HID Global, a pioneer in trusted identity solutions, announces that users of its cloud-based PKIaaS offering can now automate the lifecycle management of digital certificates used with devices managed via the Microsoft Intune mobile device and application management service.
The HID solution eliminates the need for human intervention when issuing and renewing certificates that enable employees to use their mobile devices to easily access their organisation’s resources through Wi-Fi networks or virtual private network (VPN) connections, without passwords.
Simple subscription model
WHO: HID Global, whose PKIaaS platform offers the advantages of a simple subscription model for automating digital certificate management across large numbers of mobile devices using Microsoft’s Intune service.
WHAT: The HID PKIaaS offering adds a rich suite of certificate automation capabilities to the Microsoft Intune mobile device onboarding and management process. HID is a Microsoft-approved third-party certification authority (CA) partner supporting the Intune service and its use of the Simple Certificate Enrollment Protocol (SCEP).
WHY: Out-of-the-box integration with Intune, Azure AD, and third-party SCEP servers enables the HID service to seamlessly automate all certificate provisioning and renewal. The HID service also enables users to scale their PKI-based strong authentication and encryption capabilities so they can secure hundreds of applications and up to tens of thousands of workstations, mobile devices and other endpoints.
HOW: The HID PKIaaS service is integrated with Microsoft’s Azure Active Directory (Azure AD) and is listed on the Azure Marketplace.
Providing complete control
Microsoft Intune is a cloud-based mobile device management (MDM) and mobile application management (MAM) service that integrates with Azure AD to control how organisations’ devices are used. It also allows administrators to push digital certificates to mobile phones and tablets (iOS/IPadOS and Android) as well as laptops (MacOS/Windows) to provide the easiest, most secure way to access Wi-Fi networks and VPNs.
HID’s cloud-based PKIaaS platform is unique in supporting both privately issued and trusted Transport Layer Security/ Secure Socket Layer (TLS/SSL) certificates, and also hosts private Intermediate Certificate Authorities (ICAs). It offers the industry’s broadest range of certificate automation features under a single annual subscription fee, including providing complete control, delegated administration, and on-demand auditing and reporting.
HID Global, a globally renowned company in trusted identity solutions, has announced that it is the world’s first ticketing solution provider with a software development kit (SDK) that is fully certified and compliant to Calypso HCE standards, for secure and convenient mobile ticketing on smartphones.
SDK certified to Calypso standards
The certification specifies how to protect ticket data stored in the mobile device’s wallet, helping transport operators to effectively fight fraud, by preventing tickets from being duplicated, transferred or altered.
“Calypso Networks Association (CAN) is pleased to issue to the HID SOMA Atlas 4Digital SDK, this first certificate of compliance, with the security requirements established for the HCE Calypso mobile ticketing application. This solution offers transport operators flexible, fast and secure solutions that comply with the principles of the most stringent mobile security programmes,” said Philippe Vappereau, the Chief Executive Officer (CEO) of the Calypso Networks Association (CNA).
Open standard for contactless ticketing applications
Calypso Host Card Emulation (HCE) standard extends the success of CNA standards to mobile devices
Relied on by public transportation networks and cities around the world, Calypso is an open standard for contactless ticketing applications, in which Calypso cards and NFC mobile phones are used.
The Calypso Host Card Emulation (HCE) standard extends the success of CNA standards to mobile devices and the Calypso HCE Security Certification (CHSC) combines a state-of-the-art evaluation methodology, with the most stringent requirements of mobile security programmes.
Security-by-design approach for identity solutions
“Being at the forefront of achieving this certification underscores HID’s long-standing commitment to a security-by-design approach, to building trusted identity solutions for our customers,” said Cesare Paciello, the Vice President, Events & Mobility Solutions with HID Global.
Cesare Paciello adds, “Following HID’s world’s first certification for Calypso Light in 2018, this new industry-first milestone positions HID to continue leading the way for public transportation networks to implement next-generation automated fare collection solutions. In addition to delivering advanced security to safeguard against cloning, eavesdropping and other cyber threats, the HID SOMA Atlas 4Digital SDK enables easier, more streamlined mobile ticketing.”
Mobile tickets, powered by HID SOMA Atlas 4Digital SDK
Mobile tickets, powered by the HID SOMA Atlas 4Digital SDK, can be used with Near-Field Communication (NFC)-enabled smartphones, just like any paper or card-based tickets that meet the Calypso standard. The HID SDK also enables transport operators and authorities to greatly expand the range of devices that customers can ‘tap to pay’ for travel using Android smartphones and other NFC devices.
Additionally, passengers can also use their mobile devices to add funds (‘top-up’) their Calypso-based transport cards, making it even easier to pay and use public transport, while minimising physical contact.
HID Events & Mobility Solutions
HID Events & Mobility Solutions provide end-to-end ticketing solutions, including transportation ticketing terminals, data capturing software, key management capabilities, RFID paper tickets, smart card tokens, smart wristbands and other components. Its multi-application operating systems can be integrated with existing hardware.
The global pandemic fuelled the need to use technology to overcome challenges and support safety. An expansive global study has revealed that 88% of citizens globally now want to see public safety transformed through the use of advanced technology. Additionally, 71% consider technologies such as video cameras, data analytics, and cloud solutions as necessary to address the challenges of the modern world.
At Intersec 2022 (Jan 16-18, Dubai), Motorola Solutions will showcase its integrated technology ecosystem that unifies voice, data, video security, and access control solutions. Highlights will include video cameras and analytics software, advanced mission-critical broadband push-to-talk services, and digital radio solutions.
Accelerating business productivity
Motorola Solutions will share the following innovations at Intersec 2022:
M500 in-car video system: On display for the first time in the Middle East, the new M500 in-car video system is enabled by artificial intelligence (AI). It features new backseat passenger analytics that automatically starts the in-car camera recording as soon as an individual enters the back seat of a police car. This is a major step forward in automating an everyday policing challenge to ensure that the presence of an individual in a police vehicle is securely recorded and the video evidence is automatically tagged and saved to the incident record.
This software solution connects individuals and groups over a carrier's network
Mission-critical broadband push-to-talk (PTT) solution: This software solution connects individuals and groups over a carrier's network to improve operational efficiency, accelerate business productivity and enhance customer service. It offers a broad set of multimedia services, such as push-to-video, push-to-text, geo-location and geo-fencing, device sharing, and operational status messages. The solution can be easily scaled to support new staff or third-party partners, enabling rapid response to developing situations or changing needs.
Additional vehicle information
L5M mobile Automatic Number Plate Recognition (ANPR) camera system: The high-performance ANPR solution is designed to accurately capture number plates and additional vehicle information, such as the car model, even when moving at high speed. The software also identifies vehicles of interest by providing officers with real-time alerts and quick searches to boost insight and awareness.
H5A rugged PTZ (Pan-Tilt-Zoom) camera: This camera combines high-resolution imaging, 360-degree views, and up to 36x zoom with an extremely robust design to perform reliably in the harshest environments. Its wide dynamic range captures critical details in very bright and dark areas and its optional infrared and white light illuminators can also provide ideal brightness in low-light scenes.
Simplified device management
The VB400 is designed to improve responder safety and increase transparency between police and citizens
MXP600 compact TETRA radio: The MXP600 radio is small, lightweight, and extremely rugged. It features intelligent microphone technology for high-performing noise cancellation and simplified device management via over-the-air programming (OTAP).
VB400 body-worn camera and VideoManager Software: The VB400 is designed to improve responder safety and increase transparency between police and citizens. It offers long battery life of up to twelve hours and a pre-recording function, allowing events to be documented up to two minutes before manual recording starts. This enables police officers to record unexpected situations without missing the start of an incident.
Remote management capabilities
Cloud-based access control software solution: Openpath’s cloud-based access control platform is a scalable and reliable solution that offers touchless access, remote management capabilities, and a suite of safety and wellness features designed to improve safety and security while reducing friction for end-users. Openpath’s triple-patented ‘Wave to Unlock’ technology offers touchless access for doors, elevators, or turnstiles. Openpath also offers occupancy management capabilities to comply with social distancing, health-check, and fever detection enforcement.
The Video Reader Pro can easily integrate with many third-party video management systems
Openpath Video Reader Pro: Combining the heightened security of a built-in, high-resolution camera with the form factor of a mullion door reader, the Video Reader Pro automatically associates video footage with access events, alerts, and motion and visually monitors entries in the Openpath Control Center. Designed with open video standards, the Video Reader Pro can easily integrate with many third-party video management systems.
Access control solutions
Compass Decision Management System: This intuitive operational interface supports the decision-making process for control room security operators, as well as provides a structured response to incidents with custom standard operating procedures.
"The public's expectation for and acceptance of the use of technology to ensure their safety and security has never been greater," said Patrick Fitting, regional Vice President of Middle East and Africa at Motorola Solutions. "Customers are accelerating technology deployments, particularly when it comes to the adoption of easy-to-use PTT services offering greater interoperability between systems, cloud-based software, video security, and access control solutions. Motorola Solutions is connecting these technologies into truly integrated workflows to unlock new levels of collaboration between workgroups and provide access to information in real-time to help make the world safer.”
Security is of the utmost importance in the healthcare setting so that patients and staff alike can focus their attention on improved clinical outcomes. Unfortunately, visitors are often a contributing factor to safety incidents and the burden on hospital staff has increased exponentially since the onset of the pandemic.
Let’s review the current state of healthcare workplace safety and how an automated, cyber-physical approach can help eliminate the administrative hassle and strengthen safety protocols.
Global pandemic adds undue strain
The ongoing global pandemic has placed enormous strain on healthcare systems and people are only beginning to understand the impact in terms of both patient outcomes and healthcare worker wellbeing. A recent analysis by Press Ganey revealed an increase in patient safety events of all types during 2020.
In late 2021, the Johns Hopkins Centre for Health Security released a new report sharing survey results from 1,189 healthcare workers in which 47 percent reported feelings of burnout.
Workplace violence in healthcare
Incidents of serious workplace violence are four times more common in healthcare than in private industry
Even before the current stressors placed on healthcare systems by the pandemic, hospitals were a relatively dangerous place to work. While a high level of danger is expected from industries like construction or manufacturing, healthcare presents a more high-risk environment than both.
According to the Occupational Safety and Health Administration, incidents of serious workplace violence are four times more common in healthcare than in private industry. And in 2019, U.S. hospitals recorded 221,400 work-related injuries and illnesses, which amounts to 5.5 work-related injuries and illnesses for every 100 full-time employees.
Visitors play a role
According to the Bureau of Labor Statistics, violence is among the top five causes of injury among hospital workers. Those acts of violence stem from a mix of patient and visitor aggressions. Among the most common acts committed against nurses, which are shouting and yelling, swearing, and grabbing, visitors account for 35.8, 24.9, and 1.1 percent of incidences according to the American Nursing Association. From 2013-18, roughly 33 percent of nurses reported verbal abuse by visitors and 3.5 percent reported physical abuse.
The pandemic has only increased these types of incidences. A Missouri hospital, for example, recently installed panic buttons on their badges to summon hospital security as needed.
Fully automated visitor identity management can help
VIM software integrates with the Epic HL7 interface to retrieve patient and visitor data
A cyber-physical approach to visitor management that incorporates automation can both strengthen vetting protocols and relieve the administrative burden on staff.
The Visitor Identity Management (VIM) software, for example, automates the entire visitor identity lifecycle from pre-registration to check-in, on-site experience, and check-out. And compliance never comes into question, since VIM software integrates with the Epic HL7 interface to retrieve patient and visitor data.
Here’s how it works:
When a patient is admitted to the hospital, Epic generates an HL7 message that processes the event and creates a patient profile.
VIM syncs this information, pulling patient information like the patient’s name, department, MRN unique identifier, and more
The system pushes back HL7 messages for discharge and updates using the same interface
Benefits of VIM
Here’s where the practical benefits start to set in. The software creates a visitor profile associated with the appropriate patient. From there, visitors can check-in and out on their own through a self-service kiosk app. Or, staff can issue visitor stickers, technology badges, or advanced mobile credentials using lobby workstation software.
VIM automatically vets visitors against internal and third-party watch lists before issuing an approved profile
Beyond automation efficiencies, VIM also ensures the highest level of safety and security for everyone in the building. The software automatically vets visitors against internal and third-party watch lists before issuing an approved profile. Additionally, VIM software integrates with physical access control systems so that a visitor’s physical access would remain limited to only approved areas of the hospital. By leveraging both systems, healthcare facilities with heightened security needs, such as children’s hospitals, can create a much more controlled environment for patients and staff.
Manage new vaccination and testing data
Another major challenge facing the healthcare system complies with the emergency temporary standard issued by OSHA, which requires adequate personal protective equipment, timely exposure reporting, and more. In a survey of over 5,000 registered nurses conducted by National Nurses United (NNU), just 23 percent said their employer reported COVID-19 exposures promptly.
Using VIM software, healthcare providers can automate workflows related to COVID-19 health and safety compliance, as well as vaccination checks, to expedite the management and flow of critical health data. And with a secure record of all visitor comings and goings, healthcare systems have one more reliable, auditable data point to conduct contact tracing.
An automated, cyber-physical approach to managing the visitor experience increases the number of checks and balances available to secure an already stressful working environment. In short, visitors get a better experience and staff have more time to focus on higher-value work.
Meanwhile, automated workflows for vaccination and physical access can help expedite compliance with new requirements and contact tracing in the event of an exposure. Due to the integration with Epic software, an organisation can reap these benefits using the systems they already have in place
Access control and management of trusted identities are the building blocks of security, safety, and site management policies for many businesses and organisations. The current pandemic has compounded this with the introduction of new policies and regulations, particularly around social distancing and contact tracing.
Most organisations will have some form of legacy access control in place, ranging from the most simplistic options, such as locks and keys, to technology-based systems. The issue with legacy systems of any type is that risks, just like technology, evolve. What was secure, convenient, and efficient a few years ago is often found wanting as the threat landscape changes.
The standards governing the development and testing of physical access control systems (PACS) have also evolved to improve security and product interoperability. An example is the Open Supervised Device Protocol (OSDP), introduced 10 years ago as an alternative to the antiquated and vulnerable Clock-and-Data and Wiegand protocols. However, when it comes to planning infrastructure upgrades or implementing new tools, businesses must carry out due diligence to ensure the solutions are future-proof and deliver the expected level of security.
Vulnerabilities and challenges
In the early 1980s, Clock-and-Data and Wiegand protocols were widely adopted as the de-facto standard for interoperability between access control readers and physical access controllers. Those de-facto standards were later formalised and adopted into industry standards by the Security Industry Association in the 1990s.
Wiegand is unencrypted and unable to protect from “man in the middle” attacks and vulnerabilities
There were weaknesses, though, Wiegand is unencrypted and unable to protect from “man in the middle” attacks and vulnerabilities from the reader to the controller. Not only that, but Wiegand delivers limited range options and is operationally inefficient. It is also easy to target via its learnable language and a host of hacking devices available via online sources.
Furthermore, the retrofitting installation alongside a legacy system is complicated for integrators and expensive for organisations, as most readers require dedicated home-run wiring. Extensive wiring on a large-scale project, such as a school or corporate campus, results in considerable — often prohibitive — costs for the installation of a PACS.
Legacy access control protocol
Despite the well-publicised vulnerabilities and weaknesses, Wiegand is still one of the most common protocols in legacy access control, with estimates indicating it is used in more than 90 percent of installed systems.
This not only presents issues about physical security but also raises concerns relating to the protection of personal data. Access control systems not only contain information about who can and cannot use certain doors.
OSDP is a communication standard
Modern systems include a wide range of personal data, ranging from qualifications and certifications of individuals, home contact details, and even medical conditions or HR and employment information. With the potential fines associated with GDPR breaches, companies need to take this concern seriously.
These weaknesses pushed the security industry to adopt a new protocol: Open Supervised Device Protocol (OSDP). This access control communications standard was developed by Mercury Security (now part of HID Global) and HID Global in 2008, and donated, free of intellectual property, to the Security Industry Association (SIA) to improve interoperability among access control and security products.
Since then, it has been adopted as a standard by SIA, becoming the first secure, bidirectional reader/controller protocol to be governed by a major standards body in the security industry. In 2020 OSDP reached an additional milestone in becoming an International Electrotechnical Commission (IEC) standard.
Why implement OSDP as a standard?
OSDP is the only protocol that is secure and open for communication between readers and controllers
The growth of networked devices, such as video and access control products, has led to an increased demand for converged solutions. Businesses and organisations recognise the value of implementing an integrated solution to enhance security and add value to technology investment.
OSDP is the only protocol that is secure and open for communication between readers and controllers and is also being widely adopted by industry-leading reader and controller manufacturers. It is an evolving, ‘living standard,’ making it a safer, more robust, future-proof option for governing physical access control systems. OSDP offers important benefits:
1) Increased security
Implementing OSDP standards can increase security, as OSDP with Secure Channel Protocol (SCP) supports AES-128 encryption that is required in U.S. federal government applications. Additionally, OSDP constantly monitors wiring to protect against tampering, removing the guesswork since the encryption and authentication are predefined.
2) Bidirectional communication
Early on, communication protocols such as Wiegand were unidirectional, with external card readers sending information one way to a centralized access control platform. OSDP has transformed the ability for information to be collected, shared, and acted upon with the addition of bidirectional communication for configuration, status monitoring, tampering, and malfunction detection, and other valuable functions. In fact, OSDP is the only open, non-proprietary, bidirectional, secure protocol for communication between card reader and physical access controller.
3) Open and interoperable
OSDP adds new technology that enhances its ability to protect incoming and outgoing data collection OSDP supports IP communications and point-to-point serial interfaces, enabling customers to flexibly enhance system functionality as needs change and new threats emerge. They also can proactively add new technology that enhances their ability to protect incoming and outgoing data collection through a physical access control system.
4) Reduced installation costs
OSDP’s use of two wires (as compared to a potential of 11 wires with Wiegand) allows for multi-drop installation, supervised connections to indicate reader malfunctions, and scalability to connect more field devices.
Daisy-chaining accommodates many readers connected to a single controller, eliminating the need to run home-run wiring for each reader, and the use of a four-conductor cable achieves up to 10x longer distances between reader and controller than Wiegand while also powering the reader and sending/receiving data.
5) User friendly
OSDP gives credential holders greater ease of use, with audio and visual feedback such as coloured lights, audible beeps, and the ability to display alerts on the reader.
For security administrators, managing and servicing OSDP-enabled readers also becomes increasingly convenient, as OSDP-enabled readers can be remotely configured from network-connected locations. Users can poll and query readers from a central location, eliminating the cost and time to physically visit and diagnose malfunctioning devices.
Unlimited application enhancements
OSDP streamlines installations and upgrades while saving organisations the expense of replacing readers
OSDP supports advanced smartcard technology applications, including PKI/FICAM and biometrics, and other enhanced authentication protocols used in applications that require Federal Information Processing Standards (FIPS) compliance and interactive terminal capabilities. Audio-visual user feedback mechanisms provide a rich, user-centric access control environment.
OSDP offers advantages for users, administrators, and integrators, alike. It adds security and real-world efficiencies, and its interoperability ensures that organisations can use systems from numerous manufacturers as they invest in infrastructure that maximises the protection of critical data.
For our part, HID Global’s range of HID Signo readers is OSDP verified, ensuring they offer the intended interoperability and security for secure bidirectional communication and provide an easy migration from Wiegand devices. In a campus environment, OSDP streamlines installations and upgrades while saving organisations the expense of replacing readers if a new access control solution is implemented. There are also service and maintenance benefits as OSDP encourages continuous monitoring of system uptime and allows for remote configuration of -- or upgrades to -- a reader.
Cost savings upon system upgrade
Integrators can also capitalise on the introduction of OSDP by encouraging open standards, which can, in turn, help them build new customer relationships and win more projects.
Although upgrading to access control systems that adhere to OSDP standards is a significant initiative, the range of benefits outweighs the cost of upgrading. Increased security coupled with business efficiencies adds value for those administering the system and a high level of interoperability ensures users can deploy systems from numerous third-party manufacturers.
Integrators who understand the benefits of OSDP can also help their customers support both current and future technology requirements. When a site’s needs change, OSDP offers significant cost savings as the open functionality makes adding new devices easier and reduces the expense of requiring all readers to be replaced if a new solution is installed. Businesses and organisations transitioning to OSDP will also enhance value in terms of operational costs such as servicing and maintenance.
As we enter into 2022, there is still a level of uncertainty in place. It’s unclear what the future holds, as companies around the world still contend with the COVID-19 pandemic. Remote working has been encouraged by most organisations and the move to a hybrid working system has become ‘business as usual’, for the majority of businesses. Some have reduced their office space or done away with their locations altogether.
Following best security practices
With all this change in place, there are problems to deal with. According to research, 32.7% of IT admins say they are concerned about employees using unsecured networks to carry out that work. Alongside this, 74% of IT admins thought that remote work makes it harder for employees to follow best security practices.
This need to manage security around remote work is no longer temporary. Instead, companies have to build permanent strategies around remote work and security. The coming year will also create a different landscape for small and mid-sized businesses (SMBs).
Here are some key predictions for next year and what to start preparing for in 2022:
The reality of SMB spending around security will hit home
SMBs had to undertake significant investments to adapt to remote working
SMBs had to undertake significant investments to adapt to remote working, especially in comparison to their size. They had to undertake significant digital transformation projects that made it possible to deliver services remotely, during the COVID-19 pandemic. We’ve seen a shift in mindset for these companies, which are now more tech-focused in their approach to problem solving.
According to our research, 45% of SMBs plan to increase their spending towards IT services in 2022. Around half of all organisations think their IT budgets are adequate for their needs, while 14.5% of those surveyed believe they will need more, to cover all that needs to be done.
Identity management spending to support remote work
For others, the COVID-19 pandemic led to over-spending, just to get ahead of things and they will spend in 2022, looking at what they should keep and what they can reduce their spending on.
Areas like identity management will stay in place, as companies struggle to support remote work and security, without this in place. However, on-premise IT spending will be reduced or cut, as those solutions are not relevant for the new work model. Services that rely on on-premise IT will be cut or replaced.
The device will lead the way for security
We rely on our phones to work and to communicate. In 2022, they will become central to how we manage access, to all our assets and locations, IT and physical. When employees can use company devices and their own phones for work, security is more difficult. IT teams have to ensure that they’re prepared for this, by making sure that these devices can be trusted.
Wide use of digital certificates and strong MFA factors
Rather than requiring a separate smart card or fingerprint reader, devices can be used for access using push authentication
There are multiple ways that companies can achieve this, for example - By using digital certificates to identify company devices as trusted, an agent, or strong MFA factors, like a FIDO security key or mobile push authentication.
Whichever approach you choose, this can prevent unauthorised access to IT assets and applications, and these same devices can be used for authentication into physical locations too. Rather than requiring a separate smart card or fingerprint reader, devices can be used for access using push authentication.
Understanding human behaviour
Alongside this, it is important to understand human behaviour. Anything that introduces an extra step for authentication can lead to employees taking workarounds. To stop this, it is important to put an employee education process in place, in order to emphasize on the importance of security. The next step is to think about adopting passwordless security, to further reduce friction and increase adoption.
Lastly, as devices become the starting point for security and trust, remote device management will be needed too. More companies will need to manage devices remotely, from wiping an asset remotely if it gets lost or stolen, through to de-provisioning users easily and removing their access rights, when they leave the company.
Identity will be a layer cake
Zero Trust approaches to security
Identity management relies on being able to trust that someone is who they say they are. Zero Trust approaches to security can support this effectively, particularly when aligned with least privilege access models.
In order to turn theory into practical easy-to-deploy steps, companies need to use contextual access, as part of their identity management strategy. This involves looking at the context that employees will work in and putting together the right management approach for those circumstances. For typical employee behaviour, using two factor authentication might be enough to help them work, without security getting in the way.
How enterprises manage, access and store identity data
There will also be a shift in how enterprises manage, access, and store that identity data over time
For areas where security is more important, additional security policies can be put over the top, to ensure that only the right people have access. A step-up in authentication can be added, based on the sensitivity of resources or risk-based adaptive authentication policies might be needed.
There will also be a shift in how enterprises manage, access, and store that identity data over time, so that it aligns more closely with those use cases.
Identity management critical to secure assets in 2022
There are bigger conversations taking place around digital identity for citizenship, as more services move online as well. Any moves that take place in this arena will affect how businesses think about their identity management processes too, encouraging them to look at their requirements in more detail.
Overall, 2022 will be the year when identity will be critical to how companies keep their assets secure and their employees productive. With employees working remotely and businesses becoming decentralised, identity strategies will have to take the same approach. This will put the emphasis on strong identity management as the starting point for all security planning.
In the new era of work, our relationship with the workplace is defined by flexibility and mobility. Employees are working across the home, office, and blended spaces more than ever before, as well as working varied hours to suit the modern work schedule.
This new hybrid workforce model holds the potential for more diverse talent and better productivity, but it also comes with its challenges – one being how to ensure security, health, and safety in the workplace.
Strong and smart security ecosystem
While nearly one-third of companies report that they’ve implemented a hybrid model, according to a recent survey by STANLEY Security, many still have much to do to prepare their office for the future.
Building a strong – and smart – security ecosystem is crucial in preparing for the future. As such, businesses should consider technologies that help protect their people, as well as safeguard their assets, optimise their operations, and secure their network.
1)Protect your people
Implementation of a security ecosystem combines health, safety, and security hardware and software solutions seamlessly
Nearly 60% of mid-market and enterprise businesses across the UK and US report that the health and safety of their employees and customers are a primary concern when implementing modern and hybrid working models.
This begs the question: How can businesses create a safe and healthy work environment when 59% are planning to bring employees back on-site in some capacity within the next 18 months? The answer lies, in part, in the implementation of a security ecosystem that combines various health, safety, and security hardware and software solutions seamlessly.
Nearly half (46%) of business decision-makers say they are interested in adopting an integrated platform such as this. This means integrating traditional and digital security solutions, then leveraging the data and insights they produce to further enhance the workplace experience. Take this example:
With employees and visitors moving in and out of the office at different times, a business may lack oversight of occupancy or density levels, people flow, workspace scheduling, visitor check-in processes, and more. However, with visitor management, access control, and other building/business systems integrated, employees can reserve a workspace for a specific date and time and be granted access to the building.
Leveraging AI and machine learning
Visitors can pre-register, answer a health screening questionnaire, and receive a mobile credential before arriving. Once the visitor arrives on-site, the system can alert the respective department – all without the close contact typically required for traditional visitor check-in processes.
When layering artificial intelligence and machine learning on top of the data, a business may identify trends in people flow and opportunities to optimise congested areas. They may also see that certain rooms within the building get more use than others and leverage these insights to manage their space more effectively.
All of this is powered by a security ecosystem that can help a business better protect its people while realising other benefits in the process.
2) Safeguard your assets
Businesses are concerned about the security of their assets when it comes to the hybrid workforce model
Even more, businesses are concerned about the security of their assets when it comes to the hybrid workforce model. About 72% of leaders say this is, in fact, their primary concern with the hybrid approach.
This figure isn’t surprising when you consider the impact of the pandemic, which left many businesses closed either temporarily or permanently, with few people allowed on-site to manage facility operations.
As a result of the pandemic, we saw tech adoption accelerate at an astonishing rate – simply because businesses had to implement cloud and remote technologies to survive during a time when buildings were closed indefinitely.
Remote management and visibility
This was particularly true for security solutions, such as cloud video surveillance and cloud access control solutions like wireless IoT-connected locks. Nine out of 10 businesses (91%) report that they have already implemented cloud security technology; of those, nearly half (48%) stated that this was due to the pandemic.
These technologies allow for remote management and provide visibility into business operations at the same time. In a retail setting, for example, cloud video surveillance allows businesses to identify and track not only criminal activity, but also foot traffic patterns, peak operating hours, staff shortages, and more.
Loss prevention strategy
When integrated with the retailer’s point-of-sale (POS) system, businesses can gain greater insights into their traffic counts, end cap effectiveness, loyalty card activity, and a variety of POS exceptions, such as high-dollar transactions, repeated transactions, excessive returns, employee discounts, and more.
For retailers especially, a security ecosystem means a more efficient loss prevention strategy that helps safeguard assets and profits.
3) Optimise your operations
The “future of work” is still very much a work in progress, but one thing is clear: Businesses are looking for ways to increase efficiencies, drive cost savings, and, ultimately, optimise their operations – especially now with the challenges posed by price inflation.
A relatively untapped opportunity for businesses to achieve these goals lies within their security infrastructure. Security technology and solutions gather incredibly rich data which, when unlocked, can help businesses understand how their buildings are being used, when the busiest times are, where there are highly trafficked areas, and more.
Leveraging cloud video surveillance systems, businesses could identify emerging staff training needs
Cloud video surveillance systems
For example, by leveraging the insights produced by cloud video surveillance systems, businesses could identify emerging staff training needs, which could ultimately result in improved employee satisfaction and reduced attrition.
However, much of this data sits untouched within the infrastructure, leaving businesses unaware of the opportunities in front of them. 44% of businesses that currently use a cloud security system for its primary use say they want to know how else this technology can be utilised, and an additional 20% aren’t even aware that it could be used in other ways.
AI and analytics
The interest in adoption is promising for the office of the future, especially when we see that the majority of businesses (78%) would consider using AI and analytics technologies to optimise their operations, helping their business to operate more effectively and efficiently.
The increase in adoption of cloud technology – paired with the rise in interest in AI, machine learning, and advanced analytics – could make it possible for businesses to uncover invaluable insights from their security infrastructure and leverage them to adapt and build business resilience.
4) Secure your network
Advanced technology help businesses improve their cybersecurity, making it harder for hackers to gain entry
With cyber threats becoming more prevalent, businesses are increasingly looking to secure their networks and protect their data. More than half (54%) of those surveyed expressed interest in using AI, machine learning, and advanced analytics to secure their network by identifying and eliminating cybersecurity threats.
Advanced and automated technology can help businesses improve their cybersecurity, making it harder for hackers to gain entry to the larger corporate network. Modern cybersecurity tools that use AI and machine learning can detect anomalies in network traffic or alert and act on suspicious behaviour.
For example, if an IoT device suddenly begins broadcasting and establishing connections with multiple devices, cybersecurity software could detect this abnormal behaviour, send an alert, and suspend traffic or quarantine an endpoint immediately – saving precious time during a potential breach.
A single data breach could result in widespread distrust from workers and customers, potentially leading to decreased business as well as litigation issues. As such, businesses need to take action to update and strengthen their defences so that they can avoid downtime and continue to operate with peace of mind.
Prepare your business for the future
Businesses will continue to look for more ways to extract value out of their existing infrastructure, including their security technology. For many, the tools to do so are already in place, it’s just a matter of unlocking the insights with a security ecosystem.
With such an ecosystem – one that helps protect a business’ people, assets, and network, while optimising operations – companies can better safeguard the future of their workspaces and usher in the new era of work with confidence.
Sooner or later (hopefully sooner), the novel coronavirus global pandemic will allow workplaces to reopen. But as we move into this recovery phase, there are many questions surrounding the transition. How can companies ensure facilities are in acceptable working order to reopen? How do they decide who is coming back and when? How will social distancing impact the operation of a company’s physical access control system? How can companies ensure that both visitors and employees are aware of the policy changes and extra controls?
For answers to these and other salient questions, we called on Ian Lowe, Product Marketing Director of HID SAFE Identity and Access Management (IAM) solutions.
“There’s no doubt about it: the global pandemic will change the way we live, work, and conduct business for some time,” says Lowe. “Over the past several weeks, we have been working with customers to enable a safe return to the workplace. We have observed that the number of challenges in the mid-to-long-term level and the associated complexity vary by location.”
Lowe shares some of the proactive measures and best practices that can assist in a safe return to the workplace as we settle into a “new normal”.
Challenge 1: Ensuring building readiness
After being unoccupied for weeks or months, building readiness must be addressed completely before welcoming anyone inside. Even though employees may be eager to return, the workplace itself may not be ready. Companies may want to consider continuing remote work while facility operations are prepped.
Challenge 2: workforce management
There’s no doubt about it: the global pandemic will change the way we live, work, and conduct business for some time
While it is dependent on location and industry, taking a phased approach is the best course of action when allowing employees, contractors and visitors back into facilities. First, facilities management will want to survey the property for readiness and then provide an estimate as to when employees may begin reporting back into the office.
Next, it’s important to consider that office density needs are interrelated to the facility architecture. It is possible to accommodate a higher capacity of workforce in an airy, open office space than in a constrained one. A good rule of thumb is to start by introducing no more than 30% of employees back into the workplace at first. This could be a rolling group model in which the population total remains controlled and constant, but specific individuals vary from day to day. This option is good for a workforce that needs to be together in person but not necessarily all at the same time due to office density concerns.
Welcoming visitors or customers into the office should be delayed as long as possible. If that’s not feasible, visitor numbers should be factored into the total density count. A cloud-based visitor management system can help with implementation.
Challenge 3: Controlling access
The ability to vet staff, employees, contractors and visitors before and during the return will vary greatly depending on the location. Policies should be implemented that require employees to be screened regularly — and for an extended amount of time. Look to answer the following questions:
Where have you visited in the days since last entering the workplace?
Have you come into contact with anyone else who has recently visited high-risk areas?
Have you shown any symptoms of infection in the past xx number of days?
Policies should be implemented that require employees to be screened regularly — and for an extended amount of time
If there is cause for concern, refuse the visitor and/or supplement the screening process with additional steps. Temperature checking is mandatory in many organisations— often multiple times a day. This applies to interactions at delivery bays, too.
A policy-based physical identity and access management solution integrated with existing physical access controls makes it possible to enforce, monitor and report this type of activity.
Challenge 4: Social distancing and contact tracing plan
Social distancing may continue within the office, which will impact restrictions and guidelines related to access control. The office layout may be reworked for proper distance between cubicles, workplace positions and employees. Specific entrances, exits and pathways may be designated as one-way-only.
Assigning Bluetooth LE beacons to employees once they are inside the workplace will allow companies to monitor proximity to others and measure localised density in real-time by using location services, contact tracing, and surge response technologies.
Challenge 5: Reduced physical touchpoints
Contactless technologies can help enforce social distancing and reduce touchpoints on common surfaces
Reducing the number of physical touchpoints is desirable throughout a workplace. Contactless technologies can help enforce social distancing and reduce touchpoints on common surfaces such as faucets, doorknobs, coffee pot handles, etc. While introducing additional security checks and screenings, it’s important to not increase touchpoints and further infection risks. There have been more requests for a contactless experience to secure workplace access, including automatic doors and turnstiles, contactless cards and mobile access.
Challenge 6: Communicating for confidence
Proactive communication is key to provide reassurance that appropriate safety measures have been taken and that both visitors and employees are aware of the policy changes and extra controls. Equally important is to communicate a policy change – and the reasoning behind it – before it happens. While there may not be an exact expiration date on these new policies, ensuring that impacted individuals will have a safer experience is universally appreciated.
Topics that dominated our website’s Expert Panel Roundtable articles in 2021 included the effects of COVID-19, the benefits of mobile access, the upcoming potential of deep learning, and the future of access control cards. Our website’s Expert Panel Roundtable discussions in 2021 reflected some of the most timely and important topics in the industry.
The very most clicked-on Expert Panel Roundtable discussion in 2021 considered the positive and negative effects of COVID-19. The second most popular was trends in perimeter security technology.
Smart video solutions
Here is a roundup of the Top 10 Expert Panel Roundtable discussions posted in 2021, along with a ‘sound bite’ from each discussion and links back to the full articles. Thanks to everyone who contributed to Expert Panel Roundtable in 2021 (including the quotable panelists named and linked below).
The pandemic has impacted security in many ways, some we are just now realising"
What are the positive and negative effects of COVID-19 to security?
“The pandemic has impacted security in many ways, some we are just now realising. On the negative side, integrators were limited in their ability to access customer locations, posing significant challenges to supporting customers. Innovation was also halted in many sectors – such as AI and edge computing in healthcare. However, the pandemic increased awareness regarding the need for smart solutions that can aid in these types of crises. Smart video solutions have been identified repeatedly in the media as a potential pathway to better customer experience and increased safety.” – Alexander Harlass.
Reducing false alarms
What are the latest trends in perimeter security technology?
“What’s really important in perimeter security is the minimisation of false alarms, not simply the potential detection of what might be an unauthorised person or object. In light of that, many systems now include alarm validation that can confirm an alarm event using a camera. The utilisation of AI-based technologies can further validate the accuracy of the alarm, making it as accurate and precise as possible. I anticipate seeing more cross-technological integrations to reduce false alarms, so that personnel in an alarm center spend as little time as possible in validating an alarm.” – Leo Levit.
What will be the biggest security trends in 2021?
“2021 will see artificial intelligence (AI) become more mainstream. There will be increased deployment in edge devices, including cameras, thermographic cameras, radar and LIDAR sensors, entry point readers, etc. Additional algorithms will be developed, greatly expanding the use and function as video surveillance transitions from a forensic tool to real-time analytics. This increases the value of these systems and helps create ROI cases for their deployment.” – Tim Brooks.
Access control solutions
Investments in tools and platforms to drive digital interactions have accelerated"
What will be the security industry’s biggest challenge in 2021?
“The security industry is traditional in the sense that it relies heavily on face-to-face interaction to do business with customers and partners alike. COVID-19 has put a hold on in-person meetings, trade shows, etc., and this trend is likely to extend throughout 2021. Virtually recreating these personal touchpoints, while cultivating and strengthening internal and external relationships, will continue to be both a challenge and opportunity for the security industry. Investments in tools and platforms to drive digital interactions have accelerated.” – Robert Moore.
What are the challenges and benefits of mobile access control?
“Mobile access control solutions are an exciting innovation in a market where the day-to-day user experience hasn’t changed much in the last 20 years. One area that has clear benefits and challenges is in improving the user experience. On one hand, physical credentials are expensive and a hassle to administer; however, they work reliably, quickly, and predictably. Mobile credentials are convenient in that everyone already has a smartphone, and you don’t have to admin or carry cards; however, when you’re actually standing at the door they need to work as well or better than physical credentials, or the benefits are lost.” – Brian Lohse.
Attacking critical infrastructure
What are the security challenges of protecting critical infrastructure?
“It seems so often we hear about a new threat or cyber-attack in the news. Because of the rapid growth in technology over the last few years, cybercriminals are getting bolder and discovering new ways to attack critical infrastructure. One of the biggest challenges boils down to the capabilities of the operating security system and whether the organisation is aware of the current risks they face. Because there are so many points of entry for cybercriminals to target within critical infrastructure, it is vital that the security solution be prepared for attacks at every level.” – Charles (Chuck) O’Leary.
They are more aware when they make physical contact with doors and interfaces"
Which security technologies will be useful in a post-pandemic world?
“People have become more sensitised to crowds and personal space. They are more aware when they make physical contact with doors and interfaces. As the pandemic subsides, these habits will likely remain for a majority of people."
"Utilising AI-based cameras to accurately monitor the number of people in a room or in a queue will enable staff to take action to improve the customer experience. For example, AI-based analytics can quickly notify security or operations when people are waiting at a door and initiate 2-way audio for touchless access.” – Aaron Saks.
Central monitoring station
What is the potential of deep learning in physical security and surveillance?
“Deep learning, a subset of artificial intelligence, enables networks to train themselves to perform speech, voice, and image recognition tasks."
In video surveillance, these networks learn to make predictions through highly repetitive exposure"
"In video surveillance, these networks learn to make predictions through highly repetitive exposure to images of humans and vehicles from a camera feed. That ability is ideal for use with drones patrolling perimeters seeking anomalies or in software that significantly reduces the number of false alarms reported to central monitoring station operators. Through use, the software continues improving its accuracy.” – Brian Baker.
Valuable audit trail
How soon will access control cards become extinct and why?
“Access control cards will go the way of the dinosaur, but they still have some life left in them. For the short term, they have plenty of utility in minimum security use cases and leave a valuable audit trail. But for companies that are more technology-centric, particularly those with high value assets, we’re seeing demand for next-generation access control, which includes increased integration with video surveillance systems and professional monitoring services.” – Sean Foley.
Which security markets are embracing touchless and contactless systems?
“Touchless technology is not a new trend, but contactless systems and transactions have surged since the COVID-19 pandemic. Even after the pandemic is over, it is likely public perception of what is hygienic and acceptable in public spaces will have changed. [We are] seeing an uptick in touchless access control systems in the education and flexible office space markets.” – Brooke Grigsby.
Mergers and acquisitions are among the most disruptive forces in the security marketplace. However, they are also both a reality and a growing trend. Whenever there is value to be leveraged, companies tend to enter into business transactions to maximise that value. For the security industry, the result is a continually shifting collection of manufacturer companies seeking new ways to provide value to customers.
M&A activity continued unabated in 2021, despite residual industry challenges such as dysfunctional supply chains and lingering consequences of a global pandemic. Here are some of the larger and/or most impactful M&A transactions of 2021.
Stanley Black & Decker sells to Securitas
Stanley Black & Decker announces an agreement to sell most of its Security assets to Securitas AB for $3.2 billion in cash. The transaction includes Stanley Black & Decker's Commercial Electronic and Healthcare Security business lines.
The businesses carry 2021 forecasted revenues of approximately $1.7 billion. “The business is well-positioned for ongoing growth within Securitas, a global pioneer in the security industry,” says James M. Loree, Stanley Black & Decker's CEO.
Openpath’s solution makes businesses more secure with multi-factor authentication
Motorola acquires Openpath and Envysion
Motorola Solutions adds to its security industry portfolio with the acquisition of Openpath Security Inc., a cloud-based mobile access control provider. Openpath’s solution makes businesses more secure with multi-factor authentication, enables a contactless entry experience, and can be easily scaled and managed due to its cloud-based architecture.
Motorola also announces the acquisition of Envysion, a provider of video security and business analytics solutions for quick-service restaurant and retail industries.
Delta Electronics buys March Networks
Delta Group, a provider of power and thermal management solutions, , purchased 100% of the shares in Infinova (Canada) Ltd., owner of Canadian-based video surveillance and business intelligence company March Networks, from Infinova International Ltd. through its subsidiary Delta International Holding Limited B.V.
Following the close of the transaction, it was expected that March Networks will continue to operate from its Canadian headquarters, and the March Networks executive management team will continue to lead the organization. Delta Electronics is also the parent company of VIVOTEK.
APi Group acquires Chubb Fire and Security Business
APi Group Corp. agreed to acquire the Chubb Fire & Security Business from Carrier Global Corporation for an enterprise value of US$ 3.1 billion.
Headquartered in the United Kingdom, Chubb has approximately 13,000 employees globally and a sales and service network that spans 17 countries, serving more than 1.5 million customer sites in Europe, Asia Pacific, and Canada. APi Group is a business services provider of safety, specialty, and industrial services in more than 200 locations worldwide.
Teledyne Technologies Inc. will acquire FLIR in a cash and stock transaction valued at approximately $8.0 billion
Teledyne acquires FLIR
Teledyne Technologies Inc. and FLIR Systems, Inc. jointly announced that they have entered into a definitive agreement under which Teledyne will acquire FLIR in a cash and stock transaction valued at approximately $8.0 billion.
Jim Cannon, President and Chief Executive Officer of FLIR, said, “We could not be more excited to join forces with Teledyne through this value-creating transaction.”
Resideo adds Norfolk Wire and Electronics
Resideo Technologies, Inc. acquired privately held Norfolk Wire & Electronics, based in Richmond, Virginia. Norfolk was founded in 1985 and is a regional distributor of security, telecom, network, and audio-video (AV) related products, supplies, and tools.
With 11 full-service retail locations and a 43,000 sq. ft. distribution centre, Norfolk serves customers across the mid-Atlantic region and will be part of Resideo's ADI Global Distribution business, a wholesale distributor of security, AV, and low-voltage products.
Triton acquires ACRE, which acquires Feenics and Matrix
Triton Partners acquired ACRE, an end-to-end security solutions provider based in Dallas/USA and Dublin/Ireland. Triton is investing alongside the current management team of ACRE. Weeks later, ACRE acquired cloud-based workplace solutions company Time Data Security (TDS).
Later in the year, ACRE announced acquisition of Feenics and Matrix Systems. Feenics brings cloud-based access control solutions brings cloud-based access control solutions to ACRE’s rapidly growing network of global customers while also expanding its portfolio to support the growing demand for cloud-based security solutions. Matrix enables ACRE to expand the addressable market for the company’s technology portfolio.
Brivo, Inc. and Crown PropTech Acquisitions have entered into an agreement making Brivo a publicly listed company
Brivo becomes publicly traded through the merger
Brivo, Inc., a cloud-based access control and smart building technologies company, and Crown PropTech Acquisitions, a publicly traded special purpose acquisition company (SPAC), have entered into a definitive merger agreement that will result in Brivo becoming a publicly listed company.
The transaction values the company at a pro forma enterprise value of $808 million. Upon closing, the combined company will operate as Brivo, and its Class A common stock is expected to be listed under the ticker symbol “BRVS.”
Nice buys Nortek Security
Nice, a global manufacturer of smart home, security, home, and building automation solutions, , acquired Nortek Security & Control from Melrose Industries.
Nortek Security & Control is a developer of technology for security, home automation, control, power, AV and entertainment, access control, health, and Artificial Intelligence (AI) systems, for residential and commercial markets.
Eagle Eye acquires Uncanny Vision
Eagle Eye Networks, a cloud video surveillance solutions company, has acquired Uncanny Vision Solutions, an artificial intelligence (AI) analytics and Solutions Company.
The acquisition accelerates the company’s leadership in providing AI and analytics, to make customers’ businesses more efficient and the world a safer place. The acquisition also includes research and development (R&D) capabilities and a new regional office located in Bangalore, India.
Embracing the benefits of touchless access using smartphones, Vanderbilt University expanded its investment into campus safety and security, by leveraging HID Mobile Access to deploy campus IDs on iPhone and Apple Watch via Apple Wallet.
The enhancement builds upon the university’s initial investment in mobile-enabled technologies from HID Global. These technologies capitalised on the ubiquitous nature of smartphones and mobile devices among students, 90 percent of whom reside on campus throughout their Vanderbilt education and faculty, to create a campus-wide identity and access management programme.
HID Mobile Access
The investment continues to pay dividends. “Keeping students safe is our top priority. HID Mobile Access was the optimal solution for protecting students and allowing Vanderbilt to move to a mobile solution for securely accessing our campus and services. The integration of campus IDs on iPhone and Apple Watch brings added convenience for our entire campus community,” said Mark Brown, Director of Business Services Technology with Vanderbilt University.
Mark Brown adds, “Beyond the convenience and security, two very important considerations, this mobile solution gives us the freedom to provision and modify credentials remotely, which has been significant for protecting the health of our students and staff, during the worst of the COVID-19 pandemic in 2020.”
Compatible with NFC and Bluetooth technologies
Vanderbilt initially tapped HID Global to implement a mobile credential solution compatible with NFC and Bluetooth
Vanderbilt initially tapped HID Global to implement a mobile credential solution compatible with Near Field Communication (NFC) and Bluetooth technologies. HID Mobile Access, powered by Seos credential technology, was deployed alongside a reader infrastructure, comprising HID Signo Readers, HID iCLASS SE readers, and OMNIKEY desktop readers, in order to manage access to buildings.
It complements the ecosystem by facilitating the usage of the already issued credentials for all other adjacent use cases. The solution allowed Vanderbilt administration to issue mobile credentials that let students, faculty, and staff access buildings and services with their mobile devices, as well as efficiently provision/de-provision credentials remotely, without person-to-person contact.
HID Reader Manager
Next, the university wanted to add support for credentials in Apple Wallet, without compromising the existing access infrastructure or its security. This was easily accomplished by using HID Reader Manager to upgrade firmware on the university’s physical access control readers, so as to extend support for NFC-based credentials in Apple Wallet.
The university uses the flexible HID Origo Mobile Identities API integrated with CS Gold, a higher education transaction system from CBORD, for credential lifecycle management.
Commodore campus ID cards
With campus IDs in Apple Wallet, students can complete any action that would have previously required a physical ID card, both on and off campus, with just their iPhone and Apple Watch. Students simply present their device to a reader to enter dorms, libraries, and fitness centres, buy lunch, make purchases at campus stores, and pay for laundry, print documents, and more.
The university’s Commodore campus ID cards on iPhone and Apple Watch provide an extra level of security
The university’s Commodore campus ID cards on iPhone and Apple Watch provide an extra level of security and privacy, so students do not need to worry about misplacing their physical card, when they are enjoying campus life. Transaction history is never shared with Apple or stored on Apple servers. If a student misplaces their iPhone or Apple Watch, they can use the Find My app to immediately lock their device and help locate it.
Safe and secure mobile access solution
HID Global is pleased to support Vanderbilt University in achieving its goal of delivering a safe, secure, and convenient mobile access solution, with the added flexibility of supporting the Apple Wallet platform.
With integrated HID Mobile Access, issuing credentials to new users is as easy as having them download the app, validate identity, and seamlessly add their credentials to Apple Wallet.
HID Global, a pioneer in trusted identity solutions announced that the Arcos Bosques Torre 1 (Tower 1) has deployed its access control solutions to heighten security and better manage visitor entry.
Located in the Bosques de las Lomas neighborhood of Mexico City, the center is comprised of six buildings. The complex includes two skyscrapers and is home to high-profile law firms, industrial, mining, media, and technology companies, and one of the city’s most recognised shopping centers.
HID readers and smart card technologies
With the help of system integrator Logen, Arcos Bosques Corporate Center chose HID Mobile Access® solutions as well as HID readers and smart card technologies for tenants and visitors to securely pass through its 16 turnstiles and use the 32 elevators that lead to their offices.
The HID solutions also give tenants the choice of using their mobile devices or physical smart cards for entry.
Touchless and safe entry
HID’s mobile access solution enables administrators to remotely manage credentials by cloud-based infrastructure “Accessing the building by simply presenting a mobile phone makes a lot of sense as we look for ways to eliminate touching things during the global pandemic,” said Santiago Morett, Project Manager at Servicon, facilities manager for Arcos Bosques.
“HID Mobile Access has given us touchless entry and safer building security, which is more important than ever for our tenants.”
Mobile access solution
HID’s mobile access solution also enables administrators to remotely create, issue, manage and revoke credentials through the cloud-based infrastructure.
Servicon, the facility management company for Arcos Bosques, now has continuous building access visibility through a unified, up-to-the-minute database of the tower’s tenant names, affiliated companies, and work locations.
"Building security today extends not only to who has access but also to how individuals can enter a facility,” said Harm Radstaak, Senior Vice President and Head of Physical Access Control Solutions with HID Global. “HID’s access control solutions provide the foundation for optimal oversight and control while also keeping people healthy and safe.”
RFID systems are widely used in hospitals and other medical facilities for contactless identification. For physical access control, or for visiting and documentation purposes, for example. The applications are mainly limited to hospital personnel, and their primary goal is to lower costs and expenses. But there are also many more potential uses for RFID in hospitals and these applications put the focus on patient comfort.
During their stay at the hospital, patients have access to numerous cost-based services and offerings: the cafeteria, drink vending machines, TV, and Internet access. For most patients, it is not convenient or comfortable to carry around cash. Switching these services to a cashless system makes sense in terms of both hygiene and theft prevention too. RFID enables contactless payments and authentication with the utmost convenience.
To position themselves internationally as a provider of RFID-enabled authentication solutions for hospitals, the readers/writers have to support the widest possible range of RFID technologies.
A win-win for personnel and patients
Both patients and personnel identify themselves at the terminal with their RFID badges or ID card
In ideal cases, potential uses of RFID for patients and personnel can even be combined. This is the case, for example, with multimedia terminals in patient rooms. Equipped with an RFID reader/writer, the terminals can be readily used by both parties. Both patients and personnel identify themselves at the terminal with their RFID badges or ID card.
Physicians can then access digital patient information and no longer need to carry around paper-based patient files. Patients can use the terminals to watch TV and have access to other entertainment and service offerings. A win-win situation.
The multi-frequency RFID readers in the TWN4 series from ELATEC recognise and read more than 60 RFID systems, including all standard card technologies worldwide.
RFID gives both personnel and patients convenient access to multimedia terminals and other offerings and services.
RFID badges and cards currently in use for other areas can also be used for the terminals.
Flexible multi-frequency RFID readers/writers
To develop optimal solutions for the particular application scenario, ELATEC offers manufacturers of multimedia terminals a wide range of high-performance and flexible multi-frequency RFID readers/writers for contactless authentication.
Each of the multi-frequency readers recognises and reads more than 60 different RFID card technologies, including all standard international systems. They are ideally suited for international use and are already approved for use in more than 110 countries. System integrators who equip their products and complete solutions with RFID readers can thereby benefit from a simpler and faster approval process.
It's a familiar problem for anyone who shops online: If a person doesn’t have any friendly neighbours to accept a package, it's very difficult for working people to receive a delivery. No success with follow-up delivery attempts either. In the end, the package lands at a service station that is neither close by nor has customer-friendly business hours.
In 2015 the Erwin Renz Metallwarenfabrik GmbH & Co KG, the supplier for the German and European letterbox industry, developed an electronic parcel box system with 24/7 availability to solve the package delivery problem once and for all. The myRENZbox can be used at private homes, businesses, and retailers. For maximum flexibility, the system was equipped with the RFID reader/writer TWN4 MultiTech 2 BLE from ELATEC.
The RFID reader/writer must be compatible with all standard card systems worldwide.
Users must also be able to authenticate themselves with smartphones.
TWN4 MultiTech 2 BLE supports more than 60 RFID technologies, including LEGIC, HID, and MIFARE.
Thanks to the reader's BLE extension, users can be conveniently authenticated by smartphone.
Authentication via RFID enables registered users to pick up and send packages at electronic parcel boxes around the clock.
Access is granted with RFID badges and cards or conveniently by smartphone.
Convenient access with badge, card, or smartphone
Renz needed a multifunctional all-in-one solution that could compatible with other authentication solutions
To achieve the most uncomplicated, fast, and contactless authentication possible, Renz needed a multifunctional all-in-one solution that could be used by package delivery services and recipients alike. It also had to be compatible with other authentication solutions: Existing badges and cards, e.g. for physical access control to buildings, secure printing, and the cafeteria, can also be used for myRENZbox.
And it should work worldwide since myRENZbox is sold around the world. In selecting the TWN4 MultiTech 2 BLE, Renz decided on a high-performance and multi-technology RFID reader/writer. The reader from ELATEC supports more than 60 card technologies, including all globally standard systems such as LEGIC, HID, and MIFARE. The BLE extension enables access to myRENZbox with badge or card as well as by smartphone.
TWN4 MultiTech 2 BLE
The TWN4 MultiTech 2 BLE reader is an all-in-one proximity reader for the following frequencies: 125 kHz, 134.2 kHz, 13.56 MHz, NFC and BLE.
Here’s a news flash: 2022 will be a pivotal year for the security industry. As we enter the new year, continuing change is a safe prediction for any fast-moving, technology-driven marketplace. Recent history confirms the ability of the security industry to shift and adapt to changing conditions and to provide an ever-expanding menu of technology solutions to make the world a safer place. Given that the new year will bring change, what will that change encompass? More to the point, what should it encompass? We asked this week’s Expert Panel Roundtable: What is the biggest change you would like to see within the security industry in 2022?
A new generation of security professional is waiting in the wings. They will be faced with unprecedented challenges, as they seek to transform the security marketplace to the ‘next level’. Technology changes ensure the market will be very different 10 years from now and the fresh labour pool will need to be able to meet the host of new challenges.
We asked our Expert Panel Roundtable: What exciting career opportunities in the security industry await the next generation?
Residential security and smart homes are rapidly changing facets of the larger physical security marketplace, driven by advances in consumer technology and concerns about rising crime rates. During the COVID-19 pandemic, many people spent more time at home and became more aware of the need for greater security.
As workplaces opened back up, returning workers turned to technology to help them keep watch over their homes from afar. We asked this week’s Expert Panel Roundtable: What are the trends in residential security in 2021?