of the security network though. Firstly, that they are secure enough to be trusted as part of a security network, and secondly that they can reliably identify an authorised user in a real-world environment. Many smart devices already securely bind the mobile device with the right person by using 2-factor authentication. For example, this could combine a PIN code with the fingerprint or face of the authorised individual. In areas with particularly high security, you could also implement a wall-mounted biometric reader (fingerprint, facial recognition or iris scan) to add a further level of protection and ensure there is no wrongful use of the mobile device. Security tokens or access cards are typically rigid in their programming, only allowing access to certain areas Security by location With its many and varied functions, undoubtedly one of the most useful systems on any smartphone is its GPS location tracking. It’s also a perfect tool to assist with security systems interaction.A benefit of using smart device authentication is the cost savings over operating traditional tokens Consider any secure facility – it will feature different levels of access. This can vary from a humble canteen and break-out areas, right through to secured doors around potentially dangerous or highly sensitive areas - such as plant rooms, or even a nuclear facility! Security tokens or access cards are typically rigid in their programming, only allowing access to certain areas. A smartphone, however, can be granted or denied access depending on the location of the request by the individual – GPS literally adds a level of extra intelligence to security. Personal items Using QR codes seem to be a simple but reliable identity and access control authentication option Mobile devices tend to be guarded and protected with the same concern as your money or your keys. Many of us literally carry our mobile device everywhere with us, so they are relatively unlikely to be misplaced or lost – certainly in comparison to a key card for example. Also, think about how often you use or hold your smartphone – some estimates suggest 2,600 times each day! With that level of interaction, you’ll be aware very quickly if it’s been misplaced, not least because of the inconvenience and cost to replace it. This level of personal connection makes it perfect for use with security systems. Cost savings Another obvious benefit of using smart device authentication is the cost savings over operating traditional tokens. No more plastic badges, access cards, lanyards, printers and consumables used to administer security. This is something the security industry really needs to shout about! It will come as no surprise to hear that smartphones are exceptionally common too. Figures suggest that in 2015 there were nearly 41m in use in the UK and this is predicted to rise to 54m by 2022. With the UK population being just over 65m, that is a very high percentage of people already carrying this technology. Using a resource that people already have, and which is highly secure, makes unquestionable financial as well as practical sense. GPS location tracking is a perfect tool to assist with security systems interaction Integrated technology Agreeing on common and shared open protocols has unfortunately been one of the stumbling blocks for the security industry in adapting to a predominantly smartphone authentication approach. NFC (Near Field Communications) technology in mobile phones and smart devices has failed to be the universal success it promised.Not everyone has an iPhone, but it is such an important segment of the market for customers Mobile technology trends have dictated to the systems that use it. Apple’s earlier (Pre iOS 11) decision to restrict the use of NFC to Apple Pay on its devices has had a profound effect on the implementation of NFC in other applications too. Not everyone has an iPhone, but it is such an important segment of the market that other manufacturers are wary of how customers will be able to use any new technology. We have seen a much bigger focus on using Bluetooth Low Energy technology on mobile devices instead. With providers such as HID Global, STid in France and Nedap in the Netherlands now concentrating on developing Bluetooth Low Energy readers and mobile credential applications, this seems like a highly credible alternative. Along with NFC and Bluetooth Low Energy options, there also seems to be a lot of interest in using QR codes as simple but reliable identity and access control authentication. These can easily be displayed on a screen or printed if necessary, giving great flexibility over the type of technology that is used in the future. Upgrading existing security systems There are strong arguments for many businesses to continue using MIFARE+ systems if they suit operations well We are steadily seeing the signs of smartphone authentication replacing the cards and tokens we have been familiar with. However, many consumers still want options rather than to just be railroaded down one path. A business that has invested in cards or tokens will want to use that technology investment fully. The changes will come when readers are updated – this is when security specifiers and installers need to promote the advantages of dual-technology readers, which offer options to include smartphone authentication into the mix. There is still considerable diversity amongst smart devices, the operating systems they use, and the security technology employed by each. Android, Apple iOS and Blackberry devices all vary with regards to the biometric authentication available, so security administrators may need to be flexible on the types of authentication they accept. Interestingly, card technology has also progressed at an astonishing speed too – with MIFARE+ proving to be a highly cost-effective, practical and secure system that can easily be integrated. There are strong arguments for many businesses to continue using these systems if they suit operations well. NFC (Near Field Communications) technology in mobile phones and smart devices has failed to be the universal success it promised Hybrid systems A hybrid approach may be the best answer for many security operators. This means those who choose to enjoy the benefits in terms of flexibility and convenience of smartphone authentication can do so, whilst those who are more hesitant can continue to use more traditional methods. A hybrid approach may be the best answer for many security operators Larger organisations may find that the swap over is a slower and more gradual process, whilst smaller start-up businesses may prefer to jump to a smartphone-based approach straight away. If security systems are well integrated but modular in their approach, then it becomes much simpler to evolve as time goes on. Embracing the benefits Using their app-based systems architecture, smartphones are ideally placed to evolve with security systems in the future. There are many benefits for the security industry and our customers, but we need to remember that this move will involve a culture change for many security operators and users. The security industry needs to be mindful and respectful of any anxiety, but also be positive and promote the considerable benefits mobile authentication offers.
When asked about what the market should be thinking about in 2018, I am left offering an answer that serves as an urgent call to action: prepare yourself for change! The security industry is soon likely to see a dramatic shift from the traditional segmentation of commercial and residential security. Smart phones, mobile technologies, cloud computing, and having everything provided ‘as a service’ in peoples’ lives means users of buildings have a new set of expectations. In many ways, the coming crosspollination of residential and commercial security offerings means we will have a better idea of best practices. The convenience of residential spaces will combine with the robust security of commercial facilities, for example. But this also means a higher level of demand will be placed on security integrators, facility managers and owners. Operations groups may need to change drastically to offer new technologies. Security as a service is likely to become more common. And new technologies are emerging that will facilitate this change and require new skillsets and expertise. So, what the market should be thinking about right now is: how do we all, collectively, keep up? More critical is finding ways to offer or utilise new technologies and total solutions that make operations easier Ensuring security preparedness As it stands now, in terms of physical security for doors and openings, we are currently in a world where we can secure almost anything. Be it hospital, school, file cabinet, server rack, grain silo or barn that is off the electrical grid, we have a solution for that. So being hyper-aware of your industry, its offerings, and how the products work together is important, as it means every location that needs security can have security. But perhaps more critical is finding ways to offer or utilise new technologies and total solutions that make operations easier, moving security components deeper into a building, facility or campus, and building and leveraging on partnerships where everyone is invested in the other’s success. Here are a few suggestions for addressing these issues. Training in new security solutions Perhaps the biggest change in the near term will be emerging technologies that will alter how we currently use security solutions. Be it cloud-based security, intelligent keys, new types of credentials, or simply a better software for management, the need to be well-versed on these offerings is key. To this end, it is important to not only know what offerings exist in the security world, but also be well-trained on them. Seek out a manufacturer that is willing to offer training and education on products, strategies and solutions. While it is important to secure server rooms at the point of entry, it might also make sense to provide a cabinet lock with audit capabilities on the rack or cabinet itself Identifying an end goal Further, approach the integration and implementation of these technologies with a collaborative mindset. For dealers and integrators this means utilising new technologies to better secure a facility for a client. As a building owner or manager, it means making tenant and occupant life better while streamlining your own operations. The ultimate goal of any new technology is to meet customer needs in the very best possible way. And that goal should trickle down from manufacturer to integrator to the facility manager and ultimately the end user. Don’t just implement technology for the sake of doing so. Do it with purpose by identifying an end goal and utilising these amazing solutions to achieve that. Identifying an end goal also means seeking out the core requirements a building has to provide users with the expected level of security and service. This is obviously dependent on the building, and it doesn’t always mean physically moving into a building, but rather looking at ways to move further into the operations of a business. Securing access to buildings Government facilities are undergoing a transition to security requirements dictated by the FICAM programme For some businesses, keeping server racks or file cabinets secure can be critical. And while it is important to secure these rooms at the point of entry, it might also make sense to provide a cabinet lock with audit capabilities on the rack or cabinet itself. New opportunities also fall into this category. Government facilities are currently undergoing a transition to security requirements dictated by the Federal Government’s Identity, Credential, and Access Management (FICAM) programme. FICAM sets standards for implementation of secure access to all government facilities and mandates the use of FIPS 201 Personal Identity Verification (PIV) for federal employees and contractors. This means that PIV enabled access points will be required on the perimeters, interiors and other openings. Finding ways to retrofit these affordably, efficiently and effectively means offering more secure openings on what is likely to be a tight budget. This can also apply to offsite facilities. Earlier I mentioned barns and grain silos – locations that are often left off electrical grids but can come with the need for auditing capabilities – and a solution exists for that. So, while a corporate headquarters might be under robust lock and key, it is always good to ask about other locations that could use a simple security upgrade. Personal Identity Verification-enabled access points will be required on the perimeters, interiors and other openings Establishing security partnerships Again, the best way to achieve readiness with this approach is to be aware of the market and its offerings, and to engage in collaborative partnerships. Collaborative partnerships are critical for everyone who is tasked with protecting the people and places that matter most. Manufacturers rely on the integrators and building supervisors to understand the new and developing needs in the industry. Integrators then must rely on manufacturers to provide these solutions, offer education and training, and be in constant contact about the newest technologies available. Collaborative partnerships are critical for everyone who is tasked with protecting the people and places that matter mostAnd building owners or managers must both be aware of their tenant and end user needs and demands – be it for new technologies or even seeking out sustainability solutions. In turn, they need to know they can rely on a collaborative approach from an integrator and manufacturer who is invested in their success. Industry collaboration for a secure future Again, the biggest thing we must all need to consider now is how to prepare for the future. Treading water is simply not enough in the security market anymore. New technologies and performance expectations are forcing us to consider ways to better serve our clients – whether we are a manufacturer, integrator or in charge of facilities. And the best way to do this is together. We are all invested in the success of one another, and in the people who use the places we strive to keep safe. By seeking out, developing, and cultivating these partnerships in collaboration and innovation, we are able to help one another prepare for the future that is becoming more complex, intriguing and exciting every day.
Nexkey says its mission is to disrupt the access control market and ‘change the way people experience access to physical places’. The startup is embracing the latest buzzword for access control – frictionless – while also enabling electronic access control for doors currently protected by mechanical locks. The system is simple with only three components – a controller, an electronic replacement lock core, and a smart phone app. The ‘controller’, a combined reader and access control panel, is used to connect to existing electric strikes, mag locks, electronic push bars and other hardware components at the door. It also communicates via Bluetooth with a smart phone credential. Users approach a door, choose the door they want to open in the app, and wait for the app to say ‘unlocked’. Replacing key cards and fobs with app Access rights are customised for each user, and doors can be unlocked remotely to allow a delivery guy or guest to enterThe electronic ‘core’ device can be switched out with existing mechanical lock cores to provide electronic access control in locks such as deadbolts, mortise locks, Euro-cylinders, levers and camlocks. It is compatible with 95 percent of mechanical locks, using a changeable tail piece to adapt to various configurations. The core communicates via Bluetooth with a smart phone credential that links to a cloud system. Users approaching a door open the app, tap the core, and wait for the app to say ‘unlocked’. A Nexkey goal is to ‘replace all keys, key cards and fobs with one app’. The Nexkey app recognises which ‘key’ goes to which door and reveals the right key as you approach. ‘Keys’ are created and access rights are assigned from a smart phone, using email addresses and phone numbers to verify identity. Temporary codes can be texted for one-time entrance for cleaning crews or contractors. Access rights are customised for each user, and doors can be unlocked remotely to allow a delivery guy or guest to enter the building. The Nexkey Portal provides a snapshot of system operation, who enters which door at what time, and logs that can be reviewed and downloaded for audit reports. Affordable access control systems for SMBs Nexkey is targeting the small- and medium-sized business (SMB) market, basically companies with 20 to 500 employees, which are looking for access control systems that are affordable and easier to manage. The Nexkey controller costs $999, and the core is $499. Monthly fees start at $15 to $29 per month per door, but the prices go down as additional doors are added. Nexkey is targeting the SMB market, which are looking for access control systems that are affordable and easier to manage Larger enterprises tend to want out-of-the-box integration with alarm systems and video, which Nexkey does not offer, so SMB is their “sweet spot,” says Eric Trabold, CEO. There is an API (application programming interface) that integrates with third-party applications. According to Nexkey’s customer surveys, 30 percent of customers say they bought Nexkey to have a simpler access control credential (a smart phone instead of a key, card or fob). Another 30 percent favour simplified management and quick access through the app. Some 17 percent like the ‘unified’ experience to manage shared, single and multiple workspaces using smartphone credentialing and a cloud-based system. Involving security dealers and integrators Nexkey announced a ‘dealer program’ at the recent ISC West trade show in Las Vegas, and interest was highIn the early days, Nexkey looked to work directly with businesses to foster communication and to gain understanding of how the product can best be deployed. Having gained that insight, the ‘next level’ is to engage security dealers and systems integrators to install the system, says Trabold. Nexkey announced a ‘dealer program’ at the recent ISC West trade show in Las Vegas, and interest was high. Trabold says 134 integrators/dealers sought to engage. In coming weeks, the company will be finalising that program, enhancing the dashboard to enable dealers to manage the system on behalf of their customers, for example. “We will be looking at how we can go from that amazing level of interest to being actively engaged with partners in the channel,” says Trabold. Using NPS to measure product quality Nexkey uses the Net Promoter Score (NPS) as a benchmark for how well the product is accepted in the marketplace. NPS measures the quality of a product by analysing how likely customers are to recommend it to a friend or colleague. As an example, Apple currently has an NPS of 65%. In comparison, Nexkey has achieved a score of 60 percent, and is looking to improve it even more. “A year from now, we want to get the same positive feedback from our dealer/integrator community,” says Trabold. “That’s the challenge, engaging with partners and scaling the business forward. We still have work to do.”
Wireless locks offer specific advantages for access control end users and integrators, and some of their value has yet to be realised in the market. Wireless locks expand the range of applications for electronic locks to complement traditional wired systems. They offer flexibility and scalability. They save on integrators’ labour costs. They even provide opportunities for integrators to earn recurring monthly revenue (RMR). A recent Allegion panel discussion highlighted the value, opportunities and untapped potential of wireless locks. Allegion panellists elaborated on some of the many advantages of wireless locks, including the following: Providing more system flexibility It’s a time of change in corporate and institutional environments. Customers are trying to manage a smaller operating budget with more people and more multi-use applications. Building applications are changing more frequently. Wireless locks can be used to convert more mechanical applications to electronic, but they are not necessarily real-time and/or monitored applications.Customers are trying to manage a smaller operating budget with more people and more multi-use applications For example, a wireless lock could be installed on a seldom-used door, such as a storage closet, to avoid the need to manage keys. The flexibility of wireless locks also would allow that same door to be transitioned to communicate with a network via WiFi, or it could be used for real-time communication in a monitored system. “It’s much more flexible if one product can do about six different things,” says Brad Aikin, Allegion’s Channel Led Business Leader, Integrator Channel. New product approaches enable intelligence to be added after the fact to existing wireless locks, thus further increasing flexibility. Designing systems that are scalable “We now have products that can start from very basic applications, and then build capabilities through systems and integrations all within one device,” says Mark Jenner, Allegion Market Development Director. Offering a useful complement to wired systems Once you understand how to deploy the wireless technology, the efficiencies of it from a labour perspective are pretty amazing” Wireless is not a “silver bullet” – not for every application, says Aikin. “I think it is an incremental opportunity,” he says, and more likely to drive conversion of existing mechanical locks than to transition wired electronic systems. “You’re just looking to get a more efficient credential, and to get rid of that master key system, or to dramatically shrink it down,” he adds. “Wireless is an example of how the integrator can do more, not just differently, but have more conversations and help their end users. They are not things the end-users are going to ask for inherently; these are latent needs. They are not going to bring it up.” Allegion panellists elaborated on some of the many advantages of wireless locks Less labour involved in installations “Once you understand how to deploy the wireless technology, the efficiencies of it from a labour perspective are pretty amazing,” says Robert Gaulden, Allegion Project Based Business Leader, Electronic Access Control. “Integrators can deploy two additional jobs in a day because they are on and off jobs more quickly. There are huge benefits, depending on what environment you are in.” Labour is a significant cost for integrators – finding, retaining and training good employees. Any new efficiencies in terms of labour – such as the simplified installation of wireless locking systems – is a saving grace for integrators.Providing remote firmware updates is another way to provide ongoing service without being invasive or disruptive to the end user environment “We see a lot more adoption from our customer base once they become comfortable with how to use the wireless technology,” says Gaulden. New opportunities for RMR There is a shift among integrators away from one-time installations and toward a recurring monthly revenue (RMR) model in which the integrator manages all aspects of the system over time for a monthly fee. Wireless systems can help to simplify that transition by lowering costs. Managing interior doors and locks can add value and incremental revenue, says Jenner. Providing remote firmware updates is another way to provide ongoing service without being invasive or disruptive to the end user environment. “We support that from the product perspective, but developers and software companies need to take advantage of it,” says Devin Love, Allegion Market Development Manager. “It’s an important feature for the end user, but we are still navigating through the world of wireless adoption.” “No one wakes up in the morning and thinks ‘I am going to buy a lock today,’” says Aikin. “We need to ensure we are having conversations about security needs, but also about how to deploy the technology to make it easier to manage and have more flexibility,” says Aikin.
The concept of door locks means something totally different in our current age of smarter buildings that house data-driven businesses. Hardware locks and keys are still around, but they co-exist with a brave new world of electronic locks, wireless locks, networked systems, and smarter access control. Locks can also increasingly be a part of a smart building’s flow of data. The opportunities of these new technologies and approaches are significant, but there are also pitfalls. I heard an interesting discussion about these topics presented by several business leaders from lock company Allegion at a press event at ISC West earlier this year. Here are some highlights from that discussion. Q: What new developments in emerging technologies do you see in the coming years? There’s opportunity for implementation of the technology to solve real problems" Mark Jenner, Market Development Director: Connected locks, other types of sensors and all the data being aggregated inside buildings provide opportunity for data analytics. The buzzwords around technologies can cause confusion for integrators and end users, such as artificial intelligence, deep learning and machine learning, and what’s the difference among all of them? My opinion is that they are important, but the big theme across them all is opportunities for new business models for the integrator, and opportunities to solve problems for end users. And it’s not just technology for technology’s sake. There’s opportunity for implementation of the technology to solve real problems. Devin Love, Market Development Manager: You can’t just have a solution looking for a problem. You see a lot of people who understand technology in their own lives, and they want to translate that into their businesses. That’s where I think it’s exciting. You now have all this technology, and people understand it to the extent that it improves their daily life. They go through their day with less friction, with more ease, and technology fades to the background. There are two levels of value. One is the longer, bigger, broader scope of what the technology can bring to a company using it, but on an immediate basis, there is the value of tracking how a business is running. These sensors are collecting data. For example, if you are a multi-tenant property, you can look at how amenities are being used. What do my residents really care about? That informs future decisions. Robert Gaulden, Project Based Business Leader, Electronic Access Control: I have been studying the multi-family space for the last couple of months. The customer experience is really driving a lot of that technology adoption. What you’re seeing today, whether it’s a mobile device or some other device, is the ability to move throughout the property, and gain access to the perimeter and to your tenant space. All of this adoption is around that experience. There’s multiple players coming into the space, from Amazon wanting to deliver packages into the tenant space to residents who don’t want the inconvenience of using a key. Technology adoption to solve problems, and also to drive experiences, is where a lot of the balance will play out. It’s important that we look at how integrators can use the technology to do business more effectively and efficiently" Brad Aikin, Channel Led Business Leader, Integrator Channel: From an integrator perspective, there are two things. One is how they can approach end users, and the scope of what integrators consult with them about is wider. I think we as an industry are getting beyond those high-traffic, high-security applications. Those are still critical, but the value we bring around security and convenience is opening a new incremental opportunity. Also, the experience of the integrator and how they conduct their business is important, from generating quotes to communications to proactive servicing. It’s important that we look at how integrators can use the technology to do business more effectively and efficiently. Gaulden: We as an industry, and we as manufacturers, need to understand what data we are generating so we can run our businesses more efficiently from every aspect, whether you’re the property manager, the building owner, the integrator, or whether you’re the manufacturer. These devices and technology are being pushed out everywhere and will generate the data. How we learn from that – especially when you apply security to it to be more proactive – provides huge opportunities. Jenner: What data is important and what’s not? Folks get overwhelmed with too much data at some point. What’s important for an application at the end user level? What do they really need to solve the problem? Love: Privacy gets involved as well, especially with consumer products. The attitude is “stay out of my private business.” But if you’re an employee now, all bets are off. Now you have a professional relationship with the people you work with, so there is a different lens that you look through when tracking data. You use the data to everyone’s benefit, and it’s a different paradigm than in your private life. Aikin: Also, where does that data create a better experience for the person? That’s what drives the money and value: What level of information sharing makes my experience better? The technology is also getting smarter in terms of “how do we sort through the valuable information?” Hardware locks and keys are still around, but they co-exist with a brave new world of electronic locks, wireless locks, networked systems, and smarter access control Q: As facilities connect more devices and sensors, the cybersecurity threats increase. We have already seen Internet of Things (IoT) devices being used as the attack point of cyber breaches. What are the vulnerabilities that make those attacks possible, and how can integrators protect their customers? Love: Certainly, this is an extremely – maybe the most important – piece of our industry. What is the point of everything we do if we can’t instill that trust? But what we need to solve here also comes with opportunity. There’s certainly hope. You’re not seeing a frontal attack on the technology. It’s usually some loophole, or some older device that hasn’t been updated, or wasn’t installed correctly, or it was social-engineered. The opportunity is, not that it can’t be solved, but that it absolutely needs to be solved – and it can. Gaulden: Integrators need the ability to understand that cyber layer and what it means. Nowadays, everything runs on the network, and you won’t even get past the IT department to get on the network if you don’t have the right staff, the right credentials. From an integrator standpoint, you need the ability to add to your staff, to understand everything from the product level to the firmware and the software level, all the way to the deployment of the holistic system. You can’t just say, “That’s not part of our responsibility.” All these devices are now riding on the network. They can be protected from a cyber perspective, or you will have vulnerabilities. As manufacturers and business consultants to integrators, we should facilitate the conversation, that it is one ecosystem" Aikin: Everything is a communication device. With the concern and need comes an opportunity for the integrator. But it’s also in making sure integrators are having that conversation with end users and setting the expectations up front. What I’m providing you on day one is the best in the industry at this time, but tomorrow it may not be. My accountability and service are to maintain that environment and keep it running. I may not physically change the device you see, but the service I’m bringing to you is that security, and that comprehensive dialogue. The IT stakeholders already have that expectation, but there is a chasm in some organisations between the physical security and the IT stakeholders, and the integrator is facilitating that conversation. As manufacturers and business consultants to integrators, we should facilitate that conversation. It is one ecosystem. Q: Aside from cybersecurity, what are some of the other threats that integrators should be aware of as they work with customers to implement the new trends and technologies we have mentioned? Aikin: It is diversifying, all the options and the capabilities. With that comes confusion and misapplication. If I look at the trends around just wireless; I go back 10 years ago, there were even questions of whether wireless was a secure technology. That has progressed and continues to be part of the cyber conversation, just like any hardwired product. It’s something you have to maintain and be aware of. Wireless has really diversified. There is still a need for education within the channel, and most importantly, to the end user. There are still end users that assume a WiFi widget is the same thing as a Bluetooth widget is the same thing as a low-frequency widget. But they are all different. There are reasons there are different technologies. Nothing stifles the adoption of technology more than misapplication. We have different architectures within our lock base and among our software partners to allow a mix of technology" Gaulden: Integrators understand the differences in how various doors are used and how those applications will work. In the K-12 school environment, you want the ability for an instant lockdown, and a WiFi deployment probably isn’t your best option. You need a real-time deployment. However, my office door at headquarters doesn’t necessarily need real-time communication. I can pull audits off it once or twice a day. You have to mix and match technologies. For a high security door, you would proactively monitor it. But for a door where convenience is the goal, we can put electronic security on it but we don’t need to know what’s going on at any moment in time. We have different architectures within our lock base and among our software partners to allow that mix of technology. Jenner: End users want the latest technology, but it may not be for their applications. Those things drive more costs into it, when end users need to be putting money into cybersecurity and some other things. That’s part of the misapplication. Another risk is interoperability. That’s a big piece of the technology and as things change. How do we do a better job of supporting open architecture? It may not be a standards-based protocol, although we use a lot of standards, but we just need to make sure whatever protocols we use are open and easily accessible so we can continue to work with them in the future. We know that when our devices go in, they will support other parts of the ecosystem from an interoperability perspective. That’s important for integrators to know: How is this going to be applied and integrate with something in three, four or five years from now? It’s an expensive investment, and I want to make sure it will work in the future. Main photo: Business leaders from Allegion discussed new trends in electronic and wireless locks at a recent press event: (L-R) Robert Gaulden, Devin Love, Brad Aikin and Mark Jenner.
With a large campus comprising historic and modern buildings and significant research facilities and equipment, the University of Otago has assets in excess of $1.4 billion (NZD). In 2006, an internal security review of campus facilities identified that a number of critical areas – including laboratories where medical research is conducted on animals and human cadavers – could attain an increased level of security and achieve greater cost efficiency through the installation of Gallagher systems. A key priority of the security upgrade was to replace the traditional lock and key system in place in facilities across campus with Gallagher’s electronic access control solution. By moving to an entirely electronic system, the University has mitigated the risks associated with lost keys and unauthorised access. Lost and misplaced cards are reported and immediately deactivated ensuring complete control is maintained over facility access. Comprehensive alarm monitoring The team at the University of Otago needed an auditable system, capable of identifying access by people, place, and timeThe electronic system also allows for comprehensive alarm monitoring per door and per freezer, ensuring campus security is immediately notified if a door or freezer has been left open. Gallagher’s Mobile Client, available with the Command Centre v7.30 security management platform, means these alarm notifications can be communicated directly to security personnel’s Apple iPhone devices providing valuable information in real-time, to those outside of the control room. More than simply managing the access permissions across campus, the team at the University of Otago needed an auditable system, capable of identifying access by people, place, and time. Gallagher’s Command Centre application provides this high-level of traceability and enables the University to quickly and easily extract the exact information required both for internal use and for the regulatory audits required of research facilities. Identifying who accessed which areas “Due to the nature and value of our assets, it’s critical not just to control who has access to facilities but to be able to identify exactly when areas were accessed and to know who was there,” said Deputy Proctor at the University of Otago, Andrew Ferguson. Key industry challenges Eliminate the security threat that comes with lost keys Enhance the level of security for critical areas including Medical Research laboratories Procure a solution capable of producing comprehensive audit trails Introduce a secure, automated facilities management system Gallagher security products installed Command Centre Electronic card readers Syllabus Plus integration Syllabus Plus integration Syllabus Plus enables automation in the scheduling and booking of resources and equipment Founded in 1869, the University of Otago is New Zealand’s oldest university. Ranked in the top 200 universities worldwide, the University of Otago is New Zealand’s primary medical tertiary institute and is considered the top research university in New Zealand. The Gallagher system installed at the University of Otago includes a Syllabus Plus integration. Syllabus Plus enables automation in the scheduling and booking of resources and equipment through Command Centre. The University of Otago team were quick to see value in the opportunity to synchronise their access control system with class time-tables, and subsequently manage room resources by automatically unlocking doors. Easily search and book resources A key benefit for the University was a move away from the manual process of entering room bookings into Command Centre. In addition to removing the labour associated with this manual process, the university also found a reduction in the number of booking inaccuracies caused when people changed their plans, as staff can now quickly and independently reschedule their resource and room bookings if their requirements change. “Smart scheduling gives authorised users in our wider team the ability to quickly and easily search and book resources,” said Ferguson. “It’s a genuine time-saver for us and ensures our facilities are managed efficiently.” The university has implemented an ongoing software maintenance agreement with Gallagher To ensure the University of Otago’s security system remains at the forefront of technology, the university has implemented an ongoing software maintenance agreement with Gallagher to ensure they receive the latest system developments as they are released. “We would never go without software maintenance, it’s imperative that our high-end security be the best it can possibly be,” said Ferguson. Training for system operators In addition to ensuring their security products and systems are up-to-date, the University of Otago also ensures their system operators undergo regular training. According to Ferguson, “We arrange annual training with Gallagher for our Campus Watch security team. The training teaches the team valuable tips and tricks on how to utilise the system to its fullest.” During the years since the initial installation of Gallagher security systems, the University of Otago has experienced significant savings associated with not needing to re-key facilities or replace locks when traditional keys have been lost or not returned – maintenance that the University estimates used to cost tens of thousands of dollars each year.
In mid-2009, Melco Resorts & Entertainment Limited opened City of Dreams, Macau – a casino and resort complex that quickly become one of the world’s premier entertainment and leisure destinations. The complex brings together a collection of world-renowned hotel brands, including Crown, Grand Hyatt, and Hard Rock, along with a casino area of approximately 448,000 square-feet and over 20 restaurants and bars. Also comprising an audio-visual multimedia experience, and ‘The House of Dancing Water’ – the world’s largest water-based extravaganza showcased in the purpose-built Dancing Water Theater. These unique and innovative entertainment, shopping, food and beverage offerings realise the company’s vision of bringing world-class integrated resort and entertainment experiences to Macau and Asia. Need of a robust security solution Melco Resorts was looking for a robust security solution capable of protecting high-value assetsHaving thousands of staff moving around the site meant that effective people management needed to be a significant part of the security solution. With a large site encompassing multiple areas and a staff of approximately 13,000, Melco Resorts was looking for a robust security solution capable of protecting high-value assets while providing a reliable and flexible system to support daily operations. In the years leading up to the opening of City of Dreams, Gallagher worked directly alongside Melco Resorts, and security partner Certis Security (Macau) Ltd, during the design and construction phases. The Gallagher team were highly involved in discussions and developments relating to software customisations and the final commissioning of critical security areas. MIFARE Classic card technology Part of the City of Dreams philosophy from day one was to operate a one-card, single service entity per staff member – not only for high-level security but across all system requirements. According to Billups, a lot of decisions around system choice were based on meeting the one-card philosophy. Utilising MIFARE Classic card technology, 1700 access controlled doors were set up across the complex. Utilising MIFARE Classic card technology, 1700 access controlled doors were set up across the complex Gallagher’s ability to encode the cards with data from multiple system providers was crucial in delivering the one-card policy. Along with Gallagher access data, third-party ASCII data encoding was also provided on the card for use by other on-site systems to achieve the objective of a single card philosophy. Latest generation data security The original system, comprising MIFARE Classic card technology, is now being upgraded to the latest MIFARE DESFire EV1 across all Melco Resorts properties. MIFARE DESFire EV1 provides the latest generation data security and encryption ensuring Melco Resorts globally stays at the forefront of technology. To further meet their one-card philosophy, Melco Resorts wanted a single card technology utilised across all three of their Macau complexes – City of Dreams, Altria Macau, and Studio City. In addition to enabling access across multiple properties, there was a requirement for a central monitoring system that could manage alarms escalated from any of the properties and register such alarms centrally in a main command structure. Highly integrated and expansive platform Gallagher’s multi-server technology delivers this, with seamless connection between all systems and across all sitesFuture-proofing was an important consideration of the security solution. “City of Dreams needed a system that catered well to growth, particularly in the areas of people management and access control. Gallagher provided us with the highly integrated and expansive platform we were looking for,” said Kelly Billups, Director of Security Technology & Administration for Melco Resorts. Gallagher’s multi-server technology delivers this, with seamless connection between all systems and across all sites. If communication between the facilities should fail due to a network fault or similar incident, each site’s security system will continue to function independently. According to Billups, the multi-server system has resulted in reduced labour costs due to the consolidation of security administration. Efficient movement of people The Gallagher system provides rapid response times to access requests ensuring the efficient movement of people in and out of areas. The instant dissemination of cardholder access and configuration data also ensures people have appropriate access delivered in real time. If cardholder access needs to be denied, this information is communicated and applied instantly across the site. In addition to door access activity, 5300 detection points are also monitored throughout the complexIn order to provide Melco Resorts with an audit trail of security events, all site activity is logged in a secure database. In addition to door access activity, 5300 detection points are also monitored throughout the complex. Reports are generated using a simple wizard-based system which steers the report generator through a step-by-step process ensuring the relevant data is retrieved. The City of Dreams site required integration with a number of external systems and Gallagher’s Command Centre central management software provided the platform to deliver this. Cameras integrated with Command Centre As surveillance is a key requirement for a casino, City of Dreams has thousands of cameras throughout the complex. A number of these cameras monitor critical back of house operations and are integrated with Command Centre to provide additional layers of security and enable further administrative functionality. A number of lower-level security points throughout the complex – which utilise traditional keys – integrate Command Centre with an electronic key management system. Keys are electronically released to personnel depending on their access permissions. Two high-level interfaces provide communication to all elevators connected to Command Centre There are approximately 80 elevator shafts located throughout the City of Dreams complex. Two high-level interfaces (Schindler and Otis) provide communication to all elevators connected to Command Centre where access control groups manage access to each of the floors. This integration is particularly important for heart-of-house elevators where access can be highly restricted to only authorised personnel. HR system integrated with Command Centre An integration between City of Dreams Human Resources (HR) system and Command Centre was established. The active connection between the two ensures that basic personnel information is automatically communicated from the HR system to Command Centre without the need for manual intervention. Because of this, the process of updating cardholder information and assigning access to cardholders is a quick and simple procedure – a must for a database of this size. The Gallagher system provides rapid response times to access requests ensuring the efficient movement of people in and out of areas. Where high-level (software) interfaces are not available, the Gallagher system connects with other services including: boom gates, motorised vehicle and pedestrian doors, and turnstiles, using what is commonly referred to as a low-level interface. A control relay in Gallagher’s Command Centre platform activates the door or gate, and in turn the status of the door or gate (open, closed) is reported back. Salto integrated guest locking system Melco Resorts requirement is to seamlessly integrate hotel guest-room locks with the Command Centre platformThe delivery of a high-level integration with a hotel guest-room locking solution is currently in development and will be a world first. Melco Resorts requirement is to seamlessly integrate hotel guest-room locks with the Command Centre platform in order to deliver high-level security across the entire complex. To deliver this solution, Gallagher is working with long-term partner Salto. The Salto integrated guest locking system is required to operate in conjunction with Melco Resorts high-security card encryption and encoding, while complimenting the hotel décor. Melco Resorts and Gallagher maintain an ongoing relationship which brings together Melco Resorts evolving requirements and Gallagher’s product development road map. “The relationship is key for us” said Billups, “having a team based in the region who meet with us regularly and having a level of engagement over development is very important.”
CoreRFID supplies the UK's largest outsourcing company Serco with 100,000 RFID access cards for its Caledonian Sleeper railway service. The cards will provide passengers with access to rooms and will improve security on routes between London and Scotland. The cards are completely re-usable and replace paper-based RFID tickets, which were judged to not be as cost effective in the long-term. Specialist locks Serco had specialist locks provided by a Spanish company and needed cards which were compatible" Munzi Ali, technical director of CoreRFID comments: “Our knowledge and experience on similar work in the hotel industry helped us to meet the challenges of this project. Serco had specialist locks provided by a Spanish company and needed cards which were compatible. Consultancy is a big part of the larger projects we undertake and we were able to solve the issue with Serco.” The Caledonian Sleeper service, which is operated by Serco as a standalone franchise, can trace its origins back to 1873. It serves a number of destinations in Scotland - including Inverness, Aberdeen, Fort William, Glasgow and Edinburgh - on route to and from Euston Station. RFID solutions Graham Kelly, guest experience director at Serco Caledonian Sleeper, said: "Our new trains are designed to improve every aspect of the guest experience. We strive to deliver a hotel experience and a major part of that is having keycard entry for rooms. We've only been running our new trains for a few weeks but the feedback from guests on the keycard has been excellent, with CoreRFID's solution proving extremely effective." Ali added: “RFID solutions can provide real benefits in efficiency, costs and in this case significantly cutting down on waste.” CoreRFID's clients include ICL, London Underground and Thomas Cook.
Wellington is the southernmost capital city in the world and is the centre of New Zealand government. With the second highest population in the country, Wellington is a large coastal city with a diverse range of facilities and attractions. A large portion of those facilities and attractions are the responsibility of the Wellington City Council (WCC) – a local body government organisation employing around 1,800 staff. As with all councils that manage a large number of facilities on behalf of their city, the WCC has a broad range of security needs and an accountability to the rate-paying citizens of Wellington. Since 2001, WCC has met those security needs with Gallagher’s integrated security solutions. Central management platform WCC developed a five year plan to migrate all 150 sites on to the Gallagher system With 1,800 employees and 150 sites located across Wellington, the council has a large number of people and assets to secure. With sites including libraries, swimming pool complexes, community and recreation centres, housing blocks, a city zoo, event facilities, and a multi-story central office building, the security requirements vary considerably. “We’re responsible for securing and monitoring all 150 sites around the clock” said Chetan Prasad, Security Manager for Wellington City Council. “It’s imperative we have a reliable system that provides us with a complete view of activity at all sites”. In order to deliver this, WCC uses Gallagher’s Command Centre central management platform to manage security across numerous sites. Utilising a single security platform has been a long-term objective of the council. Initially operating six different systems, WCC developed a five year plan to migrate all 150 sites on to the Gallagher system. Chetan links the Council’s growth with their need to become smarter about how security is managed. Primary security solution “Gallagher’s system has enabled us to standardise our infrastructure and bring all elements including alarm management, fire systems, vehicle bollards, video surveillance, facility and carpark access, reporting, visitor management, and more, on to one platform. That was a key factor in why we chose Gallagher initially, and why we will continue with them as our primary security solution.” Visibility is critical when you have 150 independent sites to secure. An integration between Command Centre and over 400 cameras located throughout the WCC’s facilities provides live video footage to the security team. “Our camera integration with Command Centre means that in addition to being able to continuously observe critical areas, any site alarm that is triggered will immediately bring up a live video feed for the security staff in our control room. This visibility is invaluable for us in activating appropriate responses and, in the event of a crime, being able to provide crucial evidence to police” said Prasad. Electronic access control WCC is utilising Gallagher security technology to ensure staff are protected In addition to securing facilities and assets, WCC secures and protects staff working at each of its sites. From initiatives like integrating building elevators with access control to prohibit unauthorised entry, to the integration of panic buttons at each site, WCC is utilising Gallagher security technology to ensure staff are protected and that in the event of an incident, a rapid security response is initiated. According to Prasad, the Gallagher system is delivering cost savings to the Council in several key areas. The first area relates to the shift from traditional key systems to smart card technology. “With such a large staff base and so many sites, we inevitably faced challenges with traditional keys being lost or not returned by staff or contractors” said Prasad. Rekeying a site cost the Council approximately $4,000 each time – an expense that has now been eliminated by the replacement of traditional lock and key systems with electronic access control. Visitor management solution “Now if a card is lost or not returned, we simply deactivate it in our system. Not only is it a solution that saves us money” said Prasad, “it is also a solution that can be applied instantly.” Similarly, the ability for security personnel to assess a site and reprogram an alarm remotely, also saves the council considerable costs associated with dispatching guards to site. The second area where cost savings are apparent relates to intelligent automation. An integration with WCC’s HR system means that as staff leave employment, their cardholder profiles are automatically disabled in the system. The use of Gallagher’s Visitor Management solution, means that appropriate staff are automatically notified if a guest or contractor fails to sign out or return a key. These two automations alone, save the WCC security team approximately 4-5 days of cardholder administration each year. Software maintenance contract WCC elected to take a 10 year Software Maintenance agreement with Gallagher In 2014, following 13 years as a Gallagher customer, WCC elected to take a 10 year Software Maintenance agreement with Gallagher. The Software Maintenance contract ensures the Council have access to the latest developments as soon as they are released, keeping WCC at the forefront of security technology. “Software Maintenance makes good business sense” says Prasad. “It gives us access to a comprehensive range of licensable features and benefits, and ensures our upgrade costs are effectively distributed.” Prasad describes the Council’s confidence in Gallagher as another significant factor in the 10 year agreement. “We have found Gallagher’s security solution to be a reliable and versatile, highly secure, modern system. It has supported our significant growth to date, and we are committed to using Gallagher systems for the Wellington City Council’s future.”
It creates challenges when a mechanical locking system grows organically over the years: Managers at South Denmark’s Syrenparken mental health treatment facility no longer had a trustworthy overview of all their physical keys in circulation. Yet, to serve the people treated there, Syrenparken must store medicines and psychotropic drugs. However, it is critical that only trusted personnel gain access. On-site access control solution As part of a modernisation program, it was decided to upgrade on-site access control. One key aim was to replace old-fashioned keys, which can easily be lost, increasing the risk they fall into the wrong hands. Managers also wanted to make a working day more efficient for their trusted employees. They were each carrying three or four keys just to perform daily tasks in multiple areas of the site. Syrenparken installed the SMARTair wireless access control system from ASSA ABLOY to meet all their security needs Syrenparken installed the SMARTair wireless access control system from ASSA ABLOY to meet all their security needs. To date, 143 SMARTair wireless locking devices are fitted on resident bedrooms, as well as doors to offices, the medicine room and storage for patient records, plus other confidential areas. Staff and residents open doors with a standard, programmable MIFARE credential. SMARTair wireless access control system System reliability was a key factor in their choice of SMARTair, according to Henrik Jürs, Head of Syrenparken: "It is possible to put our access control system on a virtual server. Should a computer go down, we can put a new computer on and then we have access to it again. We trust the data security,” he emphasises. Another important parameter was flexibility in system management: SMARTair makes it easy to administrate who should have access to which areas, and when. Instead of a bundle of keys, each employee has a key-card encoded with access rights to the exact areas they need. Online, offline access management With SMARTair, it’s easy to combine online and offline access management within the same installation With SMARTair, it’s easy to combine online and offline access management within the same installation. At Syrenparken, 133 offline SMARTair escutcheons and 3 updaters, plus 8 offline SMARTair cabinet locks, work side-by-side within the same system as 10 SMARTair online escutcheons. If a key-card is lost, it's quick to disable it and activate a new one. There is no danger anyone unauthorised will enter controlled medicine rooms with a lost card as a result. Because managers no longer need to call a locksmith to replace the compromised escutcheon, SMARTair is also a cost-effective solution for Syrenparken. SMARTair deployment is ongoing at Syrenparken — and currently projected to reach a total of up to 200 doors.
The London Clinic has installed bespoke Traka solutions to ensure accountable authorised access and instant audit control capability for keys across its state-of-the-art hospital facilities. Harley Street’s globally renowned London Clinic is one of the UK’s largest private hospitals, dedicated to providing the best, personalised healthcare with a breadth of surgical and medical expertise. With hundreds of keys and access points in operation across the hospital, the Security and Operations team was reliant on a manual logging in and out system, which was proving inefficient and risked time delays to patient care. In sourcing a more innovative way to keep track of authorised access, especially to drugs cabinets and the Clinic’s 10 specialist theatre areas, Traka was installed and networked across the site. The benefits of instant audit control capability and additionally being able to set curfews for different staff rotas has already made a significant difference in the efficient running of the Clinic. Ensuring safety of staff and patients Traka’s system is a breath of fresh air to monitor keys and instantly be aware of their location"“The vision and values of the Clinic have been developed through working with our Trustees, management teams and staff. As part of this process, we pride ourselves on being ‘pioneering’ not only in our attention to medical care but also in establishing better and more efficient ways of working,” says Lee Humphries, General Manager Security Operations at The London Clinic. “This is across every aspect of The Clinic, right down to daily operations. Security and key management are integral not only to the efficient running of the Clinic but also to ensure the safety of our staff, patients and guests. Traka’s system is a breath of fresh air to monitor keys and instantly be aware of their location; allowing our staff to focus on delivering high-quality service.” In total, Traka has installed four networked key cabinets, which utilise its flagship Traka32 technology to provide all the administration tools needed for the Clinic to effectively manage operations from its server and still provide extensive real-time data capture. Enhancing the hospital functionality Within the system, the Security team has now set curfews so that keys not returned will automatically trigger a notificationWithin the system, the Security team has now set curfews so that keys not returned will automatically trigger a notification, sent via email and text. There is also an opportunity for authorised personnel to pre-book keys in advance, so they are reserved, which has proven especially useful to manage contractor access and work programmes. Ben Farrar, Traka Marketing Development Manager added: “Providing key management solutions for a hospital environment, such as The London Clinic, involves more than a choice of high-quality products and services – it encompasses best practices and an integrated approach to ensure the safety and security of staff, patients and visitors. “We worked in partnership with the Security and Operations team, right from the initial design process to create a bespoke Traka solution that could instantly enhance the smooth running of the hospital, without compromising on ease of use in emergency situations. And by adding Traka32 software, we achieved the requirements with the flexibility to create own central control over authorised access to critical keys.”
Round table discussion
The concept of how security systems can contribute to the broader business goals of a company is not new. It seems we have been talking about benefits of security systems beyond “just” security for more than a decade. Given the expanding role of technologies in the market, including video and access control, at what point is the term “security” too restrictive to accurately describe what our industry does? We asked the Expert Panel Roundtable for their responses to this premise: Is the description “security technology” too narrow given the broader application possibilities of today’s systems? Why?
Hospitals and healthcare facilities are an important vertical sector in the physical security market. Protecting healthcare facilities is a rich opportunity to leverage the value of physical security systems that range from video to access control to newer location and asset protection systems. But understanding how technology can excel in the healthcare vertical requires that we first identify and understand what these institutions need. Therefore, we asked this week’s Expert Panel Roundtable: What are the physical security challenges of hospitals and healthcare?