Doordeck has announced Oprema as their exclusive Paxton distribution UK partner, expanding smart security in the UK. Keyless smartphone access control Doordeck, which lets building users unlock doors from their phone (instead of a keycard or keyfob), is unique in being the only ‘keyless’ product on the market designed to integrate directly with a building’s existing access control system — like the industry-leading Paxton Net2. Fundamentally, it means you can roll out...
With the coming of a New Year, we know these things to be certain: death, taxes, and… security breaches. No doubt, some of you are making personal resolutions to improve your physical and financial health. But what about your organisation’s web and mobile application security? Any set of New Year’s resolutions is incomplete without plans for protecting some of the most important customer touch points you have — web and mobile apps. Every year, data breaches grow in scop...
How’s this for a simple access control scenario? You walk up to a door, wave your hand in front of a button, the button lights up, and the door opens. That’s the simplified user experience that startup Openpath is promoting as it enters the crowded and mature market for physical access control. Openpath says a simple user experience provides the extra boost needed for mobile credentialing to gain momentum. In this case, it’s even simpler than using a card credential (no s...
Maxxess will be at Intersec 2019 showcasing its latest advances in corporate risk reduction, improved people management and smarter hospitality access solutions - including new releases in its popular eFusion and Ambit solutions. eFusion security management The latest version of the VisitorPoint module within the eFusion security management platform will be showcased, offering a host of new streamlined functions for efficient people and visitor management. Harnessing current advances in cloud...
With access control for the simplest to the most complex application, ASSA ABLOY has a security solution to make any building smarter. Our wireless, battery-powered devices include Intersec’s Access Control Product of the Year, one of many created to secure buildings sustainably in the connected cities of the future. The ASSA ABLOY stand for Intersec 2019 (Sheik Saeed Hall 1, Stand A12) showcases the following commercial access control technologies and devices. Aperio H100: access contro...
ADT Inc., global provider of monitored security and interactive home and business automation solutions in the United States and Canada, has announced the unveiling of its newly redesigned smart home security system – the ADT Command Panel & Control Platform (ADT Command) – as well as a suite of smart security and home automation products at the Consumer Electronic Show (CES). This year’s theme, “Real Protection,” will highlight the products ADT offers to ensure...
Berlin-based manufacturer Bird Home Automation Group expands its line of IP video door intercoms with the new DoorBird D2101IKH. This new model is equipped with an info panel and an integrated keypad for access control PIN codes. Further components of this powerful door intercom and access control solution include a wide-angle camera, RFID reader, one call button and two-way audio system. Backlit info panel The DoorBird D2101IKH IP video door intercom is weatherproof and made of stainless steel. The call button is backlit with an engraved bell symbol and is also made of stainless steel. The D2101IKH is the first DoorBird model to feature the backlit info panel. The info panel is a backlit window where printed cards or graphics can be inserted to display the address or other information. With the DoorBird D2101IKH, users can gain access to the premises using the DoorBird App, built-in RFID reader or by entering a PIN code on the keypad. Individual access codes can be assigned to, for example, a cleaning service to provide access at scheduled times or only once. Remote door access Up to eight smartphones or tablets can be connected to the D2101IKH door intercom. When the doorbell rings, users are alerted via a push notification to their mobile devices. After swiping open the push notification, the user can see and speak to the visitor via the DoorBird app. With the DoorBird app, users can remotely open doors to grant entry to guests or allow couriers to make deliveries. Parents can also unlock the front door for their children if they are not at home. With the new DoorBird D2101IKH, users can have more flexibility, security and comfort in their everyday life.
Johnson Controls has introduced exacqVision Cloud Drive storage, an untethered way for customers to easily store, access and search critical surveillance video in the cloud. As a pioneer in video solutions, Exacq recognises that many customers are turning to cloud solutions to provide an offsite copy of video that ensures protection against natural disasters, theft and other events while reducing capital expenses and increasing accessibility. Allocating storage across multiple cameras exacqVision Cloud Drive storage helps security and IT teams lower their Total Cost of Ownership by eliminating some of the unnecessary hardware costs and management of storage infrastructure. With exacqVision Cloud Drive storage, users can easily allocate storage across multiple cameras and archive event video and bookmarks to the cloud. Video is natively searchable by the exacqVision Client or Exacq Mobile app, providing powerful benefits over generic cloud storage providers. Released with the latest version of exacqVision (9.8), the new exacqVision Cloud Drive storage is available on an annual subscription basis for exacqVision Professional and Enterprise customers.
Pulse Secure, global provider of secure access solutions to both enterprises and service providers, has announced that the IAIT Lab (Institute for the Analysis of IT components) has completed an extensive test of Pulse Connect Secure, resulting in superb findings across usability, comprehensiveness and interoperability for the market leading VPN solution. Pulse Connect Secure Pulse Connect Secure provides easy, secure, authenticated access for remote and mobile users to corporate resources—anytime, anywhere. Pulse Connect Secure is the most widely deployed SSL VPN for organisations of any size, and across every major industry, to enable productivity through seamless, protected access to applications and information. The solution offers Zero Trust-based secure access through integrated user, device and security state authentication and robust connection sets that ensure compliant pre- and post-connect access to hybrid IT infrastructure. Pulse Connect Secure includes Pulse Secure Clients and the AppConnect SDK Pulse Connect Secure includes Pulse Secure Clients and the AppConnect SDK. Pulse Clients are dynamic, multi-service network clients, which can be implemented agent or agentless, for mobile and personal computing devices. Pulse Clients can be simply deployed, enabling users to quickly “click and connect” from any device, anywhere. Pulse Secure AppConnect SDK delivers per application SSL VPN connectivity for iOS and Android clients, enabling IT departments to create an even more transparent and secure mobile app experience for their users. Multi-factor authentication and data security The Institute for the Analysis of IT components (IAIT), an independent testing laboratory based in Germany, examined Pulse Connect Secure under real-world conditions through a series of testing scenarios. The highly detailed, nine-page report covers 16 core functions ranging from initial configuration, policy development, through enterprise onboarding, host checking functionality, FQDN split tunnelling, multi-factor authentication, as well as data center and cloud Single Sign On along with interoperability with a range of third-party applications. The complete review offers several conclusions, including: The Pulse Connect Secure appliance is perfectly suited to establish secure means of access to company resources via any kind of connection whatsoever. In the test, the solution was able to score highly across a very large scope of functions. Despite the vast range of applications, data stores, and services, Pulse Connect Secure proved to be relatively straight forward to be set up and managed. Both the wizards and the extensive documentation are helpful with this. In the test, it was easy to integrate our appliance into the vendor’s central cloud-based management tool Pulse One. Administrators looking for an efficient solution for securing access to their company resources should definitely take a look at Pulse Policy Secure.
The original rapid-deploy anti-vehicle and electric barrier fencing system – first used in tandem on the London 2012 Olympics – is now even quicker and easier to roll out with a pre-configured ‘ends’ to pulse-protected ‘zones.’ SecureGuard HVM temporary barrier fencing system Three renowned names in perimeter security have collaborated to incorporate the new rapid-deploy electric fence technology into the established SecureGuard HVM temporary barrier fencing system. Electric and electronic fencing expert, Harper Chalice Group Limited has developed RapidPulse, a pre-configured ‘start’ and ‘stop’ to each pulse-monitored ‘zone’, to allow rapid deployment of its PulseSecure system. PulseSecure system Steel fencing manufacturer, Zaun Limited has created special pairs of posts for the anchor point fencing panels Steel fencing manufacturer, Zaun Limited has created special pairs of posts for the anchor point fencing panels, with crossed bracing bars to bear the load of the electric cabling. The system can be supplied with any of Zaun’s existing fencing panels – including HiSec, HiSec Super 6 or ArmaWeave – all deployed super-fast with no foundations on top of SecureGuard HVM barriers from Highway Care Security. “This is set to revolutionise the market for temporary high security utilities, roadworks and construction compounds without the need for any civil or ground works,” says Zaun sales and marketing director Chris Plimley. Perimeter intrusion detection Trial installations have seen Harper Chalice, Highway Care Security and Zaun deploy 30m of HVM barriers and fencing with perimeter intrusion detection in just one hour. The partners first proved the concept at the London 2012 Games, at which they secured various sections of the Olympic Park perimeter with temporary HVM barriers and fencing combined with PulseSecure. RapidPulse perimeter security system The overall system provides a psychological barrier as well as a physical deterrent" The RapidPulse innovation now makes it possible to install perimeters temporarily, break them down, and redeploy them in a fraction of the time, making secure but mobile compounds a reality as works progress during a project. Harper Chalice MD Chris Hackett says: “The overall system provides a psychological barrier as well as a physical deterrent. And it offers a fantastic solution for ongoing security when a breach in a permanent perimeter is required temporarily for repair, maintenance or upgrade, without reducing the overall protection of the site.” The system is fully compliant with BS 1722 Part 14 and Part 17 and can be supplied either galvanised or polyester powder-coated with all components manufactured in the UK. CCTV columns, turnstiles and access portals Each post and panel can also be supplied up to 3.5 metres total in height, while pedestrian and vehicle gates can also be incorporated, as can CCTV columns, turnstiles and access portals. The system is ideal for using around high security temporary utilities and construction sites, to protect road works or at major events that might be at risk of protests, riots or terrorist activity. SecureGuard with RapidPulse for effective intrusion detection SecureGuard with RapidPulse provides protection against vehicle attack, pedestrian intrusion and rock fall and debris dispersion SecureGuard with RapidPulse provides protection against vehicle attack, pedestrian intrusion and rock fall and debris dispersion. SecureGuard was developed specifically for the G8 Summit in Northern Ireland and has since been deployed at the Glasgow Commonwealth Games, the NATO Conference in South Wales and the Nuclear Security Summit in The Hague. It forms part of the National Barrier Asset and has been used to secure the main political parties’ party conferences over recent years. Mobile high security solutions SecureGuard is a mobile high security range of products from Highway Care all tested to PAS68:2010 to withstand multiple attacks by a 7.5 tonne truck at speeds of 20, 30 and 50mph without them breaching a security perimeter. Mat White, Highway Care Security sales director, says: “The increased threat of terrorism and high value crime is driving the need to provide high security sites and critical infrastructure with safe and effective physical protection. This provides the ultimate in rapid rollout solutions.”
Gira, one of the global full-range suppliers of intelligent system solutions for building management, make light and blind control easy with the launch of its brand new and highly informative instructional video for the Gira System 3000. The Gira System 3000 is an advanced blind and light control system that one can control in their home with the touch of a button, conveniently controlled through the Gira App or Display timer. Smart technology in home has never been easier, more convenient or eco conscious: helping one to save on utility bills by lowering the blinds and minimising potential heat loss when needed. The System 3000 blind control customised time program is also available with an astro function for added convenienceWith the option to control either manually or automatically, one can store their own personal blind control settings at the push of a button: spanning movement times for all seven days or customised separately for weekdays and the weekend via the menu. Dynamically adapt to weather changes The System 3000 blind control customised time program is also available with an astro function for added convenience. The integrated astro function makes it possible to dynamically adapt to changes in sun position and light phase automatically: sunrise and sunset and the changeover between summer and winter season. Did you know that statistically, illuminated and/or lived-in properties are less likely to be burgled? Gira gives special importance to high levels of functionality with a view to increase build security with 21st century intelligence. For example, the Gira System 3000 makes it possible for one's home to mimic habitation by opening/closing the blinds: ideal when planning a long holiday, business trip or the property is a second home. Controlling the blinds via Gira App The Gira System 3000 operating top unit memory can store both an individual intermediate position and a time for raising and loweringIn addition, the Gira System 3000 operating top unit memory can store both an individual intermediate position and a time for raising and lowering. If Memory Mode is activated, both functions are repeated in a 24-hour cycle. In Night Mode, the status and function LED are not permanently illuminated: meaning a more comfortable, unbroken sleep! For even more user convenience, Gira recommends to download the Gira App so one can control the blinds and lighting from the comfort of their sofa or remotely, via a smart phone or tablet. The operating unit is bluetooth enabled, and the App has a clear display and a large screen that is perfect for keeping control of all the settings: as it easy to copy programmes from other units that have already been created. Making lives easier and convenient Mark Booth, Managing Director at Gira UK Ltd, comments “We have a notable aptitude for perfecting both form and function, but above all else, making lives a little easier, more convenient and safer for our customers. As a result, our highly intuitive and intelligent systems have been designed to create a working brain in your home so that it starts to enrich your lifestyle, personal preferences and daily routine.” All this can be achieved at the push of a button and features include: Illuminated digital display Five operating top units Touch sensitive display Blind timer for ease of use Separate program settings available Simple button controls Bluetooth enabled Personalisation Astro setting Memory mode
CeComunica, a Professional Mobile Radio (PMR) operator in Panama, is slated to launch in December a Digital Mobile Radio (DMR) Tier III trunking network supplied by Hytera, global provider of innovative PMR solutions. This new nationwide network will provide advanced and reliable mission and business critical communications services to a large number of users from sectors such as ports, airports, ground transportations, hospitality, retailing and security companies in Panama. DMR Tier III trunking network The DMR Tier III trunking network has been set up with 15 sites of Hytera DS-6210 base station and multiple models of industry-leading digital two-way radios from Hytera DMR portfolio, including PD6, PD7, PD9, X1, MD6, MD7 and its flagship Multi-mode Advanced Radio PDC760 which can provide high quality narrowband voice under DMR protocol and fast data transmission in LTE broadband. To realise the full capability and maximise the productivity, this network can interoperate with other communications systems of different technologies by adopting Hytera SmartOne solution. “We are excited to supply our DMR trunking system and facilitate CeComunica’s further penetration into the PMR operator business, and we have been looking forward to introducing more cutting-edge products and technologies for Panamanian users to increase productivity and security of their daily operation, as well as unexpected scenarios,” said Fernando Camelo, Regional Sales Director of Hytera.
Market dynamics are changing the U.S. residential security market, creating new business models that better appeal to the approximately 70% of households without a security system. Smart home adjacencies have helped revitalise the traditional security industry, and alternative approaches to systems and monitoring for the security industry are emerging, including a new batch of DIY systems. Growth in the residential security market and its position as the channel for smart home solutions have attracted numerous new entrants. Telecoms, cable operators, and CE (consumer electronics) manufacturers are joining traditional security players as they compete to fulfill consumer demand for safety and security. Connected products also provide a layer of competition as consumers must decide whether having category devices such as doorbell video cameras, networked cameras, and other products suffice for their security. Increasingly competitive landscape Smart home services can provide additional revenue streams for the security industry For instance, IP cameras are a highly popular smart home device rooted in security, and Parks Associates estimates 7.7 million standalone and all-in-one networked/IP cameras will be sold in the U.S. in 2018, with $889M in revenues. Product owners may feel their security needs are fulfilled with this single purchase, as such dealers and service providers are under increasing pressure to communicate their value proposition to consumers. Categorically, each type of player is facing competition uniquely—national, regional, and local dealers all have a different strategy for overcoming the increasingly competitive landscape. Smart home services can provide additional revenue streams for the security industry. In Parks Associates’ 2017 survey of U.S. security dealers, 58% report that smart home service capabilities enable extra monthly revenue. Almost half of dealers also note they have to offer smart home devices and services in order to keep up with their competition. While white-label devices are acceptable in some instances, dealers need to integrate with hero products whenever possible when those exist for a category. For dealers who have added smart home devices and services are all potential benefits and good for business Improved customer engagement That 2017 survey also revealed 36% of security dealers that offer interactive services report security system sales with a networked camera and 16% report sales with a smart thermostat. For dealers who have added smart home devices and services, enhanced system utility, increased daily value, and improved customer engagement with the system are all potential benefits and good for business. Security has served as the most productive channel for smart home solutions, mainly because the products create natural extensions of a security system’s functions and benefits, but as smart home devices, subsystems, and controllers expand their functionality, availability, and DIY capabilities, many standalone devices constitute competition to classical security. Particularly viable substitute devices include IP cameras, smart door locks, smart garage doors, or a combination of these devices. Products that are self-installed offer both convenience and cost savings, and these drivers are significant among DIY consumers—among the 6% of broadband households that installed a security system themselves, 39% did it to save money. Enhance traditional security Self-installable smart home devices may resonate with a segment of the market who want security While many security dealers believe substitute offerings are a threat, some dealers do not find such devices an existential threat but instead view them as another path to consumer awareness. They argue that the difference between smart product substitutes and traditional security is that of a solution that provides knowledge versus a system that gives one the ability to act on that knowledge. A common theme among professional monitoring providers is that a homeowner who is aware of events happening in the home does not necessarily have a secure and protected household. For example, a Nest camera, a DIY product, notifies a consumer via smartphone about events in the home when it detects motion, but only when the notification is opened and identified will a consumer be able to act on the related event. Self-installable smart home devices may resonate with a segment of the market who want security but are unwilling to adopt professional monitoring; however, providers can leverage these devices to enhance traditional security features and communicate the value of professional monitoring. Smart home devices and features, while posing a threat to some security companies, are a potential way forward to increased market growth Increased market growth A key counterstrategy for security dealers and companies is to leverage their current, powerful role as the prime channel for smart home devices. Many security dealers now include smart home devices with their security systems to complement their offerings and increase system engagement. For example, as of Q4 2017, nearly 70% of U.S. broadband households that were very likely to purchase a security system in the next 12 months reported that they want a camera to be included as part of their security system purchase. In response, many security system providers now offer IP cameras as optional enhancements for their systems. Smart home devices and features, while posing a threat to some security companies, are a potential way forward to increased market growth. Security dealers have an opportunity to become more than a security provider but a smart home solutions provider rooted in safety. Provide status updates Comcast has entered both the professionally monitored security market and the market for smart home services The alternative is to position as a provider of basic security with low price as the key differentiator. Comcast has entered both the professionally monitored security market and the market for smart home services independent of security. It has discovered that monetising smart home value propositions through recurring revenue becomes increasingly challenging as the value extends further away from life safety. Since the security industry remains the main channel for smart home services, security dealers are in a unique position to leverage that strength. Value propositions must shift from the traditional arming and disarming of a system to peace-of-mind experiences that builds off the benefits of smart devices in the home to provide status updates (e.g., if the kids arrived home safely) and monitoring at will (e.g., checking home status at any time to see a pet or monitor a package delivery). These types of clear value propositions and compelling use cases, which resonate with consumer and motivate them to expand beyond standalone products, will help expand the home security market.
Whether you are a veteran in the access control world or have never installed a card reader before, there are always ways to increase profits in the ever-evolving world of access control. The hope is that by considering a few key focal points, you can find ways to increase market share. Whether we are releasing an electronic lock through a simple intercom button or using biometric and multi-authentication based on a database; the tactics for bringing on more revenue is the same. Learning to focus on a few key items can help open up opportunities. Business access controls Understanding vertical markets is a strong strategy for success in increasing your profits with access controlIf you are new to access control, it’s important to determine the right product offerings for your business model and experience level of your team. Mistakes in estimating or installing can be costly and complex. Take advantage of manufacturer training both online and in the classroom for both your sales team and installation department. It’s important to understand the fire and building codes in your area to make sure you design the proper solution for your customers. Furthermore, understanding the products, components and proper wiring can save you money in labour and materials. Today we will look at four focus points: vertical markets, cloud-based access control, technology upgrades, and preventative maintenance and service agreements. These four focal points are simple to implement and can be easily added to your current operation. Vertical markets Understanding vertical markets is a strong strategy for success in increasing your profits with access control. The concept is that understanding a certain vertical and their security needs can increase your sales team’s marketability. If you spend your time focusing on the healthcare industry, for instance, you will see that HIPA requirements open doors for selling access control. Getting to know the regulatory concerns of different verticals is a great strategy for more effective sales Having logs of who entered your HR files room or patient records storage is a crucial part of addressing privacy concerns. Getting to know the regulatory concerns of different verticals is a great strategy for more effective sales. Another example could be apartment communities or other multifamily dwellings. In this competitive marketplace, these complexes are looking for ways to stand out in their market. Knowing this and being able to offer amenities like secured locks with Bluetooth credentials that tenants can open with their smartphones is a selling point for you and for your customer. Building on each customer you contact within a vertical is like free sales and marketing training. The more you learn from each potential client, the more you increase your conversation starters for the next potential client. Cloud-based access control With the growing cloud-based access control market, integrators can find more opportunities in small businesses and vertical markets that typically wouldn’t be on the radar of your sales team. A typical card access system often makes the move from the traditional lock and key systems to electronic card access cost prohibitive. This is due to the large upfront costs for a server, software and annual licensing. With cloud access, integrators can offer less expensive upfront costs with low monthly subscription fees that cover all software updates, database backups, security patches and more. The real benefit for the integrator is the reoccurring revenue. By helping our clients save money on server, software and IT infrastructure costs, we are securing reoccurring revenue for our companies that increase our profitability. Building reoccurring revenue not only provides cash flow but also keeps your name on the top of the minds of your customer and that leads to additional sales. By helping clients save money on server, software and IT infrastructure costs, we are securing reoccurring revenue for companies that increase profitability Technology upgrades Another often overlooked opportunity is technology upgrades. Training your sales staff and even service technicians to watch out for clients with older technology can reap major benefits. When you bring new technology to your clients, you show another value that you bring to the table. Even if your client isn’t ready to make an upgrade, you can easily plant a seed that will get their minds and budgets rolling. An easy example is a customer with an older intercom door access system An easy example is a customer with an older intercom door access system. This may have met their needs 10 years ago when it was installed, but the office has grown and perhaps an integrated card access intercom system is a great technology upgrade. Bringing this to the customer will once again show that you are the “subject matter expert” and your customer will be more apt to refer you to their friends and colleagues. Another easy way to find technology upgrades is to dig through your ageing client list and build a list of potential targets that you have not visited lately. If you keep records of what was installed previously, it will make it easier to plan ahead and bring solutions to your next visit, saving your sales staff time and again building confidence with your clients. Preventive maintenance and service agreements One thing that sales teams often miss is the opportunity to add service agreements and preventative maintenance agreements. Even if a customer already has an access control system, they may not have a service provider and may be interested in securing a service agreement. Typically, a service agreement can be written to cover all parts and labour or just labour for an annual feeShowing the value of a service agreement is paramount, adding annual or semi-annual preventative maintenance to your service agreement is one way to add value. Inspecting locking mechanisms, request to exit motions and buttons, door status switches, headend equipment, batteries and power supplies, can save your customer from a costly after-hours service call or the inconvenience of a non-functioning access control system during business hours. Additionally, checking computer hardware and software logs for errors can save a customer from a catastrophic failure. Typically, a service agreement can be written to cover all parts and labour or just labour for an annual fee. It is helpful to come up with a percentage of the install value that makes sense so that your sales team can easily quote a service agreement for your customer. Offering several levels of service also opens the table for negotiations. You can offer an “all parts and labour 24/7” or a “parts and labour M-F 8AM-4PM”, as an example. Offering guaranteed response times can also be a marketing strategy. Critical area access management Checking computer hardware and software logs for errors can save a customer from a catastrophic failureA 24-7 facility that has 200 employees moving in and out of critical areas may be a great potential customer for a high-level service agreement with semi-annual preventative maintenance and a guaranteed 4-hour response time. Where a small office that is only open during standard business hours may be better suited for a labour only M-F with annual preventative maintenance inspection. The point is that a creative, intentional, and focused approach to access control can yield the fruit that brings long-term success to your team. Building a plan and learning from each prospect, sale, and installation will develop a process that brings results. Attending a trade specific expo like ESX will give you the opportunity to meet with manufacturers and other integrators that can help you implement a product offering and strategy for success.
Facial recognition has a long history dating back to the 1800s. To track down criminals, such as infamous bandits Jesse Woodson James and Billy the Kid, law enforcement would place “Wanted Alive or Dead” posters advertising bounties and soliciting public cooperation to help locate and even apprehend the alleged criminals. In addition to the bounty, these posters would include a photo and brief description of the crime, which would then be circulated to law enforcement agencies around the country and displayed in every US Post Office to speed up apprehension. Facial recognition Advancements in artificial intelligence and biometric technology have led to the widespread use of computerised facial recognition Today, technology such as social media, television and other more specialised communication networks play a more influential role in the recognition process. Advancements in artificial intelligence and biometric technology, including the development of Machine Learning capabilities, have led to increased accuracy, accessibility and the widespread use of computerised facial recognition. The significance of this means that facial recognition can occur on an even larger scale and in more challenging environments. This article will explore key milestones and technological advances that have resulted in the modern incarnation of facial recognition, before discussing the capabilities of cutting-edge “one-to-many” technology which is increasingly being used by counter-terror defence, police and security forces around the world. Technology inception and developments The technology was able to match 40 faces an hour, which was considered very impressive at the time The 1960s marked the start of computerised facial recognition, when Woodrow Wilson (Woody) Bledsoe developed a way to classify faces using gridlines. Bledsoe’s facial recognition still required a large amount of human involvement because a person had to extract the co-ordinates of the face’s features from a photograph and enter this information into a computer. The technology was able to match 40 faces an hour (each face took approximately 90 seconds to be matched) which was considered very impressive at the time. By the end of the 1960s, facial recognition had seen further development at the Stanford Research Institute where the technology proved to outperform humans in terms of accuracy of recognition (humans are notoriously bad at recognising people they don’t know). By the end of the century, the leading player in the field was a solution that came out of the University of Bochum in Germany – and the accuracy of this technology was such that it was even sold on to bank and airport customers. From this stage on, the facial recognition market began to blossom, with error rates of automatic facial recognition systems decreasing by a factor of 272 from 1993 to 2010 according to US Government-sponsored evaluations. The aim for facial technology is to achieve successful and accurate recognition on commonly available hardware like live CCTV feeds and standard computing hardware Modern usage of facial recognition Fast-forward to the modern day and facial recognition has become a familiar technology when using applications such as the iPhone X’s Face ID capability or MasterCard Identity Check, passport e-gates at airports and other security and access control points. These solutions implement a consensual form of identity verification, as the user has a vested interest in being identified. This is a “one-to-one” facial recognition event, one person in front of the camera being compared to one identity either on a passport or the app. In these scenarios, the hardware is specifically developed for the application at hand, therefore technically much easier to accomplish. Facial recognition can now be used in a variety of governmental and commercial environments The safety and security world brings a much more complex problem to solve – how to pick out a face in a moving and changing environment and compare it to several faces of interest. “One-to-many” facial recognition is a much harder problem to solve. It’s even more challenging when the aim is to achieve successful and accurate recognition on commonly available hardware like live CCTV feeds and standard computing hardware. And unlike in the 1960’s where identifying a face every 90 seconds was acceptable; the safety and security market requires near instant feedback on who a person matched against a watchlist is. Security and safety applications The idea behind all facial recognition technologies is broadly the same: you start with an image of a person’s face (ideally a high quality one, although machine learning means that to a point we can now even use video without reducing accuracy). A fully front facing image is best, think a passport photo, but machine learning and new software has made this more flexible. An algorithm converts this image into a numeric template, which cannot be converted back to an image and so represents a secure one way system. Every numeric template is different, even if it started out as an image of the same person, although templates from the same person are more similar than templates from different people. The accuracy of facial recognition continues to increase alongside deployments in more challenging and complex environments What happens next sounds simple although the technology is extremely complex: templates of people’s faces are taken in real time and compared to those in the database. The technology identifies individuals by matching the numeric template of their face with all the templates saved in a database in a matter of seconds or milliseconds. To put this into perspective, imagine you are at the turnstiles of a busy train station looking for a person on the run. Today’s facial recognition technology would be able to identify that person should they pass in view of a CCTV camera, as well as notify the police of any additional persons of interest, whether they are a known terrorist or missing vulnerable person on an entirely separate watch list. Because of technical progression, facial recognition can now be used in a variety of governmental and commercial environments, from identifying barred hooligans attempting entry at a football stadium or helping self-excluded gamblers at casino to overcome addiction. Real-time assessments The latest evolution of facial recognition pits the technology against an even more challenging application – directly matching individuals from body worn cameras for real time recognition for police officers on the beat. This capability equips first responders with the ability to detect a person from a photo and verify their identity with assurance. The broader implication for this means that every interaction, such as stop and search or arrest, can be supported by real-time facial recognition which will see cases of mistaken identity driven down on the streets. First responders can now for the first time be deployed and furnished with the ability to identify wider groups of people of interest with a degree of accuracy that previously relied only on the fallible human memory. As the accuracy of the technology continues to increase alongside deployments in more challenging and complex environments, its ability to support government initiatives and law enforcement means the debate about the lawful and appropriate use of facial recognition must be addressed. Facial recognition should not be everywhere looking for everyone, but when used properly it has the potential to improve public safety and we should make the most of its potential.
More good news for exhibitors on the second day of the Global Security Exchange (GSX) in Las Vegas. Brisk attendance continued early in the day, and then slowed somewhat in the afternoon, but most comments from exhibitors were positive. Exhibitors such as Lenel were “thrilled” with the show, and noticed the steady, good traffic and lots of sales leads. Lenel’s position at the front of the hall probably helped. New developments in mobile credentialing are a big trend at GSX, and Lenel’s BlueDiamond mobile credentials are traveling on a new path, so to speak. The access control company is introducing the idea of “Pathways” as a way of automatically signaling intent to a Bluetooth-enabled smart phone to open a door. A recognisable “pathway” is programmed into the phone, based on signals from nearby readers and locks and also geolocation signals. The system recognises when a user travels along the pathway and automatically signals the correct door(s) to be opened along the way without the user having to touch his smart phone.A recognisable “pathway” is programmed into the phone, based on signals from nearby readers, locks and also geolocation signals Providing a lightweight alternative “When you trigger a pathway, it’s signalling intent to open the door,” says Greg Berry, Vice President Mobile Credentialing, Global Security Products, for United Technologies, parent company of Lenel. “Pathways are customised to a user’s needs and are the common places you are going all the time.” A user who walks the same path daily to the door of an office will find that door opens automatically. Previously using mobile credentials has been “slightly more work than using a badge,” says David Weinbach, Manager of Identity and Product Innovation for Lenel. “Now with Pathways, it’s less work than using a badge.” Specifically, a user no longer has to take out his phone and push a button to signal intent. “Rather than trying to emulate the badge, you create an experience that is better than the badge,” adds Berry. “We want to change the paradigm and turn the market on its ear.”New browser-based clients are being released with each new version of OnGuard software Other news from Lenel includes the release of more mobile and browser-based clients for OnGuard to be used for greater convenience alongside the Window-based clients. Providing a “lightweight” alternative enables some of the functionality of the Windows client in a format that is easy to access on the go. New browser-based clients are being released with each new version of OnGuard software. Cloud-hosted systems using Microsoft Azure are also among the plans for OnGuard, which ultimately will offer on-premises and cloud options. There’s not much comment from the Lenel folks about their parent company United Technologies’ plan to acquire S2 Security, which was announced days before the show. They would only say that the acquisition is waiting for regulatory approval, and that the expectation is that the two companies’ products will be complementary, given S2’s focus on the SMB (small and medium-sized business) market and Lenel’s strength at the enterprise level. The acquisition strategy is to grow both businesses. More details to come about the new combined company. Modern network infrastructure NVT Phybridge, a PoE connections company located near the back of the hall, also reported steady booth traffic on Day 2. “There are lots of customers and partners here,” said Steven Fair, Executive Vice President. “We are pleased with the quality of people, but not overwhelmed with the quantity.” FacePRO AI facial recognition is used for real-time searches of terror suspects or criminals throughout a location NVT Phybridge, which provides IP networking products for the telephony industry as well as security, is focused on networking concepts at GSX, in particular the changing requirements for network infrastructure in the age of IoT. We are pleased with the quality of people, but not overwhelmed with the quantity.” Fair uses the term “Modern LAN” to describe the new, changing requirements and in consideration of the specific networking needs of each edge device, whether cameras, sensors, or door access control devices. “Start with the edge device — what does it need from the network? What are its needs and have there been any innovations to enable you to connect to the network more economically?” asks Fair. There is also a green aspect to designing network infrastructure. Can existing equipment, such as coaxial or single twisted-pair cabling, be used, and thus save on disposal costs of the used cabling as well as lowering installation costs? Among NVT Phybridge’s offerings that can serve the changing networking needs in the IoT era is Smart Path PoE, which offers smart power, smart network access and secure connections. The CLEER family of products provides ethernet over existing coaxial cabling to enable easy transition from analogue to IP cameras. The PoLRE products supply ethernet and power to travel over a single unshielded twisted pair cable with reach over 400 metres. The products have been used recently to transition a series of cruise ships from analogue to IP video without having to replace cabling and spending only two days in dry dock for the installs. A new focus away from AI Panasonic is looking to apply AI-based capabilities to vehicle recognition in the near future, with the ability to identify vehicle characteristics Deep learning and artificial intelligence (AI) seem to be taking a lower profile at this show, perhaps signaling the end of the hype. Companies that mention AI point to specific products that use the technology and are currently available. For example, Panasonic is featuring its FacePRO AI-based facial recognition system. The system uses face images captured from video — grabbing up to 30 to 35 faces a second as video is recorded. The system saves the best of those face images, eliminating extensive duplication, as thumbnails, which are linked to the video footage where the faces appear. To find video in which a face appears, the operator merely drags-and-drops the thumbnail image and commands the system to “go fetch” video that contains that face. The system then produces a timeline showing where the face appears in the feed from each video camera on the premises, so an operator can track the movements of a suspect throughout a facility. The tool helps to simplify and shorten the workflow of locating a suspect in real-time and is affordable for a wider range of uses beyond the traditional airports or high-end applications. The FacePRO software is offered on any Panasonic camera, and works with a separate FacePRO server that is integrated with the video recorder. The system can be added easily to existing systems and is useful for such applications as real-time searches for terror suspects or other criminals throughout a location. Panasonic is also looking to apply AI-based capabilities to vehicle recognition, too, in the near future, with the ability to identify vehicle characteristics such as color, type of vehicle and direction of travel. On the VMS side, Panasonic is transitioning its Video Insight software to a modular approach, tailoring solutions for a growing range of vertical markets, such as transportation and retail, all using “plug-ins” that enhance operation of Video Insight software. No additional license fees are involved That’s just a sampling of what I saw on Day 2 of the show. I have more to share in a final show report, including what I see tomorrow on the final (shortened) day.
The concept of door locks means something totally different in our current age of smarter buildings that house data-driven businesses. Hardware locks and keys are still around, but they co-exist with a brave new world of electronic locks, wireless locks, networked systems, and smarter access control. Locks can also increasingly be a part of a smart building’s flow of data. The opportunities of these new technologies and approaches are significant, but there are also pitfalls. I heard an interesting discussion about these topics presented by several business leaders from lock company Allegion at a press event at ISC West earlier this year. Here are some highlights from that discussion. Q: What new developments in emerging technologies do you see in the coming years? There’s opportunity for implementation of the technology to solve real problems" Mark Jenner, Market Development Director: Connected locks, other types of sensors and all the data being aggregated inside buildings provide opportunity for data analytics. The buzzwords around technologies can cause confusion for integrators and end users, such as artificial intelligence, deep learning and machine learning, and what’s the difference among all of them? My opinion is that they are important, but the big theme across them all is opportunities for new business models for the integrator, and opportunities to solve problems for end users. And it’s not just technology for technology’s sake. There’s opportunity for implementation of the technology to solve real problems. Devin Love, Market Development Manager: You can’t just have a solution looking for a problem. You see a lot of people who understand technology in their own lives, and they want to translate that into their businesses. That’s where I think it’s exciting. You now have all this technology, and people understand it to the extent that it improves their daily life. They go through their day with less friction, with more ease, and technology fades to the background. There are two levels of value. One is the longer, bigger, broader scope of what the technology can bring to a company using it, but on an immediate basis, there is the value of tracking how a business is running. These sensors are collecting data. For example, if you are a multi-tenant property, you can look at how amenities are being used. What do my residents really care about? That informs future decisions. Robert Gaulden, Project Based Business Leader, Electronic Access Control: I have been studying the multi-family space for the last couple of months. The customer experience is really driving a lot of that technology adoption. What you’re seeing today, whether it’s a mobile device or some other device, is the ability to move throughout the property, and gain access to the perimeter and to your tenant space. All of this adoption is around that experience. There’s multiple players coming into the space, from Amazon wanting to deliver packages into the tenant space to residents who don’t want the inconvenience of using a key. Technology adoption to solve problems, and also to drive experiences, is where a lot of the balance will play out. It’s important that we look at how integrators can use the technology to do business more effectively and efficiently" Brad Aikin, Channel Led Business Leader, Integrator Channel: From an integrator perspective, there are two things. One is how they can approach end users, and the scope of what integrators consult with them about is wider. I think we as an industry are getting beyond those high-traffic, high-security applications. Those are still critical, but the value we bring around security and convenience is opening a new incremental opportunity. Also, the experience of the integrator and how they conduct their business is important, from generating quotes to communications to proactive servicing. It’s important that we look at how integrators can use the technology to do business more effectively and efficiently. Gaulden: We as an industry, and we as manufacturers, need to understand what data we are generating so we can run our businesses more efficiently from every aspect, whether you’re the property manager, the building owner, the integrator, or whether you’re the manufacturer. These devices and technology are being pushed out everywhere and will generate the data. How we learn from that – especially when you apply security to it to be more proactive – provides huge opportunities. Jenner: What data is important and what’s not? Folks get overwhelmed with too much data at some point. What’s important for an application at the end user level? What do they really need to solve the problem? Love: Privacy gets involved as well, especially with consumer products. The attitude is “stay out of my private business.” But if you’re an employee now, all bets are off. Now you have a professional relationship with the people you work with, so there is a different lens that you look through when tracking data. You use the data to everyone’s benefit, and it’s a different paradigm than in your private life. Aikin: Also, where does that data create a better experience for the person? That’s what drives the money and value: What level of information sharing makes my experience better? The technology is also getting smarter in terms of “how do we sort through the valuable information?” Hardware locks and keys are still around, but they co-exist with a brave new world of electronic locks, wireless locks, networked systems, and smarter access control Q: As facilities connect more devices and sensors, the cybersecurity threats increase. We have already seen Internet of Things (IoT) devices being used as the attack point of cyber breaches. What are the vulnerabilities that make those attacks possible, and how can integrators protect their customers? Love: Certainly, this is an extremely – maybe the most important – piece of our industry. What is the point of everything we do if we can’t instill that trust? But what we need to solve here also comes with opportunity. There’s certainly hope. You’re not seeing a frontal attack on the technology. It’s usually some loophole, or some older device that hasn’t been updated, or wasn’t installed correctly, or it was social-engineered. The opportunity is, not that it can’t be solved, but that it absolutely needs to be solved – and it can. Gaulden: Integrators need the ability to understand that cyber layer and what it means. Nowadays, everything runs on the network, and you won’t even get past the IT department to get on the network if you don’t have the right staff, the right credentials. From an integrator standpoint, you need the ability to add to your staff, to understand everything from the product level to the firmware and the software level, all the way to the deployment of the holistic system. You can’t just say, “That’s not part of our responsibility.” All these devices are now riding on the network. They can be protected from a cyber perspective, or you will have vulnerabilities. As manufacturers and business consultants to integrators, we should facilitate the conversation, that it is one ecosystem" Aikin: Everything is a communication device. With the concern and need comes an opportunity for the integrator. But it’s also in making sure integrators are having that conversation with end users and setting the expectations up front. What I’m providing you on day one is the best in the industry at this time, but tomorrow it may not be. My accountability and service are to maintain that environment and keep it running. I may not physically change the device you see, but the service I’m bringing to you is that security, and that comprehensive dialogue. The IT stakeholders already have that expectation, but there is a chasm in some organisations between the physical security and the IT stakeholders, and the integrator is facilitating that conversation. As manufacturers and business consultants to integrators, we should facilitate that conversation. It is one ecosystem. Q: Aside from cybersecurity, what are some of the other threats that integrators should be aware of as they work with customers to implement the new trends and technologies we have mentioned? Aikin: It is diversifying, all the options and the capabilities. With that comes confusion and misapplication. If I look at the trends around just wireless; I go back 10 years ago, there were even questions of whether wireless was a secure technology. That has progressed and continues to be part of the cyber conversation, just like any hardwired product. It’s something you have to maintain and be aware of. Wireless has really diversified. There is still a need for education within the channel, and most importantly, to the end user. There are still end users that assume a WiFi widget is the same thing as a Bluetooth widget is the same thing as a low-frequency widget. But they are all different. There are reasons there are different technologies. Nothing stifles the adoption of technology more than misapplication. We have different architectures within our lock base and among our software partners to allow a mix of technology" Gaulden: Integrators understand the differences in how various doors are used and how those applications will work. In the K-12 school environment, you want the ability for an instant lockdown, and a WiFi deployment probably isn’t your best option. You need a real-time deployment. However, my office door at headquarters doesn’t necessarily need real-time communication. I can pull audits off it once or twice a day. You have to mix and match technologies. For a high security door, you would proactively monitor it. But for a door where convenience is the goal, we can put electronic security on it but we don’t need to know what’s going on at any moment in time. We have different architectures within our lock base and among our software partners to allow that mix of technology. Jenner: End users want the latest technology, but it may not be for their applications. Those things drive more costs into it, when end users need to be putting money into cybersecurity and some other things. That’s part of the misapplication. Another risk is interoperability. That’s a big piece of the technology and as things change. How do we do a better job of supporting open architecture? It may not be a standards-based protocol, although we use a lot of standards, but we just need to make sure whatever protocols we use are open and easily accessible so we can continue to work with them in the future. We know that when our devices go in, they will support other parts of the ecosystem from an interoperability perspective. That’s important for integrators to know: How is this going to be applied and integrate with something in three, four or five years from now? It’s an expensive investment, and I want to make sure it will work in the future. Main photo: Business leaders from Allegion discussed new trends in electronic and wireless locks at a recent press event: (L-R) Robert Gaulden, Devin Love, Brad Aikin and Mark Jenner.
When a leading English university sought electronic locks for its newest student accommodation block, it turned to Aperio to extend its installed Gallagher Command Centre access control system. The University of East Anglia (UEA) has relied on Gallagher access control for a decade. To extend their Gallagher Command Centre system to Crome Court—a student residence with 231 en suite rooms separated into flats for between 8 and 13 postgraduates—they needed the right wireless solution. Wireless locking technology Aperio wireless locks are battery powered, and so use much less energyUEA’s needs included more than just security, stylish component design and affordability. Crome Court was specifically designed to minimise environmental impact, including CO2 emissions. Any access control system was expected to contribute to that goal. The university chose Aperio wireless locking technology from ASSA ABLOY. Aperio wireless locks are battery powered, and so use much less energy than wired magnetic security locks. They only “wake up” when a credential is presented to the reader. On campus training “We decided to offer Aperio to upgrade and extend our system at UEA because of its outstanding reputation within the security industry,” explains Jason Boyce, sales manager at Gallagher. “Having worked with us for 6 years, Gallagher knew we would deliver,” adds David Hodgkiss, national sales manager at ASSA ABLOY UK. Installation was quick and easy, aided by training delivered on campus by specialist ASSA ABLOY technicians. “We found ASSA ABLOY’s service faultless,” says Wayne Dyble, installation and support manager at Check Your Security, UEA’s service provider. Environmentally advanced profile There’s no need for expensive and time-consuming work changing the locks Crome Court’s secure doors are fitted with Aperio E100 online escutcheons. Students open them with programmable RFID smart cards, instead of cumbersome mechanical keys. If a keycard is lost, it is straightforward for UEA facilities staff to cancel it and issue a replacement—using a simple web-based interface or mobile phone. There’s no need for expensive and time-consuming work changing the locks. UEA also aimed to build Crome Court with an environmentally advanced profile. Here, too, Aperio delivered. Wireless locks are battery-operated and emit much less CO2 than wired magnetic locks. In fact, in carbon terms, Aperio locks emit 0.16 percent of the total emissions produced by standard wired locks. Flexibility is another Aperio asset: additional doors can be brought into the same integrated Gallagher system whenever needed. “We hope to roll out Aperio across all new and existing residential estate,” says Christine Beveridge, head of campus services at UEA.
Just a ten-minute walk from the city centre, the University of Leeds is upgrading door security in much of its student accommodation to keep pace with changing technology and customer demand. One of the biggest and busiest centres of higher education in the UK, the university has more than 34,000 students and over 8,000 staff, making it the third largest employer in Leeds. With such a large student population to house, its residence portfolio both on and off campus is impressive. It ranges from the Victorian architecture of Lyddon Hall to modern purpose-built apartments such as Storm Jameson Court, through to shared houses and a huge choice of flats and apartments run in partnership with the likes of UNITE and iQ Student Accommodation. Wireless electronic access control system The Residential Services team have chosen to upgrade their SALTO ProAccess management system to the latest versionStarting university is a really exciting time, and for many students it will be their first time living away from home so both they and their parents will want to know they will be living somewhere safe and secure. Starting in 2010, Residential Services swapped out its previous mechanical keyed system and since then has been using a wire free electronic access control system from SALTO across much of its student accommodation. This has proven reliable providing the versatility and efficiency to manage in excess of 1737 doors across the campus. But technology does not stand still, and many advances have taken place since the original installation. So, the Residential Services team have now chosen to upgrade their SALTO ProAccess management system to the latest version to take advantage of its increased functionality and features including the ability to use smart phones as access credentials. Benefits of SALTO solution Paul Carr, National Accounts Manager at SALTO Systems, says: “Our ProAccess SPACE Software is a powerful web-based access control management tool that enables users like the University of Leeds to programme access-time zones, manage different calendars and view audit trails from each door. ProAccess SPACE Software's user-friendly web-based interface is simple to set up and configure" “Its user-friendly web-based interface is simple to set up and configure, giving them the flexibility and control they need. It balances security with accessibility, and advanced technology with affordability. By embedding such a high-performance electronic access control solution into their infrastructure, the University can protect people – both students and staff – as well as their assets and buildings. Problems with key access control system “Student accommodation for instance, whatever shape it comes in, is usually busy with people moving from bedrooms to and from various facilities in and around the building. That means a lot of events for doors to deal with. If a room key is not handed in when one student leaves, is the room secure for its next occupant? If a key has been lost how do you cancel it and know the room is truly secure without changing out the lock? And regards to that lost key, has it been copied? “And for audit purposes, on a campus such as Leeds with such a massive choice of accommodation, how do you get an accurate security overview when there are literally thousands of keys in circulation? This is where ProAccess SPACE and electronic access control really scores. “And now, with changing technology, more people want everything to be accessed through their personal device. That should come as no surprise as today’s students are digital natives and they expect convenience to come as standard!” Delivering highest level of security It is important that students are safe and secure and that access to their accommodation is strictly controlled"Simon Mulholland, Residence Refurbishment and Development Manager at the University of Leeds comments: “Living in University accommodation is a great way to experience student life, make new friends and feel part of our student community. We understand how important security is and it is a responsibility we take very seriously. It is important that students are safe and secure and that access to their accommodation is strictly controlled. “The SALTO system we’ve been running since 2010 now has proven track record with us so upgrading was a fairly straightforward decision and the latest version of the ProAccess SPACE software enables us to continue to deliver the highest levels of security combined with the most convenient and enjoyable experience of the learning environment – all as cost-effectively as possible. “Mobile credentials are an exciting application, after all when do you see a student without a smart phone, so this together with a number of other functions gives us enhanced productivity and control in a familiar but more powerful package.”
ASSA ABLOY Access Control, a UK division of ASSA ABLOY, the provider of door opening solutions, has partnered with NetNodes to deliver assured and secure access to a huge new innovation centre in London. Based at Queen Elizabeth Olympic Park, Plexal is a new £15 million project, acting as a base for an ‘innovation community’ that brings together startups, enterprises and academics all under one roof. Plexal sits within the larger Here East complex, which is transforming the former press and broadcast centres for the London 2012 Olympics Games into new spaces for technology companies, universities, startups and creatives. Aperio technology integrated with DoorFlow In total, 59 Aperio L100 wireless high-security door locks were installed across the siteThe innovation hub has been fitted with Aperio wireless, access card-based locking technology, which is fully integrated with DoorFlow, an online platform for managing and auditing building access created by NetNodes. In total, 59 Aperio L100 wireless high-security door locks were installed across the site. These lock solutions provide Plexal with the highest levels of physical protection and transmit comprehensive information on door status to DoorFlow in real time. A further 31 HiD R10 mobile access locks were also provided where wired solutions were necessary, such as for the main office entrances, and for elevators. For organisations looking to invest in a new access control system, Aperio is an effective, straightforward alternative to a wired, high-end solution. It was installed quickly and easily at the Plexal site without cabling and will drastically reduce the innovation hub’s maintenance costs and energy consumption going forward. Cost-effective security upgrade Aperio can upgrade existing mechanically locked doors and wirelessly connects them to new or existing access control systemsAperio can also upgrade existing mechanically locked doors and wirelessly connects them – online or offline – to new or existing access control systems. This can be achieved with minimal modification to doors and premises, offering a cost-effective and simple security upgrade. John Herbert, Facilities Manager at Plexal, said: “What really appealed to me about ASSA ABLOY Access Control’s products was the aesthetics. We have a futuristic-style open plan design here at Plexal – our offices are predominantly glass-fronted, so we needed an effective stylistic design which was not only robust but adaptable too. We foresee change in the not-too-distant future and are delighted at our options to modify.” Discreet and adaptable locking solution Stewart Johnson, Director at NetNodes, explains: “Aperio offers a hardware solution that is well-suited to our online platform, DoorFlow. Plexal required an adaptable locking solution for a range of different doors and, with no wiring required, it was quick and easy to install Aperio with minimal disruption. We are delighted to partner with NetNodes to deliver an easily integrated access control system for this new innovation centre in central London"“The open-plan layout of the space and the high glass doors installed throughout the site meant Plexal needed an access control solution that was discreet and adaptable, with Aperio perfectly meeting these demands. Should any additional doors need to be added to the system in the future, this can be done easily, without modifying or changing the aesthetics of the environment. This also minimises future installation costs, offering a cost-effective and straight-forward access control upgrade.” Integrated access control system David Hodgkiss, National Sales Manager for ASSA ABLOY Access Control, adds: “We are delighted to partner with NetNodes to deliver an easily integrated access control system for this exciting new innovation centre in central London. With up to 800 entrepreneurs using the space to devise, create and launch new products and services, Plexal required a solution that was tried and tested. Aperio enables easy access around the site while providing assured security. “Aperio is a fantastic hardware partner to door security software, such as NetNodes’ DoorFlow. It has been great to work with NetNodes on this project, and we expect to work together on many more successful installations in the future too.”
Ping Identity, the pioneer in Identity Defined Security, announced that its Ping Intelligent Identity Platform powers the engine behind HP Identity (HP ID), an enterprise-wide unified identity management ecosystem. The HP ID initiative is designed to up level customer and partner experiences by providing them with a single identity across all of their HP applications, whether in the cloud or on-premises. With a focus on driving customer experiences, HP selected the Ping Identity platform deployed in Amazon Web Services (AWS). This achieved its goal of instituting a single and highly secure identity and access management (IAM) platform across its entire global customer and partner-facing platform. Single sign-on for 150 million customers Ping’s customer IAM platform provides performance and scalability that can keep pace with HP’s continued innovation and growth"The HP ID platform is used by more than 100 business applications and enables single sign-on for over 150 million customer and partner identities across the world, plus thousands more being added each day. Before HP ID, the company was managing more than a dozen separate legacy IAM and authentication systems. User identities were previously housed across disparate data silos, creating a disjointed customer experience. Reinventing customer experiences HP Product Manager Jared Meier sums up the success of HP ID, “Ping’s customer IAM platform provides performance and scalability that can keep pace with HP’s continued innovation and growth. Now, customers have a seamless experience when they authenticate across our digital properties.” “Ping and HP share a common vision of innovation, great customer experiences and technology that makes life better for everyone, everywhere,” added Andre Durand, CEO, Ping Identity. “We’re proud to support HP in reinventing customer experiences through identity.”
With a mission to provide and maintain good quality homes for Blackpool Council’s tenants and leaseholders, BCH has won a number of awards and accreditations for housing, repairs, customer services and community projects. The safety and security of residents is a high priority for BCH, which is why it has used products from STANLEY Products & Solutions for many years. During this time the primary system was made up of a GDX5 door entry system, along with an Indigo 1000 access control system, which were fully integrated. “We have a policy of continual improvement in the service we provide,” explains Anthony Walker, Mechanical & Electrical Officer at BCH. “Although the previous configuration performed well, I was convinced that the business and operational benefits of remote monitoring and the cloud could be utilised by upgrading the Indigo 1000 with a PAC 512 access control system.” Innovative remote monitoring platform The PAC 512 devices control all aspects of two secure doors, with up to two card readers installed as entry and exit readers on each doorAn upgraded system was specified for a BCH site comprising 80 blocks. It utilises the existing GDX5 front panels, which have been integrated with the PAC 512 controllers to create a highly innovative remote monitoring platform that can be accessed via a PC, tablet or smartphone. This is achieved using a general packet radio service (GPRS) platform, which is a faster and cost-effective means of connecting remote sites via a mobile network. It provides an enhanced service over traditional mobile/landline telephone connections and makes administration of the system more flexible. The PAC 512 devices control all aspects of two secure doors, with up to two card readers installed as entry and exit readers on each door. Each door also has a programmable auxiliary input that may be used for alarm system integration, and an auxiliary output that enables a buzzer or strobe to activate when security is breached or a door is left open. Email alerts during equipment failure In the event of communication loss, the PAC 512 allows all local functionality to continue until the server connection is restored, while the system features an auto-dial or email alert program that, in the event of an equipment failure at one of the locations, sends a notification so that the issue can be quickly rectified. In the event of communication loss, the PAC 512 allows all local functionality to continue until the server connection is restoredExplaining the benefits of using PAC 512, Andrew Burton, area sales manager at STANLEY Products & Solutions, says, “The cloud revolution has had a dramatic effect on the physical security equipment industry. Its development into access control technology means that not only can a system be managed remotely, specific personnel can even be granted or denied access to certain areas at different times, making it not only good for security but also for health and safety. “Furthermore, in the event of a theft or antisocial behaviour, it is possible to pinpoint exactly who was where and initiate appropriate action, using the live events and reporting.” Remote diagnostics and servicing BCH can also access information via the PAC Residential Cloud – helping to further enhance its remote monitoring operation. Remote diagnostics, technical issues and servicing can be carried out, and it’s also possible to remotely view status, set and unset a system and access an event log. For instance, if someone loses a key fob, BCH can access their information, carry out an authorisation check, let them into their abode and, if necessary, deactivate the missing device. It also allows the incumbent installer to remotely access the system’s software to physically input any special information such as extended door release times for specific residents. Programming key fobs remotely BCH worked with STANLEY to generate reports which show when a key fob hasn't been used for a specific period of timeWith a number of vulnerable residents, BCH worked with STANLEY Products & Solutions to generate reports which show when a key fob hasn't been used for a specific period of time. Anthony Walker comments, “If the report indicates non-use of a fob, we can take measures to deactivate it, and/or can send someone over to check on the person concerned and, if necessary, notify next of kin or the relevant authorities. “In extreme circumstances, we can also remotely open doors to allow access to the emergency services. Having the ability to immediately and remotely program fobs has been particularly beneficial to our customers who previously would have had to travel to our offices for this to be completed - saving both time and money and making best use of our resources.” Seamless migration to cloud With a large number of residents, each with their own key fobs, Anthony Walker was keen to avoid any disruption during the upgrade and wanted to ensure that the process was achieved as seamlessly as possible. Configuring the physical hardware was helped by the installation team’s existing knowledge of STANLEY Products & Solutions’ technology. On-site training was also provided by experts from STANLEY Products & Solutions and, on the very rare occasion when there was a problem, a full support and advice package was available. The use of the PAC Residential Cloud meant that the migration of tenant fob information into new system was straightforwardInstalling a new access control system can often result in replacing existing key fobs with new ones – not only is this costly and inconvenient but there is also an administrative burden associated with transferring all the information to the new devices. However, all these issues were circumvented, as the use of the PAC Residential Cloud meant that the migration of tenant fob information into new system was straightforward – so much so that tenants didn't even realise any change had taken place. In addition, having access control data in the cloud means that it is always backed up. Enhanced safety and security BCH’s Anthony Walker considers the installation a total success and concludes, “I initiated this upgrade project because I firmly believed that it would improve tenant satisfaction and make our overall operation more efficient.” He further added, “I’m delighted that both of these objectives have been achieved and that STANLEY Products & Solutions’ access control technology has improved security, safety and protection across our estate.”
Hospital Wattwil opened the doors to its new inpatient wing in March 2018. The 88 patient beds in total are being fitted with LEGIC technology in the final completion stage. This innovative service offers comfort, security and efficiency for the patient and hospital operator. A monitor is installed at every patient bed. The patients can identify themselves using an RFID smartcard or bracelet and log into their bed computer at any time. Innovative smartcard technology Information such as menus, services and other special hospital information can be accessed through the hospital’s extranet. The resulting costs can be easily and instantly debited from the card’s account. Cabinets by the patient’s bed and the lighting and curtain controls can also be accessed using the smartcard. All of this makes the processes at the hospital much easier. Patients learn how to use the system intuitively and welcome this helpful and smart technology. System expansion with personalised treatment information and appointments or transfer to smartphones and tablets is already being planned System expansion with personalised treatment information and appointments or transfer to smartphones and tablets is already being planned: another step towards a digital hospital. Wattwil has already taken the first step with digital patient files. The processes are being increasingly automated. This reduces paper processes and guarantees efficient process management. Integrated hospital security The system was integrated, and the project was completed by the company Ondamedia, which has the necessary experience in this field. Advantages for the end user: Easy to use thanks to the intuitive user interface All the information is available at every patient bed Different applications in the hospital using one system Highly reliable and secure information André Juszko Head of Technology / Medical Technology, Hospital Wattwil commented - “With the technology from LEGIC we have every opportunity to integrate more applications at the hospital in future.”