Ava Group (AVA), a provider of security risk management services and technology will be showcasing its portfolio of security solutions at Intersec Dubai 2019, stand S3-C48. Intersec Dubai features a rich selection of exhibitors in Security, Safety & Fire Protection, attracting visitors from the Middle East, Africa, the Indian subcontinent and well beyond. Ava Group will be presenting the latest exciting solutions from its technology division - which incorporates Future Fibre Technologies (F...
Lodge Security acquires Ladbroke Security Services, which has 120 staff and sales of £2.25 million. The company was founded in 1990 by the retailer Chinacraft to protect its assets and has expanded its services to include 30 independent customers. Operating primarily in London and the Southeast, Ladbroke provides managed security services that include 24-hour concierge, front of house reception, guarding, remote video and CCTV monitoring, key-holding and patrol services. Lodge Security is...
HID Global, a global provider of trusted identity solutions, unveiled a new subscription-based delivery model simplifying access to its broad suite of identity and access management (IAM) software and services. The new HID ActivOne is an end-to-end digital identity management and authentication solution for large organisations, securing the identity of people, critical data and assets -- all with the flexibility of a subscription. Organisations realize that it is not possible to rely on a...
Today’s security leaders encounter many challenges. They have to operate with reduced budgets and face challenging and evolving risks on a daily basis. Security leaders are often ignored and only called upon when needed or in disaster situations. Many don’t have an ongoing relationship with the C-suite because the C-suite doesn’t understand the value they bring to the whole business. In order to resolve these challenges, a security leader can apply a risk-based approach to the...
Vanderbilt, a provider of state-of-the-art security systems, has integrated the Aperio wireless locking technology from ASSA ABLOY Access Control with its new ACT Enterprise platform. The decision by Vanderbilt to integrate products from ASSA ABLOY Access Control’s Aperio portfolio with ACT Enterprise will enable customers to easily add mechanical locks to their access control system. Offered at an affordable price, Aperio ensures users require minimal additional hardware to upgrade their...
There’s only so much a corporation can do to counteract the threat of a major incident. You can ask everyone to be vigilant and to report anything suspicious, but you cannot stop someone intent on deliberately starting a fire, threatening a work colleague with a knife or something much worse. And of course, most businesses recognise that even routine events – such as burst pipes, IT system failures, extreme weather event or power outages – can have significant consequences unle...
March Networks, a global provider of advanced video surveillance and video-based business intelligence solutions, is pleased to announce its complete lineup for Global Security Exchange (GSX) 2018. Intelligent video solutions In addition to the company’s solutions for financial, retail and transportation organisations, March Networks will showcase its newly launched Software as a Service (SaaS) offering for quick service restaurant (QSR) and convenience store (c-store) franchisees, as well as its seed-to-sale tracking and compliance solution for the cannabis market. It will also demonstrate its mobile RideSafe MT Series video recording platform for enhanced security and risk mitigation in college and healthcare transit applications. All March Networks products and services deliver the exceptional reliability, scalability and enterprise-class video management customers have come to expect from the brand. They reflect March Networks’ long-standing commitment to developing intelligent video solutions that help solve everyday business challenges in customer service, corporate compliance and operations, in addition to security and loss/fraud prevention. The secure, hosted service delivers all the benefits of March Networks’ powerful Searchlight for Retail solution SaaS offering for QSRs and C-Stores GSX will be the first opportunity for show attendees to see March Networks Searchlight for Retail as a Service. The secure, hosted service delivers all the benefits of March Networks’ powerful Searchlight for Retail solution – including loss prevention, data analytics and operational audits reporting. The service is easy to deploy and eliminates the need for franchise owners to purchase and maintain servers within their own IT infrastructure. It includes all software licensing, and the administration of camera and recorder processing, health management, user management and software upgrades, performed by March Networks Network Operations Center staff working in cooperation with certified systems integrators. Better seed-to-sale tracking and compliance March Networks will also demonstrate its solution for the cannabis industry at GSX. The solution provides enhanced seed-to-sale security, tracking and compliance at every stage in the process – from the cultivation facility, in transit and through to the dispensary. It includes purpose-built video recording and management systems to ensure clear surveillance video is reliably captured and stored as long as required under government legislation. Uniquely, the solution also integrates video with data from fixed Radio Frequency Identification (RFID) tags – which are required by law throughout the cultivation process in some U.S. states – and point-of-sale (POS) systems used in dispensaries. The video and data are correlated in March Networks Searchlight for retail software, providing operators with advanced search, investigation, loss prevention and reporting capabilities. Enhanced security for student shuttles The RideSafe MT Series IP recorders address a common gap for college, healthcare and other campuses operating shuttle or transport services The March Networks’ transit portfolio will also be on display at GSX. The RideSafe MT Series IP recorders address a common gap for college, healthcare and other campuses operating shuttle or transport services. The compact recording platform is ruggedised to ensure reliable operation in demanding mobile environments and enables automated video downloads over WiFi, 4G and other wireless networks to keep vehicles in service longer. Equally important, the mobile recorders can be managed seamlessly with March Networks Command Enterprise video management software in parallel with the company’s entire fixed video recording portfolio – giving customers a single, end-to-end video solution that simplifies system administration and management significantly. All visitors attending the show in search of proven video surveillance systems and differentiated solutions that deliver relevant video-based business intelligence for their broader organisation, are invited to see March Networks in Booth 3515 at GSX 2018.
Openpath, a company on a mission to bring frictionless access and better security to our workplaces, reveals that 94% of its users now use their smartphone over a keycard to enter the office, an enviable accomplishment in an industry with shockingly low mobile adoption rates. Recognising a general lack of mobile adoption in the access control industry, Openpath launches the Mullion Smart Reader to fill out its portfolio of access control readers. The sleek, versatile and compact design of the Mullion Smart Reader enables Openpath to further provide the most convenient form of mobile entry - hands-free, keyless, mobile access – to businesses everywhere. Traditional access credentials “Employees want convenience; they don’t want to go through a bunch of steps to get into their office in the morning. With the majority of our users agreeing that the simplest way to unlock their office door is to stand in front of it, we developed the hardware and software to deliver that experience to any office setting,” said Alex Kazerani, Openpath’s co-founder and CEO. “By achieving 94% mobile adoption over traditional access credentials, we have cracked the code to delivering the user experience employees want with the elegant, easy-to-install hardware businesses need.” Openpath user analytics show that the majority of users have not only shifted to using their mobile phone for access, but also prefer to leave their smartphone in their bag or pocket to enter the office. With Openpath’s Touch access feature, employees get the convenience of an automatic door with the security of an encrypted, credential-based access system. Hands-free entry With the new Mullion Smart Reader, it is easier than ever for companies to install Openpath in the most convenient spot to enable hands-free entry with Touch Faster and more convenient than opening an app or using a key or fob, Openpath Touch automatically recognises a user’s smartphone as he/she approaches, even if it's in a purse or pocket, and allows the user to enter with only a wave of their hand or a touch of the reader. With the new Mullion Smart Reader, it is easier than ever for companies to install Openpath in the most convenient spot to enable hands-free entry with Touch. Designed to fit anywhere and bring a modern look-and-feel to locations that require a smaller reader form factor, the Mullion Reader can mount on any wall or door frame and leverage existing reader wiring. Once installed, Openpath’s technology uses Bluetooth and motion detection to authenticate the user and unlock the door. Like all Openpath Smart Readers, this new model continues to support keycards and fobs to ensure flexible options for those who want to offer various credential options. James Segil, co-founder and President of Openpath, said: “To truly enable convenient, elegant mobile access for all, we need to make smart office access control more accessible. With the introduction of this Mullion form-factor to our existing Smart Reader line-up, we are able to provide the many design and deployment options necessary to meet the demands of any building configuration. With the Mullion Smart Reader, we ensure that any office can utilise our technology in a way that is both practical and affordable while keeping security, aesthetic and ease of use a top priority.”
Ping Identity, the provider of Identity Defined Security, announced the general availability of PingIntelligence for APIs, following its acquisition of Elastic Beam. The AI-powered solution is part of the Ping identity platform and brings an increased level of intelligence into how APIs are accessed and used to protect API infrastructures from cyberattacks, while also delivering deep insight into API activities. “APIs are proliferating throughout all organisations faster than security teams can keep up with them. While APIs benefit digital transformation initiatives, they also are the gateway to everything of value and that has made them a major target for cyber-attacks,” explained Bernard Harguindeguy, SVP, Intelligence at Ping Identity. “PingIntelligence for APIs allows security and DevOps teams to monitor API infrastructures for new APIs, provides audit trails of API traffic, and automatically blocks identified cyberattacks that target data and systems behind the APIs.” Preventing API data breaches The availability of PingIntelligence for APIs help organisations challenged by emerging trends within the API landscape, including: Industry directives such as PSD2, Open Banking and FHIR/HL7 have accelerated the use of APIs to drive interoperability between organisations Industry directives such as PSD2, Open Banking and FHIR/HL7 have accelerated the use of APIs to drive interoperability between organisations in similar industries. As a result, APIs have become a new and growing security risk for all organisations by making it easier for hackers and others to reach into applications and data they expose. According to Gartner, “API abuses will be the most-frequent attack vector resulting in data breaches for enterprise web applications by 2022.” Demands from enterprises for rapid API integration projects force security teams to build unique policies for each API. This introduces significant complexity and overhead costs, while also hampering the delivery timelines. According to the Cloud Elements State of API Integration 2018 Report, more than 50% of net new API integrations are built in under 30 days. No network reconfigurations required PingIntelligence for APIs is offered via inline and sideband deployment options available for a range of production environments. The sideband option allows the solution to be “dropped in” into existing API Gateway and/or PingAccess deployments with no network reconfigurations.
Pivot3, the pioneer in hyperconverged infrastructure (HCI) performance and technology, announced that it has certified its infrastructure solutions for mission-critical IoT, safe cities and smart building environments operating with Milestone Systems video management software (VMS). This certification confirms that organisations can gain access to infrastructure that is proven to deliver the performance, resilience and scalability required in mission-critical environments. Enterprises rely on information from multiple sources, including security and surveillance platforms, to gain new levels of intelligence to secure their environment. Pivot3 provides extreme levels of availability and comprehensive data protection that has been proven in high-profile environments, including Majid Al Futtaim Properties, Caesars Entertainment, the University of Central Florida, and many others. Protecting data loss from system failures Pivot3 streamlines video management and storage capabilities by hosting VMS, other security applications and IT workloads on one unified platform Pivot3 supports the unique needs of these environments by optimising its platform in operation with Milestone XProtect VMS. Certified according to Milestone’s robust testing criteria, solutions using Pivot3 and Milestone guarantee that valuable data assets captured with Milestone meet the required performance benchmarks, stored and protected with Pivot3. Pivot3 streamlines video management and storage capabilities by hosting VMS, other security applications and IT workloads on one unified platform, thereby reducing hardware investments and data centre footprint, and simplifying management. “Our global market cooperation with Pivot3 equips organisations to capture and access critical video data and insulates them from the risk of downtime or data loss from major system failures,” said Henrik Sydbo Hansen, group manager, devices and integrations, Milestone Systems. “Pivot3’s ability to deliver the performance and resilience required to meet the complex and evolving needs of today’s demanding enterprise-class IoT and security applications is a key factor in our ongoing collaboration.” Reducing vulnerabilities and ensuring safety “Organisations are aggressively moving toward the idea of the consolidated, secure enterprise in an effort to better manage connected devices, reduce vulnerabilities and ensure safety, while integrating with IT best practices and bridging the gap that often exists between security and IT,” said Brandon Reich, vice president, security and IoT, Pivot3. “Pivot3 certified on Milestone Systems VMS is designed to offer significant value to these entities, allowing them to manage their security and IT infrastructure requirements in an integrated fashion that’s easy to manage and is proven in hundreds of deployments to reduce costs.”
Business doesn’t stand still, but security feels static. Whether mechanical keys or wired door locks, access control doesn’t always have the flexibility a changing environment needs. When is the right time to expand an access control system? And what’s the best way to do it? Extending coverage for traditional access control is expensive and intrusive, but there is an alternative. If one wants to forget about keys and the hassles of key management, wireless locks are the fast and cost-effective way to extend any access control system. But when does it make sense to add wireless locks to the existing access control? What are the key questions to ask yourself: Do you need more control over your site? Wireless locks with built-in RFID readers — including Aperio devices from ASSA ABLOY — enable you to control and audit access at more doors Has your business expanded to a new building, or do you just want better security for existing offices, records stores or meeting rooms? Wireless locks with built-in RFID readers — including Aperio devices from ASSA ABLOY — enable you to control and audit access at more doors. Battery-powered Aperio wireless locks integrate seamlessly with installed access control systems from over 100 different manufacturers. Is key management creating more and more workload? Tracking all your keys, re-cutting keys when they are lost or misplaced, replacing locks that have been compromised; These tedious tasks place a heavy workload on a facilities or office manager. Install Aperio wireless locks and you can forget about keys altogether. No more mechanical keys mean no more worrying about a lost key threatening security at your site. You can amend or cancel a key-card in an instant. Do you need more flexibility in providing access? When your business grows, you don’t always want everyone to access every area. Adding wireless access control at more doors means you can assign finer-grained access rights to employees, visitors and contractors. Adding wireless access control at more doors means you can assign finer-grained access rights to employees, visitors and contractors So, staff can access communal areas during working hours, while cleaners and other contractors only have out-of-hours access for the duration of their contracts. Only IT staff access the server room; just office administrators and senior managers open the records store. All this — and thousands more bespoke combinations to suit your workplace — are possible without expensive and disruptive cabling, if you fit Aperio wireless devices to more doors. Aperio Wireless locking systems Aperio wireless locks work within every major access control system on the market, from more than 100 different manufacturers. Installing them is more cost-effective and faster than hard-wiring extra doors, because there’s no cabling and almost no disruption to everyday business. The only maintenance needed is a new standard battery every 40,000 cycles (typically 2 years). Aperio cylinders, handles, escutcheons and complete locks for security doors fit almost any opening: exterior and interior doors, from fire and escape route doors to meeting rooms, labs and offices; wooden, glass or aluminium doors. Aperio locks are compatible with all common lock profiles: Euro, French, Finnish, Scandinavian and Swiss. Integration with your existing system can be Online or Offline.
Traka will be at The Emergency Services Show, unveiling its latest intelligent systems for securely storing and controlling access to vulnerable keys and vital equipment, including the latest body-worn camera technology. On stand L47, the industry leader in intelligent key cabinets and locker solutions will show how its bespoke systems are being utilised by the Emergency Services to better manage equipment, valuables and sensitive material. At the show, Traka will be demonstrating how its innovative Modular Locker system has evolved to reflect the increasing use and need for secure, audit control storage by the Emergency Services for body worn camera scanners. S-Touch Key Management system Visitors to the stand will also be able to see Traka’s specialist S-Touch Key Management system, presenting storage in a controlled access environment with full audit control capability, where items are charged and instantly ready for use. Traka provides intelligent key management and equipment management access control to better protect important equipmentSays Wayne Kynaston of Traka: “The introduction of body worn camera technology to improve safety, primarily for the Emergency Services, has been well-documented. But it is essential the equipment is secured not only in a safe environment but also to ensure they are available for instant use in a fast-moving situation, including being fully charged. Improved security and efficiency “At The Emergency Services Show, Traka will be able to demonstrate how we continue to work closely with the Emergency Services to ensure the right response to protect the significant investment. Our systems can be adapted to suit individual service requirements, including presenting full audit trail capability to add a level of protection to vulnerable staff in their working environment.” Traka provides intelligent key management and equipment management access control to better protect important equipment - resulting in improved security and efficiency, reduced downtime, less damage, fewer losses, lower operating costs and significantly less administration.
It had been a particularly slow night. The plant security guard had just made his rounds on this Sunday evening shift. As soon as he passed the weighing scales, he could enter the guard shack and get off his feet. Challenging a curious incident However, on this night, he noticed the waste vendor’s truck sitting half on and half off the scale. He stopped dead in his tracks to see if the truck would back up and completely sit on the scale. It never did. The observant guard walked up to the truck and challenged the driver who seemed surprised. “Hey, you’re not weighing your truck properly.” The driver fumbled for a response before replying, “Sorry, I was on the phone with a friend. I didn’t notice it.” But this security guard had the presence of mind to demand the driver’s phone. The driver was caught off guard and surrendered the phone. The guard then pulled up the most recent incoming/outgoing calls and saw no calls during the last 30 minutes. “I don’t think so.” “You don’t think so what?” The security guard was frank, “You haven’t used this phone in over half an hour.” The truck driver sheepishly acknowledged the fact. It was decided to install CCTV covering the weighing area and scales – no easy feat due to poor lighting Preventing crime as it happens Knowing the driver was lying, the security guard ordered the truck back on the scale for a correct weighing and advised the driver that he would report the incident. The security guard wrote up his report and handed it off to his supervisor who, in turn, contacted the local corporate investigator. This investigator was soon on the phone with his boss at corporate headquarters on the other side of the world. Together with Security, they decided to install CCTV covering the weighing area and scales – no easy feat due to poor lighting. However, once completed, they waited. They would not have to wait long. For the next two months, the waste vendor trucks, filled to the brim with production waste, black-and-white paper and other waste products from the plant, would stop on the scale only for a moment and then drive the front half of the truck off the scale for weighing. It was obvious that the vendor was cheating the company by only paying for half the waste. After two months, it was decided to catch the next cheating driver “en flagrante.” Sure enough, the next truck went half on and half off the scale and was weighed. Security then asked the unsuspecting driver to park his truck and invited him inside the building to talk to a supervisor. The driver signed an incriminating statement about the scheme and his role therein. They sent him on his way asking him to keep it quiet Waiting for the driver in a large office was the local investigator and his close friend, the Head of Security. After a difficult interview, the driver admitted to cheating on the scales over a two-year period—he claimed that some of the scale cheating was done at the direction of the vendor’s management, while some of it he did himself by “ripping off” the vendor—which he acknowledged was dangerous. Working with authorities The driver signed an incriminating statement about the scheme and his role therein. They sent him on his way asking him to keep it quiet—they would see what they could do for him later on. In the meantime, Corporate Investigations had received a due diligence report on the vendor company which contained disturbing news—the company and its managers were associated with a countrywide waste management mafia. The report suggested that the vendor had a reputation for thefts and involvement in numerous lawsuits regarding thefts and embezzlement. Shockingly, no prior due diligence had ever been conducted on the vendor. Fortunately, the plant’s finance and audit team had maintained good records over the past 5 years and were able to re-construct the amount of waste going out the plant door and the amounts being claimed and paid for by the vendor. The discrepancy and loss stood at a multi-million dollar figure. After consulting with the local police authorities and company lawyers, it was decided to pursue a civil case against the vendor. Pursuing legal action The regional lawyer, the Head of Investigations, the Head of Security and the CFO invited the vendor to discuss the problem. Some of the evidence was shown to the vendor’s CEO who became indignant and, in order to save face, promised to fire the truck drivers and to repay any losses for the last two months. Inter-dependent entities - security, investigations, finance/audit and legal - combined their resources and agendas to form a unified front That was not enough for the company and a protracted legal battle ensued which lasted several years and resulted in the vendor’s paying almost the entire amount in instalments. The vendor was dropped from the contract and internal controls strengthened—the only plant employee dealing with the waste issue left the company and was replaced by two individuals. The plant also began paying more attention to the waste process and less to the production side. Several “lessons learned” come to mind. First, the tripwire came in the person of an astute and well-trained security guard who exhibited some of the best characteristics you want to see from men and women in that profession. The Security Department was also adept at installing the CCTV and capturing the fraud live on videotape. But a far greater lesson was learned—of what can happen when inter-dependent entities (security, investigations, finance/audit and legal) within a company combine their resources and agendas to form a unified front. The results speak for themselves.
In 2017, SALTO Systems led the market with increased emphasis on two growing sectors within access control: Mobile technology and cloud solutions. Strengthening market positions Mobile access control applications are now a must across all security verticals. The hospitality sector, for example, is quickly seeing smartphones replacing room keys and check-in lines with mobile apps like SALTO’s JustIN Mobile. This technology replaces the need for an access card by securely sending a mobile key OTA from access control management software, to an iOS or Android device. This is an operations time and money saver. SALTO – an innovator in cloud-based access control – strengthened its position in 2017 by acquiring the remaining shares of Clay Solutions, a leading provider of cloud technology for smartlocks. Together, SALTO and Clay developed the technology that SALTO uses in its SALTO KS Keys as a Service cloud-based access control. There are several reasons why the market is moving to the cloud: easier maintenance, scalability, reliability, reduced cost and the ability to use anywhere via the internet. It’s necessary to deploy wireless, technologically-advanced solutions to make cost-effective access control Encouraging investment in access control Continued investment in mobile access and cloud technology in 2018 is essential to meet the access control needs of the booming multi-family housing and shared office-space markets. Managing access control for end users and residents in these verticals is challenging. Use of mechanical keys in these environments is too expensive and time consuming; it’s necessary to deploy wireless, technologically-advanced solutions. SALTO has recently experienced tremendous growth in the U.S. and we’re expecting more success in 2018. We’ve added several seasoned executives to the sales team and will continue to do so. We’ve also opened our first two XSperience Centers – in New York City and in Atlanta – that showcase our extensive line of products, and serve to conduct dealer and end-user training. The SALTO team looks forward to increasing focus on residential, multi-family and shared office-spaces, as we know that our wireless electronic lock solutions are well-suited for these growing verticals. In 2018, there will be a continued migration to electronic access control: The winners will offer a reliable product with innovative technology, full support, well-established relationships and a national presence.
News of cyberattacks seems constant these days. Recently, Equifax, a US-based consumer credit reporting agency, announced that a private customer data breach impacted 143 million people. Earlier this year, 1.5 million connected cameras around the world were hijacked in an unprecedented DDoS attack. As cyber-attacks become more rampant, it’s hardly surprising that governments are stepping in to hold organisations more accountable. One of the most recent examples of this is the European Union’s General Data Protection Regulation (GDPR) which is set to come into effect on May 25, 2018. New GDPR legislation mandates Essentially, the GDPR mandates that businesses adhere to specific governance and accountability standards in the processing and protection of data. A big focus of this new legislation is that individuals have greater control over their personal data. Contrary to legislations in the United States, the personal data captured by organisations will remain the property of each EU citizen, entitling them to access their own data and have greater decision power over how it is used or distributed. Should a breach occur, companies are mandated to report it to the supervisory authority within 72 hours. Failure to comply with these new regulations could result in up to $20 million euros in penalties, or 4% of the company’s global annual turnover. Territorial scope of GDPR So why should North American companies and security directors be concerned? The territorial scope of the GDPR is global. Any business that is collecting or storing personally identifiable information (PII) of EU citizens will be held accountable, regardless of where the organisation is based or operating from. This includes any business collecting information from EU residents, or organisations with offices, stores, warehouses or employees in the EU. With the deadline nearing, these North American organisations are seeking strategies that will keep them compliant across all their data collection processes. With a focus on physical security sensors and solutions, below are five steps that North American companies can start taking to become GDPR-compliant. Step 1: Conduct a data risk assessment To better understand the implications of the GDPR, an organisation must fully assess the level of risk that its data processing operations pose to the rights of EU citizens. A business should map out how data is collected, where it is stored, how long it is kept, and who has access to it. Identifying and categorising the various types of data is also critical to this evaluation. That’s because according to the GDPR, there is a clear distinction between the high, medium and low-risk data. Through authorisation, organisations can define how specific users or groups can use the security system For instance, data derived from a video surveillance system that shows who a person is and where they are is considered high-risk. This could be a retailer that is monitoring video of people coming into its stores or an EU subsidiary office that is recording publicly-facing video footage. Step 2: Hire a Data Protection Officer In cases of high-risk data processing, organisations may need to appoint a data protection officer (DPO). This person must be independent of any IT, risk or VP-level functions and will be responsible for monitoring the organisation’s compliance with respect to their GDPR obligations. The DPO will act as the main point of contact for all communications with the GDPR supervisory body. This means that at any point in time, the DPO should also be able to show the steps taken by the organisation to protect any collected information. Step 3: Implement privacy by design The GDPR mandates that businesses with ‘high-risk data operations’ implement systems that protect privacy and secure data by default. It is therefore critical for these organisations to start talking to system integrators and suppliers about what they can do to harden their systems. After all, cyber security should be a shared responsibility. Organisations should work with partners and vendors to better understand cyber security risks and streamline internal processes such as outlining who has access to the data and identifying why and how long it should be kept. With this understanding, companies can justify adding varied lines of defence such as encryption, multi-layer authentication and authorisation. For instance, through authentication, organisations can determine if an entity—user, server, or client app—is who it claims to be, and then verify if and how that entity is allowed to access a system. Through authorisation, organisations can define how specific users or groups can use the security system. Finally, encryption protects an organisation’s information and data by using an algorithm to make text indecipherable. From device to client application, these security measures help organisations safeguard against cyber threats and unauthorised access. Step 4: Address data transparency At any point in time, an EU citizen has the right to request a copy of information pertaining to them from an organisation. Upon receiving this request, the company would be required to securely and remotely share video and data files with the individual. A problem could surface if other individuals are visible in this footage. Security solutions that not only facilitate information sharing but also protect privacy can help companies quickly adapt to these new laws. Blurring out faces transfers high-risk data to the low-risk category, allowing organisations to monitor or share video while still protecting privacy One example is having video redaction capabilities to blur out people’s faces in video. This feature transfers high-risk data to the low-risk category, allowing organisations to monitor or share video while still protecting privacy. Companies will also need to provide greater transparency by making points of contact accessible and clearly outlining data management policies. Step 5: Engage data processors According to the GDPR, any company that collects and controls private information is a Data Controller. To properly manage the collected data, companies may choose to outsource some of the responsibility to service providers, known as Data Processors. For instance, a retailer could decide to implement a Video-Surveillance-as-a-Service (VSaaS) solution. Some advanced VSaaS providers offer numerous logs and, more importantly, strong reporting platforms that can help Data Controllers and DPOs monitor the state of their video surveillance systems. In some capacity, Data Processors are equally responsible for adhering to laws. Considering the failure to report a breach in 72 hours could result in massive penalties, implementing a VSaaS is a great way to stay on top of potential breaches and decrease compliance upgrade costs. However, it is not a full transfer of risk. The retailer would still be responsible for issuing and managing system access privileges, ensuring password choices are robust, and essentially, limiting data to those who can view or extract it. Counteracting emerging threats through GDPR compliance With heavy fines looming, it is imperative that North American businesses collecting or processing any EU citizen data begin working on GDPR compliance immediately. Those filming in high-trafficked public spaces are at an even greater risk of penalty if compliance has been ignored. Starting with a comprehensive risk assessment, hiring a qualified DPO, upgrading technology with built-in privacy and security mechanisms, and in some cases, working with data processors can help North American businesses get on track to full GDPR compliance. Regardless of these new laws, these practices will ultimately benefit the organisation as a whole, as new threats emerge globally.
A complex set of biological, psychological, sociological, contextual and environmental factors are involved when a perpetrator decides to commit an act of workplace violence. In many cases, the perpetrator doesn’t really want to become violent; rather, they are seeking to achieve an outcome and mistakenly believe violence is their only option. An underused approach to preventing workplace violence is to consider the issue from the perspective of the instigator, to seek to understand their grievances, and to suggest alternative solutions, says James Cawood, President of Factor One Inc. “It’s helpful to consider their perspective at a point of time, and how do I use that information in a way that explores the issues and influences them to seek other means of achieving their goals without violence?” suggests Cawood. Preventing workplace violence An underused approach to preventing workplace violence is to consider the issue from the perspective of the instigator Factor One specialises in violence risk management, threat assessment, behavioural analysis, security consulting and investigations. Cawood will present his insights into preventing workplace violence in a session titled “Workplace Violence Interventions: The Instigator’s Perception Matters” during GSX 2018 in Las Vegas, 23 September. Intervening and seeking to understand the instigator’s viewpoint can direct them away from violence. Often, diffusing a situation can prevent tragedy. Delaying a violent act is a means of prevention, given that the instigator might not reach the same level of stress again. Cawood says several recent examples of workplace violence illustrate the importance of identifying behavioural precursors and intervening. It is difficult to quantify the benefits of such an approach, since no one is keeping statistics on incident that were successfully diverted, he says. Reaching a mutually agreeable solution “Accommodation and appeasement often won’t serve the problem,” says Cawood. “Instead of projecting our needs on what would be effective for us, we must really understand what matters to them and what we are able to do to solve the problem. “It’s about listening and reflecting back to reach a mutual agreement of their perspective of what matters,” he says. “Now we can talk about what’s possible or not. Is there something concrete I can do that is within the rules? Just being heard in depth is a de-escalator of violence.” It’s the same methodology used by hostage negotiators: Listen, reflect back, and come to a mutually agreeable solution. Giving a troubled employee a severance package – money – might not address their underlying complaints For example, giving a troubled employee a severance package – money – might not address their underlying complaints. “We may not have solved the underlying problem as they perceive it,” says Cawood. “They may feel disrespected or picked on. There may be an underlying mental condition, such as paranoia, or a grandiose sense of self-worth, underlying filters that have nothing to do with money.” GSX networking and education GSX is the new branding for ASIS International’s trade show, attended by more than 22,000 worldwide security professionals Global Security Exchange (GSX) is the new branding for ASIS International’s annual conference and trade show, attended by more than 22,000 security professionals from 100-plus countries. Cawood’s session will be 24 September from 2:15 to 3:30 p.m. “My purpose is to hone in on an area of workplace violence that is often ignored,” says Cawood. Cawood started out in law enforcement in the 1970s and transitioned to security in the 1980s. His credentials are typical of the high level of speakers presenting at GSX 2018: He holds a Master’s Degree in Forensic Psychology, and a Doctorate in Psychology, is a Certified Threat Manager (CTM), and has successfully assessed and managed more than 5,000 violence-related cases. He is the former Association President of the Association of Threat Assessment Professionals (ATAP) and currently the Vice-Chair of the Certified Threat Manager program for ATAP. Cawood has written extensively on the topic of violence risk assessment, and co-authored a book, Violence Assessment and Intervention: The Practitioner's Handbook. Cawood has been active in ASIS International since the 1980s and sees value in attending GSX 2018. “People from all over the world are coming and being exposed to a common set of topics to use as jump-off points for additional conversations. People from all types of experiences and exposures will be providing information through those lenses.” Knowledge gained from GSX provides a “real chance to drink from a fire hose” and get a deeper understanding of a range of topics. The relationships and networking are another benefit: “Nothing is more powerful than knowing someone face-to-face,” he adds.
Security is more-than-ever linked to consumer electronics, especially in the residential/smart home market. CES 2018 in Las Vegas is therefore brimming with news that will have a direct impact on the security market, today and especially looking into the future. Products for the future of security CES is a giant trade show for consumer electronics with 2.75 million net square feet of exhibitor space and featuring more than 3,900 exhibitors, including 900 startups - in contrast, ISC West has some 1,000 exhibitors. During the week-long show welcoming 170,000-plus attendees from 150 countries, more than 20,000 new products are being launched. The products incorporate ingredient technologies such as artificial intelligence and 5G that will also be familiar elements as the future of the security industry unfolds. Familiar players at security shows also have a presence at CES, and many consumer technologies on display offer a glimpse of what’s ahead for security The areas of consumer electronics and security are closely intertwined. For example, Apple recently expanded near-field communication (NFC) support to include the NDEF (NFC Data Exchange Format), which will likely accelerate the adoption of smartphones for access control credentialing. In another recent development, Amazon acquired Blink, a home security camera startup that offers wireless home security systems. The acquisition aligns with Amazon’s effort to offer more home devices. Key security technologies at CES 2018 Familiar players at security shows also have a presence at CES. For example, Bosch is highlighting its “Simply. Connected” portfolio of smart city technology to transform security as well as urban mobility, air quality and energy efficiency. Many consumer technologies on display offer a glimpse of what’s ahead for security. Are Panasonic’s 4K OLEDs with HDR10+ format or Sony’s A8F OLED televisions a preview of the future of security control room monitors? At CES, Johnson Controls is announcing support for Apple HomeKit now offered in their DSC iotega wireless security and automation solution. Consumers can manage both their security system and also other home automation abilities using Apple’s Home app, or Siri on their iPhone, iPad or Apple Watch. Interlogix is announcing new features and components of its UltraSync SmartHome system, including hands-free voice control, high-definition cameras, an LTE cellular module and soon-to-be-released doorbell camera. The areas of consumer electronics and security are closely intertwined Developments in crime awareness ADT has a high profile at CES, including the launch of its ADT Go mobile app, equipped with 24/7 emergency response from ADT’s live monitoring agents and backed by Life360’s location technology, providing emergency response, family connectivity, safety assistance and crime awareness. ADT is also unveiling a video doorbell and expanding its monitoring to cybersecurity. IC Realtime is introducing Ella, a cloud-based deep-learning search engine that augments surveillance systems with natural language search capabilities across recorded video footage. Ella enables any surveillance or security cameras to recognise objects, colours, people, vehicles and animals. Ella was designed using the technology backbone of Camio, a startup founded by ex-Googlers who designed a simpler way to apply searching to streaming video feeds. It’s a “Google for video:” Users can type in queries such as “white truck” to find every relevant video clip. Smarter homes and smarter computers Do-it-yourself smart home security company Abode Systems announces iota, an all-in-one system giving customers more freedom and flexibility to build out and monitor their smart home. The new form factor has a built-in full-HD resolution camera enabling customers to see and hear what’s going on in their home 24/7 while a built-in gateway supports hundreds of devices to make homes more convenient, safer and more secure. There is also support for Apple HomeKit. Highly programmable and high-performance platforms will no doubt play a role in the future of video surveillance systems in our market The Z-Wave Alliance will host 30-plus leading smart home brands in the Z-Wave pavilion at CES. A full walk-through home will demonstrate different brands working together to create one cohesive smart home experience. Sigma Designs unveils its 700-Series Z-Wave platform, including numerous performance and technology enhancements in energy-efficiency and RF performance. Personal protection in attendance Self-defence product company SABRE will debut a combination pepper spray with dual sound-effect personal alarm that “alternates between the traditional wailing sound and a primal scream, while a strobe blinks 19 times per second to disorient assailants.” SABRE’s Modern Fake Security Camera includes “sleek, realistic design to deter would-be thieves.” Chip maker Ambarella is introducing the CV1 4K Stereovision Processor with CFflow Computer Vision Architecture. The chip combines environmental perception with advances in deep neural network processing for a variety of applications, including video security cameras and fully autonomous drones. At CES, applications will focus on automotive uses, including advanced driver assistance systems (ADAS), self-driving, electronic mirror and surround view systems. The highly programmable and high-performance platform will no doubt play a role in the future of video surveillance systems in our market. A full walk-through home will demonstrate different brands working together to create one cohesive smart home experience Extending home security and efficiency The Ring whole-house security ecosystem creates a “Ring of Security” around homes and neighbourhoods. Products include “Stick Up” indoor/outdoor security cameras, integrated LED lighting, a “Ring Alarm” integrated bundle for $199 including a base station, keypad, contact sensor, and Z-Wave extender. “Ring Protect Plans” include 24/7 professional monitoring. The “Streety” phone app, from Vivint Smart Home, extends home security into the neighbourhood. Streety makes it easy for neighbours to monitor neighbourhood activity through a network of shared residential cameras. They can keep an eye on kids, cars and property through live video feeds and use recorded video clips to investigate incidents. A new device making its debut at CES is the Walker “commercialised biped robot,” from UBTECH Robotics, which provides a complete home butler service and is designed to ease the day-to-day operations of a busy home or office. The varied of functions includes video surveillance monitoring, security patrol monitoring, motion detection and “instant alarm,” as well as dancing and playing games with children. The company says Walker will “bridge the gap between technologies that were once only available in scientific research institutions and everyday people.”
The European Union has spelled out specific requirements and safeguards for handling and protecting personal data. In the General Data Protection Regulation (GDPR), the EU makes clear exactly what is expected of those who control and process data. (The United Kingdom has committed to follow the regulation despite the Brexit vote.) Everyone is facing a deadline on May 25th 2018 to comply with the GDPR. What are the exact implications for the physical security market? What do customers need to do to ensure they are compliant? These are urgent questions, given that the clock is already ticking. The GDPR’s implications are especially timely considering the physical security industry’s current emphasis on the value and importance of data. The growing value of data was a big topic at the recent IFSEC show in London. The industry is looking for new ways to leverage data for benefits in a company beyond the security department. New cybersecurity responsibilities One example is access control data: Who is granted access to which door and more generally, how do employees move throughout an enterprise? This is information that can be useful to managers, whether to analyse facility usage trends or promote more efficient operations. Access control data is especially valuable when combined with other data in an organisation, such as human resource (HR) and accounting records. It provides more data points that a company can use in overall metrics to guide business operations. But as the GDPR emphasises, the value of data and the ability to leverage data come with new responsibilities, specifically a need to protect privacy. This includes a need for additional cybersecurity of networked systems, another current “hot topic” in the market and historically a weak, or at least under-addressed, point for the industry. The GDPR applies to “personal data,” but its detailed definition includes digital information such as IP addresses and a range of personal identifiers. Sensitive personal data, such as biometric data used to uniquely identify an individual, is in a “special category.” Physical security systems collect plenty of personal data, some of it critical and sensitive, including an employee’s PIN code, fingerprints, or even video footage. GDPR impact on physical security Other areas that might impact the physical security industry include requirements to provide information about any transfers of data to other countries outside the EU and the retention period of data and criteria used to determine the retention period. There is also a “right to erasure” that provides an individual a right to have personal data erased if it is “no longer necessary in relation to the purpose for which it was originally collected/processed.” Physical security systems collect plenty of personal data, some of it critical and sensitive, including an employee’s PIN code, fingerprints, or even video footage In the accountability section of the regulation, companies are required to implement “appropriate technical and organisational measures” to ensure and demonstrate compliance. In the category of “data protection by design”, there is a general obligation to “implement technical and organisational measures to show that [a company] has considered and integrated data protection into processing activities.” It is even more reinforcement to the need for more cybersecurity. Data protection by design The GDPR endorses the use of approved codes of conduct and certification mechanisms to demonstrate compliance, including codes created by trade associations or representative bodies. There may be an opportunity for organisations in the physical security market to step in and create such guidelines and to clarify best practices as they relate to our market’s technologies. In the category of “data protection by design,” physical security system manufacturers should include data protection and security from the ground floor as they are designing new products. Based on several recent conversations, I can say with confidence that these concerns are definitely on the minds of many in our industry. But concerns aren’t necessarily answers, and time is short to fully comply with GDPR by the deadline. And the issue isn’t limited to Europe; multi-national companies that do business in Europe, or even cloud systems that store data there, are also impacted. And even beyond GDPR, data protection is an urgent concern around the world. It’s time to step up.
With a century-long tradition for trade and commerce, the Hala Koszyki market hall was opened in 1908 on Koszykowa Street in Warsaw, Poland. Known as the ‘People’s Bazaar’, the Art Noveau-style building endured numerous social and political changes throughout its storied history. Between 2009 and 2016, Hala Koszyki was remodeled entirely according to a design by Polish star architects JEMS Architekci. Since its grand reopening in autumn 2016, Hala Koszyki has emerged as a major attraction for food connoisseurs in the Polish capital. The remodeled building retains some of the architectural layout of the historic original while offering international flavors in a variety of restaurants, bars, and food shops, plus several office spaces in a premium ambiance. Retail solutions Bosch received the contract as a one-stop supplier with a strong track record in large-scale retail solutions Providing integrated security for Hala Koszyki called for a vendor that could solve three key challenges: First, the security system needed to blend in with the market’s stylish interior without attracting attention. Second, shop and restaurant personnel as well as office workers required specific access privileges to otherwise restricted areas. And third, building operators wanted a customisable system to meet the specific demands of Hala Koszyki’s shops, cafes, offices, parking spaces and other areas. Bosch received the contract as a one-stop supplier with a strong track record in large-scale retail solutions, also including the high-profile New Union Square shopping center and office tower in Downtown Warsaw. The experts equipped Hala Koszyki with video security, intrusion alarm, and access control systems. Intelligent video analytics The market hall’s video security system features moving and fixed IP-based cameras from Bosch throughout the premises. Integrated on the Bosch Video Management System (BVMS), the cameras are monitored by security staff in an on-site control room. For added security, cameras in critical areas feature Intelligent Video Analytics to recognise threats, unauthorised access, and suspicious behaviors automatically. In order to keep areas such as storage rooms and office facilities ‘off limits’ to unauthorised visitors, Bosch installed access control readers Aside from greatly reducing the manpower needed to monitor video screens, the system also offers forensic search functionality for evidence in a user-friendly interface. In order to keep areas such as storage rooms and office facilities ‘off limits’ to unauthorised visitors, Bosch installed access control readers. Answering a key requirement, the access control system also logs the entry and exit times of employees, while keeping track of the current number of employees in the building. Complete security solution Safeguarding the Hala Koszyki against intruders, the integrated security solution features Professional Series intrusion detectors equipped with PIR (passive infrared) sensors. Combining these detectors with the intrusion panel Modular Alarm Platform MAP 5000 ensures continued operation in events such as short circuits or interruption of the power supply in a scalable system that can grow with customer requirements. The complete security solution for Hala Koszyki is managed by the Building Integration System (BIS). Overall, the integrated Bosch solution achieves the feat of accommodating Hala Koszyki’s various security and access requirements ‘under one roof’ while blending into the architecture, so end consumers are free to enjoy their shopping and dining experience undisturbed.
A two-year programme to transform security at Heriot-Watt University campuses around the world, facilitated by CriticalArc’s SafeZone technology, has been recognised with one of the UK’s top security industry awards. The innovative partnership between Heriot-Watt and CriticalArc has been named as ‘Security Project of the Year’ in the 2018 Security & Fire Excellence Awards run in association with IFSEC International and Firex International. The award, sponsored by the British Security Industry Association, is highly competitive and a major accolade for the winners. Improving service response Two years ago, Les Allan, Heriot-Watt’s Director of Safety and Security Services and his team at the university embarked on a strategy to transform all aspects of their operations. They wanted to modernise their service across five campuses, in the UK, Dubai, and Malaysia to provide much greater care for students and staff. A key factor in the team’s success has been the way it uses CriticalArc’s SafeZone technology across all five international campuses It was an ambitious undertaking, but it has already delivered impressive results, measurably improving service response times by over fifty percent, upgrading security department capabilities and skills and raising the job status and remuneration for officers involved. A key factor in the team’s success has been the way it uses CriticalArc’s SafeZone technology across all five international campuses, making Heriot-Watt the first university department to take this global approach. Real-time incident management SafeZone technology has transformed the way officers interact with students and staff wherever they are - on campus or and when travelling off-site – so they can provide assistance in case of emergencies or other incidents. Les Allan’s team has already responded to serious medical emergencies using the system and now they have the tools to manage a full range of live-incident risks. “SafeZone lets my team communicate quickly with individuals and groups,” explains Les Allan, Heriot-Watt, Director of Safety and Security Services. “Using it they can receive alerts and pinpoint the location of anyone needing assistance. They can deploy officers more quickly and keep track of ongoing situations as they develop. It’s really letting them do things they couldn’t have dreamed of before.” Better support for students & staff The Heriot-Watt team is also using new technology to support staff and students on campus while travelling and during fieldwork. They can ‘geo-fence’ additional areas as required. Between 1 August 2017 and 31 July 2018, a total of 5398 security incidents were attended at the Edinburgh Campus The result has been a significant improvement in engagement between the security department – now restyled as Safeguarding Services – students and staff. Between 1 August 2017 and 31 July 2018, a total of 5398 security incidents were attended at the Edinburgh Campus (the first to adopt SafeZone); 3542 of these incidents (66%) involved assisting or interacting with students (rising from 33% in 2013). Efficient, responsive and capable services The results have been impressive but Les Allan, who is currently also serving as Chair of the Association of University Chief Security Officers (AUCSO) in Scotland, says his ambition is to go much further. “We are delighted at our incredible success at the Security and Fire Excellence Awards as winners of the Security Project of the Year category. This joint award for Heriot-Watt University and our friends at CritcalArc is a testimony to the power of working in partnership for mutual benefit and delivery of excellence with a world-leading solution. We are committed to continuing development and enhancement of our partnership with CriticalArc.” Darren Chalmers-Stevens, CriticalArc, Managing Director, EMEA and APAC, noted: “I’m delighted that the forward-looking partnership between Heriot-Watt University and CriticalArc has been so clearly successful. This major award is further proof of how we work closely with all our customers and are leading the way in providing better protection and enabling more efficient, responsive and capable services.”
In the booming workspace market, a professional welcome is crucial to success. At Barcelona’s Gran Vía Business Centre, 2,500m2 of offices and shared collaborative workspaces in the heart of the city, managers chose SMARTair wireless access control system — because it protects and manages their premises, and also projects the right image for a contemporary co-working environment. Gran Vía is a flexible and well-equipped home for companies from international corporates to local start-ups. Fibre optic broadband, LED lighting, an on-site restaurant and adjacent rental apartments are also part of Gran Vía’s high-end service. This is why, they sought an upgrade and replacement for an existing, out-of-date access control system. SMARTair access control locks SMARTair access control locks now control access to Gran Vía’s six floors of offices, meeting spaces and communal areasGran Vía needed more flexibility and control over access to their premises; a system to seamlessly manage diverse access needs of permanent versus temporary users, and that would cope with rapid personnel turnover. Locking devices must complement the professional, modern image of the workspace, which attracts high-profile, design-savvy business clients. On top of these demands, any new system would have to be fitted without disrupting day-to-day business. SMARTair access control locks now control access to Gran Vía’s six floors of offices, meeting spaces and communal areas. Access requirements change all the time at the business centre, and security managers now have a system where programming and reprogramming access rights is fast and easy. Thanks to the slick, flexible management software behind SMARTair, everything works in the background — keeping site users safe almost without anyone noticing. "SMARTair is an effective solution that is easy to use,” says Esther Portillo, Marketing Director at Gran Vía Business Centre. RFID operated wireless escutcheons SMARTair wireless door and wall devices complement Gran Vía’s contemporary aestheticOver 50 new SMARTair wireless escutcheons are operated with RFID smart-cards, so security is not compromised if an office user loses their credential. Security administrators simply cancel the lost credential’s access rights — much quicker, cheaper and more professional than replacing a traditional mechanical lock. The user gets their new smart-card validated at one of five SMARTair wall updaters: it is the perfect combination of contemporary image and efficient user experience for Gran Vía’s clients. Importantly, SMARTair wireless door and wall devices complement Gran Vía’s contemporary aesthetic. “SMARTair has a modern design and suits our installations perfectly,” confirms Esther Portillo. Bringing more doors into any installed SMARTair system is straightforward, because SMARTair escutcheons fit wood, glass, emergency exit and fire-resistant doors. Gran Vía now has an access control system they can reconfigure and expand to suit both their needs and their clients’.
IDF Aluminium has installed transom closers and latch locks from Alpro Architectural Hardware at a building that provides premium co-working and flexible office space in central London near Victoria Station. Thomas House in Eccleston Square is a seven-storey structure with a facade in Regency style and a distinctive timber-clad reception that leads to two wings. It has collaborative drop-in work areas, meeting rooms and facilities to suit present-day practices. The building has been refurbished for The Office Group who pioneered shared workspaces in Britain and now offers these services across multiple London locations as well as Bristol and Leeds. Hydraulic door controls The Alpro transom closers are a means of hydraulically controlling the opening and closing of aluminium doors The Alpro transom closers are a means of hydraulically controlling the opening and closing of aluminium doors. They allow precise adjustment of the latching and closing force generated by the valve according to the weight and height of individual doors as well as type of usage. Aesthetics are a major consideration for The Office Group who briefed Soda Studio, an architectural practice known for its clean simple interiors, to create a design in keeping with the neighbouring Georgian squares. In addition to the working facilities, Thomas House has a library, music room, roof terrace and gymnasium. It is named after the early nineteenth-century architect Thomas Cubitt who created much of the surrounding area and also designed the eastern front of Buckingham Palace. Preserving interior geometry Fabricator IDF devised a solution featuring tailored SBD aluminium profiles from Jack Aluminium Systems, bespoke glazing, internal screens and the Alpro door management. The Alpro products include Europrofile cylinder deadlatches which can be combined with electric strikes to provide the added option of remote access control. All of The Office Group premises are design-led, and we have now supplied equipment to five of their sites including Henry Wood House" Peter Keen, sales director at Alpro, said: “Installing transom closers on internal doors is unusual but the concealed nature of these closers, within the transom header bar, means they are unobtrusive and meet the architect’s goal of preserving interior geometry.” He continued: “All of The Office Group premises are design-led, and we have now supplied equipment to five of their sites including Henry Wood House, a former BBC building in the West End. Our transom closers are durable and have been tested independently at 250,000 double-action cycles.” Commercial door market IDF specialises in the design, manufacture and installation of aluminium doors. The door projects are often in commercial and public sector environments where usage may be high but maintenance costs must be minimised. IDF has 30 years’ experience in the shop front and commercial door market. The company ensures a quality service by designing and fabricating all of its doors and shop fronts in-house with no use of sub-contractors. The client portfolio covers transport, local government, healthcare and education from schools through to universities.
A concierge orders a taxi for an employee or takes his shirts to be cleaned, then greets a visitor and escorts her to an elevator. And these are just a few of countless possible examples of the NOVE office complex’s unique, multifaceted service culture. It attains the standard of security, efficiency and comfort of a five-star international hotel in a state-of-the-art facility where 1,300 people work for no fewer than eight different companies in the heart of Munich. The NOVE has even been honoured with platinum certification from LEED (‘Leadership in Energy and Environmental Design’, a program developed by the U.S. Green Building Council to encourage the construction of energy- and resource-efficient, healthy buildings). Completely integrated solution Tim Wiesener therefore went looking for a reliable and experienced partner, and found it in Bosch’s building experts “We wanted an office building that felt like a five-star designer hotel,” says Tim Wiesener, the CEO of Salvis Consulting AG. The company envisaged a high standard of security backed by smart networked solutions that blended smoothly and esthetically with the architecture and interior decorating. “We certainly didn’t want employees and other users of the building to feel bothered or overwhelmed by its technology.” Tim Wiesener therefore went looking for a reliable and experienced partner, and found it in Bosch’s building experts. “Bosch applies both experience and foresight to its projects, and its specialists immediately grasped our vision.” Video surveillance, access control and intrusion alarm systems, fire protection, visitor management: Bosch planned and implemented a completely integrated solution that harmonised with NOVE’s character and personality. Its leading-edge technology and software are distributed and networked across six stories, a 23-meter-high atrium, and a nine-floor tower. Manage video surveillance The concierges working shifts at the 24-hour reception play an important role in the overall concept, since they are also trained security experts. Among other things, monitors behind the counter let them keep a watchful eye on images from over a hundred surveillance cameras that can be remotely controlled, zoomed and pointed as required, all courtesy of the Bosch Building Integration System. The software lets them efficiently manage video surveillance as well as fire and intrusion alarms. Around-the-clock assistance is also available to the 300 or so visitors that enter the NOVE each day, aided by the dedicated BoVisit visitor management system. The software’s functionality includes announcing guests, printing name tags for them, and assigning them to employees. Thanks to a centralised solution, the concierges always know who is where inside the building. Visually integrating This is especially important in case a critical situation ever arises. At the press of a button, the system generates a vitally important overview of how many people need to be evacuated from each area. Not everything the concierges do is high-tech, of course; they are devoted to helping both tenants and visitors with a smile. “Our receptionists are efficient but not nameless. We combine security with personal service,” says Tim Wiesener. Tenants can naturally access the NOVE any time of the day or night Italian star architect Antonio Citterio designed the complex, which spans roughly 27,500 square meters of gross floor space. He paid especially great attention to visually integrating the security equipment so it wouldn’t stand out. “This called for a certain finesse,” explains Tim Wiesener. Networked solutions Tim Kosok, a sales representative with Bosch Energy and Building Solutions in Munich, worked hard to find out exactly what the customer wanted, explaining that “we painted installations the same color as the ceilings or walls and positioned them just right so they would be practically invisible. Even the door intercoms are designed to be inconspicuous.” Tenants can naturally access the NOVE any time of the day or night. Tim Wiesener is confident that everyone consistently feels safe there, thanks to the networked solutions. “Our collaboration for implementing the complex was excellent and collegial. We worked closely with the Bosch experts to create a solution that’s geared to people and their needs.”
HID Global, a worldwide provider of trusted identity solutions, was selected by Skanska, one of the world’s project development and construction groups with operations in Europe and North America, to incorporate HID’s mobile solution for secure access to its new office complex in Warsaw. Powered by Seos, HID Mobile Access improves the user experience and increases security throughout the entire building – from the parking lot and elevators to areas with limited access to the public. Located at 173 Solidarności Avenue in Warsaw, the new Spark office complex is not only the new headquarters of Skanska, but a large part of the 70,000 square-meter office building has also been set aside for other tenants. Because the building is intended to be a mixed-tenant space, it was crucial to restrict access to secure areas from unauthorised visitors. Using smartphones for access The Spark building was designed to enable mobile access so that employees can now use their smartphones to open doors and enter secure areas. Skanska, with help from system integrator Sharry Europe, created a new system for building occupants that integrates numerous building applications, including HID Mobile Access. As a result, all building applications have been incorporated into an integrated mobile app, which marked an advancement in creating a more streamlined and convenient experience for the users. HID Mobile Access enhances the security for accessing our entire building" Both Spark building employees and their guests can now move throughout the building with nothing more than a smartphone, without the risk of them gaining access to restricted areas – unless the proper access rights are granted. When users arrive at the door, they simply tap their iOS and Android devices to an iCLASS SE reader using Near-Field Communications (NFC) or Bluetooth Low Energy (BLE) and HID’s ‘twist and go’ feature to gain access from a distance. Any changes to the user’s access rights are remotely managed by the administrator through a cloud-based portal. Integrating all building applications into one “HID Mobile Access enhances the security for accessing our entire building. In one application, we have integrated all building applications, such as parking, virtual reception and other Internet of Things functionality, bringing the whole user experience to a new level,” said Renata Nowakowska, Innovation Manager at Skanska. “One of the most pressing objectives for facility managers in smart buildings is to crack the code on how to enable as many building applications and services on mobile devices as possible in order to simplify how occupants move through a facility and interact with building services,” said Hilding Arrehed, Vice President of Cloud Services, Physical Access Control. “Skanska’s integration of HID Mobile Access into their mobile platform is a perfect example of how organisations are leveraging the power of mobile credentials and the cloud to realise the full potential of creating a connected and more intuitive experience for their users, while increasing security at the same time.”