Viking Electronics has announced the release of the K-1900D-IP and K-1900D W-IP VoIP SIP compliant, classic-style desk and wall mounted hotline phones. “These timeless phones are now available with the most up to date VoIP SIP technology for a new spin on an old classic,” said Bill Heideman, President of Viking Electronics Viking VoIP SIP compliant phones The desk and wall mounted Viking VoIP SIP compliant phones are built with a multi-number dialer that rolls to the next number o...
Access control and security systems manufacturer, Inner Range has announced a new integration option for customers with specialist IP-based intercom systems from 2N. Integriti Inner Range’s intelligent integrated access control and security system, Integriti can now integrate with 2N’s IP-based intercom systems. 2N products allow secure and comfortable communication across even the most complex commercial sites, with multiple communication points, such as entrances, car park...
OnSolve, the global provider of mass notification and critical communication solutions for enterprise, small business, and government organisations, announced the acquisition of Stabilitas, a situational awareness provider that leverages artificial intelligence and machine learning to identify adverse events, analyse the risks posed by those events, and provide stakeholders with actionable threat intelligence. Critical event information Stabilitas’ AI solution constantly ingests more tha...
Pivot3, the provider of intelligent infrastructure solutions for mission critical video, announces it is the first hyperconverged infrastructure (HCI) platform to be certified with BVMS – the video management system from Bosch. This certification enables organisations using BVMS to realise additional improvements in economics, simplicity and agility in their physical security environments that only Pivot3’s video-optimised infrastructure can offer. Pivot3’s HCI surveillance so...
Globally renowned biometrics company, Fingerprint Cards AB (Fingerprints) has launched a new solution for the PC market. Following several successful integrations in Chromebooks, biometric authentication is in increased demand as a more convenient and secure authentication method for both consumer and enterprise PCs. Growing application of biometrics Fingerprints’ new solution is tailored for use across a growing number of different form factors and use cases, including notebooks, 2-in-1...
Cozaint Corporation, manufacturer of ‘smart’ physical security platforms, has announced the launch of the BOBBY-W wall-mounted physical security kiosk. Available immediately, this ‘Video Surveillance as a Service’ (VSaaS) device has been designed to augment human security guard environments that need additional eyes and ears on their premises. BOBBY-W physical security kiosk BOBBY-W is based on a custom, Cozaint-built expandable platform that allows for the integration...
ProdataKey (PDK), the manufacturer of the cloud access control platform built for mobile, announces several updates to its ‘touch’ Bluetooth reader and mobile app that further distinguish the pdk io solution as the most convenient, seamless, access control experience on the market. Unlike other mobile access control solutions, which require users to unlock and present their phone in place of a fob, PDK’s touch reader automatically senses encrypted credentials on locked phones carried by users, even when they’re deep inside pockets, bags and purses. Mobile-first solution The reader’s new ‘touch-free’ feature, designed to support COVID-19 best-practices for workplace safety, allows credentialed users to simply wave their hand within 2-3 inches of the reader in order to indicate an intent to enter. The result is a touch-free, hassle-free ‘walk-through’ experience that requires no contact with phone nor reader. PDK’s ‘touch app’, a separate component of the pdk io mobile-first solution, allows users to unlock entrances remotely with the push of a button within the app interface. It, too, has also been updated to offer enhanced functionality and greater convenience. New multi-site support allows individuals to access more than one pdk io system from within the same app. Multi-site support The new multi-site support allows favourite entryways to be located at one or multiple locations For example, a person whose apartment complex and workplace are both secured with a pdk io system can control and open doors at both locations from a single log-in within the app. Or, if they have more than one job, they can access multiple work locations, with each site’s administrator retaining control over respective permissions for specific doors and times. Another new feature, ‘Favourites’, allows users to identify doors most frequented so that they can be accessed quickly from the first screen within the app. Again, the new multi-site support allows favourite entryways to be located at one or multiple locations. The features of the touch reader and touch app are just some of the many ways in which the pdk io platform has been engineered as a mobile-first solution, leveraging the superior flexibility, usability and ‘carry-it-with-you’ convenience that’s unique to smartphones. Decentralised system management In fact, pdk io administrators, managers, installers and technicians benefit from the identical user experience, whether they are logging into the platform through a computer, tablet or the mobile native app. This includes access to system installation and configuration tools, issuing of credentials, permissions management, user groups, monitoring dashboards, reporting and event-call up and many other features. Jeff Perri, President and COO or ProdataKey, says, “PDK has long espoused the benefits of a mobile-first approach to access control because it’s clearly what customers want; they prefer to use their phones for everything they can. However, the COVID-19 pandemic has made mobile-first even more relevant, both for its support of remote, decentralised system management and the touch-free benefits it offers to workers or tenants. Plus, our integration with many complementary security solutions from industry partners further expands the ways that security can be managed from the palm of your hand.”
Check Point Research has published its latest Global Threat Index for July 2020. Researchers found that after a five-month absence, Emotet has surged back to 1st place in the Index, impacting 5% of organisations globally. Since February 2020, Emotet’s activities – primarily sending waves of malspam campaigns – started to slow down and eventually stopped, until re-emerging in July. This pattern was observed in 2019 when the Emotet botnet ceased activity during the summer months but resumed in September. In July, Emotet was spreading malspam campaigns, infecting its victims with TrickBot and Qbot, which are used to steal banking credentials and spread inside networks. Some of the malspam campaigns contained malicious doc file with names like “form.doc” or “invoice.doc”. According to researchers, the malicious document launches a PowerShell to pull the Emotet binary from remote websites and infect machines, adding them to the botnet. The resumption of Emotet’s activities highlights the scale and power of the botnet globally. Emotet botnet active again Emotet is the most popular malware with a global impact of 5% of organisations, closely followed by Dridex and Agent Tesla “It’s interesting that Emotet was dormant for several months earlier this year, repeating a pattern we first observed in 2019. We can assume that the developers behind the botnet were updating its features and capabilities. But as it is active again, organisations should educate employees about how to identify the types of malspam that carry these threats and warn about the risks of opening email attachments or clicking on links from external sources. Businesses should also look at deploying anti-malware solutions that can prevent such content reaching end-users,” said Maya Horowitz, Director, Threat Intelligence & Research, Products at Check Point. The research team also warns that “MVPower DVR Remote Code Execution” is the most common exploited vulnerability, impacting 44% of organisations globally, followed by “OpenSSL TLS DTLS Heartbeat Information Disclosure” which impacts 42% of organisations worldwide. “Command Injection Over HTTP Payload” is in third place, with a global impact of 38%. Emotet and Dridex Emotet was originally a banking Trojan, but recently is used as a distributor of other malware or malicious campaigns Emotet is the most popular malware with a global impact of 5% of organisations, closely followed by Dridex and Agent Tesla affecting 4% of organisations each. Emotet – Emotet is an advanced, self-propagating and modular Trojan. Emotet was originally a banking Trojan, but recently is used as a distributor of other malware or malicious campaigns. It uses multiple methods for maintaining persistence and evasion techniques to avoid detection. In addition, it can be spread through phishing spam emails containing malicious attachments or links. Dridex – Dridex is a Trojan that targets the Windows platform and is reportedly downloaded via a spam email attachment. Dridex contacts a remote server and sends information about the infected system. It can also download and execute arbitrary modules received from the remote server. Agent Tesla Agent Tesla is an advanced RAT functioning as a keylogger and information stealer capable Agent Tesla – Agent Tesla is an advanced RAT functioning as a keylogger and information stealer capable of monitoring and collecting the victim's keyboard input, system clipboard, taking screenshots, and exfiltrating credentials belonging to of a variety of software installed on a victim's machine (including Google Chrome, Mozilla Firefox and Microsoft Outlook email client). Top exploited vulnerabilities “MVPower DVR Remote Code Execution” is the most commonly exploited vulnerability, impacting 44% of organisations globally, followed by “OpenSSL TLS DTLS Heartbeat Information Disclosure” which impacts 42% of organisations worldwide. “Command Injection Over HTTP Payload” is in third place, with a global impact of 38%. MVPower DVR Remote Code Execution – A remote code execution vulnerability that exists in MVPower DVR devices. A remote attacker can exploit this weakness to execute arbitrary code in the affected router via a crafted request. OpenSSL TLS DTLS Heartbeat Information Disclosure (CVE-2014-0160; CVE-2014-0346) – An information disclosure vulnerability that exists in OpenSSL. The vulnerability is due to an error when handling TLS/DTLS heartbeat packets. An attacker can leverage this vulnerability to disclose memory contents of a connected client or server. Command Injection Over HTTP Payload – A command injection over HTTP payload vulnerability has been reported. A remote attacker can exploit this issue by sending a specially crafted request to the victim. Successful exploitation would allow an attacker to execute arbitrary code on the target machine. Top mobile malware families xHelper is the most popular malware, followed by Necro and PreAMo. xHelper – A malicious application seen in the wild since March 2019, used for downloading other malicious apps and display advertisements. The application can hide itself from the user, and reinstall itself in case it was uninstalled. Necro – Necro is an Android Trojan Dropper. It can download other malware, showing intrusive ads and stealing money by charging paid subscriptions. PreAMo – PreAmo is an Android Malware imitates the user by clicking on banners retrieved from three ad agencies – Presage, Admob, and Mopub. Check Point’s Global Threat Impact Index and its ThreatCloud Map is powered by Check Point’s ThreatCloud intelligence, the collaborative network to fight cybercrime which delivers threat data and attack trends from a global network of threat sensors. The ThreatCloud database inspects over 2.5 billion websites and 500 million files daily, and identifies more than 250 million malware activities every day.
Matrix, a ‘Make in India’ manufacturer of Telecom and Security solutions, is renowned internationally for devising solutions for different-sized businesses. The innovator taps the communication requirements of every industry vertical and tailors products accordingly. GeM - CII NPPC 2020 Being a major player in the government sector, Matrix is participating in GeM - CII National Public Procurement Conclave 2020 (GeM - CII NPPC 2020), organised by the Government e-Marketplace (GeM), in association with the Confederation of Indian Industry (CII), from 9th August to 9th September 2020. The event is a golden opportunity for sellers to network with procuring authorities of government entities. Matrix is well-known for its indigenous and innovative range of solutions for unified communications, IP video surveillance, access control, and time-attendance. Each of their solutions is specifically designed for large, multi-location enterprises, SME and SMB organisations. Security and Telecom solutions Matrix is slated to showcase Matrix COSEC COGNIFACE INTEGRA200, a touchless time-attendance terminal Matrix continuously works towards keeping abreast of the constantly upgrading technology by designing and manufacturing solutions that are equipped with the latest technology. Matrix will be presenting some of its indigenously engineered Security and Telecom solutions at the event. At GeM - CII National Public Procurement Conclave 2020, Matrix is slated to showcase newly launched Matrix COSEC COGNIFACE INTEGRA200, a touchless time-attendance terminal with face recognition. This solution can also be deployed for visitor management, cafeteria management, contract workers management and job processing and costing. Matrix COSEC COGNIFACE INTEGRA200 Matrix COSEC COGNIFACE INTEGRA200 combines all elements used for face recognition into a single package for ease of transportation, installation, mounting and application at the customer end. Apart from this, we are going to showcase a Network Video Recorder for high-resolution recording and live view of multiple streams. We will also showcase IP cameras that deliver exceptional low-light performance and are specifically built for demanding enterprise and project applications. Matrix caters to various industries with a range of IP security cameras (also known as network cameras) powered by Sony STARVIS sensor with Exmor technology for enhanced video surveillance capability. Attendees will also be able to look into high-performance door controllers, such as COSEC ARGO and COSEC VEGA for multiple applications, such as access control, time-attendance, cafeteria management and job processing & costing that removes the need of dedicated hardware for diverse solutions. IP-based Unified Communication Server Matrix will also be showing IP-based Unified Communication Server as well, which is a combination of hardware, SPARK200 and software PRASAR UCS. With IP-at-core, PRASAR forms the basis of a Voice over IP (VoIP) solution for modern-day business enterprise that adapts to existing infrastructure set-up with ease. It is a unique single box office UC solution for small-medium & large enterprises, with the same hardware for workforce strength, varying from a small unit with 100 users to large enterprise up to 2100 users. It connects internal and external decision-makers at multiple locations for effective communication and real-time collaboration. Other than this, there will be Smart Video IP Deskphone for business professionals to offer enhanced audio and video communication quality.
Ajax Systems have announced that the latest OS Malevich 2.9 update brings significant changes for users and security industry professionals. The new data import feature simplifies the process of replacing old hubs with new ones. Remote activation/deactivation Detectors that work incorrectly can now be deactivated remotely and still be part of the system. Button and transmitter got new types of alarm notifications, adjustable in the app. Automation devices can now work in pulse mode and activate electrical appliances for a short period. The in-app panic button can now be used anywhere, not just at the protected property. Upon activation, it sends smartphone coordinates to an alarm monitoring company and all system users. Data import: Replacing hubs without reconfiguring the system With the import feature, all settings, connected devices, security groups, scenarios, and users can be easily migrated from an old hub to the new one. Engineers and user-administrators can install a more advanced hub model on the protected property without reconnecting each detector. Import feature also allows engineers to quickly restore the security system’s integrity, if its hub fails for some reason. Even if the system has hundreds of devices, dozens of scenarios, and several ReX range extenders, data import will take less than 15 minutes. The process is almost fully automated. Just connect the new hub to the internet, switch off the old one, start the data import, and follow instructions in the app. Temporary device deactivation Wrong installation, bad mounting choice, low signal level, broken tamper, or any other malfunction can easily result in a false alarm. With the release of OS Malevich 2.9, engineers can deactivate malfunctioning detectors remotely. No need to delete them from the list of devices. No need to rush to location. Two types of temporary device deactivation are available in the Ajax app, one is complete device deactivation and the other, deactivation of the notifications about the lid state. When the device is entirely deactivated, it doesn’t execute system commands and can’t take part in automation scenarios. Hub ignores all alarms and notifications of the deactivated devices. If notifications about the lid state of the device are disabled, the hub ignores only its tamper alerts. Alarm monitoring companies and users can still receive other alarms and notifications of this device. Temporary device deactivation function became one of the most popular requests from European PRO-users. Now, the functionality is available for all Ajax users. Pulse mode for Socket and WallSwitch Socket and WallSwitch (with firmware version 188.8.131.52 or higher) as well as Relay (with any firmware version) can now toggle switch devices, powered from the mains for a defined period, from 0.5 to 255 seconds. When the timer expires, devices switch back to their initial state: on or off. Previously, Pulse mode was available only in the Relay settings. It allowed electrical contacts to touch for up to 15 seconds and let the current flow. At the same time, Socket and WallSwitch could work only in bi-stable mode, closing and opening an electric circuit following the user’s command or executing a specific scenario. An additional command was required to change their state again. With OS Malevich 2.9 update, users have more options for automating lighting, electromechanical locks, and electric valves that control the water supply. Unlike Relay, WallSwitch and Socket can control electrical appliances without intermediary relays, rechargeable batteries, or an inverter. Adjustable alarm types for Button and Transmitter Information in alarm notifications defines how an alarm monitoring company and users will respond to the situation With OS Malevich 2.9 release, the settings of button and transmitter were expanded with an option to choose a type of alarm that the device communicates with an alarm monitoring company and other users: Intrusion Fire Medical help Alarm button Gas Information in alarm notifications Information in alarm notifications defines how an alarm monitoring company and users will respond to the situation. That’s why it has to correspond to the nature of the threat accurately. For instance, a wired gas detector connected to Ajax via a transmitter should notify about a gas alert. And a button provided to an older person should notify about a medical emergency. By choosing an appropriate alarm type, engineers and user-admins change both the text of an alarm notification and a code of the event sent to the CMS. Transmission of smartphone coordinates to alarm monitoring companies using the in-app panic button Button, SpaceControl and panic button A panic button is a tool that is hardly ever used. But in case of an emergency, it can save lives. Button, SpaceControl, or the panic button in the Ajax app notifies CMS operators if someone is in danger and are located on protected premises. An alarm monitoring company will respond immediately, once the button is pressed. With OS Malevich 2.9 release, the in-app panic button transmits an alarm notification along with the smartphone coordinates to an alarm monitoring company. All system users also get the coordinates and can copy them to get directions using GPS apps. Now, users can call for help using the Ajax app from wherever they are. The second layer of protection from accidental pressing in SpaceControl SpaceControl key fob With OS Malevich 2.9 release, SpaceControl gets additional protection from accidental pressing SpaceControl key fob has to be within reach, in a pocket, bag, or keychain, the places where its buttons can be easily pressed by accident. So, they have equipped SpaceControl with firm buttons and developed a filter that ignores any pressing shorter than 0.15 seconds. With OS Malevich 2.9 release, SpaceControl (firmware 184.108.40.206 or higher) gets additional protection from accidental pressing, which has already proved its efficiency in button. Now, double-click and long-press activation options are available in the device settings in the Ajax app. They recommend turning on this feature to avoid situations when premises are accidentally armed, or the panic button is unintentionally pressed. Other features added include: The option to configure Socket LED brightness - Now, it can be turned off or dimmed. Users can check for the new features in the device settings in the Ajax app or check the Socket manual if in need of help. Notifications about hubs being switched off/on or factory reset - Now, alarm monitoring companies and users will be informed of why a hub went offline. The option to switch off the visual indication of a detector triggering - The LED indicator of a detector can now be deactivated in the device settings. The feature is available for DoorProtect, DoorProtect Plus, MotionProtect, MotionProtect Plus, CombiProtect, MotionProtect Outdoor, MotionCam, and GlassProtect with firmware update 220.127.116.11 and higher, as well as MotionProtect Curtain with firmware update 18.104.22.168 or higher. New devices support - Hub 2 Plus, StreetSiren DoubleDeck, MultiTransmitter.
In the current landscape where reduced touch-points and low operating costs are nothing short of paramount, security expert Mul-T-Lock is offering a tailored access control solution to all hotel, holiday park and short-break property owners. SMARTair® is a modular and fully scalable access control system that offers an intelligent, yet simple, step up from keys. For hotels and home rental properties in particular, SMARTair® will replace inconvenient keys with a wireless locking system operated by smartcards and even smartphones when used in conjunction with Mul-T-Lock’s Openow™ app. Leisure and tourism industry solution With so many businesses in the leisure and tourism industry needing to cut operational costs and provide a safe and hygienic service to customers, SMARTair® does away with the need for manned receptions and touchscreens by putting the onus of checking in right in guests’ hands, with security still being closely monitored and operated by system managers. With SMARTair®, lost cards can be cancelled and replacement cards reprogrammed for increased guest security. The system can be tailored to meet each building’s needs and can be reprogrammed using the latest in access control management software as those needs evolve, without having to replace any physical locking systems – making it a cost-effective and straightforward solution for all hospitality venues. Monitor and control access rights With no hardwiring, the system can be installed at low cost with minimal disruption to a business. Designated system managers can also monitor and control access rights – allowing guests access when needed and revoking access once they check-out. The SMARTair® product portfolio also includes energy-saving devices for mounting on guest room walls and in-room safes. By utilising the Openow™ app, business owners, facilities managers and security administrators can instantly send, revoke or update virtual keys from the designated SMARTair® software or web browser allowing guests to access properties and rooms via their smartphone. System managers can be anywhere in the world when controlling access rights; making the whole process more convenient and secure for everyone. This also significantly reduces whole life costing, as it removes the need to replace key cards when they are lost or accidentally taken home by guests. Virtual keys mobile access An added bonus, Openow™ makes it easy for business owners to organise virtual keys inside the app, check how long they are valid, and protect them further with an individual PIN. If they have virtual keys from multiple sites or premises, Openow™ easily handles those too, with no time wasted wondering where key cards were left and no more appointments to pick them up or have them revalidated. Mul-T-Lock’s SMARTair® system with Openow™ app is the perfect solution for hotels and holiday parks with a high volume of visitors and subcontractors. It is built for businesses where third-party contractors are always on-site, hospitality venues that offer rooms for hire and boutique hotels or home rental with no manned receptions.
Places of leisure, where people spend their downtime, are public by design. Unlike a bank vault or power plant, they actively invite visitors. They can’t just lock be locked down and hope that no one turns up. Equally, to ensure user and property safety, access must not be a free for all. Managing risk, separating authorised from unauthorised people and locations, is part of every site manager’s daily routine. Intelligent locking makes this workload a whole lot easier. Intelligent locking solutions Intelligent keys combine the powerful features of electronic access control with the convenience and familiarity of mechanical keys. In hugely diverse leisure settings across Europe, they already help managers do more with less. The right access solution can help system administrators do it safely without putting a burden on those responsible for everyone’s security. Controlling access to outdoor sites and visitor attractions Robust, battery-powered locking, backed by intuitive admin software can enable access from anywhere Obviously, for many leisure attractions, wired electronic security is not an option. Locations may be remote, far beyond the reach of mains electricity. Assets themselves may be outside. Thankfully, cabling is not essential for effective intelligent access control. Robust, battery-powered locking, backed by intuitive admin software can enable access from anywhere, thereby matching or exceeding the functionality of traditional wired access control. Padlocks built to withstand climate extremes integrate within the system exactly like standard interior locks. Intelligent electronic key systems Intelligent electronic key systems are budget friendly. Making the switch from mechanical security is not an all-or-nothing decision. The best intelligent key systems can be rolled out gradually, as needs evolve and budgets allow. For example, the Llyn Brenig Reservoir and Visitor Centre in Wales attract tens of thousands of tourists every year. Both mechanical and electromechanical locking solutions protect a site, which houses critical infrastructure and watersports facilities, with disparate security needs. Here, electromechanical locking brings long-term cost savings to site owners Welsh Water, because locks no longer need to be changed, when keys are lost. Permissions are simply deleted from the system software. Upgrading zoo access control system In 2015, Twycross Zoo launched a £55 million, two-decade development plan. High on the agenda was a new intelligent key solution to replace a mechanical master-key system which was labour-intensive to administer. The new system’s flexibility has put zoo security managers in full control of their site. Only staff with the necessary authority and training can access animal enclosures. It’s simple for system administrators to issue time-defined user keys. These can permit vets or zookeepers access to enclosures for a specific time period outside regular hours, for example, in an emergency. When the period expires, the key no longer works and site integrity is automatically restored. Access control in the museum sector Securing museums, open spaces with priceless contents presents one of security’s biggest challenges When Edvard Munch’s painting ‘The Scream’, was stolen from an Oslo museum in 1994, thieves left a note which read, ‘Thanks for the poor security.’ Securing museums, open spaces with priceless contents presents one of security’s biggest challenges. Around 50,000 artworks are stolen every year, according to some estimates. Adding further complexity, many museums are located within historic properties. The building itself may be integral to the attraction and come with strict heritage protections. Any new locking installation must make minimal mess. For this reason, wireless is increasingly the preferred choice. Wireless access systems Wireless access systems based on robust, key-operated locking, rather than cards and other keyless credentials, combine a familiar technology (the metal key) with the intelligence to keep staff and collections safe. Carrying one programmable key to be able to open doors, cabinets, windows and padlocks makes the security team’s rounds easier. It also minimises the number of keys in circulation with obvious security benefits. Companion software makes key tracking straightforward, with administrators always knowing who exactly is carrying credentials and they can refine or amend those permissions quickly, and order a full audit trail on demand. And these locks are discreet enough to maintain the property’s appearance. Protecting high-value assets and exhibits London’s Design Museum needed access control designed to protect high-value assets and exhibits. Devices here protect a contemporary site with three galleries, a restaurant/café and an events space, with 100 permanent staff and hundreds (sometimes thousands) of daily visitors. The building has multiple door sizes and must meet British Standards compliance. Electromechanical locks now control access through 56 doors, forming part of a security ecosystem, which incorporates traditional mechanical locks as well. Using intuitive management software, security managers ensure every staff member accesses only the right areas. CLIQ from ASSA ABLOY installed at museum The system the Design Museum chose, CLIQ from ASSA ABLOY, also enables integration with third-party cloud-based solutions Contractors are issued with temporary programmable keys, which saves time formerly wasted escorting them around the building. The system the Design Museum chose, CLIQ from ASSA ABLOY, also enables integration with third-party cloud-based solutions, for control via a single, central management interface. The delicate balance between protecting a precious building and guarding its contents sets a major challenge. Security and access control must be ‘subtle, but ever present,’ according to one former moderator of the Museum Security Network. Invasive installation, showy or inappropriately designed devices and components cannot be considered. CLIQ access control technology This was the checklist facing France’s Musée Maurice Denis, the museum is inside a listed 17th century monument, so they turned to CLIQ access control technology for a solution. Drawing on extensive experience in the heritage sector, ASSA ABLOY delivered class-leading security without disrupting the building aesthetic. Installation was easy and wire-free, because encrypted electronics inside CLIQ locks are powered by the standard batteries inside every programmable key. No further power supply is needed at the door. Robust, hard-wearing cylinders and padlocks installed Around 70 robust, hard-wearing cylinders and padlocks now secure doors and windows inside, and outside the main building with waterproof padlocks protecting CCTV camera that are housed on the exterior. Every employee receives access to relevant areas via a single CLIQ key, which administrators program with only the appropriate permissions. Insurance compliance is another major concern in the heritage sector. Indeed, insurers for 17th century warship, Vasa demand Sweden’s highest level of locking, Class 3. Yet, the Vasamuseet’s access system must also allow 1.2 million annual visitors to move around freely, while keeping exhibits safe. CLIQ Remote electromechanical technology Around 700 interior door cylinders were equipped with CLIQ Remote electromechanical technology To upgrade an existing mechanical system, around 700 interior door cylinders were equipped with CLIQ Remote electromechanical technology. Museum staff used to carry heavy chains with ten or more keys. Now, facility managers can amend the access rights of everyone’s single CLIQ key at any time, even remotely, using the CLIQ Web Manager. It’s easy to issue contractors such as carpenters with access rights scheduled to end automatically as soon as their work is complete. Security for shopping and indoor leisure sites According to one study completed two decades ago, people spend 87% of their time indoors. The number is probably higher now and includes a huge chunk of everyone’s leisure time. Large retail multiplexes like Festival Place in the UK are a popular destination. Here, over 170 shops, a cinema, sports centre and restaurants have an ever-changing roster of permanent staff, cleaners and out-of-hours contractors. Every person requires secure entry on demand. The public also needs open access for 18 hours every day. Benefit of CLIQ electromechanical cylinders Yet, a single lost mechanical key could become a security problem for all users and tenants. Installing 100 CLIQ electromechanical cylinders drastically cut the burden of mechanical key management. Now, cleaners and maintenance workers carry an intelligent key, which unlocks specific doors for a pre-defined time period. Using simple online admin software, site managers can immediately de-authorise and reissue a lost key or amend any key’s permissions. Generating a comprehensive audit trail, who accessed which lock and when, takes a couple of mouse clicks. Electronics-inside CLIQ locks CLIQ also cuts Festival Place operational costs. The electronics-inside CLIQ locks are powered by the standard battery inside every key, not mains electricity. Installation was wireless, a huge saving on potentially expensive electrical work. At Festival Place and wherever we gather to enjoy leisure, indoors or outside, CLIQ enables easy access control for all openings with just a simple, single, programmable key.
The emergence of smartphones using iOS and Android is rapidly changing the landscape of the IT industry around the world. Several industries, such as digital cameras, car navigation, MP3, and PNP, have been replaced by equivalent or even better performance using smartphones. Smartphones provide increasing portability by integrating the functions of various devices into a single unit which allows them to connect to platforms with network-based services and offer new services and conveniences that have never been experienced before. These changes have expanded into the access control market. Although not yet widespread, ‘Mobile access cards’ is one of the terminologies that everyone has been talking about. RF cards used for access security are being integrated into smartphones just as digital cameras and MP3s were in the past. While people might forget their access cards at home in the morning, they seldom forget their smartphones. Using smartphones for access control increases entry access reliability and convenience. Mobile/smartphone access control A key aspect of mobile credential is that it makes it possible to issue or reclaim cards without face-to-face interaction As in other markets, the combination of smartphones and access cards is creating a new value that goes beyond the simple convenience of integration enhancing the ability to prevent unauthorized authentication and entrance. People sometimes lend their access cards to others, but it is far less likely they might lend their smartphone with all their financial information and personal information – to another person. This overcomes an important fundamental weakness of RF cards. Another valuable aspect of mobile credential is that it makes it possible to issue or reclaim cards without face-to-face interaction. Under existing access security systems, cards must be issued in person. Since card issuance implies access rights, the recipient’s identification must be confirmed first before enabling the card and once the card has been issued, it cannot be retracted without another separate face-to-face interaction. Mobile access cards In contrast, mobile access cards are designed to transfer authority safely to the user's smartphone based on TLS. In this way, credentials can be safely managed with authenticated users without face-to-face interaction. Mobile cards can be used not only at the sites with a large number of visitors or when managing access for an unspecified number of visitors, but also at the places like shared offices, kitchens and gyms, currently used as smart access control systems in shared economy markets. The market share of mobile access cards today is low even though the capability can offer real benefits to users and markets. While the access control market itself is slow-moving, there are also practical problems that limit the adoption of new technologies like mobile access cards. Use of Bluetooth Low Energy technology While NFC could be an important technology for mobile credential that is available today on virtually all smartphones, differences in implementation and data handling processes from various vendors prevents universal deployment of a single solution to all devices currently on the market. Accordingly, Bluetooth Low Energy (BLE) has been considered as an alternative to NFC. Bluetooth is a technology that has been applied to smartphones for a long time, and its usage and interface are unified, so there are no compatibility problems. However, speed becomes the main problem. The authentication speed of BLE mobile access card products provided by major companies is slower than that of existing cards. Enhancing credential authentication speed Authentication speed is being continuously improved using BLE's GAP layer and GATT layers The second problem is that mobile access cards must be accompanied by a supply of compatible card readers. In order to use mobile access cards, readers need to be updated but this is not a simple task in the access control market. For 13.56 MHz smart cards (which were designed to replace 125 kHz cards), it has taken 20 years since the standard was established but only about half of all 25 kHz cards have been replaced so far. Legacy compatibility and the need for equivalent performance, even with additional benefits, will drive adoption timing for the Access Control market. While BLE technology helps resolve the compatibility problem of mobile access cards, it can identify some breakthroughs that can solve the speed problem. Authentication speed is being continuously improved using BLE's GAP layer and GATT layers, and new products with these improvements are now released in the market. Making use of key improvements allows Suprema's mobile access card to exhibit an authentication speed of less than 0.5 seconds providing equivalent performance to that of card-based authentication. AirFob Patch MOCA System's AirFob Patch addresses the need for technological improvements in the access control market in a direct, cost effective, and reliable way – by offering the ability to add high-performance BLE to existing card readers – enabling them to read BLE smartphone data by applying a small adhesive patch approximately the size of a coin. This innovative breakthrough applies energy harvesting technology, generating energy from the RF field emitted by the existing RF reader – then converting the data received via BLE back into RF – and delivering it to the reader. By adding the ability to use BLE on virtually any existing RF card reading device, MOCA allows greater ability for partners and end users to deploy a technologically-stable, high performance access control mobile credential solution to their employees, using devices they already own and are familiar with. Adding MOCA AirFob Patch eliminates the need to buy and install updated readers simply to take advantage of mobile credential, lowering costs and risks, and increasing employee confidence and convenience. Growth forecast of mobile access card market in 2020 In 2020, forecasts show that the mobile access card market will grow far more rapidly Several companies have entered the mobile access card market, but they have not set up a meaningful product solution stream until 2019. In 2020, forecasts show that the mobile access card market will grow far more rapidly. Reviewing new entries into the market allows identification of the latest products that provide improving solutions to compatibility and speed problems. MOCA AirFob Patch addresses development plans in process today that overcome the legacy installed base of card readers – allowing rapid creation of an environment that can make immediate use of BLE mobile access cards. Integrated mobile digital ID With proven usability and within suitable environments, mobile access cards will also begin to make inroads into other markets, not just the access control market. In the sharing economy market, which seeks access management without face-to-face interaction, the integrated mobile digital ID led by the 'DID Alliance' will serve as a technical tool that can be used in access authentication – forging increasing links between the access control and digital ID markets.
It’s hard to believe that we’re in the final quarter of 2019. It’s time to wrap up goals and make new ones that will guide us into another decade. As we look forward, we can’t help but look back at some of the key trends that emerged in the last couple of years, and their continued presence in the product road maps and plans that so many security industry leaders and manufacturers are creating. Some of these trends have enhanced the efficacy of security systems, whereas others have the potential of having adverse impacts. Cybersecurity Cyber-attacks of all kinds have become, and will continue to be, a major threat, making this one of the most important initiatives that today’s businesses embrace. From a manufacturer’s perspective, building cybersecurity into the product from its inception is critical, with integrators beginning to demand this level of consideration from the products they sell. As a result of a rise in the convergence of IT applications alongside security investments, end users are now seeking out solutions designed with data security top-of-mind. All network connected devices such as DVRs/NVRs, servers, IP cameras, access controllers, intrusion alarms, smart sensors, are vulnerable, which is why this added step in developing cybersecurity protocols and applying them across the organisation is critical. Building cybersecurity into the product from its inception is critical More connected devices The Internet of Things (IoT) has been a major trend for the past few years in many industries, and this will continue as we integrate sensors of all kinds into the network. The collection and analysis of the data collected by these sensors is giving rise to a plethora of applications such as industrial applications, intelligent building management, event management, and much more. The physical security industry benefits by having additional intelligence for situational awareness and emergency management, as well as opportunities to provide additional value-added services and business insights. Being deployed in an increasing number of scenarios and with continued improvements in computing capabilities, video has the opportunity to become the eye of IoT. AI-enabled devices Software manufacturers are looking toward artificial intelligence to help propel advanced analytics in an effort to deliver more situational awareness to operators, and an increased ability to proactively assess threats or anomalies. While video and data analytic capabilities have been around for quite some time, some would argue they were rudimentary in comparison to software that uses AI to make existing applications such as facial recognition much more accurate, and to create new ways to detect anomalies. In addition, AI continues to be used to make sense of the large amounts of data that are being generated by intelligent sensors and by analysing the growing amount of video. 5G connectivity It’s safe to say that 5G will revolutionize the way people stay connected to the internet. Extra speed, extra bandwidth are going to make our mobile devices faster, more powerful and hyperconnected, with the same thing happening to IoT connected devices such as cameras. This is going completely change the way we think about smart cities: more powerful IP devices connected to one another, powered by AI, will have a massive impact on the way we move, shop and live in urban areas. more powerful IP devices connected to one another, powered by AI, will have a massive impact on the way we move, shop and live in urban areas Privacy concerns In most advanced economies around the globe, citizens are increasingly concerned with privacy of their data, and many governments have put – or are in the process of doing so – stringent data protection laws in place. The EU has lead the way in using these concerns to develop privacy regulations that govern the development of data-driven applications. This trend is starting to impact the entire globe, as we shift toward more data autonomy and privacy. Since most physical security applications involve the collection of video and data about people and assets, privacy regulations will continue to have a significant impact on the industry well into the future. Cloud and mobile capabilities Mobility is critical for physical security and is emerging through the development and use of cloud-based services, as well as the ability to access security devices through a smart phone or Web-based browser. That’s why there’s been such an influx of mobile apps created to manage cameras, receive automatic alerts for the most diverse event, and giving users the ability to grant or restrict access to a facility. All of this demonstrates the world’s demand for mobility, connectivity and ease-of-use. More video — everywhere Video is the cornerstone of security, providing both real-time and forensic coverage for emerging threats and incidents, which is why it’s one of the fastest growing segments of the marketplace. The use of video for traditional applications in new markets, as well as for use in newer applications that are not necessary security related is poised to see the most movement. In some industries such as oil and gas, there is a trend towards extending video coverage into extremely harsh and hazardous environments, so manufacturers are challenged to develop appropriately certified equipment to meet a more stringent demand. Manufacturing facilities such as food processing plants are also increasing their use of video for training and compliance purposes to prevent incidents such as food recalls that can be extremely costly for the business. It’s an exciting time to be a part of the security market, as we’re really just beginning to see that, when it comes to technology advancements, the sky is the limit. I would argue at the core of these innovations is the video data being collected, and as we work to build technologies that can harness the power of these applications, we will continue to be at the forefront of this movement toward greater intelligence and business insights.
The statistics are staggering. The death tolls are rising. And those who now fear environments that were once thought to be safe zones like school campuses, factories, commercial businesses and government facilities, find themselves having to add the routine of active-shooter drills into their traditional fire drill protocols. The latest active shooter statistics released by the FBI earlier this year in their annual active-shooter report designated 27 events as active shooter incidents in 2018. The report reveals that 16 of the 27 incidents occurred in areas of commerce, seven incidents occurred in business environments, and five incidents occurred in education environments. Deadly active-shooter events Six of the 12 deadliest shootings in the country have taken place in the past five years Six of the 12 deadliest shootings in the country have taken place in the past five years, including Sutherland Springs church, Marjory Stoneman Douglas High School, the San Bernardino regional center, the Walmart in El Paso and the Tree of Life Synagogue in Pittsburgh, which have all occurred since 2015. Although these incidents occurred in facilities with designated entry points common to churches, schools and businesses, the two most deadly active-shooter events since 2015 were the Route 91 Harvest music festival shooting in Las Vegas that left 58 dead and the Pulse nightclub killings in Orlando where 49 perished. As Christopher Combs, special agent in charge of the FBI field office in San Antonio, Texas, said during a news conference following the August 31 mass shooting in Odessa, Texas that claimed seven lives: “We are now at almost every two weeks seeing an active shooter in this country." Active shooter incidents Between December 2000 and December 2018, the FBI’s distribution of active shooter incidents by location looks like this: Businesses Open to Pedestrian Traffic (74) Businesses Closed to Pedestrian Traffic (43) K-12 Schools (39) Institutions of Higher Learning (16) Non-Military Government Properties (28) Military Properties—Restricted (5) Healthcare Facilities (11) Houses of Worship (10) Private Properties (12) Malls (6) What the majority of these venues have in common is they all have a front entrance or chokepoint for anyone entering the facilities, which is why any active-shooter plan must include a strategy to secure that entry point. Situational awareness in perimeter and door security Preventing people with the wrong intentions from entering the space is the goal" According to Paul Franco, an A&E with more than 28 years of experience as a consultant and systems integrator focusing on schools, healthcare and large public and private facilities, that while active shooter incidents continue to rise, the residual effect has been an increase in situational awareness in perimeter and door security. “Certainly, protecting people and assets is the number one goal of all our clients. There are multiple considerations in facilities like K-12 and Healthcare. Preventing people with the wrong intentions from entering the space is the goal. But a critical consideration to emphasise to your client is getting that person out of your facility and not creating a more dangerous situation by locking the person in your facility,” says Franco. High-security turnstiles “Schools today are creating a space for vetting visitors prior to allowing access into the main facility. Using technology properly like high-security turnstiles offer great benefits in existing schools where space constraints and renovation costs can be impractical.” What steps should they be taken when recommending the proper door security to ensure the building is safe As a consultant/integrator, when discussions are had with a client that has a facility in a public space like a corporate building, government centre or industrial facility, what steps should they be taken when recommending the proper door security to ensure the building is safe and can protect its people and assets? For Frank Pisciotta, President and CEO of Business Protection Specialists, Inc. in Raleigh, North Carolina, a fundamental element of his security strategy is making appropriate recommendations that are broad-based and proactive. Properly identifying the adversaries “As a consultant, my recommendations must include properly identifying the adversaries who may show up at a client’s door, the likelihood of that event occurring, the consequences of that event occurring, determining if there are tripwires that can be set so an organisation can move their line of defence away from the door, educating employees to report potential threats and creating real-time actionable plans to respond to threats. A more reactionary posture might include such thing as target hardening such as ballistic resistant materials at entry access points to a facility,” Pisciotta says. Veteran consultant David Aggleton of Aggleton & Associates of Mission Viejo, California recommends that clients compartmentalise their higher security areas for limited access by adding multiple credential controls (card + keypad + biometric), along with ‘positive’ access systems that inhibit tailgating/piggybacking such as secure turnstiles, revolving door and mantrap if your entrances and security needs meet the required space and access throughput rates. Integrated solution of electronic access control Defining a single point of entry in some public facilities is becoming the new standard of care according to many A&Es and security consultants, especially in a school environment. This approach allows a concerted effort when it comes to staffing, visitor monitoring and an integrated technology solution. The bottom line remains: most buildings are vulnerable to a security breach A proactive stance to securing a door entryway will use an integrated solution of electronic access control, turnstiles, revolving doors and mantraps that can substantially improve a facility’s security profile. The bottom line remains: most buildings are vulnerable to a security breach, so it’s not a matter of if there will be a next active shooter tragedy, it’s only a matter of where. Enhancing access control assurance “There is no easy answer to this question,” says Pisciotta referring to how a secured entrance can deter an active shooter. “There have been at least two high-profile incidents of adversaries shooting their way into a facility through access control barriers. So, if the threat so dictates, a ballistic resistant might be required.” He concludes: “There is obviously no question that turnstiles, revolving doors and man traps enhance access control assurance. Electronic access control is easy to integrate with these devices and providing that credentials are secure, approval processes are in place, change management is properly managed and the appropriate auditing measures in place, access control objectives can be met.”
As a cloud-based platform for service providers in the security, smart home and smart business markets, Alarm.com has adapted quickly to changing conditions during the coronavirus pandemic. In the recent dynamic environment, Alarm.com has kept focus on supporting their service provider partners so they can keep local communities protected. “We moved quickly to establish work-from-home protocols to protect our employees and minimise impact on our partners,” says Anne Ferguson, VP of Marketing at Alarm.com. The Customer Operations and Reseller Education (CORE) team has operated without interruption to provide support to partners. Sales teams are utilising webinars and training resources to inform and educate partners about the latest products, tools, and solutions. Alarm.com’s partner tools are essential for remote installations and support of partner accounts. Helping customers remain connected Adapting to challenges of the coronavirus pandemic, Alarm.com is further investing in solutions that help customers remain connected and engaged. The company has created a resource hub called “Succeeding Remotely” that provides tools, tips and news links that partners can use to adapt their business operations. From adjusting sales and installation techniques to maintaining cellular upgrades, Alarm.com is helping partners stay connected to customers remotely, keep their teams trained, and address rapidly evolving customer concerns without rolling trucks.The company has created a resource hub called “Succeeding Remotely “Additionally, after seeing all that our partners are doing to support their local communities in need, we were compelled to highlight those efforts with ongoing videos called Good Connections, which we’re sharing with our partner community to spark more ideas and ways to help,” says Ferguson. “Though our partners have experienced varying degrees of disruption to their business, we’re inspired by their adaptability, ingenuity and resilience,” says Ferguson. “Along with establishing proper safeguards for operating in homes and businesses, our partners are leveraging our support resources more heavily, while our entire staff has worked tirelessly to deliver new, timely resources.” Do-It-Together solutions Alarm.com partners are successfully employing Do-It-Together (DIT) solutions, focusing on 3G-to-LTE upgrades, and pivoting to new verticals like commercial and wellness. Many are also streamlining their business operations and taking advantage of virtual training opportunities to enhance their technicians’ skills and knowledge, says Ferguson. Do-It-Together installs involve depending on customers to perform part or all of the installation process. Partners can send customers fully configured kits with mounting instructions, or technicians may guide customers on a remote video call. Alarm.com’s tools, training and products help partners modify remote installation options depending on each customer’s needs. End users can validate the Alarm.com Smart Gateway with their central station that sensors they have mounted were done correctly using the Alarm.com mobile app Alarm.com Smart Gateway For example, the Alarm.com Smart Gateway can be pre-configured with indoor and outdoor cameras for easy customer installation and to reduce the likelihood of future service calls. Also, end users can validate with their central station that sensors they have mounted were done correctly using the Alarm.com mobile app. “DIT is helping our partners continue onboarding customers and avoid backlogs,” says Ferguson. “We’ve been pleasantly surprised by the resiliency and level of future investment that our residential and commercial partners have shown in the face of adversity,” adds Ferguson. For example, a significant number of business customers have used the slow period to install systems that are typically too disruptive to put in during normal business hours. Similarly, service providers are adopting new technologies or business models, such as cloud-based access control. “They’re often saying to us, ‘I’m going to take this opportunity to make changes to improve our business,’ and have been working closely with us on training and business consulting to support their efforts,“ she says. Shift to the cloud Ferguson sees a growing preference for cloud-managed surveillance and access systems over ones that have historically been run on-premise. The technology itself is attractive, but especially driving change is the enhancement to the daily lives of service providers and customers, which have been strained during this time. “The foundational benefit of our cloud-based solution is the hassle-free, seamless customer experience it delivers,” says Ferguson. “We make this possible by taking ownership of the servers, software maintenance, firmware updates, health monitoring, and more. With cloud technology, these aspects become invisible to the customer and take a lot off their plate, which is more important than ever.” End users can take advantage of Smart Tip video tutorials to help with DIT installations, or they can use the Alarm.com Wellcam to connect with loved ones anywhere.End users can take advantage of Smart Tip video tutorials to help with DIT installations Partners can attend training workshops focused on remote installation tactics, while driving consumer interest in new offerings through Alarm.com’s Customer Connections platform. The goal is to make it simple for partners to stay connected to their customers to maximise lifetime account value. “We are well-positioned to endure the pandemic because of the strength of our partners in their markets along with our investments in technology, hardware and our team,” says Ferguson. “As restrictions slowly lift, there is cautious optimism that the residential, commercial, property management, plumbing/HVAC, builder and other verticals will recover quickly. We believe that as more partners adopt the DIT model and add commercial and wellness RMR, they will find increasing opportunities to deploy security, automation, video, video analytics, access and more throughout their customer base.”
Sooner or later (hopefully sooner), the novel coronavirus global pandemic will allow workplaces to reopen. But as we move into this recovery phase, there are many questions surrounding the transition. How can companies ensure facilities are in acceptable working order to reopen? How do they decide who is coming back and when? How will social distancing impact the operation of a company’s physical access control system? How can companies ensure that both visitors and employees are aware of the policy changes and extra controls? For answers to these and other salient questions, we called on Ian Lowe, Product Marketing Director of HID SAFE Identity and Access Management (IAM) solutions. “There’s no doubt about it: the global pandemic will change the way we live, work, and conduct business for some time,” says Lowe. “Over the past several weeks, we have been working with customers to enable a safe return to the workplace. We have observed that the number of challenges in the mid-to-long-term level and the associated complexity vary by location.” Lowe shares some of the proactive measures and best practices that can assist in a safe return to the workplace as we settle into a “new normal”. Challenge 1: Ensuring building readiness After being unoccupied for weeks or months, building readiness must be addressed completely before welcoming anyone inside. Even though employees may be eager to return, the workplace itself may not be ready. Companies may want to consider continuing remote work while facility operations are prepped. Challenge 2: workforce management There’s no doubt about it: the global pandemic will change the way we live, work, and conduct business for some time While it is dependent on location and industry, taking a phased approach is the best course of action when allowing employees, contractors and visitors back into facilities. First, facilities management will want to survey the property for readiness and then provide an estimate as to when employees may begin reporting back into the office. Next, it’s important to consider that office density needs are interrelated to the facility architecture. It is possible to accommodate a higher capacity of workforce in an airy, open office space than in a constrained one. A good rule of thumb is to start by introducing no more than 30% of employees back into the workplace at first. This could be a rolling group model in which the population total remains controlled and constant, but specific individuals vary from day to day. This option is good for a workforce that needs to be together in person but not necessarily all at the same time due to office density concerns. Welcoming visitors or customers into the office should be delayed as long as possible. If that’s not feasible, visitor numbers should be factored into the total density count. A cloud-based visitor management system can help with implementation. Challenge 3: Controlling access The ability to vet staff, employees, contractors and visitors before and during the return will vary greatly depending on the location. Policies should be implemented that require employees to be screened regularly — and for an extended amount of time. Look to answer the following questions: Where have you visited in the days since last entering the workplace? Have you come into contact with anyone else who has recently visited high-risk areas? Have you shown any symptoms of infection in the past xx number of days? Policies should be implemented that require employees to be screened regularly — and for an extended amount of time If there is cause for concern, refuse the visitor and/or supplement the screening process with additional steps. Temperature checking is mandatory in many organisations— often multiple times a day. This applies to interactions at delivery bays, too. A policy-based physical identity and access management solution integrated with existing physical access controls makes it possible to enforce, monitor and report this type of activity. Challenge 4: Social distancing and contact tracing plan Social distancing may continue within the office, which will impact restrictions and guidelines related to access control. The office layout may be reworked for proper distance between cubicles, workplace positions and employees. Specific entrances, exits and pathways may be designated as one-way-only. Assigning Bluetooth LE beacons to employees once they are inside the workplace will allow companies to monitor proximity to others and measure localised density in real-time by using location services, contact tracing, and surge response technologies. Challenge 5: Reduced physical touchpoints Contactless technologies can help enforce social distancing and reduce touchpoints on common surfaces Reducing the number of physical touchpoints is desirable throughout a workplace. Contactless technologies can help enforce social distancing and reduce touchpoints on common surfaces such as faucets, doorknobs, coffee pot handles, etc. While introducing additional security checks and screenings, it’s important to not increase touchpoints and further infection risks. There have been more requests for a contactless experience to secure workplace access, including automatic doors and turnstiles, contactless cards and mobile access. Challenge 6: Communicating for confidence Proactive communication is key to provide reassurance that appropriate safety measures have been taken and that both visitors and employees are aware of the policy changes and extra controls. Equally important is to communicate a policy change – and the reasoning behind it – before it happens. While there may not be an exact expiration date on these new policies, ensuring that impacted individuals will have a safer experience is universally appreciated.
Even though ISC West 2020 was cancelled, many of the product introductions planned for the trade show still happened. For example, physical security and secure identification company Identiv introduced the Hirsch Velocity Cirrus and MobilisID. Hirsch Velocity Cirrus is a cloud-based Access Control as a Service (ACaaS) solution. It is an optimal solution for both end-users and integrators, with lower upfront costs, reduced maintenance, enhanced portability, and the future-proof assurance of automatic security updates and feature sets. Smart mobile physical access control solution Identiv’s MobilisID is a smart mobile physical access control solution that uses Bluetooth and capacitive technologies to allow frictionless access to a controlled environment without the need to present a credential. We caught up with Jason Spielfogel, Identiv’s Director of Product Management, to discuss the new products and other topics. Q: How is Identiv positioned in the market as a whole? What philosophy drives your product offerings? What vertical markets do you target? Every customer needs every one of these components Spielfogel: Identiv provides a total solution. Our platforms provide access control hardware and software, video surveillance and analytics, door access readers, and ID credentials, both cards and mobile, for a variety of vertical markets: Federal government, state, local and education government agencies (SLED), healthcare, schools, banks/financial services, retail, airports and transportation, and infrastructure. Every customer needs every one of these components in every physical security deployment, and we ensure that all parts are working together at all times, even as technology continues to evolve. With that said, our philosophy is very customer-centric, and we position ourselves as a trusted partner. Our products and technology platform always strive to reflect and anticipate the environment our customers are facing, both in terms of technical requirements and functional capabilities. Q: How does the MobilisID system eliminate "friction?" Spielfogel: Identiv’s MobilisID eliminates the “friction” of access control by forgiving the user from presenting a physical credential to the reader. A simple wave of their hand over the MobilisID reader establishes a connection, and the reader reads their mobile device’s credential from the MobilisID app. No badge or access card to read, and no contact with the reader, makes this a frictionless access control experience. Administrative friction is also eliminated because there is no physical credential to issue or withdraw; it’s all done via the MobilisID Manager. Hirsch Velocity Cirrus is a cloud-based Access Control as a Service (ACaaS) solution Q: Discuss the advantages of Bluetooth over competing technologies. Bluetooth offers a blend of reliability and specificity Spielfogel: There are two primary competing technologies: WiFi and Near Field Communication (NFC). The problem with WiFi is that it’s not location-specific. In other words, the WiFi router can’t tell which door the user is near. NFC has the opposite problem in that it’s impossible to get credential reads unless the phone is presented within an inch or two of the reader. Bluetooth offers a blend of reliability and specificity to create frictionless access. Q: "Touchless" has always been a big selling point. Doesn't the coronavirus improve the outlook for these systems even more? Spielfogel: The coronavirus certainly highlights the value of frictionless access. But the vast majority of access systems today use proximity which was already touchless. But for systems using touchpads or contact-based credentialing, certainly frictionless is offering some alternatives that would help keep employees and visitors safer in the current climate. Q: How else might the current pandemic change the security market forever (i.e., more teleworking?) Spielfogel: Permanent changes are not likely, but it does force security directors to rethink how their employees interact physically with systems for both physical and logical access. As a result, we might see accelerated adoption of some emerging technologies, such as greater use of mobile logical access solutions, as well as frictionless physical access control. We’ve already seen an uptick in our smart card reader and token line and our Thursby enterprise and personal mobility offering during the coronavirus pandemic. Q: There are a lot of cloud systems in the access control space. How is your Cirrus cloud product different? Velocity already has all those features Spielfogel: Cirrus is different from many others in that it’s built on one of the most mature, feature-rich, secure physical access solutions available today – Hirsch hardware and Velocity Software. While many competitors are scrambling to add features to their relatively new ACaaS platforms, Velocity already has all those features. While they are building up their encryption capabilities and cybersecurity testing, we’ve already been doing that for two decades. We certainly have some more development ahead of us for Cirrus, but most of it is just surfacing features we already have into the Cirrus interface. Q: How do you guide customers as their needs change? Spielfogel: Whether users want solutions that are on-prem, in the cloud, or anything in between, Identiv’s full architecture ensures that customers can adopt and migrate to new solutions as they see fit. No two customers are alike, so providing the flexibility to gradually update or change systems is a real differentiator. Our competitors either want customers to jump all at once to the cloud or push to keep everything on-prem/legacy. CSOs and CISOs live in a different world: they've got it all to deal with. We're there with them across all of it, because that's the true reality.
Based in the affluent district of St John’s Wood, Collection Place is a high-specification development comprising 14 luxury apartments, built nearby the infamous Abbey Road studios. Home automation and integration specialists, Advanced Integration (AI) invited Comelit to present custom door entry systems, as part of a security upgrade programme of works. Specification included bespoke brass video flush panels with video monitors and smart capability to manage from a mobile, incorporating full links to dedicated 24-hour concierge services. Smart door entry systems Says Kem Rashica, Estate Manager of The Collection Management Limited / Harrods Estates Asset Management: “Every element of our development, set in heart of our beautiful St John’s Wood, was created to present residents with a high-end luxury lifestyle, from specification to security and privacy. We are always looking for best ways to maintain and futureproof this expectation.” “Advanced Integration highlighted the opportunity to present smart door entry systems and recommended Comelit, as a brand renowned for delivering on design and style without compromising on technology or security. The installation was seamless and residents are now delighted to be able to manage their home from the convenience of their mobile.” Monitors with video capability Maria Tsiftis, Chief Operating Officer of Advanced Integration added: “When it came to upgrade the door entry, we wanted to incorporate a visual, smart capability, without affecting the style or ambience on site. Being a residential development, we also had to be conscious of any works programme not causing disruption to daily lives." “Comelit responded with a bespoke specification, including high-end entrance panels, monitors with video capability and concierge systems, enabling a combination of door entry and messaging. Being involved from the design stages ensured a smooth delivery and beautiful custom finish befitting to this luxury development.” Video intercom calls on a smartphone Comelit designed the door entry systems for Collection Place, to operate through its innovative VIP system, which offers a powerful all-encompassing opportunity for residents to receive video intercom calls on a smartphone. Sam Arnold, Business Development Manager at Comelit UK concluded: “St John’s Wood is one of London’s most upmarket residential locations, and Collection Place has been established in the elegant villa-style housing that is synonymous with the area.” “Any enhancements to door entry had to be delivered to complement this lavish attention on detail, but also serve discerning homeowners who want the advantages of service and latest technology. By working closely with Advanced Integration, we have delivered a sleek and functional, smart security solution to accommodate these requirements.”
Commenced in 2016, the large business club was built with smart infrastructure and modern amenities, in the futuristic town of Kolkata, to provide leisure-cum-business conducive atmosphere to their members and visitors. The contemporary building of business club is spread over 10 acres area and serves as a cultural, commercial, and business hub in the region. Having a beautiful landscape, it attained tremendous popularity due to its high-end specifications, green landscape, wedding lawn, tennis court, cafeteria, business centre to name a few. Missing real-time video surveillance With a consistently large volume of patrons visiting the business club for various events, security is the vital component of the successful operations at the site. The customer has been relying heavily on analogue video surveillance to secure its facilities and workforce. Due to its limited scalability, there was no way to do real-time surveillance throughout the premises. Moreover, every incident recorded by the video cameras required time-consuming manual investigation, therefore, causing delay in decision-making. Aiming to advancing the surveillance solution, the customer wanted to make an investment to maintain a watchful eye, manage threats/incidents proactively along with integrate existing and new system into the unified interface. Videonetics Unified Video Computing Platform Intelligent Video Analytics (IVA) is helping operators detect vehicles wrongly parked in ‘restricted’ or ‘no parking’ zones After a thorough evaluation of various solution offered by various companies, it was Videonetics that came out on top. Thanks to Videonetics Unified Video Computing Platform (UVCP™) that blends Intelligent Video Management Software (VMS), Intelligent Video Analytics and seamless integration of existing analogue system into one user-friendly solution, able to grow effortlessly with customers’ need over time. Incident response management Videonetics Intelligent VMS is managing 100+ cameras including PTZ network camera, dome cameras, fixed cameras, and bullet cameras, installed throughout the interior as well as exterior of the premises. In addition, 32 legacy analogue cameras are also integrated into the unified solution, eventually providing centralised control of the cameras to the security operators. The in-built failover and redundancy features of Intelligent VMS ensure the operators to always have access to live and recorded video. This means if any incident occurs, they can always have evidence of it. Zero Blind Spot at Entrance The Intelligent Video Analytics (IVA) is helping operators to detect vehicles which are wrongly parked in ‘restricted’ or ‘no parking’ zones, at the outside of premise. For the perimeter security at entry & exit gates, the PTZ camera tracking helps in detecting unusual behaviour of the person and provides alert to security operators for faster action. At the entrance, face capture has been installed to detect a person in the scene and locates his/her face, which is saved in the database, indexed and time stamped. In addition, vehicle capture is deployed to track and record license plates of vehicles along with time and date, entering the premise. Zone monitoring Operators will be notified if a person stays beyond a certain duration in a user-marked zone The business club needed a solution that could help it identify theft, intrusion and trespassing throughout its facilities. In the first phase of the project, Videonetics along with stakeholders of business club and system integrator identified sensitive areas, that requiring immediate security system. To monitor suspicious activities, zone monitoring has been enabled at the fence of tennis court, lawn, emergency gates and open field area. Operators will be notified if a person stays beyond a certain duration in a user-marked zone. To combat unauthorised entry in generator room, operators gets alert if any intrusion happens in a marked area. Similarly, unusual activities are also being monitored in this area through loitering detection. Trespassing detection Operators can handle alarms and manage events, reducing manual checks of cases and helping to expedite investigations At the peripheries of the business club, trespassing detection has been deployed to detect if any person intrudes into a premise. The system is well capable to trace trajectory of the trespasser and prevent incident before it occurs. The authorities wanted to have alert in case any mob formation happens at the field area, known as forbidden region, of the club. Crowd formation detection has been deployed that estimates density of people in a scene and generated an alert as soon as the density in any defined area crosses a certain limit. Empowering with mobile application The ease of use of Videonetics unified solution has been instrumental to the business club. The operators and senior authorities are efficiently accessing videos anytime and anywhere, thru an intuitive interface of IVMS web and mobile applications. At the time of incidents, operators can handle alarms and manage events, therefore, reducing manual checks of cases and helping to expedite investigations. After various phases of implementation, installation, and testing, the Videonetics unified solution went into live operation. Since upgrading to Videonetics unified solution, the business club has been able to better handle incidents of thefts/intrusion and apprehend suspects. Therefore, the level of security has been lifted by allowing the early detection of incidents and monitoring the premises round-the-clock, even in the harsh environmental condition. Furthermore, the added layer of security has been significant in business club’s efforts to attract more members and sustain business relations with existing members. Detecting patterns Now the operators use the information being collected in the unified interface to better understand the environment. They are successfully detecting patterns on how visitors/members access and move through the club. Thus, using these insights to develop strategies that maximise the use of space and keeps everyone safe. The open architecture of Videonetics unified solution allows customer to integrate with third-party systems such as access control, emergency system and much more. “To go from conventional to a professional and scalable surveillance system was a huge improvement for our client. It has enhanced our client’s reputation for providing safe and secure environment to visitors, employees, and members. Commendation to Videonetics for providing their unified video computing platform that empowered security operators by improving their efficiency in monitoring the premise and handling threats swiftly. I deeply appreciate their dedication and untiring efforts for making it a reality”, said Gaurav Das, Director, Webdesk Technologies Private Limited.
ISONAS Inc., a globally renowned IP access control and hardware solutions provider, and part of the Allegion family of brands, has announced that the ISONAS Pure IP access control solution has been installed at a new flagship distribution centre for Premier Packaging, an international packaging solutions company, with facilities in 14 locations nationwide. ISONAS Pure IP access control In the summer of 2018, Premier Packaging was looking to implement an access control system to help secure their brand-new 320,000-square-foot facility in Louisville, Kentucky. After working closely on a recent project with Orion Networks, a trusted IT infrastructure provider, Premier Packaging relied on their recommendation to implement a cutting-edge access control solution from ISONAS. With no access control system in place at any of their 14 locations and a combination of office workers, support staff, truck drivers and warehouse employees entering and existing the building daily, a process to control access was a necessity. Monitoring and tracking visitors to distribution centre A major challenge facing the new distribution centre was truck drivers, who came into the facility, were not company employees. With on average 250 people coming in and out of the new facility in Kentucky daily, monitoring and tracking who those people were and if they belonged there was imperative. They were also looking for the flexibility to manage the locking and unlocking of doors remotely, rather than having to rely on physical keys. “After comparing ISONAS to other access control systems out there, we knew that ISONAS was the right flexible access control solution to meet Premier Packaging’s security needs,” states Brock Jamison, VP and Director of Sales at Orion Networks. ISONAS RC-04 reader-controllers installed ISONAS Pure Access software was implemented to give the packaging company remote access capabilities The initial project consisted of 18 ISONAS RC-04 reader-controllers installed at their new distribution centre in Louisville. The RC-04 reader-controllers from ISONAS delivers advanced technical functionality with an easy installation process. In addition to the ISONAS hardware, the ISONAS Pure Access software was implemented to give the packaging company remote access capabilities. Pure Access Pure Access, ISONAS’s industry-renowned software, is a cloud-based access control application that provides users the ability to manage their access control from anywhere at any time, on any device. “We are extremely happy that our unique access control solution could help Premier Packaging improve safety and security at their new distribution center seamlessly,” states Jonathan Mooney, ISONAS Sales Leader. ISONAS cloud-based platform By using both the ISONAS hardware and software solution together, Premier Packaging was able to improve security and keep employees safe. With the ISONAS cloud-based platform, Premier now required all Louisville employees to enter the building using their ID badges to gain access. If an employee was not in the database and verified, then access would be denied. Future plans include rolling out the ISONAS access control solution to additional buildings and possibly integrating it with other security systems.
Edgeworx, the edge computing company, has launched a new AI-powered camera called Darcy to help protect workplaces of every size. In addition to detecting signs of fever, Darcy’s AI engine identifies whether individuals are wearing a face mask, tracks self-reported symptoms and delivers a quick, comfortable screening experience ideal for high-traffic environments. Organisations currently face an impossible choice between affordable, but ineffective, temperature readers (such as point and click devices or tablets) on the one hand, and cost-prohibitive medical-grade thermal cameras on the other. Affordable and accurate thermal camera Darcy ends this dilemma by offering the accuracy of a precision thermal camera at a fraction of the price. Darcy costs less than a fifth of the price of competing FDA-compliant thermal cameras, putting it within reach of schools and small businesses as well as enterprises and large retail outlets. To further ensure screening is accessible to all, Edgeworx is offering the first camera free to all public schools. The solution is already being piloted in Bay Area and New York schools. Despite their five-figure price tags, precision thermal cameras are slow, ungainly, inaccurate and hard to operate. Some take as much as an hour to warm up and need regular recalibration. By contrast, Darcy uses artificial intelligence and smart-room sensors to do the work of expensive hardware. Real-time alerts Safety checks will become a feature of daily life as we return to our schools and workplaces" Darcy logs self-reported symptoms via a mobile app, and checks for temperatures in less than a second, keeping lines moving and avoiding dangerous congestion at entry points. It provides real-time alerts and data reports so organisations can spot outbreaks early, take appropriate action and demonstrate compliance with public health mandates. It can be updated with additional features (such as AI for social distance checks) as public health practices evolve, no additional hardware required. Darcy provides peace of mind to businesses, employees, and customers. Schools and workplaces safe re-openings “Safety checks will become a feature of daily life as we return to our schools and workplaces. But many of these checks will be ineffective because organisations can’t afford high-end solutions that cost tens of thousands of dollars so they rely on devices that have been hastily thrown together and are inaccurate. That has to change,” said Farah Papaioannou, President and Co-founder of Edgeworx. “We developed Darcy because we knew we could use our AI, data and edge computing knowledge to really help people struggling with the challenges of re-opening. We’re focused on protecting all workplaces with a solution that’s affordable and accurate today—and is smart enough to adapt as the world’s knowledge of COVID-19 and other viruses evolves in the future.” Darcy secures Manhattan preschool Manhattan preschool program Kids At Work is among the organisations using Darcy to create a reliable and reassuring screening experience for children and staff. "We were searching for a health check solution that would give families peace of mind and be non-intrusive for our student population, from infants to five-year-olds,” said Julie. Darcy reads temperatures with a margin of error of 0.5 degrees Centigrade Averill, founder at Kids At Work. “Darcy checked all our boxes with its seamless experience, easy record-keeping and affordability. We're also thrilled with the day-long temperature monitoring feature. As an owner, I feel so much more confident about reopening with Darcy.” Darcy owes its speed, precision and low cost to Edgeworx’s edge computing fabric, which allows Artificial Intelligence (AI) to run on the device rather than in the cloud. Darcy’s AI performs many of the functions that require expensive hardware on other devices. Key benefits include: Accuracy and reliability Darcy reads temperatures with a margin of error of 0.5 degrees Centigrade. It overcomes the traditional challenges of contactless temperature monitoring with several innovations: Using AI, Darcy identifies where on a person’s face the reading should be taken, determines if they are close enough and whether they are wearing anything, such as a headband or sunglasses, that would interfere with an accurate reading, and automatically adjusts to body temperature fluctuations caused by circadian rhythms throughout the day and even the weather outside. To offset the effect of room temperature on a reading, most thermal cameras require an expensive scientific instrument called a blackbody reference unit, which maintains its own temperature and is used to calibrate the reading from the camera. Faster readings and less prone to errors By contrast, Darcy calibrates its readings against inexpensive smart sensors that attach to objects around the room, read the temperature of those objects and report it continuously and wirelessly to the camera. Not only is this significantly less expensive, but also less prone to failure, requires no maintenance and means the camera can be moved without triggering a lengthy recalibration process. Darcy takes readings in less than 100 milliseconds and uses data processing to identify any anomalies. As a result, by the time a person has approached the camera, Darcy may have 10 to 40 readings and can ensure that only a reliable one is recorded. Traditional cameras take only one reading, whether reliable or not, increasing the chances that a person with fever is not detected. Check mask usage and symptoms Darcy goes beyond temperature scanning to help organisations identify high-risk individuals who may not have a fever. Its AI identifies whether the individual is wearing a mask and allows organisations to conduct efficient wellness checks: Visitors complete a symptom survey from their home or phone via an app, which generates a unique QR code to be scanned by Darcy at entry. Additional features can be easily deployed so these devices can adapt as new practices come into play, without costly hardware changes. Avoid long lines and unsafe crowding at entry pointsBecause all the processing happens locally on the camera rather than in the cloud, performance is dramatically improved, avoiding the need for delays while a person’s temperature is checked. Beautifully designed, unobtrusive and with a friendly interface, Darcy makes screening quick, easy and unintimidating. By installing additional cameras in pass-by mode, schools and businesses can continue to monitor temperature and mask usage throughout the day—and throughout the building—without interrupting schedules. Get real-time alerts and compliance reports Darcy provides warnings via SMS, email, app or desktop notification so organisations can get early warnings of facilities where symptoms are trending and create a complete audit trail for compliance with public health mandates. Armed with data, organisations can make informed decisions and implement targeted measures rather than resorting to broad closures. Built-in privacy and securityBecause Darcy handles storage and AI processing locally, it never sends images or sensitive personally identifiable information (PII) to the cloud. Subscription Organisations can choose from two subscription packages and schedule a demo - Monthly subscription - Yearly subscription Until the end of 2020, Edgeworx is donating a free camera to any public school that purchases a subscription. To apply for a free camera, one may contact Edgeworx.
The cloud-based access control and video management system was recently installed at the city’s marina where it has integrated with their booking system, Harba. There are 750 members with boats in the Vejle marina, and through the Harba booking system, they are issued a 6-digit personal PIN code or a tag. With this PIN code, they can then access and use the facilities of the marina, such as the toilets, showers, laundry rooms, and kitchen. The PIN is inputted into the ACT365 reader at each entry point of the marina facilities. All services are then automatically billed on a monthly base via the Harba booking system. This access control booking strategy ensures that the marina’s facilities are kept free for member use only. Readers with RFID tags and smartphone access ACT365’s readers were well suited to this installation because they are made of robust polycarbonate housing and are suitable for both indoor and outdoor mounting. The reader controls a single door and uses a voltage free relay contact. ACT365 has a modern and user-friendly design and a limitless number of users. Both RFID tags and smartphone access availability. For non-member boaters who are visiting the Vejle marina, a self-service terminal, the Harba Kiosk, is also available to use. This self-service terminal allows non-members to use their credit card to pay for the use of the marina facilities. Similar to the Harba app for members, non-members will receive a PIN code from the Harba kiosk via email or SMS which they can then input into the ACT365 readers.
SL Green Realty Corp., one of Manhattan's largest office landlord, has appointed Sharry to be a technology partner for the One Vanderbilt project scheduled to be opened in September 2020 in midtown Manhattan. Smart, integrated building systems Sharry is a pioneer in the newly emerging market of PropTech (property & technology). The company supplies an ecosystem of smart and integrated functions for premium commercial office buildings and customers in the Americas, Africa, and Europe. Recently, Sharry, the PropTech company, announced a new touch-free elevator system for COVID-safe buildings. One Vanderbilt Sharry was appointed by SL Green Realty to be a technology partner for One Vanderbilt in New York" A sky-line defining skyscraper tower, One Vanderbilt will be the epitome of the 21st century workplace space. Developed by SL Green Corp., the 1,401-foot-tall (427 m) commercial office building will be the 5th tallest building in the U.S. TD Bank is signed on as the anchor tenant of the 1.7-million-square-foot property, which is due to open in September of 2020. All users and tenants will be equipped with smart and mobile products delivered by Sharry. “Sharry was appointed by SL Green Realty to be a technology partner for One Vanderbilt in New York,” confirms Michal Cerovsky, Chief Operations Officer (COO) and a Co-Founder of Sharry. The company is headquartered in Prague, Czech Republic, EU. Digital solutions for a safer work environment "One Vanderbilt is already an architectural icon in New York, but its completion will open a new era in which digital solutions will provide a healthier and safer work environment," adds Vladimír Mašinský, Head of Business Development at Sharry, who also manages Sharry's partnership with SL Green Realty. Anchoring the modernisation of East Midtown region of New York City, One Vanderbilt will provide tenants with an impressive slate of amenities unrivaled in history of real estate in NYC, including a 30,000-square-foot tenant-only amenity floor with large format meeting spaces, club-style lounge and an extraordinary outdoor terrace. Direct connection to transit network Immediately adjacent to Grand Central Terminal, the building will create direct connections to the surrounding transit network. The building will also include an 11,000-square-foot high-design restaurant from world-renowned chef, Daniel Boulud. SL Green’s unprecedented US$ 220 million private investment to improve Grand Central’s public transit infrastructure has already begun to materialise. Tenants include a star roster of top-tier financial, banking and legal firms that have committed to One Vanderbilt. Integrating individual services and technological systems There are many innovations by Sharry that improve the commercial office building experience “It's a major milestone for Sharry to be a partner of the One Vanderbilt project, a prominent part of the New York City skyline, less than four years after the company was founded. At the same time, it tells us that we were correct in taking the more demanding approach, integrating individual services and technological systems available in buildings into a single platform,” said Josef Šachta, CEO and Co-Founder of Sharry. There are many innovations by Sharry that improve the commercial office building experience. The company brings in a new set of smart features integrated to the building, such as mobile access that allows workers to open doors or turnstiles, just with their smartphones. If the workers drive, a smart camera link recognises their licence plate and opens the gates. Smart parking management Parking management ensures maximal utilisation of parking spots. All users can take advantage of a tenant engagement platform for sharing important building-related news, chatting with other users, or booking shared amenities. Visitors to buildings where software from Sharry is installed can also expect the utmost in convenience. "A guest will receive a meeting invitation with a QR code. They can reserve a parking space, and the system will then automatically let in upon arrival thanks to smart cameras. The guests will then report to the reception using the QR code, just like check-in at airports. The host who invited the guest will then be notified that their visitor is already in the lobby," said Product Manager, Ondřej Langr, in describing another example of the multi-level integration offered by Sharry. Touch-free elevator system for COVID-safe buildings Recently, the company has announced a touch-free elevator system for COVID-safe buildings Recently, the company has announced a touch-free elevator system for COVID-safe buildings as its latest innovation. This anti-coronavirus feature enabling users to control elevators from their mobile phones or smart watches will be presented during Q3/2020 in the Sharry Workplace product line as part of a revolutionary mobile access system. Along with One Vanderbilt, Sharry is completing the implementation of its smart tools ecosystem in several other office buildings on the East coast of the USA. Thanks to these projects, it is firmly placed among the top players in the PropTech segment and especially in NYC, which last year ranked first on the Tech Cities index, which is compiled by the Savills consulting company. “We always wanted our software to be in the best buildings in every city to which we expanded. And New York was our dream destination. I am very proud of our entire team that we can work together here on the iconic building One Vanderbilt will soon be,” adds Josef Šachta.
Round table discussion
The new year is several weeks old, so it is safe to say that many of our New Year resolutions have fallen by the wayside. Despite the limited success of our personal resolutions, the new year is a great time to take stock, look ahead, and plan to make 2020 the best year yet. Thinking about our industry as a whole, we asked this week’s Expert Panel Roundtable: What should be the security industry’s “New Year’s resolution?”
Video analytics are undergoing a fundamental change in the market as machine learning enhances their accuracy while expanding their capabilities. But what are those expanded capabilities and how are they impacting the operation of security and video systems? We asked this week’s Expert Panel Roundtable: What new video analytics are having an impact in the market and how?
Fire and security systems are two elements of the same mission: To keep buildings and their occupants safe. However, the two systems often operate independently and may not be integrated. Should there be more integration and what are the pitfalls? We asked this week’s Expert Panel Roundtable: What are the challenges and opportunities of integrating security and fire systems?