Market dynamics are changing the U.S. residential security market, creating new business models that better appeal to the approximately 70% of households without a security system. Smart home adjacencies have helped revitalise the traditional security industry, and alternative approaches to systems and monitoring for the security industry are emerging, including a new batch of DIY systems. Growth in the residential security market and its position as the channel for smart home solutions have at...
Aiphone has announced significant improvements to its full IP IX intercom and security solution. The new and upgraded features built into the new IX2 series include improved audio and camera functionality, large touch screen monitors and communication with up to 9,999 door stations. IX2 IP intercom and security solution “With no server or licence fees, the IX2 system offers highly affordable P2P full IP video entry security, internal communication and multicast paging,” said Wyatt...
The mobile network standardisation body 3GPP introduced two new features – PSM (Power Saving Mode) and eDRX (extended Discontinuous Reception) – minimising power consumption of IoT devices and extending their battery power up to ten years. In IoT applications such as container tracking, intelligent meters, or agriculture sensors, the devices do not need to send or receive data continuously. Oliver Wruck, Director MNTS at Comprion, explains: “Being an important member of the mo...
Avigilon Corporation, a Motorola Solutions company, announced that Avigilon Blue, its cloud platform for video surveillance, is launching in Canada. The Avigilon Blue platform is a secure end-to-end solution that enables security integrators to deliver analytics-driven video surveillance as a service. It features patented self-learning video analytics technology that is compatible with both legacy Avigilon and third-party ONVIF compliant cameras. Powerful and easy to use, the platform enables...
SALTO is introducing SVN-Flex, a new technology that enables SALTO standalone electronic locks and cylinders to update user credentials directly at the door. This SALTO access control technology makes keyless, wire-free smart buildings a reality. It provides access management with increased security, more convenience and at lower cost. It makes hard-wired update points obsolete. “SVN Flex is a game changer that creates a new standard in access control,” says Marc Handels, Chief Mark...
Reset, a competent checking and contractor management system in the UK releases its Reset Access Mobile solution. Revealed at the IHEEM (Healthcare Estates Annual Conference) in October, the Reset Access Mobile terminal is ideal for use in smaller buildings and dispersed estates which may be visited less frequently or lack mains electricity. Each Reset Access Mobile terminal is fully self-contained and, incorporating contactless technology requires no external data or power. Reduce costs for c...
Whether you are a veteran in the access control world or have never installed a card reader before, there are always ways to increase profits in the ever-evolving world of access control. The hope is that by considering a few key focal points, you can find ways to increase market share. Whether we are releasing an electronic lock through a simple intercom button or using biometric and multi-authentication based on a database; the tactics for bringing on more revenue is the same. Learning to focus on a few key items can help open up opportunities. Business access controls Understanding vertical markets is a strong strategy for success in increasing your profits with access controlIf you are new to access control, it’s important to determine the right product offerings for your business model and experience level of your team. Mistakes in estimating or installing can be costly and complex. Take advantage of manufacturer training both online and in the classroom for both your sales team and installation department. It’s important to understand the fire and building codes in your area to make sure you design the proper solution for your customers. Furthermore, understanding the products, components and proper wiring can save you money in labour and materials. Today we will look at four focus points: vertical markets, cloud-based access control, technology upgrades, and preventative maintenance and service agreements. These four focal points are simple to implement and can be easily added to your current operation. Vertical markets Understanding vertical markets is a strong strategy for success in increasing your profits with access control. The concept is that understanding a certain vertical and their security needs can increase your sales team’s marketability. If you spend your time focusing on the healthcare industry, for instance, you will see that HIPA requirements open doors for selling access control. Getting to know the regulatory concerns of different verticals is a great strategy for more effective sales Having logs of who entered your HR files room or patient records storage is a crucial part of addressing privacy concerns. Getting to know the regulatory concerns of different verticals is a great strategy for more effective sales. Another example could be apartment communities or other multifamily dwellings. In this competitive marketplace, these complexes are looking for ways to stand out in their market. Knowing this and being able to offer amenities like secured locks with Bluetooth credentials that tenants can open with their smartphones is a selling point for you and for your customer. Building on each customer you contact within a vertical is like free sales and marketing training. The more you learn from each potential client, the more you increase your conversation starters for the next potential client. Cloud-based access control With the growing cloud-based access control market, integrators can find more opportunities in small businesses and vertical markets that typically wouldn’t be on the radar of your sales team. A typical card access system often makes the move from the traditional lock and key systems to electronic card access cost prohibitive. This is due to the large upfront costs for a server, software and annual licensing. With cloud access, integrators can offer less expensive upfront costs with low monthly subscription fees that cover all software updates, database backups, security patches and more. The real benefit for the integrator is the reoccurring revenue. By helping our clients save money on server, software and IT infrastructure costs, we are securing reoccurring revenue for our companies that increase our profitability. Building reoccurring revenue not only provides cash flow but also keeps your name on the top of the minds of your customer and that leads to additional sales. By helping clients save money on server, software and IT infrastructure costs, we are securing reoccurring revenue for companies that increase profitability Technology upgrades Another often overlooked opportunity is technology upgrades. Training your sales staff and even service technicians to watch out for clients with older technology can reap major benefits. When you bring new technology to your clients, you show another value that you bring to the table. Even if your client isn’t ready to make an upgrade, you can easily plant a seed that will get their minds and budgets rolling. An easy example is a customer with an older intercom door access system An easy example is a customer with an older intercom door access system. This may have met their needs 10 years ago when it was installed, but the office has grown and perhaps an integrated card access intercom system is a great technology upgrade. Bringing this to the customer will once again show that you are the “subject matter expert” and your customer will be more apt to refer you to their friends and colleagues. Another easy way to find technology upgrades is to dig through your ageing client list and build a list of potential targets that you have not visited lately. If you keep records of what was installed previously, it will make it easier to plan ahead and bring solutions to your next visit, saving your sales staff time and again building confidence with your clients. Preventive maintenance and service agreements One thing that sales teams often miss is the opportunity to add service agreements and preventative maintenance agreements. Even if a customer already has an access control system, they may not have a service provider and may be interested in securing a service agreement. Typically, a service agreement can be written to cover all parts and labour or just labour for an annual feeShowing the value of a service agreement is paramount, adding annual or semi-annual preventative maintenance to your service agreement is one way to add value. Inspecting locking mechanisms, request to exit motions and buttons, door status switches, headend equipment, batteries and power supplies, can save your customer from a costly after-hours service call or the inconvenience of a non-functioning access control system during business hours. Additionally, checking computer hardware and software logs for errors can save a customer from a catastrophic failure. Typically, a service agreement can be written to cover all parts and labour or just labour for an annual fee. It is helpful to come up with a percentage of the install value that makes sense so that your sales team can easily quote a service agreement for your customer. Offering several levels of service also opens the table for negotiations. You can offer an “all parts and labour 24/7” or a “parts and labour M-F 8AM-4PM”, as an example. Offering guaranteed response times can also be a marketing strategy. Critical area access management Checking computer hardware and software logs for errors can save a customer from a catastrophic failureA 24-7 facility that has 200 employees moving in and out of critical areas may be a great potential customer for a high-level service agreement with semi-annual preventative maintenance and a guaranteed 4-hour response time. Where a small office that is only open during standard business hours may be better suited for a labour only M-F with annual preventative maintenance inspection. The point is that a creative, intentional, and focused approach to access control can yield the fruit that brings long-term success to your team. Building a plan and learning from each prospect, sale, and installation will develop a process that brings results. Attending a trade specific expo like ESX will give you the opportunity to meet with manufacturers and other integrators that can help you implement a product offering and strategy for success.
Pulse Secure, global provider of Secure Access solutions to both enterprises and service providers, has announced the launch of new packaging of its award-winning Pulse Access Suite for Managed Security Service Providers (MSSPs). The solution offers service providers an accelerated, cost-effective means to differentiate and build out their service portfolio to meet the massive demand for protected connectivity to cloud applications and hybrid IT resources. Pulse Secure Pulse Secure offers a comprehensive, integrated and highly interoperable set of Secure Access solutions spanning remote, mobile and cloud access security; network visibility and access control; and application delivery. The suite allows service providers to extend lucrative access protection, endpoint compliance, threat response and availability services for the data center, hosted in the cloud or running as SaaS. The service provider packaging optimises capital expenditure through an on-demand, pay-per-use model. MSSPs can spin up or spin down virtual Secure Access instances and licenses at a cost based on the number of concurrent monthly users. On-demand provisioning and tiered, user-based pricing gives service providers needed flexibility for customer onboarding, growth spurts and business downturns. Managed Security Services (MSS) The Managed Security Services (MSS) market 'constitutes approximately 60 percent of the overall security outsourcing market' According to a recent Gartner report1, the Managed Security Services (MSS) market 'constitutes approximately 60 percent of the overall security outsourcing market , generating $18.7 billion in revenue in 2017 and growing at a CAGR of 11 percent through 2021. It is important to view MSS in the context of broader security outsourcing, because large enterprises are increasingly looking for hybrid engagements that include a mix of shared and dedicated service delivery components.' Key market trends in that report include: Moving beyond monitoring of only network-based security technologies, particularly the network perimeter, with increasing focus on the endpoint (e.g. managed EDR services) Increasing movement toward more customised outcomes for buyers Buyer demand for capabilities to monitor popular SaaS applications, and public cloud service providers and IaaS Enterprise Mobile Management (EMM) and Network Access Control (NAC) As enterprises are seeking more complete offerings from fewer managed security service providers, MSSPs in turn are seeking to expand service scope while reducing business risk and operational complexity. In comparison to working with point solutions that are limited due to custom integration, disparate management and licensing constraints, Pulse Secure uniquely offers MSSPs integrated Virtual Private Network (VPN), Enterprise Mobile Management (EMM), Network Access Control (NAC) and virtual Application Delivery Controller (ADC) solutions within a unified management framework for data center and hybrid IT implementation. Pulse Secure Access Suite for MSSPs MSSP packaging, including user-based licensing, will be available to authorised channel partners at the end of November through Pulse Secure’s global distributors MSSP packaging, including user-based licensing, will be available to authorised channel partners at the end of November through Pulse Secure’s global distributors. The Pulse Secure Access Suite for MSSPs’ list price starts at $6 USD MSRP per concurrent user per month for the first 500 users with higher discounts available for larger user counts. The solution includes a multi-tenant, centralised management system and licensing server that gives MSSPs operational oversight while also providing clients with dashboard visibility. The solution includes virtual appliance form factors for VMware, KVM and Hyper-V, and supports deployment in hosted cloud environments such as Microsoft Azure and Amazon AWS. “Ensuring secure access is more challenging than ever given the dynamics of cyber threats, IT consumerisation and software-defined data centers. Enterprises of all sizes are overwhelmed and increasingly looking to MSSPs for expertise and capacity,” said Scott Gordon, chief marketing officer at Pulse Secure. “Pulse Secure gives MSSP leaders an easy, proven and no-risk path to extend services and increase revenues for hybrid IT secure access. More importantly, our new MSSP packaging enables our service provider partners and their customers to deliver ubiquitous access productivity while ensuring compliance.” Managed Access Services “Pulse Secure has been a key vendor for our managed access services. In my team’s experience, Pulse is the only one that has reliably delivered as-advertised stability, performance and manageability, as well as new feature sets that satisfy our highly demanding clients,” said Nicholas Klein, SOC supervisor at GTT Managed Secure Access Group. “With Pulse Secure, our services are backed by a rock-solid, flexible platform paired with a responsive support team, allowing us to focus on the value-add aspects of our managed service for our customers.” “As business, government and educational institutions are building out their cloud-enabled infrastructure, enterprises must consider how to enforce appropriate resource and data access while delivering high usability for their users. indevis offers enterprises the benefit of expertise, resources, and experience to design and implement an integrated data center and cloud access strategy,” said Wolfgang Kurz, founder and CTO at indevis. “We believe Pulse Secure offers a breadth of Secure Access capabilities and interoperability that give our customers greater freedom to optimize and defend their mobile and cloud computing initiatives. We appreciate the operational and licensing advantages that the Pulse Secure packaging provides our customers and us.” Internet of Enterprises Orange Business Services is a leader in the Internet of Enterprises, the emerging digital business ecosystem powered by data" “Orange Business Services is a leader in the Internet of Enterprises, the emerging digital business ecosystem powered by data. We are at the core of our customers’ data journey,” said Nicolas Drogou, head of Orange Cyberdefense APAC. “Ensuring the security of the data and its journey end to end is paramount to us being the trusted partner for their Digital Transformation. Pulse Secure is a cornerstone solution within our managed security services suite. The features and scalability of its Secure Access suite enable us to tackle the complex Secure Access challenges that organizations face in an increasingly volatile threat landscape.” “RKON’s customers are building out significant mobile and cloud investments where potential exposure to cyberattacks, compliance and visibility gaps are top of mind,” said Jeff Mullarkey, CEO of RKON, a leading-edge MSSP based in Chicago. He further added, “Ensuring always-on and protected access to resources is foundational to their businesses. We support enterprises across all verticals with a specific emphasis in the mergers and acquisitions space. Our Managed Secure Access practice leverages the Pulse Secure platform's reliability and broad capabilities.”
Identiv, Inc., a global provider of physical security and secure identification, has entered into a definitive agreement to acquire Thursby Software Systems, Inc., an Arlington, Texas-based provider of security software for mobile devices. The acquisition is expected to strengthen Identiv’s identity offerings with complete solutions for secure and convenient logical access across smart cards and derived credentials on Apple iOS and Android mobile devices. It is also a major strategic step towards Identiv’s vision of converged, highly secure yet frictionless access to information and places through a single identity and a single infrastructure platform. Thursby’s software solutions provide strong security for enterprise and personal mobility, supporting bring-your-own-device (BYOD) and two-factor authentication (2FA) on mobile devices. The company enables Department of Defense (DoD) issued Common Access Cards (CAC), federally issued Personal Identification Verification (PIV) cards, derived credentials, and commercially issued PIV-I cards to access, sign, encrypt, and decrypt information and emails from Apple iOS and Android mobile phones or tablet devices. The company’s deep government strengths and mobile app expertise are core elements in our vision for federal and commercial security solutions" Accessing information on-the-go These capabilities have allowed over a hundred thousand DoD and federal employees, including the U.S. Navy Reserve via the Ready-2-Serve (R2S) mobile application, to use personal and government-furnished mobile devices to access needed information on-the-go. Thursby has sold more than one million software licenses to a range of customers and industries, including government, healthcare, finance, energy, education, research, Fortune 500, Global 2000, and OEMs. “This combination substantially strengthens our position as a trusted provider of convenient high-security solutions to government and enterprise customers,” said Steven Humphreys, CEO of Identiv. “Thursby has built deep, long-standing customer relationships, completely aligned with our strategy of providing secure software platforms that are customisable to specific customer preferences. Thursby's solutions truly deliver beyond its customers' expectations, providing both high security and terrific end-user convenience. The company’s deep government strengths and mobile app expertise are core elements in our vision for federal and commercial security solutions.” Supplier of smart card readers “Thursby’s seamless support of both government-grade smart card deployments and derived credentials also aligns with our philosophy of supporting customers' adoption of technologies at their own pace, optimised for their own use cases. We believe this accretive acquisition is a strategic step that moves us closer to achieving our long-term target business model, generating higher margins, improving profitability, and delivering a solutions platform that transforms our industry.” We are excited to be joining the Identiv team who shares our passion for bringing together security and innovation for our customers" Bill Thursby, President and Founder of Thursby Software Systems, commented: "In our 32 years, we have prided ourselves as being a leader in technology while remaining small and responsive. By becoming part of the Identiv family, we will retain our strengths while taking on the additional benefits of a large international company with an excellent reputation." “We first partnered with Identiv in 2011 as both a supplier of smart card readers and a customer by adding the Thursby Sub Rosa license to the Identiv mobile reader line-up. We are excited to be joining the Identiv team who shares our passion for bringing together security and innovation for our customers.” Securing BYOD and mobile access "We started working with Thursby and Identiv in 2016 to enhance productivity and secure BYOD and mobile access for our Reservists," said Tim Bentjen, Director of IT Development, Navy Reserve. "Thursby has been a key partner in making sure our applications are highly secure, yet convenient, in the field. To ensure compatibility of our secure mobile applications on Android platforms, we have leveraged the Identiv smart fold reader/mobile dongle."
Open Options, global provider of open platform access control solutions, will showcase their DNA Fusion access control platform and its powerful components from November 14-15 at ISC East 2018 in New York City. Considered one of the largest and most comprehensive security industry trade shows globally, ISC East hosts 7,000 security professionals and showcases a wide range of products and solutions from 250 global security brands. ISC East attendees are invited to visit Open Options at booth #563 to learn about the latest features in the DNA Fusion platform, including FlexAPI, Open Options’ application programming interface, OpenDX database exchange software, and DNA Fusion’s Mobile and Web applications. IT-centric access control solutions Attendees will also be able to learn more about DNA Fusion’s numerous partnerships and integrated solutions with industry leaders such as Milestone, Allegion, Vingtor-Stentofon, ASSA ABLOY, thyssenkrupp, Traka, and many more. “Our ability to provide the most IT-centric access control solution on the market is enhanced by unified partnerships and integrations with other leaders in the security industry, and we’re excited that ISC East will be our platform to announce the latest additions to our extensive partnership portfolio,” said Open Options’ Founder & CEO, Steve Fisher. Fisher adds, “Each new integration adds robust functionality that enhances the DNA Fusion user experience and provides even more opportunities to supply our customers with a best-of-breed solution.”
Centralite Systems, Inc., premier manufacturer of reliable, wirelessly connected devices based on the Zigbee home automation platform, has announced that its 3-Series Micro Motion Sensor and Micro Door Sensor have been certified to work with Echo Plus, Amazon’s popular voice assistant. Centralite Motion and Micro Door Sensors Amazon recently added support for motion and door sensors to Echo Plus Amazon recently added support for motion and door sensors to Echo Plus; with this announcement, Centralite becomes one of only two hardware partners whose sensors have been designated as ‘Works with Alexa’ devices in connection with Echo Plus. Because Centralite’s sensors are Zigbee-based, and Echo Plus has built-in ZigBee capability, no third-party hub is required; both sensors can be easily integrated directly into Echo Plus. According to an Alexa blog on Amazon.com, the incorporation of the new door and motion sensors opens up a range of new use cases. The blog explains that customers “can view their connected sensors in the Alexa App, query their status by asking Alexa, and use sensors to activate Routines to control other connected smart home devices and automate a wide variety of custom-built Routines.” Amazon Echo Plus compatibility These two sensors join an extensive list of Centralite devices that are already Echo Plus-compatible, including the company’s Smart Outlet, 4-Series Smart Outlet, Smart Dimming Outlet, In-Wall On/Off Switch, and In-Wall Dimmer Switch. The newest ‘Works with Alexa’ certification is part of building a long-term relationship with Amazon According to Sean Bryant, Centralite CEO, the newest ‘Works with Alexa’ certification is part of building a long-term relationship with Amazon. Smart home ecosystem “There’s no doubt that voice assistants are becoming an increasingly vital component in the smart home ecosystem, and Amazon leads the way with Alexa and Echo,” he noted. “Consequently, Centralite is committed to include Alexa and Echo Plus integration and support in our future product roadmap.” Bryant also added that Centralite, long known for its ‘white label’ smart home devices and solutions, will capitalise on this new integration as a way to build on the company’s rapidly growing consumer brand.
Bosch has expanded its professional services for integrators with the Boost Onsite Support offering available in North America. Designed to assist with the commissioning of large and complex installations, integrators selecting this service receive in-shop and/or on-site support from a Bosch technical expert as well as access to this specialist via email and phone throughout the duration of the project. Bosch security, safety and communications systems With this level of onsite support, installations are more efficient, and the integrator gains valuable experience that can be applied to future projects" The Bosch technical expert will provide review and guidance on the programming of Bosch security, safety and communications systems to ensure they are configured to meet the end user’s expectations and specifications. The expert will also advise the integrator on the best way to test the system, the functionality of the network, and any interfaces to products and systems from other manufacturers, as well as assist with end user training when needed. “With this level of onsite support, installations are more efficient, and the integrator gains valuable experience that can be applied to future projects,” said Eric Cechak, Vice President of After Sales Service in North America for Bosch. “Integrators that participated in our initial pilot program of the service have seen the requirement for additional phone-based technical support greatly reduced on projects where Boost Onsite Support was used. Their feedback verifies that having a Bosch expert provide guidance ensures up-front configuration is done correctly and any required adjustments are made efficiently. Overall, this service speeds installation time, reduces troubleshooting and call-back costs for the integrator, and improves end user satisfaction.” Boost Onsite Support Boost Onsite Support rounds out Bosch’s technical support offerings, which include a variety of solutions. In addition to support via phone, email and live chat, Bosch offers an online knowledgebase with technical solutions articles as well as YouTube channels featuring a wide range of video tutorials.
With a mission to provide and maintain good quality homes for Blackpool Council’s tenants and leaseholders, BCH has won a number of awards and accreditations for housing, repairs, customer services and community projects. The safety and security of residents is a high priority for BCH, which is why it has used products from STANLEY Products & Solutions for many years. During this time the primary system was made up of a GDX5 door entry system, along with an Indigo 1000 access control system, which were fully integrated. “We have a policy of continual improvement in the service we provide,” explains Anthony Walker, Mechanical & Electrical Officer at BCH. “Although the previous configuration performed well, I was convinced that the business and operational benefits of remote monitoring and the cloud could be utilised by upgrading the Indigo 1000 with a PAC 512 access control system.” Innovative remote monitoring platform The PAC 512 devices control all aspects of two secure doors, with up to two card readers installed as entry and exit readers on each doorAn upgraded system was specified for a BCH site comprising 80 blocks. It utilises the existing GDX5 front panels, which have been integrated with the PAC 512 controllers to create a highly innovative remote monitoring platform that can be accessed via a PC, tablet or smartphone. This is achieved using a general packet radio service (GPRS) platform, which is a faster and cost-effective means of connecting remote sites via a mobile network. It provides an enhanced service over traditional mobile/landline telephone connections and makes administration of the system more flexible. The PAC 512 devices control all aspects of two secure doors, with up to two card readers installed as entry and exit readers on each door. Each door also has a programmable auxiliary input that may be used for alarm system integration, and an auxiliary output that enables a buzzer or strobe to activate when security is breached or a door is left open. Email alerts during equipment failure In the event of communication loss, the PAC 512 allows all local functionality to continue until the server connection is restored, while the system features an auto-dial or email alert program that, in the event of an equipment failure at one of the locations, sends a notification so that the issue can be quickly rectified. In the event of communication loss, the PAC 512 allows all local functionality to continue until the server connection is restoredExplaining the benefits of using PAC 512, Andrew Burton, area sales manager at STANLEY Products & Solutions, says, “The cloud revolution has had a dramatic effect on the physical security equipment industry. Its development into access control technology means that not only can a system be managed remotely, specific personnel can even be granted or denied access to certain areas at different times, making it not only good for security but also for health and safety. “Furthermore, in the event of a theft or antisocial behaviour, it is possible to pinpoint exactly who was where and initiate appropriate action, using the live events and reporting.” Remote diagnostics and servicing BCH can also access information via the PAC Residential Cloud – helping to further enhance its remote monitoring operation. Remote diagnostics, technical issues and servicing can be carried out, and it’s also possible to remotely view status, set and unset a system and access an event log. For instance, if someone loses a key fob, BCH can access their information, carry out an authorisation check, let them into their abode and, if necessary, deactivate the missing device. It also allows the incumbent installer to remotely access the system’s software to physically input any special information such as extended door release times for specific residents. Programming key fobs remotely BCH worked with STANLEY to generate reports which show when a key fob hasn't been used for a specific period of timeWith a number of vulnerable residents, BCH worked with STANLEY Products & Solutions to generate reports which show when a key fob hasn't been used for a specific period of time. Anthony Walker comments, “If the report indicates non-use of a fob, we can take measures to deactivate it, and/or can send someone over to check on the person concerned and, if necessary, notify next of kin or the relevant authorities. “In extreme circumstances, we can also remotely open doors to allow access to the emergency services. Having the ability to immediately and remotely program fobs has been particularly beneficial to our customers who previously would have had to travel to our offices for this to be completed - saving both time and money and making best use of our resources.” Seamless migration to cloud With a large number of residents, each with their own key fobs, Anthony Walker was keen to avoid any disruption during the upgrade and wanted to ensure that the process was achieved as seamlessly as possible. Configuring the physical hardware was helped by the installation team’s existing knowledge of STANLEY Products & Solutions’ technology. On-site training was also provided by experts from STANLEY Products & Solutions and, on the very rare occasion when there was a problem, a full support and advice package was available. The use of the PAC Residential Cloud meant that the migration of tenant fob information into new system was straightforwardInstalling a new access control system can often result in replacing existing key fobs with new ones – not only is this costly and inconvenient but there is also an administrative burden associated with transferring all the information to the new devices. However, all these issues were circumvented, as the use of the PAC Residential Cloud meant that the migration of tenant fob information into new system was straightforward – so much so that tenants didn't even realise any change had taken place. In addition, having access control data in the cloud means that it is always backed up. Enhanced safety and security BCH’s Anthony Walker considers the installation a total success and concludes, “I initiated this upgrade project because I firmly believed that it would improve tenant satisfaction and make our overall operation more efficient.” He further added, “I’m delighted that both of these objectives have been achieved and that STANLEY Products & Solutions’ access control technology has improved security, safety and protection across our estate.”
Hospital Wattwil opened the doors to its new inpatient wing in March 2018. The 88 patient beds in total are being fitted with LEGIC technology in the final completion stage. This innovative service offers comfort, security and efficiency for the patient and hospital operator. A monitor is installed at every patient bed. The patients can identify themselves using an RFID smartcard or bracelet and log into their bed computer at any time. Innovative smartcard technology Information such as menus, services and other special hospital information can be accessed through the hospital’s extranet. The resulting costs can be easily and instantly debited from the card’s account. Cabinets by the patient’s bed and the lighting and curtain controls can also be accessed using the smartcard. All of this makes the processes at the hospital much easier. Patients learn how to use the system intuitively and welcome this helpful and smart technology. System expansion with personalised treatment information and appointments or transfer to smartphones and tablets is already being planned System expansion with personalised treatment information and appointments or transfer to smartphones and tablets is already being planned: another step towards a digital hospital. Wattwil has already taken the first step with digital patient files. The processes are being increasingly automated. This reduces paper processes and guarantees efficient process management. Integrated hospital security The system was integrated, and the project was completed by the company Ondamedia, which has the necessary experience in this field. Advantages for the end user: Easy to use thanks to the intuitive user interface All the information is available at every patient bed Different applications in the hospital using one system Highly reliable and secure information André Juszko Head of Technology / Medical Technology, Hospital Wattwil commented - “With the technology from LEGIC we have every opportunity to integrate more applications at the hospital in future.”
A maritime nation since antiquity, today Greece is one of the centres of the world shipping industry. At over 250 billion Euros annually, shipping accounts for more than six percent of the country’s GDP and employs nearly three-hundred thousand people. In an industry of this immense scale, onboard security is a primary concern. The demands on a sea-borne surveillance system for today’s shipping industry are as complex as they are challenging. Technet informatics needed a system that could help ensure crew safety and security, continuously monitor a vessel’s condition, ensure that proper procedures were being followed at all times, guarantee live monitoring of vessel alarm and loading procedures, and provide evidence in the event of emergencies, accidents, or piracy incidents. Of particular difficulty was the need for a camera to be installed above the main engine, where extreme heat and steam would destroy most camera systems. Developing a robust shipboard system A bulk vessel in Greece installed a complete shipboard system of IP-based security cameras to monitor the safety and adherence to procedure of onboard employeesA bulk vessel is a challenging environment in which to install a surveillance system. The construction of such vessels make complete coverage difficult and working conditions can be severe. Any number of issues can impact system operations, whether onboard or due to salt air and weather conditions. Despite these challenges, shipboard safety and security are of paramount importance, and the utilisation of advanced technology is vital to ensure that correct procedures are being followed and that a safe working environment is maintained, as well as to provide evidence in the event of any accident or incident. Facing this challenge, a bulk vessel in Greece recently installed a complete shipboard system of IP-based security cameras in order to monitor the safety and adherence to procedure of onboard employees as well as to secure the cargo. The security system had to be robust enough to work reliably over the course of months spent at sea. Technet Informatics has been working in information and communications technologies since 2010 in conjunction with software developers and hardware distributors from around the globe. Installation of fisheye and network cameras For this job, completed in February of 2017, they turned to VIVOTEK, the provider of surveillance solutions, to take advantage of VIVOTEK’s deep experience and broad range of camera types and to fulfil their need for specialised models to deal with a variety of shipboard conditions. Chief among these was VIVOTEK’s FE8181V fisheye camera with hard casing, installed above the main engine. VIVOTEK’s FE8181V features a detailed 5-Megapixel resolution sensor which produces superb image quality Also included were two IP-9171HP and two IP-8162 Full HD fixed network cameras for exterior views, an FE8181 on the bridge, and six high-performance, low-profile FE8180s to monitor the decks, all linked together by two ND8422P/ND8322P eight/sixteen channel embedded plug-and-play network video recorders in the ship’s office for easy monitoring. Weather and vandal-proof dome camera VIVOTEK’s FE8181V is the latest fisheye fixed dome network camera from VIVOTEK. It features a detailed 5-Megapixel resolution sensor which produces superb image quality. Equipped with a fisheye lens, this camera is ideal for placement above the main engine because it is encased in a weatherproof, IP66-rated housing, and is further strengthened by the adoption of a rugged, IK10-design housing, enabling it to handle a wide range of operating temperatures and rendering it both weather- and vandal-proof. The FE8181V true day/night camera features a removable IR-cut filter, maintains clear images 24 hours a day with built-in IR LEDs enabling the camera to provide uniform 360° surround illumination for clear and bright viewing at up to 10 meters, even in completely dark environments. High-performance FE8180 fisheye camera A single FE8180 can easily do the job of three to four standard CCTV cameras, dramatically reducing costs while blending in with any interior or exterior This tiny fisheye camera is not only extremely low-profile, with a diameter of only 90mm, but is also able to be mounted directly on the wall to capture 180° panoramic views, or on the ceiling for a 360° surround view, with zero blind-spots. A single FE8180 can easily do the job of three to four standard CCTV cameras, dramatically reducing costs while blending in with any interior or exterior. It was an ideal solution for the wide open spaces of a ship’s decks – seeing everything, but remaining unobtrusive. Because of the large number and wide variety of cameras used in and around the ship, two ND8422P sixteen-channel NVRs were installed. The plug-and-play functionality of these NVRs frees security staff to concentrate on their jobs, not installation or maintenance, and allows them to monitor ship conditions on-the-go via their EZConnect Mobile APP. With two NVRs installed for a total of seventeen cameras, the ship’s operators will be able to readily upgrade their system at any point in the future. In sum, the combination of simplicity of design, intelligent technology, and rugged protection from all elements makes VIVOTEK’s surveillance systems the only choice for the most demanding conditions on earth, or at sea.
Ask a student, or pretty much anyone, what they think about “access control” and you’ll get a shrug. Conversely, all of us are enthusiastic about security and convenience. Students across Europe are discovering SMARTair wireless access control gives them both. Adding SMARTair access control to a door involves just replacing a standard cylinder or escutcheon with a digital, smartphone- or smart-card–operated electronic lock. It’s hassle-free to make the switch to SMARTair. And with a system design focused on user experience, SMARTair takes some of the everyday pain out of student life. Wherever you fit SMARTair, it’s easy to configure access cards to enable payments in the canteen or at vending machines; for changing room locker locks; and for the photocopier or library loans. You can’t do that with a metal key. MIFARE RFID cards At Madrid’s prestigious Colegio Universitario de Estudios Financieros (CUNEF) students now open doors with smart MIFARE RFID cards instead of keys At Madrid’s prestigious Colegio Universitario de Estudios Financieros (CUNEF) students now open doors with smart MIFARE RFID cards instead of keys. CUNEF fitted escutcheons to monitor and ease access to different areas of the university for 1,600 students, without the need for expensive wired door locks. If a student loses their card, there’s no threat to campus security. A manager issues a new credential which automatically cancels the lost card — much faster than changing a lock. When Mezzino took ownership of Rialto Court — apartments for students attending Durham University and Teesside University — they replaced a mechanical master key system with SMARTair. From the company’s point of view, the high annual tenant turnover and a need for scheduled cleaning and summer shutdown were becoming difficult to manage with physical keys. Students also reaped the benefits of their new, user-friendly access system. They have the confidence no previous resident of their flat has copied a physical key. At Funway Academic Resort in Madrid, student rooms are also locked with SMARTair escutcheons. Energy-saving wall devices inside rooms regulate electricity use, and students each have their own safe locked with a SMARTair cabinet lock. The Funway gym, study rooms, games rooms, swimming pool and changing rooms, spa and staff areas are also locked with SMARTair escutcheons — and open with the same smart-card. SMARTair Openow solution The recent launch of the SMARTair Openow solution puts credentials on a mobile phoneThere’s more to come from SMARTair. The recent launch of the SMARTair Openow solution puts credentials on a mobile phone. With SMARTair and the Openow app, students can open their rooms and authorised doors with a smartphone. If you have your phone, you’re already carrying your keys. Student services or facilities managers issue virtual keys over-the-air — and can revoke them whenever they choose — so there’s no need for a key-card handover meeting, at the beginning or end of term. A time-limited virtual key arrives ahead of the first day and automatically expires when it’s time to vacate your halls. Mobile credentials Mobile credentials will be a big hit. Student life goes on inside the handset, as much as IRL (“In Real Life”, for the uninitiated). Last year’s Deloitte Mobile Consumer Survey found a fifth of 18- to 24-year-olds even check their phone for messages in the middle of the night*. From a security standpoint, phone-based credentials have another advantage. Checking our phones is “habitual”, “unconscious” and “repetitive”, according to one study**. We know very quickly if it is missing. How soon would you notice a missing plastic card, especially if you were enjoying yourself on a night out? Biometric security Plus, a virtual key on every student’s smartphone potentially provides an extra layer of biometric protection for every controlled university door Plus, a virtual key on every student’s smartphone potentially provides an extra layer of biometric protection for every controlled university door. Fingerprint, and even face and iris, scanners are commonplace on smartphones. ”Generation Z students were raised as digital natives,” says Felix Moran, SMARTair Product Manager at ASSA ABLOY. ”They expect convenience as a standard feature, not a mechanical solution used in Ancient Egypt. In Europe’s increasingly international, marketized higher education ecosystem, attracting these tech-savvy students is critical, as is keeping them satisfied with the campus experience.” SMARTair TS1000 software The complete SMARTair solution includes wireless escutcheons, cylinders, wall readers, locker locks and more; the intuitive SMARTair TS1000 software; and the enhanced new Openow app functionality. It works out the box and is easy to install — and even easier to operate.
Communication makes the world much, much smaller - but it also becomes critical to everyone. Once life-enriching communication technologies are embraced, not only do we like and enjoy the benefits, but we also become hooked on it day and night. "There is no doubt that the transportation industry is benefiting from always available communications, making sure drivers, mechanics, dispatchers are always connected and can exchange information when necessary," says Sagi Subocki, Vice President of Products and Marketing for MCC technology leader Softil. "However, for the most part until now, the transportation industry has had to rely on the traditional radio or simply standard mobile phones to perform all communications tasks. That's about to change with the advent of Mission Critical Communications over LTE and 5G as defined in the 3GPP Release 13-15 standard," adds Subocki. Mission critical communication over LTE MCC over LTE offers push to talk, push to video, text and multimedia chat, as well as location information for groups and point to point communications Mission critical communication (MCC) over LTE offers push to talk, push to video, text and multimedia chat, as well as location information for groups and point to point communications. Think about a driver who can push a button and instantly talk to all drivers within a 50-mile radius, for example, to inform them of road conditions, accidents, road works and other incidents. In the event of a breakdown, the truck driver can quickly obtain help from experts using video chat, which makes a driver's life a lot easier. Using the same MCC over LTE capabilities, the driver can see the location of all other drivers using the same radios, can engage in chat sessions with nearby garages and much, much more. And let's not forget that MCC over LTE communications can be prioritised over regular public mobile voice and data traffic, which can help in the case of accidents and natural disasters. Advanced communication solutions in Mining While different from the transportation industry, mining's reliance on advanced communication technologies might be even greater than the needs of the transportation market. Subocki explains: "Mission critical push to talk and push to video with guaranteed, prioritised delivery might well make the difference for mining workers. The ability to ask for urgent assistance simply at the push of a button is crucial in the day-to-day operations of an oil rig and a diamond mine." But the benefits of MCC over LTE don't stop there. As MCC over LTE communication is delivered over modern, very capable, rugged smartphones, these devices can be used to interface and collect data from all available sensors - air quality, temperature, radiation, presence of dangerous gases - all this information can be obtained automatically via MCC over LTE integration with IoT and can be used to increase safety. Drones in MCC over LTE In addition to engaging with all sensors, MCC over LTE communications can include drones which would provide video feeds whenever necessary In addition to engaging with all sensors, MCC over LTE communications can include drones which would provide video feeds whenever necessary - and the 3GPP MCPTT Release 16 standard will extend mission critical communication to include robots, which might be priceless. "Think about the implications of sending an MCC enabled robot to investigate a mine explosion and you'll see the future of MCC over LTE and 5G communications in the mining industry," adds Subocki. Market Value and Outlook A report from ABI Research found the total mission-critical communications market for base stations, repeaters, handsets and infrastructure in 2022 will be US$10 billion. The North American market continues to account for more than half of this world market with the rapidly growing Asia-Pacific region in second place with a 20 percent market share. Public-safety radio was the ancestor of critical communications providing mission-critical voice services and continues to represent over half of this market, followed by the industrial, transportation and utility segments. However, the need for mobile broadband data has also entered the equation driving critical communications systems to evolve to digital radio for data handling and spectrum efficiency. As a result, critical communications systems are slowly evolving from the current TETRA, Digital Mobile Radio (DMR) and Project 25 (P25) to coexist and interoperate with Long Term Evolution (LTE)-based systems. Softil's MCC over LTE Leadership Softil is a leader in Mission Critical Communication over LTE solutions for developers. Historically, Softil always focused on the full embrace of open communication standards - starting from close participation in the work of the appropriate SDOs, then developing best-of-breed APIs and implementation of the relevant standards, and most importantly, paying utmost attention to the interoperability of the offered solution by active participation and leading all relevant industry-wide interoperability testing events. Softil actively participates in development of the MCC over LTE standards in 3GPP, as well as interoperability testing at the ETSI Plugtest Events. Most importantly, Softil 3GPP Release 13-15 compliant client SDK implementation had been already commercially deployed on the market - in Korea, Softil powers latest and greatest implementation of the MCC over LTE-R communication devices installed on the newest high-speed train line, such as one connecting Incheon airport to PyongChang during the Olympic games.
HID Global, a worldwide provider of trusted identity solutions, was selected by Skanska, one of the world’s project development and construction groups with operations in Europe and North America, to incorporate HID’s mobile solution for secure access to its new office complex in Warsaw. Powered by Seos, HID Mobile Access improves the user experience and increases security throughout the entire building – from the parking lot and elevators to areas with limited access to the public. Located at 173 Solidarności Avenue in Warsaw, the new Spark office complex is not only the new headquarters of Skanska, but a large part of the 70,000 square-meter office building has also been set aside for other tenants. Because the building is intended to be a mixed-tenant space, it was crucial to restrict access to secure areas from unauthorised visitors. Using smartphones for access The Spark building was designed to enable mobile access so that employees can now use their smartphones to open doors and enter secure areas. Skanska, with help from system integrator Sharry Europe, created a new system for building occupants that integrates numerous building applications, including HID Mobile Access. As a result, all building applications have been incorporated into an integrated mobile app, which marked an advancement in creating a more streamlined and convenient experience for the users. HID Mobile Access enhances the security for accessing our entire building" Both Spark building employees and their guests can now move throughout the building with nothing more than a smartphone, without the risk of them gaining access to restricted areas – unless the proper access rights are granted. When users arrive at the door, they simply tap their iOS and Android devices to an iCLASS SE reader using Near-Field Communications (NFC) or Bluetooth Low Energy (BLE) and HID’s ‘twist and go’ feature to gain access from a distance. Any changes to the user’s access rights are remotely managed by the administrator through a cloud-based portal. Integrating all building applications into one “HID Mobile Access enhances the security for accessing our entire building. In one application, we have integrated all building applications, such as parking, virtual reception and other Internet of Things functionality, bringing the whole user experience to a new level,” said Renata Nowakowska, Innovation Manager at Skanska. “One of the most pressing objectives for facility managers in smart buildings is to crack the code on how to enable as many building applications and services on mobile devices as possible in order to simplify how occupants move through a facility and interact with building services,” said Hilding Arrehed, Vice President of Cloud Services, Physical Access Control. “Skanska’s integration of HID Mobile Access into their mobile platform is a perfect example of how organisations are leveraging the power of mobile credentials and the cloud to realise the full potential of creating a connected and more intuitive experience for their users, while increasing security at the same time.”