Office security systems
The newest product in the Aperio technology range, the Aperio H100 combines the power and flexibility of wireless access control into a slim, cleverly designed door handle. Compatible with most new and existing access control systems, the Aperio H100 is very easy to specify with only two parts to choose from - a left and right handle. It’s also easy to fit, with no drilling or wiring required, and can be retro-fitted to almost any interior door. Furthermore, any existing mechanical cylind...
The five LEGIC components Connect, Mobile SDK, reader IC, smartcard IC as well as key and authorisation management are seamlessly working together to provide a powerful technology platform for secure ID and IoT applications. For example, for BLE mobile ID, use Connect to deploy ID rights onto mobile devices running an app which is built on LEGIC’s mobile SDK (Android or iOS). The mobile ID rights can then be easily accessed by a reader incorporating a LEGIC reader IC. All three of these L...
Openpath, a company on a mission to bring frictionless access and better security to our workplaces, reveals that 94% of its users now use their smartphone over a keycard to enter the office, an enviable accomplishment in an industry with shockingly low mobile adoption rates. Recognising a general lack of mobile adoption in the access control industry, Openpath launches the Mullion Smart Reader to fill out its portfolio of access control readers. The sleek, versatile and compact design of the M...
Instead of keeping track of a key fob or card, some people may prefer using their smartphones to get into their businesses or secure work areas. Digital Monitoring Products (DMP) can now give those customers the convenience they prefer. Farpointe Data’s new CSR-35 Conekt Bluetooth Reader and CMC-2 Smartphone Mobile Access Credentials are the newest members of DMP’s expanded line of high-security access control products. Together, they allow iPhone or Android smartphones to function...
National Business Crime Solution (NBCS), a not for profit initiative that enables the sharing of data between law enforcement agencies and the business community in order to reduce crime, is celebrating a successful first year for its Associate Membership scheme. NBCS recently welcomed Milestone Systems, Axis Communications, GMS Group, SmartWater and SWL Security as Associate Members, and these organisations join Mitie, CSL Group, Hikvision and Athelney Group as part of this pioneering initiativ...
Cybersecurity can seem complicated and expensive, especially for Small Businesses. It leaves most owners and managers wondering where they stand against the growing attacks they read about daily and not knowing how they can protect themselves. Defendify changes all that. The new, web-based platform—a SaaS model—is designed and built exclusively for companies with 500 or fewer employees. It’s an all-in-one solution that’s easy to implement and affordable yet comprehensive...
Sequr, a cloud-based mobile access control trusted by customers such as UPS, announced Sequr Access Sync to automate perimeter security for modern buildings and offices. Sequr Access Sync intelligently connects organisations’ physical and cyber security systems to provide highly granular access management while easing administrators’ work. Physical and cyber security have historically been handled separately using different tools. In the cyber arena, everything from the CEO’s email account to the customer database is protected by technology called identity and access management (IAM) software that’s used by practically every modern security-conscious organisation. IAM solutions enable highly automated enforcement of access rules for every user, a capability that Sequr Access Sync carries over into the real world to the physical facility. Sequr Access Sync solution Sequr Access Sync can connect to every organisation’s IAM deployment thanks to support for all IAM solutions on the market. From there, Sequr draws on the rich security information that an organisation’s IAM system contains about every person to intelligently determine how to manage their physical access. Administrators can customise the physical perimeter’s automated behaviour using a powerful rules engine with set-it-and-forget-it capabilities. Sequr Access Sync recognises individuals who require access to the facility or office right after their profile is created Data-driven onboarding Sequr Access Sync recognises individuals who require access to the facility or office right after their profile is created in the organisation’s IAM personnel database as part of the routine onboarding process. Then, Sequr pulls security data from the IAM system including the person’s job role, departmental affiliation, work location and more to determine how to best manage their access. Automated access management Administrators can define set-it-and-forget-it onboarding rules for assigning access. Rules can encompass specific doors, elevators and gates as well specific access schedules. For example, a company might create a rule to assign individuals access to the building entrance, parking lot gate and elevator from 9am to 5pm on work days. Sequr Access Sync can also assign every person access to their specific work area (e.g. if a person’s IAM profile shows they’re part of the marketing department, they would receive access to the marketing department’s door on top of their other credentials.). Powerful IAM integration Using a facility’s predefined rules, Sequr Access Sync can automatically adapt the physical perimeter to security changes. For example, if a person is promoted from the marketing department to the executive suite, Sequr Access Sync will become aware of the change thanks to the IAM integration and update the access credentials on that person’s mobile device. The Sequr-powered perimeter can intelligently adapt itself to security changes such if a person moves to a new role with expanded facility access Responsive security access The Sequr-powered perimeter can intelligently adapt itself to security changes such if a person moves to a new role with expanded facility access, a different work schedule, or even a different company facility. Access credentials that are no longer needed are immediately removed with no need for manual input. This prevents the build-up of unused credentials and thus avoids the security gaps that can form over time due to human oversights when deprovisioning must be done manually. Physical & cloud-based security “Access control is a fundamental requirement for any organisation to achieve security compliance and to pass their regular security audits. Misplaced or stagnant employee access credentials can be dangerous”, said Sequr Chief Technology Officer Mishi Patel. “With Sequr, admins never have to worry about unauthorised access to the office. They can define granular access rules in the cloud that automatically keep the physical perimeter secure and in sync with the organisation.” Sequr Access Sync is available immediately with support for all premier IAM solutions on the market including Google G Suite Directory, Microsoft Active Directory, Okta, OneLogin, Auth0, Bitium and Centrify. It expands Sequr’s already extensive lineup of advanced access management capabilities. Sequr provides real-time analytics for access monitoring, anti-passback to prevent the use of mobile credentials by unauthorised users, first-person-in and holiday access rules and more.
One factor aggravating concerns about workplace violence in corporate America is the easy availability of firearms. In many states, citizens, including employees, have the right to carry firearms onto a company’s property even though firearms are prohibited in the workplace. In effect, an employee prone to violence may have a firearm as near as their vehicle in the company parking lot. Currently, 23 states in the U.S. have so-called “parking lot storage” laws, which enable employees to store firearms in their vehicle’s trunk or glove box despite any corporate ban on weaponry. The laws have evolved as an expression of the Second Amendment “Right to Bear Arms” in the last decade or so. There is some variance in the laws from state to state, but they generally allow a citizen to carry a gun to and from work and keep it stored out of sight in their vehicle. Global Security Exchange (GSX) is the new branding for ASIS International’s annual conference and trade show Employee Second Amendment rights “The laws contend that employees should not have to give up their Second Amendment rights between home and the workplace and should be able to have a gun with them for protection from their front door at home to the front door of the workplace,” says Eddie Sorrells, Chief Operating Office/General Council of DSI Security Services. Sorrells will speak about the current state of the laws, how they came about, the nuances of state-to-state differences, and the possible impact on overall corporate security in a session titled “Employees Who Carry: Preventing Workplace Violence” at the upcoming GSX conference in Las Vegas, 23rd - 27th September. Global Security Exchange (GSX) is the new branding for ASIS International’s annual conference and trade show, attended by more than 22,000 security professionals from 100-plus countries. Sorrells’ session will be Sept. 24 from 10:30 to 11:45 a.m. Restrictions on gun visibility Employees may think the “right to carry” extends to the workplace, but the right only extends to the parking lot. The company still has the right to ban guns inside the premises. However, it is unlawful in some states for companies to search vehicles in parking lots, and companies who do so are violating the law, says Sorrells. Among the various state laws, some exempt public education institutions and other public venues. Depending on how the laws are written, there may be other exemptions, too. In Florida, for example, the law exempts any organisations that have explosives on site. With weapons on a company's property, a high-risk termination could potentially become violent Most laws require weapons to be stored securely out of sight. However, in Alabama, for example, it is legal to store validly permitted guns in full view during hunting season, Sorrells says. A resident of Alabama himself, Sorrells has been in the contract security business for 27 years, working mostly in multi-state operations. He has worked for 500 or so corporate security organisations throughout the country and is a practicing attorney who has studied issues of workplace violence and active shooters. “There is a political element to these laws, which were created with the goal of protecting Second Amendment rights,” says Sorrells, who says he sees arguments on both sides of the issue. However, political opinions aside, “if you’re a business owner, you have to contend with dozens of weapons on a company’s property,” he adds. “That could be an issue if a high-risk termination could potentially become violent. You have to assume there is a weapon in that person’s vehicle.” Sorrells' session will dive into the case law and illuminate some of the legal issues and how courts have addressed them GSX education program After the session, Sorrells hopes attendees will take away a good working knowledge of the state of the laws, how to comply with the laws, and issues such as posting of signs. The session will dive into the case law and illuminate some of the legal issues and how courts have addressed them. The timely session is an example of the valuable information attendees can gain by attending GSX. Sorrells has been attending the yearly ASIS International Conference and Exhibits for more than 20 years, at least since the mid-1990s. As the pre-eminent security organisation around the world, ASIS International provides unrivalled educational and networking opportunities at the yearly conference, he says. “There is a vast amount of networking and educational offerings on a wide variety of topics, including technology, legal issues, risk management, workplace violence, consulting, and anything under the sun,” says Sorrells. The newly branded GSX education program is led by subject matter experts from ASIS International, InfraGard (a public-private partnership between U.S. businesses and the Federal Bureau of Investigation), and ISSA (Information Systems Security Association). Sessions will deliver valuable, actionable takeaways to help attendees shape their security strategies. There will also be an exhibition of 550-plus suppliers and manufacturers highlighting the latest security solutions.
If you’re responsible for a medium or large-sized office, it’s more important than ever that you have access to a means of ensuring people’s safety, managing risks and fraud, and protecting property. Any security system that you employ must therefore meet the most demanding commercial requirements of today’s offices, and tomorrow’s. This means thinking beyond a basic intrusion system and specifying a comprehensive solution that integrates smart features like access control, video management and intelligent video analytics. Because only then will you have security you can trust, and detection you can depend on. Reliable entry management Access control systems have been developed that guarantee reliable entry management for indoors and outdoors Access control is becoming increasingly important for ensuring the security of office buildings, but as the modern workplace evolves you’re unlikely to find a one-size-fits-all solution. Today, it’s commonplace to control entry to individual rooms or restricted areas and cater to more flexible working hours that extend beyond 9 to 5, so a modern and reliable access control system that exceeds the limitations of standard mechanical locks is indispensable. Access control systems have been developed that guarantee reliable entry management for indoors and outdoors. They use state-of-the-art readers and controllers to restrict access to certain areas, ensuring only authorised individuals can get in. With video cameras located within close proximity you can then monitor and record any unauthorised access attempts. The system can also undertake a people-count to ensure only one person has entered using a single pass. Scalable hardware components As previously mentioned, there is no one-size-fits-all system, but thanks to the scalability of the hardware components, systems can adapt to changing security requirements. For example, you can install Bosch’s Access Professional Edition (APE) software for small to medium-sized offices, then switch to the more comprehensive Access Engine (ACE) of the Building Integration System (BIS) when your security requirements grow. And, because the hardware stays the same, any adaptations are simple. APE’s ‘permanent open’ functionality allows employees and guests to enter designated areas easily and conveniently The APE software administers up to 512 readers, 10,000 cardholders and 128 cameras, making it suitable for small to medium-sized buildings. With functions like badge enrollment, entrance control monitoring and alarm management with video verification it provides a high level of security and ensures only authorised employees and visitors are able to enter certain rooms and areas. Of course, there will always be situations when, for convenience, you need certain doors to be permanently open, such as events and open days. APE’s ‘permanent open’ functionality allows employees and guests to enter designated areas easily and conveniently. Growing security needs You switch to the Bosch Building Integration System (BIS), without having to switch hardware (it stays the same, remember?). This is a software solution that manages subsystems like access control, video surveillance, fire alarm, public address or intrusion systems, all on a single platform. It is designed for offices with multiple sites and for large companies with a global presence. Bosch Building Integration System (BIS) manages subsystems like access control, video surveillance, fire alarm, public address or intrusion systems, all on a single platform The BIS Access Engine (ACE) administers up to 10,000 readers and 80 concurrent workplace clients per server, and 200,000 cardholders per AMC. An additional benefit to security officers is the ability to oversee cardholders and authorisations through the central cardholder management functionality and monitor all access events and alarms from every connected site. For consistency, multi-site cardholder information and access authorisations can be created on a central server and replicated across all connected site servers, which means the cardholder information is always up to date and available in every location. Intrusion alarm systems Bosch B Series and G Series intrusion control panels can also send personal notifications via text or email Securing all perimeter doors is vital when protecting employees, visitors and intellectual property. Doors are opened and closed countless times during business hours, and when intentionally left open, your office is vulnerable to theft, and the safety of your employees is compromised. For this reason, intrusion control panels have been developed with advanced features to ensure all perimeter doors are properly closed, even when the system is not armed. If a door remains open for a period of time (you can specify anything from one second to 60 minutes), the system can be programmed to automatically take action. For example, it can activate an audible alert at the keypad to give employees time to close the door. Then, if it is still not closed, it will send a report to a monitoring center or a text directly to the office manager, and when integrated with video it can even send an image of the incident to a mobile device. Customised intrusion systems What about people who need to access your building outside of working hours, like cleaning crews? Your intruder system allows you to customise the way it operates with a press of a button or swipe of a card. This level of control enables you to disarm specific areas, bypass points and unlock doors for cleaning crews or after-hours staff, whilst keeping server rooms, stock rooms and executive offices safe and secure. Bosch B Series and G Series intrusion control panels can also send personal notifications via text or email. You can program the panel to send you opening, closing, and other event alerts, which means you don’t have to be on-site to keep track of movements in and around your facility. Video management system A video management system will add a next level of security to your access control system Every office building has different video security requirements depending on the location, size and nature of the business. Some offices may only need basic functions such as recording and playback, whereas others may need full alarm functionalities and access to different sites. A video management system will add a next level of security to your access control system. For example, the video system can provide seamless management of digital video, audio and data across IP networks for small to large office buildings. It is fully integrated and can be scaled according to your specific requirements. The entry-level BVMS Viewer is suitable for small offices that need to access live and archived video from their recording solutions. With forensic search it enables you to access a huge recording database and scan quickly for a specific security event. For larger offices, embellished security functions for the BVMS Professional version can manage up to 2,000 cameras and offers full alarm and event management Full alarm and event management For larger offices, embellished security functions for the BVMS Professional version can manage up to 2,000 cameras and offers full alarm and event management. It’s also resilient enough to remain operative should both Management and Recording Servers fail. Large multi-national companies often need access to video surveillance systems at numerous sites, which is why BVMS Professional allows you to access live and archived video from over 10,000 sites across multiple time zones from a single BVMS server. When integrated with the BVMS Enterprise version multiple BVMS Professional systems can be connected so every office in the network can be viewed from one security center, which provides the opportunity to monitor up to 200,000 cameras, regardless of their location. Essential Video Analytics Video analytics acts as the brain of your security system, using metadata to add sense and structure to any video footage you capture If your strategy is to significantly improve levels of security, video analytics is an essential part of the plan. It acts as the brain of your security system, using metadata to add sense and structure to any video footage you capture. In effect, each video camera in your network becomes smart to the degree that it can understand and interpret what it is seeing. You simply set certain alarm rules, such as when someone approaches a perimeter fence, and video analytics alerts security personnel the moment a rule is breached. Smart analytics have been developed in two formats. Essential Video Analytics is ideal for small and medium-sized commercial buildings and can be used for advanced intrusion detection, such as loitering alarms, and identifying a person or object entering a pre-defined field. It also enables you to instantly retrieve the right footage from hours of stored video, so you can deal with potential threats the moment they happen. Essential Video Analytics also goes beyond security to help you enforce health and safety regulations such as enforcing no parking zones, detecting blocked emergency exits or ensuring no one enters or leaves a building via an emergency exit; all measures that can increase the safety of employees and visitors inside the building. Intelligent Video Analytics Intelligent Video Analytics have the unique capability of analysing video content over large distances Intelligent Video Analytics have the unique capability of analysing video content over large distances, which makes it ideally suited to more expansive office grounds or securing a perimeter fence. It can also differentiate between genuine security events and known false triggers such as snow, rain, hail and moving tree branches that can make video data far more difficult to interpret. The final piece in your security jigsaw is an intelligent camera. The latest range of Bosch ’i’ cameras have the image quality, data security measures, and bitrate reduction of <80%. And, video analytics is standard. Be prepared for what can’t be predicted. Although no-one can fully predict what kind of security-related event is around the corner, experience and expertise will help make sure you’re always fully prepared.
Over the past few years, biometrics has rapidly expanded into consumer applications, like the financial market for customer authentication, to payment services and withdrawing cash from ATMs in high-fraud markets. However, its adoption as an additional authentication factor for physical access control systems (PACS) and other enterprise applications, hasn’t been as rapid. But this is changing. Biometrics offers numerous benefits at the door and throughout the enterprise. With the advent of new anti-spoofing capabilities, and its integration into secure trust platforms that protect privacy and support a variety of RFID credential technologies, biometric authentication is poised to deliver a much higher matching speed and better overall performance. This will dramatically improve an organisation's security, whilst enhancing user convenience.Newer solutions are overcoming security and convenience hurdles to help realise the full potential of biometrics Challenges for biometric authentication Biometrics fuses convenience and security while validating “true identity” versus identity that is associated to the possession of an ID card. As an example, biometrics prevents a user from taking someone else’s card and obtaining access to privileged resources. This adds the human element to traditional methods of authentication, strengthening security by combining something the user “is” with something the user “has” or “knows.” According to the firm ABI Research in its May 2018 study, Biometric Technologies and Applications, the total fingerprint sensor shipments for the entire consumer market is “estimated to reach 1.2 billion worldwide for 2018, thus ensuring its market dominance.”It has been far too easy for fraudsters to create a fake fingerprint and present it to a reader Despite the benefits of fingerprint authentication in numerous consumer applications, there have been impediments to its broader adoption in the enterprise. While price has been one big roadblock, there have also historically been other reasons for its slower-than-expected growth. First, many technologies are still vulnerable to spoofs and hacking. It has been far too easy for fraudsters to create a fake fingerprint and present it to a reader. Equally troublesome, older products have not been able to move users through the doors as fast as a simple ID card and reader. In general, all fingerprint capture technologies are not equal amongst older products, and there can be significant differences in performance. Developing Technology Performance Newer solutions are overcoming these security and convenience hurdles to help realise the full potential of biometrics. Their development has focused on three key areas: How fingerprint images are captured – if the image can’t be properly captured, the rest of the process fails The implementation of liveness detection to enhance trust – even in the case when the image is properly captured, if it is fake the system cannot be trusted Optimising performance through a combination of new technology and algorithms, whilst ensuring interoperability so the performance can be trusted. The skin is illuminated at different depths to deliver much richer data about the surface and sub-surface features of the fingerprint Optimising capture The quality of the captured image is critical, across all types of fingerprints and environments. Many customers choose sensors that use multispectral imaging because it collects information from inside the finger to augment available surface fingerprint data. The skin is illuminated at different depths to deliver much richer data about the surface and sub-surface features of the fingerprint The skin is illuminated at different depths to deliver much richer data about the surface and sub-surface features of the fingerprint. Additionally, the sensor collects data from the finger even if the skin has poor contact with the sensor, because of environmental conditions such as water or finger contamination. Multispectral sensors work for the broadest range of people with normal, wet, dry or damaged fingers, across the widest range of usage conditions – from lotions or grease to sunlight to wet or cold conditions. The sensors also resist damage from harsh cleaning products and contamination from dirt and sunlight. Liveness detection Liveness detection is the ability to determine that the biometric data captured by the fingerprint reader is from a real living person, not a plastic fake or other artificial copy. An increasingly visible dimension of biometric performance in commercial applications, liveness detection is critical for preserving trust in the integrity of biometrics authentication. At the same time, it must not impede performance or result in excessive false user rejections.While liveness detection optimises performance, it is also important to ensure that this performance can be trusted The most trusted multispectral imaging fingerprint sensors with liveness detection provide a real-time determination that the biometric captures are genuine and are being presented by the legitimate owner, rather than someone impersonating them. This capability leverages the image-capture approach of using different colors or spectrum of light to measure the surface and subsurface data within a fingerprint. In addition to this optical system, the biometrics sensor features several core components, including an embedded processor that analyses the raw imaging data to ensure that the sample being imaged is a genuine human finger rather than an artificial or spoof material. Advanced machine learning techniques are used so the solution can adapt and respond to new threats and spoofs as they are identified. While liveness detection and the underlying capture technology optimises performance, it is also important to ensure that this performance can be trusted. This requires adequate testing to ensure interoperability with template matching algorithms. The first requirement for incorporating biometrics into a physical access control solution is a secure trust platform Trusted performance The top-performing solutions capture usable biometric data on the first attempt for every user. They also speed the process of determining that the biometric data is not a fake, and they quickly perform template matching to reject impostors and match legitimate users.The card/mobile plus finger mode is one of the fastest-growing two-factor authentication use cases for securing access to both physical and digital places To trust this performance, though, the focus must be elsewhere: on interoperability with template-matching algorithms. Extensive interoperability testing must be performed by skilled and independent third parties like the National Institute of Standards and Technology (NIST) so that performance data can actually be trusted in all template-matching modes, and not simply a vendor claim. Template matching modes Template-on-card and card/mobile + finger modes using “1:1” template-matching profiles authenticates a person’s identity by comparing the person’s captured biometric template with one that is pre-stored in a database. Template-on-device mode for finger-only authentication using “1:N” matching compares the person’s captured biometric template against all stored biometric templates in the system). The card/mobile plus finger mode is one of the fastest-growing two-factor authentication use cases for securing access to both physical and digital places.Cryptography prevents any man-in-the-middle attacks while also protecting the biometric database As an example of how to deliver trusted performance, HID Global uses the top-ranked NIST certified MINEX III minutia algorithm to ensure interoperability with industry-standard fingerprint template databases. This interoperability ensures that today’s systems, which are based on much more powerful hardware than in the past, will perform accurate 1:N identification of a full database in less than a second. Physical access control integration The first requirement for incorporating biometrics into a physical access control solution is a secure trust platform designed to meet the concerns of accessibility and data protection in a connected environment. The platform should leverage credential technology that employs encryption and a software-based infrastructure to secure trusted identities on any form factor for physical access control, access to IT networks and beyond. Cryptography prevents any man-in-the-middle attacks while also protecting the biometric database. This system also must encompass remote management of all readers and users, spanning all onboarding as well as template loading and enrolment activities for supported authentication modes. Properly implemented, biometrics solutions with liveness detection also protect privacy – if you can’t use a fake finger, it is meaningless Other important focus areas include configuration and administration, plus all logs, reports and monitoring.New system architectures and data models have been created to protect personal information and maintain user privacy It should be possible to manage biometric readers as groups or individually over the network, and tools should be available to allow system administrators to manage all configuration settings from time and data to language, security and synchronisation. The system should enable continuous live monitoring of authentication, alerts and system health, and provide a rich set of associated reporting tools. There are also backend implementation decisions to be made, including how a biometric authentication system will be seamlessly integrated into third-party systems. This is another major pain point of biometric technology. To simplify deployment, application programming interfaces (APIs) should be available for direct integration of the biometrics authentication solution with the access control infrastructure. Privacy considerations Properly implemented, biometrics solutions with liveness detection also protect privacy – if you can’t use a fake finger, then even if you did obtain someone’s fingerprint data, it is meaningless. Strong and updatable liveness protection is critical if biometrics are to eliminate the need to use PINs or passwords.Strong and updatable liveness protection is critical if biometrics are to eliminate the need to use PINs or passwords Biometrics data must be handled like all sensitive and identifying information, and properly architected system designs will always consider and protect against both internal and external threats and attacks. New system architectures and data models have been created to protect personal information and maintain user privacy. Beyond the encryption of the data itself, there are now many good alternatives available for building highly secure and well protected systems, including the use of multi-factor and even multi-modal authentication to maintain security even if some identifying data is compromised. Today’s modern fingerprint authentication solutions are on a fast track to deliver a unique combination of ease of use, availability and convenience and higher security to physical access control systems. With their latest improvements in liveness detection, system architectures, performance and ability to be easily incorporated into access control solutions, they seamlessly combine security and convenience to make them a viable option when accessing a facility, networks and services. These solutions deliver a higher confidence of “who” is being admitted through the building’s front door, where it really matters.
In the physical security space, video analytics have historically over-promised and under-delivered, often leaving end users sceptical about their capabilities. However, increased integration with security solutions and other business systems, as well as developments in deep learning and artificial intelligence (AI), have given video analytics a significant boost in recent years. Here, we take a look at the key trends putting video analytics in the spotlight, and how this opens up new opportunities for increased security and business intelligence. Deep learning and AI will enhance video analytics capabilities At the start of 2018, our security industry experts commented on how deep learning technology and Artificial Intelligence (AI) would extend to the video surveillance industry, allowing security professionals to gain very specific insights into human behaviour. Our experts predicted that this would permit organisations to reduce risk, enable efficiencies, reduce costs, ensure compliance and provide faster access to stored video. With AI-enables video systems, video analytics are set to perform more complex applications at a higher level of accuracy. Image processing developments allow intelligent analytics According to Ambarella’s Chris Day, advancing chip technology combined with the neural network approach to computer vision is game changing for video analytics. Since the problem of higher resolution has already been solved, the key differentior for video surveillance systems will be the ability to add computer vision in parallel with image processing and high-resolution encoding – ideally in a chip that is low-power. Integration with security systems increases video analytics value Video systems produce an immense amount of data that is often wasted, says Bosch Security Systems’ Sean Murphy. When video analytics alerts are integrated with other security systems, video events can trigger responses from other parts of the security solution. For example, cameras with video analytics can initiate intrusion detection system events initiate intrusion detection system events, prompting the panel to take action by alerting the central station or sending video to security personnel. Video analytics add value with actionable business intelligence Adding network video to the current generation of Internet of Things (IoT) solutions provides actional value beyond situational intelligence for security purposes. With increasingly intelligent sensors, interactions between business systems are becoming more sophisticated, providing a value greater than the sum of the parts. Organisations can use smart applications to reduce energy consumption, allocate workspace, and reduce operating costs. In a retail environment, analytics are now capable of assessing a scene for occupancy and crowd control, even generating reports of trends over time. Video analytics detect abnormalities to predict incidents Camera-based video analytics can go beyond assessing a current scene to predicting potential risks before they occur, explains Pelco’s Jonathan Lewitt. Based on predetermined factors or analysis of prior events, systems can collect all available information to determine the level of severity of a situation and whether an action needs to be taken. At the same time, systems can correlate data from video and other sources to help analyse similar occurrences in the future. Video analytics increasingly supplemented with audio analytics Audio analytics are often overlooked, notes Hanwha Techwin’s Paul Kong, perhaps due to differing privacy laws from video surveillance. However, audio analytics processed in a camera can help provide a secondary layer of verification for events, as well as identifying gunshots, screams, or other sounds indicating an incident is taking place. This makes audio analytics ideal for dealing with active shooter events at schools and campuses. As Louroe Electronics’ Richard Brent explains, audio analytics software can detect rising levels of human aggression, as well as recognising firearm discharge. This can trigger alerts to ensure incidents are dealt with swiftly.
Genetec Inc., a technology provider of parking enforcement, unified security, public safety, operations, and business intelligence solutions, announced Plate Link, a new feature for its AutoVu™ automatic license plate recognition (ALPR) solution. Designed to allow vehicles to share license plate data while out on patrol, Plate Link acts as a force multiplier for parking enforcement officers (PEOs), allowing them to administer shared permits and time-limited parking bylaws across multiple zones more efficiently. Shared permit detection Managing shared parking permits (where several vehicles share a single permit) can be a complex and time-consuming task. To identify a shared permit violation, a single parking enforcement vehicle would typically need to see both cars sharing a permit to detect that they were both in the lot at the same time. This can prove challenging, if not impossible, for large facilities that employ multiple enforcement vehicles. With AutoVu Plate Link, any patrol vehicle can detect violations using license plate data collected by other connected vehicles. This helps increase the rate of detection and simplifies the assignment of patrol routes. Better organisation and rule enforcement “In an effort to provide the best experience possible to their patrons, parking organisations have adapted their services to provide more flexibility. Shared permits have become a frequent and popular solution to encourage carpooling and accommodate households with multiple vehicles. This has placed a heavier burden on enforcement officers who must ensure compliance with parking rules,” said Charles Pitman, AutoVu Product Marketing Manager at Genetec. “Our goal is to empower officers by making it easier for them to organize their routes and efficiently enforce those rules, without having to worry about the way their ALPR system works,” he added. How AutoVu Plate Link works AutoVu Plate Link provides similar benefits to officers enforcing time-limited parking bylaws. It allows two separate patrol vehicles to be assigned to a zone and work in unison, as if they were a single vehicle. Each license plate scanned by a vehicle is automatically transferred to the next vehicle that enters the zone. By working together, the first patrol vehicle captures the license plate information initially, and should a violation occur, it will be detected by the second patrol vehicle making a subsequent pass. The first patrol vehicle doesn’t have to circle back after the time-limit has elapsed. Using the same vehicle data eliminates the need to circle back to an assigned zone, and boosts capture rates.
National Security, a global safety and security products manufacturing company, has delivered some advanced security solutions equipped with the latest technology. The company has been known to meet every business challenge that enterprises face with its solutions. Their global reach and unparalleled range of products and services assisted customers in ensuring safety, security and business with the right solutions. Security access challenge Since this manufacturer of safety and security products was spread across India, it required a reliable time-attendance and access control system. However, the major issue lay with the implementation of such a system across different locations in India. Another issue that the company needed to deal with was to assign different attendance policies and shifts to its employees. The manufacturer also required a centralised management for their time-attendance and access control system. Solution Connected all locations with their central location for time-attendance Integration with HRMS software Centralised monitoring and control of all devices Auto Data Push to a central server Configured flexible attendance policies Products COSEC DOOR FOP: Fingerprint based Door Controller with Touch-Sense Keypad COSEC CPM MIFARE SMART: Card Personality Module for Mifare Smart Card COSEC PANEL LITE: Site Controller for Controlling Multiple Door Controllers COSEC ENROLL FINGER: Enrolment Station for Enrolling Finger COSEC CENTRA LE: Application Software for 1000 Users, Expandable up to One Million Users COSEC LE TAM: Time-Attendance Module for COSEC CENTRA LE COSEC LE ACM: Access Control Module for COSEC CENTRA LE COSEC USER1000: User License for 1000 Users Results Enhanced time-attendance solution with flexibility Fast fingerprint recognition Reduced costs and time savings on maintenance Excellent after-sales support Centralised monitoring Direct salary generation using HRMS integration
HID Global, a worldwide provider of trusted identity solutions, was selected by Skanska, one of the world’s project development and construction groups with operations in Europe and North America, to incorporate HID’s mobile solution for secure access to its new office complex in Warsaw. Powered by Seos, HID Mobile Access improves the user experience and increases security throughout the entire building – from the parking lot and elevators to areas with limited access to the public. Located at 173 Solidarności Avenue in Warsaw, the new Spark office complex is not only the new headquarters of Skanska, but a large part of the 70,000 square-meter office building has also been set aside for other tenants. Because the building is intended to be a mixed-tenant space, it was crucial to restrict access to secure areas from unauthorised visitors. Using smartphones for access The Spark building was designed to enable mobile access so that employees can now use their smartphones to open doors and enter secure areas. Skanska, with help from system integrator Sharry Europe, created a new system for building occupants that integrates numerous building applications, including HID Mobile Access. As a result, all building applications have been incorporated into an integrated mobile app, which marked an advancement in creating a more streamlined and convenient experience for the users. HID Mobile Access enhances the security for accessing our entire building" Both Spark building employees and their guests can now move throughout the building with nothing more than a smartphone, without the risk of them gaining access to restricted areas – unless the proper access rights are granted. When users arrive at the door, they simply tap their iOS and Android devices to an iCLASS SE reader using Near-Field Communications (NFC) or Bluetooth Low Energy (BLE) and HID’s ‘twist and go’ feature to gain access from a distance. Any changes to the user’s access rights are remotely managed by the administrator through a cloud-based portal. Integrating all building applications into one “HID Mobile Access enhances the security for accessing our entire building. In one application, we have integrated all building applications, such as parking, virtual reception and other Internet of Things functionality, bringing the whole user experience to a new level,” said Renata Nowakowska, Innovation Manager at Skanska. “One of the most pressing objectives for facility managers in smart buildings is to crack the code on how to enable as many building applications and services on mobile devices as possible in order to simplify how occupants move through a facility and interact with building services,” said Hilding Arrehed, Vice President of Cloud Services, Physical Access Control. “Skanska’s integration of HID Mobile Access into their mobile platform is a perfect example of how organisations are leveraging the power of mobile credentials and the cloud to realise the full potential of creating a connected and more intuitive experience for their users, while increasing security at the same time.”
Fastlane turnstiles have been installed at the Head Office of Allianz Insurance Plc., a leading and highly regarded general insurer in the UK market, to improve overall security and prevent unauthorised pedestrian access via tailgating and collusion. Part of the project involved the installation of six, DDA compliant lanes of Fastlane Glassgate 150 turnstiles, with an integrated Avigilon access control system and Third Millennium multi technology card readers. Access control system The main objective of the turnstiles is to ensure that staff use their access control cards correctly – preventing them from allowing access to colleagues who may have forgotten their own card, for example – whilst at the same time heightening security by preventing people outside of the organisation simply walking in off the street to gain access to the office. Charlie Salamone, Director at AVANZA Intelligent IT & Security, commented: “The Glassgate 150 was chosen as it’s one of Fastlane’s medium security turnstiles, with pedestal-height glass barriers providing a visual deterrent to anyone considering an unauthorised access attempt, whilst maintaining an open feel enclosure making the units visually appealing.”
HID Global, a worldwide provider in trusted identity solutions, announced that it has been selected by French co-working space provider Deskopolitan to power its access control system. Powered by Seos, HID Mobile Access enables roughly 200 users to access their co-working campus in the heart of Paris, conveniently and securely. Deskopolitan serves entrepreneurs who need professional, reliable working spaces to build their businesses. Occupying a 1350m2 building, the office space provider offers 100 desks, six club offices and four meeting rooms in its Château d'Eau campus, enough to serve about 200 entrepreneurs at maximum capacity. The HID Mobile Access Software Developer Kit (SDK) is integrated into CoWork.io, a shared and collaborative workspace management solution designed for smart organisations, so entrepreneurs can use their smartphones to access the building, book desks, private offices and meeting rooms, and unlock the rooms at the time of their specific appointment. Secure building access solutions “We have some great, high-potential start-ups here at Deskopolitan, and we strive to provide the best space-as-a-service solution to our clients,” said Édouard Phélip, Chief Financial Officer of Deskopolitan. “HID Mobile Access helped us really modernise the user experience by enabling our clients to securely access our building and the rooms with their smartphones. It is innovative, intuitive and unobtrusive; it’s a great fit for our services.” When Deskopolitan clients arrive at the door, they simply tap their iOS and Android devices to an HID iCLASS SE reader via NFC, or twist their phone from a distance to gain access using Bluetooth Low Energy. HID Mobile Access was designed to meet the needs of today’s busy and dynamic environments" Campus perimeter security “HID Mobile Access was designed to meet the needs of today’s busy and dynamic environments,” said Harm Radstaak, Vice President and Managing Director of Physical Access Control Solutions with HID Global. “It is ideal for co-working spaces that require high security and nimble ID management in cases where building access needs to be granted and revoked for a new set of people on a regular basis.” Deskopolitan’s clients are always on the move. To effectively secure the campus perimeter and its facilities, the company needed a mobile access solution that effectively controls user access 24/7. The HID Mobile Access portal meets both requirements. Through it, the co-working space provider can easily provision or revoke mobile IDs, streamlining management with zero compromise on security. Édouard Phélip added, “Since we’re working with some of the most passionate entrepreneurs and successful start-ups, security is paramount. HID Global, being a leader in security solutions, instills us and our clients with confidence. We are already exploring deeper integration of HID’s technologies to further enhance our campus in areas such as network printing and locker storage.”
The internet helped revolutionise the security industry, and technology continues to evolve at a speed and depth that is changing the way people protect their premises. Vanderbilt flagship products Cloud technology has resulted in a society that is always connected. For the security industry, this means it is now possible to remotely monitor many locations from hundreds of miles away. This is an area where Vanderbilt solutions carry particular depth. A browser and an internet connection are all that is required to access Vanderbilt’s flagship cloud products, ACT365 and SPC Connect. ACT365 is an integrated access control and video management solution while SPC Connect is one of the strongest intrusion detection solutions on the market. Remote monitoring instant execution Remote monitoring is a backbone feature of these solutions. This ability allows for the elimination of once laborious tasks that are now capable of instant execution through the quick click of a button on mobile phones, tablets, or PCs. For example, Travix, an online travel company that use ACT365 at their London offices, wanted remote connectivity with their site through smart devices. ACT365 is delivering this by giving users control of access points via any major web browser or ACT365’s app. When not at the premises, Travix managers also have visibility of access requests to their external doors and diagnostics for door status throughout their offices.Remote monitoring also means both SPC Connect and ACT365 allow for technical queries to be diagnosed and resolved on the go Diagnosing and resolving technical queries Remote monitoring also means both SPC Connect and ACT365 allow for technical queries to be diagnosed and resolved on the go, delivering ultimate control to site security. This enables site issues to be dealt with efficiently, minimising disruption as these can be addressed immediately and around the clock. SPC Connect provides the ability for a caretaker that oversees maintenance for multiple buildings to manage alarms remotely. If an alarm is triggered at one of these sites while the caretaker is working at a different location and getting to the incident is logistically difficult, they simply take out their smartphone, access the SPC Connect app, view the event, and turn off the alarm. Keeping up with consumer needs Essentially what remote monitoring boils down to is providing ease of use and convenience. Remote monitoring through cloud solutions saves time and money and brings peace of mind. With technology continuing to embed itself into our everyday life, it’s important the security industry proves its agility, adaptability, and dependability in keeping up with consumer needs and remote and instant access to security solutions are an obvious list topper here. In that sense, the remote monitoring provided by SPC Connect and ACT365 are proof that Vanderbilt’s ear is to the ground in 2017. To learn more about Vanderbilt’s SPC Connect and ACT365 solutions, visit www.vanderbiltindustries.com.
At one of Spain’s newest co-working spaces, the founders’ vision incorporated using the latest in security, accessibility and design to create a 21st-century business centre. Flexible and wire-free, SMARTair™ from TESA delivers real-time access control that can accommodate both regular daily traffic and busy one-off events at ULab’s dedicated events area. SMARTair Wireless Online management SMARTair™ Wireless Online management now enables access to the building and individual offices to be controlled in real time. ULab’s SMARTair™ system securely manages regular daily traffic of approximately 100 people, and has the flexibility to accommodate many more temporary visitors when their event space is full. “In addition to regular daily traffic, weekly traffic can almost multiply by 10 if an event is held,” says Enrique Burgos. “We needed an access control system as flexible and convenient as SMARTair™.” Also — and critically for ULab — SMARTair™ escutcheons and wall readers complement the ultra-modern design aesthetic of this new workspace. With SMARTair™ Wireless Online, ULab’s facility manager can monitor the building’s security status from a single control point and in real time, controlling who enters and when. The installation permits remote opening of any door at ULab, enabling easy access in cases where users have lost or forgotten their credential. Remote access can be granted from the SMARTair™ Web Manager software, which works on any device inside a standard browser without software installation, or from the SMARTair™ admin app for Apple and Android mobile devices. Individual access rights for user profiles It’s also easy to schedule individual access rights for different user profiles — allowing, for example, site managers to access all doors, but offering occasional users more limited entry to common areas. Changes in status can be made instantly from the Web Manager. And because SMARTair™ locks are operated with RFID smartcards, there’s no security problem if an employee loses their credential. With the SMARTair™ admin software, a simple click cancels the credential’s access rights — a much quicker and cheaper process than replacing a mechanical lock. With contemporary, low-profile design, user-friendly operation and flexible, real-time security functionality, SMARTair™ wireless access control has captured the spirit of ULab. About ULab ULab is a new co-working space in Alicante’s financial district. It has 56 co-working stations, 12 offices and an area reserved for events. For more information, see www.ulab.es. For more information visit www.tesa.es/discoverwireless