Genetec Inc., a technology provider of unified security, public safety, operations, and business intelligence solutions, announced that it will unveil new headquarters in the City of London, in the autumn of 2019. The announcement follows a period of accelerated growth for Genetec in the United Kingdom, with a significant and sustained increase in EMEA revenues over the last five years. Some of the company’s flagship customers in the UK include the Royal Borough of Windsor and Maidenhead,...
Join the growing Viking Electronics community on YouTube, Facebook, Instagram, LinkedIn and Twitter to connect with other Viking Electronics fans and get the edge on all things Viking. “We recently held a contest for free Viking Electronics T-shirts that led up to the unveiling of our new mascot, Vin the Viking. It has been fun seeing the response and watching the community grow.” – John Hepokoski, Purchasing and Social Media. Viking Electronics engineers and manufactures over...
As part of Security Officer Appreciation Week, Corps Security is hosting an inaugural ‘Thank Your Security Officer Day’ on Thursday 19th September to thank their dedicated security guards. Working in partnership with a range of clients, the management team at Corps Security will thank their security officers in person as well as sharing stories across several social media platforms to acknowledge those who go above and beyond delivering an unprecedented level of service. Security Off...
At GSX 2019, SilverShield™ Safety & Information Systems will showcase their award-winning visitor and information management system (Booth #1594). The solution is an easy-to-use, cloud-based SAAS approach to security, with several different modules that provide a complete safety solution. “The SilverShield Visitor and Information Management System is the most effective way for users to vet and manage visitors for any size facility,” said Robin Baker, CTO, SilverShield. &ldq...
Trackforce™, a security workforce management platform, announces its acquisition of Valiant Solutions Inc., a provider of Human Capital Management (HCM) software solutions. The new company, Trackforce Valiant, now delivers all-in-one security workforce management platform: the only comprehensive operations management solution available to the industry. Building on a pedigree and industry knowledge of physical security, Trackforce Valiant is a purpose-built solution that supports the growin...
Morse Watchmans, the provider of key control and asset management systems, will showcase its KeyWatcher Touch, AssetWatcher, and KeyWatcher fleet key and asset management solutions at GSX 2019 this week (booth #1153). “We are excited to show GSX 2019 attendees how key management and asset control can help them to create a state-of-the-art security system for their organisation,” said Fernando Pires, CEO, Morse Watchmans. “We continue to be completely focused on providing innov...
SALTO Systems SVN-Flex is a feature that enables SALTO stand-alone electronic locks and cylinders to update user credentials directly at the door. This SALTO access control technology makes keyless, wire-free smart buildings a reality. SVN-Flex maximises the potential, efficiency, and reliability of the SALTO Virtual Network (SVN), increasing the security, control, and convenience for users while reducing the cost of installation. “SVN-Flex is a game changer that creates a new standard in access control,” said Marc Handels, Chief Technical Officer of SALTO Systems. “The door is the ultimate touch point in an access control system and making its wireless smart lock hardware an updating point for user credentials maximises functionality and brings an unprecedented level of convenience and security for both end users and system administrators.” Increases the number of updating points SVN-Flex functionality can be enabled on any product in the SALTO XS4 BLUEnet-enabled electronic lock rangeBased on SALTO’s BLUEnet wireless communications technology, SVN core technology, and in combination with the trusted access control management platform and high-quality XS4 electronic locking solutions, SVN-Flex extends and increases the number of updating points directly to any door. SVN-Flex functionality can be enabled on any product in the SALTO XS4 BLUEnet-enabled electronic lock range. SVN-Flex is managed via SALTO’s ProAccess SPACE web-based access control management software. Adding SVN-Flex to an access control solution results in an exponential increase in security, control, effectiveness, and convenience for users and system managers, as the communication between devices flows in real-time on wireless online access points and much faster on offline points. Ability to cross-link wireless locks SVN-Flex dramatically reduces the cost of installing additional updating points in an access control system yet provides the capability of adding updating points where required. It might have been challenging in the past to provide several updating points on one building floor when required for security, for example. With SVN-Flex, however, the options for affordable updating points are endless: emergency exits, hall doors, gates equipped with mechanical cylinders, perimeter doors, and much more. Benefit of SVN-Flex includes the ability to easily cross-link stand-alone, wireless locks and online access points Another benefit of SVN-Flex includes the ability to easily cross-link stand-alone, wireless locks and online access points and integrate into existing IT networks without consuming valuable resources. This produces a reliable, on-premise infrastructure for access control that is designed to adapt and grow with any demand; from just one door and user up to hundreds of doors with thousands of users. Data-on-card backbone core technology In the event of a network failure, SVN-Flex continues to operate seamlessly via SALTO’s SVN data-on-card backbone core technology, ensuring that no one will be locked out or any unwanted access will be permitted. Because SVN-Flex is based on SALTO’s SVN core technology, it’s compatible on sites that already use SVN. Just by installing SALTO BLUEnet wireless locks or cylinders in high traffic access points, current SALTO customers will benefit from a boost in their existing SVN system because it will increase the number of updating points. Our products are designed to be affordable and functional for customers of any size" The rest of the offline installation will still work autonomously, but vital information like blacklist dissemination, user access plan updates, battery status reports, or access audit trail reports will be updated more frequently. Smart access control solutions “SVN-Flex is yet another example of SALTO’s commitment to delivering the most technologically-advanced access control solutions on the market – smart, contactless, and mobile,” said Handels. “And although our products always include the latest in innovation, they are designed to be affordable and functional for customers of any size: from a two-room office to a university with thousands of doors.” SVN-Flex boasts numerous features and benefits which is why SALTO developed a special microsite that provides detailed product information and explains how the supporting technology works together to deliver a comprehensive access control solution.
Allied Universal, a security and facility services company in North America, is proud to recognise security professionals during the company’s 5th Annual National Security Officer Appreciation Week starting on September 15 through September 21, 2019. Each day, Allied Universal security professionals help maintain safe and secure workplaces, schools, shopping malls and communities providing peace of mind. The goal of Allied Universal’s National Security Officer Appreciation Week, which was established in 2015, is to profile and honour all security officers giving them the respect they deserve, encourage the public to thank the next security officer they meet as well as raise awareness of the many career opportunities that exist within the security services industry. Celebrating security professionals “I am truly honoured to celebrate our security professionals each and every day and especially during Security Officer Appreciation Week,” said Steve Jones, CEO of Allied Universal. “Please take the time to show your appreciation for our hard-working men and women who have answered a call to public service that is challenging, demanding and ultimately rewarding.” On a daily basis, our security professionals from the dispatcher, lobby ambassador to the first responder, keep us safe by averting threats and responding to emergencies. These individuals help to deter crime, oversee evacuations, work closely with law enforcement and are constantly vigilant in their efforts to keep us safe. Join Allied Universal in celebrating the 5th Annual National Security Officer Appreciation Week, September 15 – 21, 2018.
Qualitest, the independent software testing and quality assurance company, opens its new headquarters in Central London following a period of worldwide growth. Serving as a central location with easy access to Qualitest’s US, Israel, India and Romanian offices, London is also a base for prominent existing clients as well as a wide array of companies seen as prospective clients. The new office, based close to Liverpool Street station, brings together employees located across greater London. Cyber security sectors Qualitest is expected to more than double the number of quality engineers in the UK over the next three years Following an injection of capital resulting from Bridgepoint’s taking of a majority stake in Qualitest, the company is expected to accelerate its acquisition strategy and global expansion. Having recently signed new contracts with companies across the telecommunications, insurance, banking, government and cyber security sectors in the last few months – Qualitest is expected to more than double the number of quality engineers in the UK over the next three years. The London headquarters is expected to be a hub for Qualitest’s EMEA expansion with the expectation of significant growth in terms of clients, headcount and revenue. The new office has been designed to facilitate collaborative conversation between teams, with breakout spaces, an auditorium, spacious meeting rooms and an open plan kitchen. Software testing market Norm Merritt, CEO at Qualitest said: “Having a state-of-the-art global headquarters is a significant step for Qualitest as we continue to expand our global base. London remains a global hotspot for technology and innovation, and we look forward to the new possibilities it will bring.” Brian Shea, Managing Director for UK and Europe at Qualitest said, “Qualitest’s capabilities are London’s best kept QA secret. Moving the headquarters to London begins an exciting phase of development for our corporate and EMEA teams. Capitalising on the traction of our recent client wins, we expect to create hundreds of new jobs in the software testing market, and advance London as a central hub for Quality Engineering on the world’s stage.”
Ground-breaking glass technology is the best way to prevent internal data leaks and guarantee data privacy while maintaining a professional office interior according to window security provider Protective Film Solutions. With one in three (34%) data breaches involving internal employees, according to Verizon’s 2019 Data Breach Investigations Report, Protective Film Solutions says that companies who want to protect their data from prying eyes must find ways to mitigate the risk of potentially damaging internal and external security threats, including reviewing their office space. The state-of-the-art technology obscures the light transmitted by digital screens to outside viewModern interior design for office space is often open plan with glass walls to give the illusion of space and an all-inclusive environment, but this becomes problematic when sensitive financial, technical or legal information is due to be presented to senior staff or board members. While frosted or coated glass will block out the view of specific meeting rooms, digital screens containing sensitive data can still be visible to those outside of the room, while covering windows draws unnecessary, unwanted attention. Smart shield for digital screens Protective Film Solutions is the only European supplier of the new Casper Cloaking Technology by Designtex, an innovative cloak product that provides a smart shield to digital screens without obscuring the glass. Already being used by large American corporations, the state-of-the-art technology obscures the light transmitted by digital screens to outside view, meaning only those in the room can see the content being displayed. The technology is designed to work with most LED and OLED displays which filter specific light oscillations, by selectively filtering them again and making the display appear as a black screen to outside viewers. Use of such technology does not draw attention to information-sensitive meetings that are digitally displayed, meaning important meetings that might otherwise need to be carried out externally or in private meeting rooms can simply take place in rooms using Casper Cloaking Technology by Designtex. Protecting confidential material and data Protecting confidential material and data is of utmost importance for businesses of all sizes"Chris Gould, Commercial Director at Protective Films Solutions, the exclusive distributor of Casper Cloaking Technology for EMEA, commented: “Protecting confidential material and data is of utmost importance for businesses of all sizes and we are proud to offer a simple, effective solution. Casper allows senior teams to discuss and display confidential information without causing suspicion among staff through inconvenient alternatives such as off-site meetings or covered up boardrooms. “And, as co-working spaces become increasingly popular, the open visibility of screen technology including TVs, computers and laptops is an important factor to consider. Casper is the only solution that means offices can keep their open-plan look and feel without compromising on security.”
You don’t need to continue using keys and key cards. When you want effective first-line security for private doors in public spaces, you no longer need cumbersome kit. To keep opportunist hands off your belongings, the Code Handle 4-digit code-operated electronic handle locks without any wires, expensive hardware or software, mechanical keys or changes to your existing doors. PIN codes unlock so many features of our daily lives, from a smartphone to your online bank account. Now you can use them to unlock security door handles, too. Code Handle is a stylish handle with an integrated electronic PINpad. When you fit a Code Handle to your door, you make sure only authorised people get in. Without a 4-digit code, the handle stays locked and the door stays closed. Fire accredited Code Handle For such a simple device, Code Handle packs several clever features into its sleek, low-profile design“Code Handle is unique in comparison to common code door locks: it has the code function and battery incorporated inside its handle, so you don’t need to make extra modifications to your door,” explains Lars Angelin, Business Development Manager for Code Handle at ASSA ABLOY EMEA. For such a simple device, Code Handle packs several clever features into its sleek, low-profile design. When you close the door behind you, Code Handle locks itself, so you don’t need to put down whatever you are carrying. From inside, a Code Handle opens freely. It is also fire accredited (EN 1363). Code Handle is simple to install and retrofit. Everything you need for a simple, effective security barrier is inside the box. Two screws fit a new Code Handle to almost any interior door, with left- or right-hand opening. There is no need to cable the door, connect it to mains, or pay a specialist installer. Works with standard lock hardware Code Handle is the lock of choice for sensitive, low-security doors in all kinds of placesCode Handle works in tandem with standard lock hardware. You can keep your existing cylinder or lock mechanism and just change the handle. Two standard batteries (CR2) slot inside the Code Handle, and typically last 30,000 lock/unlock cycles before replacement. Code Handle is an attractive proposition, with an elegant contemporary design, in brushed stainless steel and satin chrome. No more ugly push-button-and-twist mechanical PIN locks spoiling the look of your office. Code Handle is the lock of choice for sensitive, low-security doors in all kinds of places. At libraries, airports, railway stations, gyms, schools, car dealerships, restaurants and offices, a Code Handle PIN lock keeps the public out of accessible private rooms. In company archives, stock rooms, customer toilets, management offices and medicine stores, Code Handle deters casual intruders and keeps your property safe and secure.
Suprema Inc., a provider of biometrics and security solutions, announces that the company has appointed Baudoin Genouville as the managing director for Suprema Systems GmbH. Responsible for Suprema's Pan-European (excluding UK and Ireland) and North African operations, Genouville will be based on both Germany and France offices, where he will lead local sales and technical support team as well as playing key roles in marketing and public relations across Europe. After joining Suprema Inc. in 2013, Genouville has been involved in technical alliances with major security manufacturers, and also played a strategic role in Suprema's recent global rollout and growth in enterprise market. National security industries In recent years, Genouville has moved back from South Korea to Europe with the mission of further growing Suprema local Partners and Suprema presence in national security industries. We have already started for long in the UK then in Americas, Middle-East, finally Asia" “That is not a radical move for Suprema Inc. to localise its Sales and Support closer to our customers. We have already started for long in the UK then in Americas, Middle-East, finally Asia. It is a proven strategy that pays off. With local branches and dedicated staff across Europe, Suprema Inc. will better serve its BioStar2 line distribution Partners. Businesswise, the relation will remain identical, with direct sales to our European certified Partners only (not to end-users). However, our local set-up in Europe will see increased consulting operations and support actions for the benefit of our End-Users,” said Genouville, Managing Director of Suprema Systems GmbH. Improving localised sales "The last 6 years at Suprema Inc. have been fascinating. We are a technology-based company, leader on its product range, quickly implementing changes with dedicated teams working together in the same direction, as a family. I hope to drive that same spirit to our Suprema forces in Europe, for the years to come," Genouville added. Earlier this year, Suprema also appointed Jamie McMillen as Managing Director of Suprema Systems UK Ltd which covers the company's sales and marketing operations over United Kingdom and Ireland market. Along with the company's EU operation, Suprema plans to expand its UK and Pan-European footprints to improve localised sales, marketing and technical support services.
Rodrigue Zbinden, CEO at Morphean, discusses the business benefits from merging video surveillance and access control technologies as demand for ACaaS grows. The big question facing businesses today is how they will use the data that they possess to unlock new forms of value using emerging technologies such as the cloud, predictive analytics and artificial intelligence. Some data is better utilised than others: financial services were quick to recognise the competitive advantages in exploiting technology to improve customer service, detect fraud and improve risk assessment. In the world of physical security, however, we’re only just beginning to understand the potential of the data that our systems gather as a part of their core function. Benefits of ‘Integrated access control’ The first thing to look for is how multiple sources of data can be used to improve physical security functionsWhat many businesses have yet to realise is that many emerging technologies come into their own when used across multiple sources of data. In physical security, for example, we’re moving from discussions about access control and CCTV as siloed functions, to platforms that combine information for analysis from any source, and applying machine learning algorithms to deliver intelligent insights back to the business. ‘Integrated access control’ then looks not just to images or building management, but to images, building management, HR databases and calendar information, all at the same time. And some of the benefits are only now starting to become clear. The first thing to look for, of course, is how multiple sources of data can be used to improve physical security functions. For example, by combining traditional access control data, such as when a swipe card is used, with a video processing platform capable of facial recognition, a second factor of authentication is provided without the need to install separate biometric sensors. CCTV cameras are already deployed in most sensitive areas, so if a card doesn’t match the user based on HR records, staff can be quickly alerted. Making the tools cost-effective In a similar vein, if an access card is used by an employee, who is supposed to be on holiday according to the HR record, then video data can be used to ensure the individual’s identity and that the card has not been stolen – all before a human operator becomes involved. This is driving growth in ‘access control as a service’ (ACaaS), and the end-to-end digitalisation of a vital business functionThese capabilities are not new. What is, however, is the way in which cloud-based computing platforms for security analytics, which absorb information from IP-connected cameras, make the tools much more cost effective, accessible and easier to manage than traditional on-site server applications. In turn, this is driving growth in ‘access control as a service’ (ACaaS), and the end-to-end digitalisation of a vital business function. With this system set up, only access control hardware systems are deployed on premise while the software and access control data are shifted to a remote location and provided as a service to users on a recurring monthly subscription. The benefits of such an arrangement are numerous but include avoiding large capital investments, greater flexibility to scale up and down, and shifting the onus of cybersecurity and firmware updates to the vendor. Simple installation and removal of endpoints What’s more, because modern video and access control systems transmit data via the IP network, installation and removal of endpoints are simple, requiring nothing more than PoE and Wi-Fi. Of all the advantages of the ‘as a service’ model, it’s the rich data acquired from ACaaS that makes it so valuable, and capable of delivering business benefits beyond physical security. Managers are constantly looking for better quality of information to inform decision making, and integrated access control systems know more about operations than you might think. Integrating lighting systems with video feeds and access control creates the ability to control the lightsRight now, many firms are experimenting with ways to find efficiencies and reduce costs. For example, lights that automatically turn off to save energy are common in offices today, but can be a distraction if employees have to constantly move around to trigger motion detectors. Integrating lighting systems with video feeds and access control creates the ability to control the lights depending on exactly who is in the room and where they are sitting. Tracking the movement of employees Camera data has been used in retail to track the movement of customers in stores, helping managers to optimise displays and position stocks. The same technology can be used to map out how employees move around a workspace, finding out where productivity gains can be made by moving furniture around or how many desks should be provisioned. Other potential uses of the same data could be to look for correlations between staff movement – say to a store room – and sales spikes, to better predict stock ordering. What makes ACaaS truly exciting is it is still a very new field, and we’re only just scratching the surface of the number of ways that it can be used to create new sources of value. As smart buildings and smart city technology evolves, more and more open systems will become available, offering more ways to combine, analyse and draw insights from data. Within a few years, it will become the rule, rather than the exception, and only grow in utility as it does.
Today’s security leaders encounter many challenges. They have to operate with reduced budgets and face challenging and evolving risks on a daily basis. Security leaders are often ignored and only called upon when needed or in disaster situations. Many don’t have an ongoing relationship with the C-suite because the C-suite doesn’t understand the value they bring to the whole business. In order to resolve these challenges, a security leader can apply a risk-based approach to their security program. According to dictionary.com, risk is “exposure to the chance of injury or loss; a hazard or dangerous chance”. Risk is broader than a security concern and involves the entire business. Through utilising a 3R model - considering resources, risks and resolutions - a security leader can evaluate the output from the model to build the foundation of a strong plan. This allows the leader to make security decisions based on a quantified risk measure. A business determines what resources it wants to protect, what risks it needs to protect the resources from and what resolutions it can put in place to mitigate the risk. Decisions are based on measurable evidence. Free online risk assessment tools are available to provide a fast, easy way to determine an organisation's basic security risks through an investigative approach The 3 Rs The first step in the 3R model is to figure out what resources need protection. This could be physical - such as buildings, critical infrastructure or valuable equipment, knowledge-based - such as intellectual property, or organisational - such as people or governance structure. Understanding the business will help the security leader develop a list of critical elements. Look for tangible resources such as buildings and machinery, and intangible resources like reputation, knowledge and processes. Second, determine what the resources need to be protected from. Anything that threatens harm to the organisation, its mission, its employees, customers, partners, its operations or its reputation could be at risk. These can include contextual risks (workplace safety or natural disasters), criminal risks (theft or cybercrime) or business risks (compliance or legal issues). Anything that threatens harm to the organisation, its mission, its employees, customers, partners, its operations or its reputation could be at riskFree online risk assessment tools are available to provide a fast, easy way to determine an organisation's basic security risks through an investigative approach. The tools ask several questions and determine risk based on an organisation’s location and the answers provided. Security leaders can also work with security companies and consultants that offer risk assessments to determine their company’s needs, and then offer solutions based on that assessment. The third objective is to determine how businesses can best protect the identified resource. The last of the 3 Rs - resolutions - are those security activities that enable the business to mitigate the impact of security risks. Resolutions can potentially prevent a security incident from occurring, contain the impact to resources if an event does occur and also assist the organisation in recovering from an impact more quickly or easily. The first step in the 3R model is to figure out what resources need protection, this could physical such as buildings or critical infrastructure The path forward Understanding what risks a business faces in totality provides an opportunity for the security leader to collaborate with other department heads. This gives security leaders an opportunity to engage with functions outside their norm as well as a chance to demonstrate their subject matter expertise. A risk-based approach also helps security leaders fully understand an organisation’s needs and concerns, which they can communicate to the C-suite to help them make better business decisions. Metrics can also help business leaders understand the cost/benefit of resolutions C-suite and executives help define an acceptable level of security risk tolerance to resources and make quality, educated decisions about mitigating security risks. Through collaborating with security leaders using a risk-based approach and the 3R model, metrics and reports show the impact of security expenses, and there is a transparent view of security risk. The final decision about how to mitigate and resolve risks is up to the business owner of the resource and the risk stakeholders. To obtain funding, show the risk and value of resources exposed to potential impact. Then present the recommended resolution that reduces the potential level of impact and the associated cost benefit savings. By providing this information, security leaders can ensure that the business owners can make an educated decision. Measuring success A risk-based approach aligns the security mission with the organisation’s mission. Security leaders should have these conversations with their business leaders on a regular basis. Understanding the thresholds of risk tolerance and showing when incidents or activities are trending outside of acceptable boundaries will help business leaders make educated decisions. The 3R model also helps a business to track occurrences, quantify the direct and ancillary impact and make continuous adjustments to the security program Determining a baseline of acceptance gives a foundation for security leaders to point out when the organisation is not meeting its own requirements. Metrics can also help business leaders understand the cost/benefit of resolutions and demonstrate when costs may be trending outside of acceptable boundaries. The 3R model also helps a business to track occurrences, quantify the direct and ancillary impact and make continuous adjustments to the security program. It is important to note that this process is not stagnant, and needs to be constantly revisited. Examining risks, resources and resolutions in a systematic way will help security leaders understand what they are protecting Defining risks and vulnerabilities Continuous conversations using the 3R model also help business leaders understand what security risks could interfere with meeting business objectives. It also aligns the total cost of ownership for the security program with the business value of the resources at risk.The approach puts the security risk decisions in the hands of the ones impacted by those risks And it defines the security role as risk management, not just task management. The approach puts the security risk decisions in the hands of the ones impacted by those risks…the “owners” of the resources. Examining risks, resources and resolutions in a systematic way will help security leaders understand what they are protecting, what they are protecting it from, and how they can help prevent, contain or recover against a specific risk. Followers of this approach are in a better position to ask for funding because they can clearly define and quantify risks and vulnerabilities. Applying these principles will equip security leaders with the knowledge needed to have better dialogue with colleagues in other departments, encouraging more proactive discussions about security.
There’s only so much a corporation can do to counteract the threat of a major incident. You can ask everyone to be vigilant and to report anything suspicious, but you cannot stop someone intent on deliberately starting a fire, threatening a work colleague with a knife or something much worse. And of course, most businesses recognise that even routine events – such as burst pipes, IT system failures, extreme weather event or power outages – can have significant consequences unless they are quickly brought under control. Training security officers Governments and organisations across the world are increasingly encouraging businesses to re-assess risks and to plan for and conduct drills for major emergencies. This is driving different agencies and companies to invest in new skills, resources and systems, and encouraging businesses to routinely re-evaluate their emergency response strategies. UK police forces are increasingly training security officers in the public and private sectors on how best to react to potential terrorist incidents For example: UK police forces are increasingly training security officers in the public and private sectors on how best to react to potential terrorist incidents, as part of the UK government’s Action Counter Terrorism programme. And organisations including the Association of University Chief Security Officers (AUCSO) and Higher Education Business Continuity Network (HEBCoN) are developing customised training for their members to improve their own response and business continuity plans. Mass notifications systems Whether an organisation is facing a terrorist attack or a severe weather event, follow up reports consistently identify that the same types of challenges are common to all crisis situations, with similar errors often occurring again and again. Typically, these are centred on three key areas: poor communications, fractured command and control structures, and delayed deployment of resources. Communications skills and technologies clearly play a pivotal role in how effective an organisation is in responding to major incidents, particularly when it comes to assessing the situation and its implications, moving people towards safety and providing updates as an incident unfolds. However, when an organisation is considering its technology options, emergency response and mass notification systems (MNS) are often touted as the ideal platform to deliver all the required critical communications and ongoing updates. UK police forces are increasingly training security officers in the public and private sectors on how best to react to potential terrorist incidents Emergency notification system All the incident reporting, command and control, and communications functions have been brought together on a single platform But, if an organisation does not know exactly where all its staff or students are, and it cannot see the location and availability of its first responders and other emergency coordinators relative to them and the incident, then how useful is it to send a top-down alert to everyone? And what about fast moving or multi-centre incidents, where previously agreed evacuation procedures, recommended actions or mustering points may need to change if an incident takes an unexpected turn? Many organisations may have been lulled into believing that an emergency notification system will allow them to confidently handle all the communications aspects of virtually any crisis. In reality, too many businesses are still unaware that there are now much more sophisticated and proven technologies where all the incident reporting, command and control, and communications functions have been brought together on a single platform. Using live map tracking The benefit of using these advanced and more integrated approaches – often categorised as mobile distributed command and control systems – is that they enable faster and better decision making in a crisis using real-time feedback and two-way dialogue with those closest to the emergency. And they avoid the risks of any potential delays, miscommunications or mistakes that can happen when an organisation is under pressure to respond and often switching between multiple systems. Leading universities and multi-national corporations are already using new mobile/web-enabled platforms to improve their incident response These next generation emergency management platforms have been specifically designed to enable real-time mapping of an organisation’s security assets and its users on a single screen and to fully integrate it with a highly targeted geo-fenced notification capability. The mass notification aspect of the system can then be used to advise specific groups on the best actions to take at their location as an incident develops. The use of live map tracking enables real time mapping of an organisation's security assets Segmented messaging Many leading universities and multi-national corporations are already using these new mobile/web-enabled platforms to plan, manage and improve their incident response, leading to 50% faster reactions and more positive outcomes.During a crisis, users can receive push notifications so the security centre can immediately see their exact location and advise them accordingly The systems have been widely adopted within the higher-education sector, but they are equally applicable to any large company with multiple international sites or those situated in research or corporate campuses where the bulk of assets and people are based in one or more key locations. Typically, systems provide users with a smartphone app that they can use to call for immediate emergency or first aid support when at work, or to report something suspicious which could prevent an apparently minor incident from escalating into a full-scale emergency. During a crisis, users can receive push notifications, SMS and E-mails asking them to open the app if they are not already logged in, so the security centre can immediately see their exact location and advise them accordingly. Supporting dispersed mustering Now that communications can be more nimble, responsive and flexible this can support the increasing numbers of planners are recognising the advantages of dispersed mustering. This is a strategy that has been developed to reduce the risk of secondary attacks on unprotected people complying with instructions to evacuate from premises and gather in what are, effectively, exposed locations. It is now acknowledged that evacuees waiting outside for any length of time are more vulnerable to targeted attacks or to injury, from flying glass for example. With dispersed mustering – a strategy made more effective by these new mobile distributed command and control systems - a building’s occupants can be advised not to go outside, but to move to known safe internal locations. People in each specific area can then be kept regularly updated. Many corporations are now using new mobile/web-enabled platforms to improve their incident response Coordination between response agencies The software platforms can be integrated with an organisation’s fixed security infrastructure to take real-time sharing of information First responders are permanently logged in, so the emergency operations centre can see their exact locations in real-time and can advise what actions to take in mustering people or in setting up and protecting security cordons. Bringing everything together on one platform, with real-time feedback and in a fully integrated system also removes what is often seen as the weakest communication link in managing any major incident: the need to rely on conventional two-way radio as the sole means of communication between the command and control centre and its first responders and other team members on the ground. The software platforms can be integrated with an organisation’s fixed security infrastructure to take real-time sharing of information to a new level for improved collaboration, coordination and communications between users, the incident management team and external agencies. Improving emergency response strategies One of the most powerful features of some of these new systems is the ability to record and view all alerts, responses and the detailed conversations between first responders, emergency coordinators and other parties. This allows the systems to be used to simulate major incidents involving inputs from the emergency services and other key agencies and to ensure the organisation’s crisis management plans have been fully tested against a range of possible incident scenarios.
During the Parkland, Florida, school shooting in 2018, the shooter was caught on a security camera pulling his rifle out of a duffle bag in the staircase 15 seconds before discharging the first round. However, the School Resource Officer didn’t enter the building because he wasn’t confident about the situation, and the Coral Springs Police Department had no idea what the shooter even looked like until 7 minutes and 30 seconds after the first round was fired. If the video system had included technology to recognise the gun threat in real time, alerts could have been sent to the security team. An announcement could have been made right away for all students and faculty in Building 12 to barricade their doors, and law enforcement could have responded a lot faster to a real-time feed of timely and accurate information. Automatically recognising gun threats The technology is centred around a CNN that aims to replicate how a human brain would process informationAegis AI offers such a technology, which the company says enables existing security cameras to automatically recognise gun threats and notify security in real-time. The technology is centred around a convolutional neural network (CNN) that aims to replicate how a human brain would process information. This neural network is trained to recognise what hands holding a firearm look like from hundreds of thousands of images in a proprietary data set. Over time, the system is able to mathematically calculate what a gun threat in a security camera feed looks like with a high degree of accuracy (well over 99% detection accuracy within the first 5 seconds), according to Aegis AI. “Active shooter situations are often marred by chaos and confusion,” says Sonny Tai, Chief Executive Officer of Aegis AI. “People are in fight-or-flight response and prioritise immediate survival instead of reaching for their phones and calling 911. When the 911 calls are made, callers often provide delayed, conflicting, and inaccurate information, inhibiting law enforcement’s ability to respond.” Enhances law enforcement response Tai says Aegis AI helps to clear up that chaos and confusion. “It provides visual intelligence of the location of the shooter, what they look like, what direction they’re heading, and what they’re armed with,” he says. “This real-time information enhances law enforcement response and enables building occupants to make critical decisions that maximise survivability." AI methods including deep learning enable high levels of accuracy in detecting weapons in real-time camera footage Tai is a Marine Corps veteran and a social entrepreneur who co-founded Aegis AI with the mission of addressing America’s gun violence epidemic. The start of the company stems from Tai’s upbringing in South Africa, where gun violence rates are some of the highest in the world. Growing up, several of his family friends were personally impacted, resulting in a lifelong passion for the issue of gun violence. In early 2018, Tai interviewed dozens of law enforcement leaders across the country and found that their biggest challenge in gun violence response was the lack of timely and accurate information. Aegis mitigates that challenge and enables both first responders and security staff to respond more rapidly, he says. More than 99% accuracy in detecting weapons Aegis is a software-only solution that plugs into security camera hardware and software, including VMSAegis' solution is completely AI-based, says Ben Ziomek, Chief Product Officer. AI methods including deep learning enable high levels of accuracy in detecting weapons in real-time camera footage. “Legacy, non-AI based solutions generally rely on older methods like motion detection, which is not reliable in differentiating between objects such as phones and firearms,” says Ziomek. “Our AI solution lets us achieve more than 99% accuracy in detecting weapons with an exceptionally low false-positive rate.” Ziomek runs engineering, data science, and operations for Aegis. Before joining the firm, he led teams of AI engineers and data scientists at Microsoft, leveraging AI to identify high-potential startups globally. Aegis is a software-only solution that plugs into existing security camera hardware and software, including video management systems (VMS). Existing capabilities of a customer’s VMS does initial, basic analysis and then routes the remaining video to Aegis’s processing units for AI analysis. Alerts can then be sent back however a customer wants, including through a VMS. Aegis can also feed information into a PSIM or command-and-control system if requested by a customer. Equipping customers with AI tools Our current focus for the company is to get our technology into the hands of as many customers as possible"As an early-stage company, Aegis is pursuing customers through multiple routes, including directly to end-users and via security integrators, distributors, and dealers. They are currently deployed at diverse customer sites including schools, office buildings, industrial facilities, and public buildings, says Ziomek. “Our current focus for the company is to get our technology into the hands of as many customers as possible,” says Ziomek. “We are working closely with customers across segments and industries to equip them with the tools they need to make their spaces safer. We’re currently working on educating the market on our offerings, as this technology is very new to many security organisations.” There are no privacy or compliance concerns because Aegis stores no customer data until a weapon is detected, and even then the data is not cross-indexed with any sensitive information, says Ziomek.
As police use of live facial recognition (LFR) is called into question in the United Kingdom, the concerns can overshadow another use of facial recognition by police officers. Facial recognition is incorporated into day-to-day police operations to identify an individual standing in front of them. This more common usage should not be called into question, says Simon Hall, CEO of Coeus Software, which developed PoliceBox, a software that enables police officers to complete the majority of their daily tasks from an app operating on a smart phone. Time-consuming process There are two different use cases for facial recognition in the context of law enforcement" “Verifying the identity of an individual standing in front of you via facial recognition should be no more controversial than taking a fingerprint for the same purpose,” says Hall. “We are not talking about mass surveillance here, but the opportunity to use technology to make an officer’s day more efficient. Verifying a person’s ID is a time-consuming process if you have to take them to the station, so being able to do this more quickly should be welcomed as a positive step to modernise policing.” Because the use of facial recognition by police has proven to be a divisive topic, Simon is eager to highlight the distinction between the use of facial recognition for ID verification and the more controversial mass surveillance that some police forces have trialed. “There are two different use cases for facial recognition in the context of law enforcement,” says Hall. Number-plate recognition “Firstly, there is facial recognition to verify a person’s identity (typically done face-to-face with the individual concerned and using the Police National Computer [PNC] database). This is no more controversial than taking an individual’s fingerprint to verify their ID but can be conducted more quickly if the officer has the capability on their smart phone. The second common use of facial recognition is to identify suspects quickly via mass surveillance. This is more controversial.” The focus for PoliceBox is ID verification only, he adds. The focus of facial recognition for PoliceBox is ID verification only First, there is the matter of consent. In the context of facial recognition in public situations, it is very difficult to inform everyone that they are being observed, so they cannot give their informed consent, says Hall. Then there is the inability for people to ‘opt out’ of the process. Unlike with driving a car, where one can technically opt-out of the rules of the road (and avoid technologies like number-plate recognition) by choosing not to drive, there is no such option for facial recognition. National surveillance system Secondly, many-to-many matching (matching lots of images to lots of database records) is more likely to produce false matches, resulting in possible perceived harassment of individuals who happen to match a person of interest, notes Hall. The government is openly exploring plans to develop a national surveillance system using facial recognition Lastly, Hall says there are legitimate concerns that the technology could be misused for discrimination or exerting control over populations. In China, for example, where facial recognition technology is already widely used in the commercial sector, the government is openly exploring plans to develop a national surveillance system using facial recognition. “Mass surveillance can be used in two ways; real-time, whereby ‘people of interest’ are flagged up as soon as a match is detected, and historical, where the movements of individuals around the time of a reported crime are established after the event,” says Hall. Repeated false matches “These two modes probably require different types of safeguards. For example, it may be appropriate to obtain a warrant to search historical data, to prevent Cambridge-Analytica style mining of personal data. For real time data, safeguards against repeated false matches are needed to prevent harassment of falsely matched individuals.” Properly implemented, facial recognition can be consistent with the GDPR. The principles are no different from obtaining a fingerprint to confirm identity, where consent would normally be given. For PoliceBox, using fingerprint or facial identification is typically a time-saving solution, benefitting both parties, instead of going to the police station and establishing identity there. Signed consent can be obtained on the spot using a secure on-screen signature. The PoliceBox solution is based on the UK legal framework and would also be appropriate for countries whose laws are similar to the UK Facial recognition algorithms Fingerprints and facial images can be automatically deleted once used to establish identity. There are special provisions for the collection of personal data for law enforcement purposes without consent, and some test cases for mass surveillance could go through the Information Commissioner’s Office (ICO). This is particularly significant where private operators are concerned. PoliceBox solution is also internationalised and can be used in different languages The PoliceBox solution is based on the UK legal framework and would also be appropriate for countries whose laws are similar to the UK. It is also internationalised and can be used in different languages. Facial recognition algorithms and databases are typically implemented by the relevant law enforcement body (such as the Home Office) and not directly within the product, which acts as a front-end to those systems. Public sector organisations Hall sees several remaining challenges related to police use of facial recognition: The adoption of cloud-based software-as-a-service (SaaS) solutions within the public sector. The existing infrastructure in the public sector has evolved over a number of years and there are significant legacy systems in place that need to be refreshed/replaced; Need for proven technology. Public sector organisations are risk-averse and often insist on being able to reference existing installations, which creates a Catch 22 problem when introducing new technology as someone has to be first; Interrupting business-as-usual. Most organisations already have some form of an existing solution. Even if this system provides poor ROI and is extremely dated, one must still overcome ‘the better the devil you know’ policy; A reluctance by some suppliers to share information with other solutions via APIs. This has stifled innovation for some time. Improving officers’ wellbeing These challenges are slowly being overcome. “I am confident we will soon see an accelerated adoption of platforms such as ours to deliver the financial and efficiency savings that are needed to bring the public sector into the 21st century,” says Hall. One of the biggest themes to come out of the recent Home Office Review into frontline policing was the need to improve officers’ wellbeing. Law enforcement has to deal with some of the most difficult and harrowing situations on an almost daily basis. The administrative burden can also be problematic, says Hall. “If we can help to reduce the administrative burden placed on officers – even by a little bit – the overall improvements in effectiveness and well-being when magnified across a whole force will be significant.”
Gunshot detectors use digital microphones installed on (or in) buildings or along streets that listen for evidence of gunshots, provide near instantaneous notification, triangulate the location of shooters and direction of a shot, detect the type of gun and ultimately aid in catching fleeing suspects and solving crimes. Gunshot detection is just one technology playing a role in the larger trend by city agencies to improve core city services. Cities are turning to what are referred to as ‘smart city’ solutions – new, innovative technologies that improve and maintain a high quality of life and ‘liveability’ for citizens. Several cities in the United States have implemented gunshot detection systems. Identifying and deterring gun violence Gunshot detection systems can shorten the response time in an active shooter situationShotSpotter, a provider of gunshot detection solutions that help law enforcement officials and security personnel identify, locate and deter gun violence, announced that seven new cities have deployed ShotSpotter technology in their communities. The new cities include Cincinnati, OH; Jacksonville, FL; Louisville, KY; Newburgh, NY; Pittsfield, MA; Syracuse, NY and St. Louis County, MO – joining the more than 90 jurisdictions that rely on ShotSpotter to ensure a fast, accurate response to gunfire incidents. Three existing ShotSpotter cities, New York City, Chicago and Birmingham have also recently expanded their coverage areas. Data capture form to appear here! Gunshot detection systems can shorten the response time in an active shooter situation. Early detection should be a primary aim, second only to prevention. Security professionals must be part of both of these areas, working in partnership with relevant administrators, local government, law enforcement, first responders and the community to help prevent and better respond to gun violence. Gunshot localisation solution In addition, active shooter events – large or small – are almost always sudden and unexpected, which places a burden on security personnel to manage these risks without creating a prison-like environment. A gunshot localisation solution can turn a video camera system into a real-time safety system in the event of an active shooter A gunshot localisation solution can turn a video camera system into a real-time safety system in the event of an active shooter. Called ShotPoint, the system is completely automated. Working with a video management system (VMS), it can enable a video image of an active shooter to be provided in seconds based on the location of a gunshot. ShotPoint is a network of sensors which can be mounted on walls, ceilings, streetlight poles or other indoor or outdoor locations. Using a ‘sensor mesh approach’, ShotPoint reliably detects and localises the source of gunfire; ranging from small handguns to high caliber rifles. The system can cover large indoor or outdoor areas such as schools, office buildings, retail centres, campuses, and parks. Accurately provides gunshot location Each sensor has an array of four acoustic channels (microphones) that can locate the source of a gunshot sound, the time of arrival and the time distance of arrival. ‘Hearing’ shots from several vantage points (using multiple sensors) enables the system to take into account the angle and time of the sound, which vary in different environments, thus accurately providing the location of the gunshot. A ‘fusion processor’ box (at the edge) listens to the various sensor nodes and computes the location of the gunshot, relative to a floorplan and/or based on global positioning system (GPS) location. In an outdoor location, additional information may also be inferred, such as the trajectory of the gunshot and/or the caliber of the firearm.
Kings Secure Technologies has provided high-level security and protection to one of its leading clients since 2011. Due to this successful long-term relationship, Kings was commissioned to begin a project, which started in 2019, to update the existing access control system with the latest high security card and card reader technology. With facilities working 24/7 the challenge faced was to find an easy-to-install edge technology card reader that could be configured onsite to read multiple card technologies where required and be field upgradable with any new advances in security. With these complex requirements in mind, Kings turned to Third Millennium to provide the most advanced technical solution available in the market. RX range of card readers The project also required the implementation of biometric dual authentication for the more secure areas Kings utilised Third Millennium’s RX range of card readers which incorporates the second evolution of NXP industry-leading MIFARE® DESFire® EV2 open architecture platform. Third Millennium’s PC09 Mifare DESFire EV2 cards offer superior performance, state-of- the-art security, privacy and enhanced multi-application support such as follow me printing and vending, to name just two. In addition to the RX4 and RX1K readers, the project also required the implementation of biometric dual authentication for the more secure areas. Third Millennium’s RX6 biometric reader uses a template on card application which means that there is no requirement to maintain a separate database of biometric information. The RX6 compares the finger template on the card with the finger being scanned and releases the card data if the two match. Because of the high security requirement, a custom encrypted key ties the readers to the cards thereby preventing card cloning or data bugging.
It is one of Moscow’s most ambitious building projects: the VTB Arena Park was built on the site of the old Dynamo Stadium and revitalises the entire surrounding area with a multi-purpose concept. At an estimated cost of US$ 1.5 billion, the modern VTB Arena Park combines sports, entertainment, commercial and residential facilities. A first challenge arises from the sheer size of the project: The football stadium, known as Dynamo Central Stadium and home to FC Dynamo Moscow football club, hosts league matches with a capacity of over 26,000 spectators. The park’s indoor arena holds more than 12,000 guests during ice hockey matches, basketball games and rock concerts, while the 300,000 square-meter park area also offers retail facilities, a five-star hotel and 1,600-car parking garage. Protecting residential areas Considering the wide range of very different purposes served by these various buildings, it was clear from the project’s inception that a multitude of vendors and providers would be needed to cover all security needs. VTB Arena Park was looking for a partner able to tackle that key challenge From the security manager’s perspective, the main challenge was to ensure that these disparate systems would function together and allowed for central management of a wide array of functions such as: access control for tens of thousands of football fans entering the stadium on match days, monitoring the vast perimeter with its park zones, and protecting residential areas against intrusion. VTB Arena Park was looking for a partner able to tackle that key challenge – integration of all parts into one platform – and chose Bosch as its provider of end-to-end video security and access control. Intelligent video analytics Aside from the project’s complex technical ramifications, there was a particular system design challenge: Residents of the Arena Park should feel at home enjoying the highest quality of living, while the area also needs to accommodate for the influx of thousands of visitors within short periods. As the Bosch experts learned, the multi-purpose character of VTB Park leads to an equally wide range of different security needs among its users. Catering to the video security needs, Bosch installed a total of more than 2,000 video cameras, fixed as well as moving cameras, both indoors and outdoors, to safeguard the vast perimeter of the Arena Park premises and secure the homes and offices. One of the camera types installed for perimeter protection is the AUTODOME IP starlight 7000 HD. This high-definition camera offers excellent low-light performance thanks to starlight technology and also features built-in Intelligent video analytics. Access control systems The video analytics function automatically detects deviations from standard moving patterns The video analytics function automatically detects deviations from standard moving patterns, like a person entering a restricted area, and triggers an alarm that is sent to the control rooms where security staff can then zoom into a scene for closer investigation. As required by VTB Arena, all 2,000 cameras and connected video storage on Bosch recording units are managed centrally via the Bosch Video Management System (BVMS). Another particular challenge consisted of aligning the three different access control systems of the stadium running at the same time. The ticketing system is the first layer of access control, managing the turnstiles that permit entry of thousands of visitors during events with paper tickets. This access control system needed to integrate with the employee access control system that relies on proximity cards (the Access Engine provided by Bosch), as well as a third, offline access control system used at specific stadium facilities. Integrated security system As the Bosch experts in Moscow found out, such an integration was without historic precedent. Because no standard solution existed, the team devised a highly customised set-up managed centrally on the Building Integration System (BIS) from Bosch. “We were fully aware that the multifunctional character of the VTB Arena Park would lead to complexity that could hardly be topped. We needed integration power, a partner who knew how to bind all loose ends into one solution that had never existed before. Creating this one integrated security system catering to all the various purposes has made Bosch our main security partner,” said Alexander Kravchenkov, Deputy Head of Security Systems Maintenance Group IT Department at VTB Arena.
Wintec (The Waikato Institute of Technology), established in 1924 is a major New Zealand Government-funded tertiary institution, which has three Hamilton campuses; a city site overlooking the central business district, Avalon campus on the northern outskirts of the city, and a horticultural campus at Hamilton Gardens. In addition, it has regional operations at Te Kuiti and Thames and also an office in Beijing. The Avalon campus, a ten-minute drive from the city, is home to specialist trades training facilities, a state-of the-art sport and exercise complex and custom designed facilities for the School of International Tourism, Hospitality and Events. The third Hamilton campus, the Horticultural Education Centre, is situated amidst the 58 hectares of Hamilton Gardens. On-line distance education Wintec’s programmes and qualifications are nationally and internationally recognised Wintec is one of the largest institutes of technology in New Zealand, and has more than 35,000 full-time and part-time students, more than 500 full and part time staff and eleven schools within its academic faculty. International enrolments exceed 1000 from 47 countries. A range of student services provide its domestic and international students with a high level of support so they enjoy a positive, safe and secure study experience. Wintec’s programmes and qualifications are nationally and internationally recognised and its degrees have equal status to those from universities. The degree programmes include Media Arts, Midwifery, Nursing, Occupational Therapy, Early Childhood Education, Business Studies, Engineering, Technology, Information Technology, and Sport and Exercise Science and a wide range of full and part time courses for those already in the workforce. Wintec is also recognised nationally in the delivery of on-line distance education for those unable to attend regular classes for reasons of geographical access or other constraints. Electronically controlled doors Wintec strives for a balance of unobtrusive yet robust control of site activity, essential for maintaining an open campus environment. Shane Goodall, Security Manager at Wintec, describes the approach to security as highly proactive and collaborative: “by focusing on preventing issues arising, we now have a minimal policing role and the crime resolution rate is high”. This environment is underpinned by Gallagher’s security system, a core access control, intruder alarms and integration platform. Wintec first installed the Gallagher system (formerly Cardax FT) in 1999 and has since migrated this legacy system to Gallagher’s latest security technology platform. Security for the entire organisation, including satellite sites, is managed and monitored centrally from Wintec’s single Gallagher security system. Since initial installation, Wintec’s Gallagher access control system has grown from 7 to 240 electronically controlled doors in 2009, with another 40 planned - testimony to the scalability and flexibility of the system. Network friendly system communications The organisation first installed 6 cameras in 2004 which has increased to 7 DVRs and 85 cameras Wintec has integrated its imaging system to the Gallagher system delivering a visual record which can be matched to the audit trail of events in Gallagher Command Centre software. The organisation first installed 6 cameras in 2004 which has increased to 7 DVRs and 85 cameras (both analogue and IP). Another compelling aspect of the system for Wintec is the scalability and TCP/IP network friendly system communications. As well as monitoring and controlling staff and student access, equipment including computers, TVs, printers, audio visual resources at Wintec are also monitored through the Gallagher system. The ‘Gallagher Hub’, a new computer laboratory offering comprehensive IT resources is open 24 hours. The Hub contains 125 workstations, and there are plans to extend that number. Active monitoring of equipment though the Gallagher system has significantly reduced theft. Students and staff have scheduled access to shared IT resources, classrooms and lecture theatres. Manage cardholder data ‘Cardholder Import’, an XML Interface, supports the importation of cardholder data including course enrolments from their student record system to Gallagher Command Centre. Shane comments, “Student card issuing is an automated process which is enrolment-driven – a student’s access privileges are assigned according to their enrolled courses.” “To implement this, we defined a rules-based allocation of access groups in the Gallagher system using the XML interface. The interface is ‘live’ so that changes in the student enrolments database are immediately reflected in the Gallagher system. The student’s updated access privileges come into effect without delay.” Staff that interact directly with students are now empowered to manage cardholder data enabling the security team to focus on security. Students and staff utilise Mifare SmartCard functionality extensively, embracing them as an integral multiapplication tool in their modern educational environment – SmartCards are used to issue resources from the library and as pre-stored value cards enabling prepaid printing and photocopying. In the near future they will also be used in Wintec’s Pay and Display car-park and potentially as passes onto city council buses. Electronic access control At Wintec, security is not viewed as a discrete functional activity relegated to security staff only Stewart Brougham, Director of Internationalisation at Wintec, says students have given very positive feedback about their ID cards. In particular, the ability to verify the identity of staff members from their ID access cards provides peace of mind for students. The end result is a people-friendly campus. Future enhancements of Wintec’s security may include the utilisation of the CommCard solution from Gallagher to manage and monitor access to student accommodation. CommCard is a unique high level integration between the Gallagher Command Centre software and Salto off-line readers, delivering offline, non-monitored electronic access control for lower security doors. An overriding philosophy of collaboration has seen Wintec take a lateral approach to security, the value of which many organisations have yet to realise. At Wintec, security is not viewed as a discrete functional activity relegated to security staff only. The ongoing management of security is a joint effort between the security services team and the information services team. Increasing operational security The security services team manages the Gallagher system while IT looks after back end functions such as installation on the network and backup. Wintec has leveraged the convergence of security (access control) and other operational business functions recognising the tremendous potential for reducing risk and increasing operational security, safety, performance and efficiency. Looking beyond simply controlling and monitoring who goes where and when on site, Wintec is harnessing the reporting capabilities of Gallagher Command Centre to meet regulatory requirements. The Gallagher system enables the institution to report on actual space utilisation (not just space booking). Decisions are made for best use, and also to substantiate funding, based on these reports. “The key to space utilisation reporting are the frequency of reporting and the integrity and reliability of information,” states Stewart Brougham. It’s a national issue for educational institutes in New Zealand. Extending external partnerships “For Wintec, reporting is about ensuring compliance with regulatory requirements and is also a staff time management issue – reducing the administration load on lecturers, who would otherwise have to track student attendance manually.” Brian Fleming, Director of Gallagher Channel Partner, Concord Technologies, sites this lateral application of a security system as key to maximising the value of Gallagher to Wintec. Wintec has a strong relationship with Gallagher in the ongoing development of its technologies This collaborative philosophy extends to proactive external partnerships with their Gallagher Channel Partner, Concord Technologies, for the installation and maintenance of the Gallagher system, and with system designer and manufacturer, Gallagher. Having signed an agreement to continue in the capacity of a Gallagher field test site, Wintec has a strong relationship with Gallagher in the ongoing development of its technologies. Wintec’s success, in the last 5 years, as a test site reflects the competence of both its IT and security staff and the institute’s commitment to edge student services. Minimal training has been required. Software maintenance agreement There is open communication and information sharing between all internal and external parties involved, which means any issues that arise can be quickly addressed. Wintec has committed to a site maintenance plan with their security partner, Concord Technologies. The plan incorporates both software and hardware maintenance to ensure the system is maintained on the latest operating platforms within a known cost structure. A Software Maintenance Agreement also ensures enhanced ongoing system performance and reliability of the Gallagher system. Acknowledgements Gallagher would like to acknowledge the support of Wintec and security partner, Concord, with the development of this in-site study. Gallagher would also like to particularly acknowledge and thank Shane Goodall for the pivotal role he plays in championing the collaboration of these parties and for his outstanding support of the Northern Region Cardax User Group (NZ) in the capacity of Chairman of the group.
3xLOGIC, Inc., a provider of integrated, intelligent security solutions, and a three-time Deloitte Technology Fast 500 winner, announces yet another successful apprehension, courtesy of sister company, Sonitrol’s, incredibly effective TotalGuard technology. Sonitrol of Lexington, Kentucky performed the system installation and does on-going 24/7/365 monitoring. Brandenburg Auto is a small, family-owned and operated auto repair shop in Lexington, Kentucky, run by Jack Brandenburg and his son, Jack Jr. The business had recently experienced a break-in, during which the phone line was cut prior to entry, rendering their previous security system incapable of sending alerts when the intrusion occurred. Installing entire system Brandenburg Senior was initially reluctant to deploy the new Sonitrol TotalGuard solution, as he felt they already had cameras and he was concerned because the new technology would not have a keypad. However, after Danny Goodpaster, Sonitrol Security Consultant, demonstrated the technology and showed him a video of an actual break-in resulting in an apprehension, both father and son decided to move forward. Sonitrol staff had implemented a process of pre-deploying the TotalGuard devices in their offices Sonitrol scheduled the installation with an expedited timeline considering the recent loss the business had experienced. The technicians actually finished a previous job earlier than expected, which allowed them to come to the Brandenburg facility one day earlier than planned. Prior to installation, Sonitrol staff had implemented a process of pre-deploying the TotalGuard devices in their offices before arriving on site, which allowed the team to install the entire system in less than half a day. Scheduled installation This was quite a fortuitous turn of events, because that very night, the night before the original scheduled installation, an intruder cut the phone line again and entered through the shop door. The new TotalGuard system was no longer on the phone line, and the unfortunate thief was immediately detected by Sonitrol monitoring personnel and the police were dispatched. Law enforcement arrived quickly, and in numbers, making the apprehension and minimising the impact to the next day of business for this valued customer. The full system is comprised of three TotalGuard sensors and a standalone TotalGuard, which does not need a panel because it is wired directly to the camera. TotalGuard alarms on motion, impact, audio, and video and communicates to the central station without needing a phone line. The system is arm/disarm via Sonitrol mobile app and the business phone is the keypad, so no maintenance and no wearing out of the equipment. All control is from the mobile app, and updates are pushed to the system automatically.
A supplier of global technology services, Bosch chose to partner with Gallagher and KW Corporation to help streamline its North American security operations. Operational efficiency Bosch required a comprehensive yet flexible security solution that could be tailored to solve their specific requirements and challenges. Presently 22 Bosch locations are on the Gallagher platform with a cardholder database of approximately 6,000. A key area of focus for Bosch was improving operational efficiency. Command Centre, Gallagher’s powerful access control solution, offered Bosch a range of reporting functions to help streamline operations. Manager of Bosch’s corporate Security, Frederick Fung, says “The user friendliness of Command Centre and the ability to automate reporting means our operations now run more smoothly. Administration time has been reduced, creating significant cost savings.” Having the ability to pick up the phone and call technical support is critical to securing our sites" Centralised system Bosch selected Gallagher as the solution that could best meet its needs, including a centralised system to secure multiple sites. “Having the ability to pick up the phone and call technical support is critical to securing our sites,” explains Fung. “Many of our security staff have multiple responsibilities, so the Gallagher and KW Corporation services are invaluable.” Gallagher also offers customers the same training courses that it conducts for certified channel partners, providing staff with the capability to be first responders and giving them the confidence to handle certain security issues themselves. Command Centre Like many businesses, theft of physical and intellectual property is a big concern. With the support of Gallagher and KW Corporation, Command Centre manages access control, Bosch surveillance, and intrusion systems. Selecting Gallagher provided Bosch with: Video management system integration (BVMS), for safety precautions and oversight CCTV integration, image and video event audit trail Peace of mind through the use of the latest continually evolving software technologies and cyber security counter measures, eliminating the fear of hacking and site down-time Integrated intrusion detection system allowing full situational awareness Flexible and scalable solutions Fung explains, “The key differentiator for Gallagher is the company’s unmatched support, system user-friendliness, and cost savings in both short and long-term.” Gallagher solutions are flexible and scalable, creating the potential for future growth across Bosch locations. “Integration with Gallagher Command Centre has had a positive impact across our sites, improving safety, security, and operational efficiencies,” says Fung. “Gallagher supports us in providing a safe and secure working environment, improving the quality of life for our associates and visitors.”
Wellington is the southernmost capital city in the world and is the centre of New Zealand government. With the second highest population in the country, Wellington is a large coastal city with a diverse range of facilities and attractions. A large portion of those facilities and attractions are the responsibility of the Wellington City Council (WCC) – a local body government organisation employing around 1,800 staff. As with all councils that manage a large number of facilities on behalf of their city, the WCC has a broad range of security needs and an accountability to the rate-paying citizens of Wellington. Since 2001, WCC has met those security needs with Gallagher’s integrated security solutions. Central management platform WCC developed a five year plan to migrate all 150 sites on to the Gallagher system With 1,800 employees and 150 sites located across Wellington, the council has a large number of people and assets to secure. With sites including libraries, swimming pool complexes, community and recreation centres, housing blocks, a city zoo, event facilities, and a multi-story central office building, the security requirements vary considerably. “We’re responsible for securing and monitoring all 150 sites around the clock” said Chetan Prasad, Security Manager for Wellington City Council. “It’s imperative we have a reliable system that provides us with a complete view of activity at all sites”. In order to deliver this, WCC uses Gallagher’s Command Centre central management platform to manage security across numerous sites. Utilising a single security platform has been a long-term objective of the council. Initially operating six different systems, WCC developed a five year plan to migrate all 150 sites on to the Gallagher system. Chetan links the Council’s growth with their need to become smarter about how security is managed. Primary security solution “Gallagher’s system has enabled us to standardise our infrastructure and bring all elements including alarm management, fire systems, vehicle bollards, video surveillance, facility and carpark access, reporting, visitor management, and more, on to one platform. That was a key factor in why we chose Gallagher initially, and why we will continue with them as our primary security solution.” Visibility is critical when you have 150 independent sites to secure. An integration between Command Centre and over 400 cameras located throughout the WCC’s facilities provides live video footage to the security team. “Our camera integration with Command Centre means that in addition to being able to continuously observe critical areas, any site alarm that is triggered will immediately bring up a live video feed for the security staff in our control room. This visibility is invaluable for us in activating appropriate responses and, in the event of a crime, being able to provide crucial evidence to police” said Prasad. Electronic access control WCC is utilising Gallagher security technology to ensure staff are protected In addition to securing facilities and assets, WCC secures and protects staff working at each of its sites. From initiatives like integrating building elevators with access control to prohibit unauthorised entry, to the integration of panic buttons at each site, WCC is utilising Gallagher security technology to ensure staff are protected and that in the event of an incident, a rapid security response is initiated. According to Prasad, the Gallagher system is delivering cost savings to the Council in several key areas. The first area relates to the shift from traditional key systems to smart card technology. “With such a large staff base and so many sites, we inevitably faced challenges with traditional keys being lost or not returned by staff or contractors” said Prasad. Rekeying a site cost the Council approximately $4,000 each time – an expense that has now been eliminated by the replacement of traditional lock and key systems with electronic access control. Visitor management solution “Now if a card is lost or not returned, we simply deactivate it in our system. Not only is it a solution that saves us money” said Prasad, “it is also a solution that can be applied instantly.” Similarly, the ability for security personnel to assess a site and reprogram an alarm remotely, also saves the council considerable costs associated with dispatching guards to site. The second area where cost savings are apparent relates to intelligent automation. An integration with WCC’s HR system means that as staff leave employment, their cardholder profiles are automatically disabled in the system. The use of Gallagher’s Visitor Management solution, means that appropriate staff are automatically notified if a guest or contractor fails to sign out or return a key. These two automations alone, save the WCC security team approximately 4-5 days of cardholder administration each year. Software maintenance contract WCC elected to take a 10 year Software Maintenance agreement with Gallagher In 2014, following 13 years as a Gallagher customer, WCC elected to take a 10 year Software Maintenance agreement with Gallagher. The Software Maintenance contract ensures the Council have access to the latest developments as soon as they are released, keeping WCC at the forefront of security technology. “Software Maintenance makes good business sense” says Prasad. “It gives us access to a comprehensive range of licensable features and benefits, and ensures our upgrade costs are effectively distributed.” Prasad describes the Council’s confidence in Gallagher as another significant factor in the 10 year agreement. “We have found Gallagher’s security solution to be a reliable and versatile, highly secure, modern system. It has supported our significant growth to date, and we are committed to using Gallagher systems for the Wellington City Council’s future.”
Round table discussion
Artificial intelligence is on the verge of changing the face of multiple industries – from healthcare to entertainment to finance, from data security to manufacturing to the cars we drive (or that will drive themselves!) In the physical security market, AI has garnered a lot of attention as a buzzword and as a harbinger of things to come. We asked this week's Expert Panel Roundtable: What security markets are most likely to embrace artificial intelligence (AI)?
The physical security industry is embracing the cloud in a big way. Cloud-based systems – which involve accessing a shared pool of information technology resources via the Internet – are much higher-profile in the video and access control markets, and large and small companies are getting on the cloud bandwagon. We asked this week's Expert Panel Roundtable: What factors are contributing to growth in cloud systems in the security market?
Enterprise customers provide a large, and very lucrative, business opportunity for the physical security market. These customers include big global companies with plenty of revenue to spend and employees and facilities to protect. As a group, enterprise customers also tend to be a demanding lot, requiring systems that are large, scalable, that can operate across a wide geographic area, and that provide top-notch system performance. Enterprise customers set the standards of performance for the entire market, and they challenge manufacturers to up their game. We asked this week’s Expert Panel Roundtable to reflect on the industry’s biggest customers: What are the security challenges of the enterprise market?