Morse Watchmans announces that its KeyWatcher Touch Key Management System has once again received LenelS2 factory certification and interfaces with the LenelS2 OnGuard version 7.5 access control security system. “Morse Watchmans has completed required factory testing at LenelS2 to validate the functionality of its interface to the OnGuard system,” said John Marchioli, OAAP product management, LenelS2. “We look forward to their continued involvement in the LenelS2 OpenAccess Al...
Boon Edam Inc., a pioneer in security entrances and architectural revolving doors, announces they are emphasising the theme of tailgating mitigation and integration in booth #1103 at the GSX (formerly ASIS) exhibition in Chicago, Illinois from September 10-12. GSX is an annual event that brings together over 20,000 participants from across the security profession for a week of networking, educational opportunities and discovering the latest security solutions. Boon Edam is also the official tur...
With the recent news headlines about store closures and the collapse of well-known chains, alongside clear adjustments in business strategy amongst established high street favourites, there is no denying that the UK retail industry is under huge pressure. A recent report suggests growing issues are leading some retailers to increase risk-taking in the supply chain. But here, Steve Bumphrey, Traka UK Sales Director, looks at ways to help retailers embrace the storm, including paying attention to...
Johnson Controls has updated its Tyco Software House C•CURE 9000 security and event management system with new tools to optimise its security operations. Enhancements include metatags, broadened search capabilities and enhancements in video association, along with adding an additional layer of security with Multi-Factor Authentication mobile integration. C•CURE 9000 v2.80 users now have the ability to add two-factor authentication without needing to upgrade readers. With this added la...
One can customise the way they want to run their own CLIQ® access control installation. The CLIQ® Web Manager makes it easy to program, reprogram or audit every CLIQ® key, cylinder, padlock or updater. And because the interface is accessible from anywhere with a Web connection, via secure login over https:// and multifactor authentication if required, one can manage access whenever and wherever they choose. ASSA ABLOY’s intuitive CLIQ® Web Manager boosts one's efficiency....
Recognising the need for emerging applications to build on a strong foundation that supports interoperability among all categories of devices, four sponsor members – The ASSA ABLOY Group which includes HID Global, and NXP Semiconductors, Samsung Electronics, and Bosch, leading companies in access, secure connectivity and mobile/CE device solutions – announced the launch of the FiRa Consortium. The new coalition is designed to grow the Ultra-Wideband (UWB) ecosystem so new use cases...
Honeywell announces the release of 30 Series IP Cameras, a new suite of video cameras that strengthens building safety and security through advanced analytics and secure channel encryption. The Honeywell 30 Series IP cameras are designed for use as part of video systems that comply with U.S. government procurement standards instituted under the John S. McCain National Defence Authorisation Act for Fiscal Year 2019 (NDAA Section 889). With the new cameras, end users can also benefit from lower total cost of ownership and lower risk as well as improved picture quality without increased storage needs. Telecommunication equipment Honeywell is in the business of protection – from the buildings to the data and people within" NDAA Section 889 prohibits the U.S. government from procuring video and telecommunication equipment from certain companies and their subsidiaries. Many security end users outside of the government are also looking to follow these provisions. “Honeywell is in the business of protection – from the buildings to the data and people within,” said Jeremy Kimber, video global product management director, Honeywell Commercial Security. “With the release of the 30 Series IP Cameras, we are providing advanced secure channel encryption that guards against unauthorised access and unsanctioned distribution of data and video to help end users seamlessly integrate security into any business.” Increasingly stringent requirements Honeywell 30 Series IP Cameras are available in dome, bullet, ball and fisheye models that feature: Secure channel encryption: In addition to enabling end users to follow the provisions in NDAA Section 889, the new cameras provide HTTP over TLS1.2 (HTTPS) encrypted streaming to Honeywell MAXPRO Network Video Recorders (NVR). They also adhere to the Payment Card Industry Data Security Standard (PCI-DSS). Together, these elements help meet the increasingly stringent requirements being set by IT Departments to shield businesses against unauthorised access and unsanctioned distribution of data and video – potentially saving end users up to $3.86 million, the average global cost of a data breach. Traditional motion detection Advanced motion people detection: Traditional motion detection only detects pixel changes, leading to a higher false alarm rate. Advanced motion people detection is designed to reduce false alarm rates as it will only create an alarm when the moving object is recognised as a person. A higher quality camera resolution of up to 5MP deliver exceptional images Enhanced storage space and image quality: A higher quality camera resolution of up to 5MP deliver exceptional images and comes with a user-friendly interface for secure remote viewing. The H.265 smart codec feature allows for storage of longer clips, lower bandwidth consumption and enables images to take up to 50% less storage space, which decreases operating costs. Access control management The new line of cameras are fully integrated using HTTPS encrypted streaming with MAXPRO® Network Video Recorders. They can also be used with Performance Embedded NVRs linked to the MAXPRO Cloud multi-site video and access control management platform and with the ADPRO XO range of NVRs with on-board video analytics. With its advanced analytics and encryption capabilities, Honeywell 30 Series IP Cameras offer an array of quality options for all small-to-medium businesses, entry-level enterprise and critical applications where compliance is essential such as banking and finance, government, utilities, campuses, retail and premium commercial.
As a long standing Development Partner, Third Millennium is pleased to further strengthen its status with LEGIC in providing new and design-led collaborative innovation within the security access marketplace. With headquarters based in Switzerland, LEGIC is a trusted supplier to corporations around the world in supplying secure credential and access authentication control, and for more than 25 years, it has been a developer in mobile and contactless smartcard technologies using RFID, BLE and NFC. Key and authorisation management tools Utilising state-of-the-art security standards to secure data integrity, LEGIC’s technology platform includes reader and smartcard ICs and key & authorisation management tools, as well as the software service - LEGIC Connect. Working closely with LEGIC, Third Millennium manufactures a comprehensive range of advanced access control readers, together with integral keypad and biometric fingerprint readers, and provides an unparalleled service of design, quality, and support to its customers.
You don’t need to continue using keys and key cards. When you want effective first-line security for private doors in public spaces, you no longer need cumbersome kit. To keep opportunist hands off your belongings, the Code Handle 4-digit code-operated electronic handle locks without any wires, expensive hardware or software, mechanical keys or changes to your existing doors. PIN codes unlock so many features of our daily lives, from a smartphone to your online bank account. Now you can use them to unlock security door handles, too. Code Handle is a stylish handle with an integrated electronic PINpad. When you fit a Code Handle to your door, you make sure only authorised people get in. Without a 4-digit code, the handle stays locked and the door stays closed. Fire accredited Code Handle For such a simple device, Code Handle packs several clever features into its sleek, low-profile design“Code Handle is unique in comparison to common code door locks: it has the code function and battery incorporated inside its handle, so you don’t need to make extra modifications to your door,” explains Lars Angelin, Business Development Manager for Code Handle at ASSA ABLOY EMEA. For such a simple device, Code Handle packs several clever features into its sleek, low-profile design. When you close the door behind you, Code Handle locks itself, so you don’t need to put down whatever you are carrying. From inside, a Code Handle opens freely. It is also fire accredited (EN 1363). Code Handle is simple to install and retrofit. Everything you need for a simple, effective security barrier is inside the box. Two screws fit a new Code Handle to almost any interior door, with left- or right-hand opening. There is no need to cable the door, connect it to mains, or pay a specialist installer. Works with standard lock hardware Code Handle is the lock of choice for sensitive, low-security doors in all kinds of placesCode Handle works in tandem with standard lock hardware. You can keep your existing cylinder or lock mechanism and just change the handle. Two standard batteries (CR2) slot inside the Code Handle, and typically last 30,000 lock/unlock cycles before replacement. Code Handle is an attractive proposition, with an elegant contemporary design, in brushed stainless steel and satin chrome. No more ugly push-button-and-twist mechanical PIN locks spoiling the look of your office. Code Handle is the lock of choice for sensitive, low-security doors in all kinds of places. At libraries, airports, railway stations, gyms, schools, car dealerships, restaurants and offices, a Code Handle PIN lock keeps the public out of accessible private rooms. In company archives, stock rooms, customer toilets, management offices and medicine stores, Code Handle deters casual intruders and keeps your property safe and secure.
Comelit Group and Salto Systems have announced a state-of-the-art integration to enable a unique door entry and access control solution, operated via simple-to-use mobile app technology. Salto Systems is a Spanish company founded in 2001 with one objective: devising a world-class access control system simple to use and extremely efficient. Now, Salto has become one of the world’s top manufacturers of electronic access control system, the perfect partner for Comelit. Salto KS integrated App The Italian security specialist, known for its high specification solutions, has invested in creating the integration with Salto’s exclusive KS cloud-based access control system, following successful collaboration work with two UK leading property development companies. The Salto KS integrated App offers audio and visual functionality for building entrances and apartment doors The Salto KS integrated App, compatible with all leading smart phone and tablet technology and tailored to provide push notifications, offers audio and visual functionality for building entrances and apartment doors, to control all aspects of door entry. This includes providing remote, real-time access whilst not on site for deliveries and visitors, alongside communicating with concierge services. Home security Says Francesca Boeris, Managing Director Comelit Group UK, “With the way apps are delivered and maintained changing, home security is now everyone’s responsibility. What Comelit and Salto have delivered with this significant integration is future proof technology that paves the way for users to stay connected to their home.” “Our teams in the UK and Italy and Salto crew have worked closely together right from the initial design to maximise the opportunities with Salto’s KS cloud-based services and enable push notifications. But we know it’s only the first step. We are already working closely on next phases and further third-party integration, to strengthen Comelit’s position as the market leader in cloud technology. Comelit door entry system “We are incorporating more into our app capability and anticipating solutions that keep people powered and protected wherever they are, fitting today’s mobile-connected lifestyles.” The integration is now complete, offering each Resident the ability to manage and control the Comelit door entry and Salto access control from the Salto KS App. First phase, the app is now being specified into over 4,000 new apartments being planned for development.
The ASSA ABLOY Door Hardware & Access Control Group is encouraging installers to sign-up to one of its upcoming training courses on its innovative wireless access control system, SMARTair. The course is free to attend and offers installers everything they need to know to help sell and install SMARTair, while also providing an informative overview of the wireless access control system’s capabilities and benefits. SMARTair system SMARTair delivers real-time access control, so organisations can stay in control of who has entered a building, where and when Taking place at the ASSA ABLOY Academy in Willenhall, the course will cover the technical aspects of how to install, set up and commission a SMARTair system. It also provides guidance on site surveys and how to identify and resolve common faults, meaning security professionals can offer a complete solution to their customers. SMARTair delivers real-time access control, so organisations can stay in control of who has entered a building, where and when. Multiple user groups can be easily managed with minimum fuss, with features such as time schedules and permissions calendars ensuring access rights are only allowed when needed. Wireless access control system The wireless access control system is offered with a robust range of devices – covering electronic locks, cylinders, escutcheons, wall readers and products for cabinets, lifts, vending machines and lockers – in an award-winning design. Finally, ASSA ABLOY’s new OpenowTM app also gives security administrators the ability to open electronic door locks remotely, so access control for SMARTair can be managed at any time and from any place. OpenowTM essentially transforms a smartphone into a secure virtual key, with users able to send, revoke and update virtual keys in seconds. SMARTair training course Suitable for an extensive range of sectors, installers can fit SMARTair in varied environments" Richard Hall, Technical Sales Support Manager at the ASSA ABLOY Door Hardware & Access Control Group, explains: “We have designed this course for professional security installers, system integrators and those responsible for installing and managing their own access control systems.” “Suitable for an extensive range of sectors, installers can fit SMARTair in environments such as hospitals, universities, offices, national parks, laboratories, libraries and many other settings. We would invite any installers or individuals responsible for their site’s security to attend this free course at our dedicated training academy in Willenhall, to find out more about the opportunities that SMARTair can help deliver to their business.” The available SMARTair training course dates for the second half of 2019 are: Wednesday 21 August Tuesday 17 September Tuesday 22 October Tuesday 19 November Thursday 12 December Refreshments are provided throughout the day, as well as lunch. Larger companies wishing to book onto the SMARTair training course may be able to specify a separate training date.
The CPC202 and CPC204 Shared Occupancy Controllers from access controls specialists Nortech are compact, standalone, intelligent units that control access for groups of users sharing the same parking facility. A single CPC204 Shared Occupancy Controller can provide full access control to a parking facility that is shared by up to four independent user groups. As well as validating user credentials, it will monitor usage and prevent each user group from exceeding its allocated number of parking spaces and will work almost any barrier/gate system. Supporting visitor management The CRC202 Shared Occupancy Controller can be used to control access to a parking facility by a single group of users, preventing over occupancy of the facility. It can also be used to manage the sharing of a facility by two user groups. The controllers support independent readers and gate controls for entry and exit gates/barriers Both Shared Occupancy Controllers provide a comprehensive range of access control functions such as restricting parking to certain times of the day, preventing the abuse of pass cards (pass back), and supporting visitor management using group specific PIN codes. The controllers support independent readers and gate controls for entry and exit gates/barriers and work with most types of card reader/vehicle ID reader. They have capacity for up to four count groups (CPC204) or two count groups (CPC202) and can accommodate for up to 9,999 users per group. Access control features The CPC202 and CPC204 devices also have capacity for up to 65,000 cards/tokens, provide a choice of counting methods and can control up to four message signs, Space/Full signs or traffic signals. The compact and easy to install controllers optimise parking capacity, maximising return on investment and help to prevent parking in unauthorised areas. This not only improves safety but also avoids disputes and minimises disruption to an area. Other benefits include the saving of fuel and reducing of pollution by preventing drivers from entering the car park when spaces aren’t available and the comprehensive range of access control features. The visual indication of which companies have spaces available also helps to avoid queuing and enables each tenant company to manage their own parking allocation. Nortech has supplied products and solutions to the security industry for over 25 years as an independent British company. The company uses extensive experience and expertise to create new security products to fit their clients’ needs and designs everything with the customer in mind.
Airport environments have become more sophisticated and complex over the course of the last 20 years. What was once a simple structure to facilitate travel from point A to point B has now been transformed into a hustling and bustling setting that offers passengers the comforts and conveniences of a small city. As a result, the complexity of risks that airport operators face has grown exponentially. Security personnel must now mitigate risks like terrorism, theft, personal safety and insider threats all while streamlining operations to help preserve a positive passenger experience. Beyond the visual of long and winding security checkpoint lines, most travelers are unaware of the vast amounts of work that take place behind the scenes to ensure their safety. Increasing passenger numbers On top of the typical, day-to-day concerns security operators face, airports are only becoming busier. According to the United States Department of Transportation’s Bureau of Transportation Statistics, 2018 was a record-breaking year for air passenger travel. U.S. airlines and foreign airlines operating in the United States saw 1 billion passengers fly, which was a 4.8% increase from 2017. As these numbers continue to increase, the demand on airport security personnel to keep people and property safe also increases. This is why the latest advancements in security technology are critical as part of a comprehensive and cohesive airport security strategy. Let’s take a look at some of these advancements and how they are helping airport security operators mitigate risk. U.S. airlines and foreign airlines operating in the United States saw 1 billion passengers fly, which was a 4.8% increase from 2017 Video-based command and control Airports are operational 24 hours a day, 7 days a week, which means it is paramount (and typically mandated) to have video as the heart of modern-day security operation centres (SOC). In today’s data-focused environment, security personnel rely on a multitude of solutions and systems, which often include video surveillance, access control, alarm notifications, and more, to ensure comprehensive protection of passengers. What’s needed is a single, unified platform with integrated event management and response The rising influx of information from these systems can often be overwhelming, and in most cases, manual processes are used to manage across these domains in an attempt to achieve a coordinated response. These manual processes are not scalable. What’s needed and is now being introduced to the market is a single, unified platform with integrated event management and response to allow security operators to maximise situational control and determine the appropriate intelligence-powered response. Real-time situation management The combination of real-time video, with information from a variety of additional sensors, devices and applications is changing the game for airport security personnel. Now, in the event of an incident, security officials can use this data to gain enhanced situational awareness of what’s happening and deliver actionable insights to efficiently and effectively respond to the incident. Through numerous information sources and security systems, airports can benefit from a modernised and enriched investigative experience for a broad and deep understanding of routine or emergency situations. Advanced analytics Analytics are a powerful resource that gives security teams the ability to discover significant patterns and obtain insightful knowledge from video surveillance data. Advanced algorithms can be the key in providing early warnings to assist in detecting threats, helping to establish a proactive security strategy. By effectively correlating and assessing data, airport officials can bring latent intelligence to the forefront and present a more complete view of security situations. Additionally, analytics can automate predefined standard operating procedures to help minimise human error and optimise resource utilisation. By effectively correlating and assessing data, airport officials can bring latent intelligence to the forefront and present a more complete view of security situations Mobile reporting The Internet of Things (IoT) and ubiquitous connectivity have brought remote capabilities to airports, where instantaneous information sharing is paramount. Mobile reporting solutions allow passengers and employees to act as additional “eyes and ears”, bringing critical safety alerts to the attention of security officials. Information shared by passengers and employees can be extremely beneficial to help shed light on a security incident and enable faster and more efficient response. Some solutions even offer the ability to share video and audio with the command centre through a passenger’s smartphone. Facial recognition technology Facial recognition can provide situational intelligence through detecting, tracking, and alerting on persons-of-interest A powerful and versatile security solution, facial recognition can provide situational intelligence to security operations centres through detecting, tracking, and alerting on persons-of-interest appearing in video streams across multiple sites and thousands of cameras simultaneously. These systems are capable of forensic-search recognition capabilities and can be compared against national, local or custom databases to make investigations faster and more efficient. Interest and adoption of the technology is growing, with new use cases being introduced daily. The solution is sure to become a valuable tool in the years to come. In short, airports are very much like small connected cities, featuring a landscape with a variety of assets, a wide range of stakeholders, and numerous sites that keep safety at the forefront of the public eye. However, while global risks and day-to-day challenges can be difficult for security operators to manage, today’s advanced and intelligent technologies can ultimately help improve the overall traveler experience.
Edge devices (and edge computing) are the future. Although, this does seem a little cliché, it is the truth. The edge computing industry is growing as quickly as technology can support it and it looks like we will need it to. IoT global market The IoT (Internet of Things) industry alone will have put 15 billion new IoT devices into operation by the year 2020 according to a recent Forbes article titled, “10 Charts That Will Challenge Your Perspective of IoT’s growth”. IoT devices are not the only edge devices we have to deal with as the total number of connected edge devices includes the likes of devices like security devices, phones, sensors, retail sales devices, and industrial and home automation devices. The IoT (Internet of Things) industry alone will have put 15 billion new IoT devices into operation by the year 2020 The sheer number of devices begins to bring thoughts of possible security and bandwidth implications into perspective. The amount of data that will need to be passed and processed with all of these devices will be massive. There needs to be consideration taken by all business owners and automation engineers into how this amount of data and processing will be conducted. Ever-expanding edge devices market As the number of edge devices in the marketplace and their use among consumers and businesses rises, the need to be able to handle the data from all of these devices is no longer going to be suitable for central server architectures. We are talking about hundreds of billions and even trillions of devices. According to IHS Markit researchers’ study, there were 245 million CCTV cameras worldwide. One has to imagine there are at least 25% of that many access control devices (61.25 million devices) based on a $344 million market cap also calculated by IHS Markit’s researchers. If all the other edge devices mentioned earlier are considered then one can see that trying to route them all through servers for processing is going to start to become difficult if it hasn’t already, -which arguably it already has, as is evidenced by the popularity of cloud-based solutions amongst those businesses that already use a lot of edge devices or are processing a lot of information on a constant basis. Cloud computing The question is whether cloud computing the most effective and efficient solution as the IoT industry grows The question is this; is cloud computing the most effective and efficient solution as the IoT industry grows and the amount of edge devices becomes so numerous? My belief is that it is not. Taking the example of a $399 USD device that is just larger than the size of a pack of cards and runs a CPU benchmarked at the same level as a mid-size desktop. This device has 8GB RAM and 64GB EMMC built-in and a GPU that can comfortably support a 4K signal at 60Hz with support for NVMe SSDs for add-on storage. This would have been unbelievable five years ago. As the price of edge computing goes down, which it has done in a dramatic way over the last 10 years (as can be seen with my recent purchase), the price to maintain a central server that can perform the processing required for all of the new devices being introduced to the world (due to the low cost of entry for edge device manufacturers) becomes more expensive. This introduces the guarantee that there will be a point where it will be less expensive for businesses, and consumers alike, to do the bulk of their processing at the edge as opposed to in central server architectures. Cloud computing is now being overtaken by edge computing, the method of processing data at the edge of the network in the devices themselves Edge computing There are a plethora of articles discussing and detailing the opposition between the two sides of the computing technology coin, cloud computing and edge computing. The gist of it is that “cloud computing” was the hot new buzzword three years ago and is now being overtaken by “edge computing.” The truth is that cloud computing is a central server architecture hosted at someone else’s location. Edge computing is going to be a necessary development in the technology industry Edge computing is the method of processing data at the edge of the network (in the devices themselves) and allowing for less resources required at a central location. There is certainly a use case for both, however the shift to edge computing amongst the general public and small to mid-sized businesses will not be a surprise to those players, who have been paying attention. One article titled, “Next Big Thing In Cloud Computing Puts Amazon And Its Peers On The Edge” by Investor’s Business Daily takes the stance that edge computing is going to completely displace centralised cloud computing and even coins the phrase, “Cloud computing, decentralised” to explain edge computing. It speaks for the stance that most experts in technology seem to be taking, including Amazon Web Services’ VP of Technology, Marco Argenti according to the same article. We know that edge computing is going to be a necessary development in the technology industry, and it is happening as I write this, and quickly at that. Cost efficiency of edge processing As time goes on, the intersection between the prices of network bandwidth, edge processing and maintaining super powerful central servers will cause edge processing to be the most efficient and cost-effective way to maintain a scalable network in any environment, including datacenters. Owning a central server or utilising edge computing become the better options As it currently stands, most residential users can only achieve a 1Gbps WAN (internet) connection, and small to medium-sized business can’t get much more but seem to get much less, based on my personal experience. When more than 1Gbps needs to be processed, cloud computing becomes very expensive at which point, owning a central server or utilising edge computing become the better options. Then you look a total cost of ownership and when the cost of edge computing is less expensive than the cost of maintaining central server architectures, edge computing becomes the single best option. So, I’ll say it again, edge devices (and edge computing) are the future.
The industry faces numerous challenges in the coming year. Physical and cyber security threats continue to become more complex, and organisations are struggling to manage both physical and digital credentials as well as a rapidly growing number of connected endpoints in the Internet of Things (IoT). We are witnessing the collision of the enterprise with the IoT, and organisations now must establish trust and validate the identity of people as well as ‘things’ in an environment of increasingly stringent safety and data privacy regulations. Meanwhile, demand grows for smarter and more data-driven workplaces, a risk-based approach to threat protection, improved productivity and seamless, more convenient access to the enterprise and its physical and digital assets and services. Using smartphone apps to open doors Cloud technologies give people access through their mobile phones and other devices to many new, high-value experiencesEnterprise customers increasingly want to create trusted environments within which they can deliver valuable new user experiences. A major driver is growing demand for the ‘digital cohesion’ of being able to use smartphone apps to open doors, authenticate to enterprise data resources or access a building’s applications and services. Cloud technologies are a key piece of the solution. They give people access through their mobile phones and other devices to many new, high-value experiences. At the same time, they help fuel smarter, more data-driven workplace environments. With the arrival of today’s identity- and location-aware building systems that recognise people and use deep learning analytics to customise their office environment, the workplace is undergoing dramatic change. Improved fingerprint solutions Cloud-based platforms and application programming interfaces (APIs) will help bridge biometrics and access control in the enterprise, overcoming previous integration hurdles while providing a trusted platform that meets the concerns of accessibility and data protection in a connected environment. At the same time, the next generation of fingerprint solutions will deliver higher matching speed, better image capture quality and improved performance. The next generation of fingerprint solutions will deliver higher matching speed, better image capture quality and improved performance Liveness detection will ensure that captured data is from a living person. Biometrics authentication will also gain traction beyond access control in immigration and border control, law enforcement, military, defence and other public section use cases where higher security is needed. Flexible subscription models Access control solutions based on cloud platforms will also change how solutions are deployed. Siloed security and workplace optimisation solutions will be replaced with mobile apps that can be downloaded anywhere across a global ecosystem of millions of compatible and connected physical access control system endpoints. These connections will also facilitate new, more flexible subscription models for access control services. As an example, users will be able to more easily replenish mobile IDs if their smartphones are lost or must be replaced. Generating valuable insights with machine learning Machine learning analytics will be used to generate valuable insights from today’s access control solutionsEducation, finance, healthcare, enterprise, and other niche markets such as commercial real-estate and enterprises focussed on co-working spaces will benefit from a cloud-connected access control hardware foundation. There will be a faster path from design to deployment since developers will no longer have to create an entire vertically integrated solution. They will simply add an app experience to the existing access control infrastructure. New players will be drawn to the market resulting in a richer, more vibrant development community and accelerated innovation. Data analytics will be a rapidly growing area of interest. Machine learning analytics will be used to generate valuable insights from today’s access control solutions. Devices, access control systems, IoT applications, digital certificates and location services solutions, which are all connected to the cloud, will collectively deliver robust data with which to apply advanced analytics and risk-based intelligence. As organisations incorporate this type of analytics engine into their access control systems, they will improve security and personalise the user experience while driving better business decisions.
After a period of rapid international expansion, the next step for Ajax Systems is to set deeper roots in each market and become more sustainable. The manufacturer of wireless security equipment will continue to extend the range of Ajax products and capabilities by responding to local requests. Smart home management options and automation scenarios will be a significant focus for the next year. Wireless security equipment The systems are resistant to false alarms, regularly update over the air Established in 2011 in Kyiv, Ukraine, Ajax Systems produces wireless security equipment for end users and small-medium-sized businesses. Ajax is a complete eco-system. The devices are ready to work out of the box. There are 24 devices for protecting residential and commercial properties from intrusion, fire, and floods as well as a set of automation modules. Users treat them as gadgets that make their homes smarter. Ajax wireless systems are easier to maintain, configure, and monitor for installers as well as for security companies, according to Ajax. The systems are resistant to false alarms, regularly update over the air, and can be easily expanded to cover premises of any size. IoT-based security systems “Our IoT-product approach to security systems, gadget-like industrial design, and user-friendly interfaces disrupted the market in 2016,” says Valentine Hrytsenko, Chief Marketing Officer at Ajax Systems. “After receiving global recognition in the security market, the company grew 80-fold.” Today, Ajax IoT-based security systems protect more than 200,000 people in 80 countries around the world from break-ins, fires, leaks and other threats. “Our mission is to reshape security and make it a common attribute of every household,” says Hrytsenko. Ajax wireless systems are easier to maintain, configure, and monitor for installers Ajax smart technology Ajax smart technology features a combination of reliable hardware and intelligent software. A proprietary Jeweller two-way radio protocol allows placing devices at a distance of up to 2000 meters from the hub in an open space. The system is encrypted, resistant to jamming and code grabbing. Ajax detectors feature false alarm-preventing algorithms: Haze Flow, ZOE, LISA, SmartDetect. The hubs run on a real-time operating system, Malevich OS that processes the commands and sends the alarms. Ajax Cloud service helps to control the system from anywhere in the world using native apps. Easy and seamless installation Ajax features system scalability, flexible management of administrative rights"Easy installation facilitates Ajax on-boarding. The company says 67% of Ajax users purchase additional security devices within the first six months. And an average system configuration consists of nine items. “We focus primarily on the residential, small and medium-sized businesses,” says Hrytsenko. “In the residential segment, Ajax covers the needs to detect break-ins, prevent fires and floods. Ajax devices are visually appealing to fit any home and business interior seamlessly. For the small and medium-sized business, Ajax features system scalability, flexible management of administrative rights, informative notifications, professional maintenance software, as well as integration of the security camera streams for centralised monitoring.” Route-to-market approach Ajax Systems’ route-to-market approach is two-fold. First, they develop strategic partnerships with the local professional security equipment distributors in each country. From the distributors, Ajax equipment goes to the installers, system integrators, security companies, etc. In addition, Ajax seeks to build brand recognition and actualise the concept of security by weaving it into the daily routine of a general audience. “We form a good understanding of their security needs,” says Hrytsenko. As with any new technology, there is an adoption curve for both B2B and B2C clients. Thus, the educational challenge is persistent for Ajax from country to country. Ajax Systems’ route-to-market approach is two-fold Wireless security systems “On a professional market, new products are often met with understandable suspicion,” says Hrytsenko. However, a huge misconception is that user-friendly equipment is either hard to customise or unreliable. Not true, he says. After testing in five accredited laboratories, Ajax devices successfully earned Grade 2 certification for compliance with the requirements of the international standard EN50131-1:2006. Grade 2 is the highest reliability grade a wireless security system can get.
An area of technology that is shifting how we interact with our cities is the Internet of Things (IoT). The IoT already accounts for swathes of technology and devices operating in the background. However, we’re increasingly seeing these come to the forefront of everyday life, as data becomes critical. The decisions that this critical data is attached to must be made quickly. A living, breathing city must constantly be monitoring, assessing and utilising data in order to ensure it keeps people safe and mobile. Delivering exciting opportunities Much like the arrival of Uber and Airbnb, the Internet of Things will deliver exciting opportunities The search for an answer to the challenges of growing human urbanisation is believed to exist in the smarter application of new technologies. Where once, electricity and the arrival of the elevator gave us vertical cities, today, we have the promise of the Internet of Things, Artificial Intelligence (AI), Big Data, micro-controllers (MEMS) and new materials to help manage a very crowded future. Data capture form to appear here! We are confronted with a perfect storm of risk factors and potential vulnerabilities as each of these connection points is potentially a source for a security breach. Much like the arrival of Uber and Airbnb, the Internet of Things will deliver exciting opportunities and new kinds of services, many of which we have yet to imagine. Priority control solutions However, there will be equally unimagined and unintended consequences, if only because, in highly complex systems with many connected and tightly linked elements, accidents are inevitable. “The journey to a smart city is incremental—you can’t flip a switch or force it. It requires complex integration and relentless innovation,” says Global Traffic Technologies (GTT) product manager Chad Mack. GTT provides priority control solutions that use analytics GTT provides priority control solutions that use analytics, cloud-based computing to link connected devices to improve mobility, public safety and transportation in cities around the world. GTT’s Opticom Priority Control mobility solution allows transit and public safety vehicles to request a green light at intersections, dramatically reducing the potential for intersection crashes and improving travel times and reliability. Increased connectivity “These intelligent priority management systems allow users to oversee and control the movement of vehicles that operate on a city’s streets,” Mack explained. The rise of urban centres and ‘Smart City’ initiatives enabled by big data, network of sensors and the Internet of Things bring a new set of challenges to future policing. There is now a growing consensus that technology transformation must be part of the overall solution While digital technologies have helped compress the reaction time of police all over the world, the increased connectivity can similarly be leveraged by criminals to carry out increasingly sophisticated crimes. There is now a growing consensus that technology transformation must be part of the overall solution. To keep cities and citizens safe, law enforcement must be armed with the right technology, tools, and processes to solve – or even prevent – the toughest crimes at faster rates. Proven criminal theories Many law enforcement agencies such as LAPD, Seattle and Florida Police Departments are using cutting-edge cloud-based crime prediction software to predict drug crime, gang crime, anti-social behaviour and gun violence. Such crime prediction software works by analysing data through a sophisticated algorithm that applies proven criminal theories to predict the top 10 to 20 spots where crime is most likely to occur over the next few hours. To do so, it leverages on a variety of factors, such as historical and recent crime data, real-time activity, weather forecasts, locations and other information. Once these ‘hot spots’ are identified, police officers can adapt their patrol schedule and frequency at these locations, making their presence felt in the area and thereby prevent crime from taking place.
All schools and universities need to address three different levels of security when considering access control. The first level is the least vulnerable of the three and concerns the perimeter entry and exit points. Here, incorporating some level of electronic access control should be a consideration, whether that is a combination of electronic and mechanical door hardware, or a complete electronic solution. An electromechanical solution, such as electric strikes, can be beneficial in the effectiveness of perimeter security as they provide greater visitor management and traffic control. Data capture form to appear here! Facilitating visitor entry Electric strikes are able to control access via keypads, cards and proximity readers Electric strikes are able to control access via keypads, cards and proximity readers. When combined with mechanical locks, they provide the benefits of unrestricted egress. The second level is more vulnerable than the first and relates to the point at which people are screened before entering the interior of the school. As this area will be designed primarily to facilitate visitor entry, it will require adequate monitoring of access control. To do this, the latches used on access-controlled egress doors can be electronically controlled from the reception area or school office. Exit or entry doors can be opened by a push from the inside and, if the entry area is also an emergency exit, electronically-powered panic bars can also provide an effective solution. More and more schools are installing visitor management systems to control who can and cannot get into the building. Access control solutions Finally, the third level – and the most vulnerable – refers to the core of the school that both students and staff occupy. These are internal hallways, corridors, stairwells, entry points and restricted areas (such as staff lounges and science laboratories). These are the areas where a school must foster the safest environments for pupils, while also providing protection as they often contain confidential information, expensive equipment or chemicals. The access control system is linked to all doors within the school building A number of different access control solutions are beneficial, whether electronic, mechanical or a combination of the two. For electronic solutions, there are two options available: remote or centralised systems. With remote lockdown systems, individual locks are activated by remote control within proximity to the door. With integrated centralised systems, the access control system is linked to all doors within the school building and locked at the touch of a button. Prevent unauthorised persons Mechanical solutions, which include a cylinder lock and key, are also suitable for places such as classrooms, as doors can be locked externally with a key or internally with a thumbturn, to prevent unauthorised persons from entering. At one university in the United States, a smart RFID wire-free access control solution has been installed At one university in the United States, a smart RFID wire-free access control solution has been installed. The SALTO Virtual Network (SVN) wire-free system pushes and pulls data from the university’s ‘hot spot’ entry points to all their offline locks. By choosing a wire-free solution, the university only had to run wires to their exterior doors. The interior doors do not require wiring as these locks are stand-alone wire-free locks. Student accommodation block Securing access to student accommodates is another concern among colleges. One university in the United Kingdom wanted a security system to protect their student accommodation; in particular, a keyless system that would grant 24/7 access to its students while also enabling campus security to monitor these activities remotely. They chose Vanderbilt’s ACT365, which keeps audit trails by monitoring and recording fob activity. When another English university sought electronic locks for its newest student accommodation block, it turned to Aperio wireless locking technology from ASSA ABLOY. They used the wireless locks to extend the Gallagher Command Centre access control system to a student residence with 231 en suite rooms separated into flats for between 8 and 13 postgraduates. Aperio wireless locks are battery-powered and use less energy than wired magnetic security locks.
HID Global, globally renowned trusted identity solutions provider, has announced support for Seos-enabled student IDs in Apple Wallet. Beginning this fall, students, faculty and staff at Clemson University will be able to add their IDs to Apple Wallet and use their iPhone and Apple Watch to access buildings on campus, purchase meals and much more. Seos-enabled student IDs “HID Global is excited to play an important role in creating transformative connected university experiences that make it easy for students to simply use their iPhone or Apple Watch to enjoy all that daily campus life has to offer,” said Stefan Widing, President and CEO with HID Global. HID’s technology and electronic locks from our parent company ASSA ABLOY are helping Clemson University students" Stefan adds, “HID’s broad range of technology and electronic locks from our parent company ASSA ABLOY are helping Clemson University students, faculty and staff take full advantage of convenient mobility applications. This fall, their Apple devices can be used for everything from entering buildings – such as residence halls and individual rooms – to buying meals, accessing the gym, and using secure print services and numerous other university resources.” iCLASS SE reader modules To support student IDs in Apple Wallet on iPhone and Apple Watch, HID provides Seos-enabled credentials, HID iCLASS SE and HID OMNIKEY readers, embedded HID iCLASS SE reader modules, and Corbin Russwin and SARGENT electronic locks from ASSA ABLOY. Through HID’s support of student IDs in Apple Wallet, Clemson students will be able to seamlessly access residence halls, libraries and fitness centers, buy lunch, make purchases at the university store, print documents and more by placing their iPhone or Apple Watch near a reader where contactless student ID cards are accepted. Contactless student IDs Contactless student IDs are supported on iPhone 6 and later and iPhone SE. On iPhone XS, iPhone XS Max, and iPhone XR, student IDs may still be used for up to five hours in power reserve mode when the iPhone battery needs to be charged. Student IDs in Apple Wallet are not only convenient, they also provide an extra level of security as students no longer have to worry about misplacing their physical card. School credential provisioning is protected by two factor authentication.
Traka has launched a new downloadable white paper to open a discussion on the changing nature of retail banking in the UK, using latest case examples to consider branch management and shifting customer expectations. The white paper, titled ‘Shaping the retail banking industry’ looks at several factors influencing the sector, including the increasing expectations and values of customers demanding a more personalised branch experience. Key and equipment management Incorporating analysis from globally renowned financial services, including PwC, Accenture and Deloitte, the paper highlights the opportunities for innovation, together with collaboration and adoption of new operational processes. This incorporates key and equipment management to enable retail banks to deliver on top quality service. The future for retail banking could arguably also be cited as bleak and in a state of industry disruption" Says Mike Hills, Traka UK Market Development Manager and Author of the white paper: “Against a backdrop of negative press concerning the state of UK high streets, the future for retail banking could arguably also be cited as bleak and in a state of industry disruption, as customers move towards a more mobile-connected lifestyle.” Staff and customer security “However, our research in putting together this white paper tells a different story. That actually, the sector has a real chance to embrace the changes occurring and entice their customers, meeting demands for personal service. We found that brands riding the storm are taking small yet significant steps to tailor their services and make operational differences that are proving key to their success.” The white paper focusses on Traka’s experience with Nationwide Building Society to demonstrate how supporting operational efficiency can benefit banking staff and ensure they can focus on serving their customers, without compromising on security. Retail Banking security Mike concluded, “We have brought this white paper together using the latest research and intrinsic market reports, together with case evidence on the future of the retail banking industry and the issues faced by the sector to ensure long term success.” “Within this, we wish to stimulate debate and encourage views and contributions from as many different voices as possible. We look forward to your opinion, experience or comment on this matter of growing importance so together, we can look to support and shape the future of retail banking.”
Ping Identity, the provider of Identity Defined Security, announces its successful completion of the Financial-grade API (FAPI) conformance testing, as part of the process defined by Open Banking Ltd. This builds on Ping Identity’s previous success as the first identity platform to pass all 70 technical security tests, as set by Open Banking Ltd., with zero warnings. The most recent set of FAPI conformance testing evaluated the latest versions of the Ping Intelligent Identity platform, including PingFederate, PingAccess and PingDirectory, within a mock banking environment. Additional technical requirements It switches to an API model with structured data that utilises a token model such as Open Authorisation The inclusion of FAPI within the Ping Identity solution for Open Banking helps allow banks to overcome insecure practices such as screen scraping by using stored user credentials. Instead, it switches to an API model with structured data that utilises a token model such as Open Authorisation. FAPI is a technical specification developed as a multi-industry standard by the FAPI Working Group of OpenID Foundation (OIDF). It leverages OAuth 2.0 and OpenID Connect (OIDC) to define additional technical requirements for the financial industry and other sectors requiring higher security. For banks specifically, FAPI provides various advantages. This includes enabling applications to securely interact with financial accounts, while also enhancing the user’s ability to control security and privacy settings. Secure identity requirements In concurrence with the specification, OpenID Foundation maintains a cloud-based testing suite for conformance testing by banks, certified third-party security providers and platform vendors—such as Ping Identity. The Ping Intelligent Identity platform is used by hundreds of financial services enterprises, including many of the CMA 9 and Open Banking Ltd. itself. Additionally, FAPI is of increasing relevance to the growing number of new fintech start-ups in areas such as investment, wealth management, insurance, payments and even real estate. “This is significant beyond the Open Banking and financial services sector,” explains Rob Otto, EMEA Field CTO, Ping Identity. “Other digitally-focused sectors, with similar secure identity requirements, now have a proven template that can allow them to quickly deploy their own security controls, which have been stringently tested by the largest financial institutions in the UK.”
NiskhamSWAT, a charity that provides hot meals and everyday essentials to homeless people in the UK, has partnered with Videx Security, to overcome their access control and entry challenges. The charity, which was established in 2009 in West London, now serves disadvantaged communities in Oxford, Reading, Milton Keynes, Birmingham, Slough, Windsor and Lancashire as well as London. It’s run by volunteers and the charity currently has 1,300 volunteers across the country, serving those who need it the most. Need of a convenient access control solution We needed a more flexible and convenient access control solution that still provided a high level of security too"Randeep S. Lall, Global Operations Director at the charity, said: “We provide 3,000 meals per week to those in need which means our main warehouse in London is extremely busy 24 hours a day, seven days a week. Security and appropriate access and entry are so important." “Although we have a secured electric gate that drivers have to report to in order to gain entry, it meant someone had to permanently stay at the warehouse to grant delivery and collection vans access. This wasn’t sustainable given we are a completely volunteer led organisation. We needed a more flexible and convenient access control solution that still provided a high level of security too.” NiskhamSWAT, who have recently won a Queen’s Award for voluntary service, worked with leading access control and door entry distributor, ADI to overcome their entry challenges. GSM audio kit with code lock Joseph Davies at ADI explained: “We recommended a GSM access control system to NiskhamSWAT to help solve their entry issues. After researching which solution would work best, we advised that the charity used a Videx two-way GSM audio kit with code lock and proximity access control in a 4000 series style panel.” The GSM system we’ve donated to them enables people to answer calls to their front door or gate from mobile phone" Neil Thomas, National Sales Manager at Videx, continued: “When ADI contacted us, we were more than happy to help provide a system that could solve NiskhamSWAT’s access problem. The GSM system we’ve donated to them enables people to answer calls to their front door or gate from their mobile phone or landline, so they never have to miss that important visitor and are made aware of who has visited even when they are not there.” Easy programming of the entrance panel For NiskhamSWAT, this means that no one is required to remain at the warehouse 24/7 to authorise access. If a van arrives for a collection or delivery and no one is there, the system will call the designated number for access and has the facility to divert to another number if the first call is not answered, with a maximum of up to four numbers per button. Programming the entrance panel can easily be carried out either by SMS or dialling into the system using a telephone without a keypad. Randeep at NiskhamSWAT added: “Huge thanks to ADI and Videx for the donation and free installation from Image Security too. It’s helped us out massively as it meant no one has to stay at the warehouse, freeing up precious volunteering time that can be put to better use elsewhere. It’s so much more convenient to receive a call when someone is asking for access. I can verify the caller and swiftly authorise or deny access.”
Modern office design needs an advanced access control system that is powerful, flexible and aesthetically in tune with workspace users and their needs. At Plexal, a new £15 million flexible work environment located in the heart of Olympic East London, where the city’s ‘innovation community’ meet to brainstorm and explore new ideas, Aperio achieves all the three virtues wirelessly. At Plexal enterprise and academia work together, with technology companies, start-ups, universities and creatives under one roof. Up to 800 entrepreneurs use the workspace to devise, create and launch products and services. Innovative access control solution Easy, non-disruptive installation of new locking devices was another goal: Plexal preferred a wireless solution Plexal required a tried-and-tested access control solution they could rely on for high-end security to protect this new co-working office against unauthorised intrusion and burglary. Easy, non-disruptive installation of new locking devices was another goal: Plexal preferred a wireless solution. Any chosen solution would need the flexibility to expand access control as Plexal’s site scales over time. Device aesthetics must complement a contemporary, light-filled interior design with lots of glass. Powerful, flexible, wireless connectivity Plexal offices are now fitted with Aperio wireless, access card-based locking technology. Plexal’s battery-powered Aperio locks are integrated with DoorFlow, NetNodes’ online platform for managing and auditing building access. So far, 59 Aperio L100 wireless high-security door locks have been installed and integrated online with DoorFlow. These Aperio locks provide Plexal with a high level of physical protection and transmit door status to DoorFlow in real time. Adaptable locking solution Plexal required an adaptable locking solution for a range of different doors and, with no wiring required" “Plexal required an adaptable locking solution for a range of different doors and, with no wiring required, it was quick and easy to install Aperio with minimal disruption,” says Stewart Johnson, Director at NetNodes. Because Aperio locks are battery- rather than mains-powered, the new wireless solution also keeps Plexal’s maintenance costs and energy consumption low. Aperio wireless locks use no power when idle, only “waking up” to read credentials or maintain a system heartbeat. Annual running cost savings over traditional wired doors are significant. Modern locking device design Aperio aesthetics were a good fit for Plexal’s modern workspace. “We have a futuristic-style, open-plan design here at Plexal — our offices are predominantly glass-fronted, so we needed an effective design which was not only robust but adaptable, too,” says John Herbert, Facilities Manager at Plexal. “What really appealed to me about ASSA ABLOY access control’s products was the aesthetic.” Aperio technology integration And because Aperio technology is built on an open platform for integration with almost any security or building management system, Plexal’s access control solution is fully future-proofed. They have the option to expand to new offices, floors or even buildings easily. Aperio can upgrade mechanically locked doors and wirelessly connect them — online or offline — to new or existing access control systems. This is achieved with minimal modification to doors and premises, offering a simple, cost-effective security upgrade. Aperio can upgrade mechanically locked doors and wirelessly connect them to new or existing access control systems Wireless access control “Should any additional doors need to be added to the system in the future, this can be done easily, without modifying or changing the aesthetics of the environment,” confirms Stewart Johnson. “This also minimises future installation costs, offering a cost-effective and straightforward access control upgrade.” “We foresee change in the not-too-distant future and are delighted at our options to modify,” adds John Herbert. Secure physical and digital access ASSA ABLOY's innovations enable safe, secure and convenient access to physical and digital places, offering efficient door opening solutions, electronic locking devices, trusted identity solutions and entrance automation technologies.
ProdataKey (PDK), an innovator of networked cloud-based access control products and services, and OwnerGo, a complete web-based lease-management, communication and organisational tool for multi-tenant properties, has implemented a fully integrated, comprehensive solution for Freedom Heights and Lofts (Freedom Heights), a condominium community in Atlanta, Georgia. Prodata cloud access control This unique integration between ProdataKey's Cloud Access Control platform and OwnerGo's lease management, communication and organisational tool for multi-tenant properties, is supporting the diverse needs of property management, the Homeowners Association and residents of Freedom Heights and Lofts, an upscale condo community in Atlanta, Georgia. This case offers the perfect example of how everyone wins when multi-tenant residential properties unite security solutions with other property management functions. Integrated security and access control The integrated platform, designed for condo, apartments & townhomes provides enhanced security The integrated platform, designed for condo, apartment, townhome and single-family home communities, provides enhanced security and convenient controlled access to all tenants and workers who service the property while simultaneously providing the Homeowners Association (HOA) board members and property managers with the tools they need to be responsive to residents and function more efficiently. The integrated, user-friendly interface controls 32 access points to external building entrances and common areas and contains a wealth of tools to support work order submissions, resident directories, event calendars, leasing documentation, a fully automated leasing list tool and more. Up to 25% of Freedom Heights homeowners lease their units to renters; the balance of units is owner-occupied. PDK access control system The PDK access control system provides the Freedom Heights HOA with powerful security management capabilities, robust reporting and the ability to segment access to specific buildings by tenant. A mobile interface provides the night security guard with real-time awareness of when doors are being accessed, as well as Instant Alerts if any doors are left propped open. Integration with OwnerGo eliminates redundant data entry while providing continuity in managing lease documents and assigning access credentials. System administrators can more easily keep track of authorised card holders and deactivate cards that have been lost or should no longer be in circulation. In addition, cards assigned to a particular unit can be transferred automatically to the next occupants. OwnerGo integration OwnerGo integration allows residents to unlock doors for which they have permission without the need for access control cards The OwnerGo integration allows residents to unlock doors for which they have permission without the need for physical access control cards. Using the graphical map feature within the OwnerGo web and mobile interface, they can simply tap or click on the door they wish to open. Using this method, they can also open doors remotely for visitors who call ahead from outside. The system also provides the HOA board with leverage when collecting delinquent payment of condo fees. Residents who are significantly late in payments may have their access to community areas, like the pool and gym, temporarily deactivated until payment is received. Cory Jackon, Vice President of Sales for PDK, says, “Using our open API, OwnerGo has been able to pull in a lot of PDK’s features, making the management of security a seamless part of the platform’s capabilities.” Enhanced security “Integrating PDK’s access control capabilities into the OwnerGo platform is an extension that enhances the security and convenience for all involved,” adds Klye Montgomery, President of OwnerGo. Current President of the Freedom Heights HOA, Ken Gwinner, agrees. He says, “I would definitely recommend the OwnerGo/PDK solution to Homeowner Associations, property management companies and other entities responsible for the many challenges associated with properties like ours. It does exactly what we need.”
Round table discussion
One impact of Chinese companies entering the physical security market has been an erosion in product pricing, creating what has been called the "race to the bottom". However, political forces and cybersecurity concerns have presented new challenges for Chinese companies. Adding cybersecurity increases costs, and the addition of more functionality to edge devices is another trend that has impacted product pricing. We asked this week's Expert Panel Roundtable: Has price erosion ended (or slowed down) in the security market?
With the advent of online shopping, brick-and-mortar retail businesses are challenged to make transactions more convenient while enhancing the “experience” aspects that differentiate real-life shopping from the simpler route of clicking on a website. Technology is helping retailers create that differentiation, including technologies such as video systems, deep learning analytics and point-of-sale (POS) integrations that have evolved from innovation in the physical security market. For more insights, we asked this week’s Expert Panel Roundtable: What new security industry technologies are having an impact on the retail market?
What is a business, or an industry, but a collection of people and the results of their work? People make all the difference in the destiny of a business or industry. And the people involved in a business reflect the impact of demographic changes – and the passage of time. The security industry has been largely built by Baby Boomers, who are getting older and increasingly stepping aside to make way for younger folks. We asked this week’s Expert Panel Roundtable: Is there a “new generation” of employees and managers entering the physical security marketplace, and what will be the impact?