Office security systems
SALTO Systems (SALTO) has introduced the XS4 Original+, the next generation of the world’s most flexible and reliable smart locking solution that features a beautiful design, with a sleek flat reader in two new colours. SALTO XS4 Original+ The new SALTO XS4 Original+ takes the trusted and proven flagship XS4 Original electronic lock product family and incorporates the latest technology, to accommodate access control needs of both today and tomorrow. Our customers, partners and users rel...
Vismo announces the rollout of what3words location technology on its global location monitoring and safety platform, to help organisations respond to incidents more effectively - and keep their employees as safe as possible. Vismo provides a proven, since 2012, resilient location monitoring and safety service to businesses, public sector organisations and NGOs, ensuring their travelling or remote employees can be located and protected while at work. It does this via the Vismo App, which is...
Kwikset, brand of Spectrum Brands, Inc. - Hardware & Home Improvement division, the globally renowned company in residential security solutions, announced the availability of the Home Connect 620, the company’s newest Z-Wave connected smart lock. Home Connect 620 smart lock The Home Connect 620, which offers a 10-button keypad with one-touch locking, is Kwikset’s first smart lock in the ‘Home Connect’ line. It is also the company’s first lock, featuring the la...
Brivo – a pioneer in cloud-based access control and smart building technologies – announces the release of anomaly detection in its flagship access control solution, Brivo Access. Anomaly detection is a patent-pending technology that uses advanced analytics with machine learning algorithms to compare massive amounts of user and event data to identify events that are out of the ordinary or look suspicious, and issues priority alerts for immediate follow up. With anomaly detection, bu...
Ava Security has launched the ability to use third-party sensors with Ava Aware Cloud, the open data platform for building and facilities intelligence. By merging video security with sensor technology, organisations can unlock the enhanced situational awareness of security along with facility management, staff well-being, and productivity. Open Ava Aware data platform Siloed unconnected systems are a big challenge for organisations seeking greater insights and better building security....
In the field of access control, face recognition has come a long way. Once considered too slow to authenticate people's identities and credentials in high traffic conditions, face recognition technology has evolved to become one of the quickest, most effective access control identity authentication solutions across all industries. Advancements in artificial intelligence and advanced neural network (ANN) technology from industry leaders like Intel have improved the accuracy and efficiency of fa...
Traka announced that the company has received LenelS2 factory certification for OnGuard access control solution, as a LenelS2 OpenAccess Alliance Program (OAAP) partner. Traka’s key and asset management system interfaces with the OnGuard access control system, and provides seamless, single-credential access to property secured by Traka. LenelS2 OAAP factory certification “Traka has completed the required factory testing at LenelS2, to validate the functionality of its interface to OnGuard. This partner interface provides regional security and control over important company assets,” said John Marchioli, Director of Strategic Alliances and OAAP Product Management at LenelS2. John Marchioli adds, “We look forward to their continued involvement in the LenelS2 OpenAccess Alliance Program.” Traka - LenelS2 partnership The combination of Traka and OnGuard allows companies to control access and permissions" “We’re excited about this latest certification with LenelS2. Our continued partnership ensures our mutual customers have the latest in innovative access management solutions,” said Wayne Stant, Product Director at Traka. Wayne Stant adds, “The combination of Traka and OnGuard allows companies to control access and permissions, monitored by OnGuard, to track who checks out vital keys and equipment. It simplifies and improves security, while reducing administration overhead.” Electronic key and equipment management solutions Traka provides electronic key and equipment management solutions, allowing organisations to secure, manage, and audit the use of their important physical assets, including facilities, equipment, machinery, and vehicles. Traka’s products can be used standalone or integrated with many of the world’s renowned access control systems.
Increasingly European enterprises must comply with regulations for establishing local residency of data and security infrastructure. HID Global now delivers its Public Key Infrastructure (PKI) as a Service (PKIaaS) with high availability and redundancy via a hybrid of data centres and cloud regions operated within the EU, enabling what it expects to be a growing number of European customers to simplify regulatory compliance. HID Global’s PKIaaS WHO: HID Global, whose cloud-based HID PKIaaS platform delivers the industry’s broadest range of automation capabilities for managing privately issued and publicly trusted certificates. Local EU data residency and service redundancy further enhance this control WHAT: Customers can choose for all data and cryptographic key material associated with HID Global’s PKIaaS to reside exclusively within the EU. By using multiple EU-based data centres and cloud regions, HID assures local residency without compromising high availability and redundancy. This includes both its preconfigured service for a dedicated issuing certificate authority (CA) and its customised Private Root PKI service. EU data residency WHY: PKI is a foundational security technology that has become difficult to manage and maintain in-house without adding the cost and complexity of dedicated, skilled staff. Outsourcing PKI solves the problem but must be accomplished without losing control of trusted assets. Local EU data residency and service redundancy further enhance this control while also making it easier for customers to comply with EU regulations. HOW: HID has delivered local data residency and service redundancy through a combination of Amazon Web Services (AWS) and hosted data centres at multiple locations throughout the EU. The infrastructure is used to deliver HIDs complete PKIaaS offering, across all certificate validation systems.
Hanwha Techwin announced a new intercom product, the TID-600R, that brings together the company’s high-quality camera functionality with audio features and analytics. The new intercom has multiple applications, from acting as a help point for queries and emergencies, to access control or seamless communication with a control room or a front desk reception. The SIP compliant TID-600R features a 2MP fisheye lens with a wide horizontal 180° field of view (114° vertical), low light performance (IR provides 16 feet/5 metres of infra-red illumination), and Wide Dynamic Range (WDR) for challenging lighting scenes. Additionally, the intercom is NDAA compliant. TID-600R uses The intercom is applicable across many different sectors, notably healthcare settings (where touchless access control is prioritised); car parks and transport settings (to improve visibility and communication); and office locations and residential settings (for a seamless entry and exit experience). The product goes beyond a simple intercom system to offer surveillance features that improve security, integration with VMS and NVRs and can act as part of wider video surveillance and access control setup. TID-600R offers a touchless call system, allowing individuals to simply raise their hand towards the device to initiate a call Easy touchless control In addition to the intercom’s push-button, the TID-600R offers a touchless call system, allowing individuals to simply raise their hand towards the device to initiate a call. Touchless entry and exit solutions have become increasingly important post-COVID, reducing the risk of infection and cleaning needs. The touchless option can be easily switched on and off via the intercom’s intuitive user interface. Visual features The cameras within the intercom can also hand over events to other cameras in a security system to boost security and safety - for example during nighttime or when a building is unattended. This feature can be used to move a PTZ camera to point automatically at an entrance if someone is detected in front of it by the intercom camera. Similarly, intelligent analytics such as line crossing, loitering, object classification, and more can add further insights for operators. All camera footage can be stored in a VMS or NVR for easy retrieval and analysis post-event. Along with edge storage available in the device itself through a Micro SD card slot. This makes the TID-600R more flexible and useful than a traditional intercom device as it provides additional entry/exit data and automation. Audio features Sound classification analytics offers extra situational awareness to operators The intercom’s built-in speaker and microphone provide excellent call clarity with up to 85dB of volume at 0.5m, echo cancellation and noise reduction. Users can program audio messages to automatically play when a call is initiated or someone enters the field of view. Sound classification analytics (detecting glass breakage, screen explosion, and gunshots) offers extra situational awareness to operators. SIP 2.0 support The TID-600R offers full SIP 2.0 support making it easy to integrate with existing VoIP systems. When a person interacts with the intercom, multiple phones at any location can be contacted simultaneously through the VoIP system, so the intercom will always be answered. It can also easily integrate with PBX servers. Environmental protection With an attractive metal casing in white or dark grey, the TID-600R is externally robust and utilises tamper and shock detection analytics and alarms to notify operators of any potential tampering. To fit in with a building’s aesthetics, the intercom comes with an additional range of mounts and other accessories Its IP65 and IK08 classifications and NEMA 4 X enclosures fully protect the device from dust, water, and other potential environmental damage, prolonging the lifetime and quality of the intercom. To fit in with a building’s aesthetics, the intercom comes with an additional range of mounts and other accessories. Compatibility and security The TID-600R intercom facilitates an open platform that can support edge-based third-party applications. There is additional API support with the Hanwha SUNAPI SDK and it supports ONVIF Profile S. Additionally it can be used with the Wisenet PoE extender camera range reducing the need for additional network cabling and LAN ports. Uri Guterman, Head of Product & Marketing at Hanwha Techwin Europe, “The TID-600R intercom is the first product of its kind in the Hanwha Techwin portfolio bringing our market-leading camera and video analytics technologies to an intercom product. We’re excited to be able to offer customers a more extended solution that spans across video surveillance, access control, and communication, and benefits from Hanwha Techwin’s extensive industry experience.”
PSA Security Network, the globally renowned consortium of professional systems integrators, has announced its partnership with Zenitel, an international provider of intelligent communication solutions and products. This new partnership agreement will provide PSA Security Network’s members and owners, an opportunity to work with Zenitel directly. PSA - Zenital partnership Our partnership with Zenitel is a major step in the convergence of technologies between the sound/audio and security industries" “While PSA owners and members have long been able to purchase Zenitel products in the PSA network, our new partnership will allow them another channel to purchase Zenitel products,” said Chris Salazar-Mangrum, PSA Security Network’s Vice President (VP) of Technology Partners. Chris adds, “Our partnership with Zenitel is a major step in the convergence of technologies between the sound/audio and security industries.” Zenitel intelligent communication solutions Zenitel intelligent communication solutions have been available to the PSA members and owners through other technology partner agreements, and will continue to be available through those partners. Specifically adding Zenitel to the PSA network of technology partners increases the opportunity of the network, to be exposed to the communication offerings for Zenitel’s intelligent communication systems. Zenitel's primary system offering is within IP public address, intercom and radio disciplines. “The PSA/Zenitel partnership is a powerful combination for the security industry,” said Dan Rothrock, President of Zenitel Americas, adding “We are excited about this opportunity to expand our reach into an industry-leading buying group and to give them a personal look at our product portfolio that allows people to hear, be heard and be understood, in every situation.” Video surveillance, access control and audio Zenitel believes that modern security systems should involve video surveillance, access control and audio, to offer well-rounded and responsive information management, and security platforms, all communicating with each other, and providing actionable insight into risks, and potential physical breaches. Audio is the new value hub of the connected enterprise. Simply put, a silent security system cannot be an effective security system.
Aqua Security, a globally renowned pure-play cloud native security solutions provider, has announced a strategic investment from Capital One Ventures, together with the appointment of Capital One’s Chief Information Security Officer, Chris Betz to Aqua’s Executive Advisory Board. Cloud native security solutions The announcement further validates Aqua Security’s leadership as a cloud native security solution provider for financial services providers. Aqua Security has more than doubled its revenue in financial services, in the past 12 months and counts 10 of the top 20 banks in the world, among its customers. “Threat actors are shifting their focus to the Cloud, and heavily regulated industries, like financial services, need to prioritise cloud native security, to reduce risk and meet compliance requirements,” said Jay Emmanuel, Partner at Capital One Ventures. Cloud native application protection platform We are thrilled to partner with Aqua at a pivotal moment in this high-growth industry" Jay Emmanuel adds, “Aqua is a leader and innovator in the industry, and a strong, full-life-cycle cloud native application protection platform in the market. We are thrilled to partner with Aqua at a pivotal moment in this high-growth industry.” “I’m super excited to be joining the Executive Advisory Board at Aqua,” said Chris Betz, adding “One of the most powerful approaches to cyber security is to focus on making the secure way the easy way. This is where Aqua is a game-changer, particularly when it comes to cloud native security. I’m looking forward to working with the Aqua team to think about the unique cyber security challenges we face in the financial sector.” Series E funding enables explosive growth Following a US$ 135 million Series E funding round in March 2021, Aqua Security has experienced explosive growth, doubling its install base. Aqua Security now serves more than 25 per cent of the Fortune 100 companies and recently expanded into new key markets, including Federal, Asia Pacific, and Australia. “Our full-life-cycle approach to cloud native security is the driver behind our company’s rapid growth,” said Dror Davidoff, the Chief Executive Officer (CEO) and Co-Founder of Aqua Security. Investment from Capital One Ventures Dror Davidoff adds, “Many vendors claim they offer full cloud native security, but in reality, the ‘security’ is missing. They only offer visibility. With the additional support of Capital One, we will continue to make the Cloud, a safer place for enterprises.” Preparing for its next phase of growth, Aqua Security bolstered its executive leadership with four new C-suite appointments, in recent months, including Limor Schwartz as Chief Financial Officer, Christopher Smith as Chief Revenue Officer, the company’s first-ever Chief Customer Officer, Sharon Eilon, and first-ever Chief Marketing Officer, Matt Richards. Together, these industry veterans will help the company continue to accelerate its financial and customer growth.
In 2013, the Technical Group False Alarms (TG FAS) of the Fire Section began its work to better understand the causes and the data behind false alarms in fire detection and fire alarm systems. Since then, the Technical Group published reports and in 2018 published Euralarm’s first book; a study on the data analysis and collection methodology in selected European countries. The TG FAS is in its final stages to publish an update of the study. On December 16th, the Technical Group will conduct a Webinar. False alarms from fire detection and fire alarm systems is a topic that Euralarm's Technical Group False Alarm is working on since 2013 and that resulted in publishing a book covering a 3-year study of the risk-based understanding of the topic in various European countries. False alarms The TG FAS also released the Fact Sheet 'Increase fire safety by understanding false alarms' Based on the carefully examined facts and statistics the study also contains recommendations and strategies for false alarm reduction. One of the recommendations was to integrate the topic of false alarms into fire protection and fire alarm strategies as well as how to handle false alarms as an active part of the management of a site. However, the false alarm topic continues to accompany the fire safety industry. Although much has been achieved the statistics show that there is a sizable potential for continuous improvement. Therefore, the Fire Section of Euralarm agreed to continue its study. The TG FAS is in its final stages to publish an update of the study. Prior to the update of the book, the TG FAS also released the Fact Sheet 'Increase fire safety by understanding false alarms' with practical measures to avoid false alarms. Preliminary program On December 16th the TG FAS will conduct a free webinar on the topic of False Alarms. Both the study and the Fact sheet will be on the webinar program. The preliminary program is as follows: 15.00 Opening and welcome 15.05 Introduction on the topic of false alarms and the relevance of false alarms Martin Harvey, President Euralarm 15.10 Fire safety-related activities in DG GROW HeikkiVäänänen, Policy Officer DG GROW, EC 15.20 Impact of false alarms on the alarm responders Michaël Bertels, Ph.D., European Fire Safety Alliance 15.30 Overview of the activities and the study Dr Sebastian Festag, Euralarm, chair TG FAS 16.00 Strategies to reduce false alarms and lessons learned, Fact Sheet Lance Rütimann, Chair Euralarm Section Fire 16.20 Discussion and conclusion Paul van der Zanden, General Director Euralarm 16.45 Closing of webinar One can register for the webinar on the False Alarm Study via the Euralarm website.
Intrusion alarm systems are currently facing a growing number of potential error sources in the environment. At the same time, alarm systems must comply with increasingly demanding legal requirements for sensors and motion detectors. As a future-proof solution, detectors equipped with Sensor Data Fusion technology raise the level of security while reducing the risk of cost- and time-intensive false alarms. This article provides a comprehensive overview of Sensor Data Fusion technology. Anti-masking alarms A cultural heritage museum in the South of Germany for decades, the installed intrusion alarm system has provided reliable protection on the premises. But suddenly, the detectors trigger false alarms every night after the museum closes. The system integrators are puzzled and conduct extensive tests of the entire system. When they finally identify the culprit, it’s unexpected: As it turns out, the recently installed LED lighting system in the museum’s exhibition spaces radiates at a wavelength that triggers anti-masking alarms in the detectors. Not an easy fix situation, since a new lighting system would prove far too costly. Ultimately, the integrators need to perform extensive detector firmware updates and switch to different sensor architecture to eliminate the error source. This scenario is by no means an isolated incident, but part of a growing trend. Need for reliable detector technology Legal requirements for anti-masking technology are becoming stringent in response to tactics by criminals The number of potential triggers for erroneous alarms in the environment is on the rise. From the perspective of system operators and integrators, it’s a concerning development because every false alarm lowers the credibility of an intrusion alarm system. Not to mention steep costs: Every false call to the authorities comes with a price +$200 tag. Aside from error sources in the environment, legal requirements for anti-masking technology are becoming more stringent in response to ever more resourceful tactics employed by criminals to sidestep detectors. What’s more, today’s detectors need to be fortified against service outages and provide reliable, around-the-clock operability to catch intruders in a timely and reliable fashion. Sensor Data Fusion Technology In light of these demands, one particular approach has emerged as a future-proof solution over the past few years: Sensor Data Fusion technology, the combination of several types of sensors within one detector – designed to cross-check and verify alarm sources via intelligent algorithms – holds the keys to minimising false alarms and responding appropriately to actual alarm events. This generation of detectors combines passive infrared (PIR) and microwave Doppler radar capabilities with artificial intelligence (AI) to eliminate false alarm sources without sacrificing catch performance. Motion detectors equipped with Sensor Data Fusion technology present a fail-proof solution for building security “It’s not about packing as many sensors as possible into a detector. But it’s about including the most relevant sensors with checks and balances through an intelligent algorithm that verifies the data for a highly reliable level of security. The result is the highest-possible catch performance at the minimum risk for erroneous alarms,” said Michael Reimer, Senior Product Manager at Bosch Security Systems. Motion detectors with sensor data fusion Looking ahead into the future, motion detectors equipped with Sensor Data Fusion technology not only present a fail-proof solution for building security. The comprehensive data collected by these sensors also unlock value beyond security: Constant real-time information on temperature and humidity can be used by intelligent systems and devices in building automation. Integrated into building management systems, the sensors provide efficiency improvements and lowering energy costs Integrated into building management systems, the sensors provide the foundation for efficiency improvements and lowering energy costs in HVAC systems. Companies such as Bosch support these network synergies by constantly developing and optimising intelligent sensors. On that note, installers must be familiar with the latest generation of sensor technology to upgrade their systems accordingly, starting with a comprehensive overview of error sources in the environment. Prominent false alarm triggers in intrusion alarm systems The following factors emerge as frequent triggers of false alarms in conventional detectors: Strong temperature fluctuations can be interpreted by sensors as indicators of a person inside the building. Triggers range from floor heating sources to strong sunlight. In this context, room temperatures above 86°F (30°C) have proven particularly problematic. Dust contamination of optical detectors lowers the detection performance while raising susceptibility to false alarms. Draft air from air conditioning systems or open windows can trigger motion sensors, especially when curtains, plants, or signage attached to the ceilings (e.g. in grocery stores) are put in motion. Strong light exposure directly on the sensor surface, e.g. caused by headlights from passing vehicles, floodlights, reflected or direct sunlight – all of which sensors may interpret as a flashlight from an intruder. Extensive bandwidth frequencies in Wi-Fi routers can potentially confuse sensors. Only a few years ago, wireless routers operated on a bandwidth of around 2.7GHz while today’s devices often exceed 5GHz, thereby catching older detectors off guard. LED lights radiating at frequencies beyond the spectrum of visible light may trigger sensors with their infrared signals. Regarding the last two points, it’s important to note that legislation provides clear guidelines for the maximum frequency spectrum maintained by Wi-Fi routers and LED lighting. Long-term security But the influx of cheap and illegal products in both product groups – products that do not meet the guidelines – continues to pose problems when installed near conventional detectors. For this reason, Sensor Data Fusion technology provides a reliable solution by verifying alarms with data from several types of sensors within a single detector. Beyond providing immunity from false alarm triggers, the new generation of sensors also needs to comply with the current legislature. These guidelines include the latest EN50131-grade 3, and German VdS class C standards with clear requirements regarding anti-masking technology for detecting sabotage attempts. This is exactly where Sensor Data Fusion technology provides long-term security. Evolution of intrusion detector technology Initially, motion detectors designed for intrusion alarm systems were merely equipped with a single type of sensor; namely passive infrared technology (PIR). Upon their introduction, these sensors raised the overall level of building security tremendously in automated security systems. But over time, these sensors proved limited in their catch performance. As a result, manufacturers began implementing microwave Doppler radar capabilities to cover additional sources of intrusion alarms. First step detection technology In Bosch sensors, engineers added First Step detection to trigger instant alarms upon persons entering a room Over the next few years, sensors were also equipped with sensors detecting visible light to catch flashlights used by burglars, as well as temperature sensors. In Bosch sensors, engineers added proprietary technologies such as First Step detection to trigger instant alarms upon persons entering a room. But experience in the field soon proved, especially due to error sources such as rats and other animals, that comprehensive intrusion detection demands a synergetic approach: A combination of sensors aligned to cross-check one another for a proactive response to incoming signals. At the same time, the aforementioned bandwidth expansion in Wi-Fi routers and LED lighting systems required detectors to implement the latest circuit technology to avoid serving as ‘antennas’ for undesired signals. Sensor data fusion approach At its very core, Sensor Data Fusion technology relies on the centralised collection of all data captured by the variety of different sensors included in a single detector. These data streams are directed to a microprocessor capable of analysing the signals in real-time via a complex algorithm. This algorithm is the key to Sensor Data Fusion. It enables the detector to balance active sensors and adjust sensitivities as needed, to make truly intelligent decisions regarding whether or not the data indicates a valid alarm condition – and if so, trigger an alarm. Advanced verification mechanisms The current generation of Sensor Data Fusion detectors, for instance from Bosch, feature advanced verification mechanisms, including Microwave Noise Adaptive Processing to easily differentiate humans from false alarm sources (e.g. ceiling fans or hanging signs). For increased reliability, signals from PIR and microwave Doppler radar are compared to determine whether an actual alarm event is taking place. Additionally, the optical chamber is sealed to prevent drafts and insects from affecting the detector, while the detector is programmed for pet and small animal immunity. Sensor cross-verification Further types of sensors embedded in current and future generations of Sensor Data Fusion detectors include MEM-sensors as well as vibration sensors and accelerometers. Ultimately, it’s important to keep in mind that the cross-verification between sensors serves to increase false alarm immunity without sacrificing the catch performance of actual intruders. It merely serves to cover various indicators of intrusion. Protecting UNESCO World Cultural Heritage in China Intelligent detectors equipped with Sensor Data Fusion are protecting historic cultural artifacts in China from theft and damage. At the UNESCO-protected Terracotta Warriors Museum site, one hundred TriTech motion detectors from Bosch with PIR and microwave Doppler radar technology safeguard the invaluable treasures against intruders. To provide comprehensive protection amid the specific demands of the museum site, the detectors have been installed on walls and ceilings to safeguard the 16,300-square-meter museum site. To ensure an optimal visitor experience without interference from glass walls and other barriers, many detectors are mounted at a height of 4.5 meters (15 feet) above ground under the ceiling. Despite their height, the detectors provide accurate data around the clock while exceeding the performance limits of conventional motion detectors, which clock out at a mere 2 meters (6 feet) catchment area. Integrated video systems The site also presents additional error sources such as large amounts of dust that can contaminate the sensors, as well as visitors accidentally dropping their cameras or mobile phones next to museum exhibits. To distinguish these events from actual criminal activity, the intrusion alarm system is integrated with the museum’s video security system. This allows for verifying alarm triggers with real-time video footage at a fast pace: In the case of an actual alarm event, the system alerts the on-site security personnel in the control room in less than two seconds. Added value beyond security Sensor Data Fusion technology provides a viable solution for the rising number of error sources in the environment As of today, Sensor Data Fusion technology already provides a viable solution for the rising number of error sources in the environment while providing legally compliant building security against intruders. In light of future developments, operators can leverage significant added value from upgrading existing systems – possibly without fundamentally replacing current system architecture – to the new detector standard. Added value how? On one hand, the detectors can integrate with access control, video security, voice alarm, and analytics for a heightened level of security. These synergetic effects are especially pronounced on end-to-end platforms like the Bosch Building Management system. On the other hand, the data streams from intelligent detectors also supply actionable intelligence to building automation systems, for instance as the basis for efficiency improvements and lowering energy consumption in HVAC systems. New backward-compatible detectors Bosch will release a new series of commercial detectors by end of 2021, based on the latest research on risk factors for false alarm sources in the environment and line with current legislation and safety standards. Throughout these developments, installers can rest assured that all new detectors are fully backward compatible and work with existing networking/architecture. With that said, Sensor Data Fusion technology emerges as the key to more secure intrusion alarm systems today and in the future. TriTech detectors from Bosch For reliable, fail-proof alarms the current series of TriTech detectors from Bosch relies on a combination of different sensor data streams, evaluated by an integrated algorithm. These Sensor Data Fusion detectors from Bosch combine up to five different sensors in a single unit, including: Long-range passive infrared (PIR) sensor Short-range PIR sensor Microwave sensor White light sensor Temperature sensor Equipped with these sensors, TriTech detectors are capable of detecting the most frequent sources of false alarms; from headlights on passing cars to a mouse passing across the room at a 4.5-meter distance to the detector. What’s more, TriTech detectors provide reliable performance at room temperatures above 86°F (30°C) while fully guarding against actual intrusion and sabotage attempts from criminals.
From analogue to digital, from stand-alone to interlinked, building systems are in a state of transition. Moreover, the rate of change shows no sign of slowing, which can make it difficult to keep up to date with all the latest developments. If asked to pinpoint the single biggest driver of this revolution, one could point out the growing clamour for platform convergence. A security guard in a building doesn’t want to use different systems to check video cameras, fire alarms or if someone has entered a restricted area: – it simply isn’t efficient. For similar reasons, a building manager wants a single interface to control heating and lighting to match fluctuating occupancy levels, particularly in a hybrid working model. Applying the digital glue The demand from end-users for system convergence is growing, but to achieve full interoperability you still need to apply some ‘digital glue’ and that requires expertise. Yet bringing together disparate systems from different manufacturers can be problematic. Just as you get things to work, someone upgrades their solution and your carefully implemented convergence can start to come unstuck. Managing an implementation can quickly become more complicated, today’s quick-fix can become tomorrow’s headache This is one of the principal issues with all types of new technology; not everyone will choose the same path to reach the desired goal – it’s the old VHS/Betamax argument updated for building management and security systems. Managing and maintaining an implementation can quickly become more complicated than it first appears and without proper oversight, today’s quick-fix can become tomorrow’s technical headache. Effective support for a hybrid workforce Today’s hybrid workforce is a response to the pandemic that looks set to become an established part of working life for many companies across the world. Security systems have a massive role to play in facilitating this transformation that goes beyond simple intrusion detection, access control, and video monitoring. They can identify the most densely populated areas in a building to comply with social distancing guidelines and provide efficient use of space. The insights gathered from a security system can also be used to identify patterns of behaviour, which can then be used for planning and directing the use of building space to help create the best possible working environment while also minimising heating, lighting, and air conditioning expenditures. Identity credentials can help manage compliance with industry regulations by limiting access to certain areas Similarly, identity credentials – either biometric or mobile-based – can help manage compliance to industry regulations by limiting access to certain areas only to approved employees. Creating and maintaining the appropriate level of functionality requires a combination of innovative solutions and industry experience. The complete security package It’s not just physical security that’s important – cybersecurity is a major focus, too. Bringing together both the physical security and cybersecurity realms is increasingly becoming a ‘must have’ capability. What is evident is that the pace of technological change is faster than ever. Today’s functionality simply wouldn’t have been possible just a few years ago, while today’s leading-edge developments may seem commonplace in five years.
The ‘new normal’ was all we heard about when it came to the working model shift after the pandemic hit. Businesses worldwide adopted working from home, and then the hybrid model: a balance of remote work and office work. And according to a recent survey by 451 Research, nearly 80% of organisations surveyed said they have implemented or expanded universal work-from-home policies as a result of COVID-19, whilst 67% expect these policies to remain in place either permanently or for the long-term. With more vacant office spaces, the question is: is hybrid working a red flag for business security? Empty-office days When buildings and office spaces are still active with advanced technology, equipment and assets on show, yet footfall is not as busy as it once was, opportunistic criminals are closely watching and taking note. But what are they learning? Security systems provider, Expert Security UK, investigates our new normal. Offices are nests for expensive, valuable equipment, with maybe the latest technology Instead of a packed, busy office five or six days a week, hybrid working means more empty-office days, which is music to the ears of burglars. Offices are nests for expensive, valuable equipment, with maybe the latest technology and safes sitting there, or potential stacks of cash or company cards. You may be thinking, well, who leaves company cards or cash out? You’d be surprised, especially when business owners think they’ll never be a victim, or sometimes, staff make mistakes. Hybrid working model And don’t forget, burglars don’t always know what’s been left and will take their chances. And when a hybrid working model is the ‘new normal’, that means a lapse in security - at least in a thief’s mind. So how worried should business owners be? Well, the latest figures are pretty worrying, but also, not massively shocking. Reiterating the temptation and lure the working model shift has on robbers, Statista recorded a 12-year high for robbery offences in the UK in 2019/2020. When more businesses either shut up shop or sent staff away to home offices, it’s not hard to make a connection. These figures reflect how, when given the opportunity, thieves will strike and take advantage. Handing vital information Whether you’ve decided to go fully remote, it’s crucial to review and rethink your business security However, it’s worth noting that the lockdowns and empty streets would also have played a part in this spike, and now that we’re out of lockdowns with a world back to flipping its sign to ‘open’, many businesses will be carrying on working from home, but towns, shops, and streets are busy again. Whether you’ve decided to go fully remote, or have adopted the hybrid model, it’s crucial to review and rethink your business security, starting with your social media presence. It’s a good idea to review your social media channels. We forget how open we can be on social media, and how our digital presence can actually work as a perfect guide and insight for criminals. All they have to do is follow your channels to pick up on clues. And if you’re not giving it a minute’s thought about what you're putting out there, you may even be just handing them vital information and helping their plans. Remote working shift Of course, there is information readily available such as your opening times, location etc. But, do you really want/need to show off the new, state-of-the-art tablets you’ve just kitted your office out with? It can be hard as a business, or even as a social person, to not want to share positive news on social media, but we really do have to stop and think, especially if people know a lot about the company and its remote working shift. It’s also a good idea to have a meeting with your staff about a social media policy Maybe share a post about that new, intelligent security system you've installed instead. It’s also a good idea to have a meeting with your staff about a social media policy or maybe just a casual chat about best practices, e.g. not to tag the business in a post about their new office gadget etc. Improving business security With fewer office days, you probably won’t need to take up as much work space anymore. Maybe some equipment has become more ornamental. Anything you don’t use or need, you could sell or donate. If you do have expensive equipment lying around that’s not being used, try and make money back from it or store it elsewhere. If you are keeping a lot of expensive equipment in vacant premises, especially fixed equipment and technology, then consider installing bars and shutters over the windows. Whatever your budget, you can improve your business security tenfold with key security measures. One of them being access control. Security gates with access control are incredibly effective at stopping unauthorised people from gaining entry. There are also car park barriers and bollards that are highly effective at keeping any potential getaway vehicles out. Easily portable technology High-quality CCTV is a best friend to any business, but you need to be reviewing it frequently High-quality CCTV is a best friend to any business, but you need to be reviewing it frequently, especially if you’ve done a perimeter check and noticed any signs of forced entry or damage. Don’t forget those signs either, let visitors or trespassers know they’re on camera. To fit in with the hybrid working model, static fixtures are becoming redundant. For instance, companies are switching to laptops instead of computers, so that workers can transport them easily to and from the office. This is not only more efficient and convenient, but it means assets are more guarded. It’s the same for any other gadgets. Having easily portable technology is good for business, hybrid working, and security. Don’t forget about your deterrents. Simple signs to warn people of alarms, CCTV, and even the fact that you don’t leave equipment inside overnight can go a long way. Best security technology Thieves are famous for taking their chances. Some will meticulously plan, and many strike at a convenient, opportune time. So having signs in place that show you have high-quality, intelligent security in place can work wonders, making them think twice. It’s also worth noting that you may not have the best security technology in place at the moment, but those on the outside don’t need to know that; they can be fooled. However, having the best physical security in place is vital, as criminals lurk and will take chances. Keep reviewing your security, especially as your business adapts and reshapes - whether you return back to full office days or carry on the hybrid working model. This guest post was contributed by Danny Scholfield, Managing Director of Expert Security UK.
It’s been almost exactly a decade since HID Global launched the world's first university pilot of smartphones carrying secure mobile IDs. A lot has changed in the following 10 years. Today’s technology has matured, advanced, and proliferated across a variety of high-value use cases. To catch up on the latest developments in mobile access, we contacted Luc Merredew, Product Marketing Director, Physical Access Control, at HID Global. Q: What has changed since the first pilot implementation of smartphones used for secure mobile identification? Merredew: One of the biggest milestones several years ago was when mobile access solutions achieved certification to the ISO 27001:2013 Information Security Management System (ISMS) standard. With increasing awareness of cloud-based security threats and resulting high expectations from a solution, today’s system owners, operators, and users insist on companies being able to demonstrate that they have had their services vetted by independent laboratories and/or agencies. When adopting mobile access solutions that maximise convenience and efficiency, and deliver dramatically improved user experiences, it is neither necessary nor acceptable to compromise security in either the physical or digital domains. Q: Do universities continue to be the biggest users? Mobile IDs on devices eliminate person-to-person credentials when accessing secured areas Merredew: The use cases have grown dramatically, spread evenly across all types of organisations in locations ranging from high-rise buildings to multi-campus global enterprises. But yes, universities continue to be big adopters, and they were among those most eager to leverage the technology so they could bring people back to campus in person during the pandemic. In this environment, mobile IDs on smartphones and other devices eliminate person-to-person credential (e.g., badge or ID card) issuance or revocation, as well as the need to physically touch cards, readers, or keypads when accessing secured areas. Q: How were mobile IDs employed by your customers as they brought people back to physical locations after the pandemic shutdown? Merredew: One example is Vanderbilt University, where the challenges of COVID-19 brought renewed attention to the importance of a modern system for identity management and access control that was compatible with Near Field Communication (NFC) and Bluetooth technologies. Members of the campus community could more conveniently access buildings and services with their mobile devices, and the university could efficiently provision and de-provision credentials remotely without person-to-person contact. More recently, Vanderbilt leveraged HID Mobile Access® to deploy campus IDs on iPhone and Apple Watch through Apple Wallet. Q: Is there another example outside the university vertical? Merredew: Another example is the iconic tower Arcos Bosques Torre 1 in Mexico City, where the owners and tenants enjoy the simplicity of using their trusted mobile devices to seamlessly access their spaces. As with the Vanderbilt deployment, the drive for operational efficiency and convenience in the tower was combined with a desire to minimise the need for users to come in physical contact with the system. Having a solution like HID Mobile Access that delivers touchless entry and increased safety and security is important. Q: What have been the biggest mobile access advancements? The mobile credential provides contactless, seamless access to a wide range of devices and services Merredew: One of the most important advancements was simplifying upgrade paths to mobile access. In the Vanderbilt example, our HID Reader Manager was used to upgrade the firmware on the university’s physical access control readers and extend support for NFC-based credentials in Apple Wallet. The university uses the HID Origo™ Mobile Identities API integrated with CS Gold®, a higher education transaction system from CBORD, for credential lifecycle management. Another significant enhancement has been the expanded range of uses cases for the mobile credential, going beyond simply opening doors to include providing contactless, seamless access to a wide range of devices and services such as time-and-attendance terminals, cashless vending machines, printers, computers, workstations, and many other applications. Q: Wearables are also having an impact. Merredew: Contactless mobile experiences are also delivered through wearable wristbands. One example is the Nymi band which, once authenticated, continuously authenticates the identity of the user until it’s removed from the wrist. This delivers zero-trust security principles and access control using convenient fingerprint and heartbeat biometrics to users seeking touchless authentication. Q: What is the impact of the cloud? Merredew: The move to a cloud-based system to issue and manage mobile identity credentials has unified, automated, and simplified identity issuance at a single facility or across any number of distributed office or remote work locations. Q: What should end users look for in a mobile access solution? Look for solutions that use a secure element in the reader as well as cloud certificates, to ensure security and data privacy Merredew: Solutions should support the largest possible number of popular mobile devices – in HID’s case, this includes more than 250. Look for solutions that use a secure element in the reader, and a secure key management process, as well as cloud certificates, to ensure both security and data privacy. Make sure the solution supports Bluetooth Low Energy (BLE), Near Field Communication (NFC), and both iOS and Android operating systems. Solutions that provide Application Programming Interface (API) and Software Development Kit (SDK) support offer direct access to the solution’s access control hardware, speeding deployment while enabling integration partners to continue innovating products that deliver even better user experiences. Q: Wonder what this market will look like in 10 more years. What’s next for mobile access? Merredew: Future innovations are on the horizon with technologies such as Ultra-Wideband (UWB) wireless connectivity, which HID expects will become ubiquitous on mobile devices. It provides unprecedented accuracy and security when measuring the distance or determining the relative position of a target. It is not HID’s expectation that UWB will replace Near Field Communication (NFC) or Bluetooth, but rather supplement Bluetooth and other technologies to provide the assurance, reliability, and granularity of device position that enables truly seamless experiences.
Many venues are using access control, video surveillance systems, sensors, and additional hardware solutions as part of a broader security strategy. By utilising so many disparate systems, corporate security teams are left with information “silos” that create inefficiencies and hamper communication. This abundance of hardware has left teams with too much data or too many tools, to manage effectively. Armored Things offers a software solution. The company’s “spatial intelligence platform” currently collects more data than other security intelligence solutions, utilising a broader range of sources and fusing data together rather than integrating it. The platform currently focuses on taking in data from WiFi, access control, and video surveillance systems and applying machine learning to deliver customers features such as real-time predictive analytics to prevent incidents like bottlenecks or overcrowding. Spatial Intelligence is an approach to physical security that enables users to collect, manage, and interpret data in a single platform. Combine machine learning with data The term can best be used to describe how digital transformation has affected physical security. Spatial Intelligence in its infancy looked like video surveillance data combined with machine learning to produce video analytics. The spatial intelligence solutions of today can combine machine learning with data of any source, type, and size to deliver value across a large organisation, not just the security team, says the company. Armored Things’ Spatial Intelligence platform unifies data from information silos to support data-driven decisions around operations and security. By fusing data from multiple sources, we can produce more consistent and useful insights for our customers” A suite of analytics, reporting and visualisation tools helps customers gain a real-time understanding of people and flow in their space. By removing the guesswork of everyday decisions, the product enables customers to make data-driven decisions at a moment’s notice, according to the company. Armored Things is more than a data management tool. “By fusing data from multiple sources (rather than only cameras or only WiFi), we can produce more consistent, accurate, and useful insights for our customers,” says Kevin Davis, Chief Security Officer at Armored Things. "Being able to collect the data is the first step, but turning it into actionable intelligence is where Armored Things excels.” IP cameras and other IoT-enabled devices The range of data sources includes IP cameras and other IoT-enabled devices and even outside data sources like bus schedules and weather reports. Armored Things has built a team of public safety and technical experts with the mission to keep people safe where they live, work, and play. By leveraging emerging technology to enhance physical security, the company built the software-centric Spatial Intelligence Platform for large organisations to enhance the safety and operations of their space. Schools and education facilities are among the customers that can benefit. The leadership at Armored Things cares deeply about school safety, so the recent epidemic of campus violence has definitely been a large topic of conversation, according to the company. “By delivering our products to a greater number of customers, Armored Things hopes to continue making schools a safe place to learn and gather,” says Davis. Recently, there was a significant bottleneck lasting nearly 30 minutes at the Syracuse-Clemson football game. Unifying data into one platform Digital transformation is disrupting the way our customers think about physical security,” Using Armored Things technology and providing real-time data to security and operations personnel could have identified the bottleneck as it began to form. This would have notified relevant personnel, who could have taken steps to mitigate the problem before it turned into a security risk. Keeping the security infrastructure simple is imperative to success. Integrating a software solution into the security strategy shouldn’t complicate existing operations, says the company. “Armored Things Spatial Intelligence Platform can bring your security and operations into focus by unifying all of your data into one platform for ease of use,” says Davis. For this reason, the team chose to integrate not only with customers’ existing security infrastructure but with non-traditional data sources (e.g. WiFi, event schedules, ticketing) as well. “By combining and analysing a more diverse dataset, Armored Things can help our customers make better decisions with deeper data-driven insights,” says Davis. "Digital transformation is disrupting the way our customers think about physical security,” says Davis. “As a team, our aim is to help our customers adapt to the digital age, as they transition from hardware to software-centric security solutions. Fostering organisational change is difficult, and our team hopes to make the transition process easier for our customers.”
How’s this for a simple access control scenario? You walk up to a door, wave your hand in front of a button, the button lights up, and the door opens. That’s the simplified user experience that startup Openpath is promoting as it enters the crowded and mature market for physical access control. Openpath says a simple user experience provides the extra boost needed for mobile credentialing to gain momentum. In this case, it’s even simpler than using a card credential (no searching in a bag or purse for the card). And there’s no personal identification number (PIN) code to remember; no “intrusive” biometric element that can concern some users. James Segil, President and Co-Founder of Openpath, says the simplified process “uses fewer thought cycles.” Reliability of the system comes from Openpath’s SurePath triple-connect technology “We wanted to make mobile access control that people want to use and can use safely and with ease,” he says. “We wanted to make using a smart phone for access control easier and more reliable than using a keycard.” Simplified user operation In the simplified scenario, the mobile credential resides on a smart phone that can remain tucked away in the user’s purse or pocket. The credential remains active without the user needing to open an app. The wave of the hand signals intent, which causes the button to light up, activate and the door is ready to open. Segil says the simplicity of operation has contributed to the system seeing an unheard-of 94% adoption rate among users. Reliability of the system comes from Openpath’s SurePath triple-connect technology. The smart phone credential is delivered using Bluetooth, WiFi or LTE (cellular) – whichever signal reaches the reader first enables the door to be opened. So even if a company’s WiFi is down or Bluetooth proves unreliable, there is still a third option. Openpath deploys “seamless” cloud integration and makes it easy for landlords and tenants to integrate Openpath with other systems Seamless cloud integration Segil is a serial entrepreneur who has had experiences as a frustrated user, dealing with many different offices, people and access control deployments over the years – subletting office space, changing PIN codes, dealing with 10 different offices using 10 different cards. Based on that experience, Openpath’s founders saw a need for a more user-centric approach to access control, and a chance to improve the office experience to be more aligned with employees’ experiences in their smart homes. Segil says he also saw “significant lethargy” among incumbent players in the access control space, and a market in which mobile and cloud technologies had still not taken hold. In addition to a simplified user experience built around mobile credentialing, Openpath deploys “seamless” cloud integration and makes it easy for landlords and tenants to integrate Openpath with other systems. The “elegant” readers, including a flush-mounted version, fit in well with high-end office environments. The company launched in May 2018. Openpath has been signing up national and regional channel partners all across the U.S. Openpath is focused on the commercial real estate market, where they have already seen significant adoptions, especially among mid-sized companies. Larger deployments as part of new construction are in the pipeline. National system integration In the past six months since its launch, Openpath has been signing up national and regional channel partners all across the U.S. and now has a nationwide footprint and is able to service customers all over the U.S. They are not yet disclosing any specifics about the number of partners they have signed up and who they are. “I can share that we have a number of large national system integration and security brands on board as channel partners and many more regional and local system integrators,” says Segil. They are looking for additional integrator partners. “There is a cohort of folks out there who say ‘I get it,’ and I want to offer it to my customers,” says Segil. The cloud element of the system can provide recurring monthly revenue (RMR). Openpath’s system offers flexibility in terms of meeting each customer’s security needs. In addition to the “super convenient” scenario described above, the system can also be configured to be “super secure,” using two-factor authentication and other measures, says Segil. There are multiple “flavors” between the two extremes. It can also be integrated with elevators to enable the buttons on allowed floors. Integration with existing systems Cloud software simplifies operation for both tenants and landlords. The system is backwards-compatible to existing systems and can be used to retrofit and mobile-enable a legacy system, providing the benefits of mobile features and cloud operation to multiple sites. The software can interface with enterprise applications such as Active Directory, and an application programming interface (API) facilitates integration with other systems and building components. It operates with marketing automation platforms such as Flack and visitor management systems such as Envoy. The system is backwards-compatible, providing the benefits of mobile features and cloud operation to multiple sites Open standards make the system easy to install in new or existing buildings using RS485, or Cat 5 or Cat 6 wiring, whatever is in place. Retrofit installations can use existing panels, servers, software, etc., or they can be replaced. The Openpath panel is installed right next to an existing panel in a retrofit and preserves all legacy integrations of the previous system. Access credentials compatibility In its simplest configuration, the Openpath system consists of single or four-door panels wired using standard ports, Wiegand ports and REX ports, each connected to software in the cloud. Each panel works offline if the internet connection is down. Various key fobs, cards and other credentials are available in addition to mobile credentials. Openpath was one of the new exhibitors at last fall’s GSX show in Las Vegas, occupying a large-sized booth for a startup company. The “beautiful” hardware drew a lot of attention, says Segil. “The channel loves us, and we signed a lot of people,” he adds. “We were excited by the response.”
Anviz’s client, Integrate Security (Integrar Seguridad), is a company that is dedicated to providing electronic security services. Integrate Security has trained personnel to provide the best solution to local and foreign tourism in Buenos Aires, Argentina, with ten years dedicated in this field. The challenge With a diverse set of physical identities and mobility of local and foreign tourists, who access multi-purpose buildings, it’s hard to manage sets of rooms only by keys. Unnecessary human capital will be added on to manage a multi-purpose building, with an additional fee to manage the system. As a result of the COVID-19 pandemic in 2020, Anviz’s client needs a modern solution As a result of the COVID-19 pandemic in 2020, Anviz’s client needs a modern solution, to help them manage all these newly add-on tourism and minimise human capital, with the function of registering and managing new users’ access requests within minutes. FacePass 7 and CrossChex Standard solutions Furthermore, Integrate Security wants to make everything touchless, in order to fit the requirement of COVID-19 policies, while protecting both tourists and workers from the Coronavirus. Anviz’s FacePass 7 and CrossChex Standard solutions offered Integrate Security exactly what they needed, touchless access control solution that can be monitored on a laptop or PC. To ensure the best configuration result, Anviz designed special stainless steel turnstiles for FacePass 7. Touchless access control The FacePass 7 and CrossChex Standard can enable staff members to add or delete additional users within minutes and monitor access records, whether or not the tourists wear a mask to fulfill COVID-19 requirements.
Sterling and Wilson, established in 1927, is currently having its corporate office in Mumbai, India. It is one of the turnkey MEP (Mechanical, Electrical & Plumbing) Services Company with 60% of its business coming from electro-mechanical projects. Just as the company has been instrumental in pioneering MEP services in India, it has also executed several prestigious MEP projects internationally. Sterling and Wilson are expanding with approximately 10,000 employees located at various regional and branch offices and project sites. Challenges It was a herculean task for corporate HR to process staff salary and overtime from manually recorded attendance collected from all project sites. Managing the attendance of 10,000 employees distributed among regional/ branch offices and remote sites from a central location was a tedious task. Replacement of the existing manual attendance mechanism with automatic attendance marking functionality was the major requirement. Additionally, they wanted a wireless connectivity solution for managing remote project sites for error-free tracking and management of employee attendance. Matrix offered solution provides wireless connectivity to the server through 3G Internet Dongle to prevent loss of data Centralised time-attendance solution Matrix comprehensive solution offered centralised time-attendance solution to Sterling and Wilson connected all project sites with regional and branch offices and these offices to corporate head office. Matrix offered solution provides wireless connectivity option to the server through 3G Internet Dongle to prevent loss of data from remote locations. This ensures efficient data management in case of emergency like, internet connectivity failure during which all the events are stored in the device. Hence, the events can be restored easily as soon as it recovers their connection back to the server. The solution from Matrix offered integrations with third-party resource planning software-SAP to the client. Results Buddy punching or fraudulent time-keeping is eliminated Capturing the biometric attendance of all employees has smoothened HR's task Corporate HR can get real-time attendance of all employees at a central location Accurate in/out time of each employee is acquired Monthly salary and overtime are paid only when fingerprint-based in/out time for each The working day of every employee is obtained Any delay in projects due to employee attendance gets easily identified Products offered COSEC CENTRA ACM: Access Control Software Module COSEC CENTRA TAM: Time-Attendance Software Module COSEC PANEL LITE: One Site Controller for Every Building or Location up to 255 Doors COSEC DOOR FOT: Standard Optical Fingerprint and RFID Card based Door Controller COSEC PATH DCFE: Standard Optical Fingerprint and RFID Card based Door Controller
Atos announces its new partnership to integrate viisights software into its Atos Computer Vision Platform. Atos is a pioneer in global Edge AI. This collaboration will allow viisights’ powerful behavioural video analytics to run on Atos Computer Vision Platform, providing users with unique insight and therefore to immediately detect and predict violent activity, suspicious activity, crowd behaviour, traffic monitoring, and much more to help authorities prevent harmful activities from escalating. AI-based behavioural video analytics viisights is a developer of advanced AI-powered behavioural video analytics software. viisights will integrate its AI models to VISuite, these models are specifically designed for security and safety applications, targeting transportation hubs, smart cities, critical infrastructure, and various kind of campuses. They leverage viisights’ unique video understanding technology capabilities. Computer vision platform Atos Computer Vision Platform enables users to reduce error rates, guarantee people and asset safety Atos Computer Vision Platform, launched in July 2021, is a unique end-to-end computer vision platform providing pre-trained & customisable AI models powered by the BullSequana server range and enriched by a partner ecosystem and Atos computer vision experts through worldwide expert’s labs. It enables users to identify events and behaviours, reduce error rates, guarantee people and asset safety, deliver the highest quality, and offer frictionless and personalised customer experiences. Delivering advanced solutions Atos Computer Vision Platform offers full compatibility with Atos BullSequana server range designed for AI applications, Atos data science services and leverages Atos’ established global presence in the public safety space. “We’re very excited to partner with Atos. This strategic partnership will help deliver highly advanced and valuable solutions that leverage our respective core areas of expertise,” said Asaf Birenzvieg, CEO of viisights. Easy and cost-effective solutions “Integrating Atos Computer Vision Platform as a partner makes it easier and more cost-effective to offer municipalities and other customer’s turnkey solutions that deliver proactive safety and security.” “We are proud to announce viisights integrates Atos Computer Vision Platform as a partner, integrating VISuite, the software toolbox. This partnership will harness the reach of Atos Computer Vision Platform to make public transports and public areas across the globe safer, smarter, and more secure,” said Jérôme Sandrini, Head of Big Data solutions, Atos.
One of India's most premier educational institutions, IIT Delhi, is sprawled over 325 acres of land. It houses classrooms, department buildings, laboratories, libraries, recreational zones, and residential areas for students, faculty, and other staff, among other things. Need for an intelligent surveillance system As expansive and beautifully landscaped the institute is, it presented a massive security challenge. Until now, its measures were limited to the campus being physically manned by security personnel. Considering the size of the institute, having a few security guards was inadequate and inefficient to properly monitor the entire premises, safeguard the students and prevent unsightly events. The need of the hour was an intelligent surveillance system that facilitates end-to-end protection by providing complete visibility of the campus, especially the entry and exit points, perimeter walls, and passages, as well as helps instill discipline within the institute. Videonetics provided 24X7 protection Videonetics worked closely with IIT Delhi and system integrator Supreme Audiotek to identify key strategic locations on the premise that needed to be secured. Approximately 300 high-definition network cameras were deployed to cover all vantage points and locations. Approximately 300 high-definition network cameras were deployed to cover all vantage points and locations These cameras covered entry and exits, boundaries of the campus, passages, playground, cafeteria, outdoor walkways, and lobbies of the various buildings, to keep in check incidents of bullying, vandalism, teasing, unauthorised visitors, and so on. Videonetics AI-powered Intelligent Video Management Software (IVMS) 3.0 was chosen to support these network cameras to ensure efficient and seamless management of humongous video data. The enterprise-class solution helped to record, view and manage these cameras from its unified interface, providing situational awareness and actionable intelligence. Vigilance and collaborative action The hundreds of cameras deployed across the campus provide a comprehensive view of all areas to the security personnel manning the Command & Control Centre. With live video playing 24X7 on the video wall, they can ensure constant vigilance, spot unusual behaviour at any time, and send alerts to the on-ground security staff for swift action. With Videonetics Intelligent VMS, security operators at IIT Delhi are proactively identifying, addressing, and investigating incidents faster. Robust data protection To safeguard the privacy of students, staff, and visitors, Intelligent VMS ensures that the highest possible standards of data protection are followed. In this respect, it has offered its multi-pronged security measures, which include multi-factor authentication so that data is accessible only to authorised operators, encryption of data at rest to protect from cyber threats, video watermarking to discourage unauthorised use, and more. Smart investigation-friendly software With smart and user-friendly Intelligent VMS, security operators can monitor and evaluate live and recorded videos With smart and user-friendly navigation of Intelligent VMS, security operators can monitor and evaluate live, as well as recorded videos simultaneously in the same interface, helping them to quickly investigate incidents in history, without losing sight of the current activities. That means when incidents happen, operators can quickly find, select such videos, and share them with authorised officials for conducting investigations without leaving their desks. Furthermore, the leading-edge Intelligent VMS also provides collaborative tools for the operators to exchange messages and share observations about any suspected activity by using in-built chat room of the software. Resilient and future-ready platform Lastly, Videonetics open, flexible, and resilient IVMS system can be evolved with the growth of the infrastructure, as well as seamlessly integrate with third-party applications and devices. Moreover, it is future-ready and can tackle all the challenges of today and tomorrow. Videonetics Intelligent VMS 3.0 With the cutting-edge and state-of-the-art Videonetics Intelligent VMS 3.0, security personnel can efficiently monitor the entire campus round the clock. With live visualisation, they can identify incidents and emergencies in real-time and respond immediately. Additionally, the knowledge that the premises are protected by cameras has brought down disciplinary and safety-related incidents. AI-powered interface AI-powered offering also provides them with intelligent insights to help on-campus authorities predict and prevent events The AI-powered offering also provides them with intelligent insights to help on-campus authorities predict and prevent events. For example, people crowding to fight, someone being followed, property being vandalised, unwanted people entering the premises, etc. This allows them to intervene in time and take preventive action before the issue escalates. The intuitive, adaptive, and user-friendly interface of the solution has made it very easy for the security teams to understand, learn and master the software. Boosting safety and confidence of students The solution is designed to complement the existing security systems and practices to ensure a comprehensive security infrastructure for enhanced safety of the students and faculty. The Videonetics solution has boosted the confidence of students, parents, faculty, staff, and others and made them feel safe at all times. It has brought them immense peace of mind, helping them focus on what they came to IIT Delhi for -- learn and grow. Advanced features & user-friendly interface Operators are increasingly relying on real-time surveillance, monitoring, and instantaneous investigation" Tarun Sethi, Manager – Sales of Supreme Audiotek Pvt. Ltd expressed “IIT Delhi wanted to install a surveillance system that can be adopted by their security personnel easily. Today, operators at the command control centre are effortlessly using Intelligent VMS due to its user-friendly interface and advanced features.” “They are increasingly relying on real-time surveillance, monitoring, flagging, playback, and instantaneous investigation. Needless to mention, our partnership with Videonetics was one of the cornerstones that allowed the project to fly and succeed. We look forward to working with them in the future as well.” Network monitoring Mukesh Khandelwal, Institute Engineer of IIT Delhi said "We were looking for a solution that could provide security to the entire premises of IIT Delhi, as well as help us administer discipline.” “The Videonetics IVMS solution was a perfect fit for viewing and managing extensive camera network covered all key strategic locations, enabling protection of students and faculty. Additionally, its user-friendly interface with advanced features made it very easy to monitor the campus 24X7, by empowering our existing security infrastructures.”
Type of site: Grade A multi-tenant office Location: The Bailey, 16 Old Bailey, London, UK Site size: 115,000 sq. ft over ten floors Client needs: Easy access for users Touch-free and digital sign-in Free flowing movement through reception, avoiding crowds and queues Fast access to other floors via lifts Visitor management system that can be used by multiple tenants and reception staff easily Secure and clear intercom/entry phone and door automation for out-of-hours, deliveries and trades people access Easy access and parking for disabled users Reliable and resilient security, including CCTV monitoring of strategic locations Integriti intelligent integrated access control system Inner Range’s enterprise-level intelligent integrated access control system, Integriti, provides robust security, as well as seamless integration, to an array of other building management systems. Some of the key features of Integriti include: Easy to use proximity card entry for users and tenants Forge Bluepoint, powered by Yardi, visitor management system to create secure, but easy to use credentials for visitors, including via smartphone High-level lift integration, by Mitsubishi that reads user credentials and directs users to the quickest lift, for their desired destination Integrated CAME BPT video entry phone and access control to automate doors, for disabled access near dedicated parking bay, for disabled users, as well as for out-of-hours access, deliveries and trades people Hard-wired IP closed circuit television system (CCTV) with Hikvision cameras, to monitor strategic locations End-to-end encrypted messaging, through every interface and integration, by Inner Range’s Integriti for high-level security Provision for future entry turnstiles/speed lanes Richard Harvell, Engineering Director at Knight Harwood, who managed the refurbishment at The Bailey, said “Our key requirement was to be able to move users, including visitors, swiftly through reception, to their correct floors, with minimal or no touch points. And, all of this, without compromising security.” High-level lift integration Antron Security’s solution, centered on Inner Range’s intelligent access control system, Integriti" Richard Harvell adds, “Antron Security’s solution, centered on Inner Range’s intelligent access control system Integriti, more than delivers. The high-level lift integration automatically directs users to the fastest lift for their floor and only allows access beyond reception, for those with bona fide credentials. We have been impressed with Integriti’s sophistication and integration capabilities, as well as Antron Security’s expertise and diligence in designing and installing our bespoke access and security system.” The Client - The Bailey UK property firm Endurance Land, which is a member of the Hong Kong-based property conglomerate, Nan Fung Group, owns The Bailey. The property, which is situated directly opposite the famous Old Bailey High Court in London, was originally built in the early 20th Century for the Chatham and Dover Railway Company. Its Grade II listed Edwardian Baroque façade features classical reclining figures, while a larger ‘western extension’ was built in 1999, to modern city office standards. Knight Harwood commissioned for refurbishment Knight Harwood was recently commissioned to refurbish the whole site, along with architect, Orms and building design consultancy, GDM Partnership. The commercial site meets Grade A office specifications and offers exceptional internet reliability, and speed for tenants. It achieved a platinum connectivity rating, by WireScore, the Mayor of London’s digital connectivity rating scheme, in 2020. Sophisticated access and security management system A new and sophisticated access and security management system was part of the refurbishment brief. Knight Harwood stipulated an access and security management system that would ensure a free flow of users and tenants through reception, without crowding or queues. This would need to include integrating intelligent lift controls, so as to ensure users were swiftly taken to their designated floor, as well as a good visitor management system that all tenants could use, without the need for a central security team to manage requests. Touchless access and digital sign-in for users Touchless access, as well as digital sign-in for users was also important for the client Touchless access, as well as digital sign-in for users was also important for the client. An intercom or entry phone and access control operated doors were needed for disabled users, who would be accessing the building from the dedicated disabled parking bay, as well anyone arriving ‘out of hours’, or for trades people and deliveries. High-levels of physical and cyber security were needed to keep all legitimate users and the site safe, without hindering access. CCTV monitoring would be needed in strategic locations. Future proofing, including laying under-floor cables ready for entry turnstiles/speed lanes, was desired. Antron Security managed the project Antron Security project managed the design, supply and installation of the access control and security system for The Bailey and acted as the ‘go to’ contact for Knight Harwood. Antron Security is a globally renowned installer of bespoke security solutions and has been providing security installations for the past 30 years. Taking care of the supply, design, installation and maintenance of security systems, Antron Security is NSI and Safe Contractor approved, meaning all staff and systems installed comply with the latest industry standards and are regularly inspected. Bespoke security solutions Inner Range provided the core access and security management system, Integriti, which enabled Antron Security to build the bespoke solutions needed for The Bailey. Inner Range has been a globally renowned company in the design and manufacture of intelligent security solutions, since it was established in 1988. Inner Range systems have been installed in over 25 countries. Its flagship product, Integriti, offers enterprise-level intelligent security and integrated smart building controls, for single sites through to global estate portfolios. Key integration Inner Range’s powerful Integriti intelligent access control system integrates with Mitsubishi’s high-level lift controls Inner Range’s powerful Integriti intelligent access control system, known for its breadth of integration options, integrates with Mitsubishi’s high-level lift controls and Bluepoint’s visitor management system, to ensure all users and visitors can access their floors, and designated areas with ease. The Mitsubishi lifts are able to read credentials from proximity cards, or mobile phones, at a user check-in point, at the reception, or in the lift lobby itself. High-level lift controls to reduce crowding and queues The high-level lift integration with ‘destination control’ means the lift software takes into account, where each of the building’s lifts are, where the user’s ‘home floor’ is, as well as where other users are going/due to go, and instantly calculates the quickest lift for the new user. The user is immediately directed to the most efficient lift via a display screen at reception, or in the lift lobby. If users are able to go to more than one floor, they can update their preference in the lift itself. This integration ensures users move through reception quickly and efficiently, with no unnecessary stops. Fully integrated visitor management Inner Range’s Integriti intelligent access control system also allowed Bluepoint’s visitor management system to integrate with the Mitsubishi lifts. For visitors to access tenanted floors within the building, the following has to take place: A tenant creates the meeting via Bluepoint An email is generated and sent to the visitor’s inbox, where they can create a mobile QR code pass and save it to their smart phone wallet When the visitor arrives, they use their mobile phone to scan the QR code in the Bluepoint invite, at the reception desk to check-in The reception team can then direct them to the Mitsubishi lifts, which display the lift car that they need to get to their meeting To leave, the visitor presents their QR code at the lift or door reader, which tells the system they’re leaving The QR codes are only valid for one entry and one exit, and only on the appointment date and at the planned appointment time. Afterwards, the QR code becomes invalid and is deleted from the system CAME BPT entry panels and video intercom system The QR code gives the visitor the ability to access everything they will need, including the lifts and any locked doors en-route. The integration between Integriti and Bluepoint’s visitor management system was achieved using the Bluepoint API. Bluepoint is cloud-based, hosted on the Microsoft Azure platform. CAME BPT entry panels were installed to allow disabled users to access the building, near the dedicated disabled parking bay, as well as for any visitors entering the facility out-of-hours, to contact the security team, or for deliveries and trades people to use, in order to access doors at the rear of the building. The entry panels allow for a reliable and intuitive video entry intercom system. Hikvision CCTV cameras installed CCTV cameras from Hikvision have been installed throughout the site, to create a hard-wired IP CCTV system CCTV cameras from Hikvision have been installed throughout the site, to create a hard-wired IP closed circuit television (CCTV) system. They are integrated with the Integriti access control system, which allows for intelligent ‘cause and effect’ monitoring. System protocols automatically bring up specific camera feeds for security managers to view, in response to alerts and footage can be viewed together with additional information from Integriti, such as if a door has been left open. Intelligent access control Inner Range’s enterprise product, Integriti, provides seamless integration with a multitude of other smart building management systems, underpinned by robust security. This includes encrypting all communications through every device and interface, and providing intruder detection to European standard EN50131. Integriti helps building managers create greener and more energy efficient sites, by tracking how tenants use the building, and amending heating and lighting settings, as a result. Integriti also provides trace reporting, that can identify a user’s movements, if they have become unwell and identify who else has been near them. System benefits for users include: Touch-free entry and digital sign-in for users and visitors No unnecessary stops for users on their way into the building Reduced risk of crowding or queues in reception area Easy to use visitor management system Robust security that doesn’t impinge on access Future proofing with cabling provision for speed lanes/entry turnstiles in place
Alcatraz AI has announced that they are bringing the Alcatraz AI Rock facial authentication solution to BrainBox AI’s offices. BrainBox AI is at the forefront of building automation and a renowned company in the green building revolution. Identity and facemask verification solution As BrainBox AI’s office recently re-opened with limited capacity, the company is taking proactive steps, through Alcatraz AI’s robust identity and facemask verification solution, in order to keep employees safe. As one survey showed, two-thirds of employees have safety concerns, regarding the return of on-site operations. Considering these statistics, health and safety must be top priorities for businesses, as they re-open. BrainBox AI is keeping its employees’ safety at the top-of-mind, by installing Alcatraz AI’s Rock solution, before they return, to ensure greater safety and security. Alcatraz AI’s Rock facial authentication solution Alcatraz AI’s Rock facial authentication solution combines advanced AI and 3D sensing technologies Alcatraz AI’s Rock facial authentication solution combines advanced AI and 3D sensing technologies, to provide facilities with enterprise-grade identity verification, which is needed to create secure spaces. Rock’s state-of-the-art security features include touchless access, multi-factor authentication, video at the door and intelligent tailgating detection. Alcatraz AI’s access control solution, the Rock, effectively detects tailgating and sends ‘real-time alerts’, if an unauthorised person enters, and sends real-time notifications to ACS/VMS. BrainBox AI, leading the green building revolution “BrainBox AI is leading the green building revolution, and we are looking forward to bringing frictionless, multi-sensor technology and a touchless authentication feature to the office,” said Tina D’ Agostin, the Chief Executive Officer (CEO) of Alcatraz AI, adding “By utilising the Alcatraz AI Rock, we’ve helped BrainBox AI’s offices re-open smoothly and safely.” “BrainBox AI is excited to announce its partnership with Alcatraz AI. Our employees’ safety is always our top priority. We are confident The Rock’s touchless authentication and the frictionless security system will give each BrainBox AI employee peace of mind, when returning to the office,” said Jean-Simon Venne, the Co-Founder and Chief Technology Officer (CTO) of BrainBox AI.
Round table discussion
A new generation of security professional is waiting in the wings. They will be faced with unprecedented challenges, as they seek to transform the security marketplace to the ‘next level’. Technology changes ensure the market will be very different 10 years from now and the fresh labour pool will need to be able to meet the host of new challenges. We asked our Expert Panel Roundtable: What exciting career opportunities in the security industry await the next generation?
Since the advent of the physical security industry, access control has been synonymous with physical cards, whether 125 kHz ‘prox’ cards or the newer smart card alternatives. However, other credentials have also come on the scene, including biometrics and even smart phones. Some of these choices have distinct cost and security advantages over physical cards. We asked this week’s Expert Panel Roundtable: How soon will the access control card become extinct and why?
Cost is a reality to be managed. No matter how powerful or desirable a technology may be to a customer, the sale often comes down to the basic question: Can I afford it? And affordability extends not just to the purchase price, but to the cost of technology over its lifespan. In addition to advances in technology capabilities, the security industry has also achieved inroads to make its offerings more worth the cost. We asked this week’s Expert Panel Roundtable: What is the physical security industry doing to make more affordable and cost-effective technology solutions for end users?