Suprema, a globally renowned company in access control, biometrics and time & attendance solutions, has announced that its intelligent biometric access controller, CoreStation has acquired UL 294 compliance. UL 294 compliance UL 294 is a certification designed especially to ensure the safety and reliability of access control products. The certification has significance to larger customers, like government institutions, corporations, and medical and banking verticals that value reliability...
Check Point® Software Technologies Ltd., a foremost provider of cybersecurity solutions, has announced that it has become a strategic partner of FinTech Scotland, an independent not-for-profit body jointly established by the private sector and the Scottish Government. Check Point solutions bring a practical boost to cybersecurity awareness and engagement with Scottish fintech firms. The collaboration will offer pioneering security solutions and education and training resources to help Scot...
Safetrust, a pioneer in virtual credential solutions, and AlertEnterprise Inc., the foremost physical-logical security convergence software company, have entered into a strategic partnership to deliver next-generation digital access credentialing and controls, providing frictionless, safe and secure workspace access experience for employees, contingent workers and visitors. Benefits of collaboration The collaboration reinforces the new way businesses are defining smart and healthy workplaces,...
Vanderbilt, a provider of state-of-the-art security systems, announces the release of ACT Enterprise 2.14. ACT Enterprise is the company’s award-winning access control software that has a wealth of features and integrations. The latest additions in version 2.14 include extended integration with KONE and new video integration with Hanwha. The software has also added contact traceability reporting to its suite of tools. For instance, thanks to contact traceability reporting, users of ACT En...
As employees continue returning to the office, travellers start flying again, fans slowly return to stadiums, technology that focuses on maintaining health and safety in semi-public and private venues remains crucial to slowing the spread of COVID-19. In response, FLIR Systems announces the FLIR Elara™ FR-345-EST, a fixed-mount radiometric thermal security camera that measures elevated skin temperature (EST) accurately without contact or the need for a reference temperature source. This s...
In a world first, 3DX-Ray launches the AXIS™-CXi, a cabinet-based X-ray screening system that utilises the same colour differentiating image technology used in airport baggage screening. The AXIS™-CXi is a huge step forward in mail room scanning, as colour differentiated images enable operators to determine not just the shape but, the nature of the materials being scanned. Orange shows organics, such as; explosives, chemicals and drugs, as well as more innocent items such as foodstu...
LenelS2 announced the release of its Mobile Security User app that enhances safety, security and convenience. LenelS2, a global leader in advanced security systems and services, is a part of Carrier Global Corporation, a global provider of innovative heating, ventilating and air conditioning (HVAC), refrigeration, fire, security and building automation technologies. The Mobile Security User app offers a wide range of security features to LenelS2 NetBox™ ecosystem users. With the Mobile Security User app, employees can receive notifications from security personnel, utilise their phone as a mobile credential, escalate threat levels, self-muster during an evacuation event, and more. Streamlining access “The Mobile Security User app provides the security features organisations and their employees need at their fingertips,” said Jeff Stanek, president, LenelS2. “The app brings together many aspects of NetBox ecosystem functionality to provide an excellent user experience for employees.” Additionally, the Mobile Security User app provides NetBox ecosystem users with the option to use the HID Origo Mobile Identities cloud-based service managed by HID Global. This allows employees to use their phone as a mobile credential, streamlining access throughout a building or campus. Using the app, authorised users can escalate threats, which can initiate a lockdown in the event of an emergency. Users can also receive notifications sent by security personnel from other NetBox ecosystem products, including the Magic Monitor unified client, NetBox access control system and Mobile Security Professional® app. Rapidly communicate critical information Notifications can be sent to individuals and groups, enabling security teams to rapidly communicate critical information to the workforce, such as an office closure due to inclement weather. The Mobile Security User app is currently available for iOS and Android devices in the U.S. NetBox Version 5.3 or later must be registered and connected to the LenelS2 Cumulus™ cloud-based service to provide full Mobile Security User functionality.
Master Lock, the American security super brand, is excited to announce the launch of the Biometric Security Safe to join the brand’s expanding easy access range. Following the success of the Biometric Padlock that launched earlier in 2020, the new Biometric Security Safe offers a practical solution to security at the touch of a fingerprint! The Biometric Security Safe is the ideal home and office solution for protecting precious valuables and electronics against theft. The biometric lock allows users to store up to 30 fingerprints there is no need to memorise tricky combinations or codes. Protection against attacks There is also no danger of keys getting into the wrong hands or becoming lost. The security mechanism comprises of two steel motorised bolts and a concealed hinge for increased protection against attacks and prying attempts. The body of the Biometric Security Safe consists of a solid steel construction for a robust outer layer. The interior features a carpeted floor to prevent the contents from scratches during storage and a handy interior light for added visibility in the dark or low light. Additionally, since the Biometric Security Safe does away with fiddly keys, it is a great security option for those that suffer with joint pains as gaining access does not require any uncomfortable twisting. It is also useful for the more forgetful who might misplace keys or misremember codes as all that is required is a fingerprint. Integrated battery jump kit The safe requires 4 AA alkaline batteries to operate which are easily accessible and replaceable Thanks to an integrated battery jump kit and set of two override keys, users can rest safe in the knowledge that they can always have access to the safe, even in the event of flat batteries. The safe requires 4 AA alkaline batteries to operate which are easily accessible and replaceable. Boasting a large interior 25.4 litres capacity, the Biometric Security Safe is suitable for storing a wide range of precious items and electronics such as passports, cheque books, small electronics like cameras, tablets, laptops and important A4 sized documents. The neat size makes it ideal to integrate into a variety of existing pieces of furniture such as wardrobes, desks and cupboards making the safe easy to conceal from sight. Master Lock’s 90-plus years of security expertise means users can rely on a product that has been perfected and designed from the ground up by a team of dedicated security professionals at the brand’s headquarters in Wisconsin, USA.
If one has ever settled a bill for changing one’s office locks and thought if there were a better way. In fact, there is. Access control and digital keys are easier and more cost effective than one can imagine. While mechanical keys will keep a building secure, they lack the flexibility to adapt to one’s changing security needs. Standard physical keys are difficult to track without a key management system. Physical keys When a key goes missing, changing a standard mechanical lock or rekeying is time-consuming and often expensive Some types of key are quite straightforward to cut without permission. And when a key goes missing, changing a standard mechanical lock or rekeying is time-consuming and often expensive — 100€ or more every time. Yet the alternative — electronic access control — can seem daunting, over-technical and potentially expensive. But this need not be the case, if one chooses the right wireless access control system. The basics of digital locking Best wireless access control systems lets one choose the format to suit one’s business Everything begins with the credential — the digital key one’s building users will carry at all times. Credentials can be plastic smart cards, fobs, wristbands or even stored in a secure mobile phone app. The best wireless access control systems lets one choose the format to suit one’s business, and even to mix different types of credential in the same building. When one swaps keys for credentials, one brings enhanced flexibility to building security. Most importantly, if someone loses their credential, one can cancel it with a click. One would never rekey or change the locks again. Access control system for intrusion detection One can program and reprogram credentials and wireless door locks as many times as one likes Electronic access control is highly flexible. So, if some staff should have access everywhere, but others only through the main door, it is easy to program the system to allow just that. Plus, one can program and reprogram credentials and wireless door locks as many times as one like: employees leaving or joining the company create very little workload. If the worst happens and there’s an unexpected incident — unauthorised intrusion or theft — an access control system helps one handle it quickly and efficiently. Because everyone carries personalised credentials, the system software will tell one who went where and when. Yet another occasion when wireless access systems save time and money. Wireless locks for workplace security It takes only one day to switch a medium-sized office from mechanical lock-and-key security to digital credentials A modern, wireless system with digital door locks, programmable credentials and user-friendly software (to keep it all running) is easy, affordable and fast to install. It takes only one day to switch a medium-sized office from mechanical lock-and-key security to digital credentials. There’s no major cabling, no major adjustments around one’s existing doors and almost no noisy, dirty drilling. All over Europe — at offices and sports venues, schools and university dorms, co-working spaces and medical practices — SMARTair wireless locks have transformed workplace security. SMARTair management software SMARTair battery-powered cylinders, escutcheons, security locks and readers are fast to fit and can protect almost any door or access point, from boardrooms and storerooms to fire escapes and lifts. Little or no training is needed to use SMARTair’s management software: when one’s installer departs, hardware and software will be ready to go. One spends six months of one’s lives looking for lost things. Metal keys don’t have to be among them. SMARTair wireless security turns mechanical labours into key-free, happy workplaces.
Ava, a unified security company, announces the launch of Ava Aware Cloud. This video security solution offers the simplicity and flexibility of a cloud platform while providing the same intelligent, proactive security, and AI capabilities of Ava’s on-premises and hybrid solutions. For the first time, organisations of any size can leverage Ava’s powerful machine learning and advanced analytics to achieve proactive security. “Despite the industry’s promise of simple, intelligent video security, most organisations and companies still struggle with data overload, operational ineffectiveness, and the complexity of deployment and use. Ava Aware Cloud changes all of this. Now, organisations of any size can reap all of the benefits of our on-premises solution, such as improved operator efficiency and reduced investigation time while also getting the cloud’s game-changing advantages.”, Tormod Ree, CEO, Ava. Smart video security Ava Aware Cloud can be up and running in 10 minutes. One can simply plug in the cameras and go since there is no on-premise infrastructure and all settings are automatically configured. The cloud solution enables web and mobile access from anywhere by extending access from the browser to the Ava Aware mobile app on Android and iOS. Ava Cloud Cameras have built-in video/audio analytics and on-device storage. The solution is secure from the ground up with end-to-end encryption, factory-installed certificates, and automatic updates. Without the need for on-premise hardware, the licensing model is straightforward; simply choose camera type, resolution, and days of retention. Scaling the deployment from a few cameras to a fleet of devices is also effortless, without the need for servers. “Regardless of industry, efficiency is such an important part of keeping organisations and companies secure and protected. Ava Aware Cloud is a perfect path to simplicity and scalability, while smaller organisations with fewer resources and smaller deployments can still enjoy a full, proven security solution”, commented Kohler Brandon, VP Sales & Marketing, USA Security. Ava Aware VMS Ava Aware Cloud’s camera analytics enables security pros to find events and objects faster It offers the same security and operational benefits as the Ava Aware video management system on-premise solution. Ava Aware Cloud’s camera analytics enables security pros to find events and objects faster and security organisations to be more proactive, keeping threats from becoming incidents. On-camera analytics include object detection for people and vehicles, colour and gender classification, activity level, and sound analytics for events such as glass breaking or other loud noises. Harnessing these powerful analytics also provides business-relevant data. Organisations can do more with video security, such as real-time counting of people and vehicles, usage statistics, or social distancing measures, with APIs and webhooks for integrations. The Ava cloud video surveillance solution allows organisations to: Get started in minutes, stay up to date, and always secure. Be proactive and prevent incidents from happening with AI-powered solutions. Gain advanced insights and intelligence for their business. To learn more about Ava Aware Cloud and book a demo, attend GSX+2020 Online between September 21-25.
User friendly video intercom devices are quickly becoming a must-have product for homes and office buildings across the UK. However, some devices could be at risk of remote hacking attacks, leaving consumers vulnerable to cybersecurity breaches. Today’s intercom devices can easily be connected through a home internet connection, communicating with smartphones and managed simply through a computer, delivering many user benefits including flexibility and convenience. IP access control systems But before choosing a device, Tomáš Vystavěl, Chief Product Officer at 2N, a provider of IP access control systems, is urging people to do their research to ensure their preferred device meets high standards of security. Vystavěl sets out specific security concerns that may be found in the operating systems of some devices on the market. These vulnerabilities, which could allow hackers to obtain personal passwords or eavesdrop on conversations, include: Flaws in the operating system coding which would enable hackers to gain full access to the intercom device Web security weaknesses that allow an attacker to carry out random operating system (OS) commands on the server that is running an application, thus enabling access to the application and all its data Vulnerabilities in the system that allow a remote attacker to upload a manipulated ringtone file which could enable a complete system takeover Unsecured, non-encrypted communication that allow an attacker to listen in the conversation (man-in-the-middle attack) Video intercom device Installing a video intercom device offers users convenience, flexibility and home security" Tomáš Vystavěl, Chief Product Officer at 2N, said: “Installing a video intercom device offers users convenience, flexibility and home security. There are some great products on the market and I recommend consumers look for excellent security standards as well as a high quality user experience. No one wants to unwittingly give hackers opportunities to access their personal information. Consumers are strongly advised to do their research before choosing a video intercom device.” To ensure the best user experience Tomáš Vystavěl recommends people consider a number of other factors when choosing a video intercom device such as responsiveness, openness for the interconnection with other systems, reliability and quality of both sound and video images, as well as the quality of the overall product. Protecting their personal data 2N has just released the new 2N® Indoor View answering unit, the latest product in its portfolio of award-winning answering units. Developed with a focus on protecting customers from cybersecurity threats, the 2N® Indoor View uses 2N’s own operating system to provide users with the highest levels of security and protecting their personal data. The 2N® Indoor View answering unit is equipped with a 7” colour touchscreen display, providing a detailed view of people at the door from its scratch resistant 4-mm tempered glass panel. Users can easily and quickly display live video from the intercom and see who is at the front door in real-time, or they can replay missed or unanswered calls from unexpected visitors who have left a message.
Johnson Controls is announcing exacqVision 20.09, which offers an integrated, cost-effective face mask detection solution that can quickly put information into the hands of facility decision makers to help maintain safe environments for employees and visitors. Based on Artificial Intelligence (AI) analytics versus pixel-based analytics, exacqVision 20.09 with Face Mask Detection offers improved accuracy and a scalable, efficient solution for organisations where public health and safety is a priority - such as retail stores, educational and healthcare campuses and corporate offices. Enhanced situational awareness With exacqVision’s automated event notification features, it’s easy to monitor, link and search No Mask events, providing businesses with enhanced situational awareness to respond quickly when a person without a required face mask is detected. This ultimately allows businesses to be more proactive about reducing risks and ensuring compliance to new norms. Additional features include: More efficient and streamlined than placing employees at entrances to ensure compliance Alarms can be triggered based on the absence of a face mask Open camera support Real-time event monitoring, linking and searching
We’ve just endured an event that was unprecedented in recent history. COVID-19 greatly affected our lives: our daily activities, the health and well-being of our families and friends, and business operations as we know it. Now that stay-at-home restrictions have been lifted, organisations are preparing for employees to return to work. Confidence surrounding the return to the office hinges on the employees’ perceptions of how well they will be protected while at work. One thing is certain: There is a lot of work ahead. Let’s look at some of the challenges enterprises can expect to face and how to best address them. Addressing the Return to the Office To say that the COVID-19 pandemic has disrupted operations around the world, is the understatement of the decade. That being said, businesses and governments are under mounting pressure to restart their operations as quickly as possible. With ‘social distancing’ and other measures helping to curtail the spread, organisations are turning their attention to a critical question, “How do we effectively restart operations, while protecting our employees’ and citizens’ health and safety?”As organisations begin to “reboot,” they must be able to take a variety of factors into consideration and focus on what they can actually control In the absence of defined contingency plans, industry standards or regulatory guidance, organisations are looking for innovative ways to help address a host of new challenges. Businesses are not just focused on response or monitoring of hot zones during the pandemic; they’re also thinking about afterward, when people return to the daily activities and the workplace under a different, new set of circumstances. Embarking on this journey and being successful requires a key element: the insight to adapt. As organisations begin to “reboot,” they must be able to take a variety of factors into consideration and focus on what they can actually control: their employees’ safety, operating models, and existing compliance requirements. Building Confidence Adjusting these elements demands a pragmatic approach that addresses the potential risk to employees in various environments while also delivering a degree of confidence to customers that an organisation is taking a meaningful, proactive posture to keep people safe and healthy. Also, as circumstances change, obtaining the insight to adapt to those changes is crucial for businesses to stay one step ahead and remain agile. One example of this, that we expect to impact the future of business, is the increased use of mobile applications to provide remote health checks of employees while delivering push notifications of wellness tips, rapid communication when issues arise, and response to a call for help in case of emergency changes in health status. Employee monitoring To illustrate the point, having employees provide current symptom status and temperature before arriving at work can help to establish a baseline. Upon arrival, they complete a quick check-in to verify the information before entering the premises.It is important to remember that private health information is being shared, requiring adherence to existing privacy requirements In this instance, it is important to remember that private health information is being shared, requiring adherence to existing privacy requirements, documentation, record keeping and accuracy checks. Doing so manually is a significant challenge, hence the need for a systemic approach. Organisations are looking for applications that map to their current needs, can scale to larger populations as needed and remains adaptable to emerging requirements and legal mandates as they evolve. We expect to continue to see new use cases like this evolve as organisations implement new approaches to daily operation. Regardless of the use case, the underlying driver is that access to information and flexibility is critical and the ability to respond quickly is vital. Looking to the Future As we all adjust to different ways of operating, business and security leaders need to keep a few guidelines in mind. First, it is critical to identify the mission-critical challenges that are most relevant to your operations. What works for an organisation down the road, may not work for your business. Next, you need to implement processes and policies that are flexible enough to fit your situation, scalable to larger or smaller groups and adaptable to new requirements be they regulations, standards, processes or new technologies. And lastly, above all else, be pragmatic. The solution should not be worse or more complex than the problem. As we move out of this phase and into the weeks, months and years ahead, there is hope. By empowering your team and the overall business to realise stronger risk awareness, deeper threat detection and prevention, and broader visibility, you can develop a return-to-work strategy that enables you to get your operations up-and-running quickly and efficiently.
Across the world, the impact of the current pandemic has majorly disrupted how we function in our everyday lives, as a society, and the ways in which we do our jobs. Throughout, our personal safety and wellbeing, as well as that of our families, neighbours and colleagues, has been paramount - and adapting our day-to-day lives to meet social distancing measures has been a learning curve for us all. As we start to reassemble normal life, precautionary measures will continue to be put in place to achieve the universal aim of mitigating the spread of the virus as much as possible. As different countries reach new stages of this process, some parts of the world continue to live and work in lockdown, whilst some are beginning to open up. This means governments, as well as businesses and organisations, will need to think beyond one-way systems and sanitation stations to contain the risk of infection as more people begin to return to the outside world. Tracing the spread of COVID-19 Of course, this will need to be driven by higher-level support from leaders in government, healthcare and technology to develop innovative ways of tracking and tracing the spread of COVID-19. From contact tracing solutions, to self-reporting apps and thermal screening cameras – governments and businesses across Europe have a new responsibility to seek and reinforce the most effective ways to ensure people’s safety. These measures are particularly pertinent to those reopening their doors as lockdown eases, and those returning to a daily routine of commuting to and serviced office spaces. As more and more people begin to move through public and commercial areas, we will rely more on technology to run in the background to ensure safety and wellbeing is monitored - much like that of the everyday CCTV camera. Thermal temperature screening cameras One piece of technology that we can expect to see as more commonplace is the thermal temperature screening cameras and monitoring system. An example of this kind of device, is D-Link’s recently launched all-in-one, intelligent fever screening kit – which includes a dual-lens thermographic camera, blackbody calibrator, as well as integrated management software. Governments, as well as businesses and organisations, will need to think beyond one-way systems and sanitation stations to contain the risk of infection The premise of temperature screening cameras like this one, is to harness thermal imaging technology coupling it with AI to identify if a person is experiencing elevated temperatures, and raise the alarm automatically when someone at risk of spreading is detected. To monitor the progression or depletion of COVID-19, technologies such as AI facial recognition will play an important role in mitigating the risks of the virus spreading. Thermal cameras that use AI can easily capture and manage employee’s temperature and stop their entrance if a fever is detected. For this reason, such devices are normally installed in a doorway or entrance to a building to quickly detect and identify those displaying symptoms before entering a building. This type of surveillance will be detrimental to the management of COVID-19 in the world of a ‘new normal’ – as companies feel their way out and learn as they go along with people’s health and wellbeing continuing to be centre of the mind. Just as lockdown has had an impact on physical as well as mental health, so too will the adjustment to living life post-pandemic. Not only in getting used to and dealing with the emotional and mental pressures of life on the ‘outside’ as they leave lockdown, but they also face the very real risk of contracting the virus and the worries they may have of spreading it. Appropriate installation of temperature screening Companies and organisations have a responsibility in these times to play a supportive role towards employees, such as allowing them to continue working from home until they feel comfortable to work in an office setting. Equally, as restrictions ease, employers have a duty to make the workplace a safe place that is able to uphold the wellbeing of staff, which is where, as we wait for a vaccine, we must make use of the available technology. However, in the case of the thermal camera, in order for it to deliver effective results, it must be installed appropriately. To support this, we have outlined some key points to consider when deploying a temperature screening camera here: Choose a solution that features a blackbody calibrator – a vital part for any temperature screening device. A blackbody calibrator is the basis for accurate calibration of infrared thermography devices and allows the device to accurately detect a fever. Check for facing windows or doorways and heat sources such as radiators as these increase the risk of stray heat or cold sources throwing off readings according to the ISO standard associated with this type of equipment Be wary of weather and changes in climate as the device will need time to acclimatise – in order for readings to be clear individuals coming in from outside must wait five minutes before being screened When mounted, the camera must face individuals head-on and in parallel with their face to capture the inner eye area which is crucial for temperature reading Consider an option using AI which will automatically recognise individuals based on photos in the system Check applicability and legality of temperature screening cameras before deploying There’s a long way to go before life will fully return to normal. In the meantime, and to help everyone along the way, it’s essential that the right measures are in place to protect the physical and mental wellbeing of those we are responsible for. For anyone who is exploring options, know that there is help out there to provide guidance and expertise on the solutions that will be right for you and your business - now, as we go through the remainder of lockdown, and as we slowly move back into everyday lives.
The modern working world has evolved dramatically over the last few decades - from how and when we work, to the places we work from. Widespread internet connection advances, alongside the growth of cloud-based shared working platforms, have not only created the possibility for increasingly flexible working arrangements, but also fuelled a desire to do so – particularly among millennials. The preference for flexible working has now created a widespread need for more agile workforces, saddling IT departments around the world with the task to maintain ‘business as usual’ without compromising corporate privacy. With flexible working forecasted to stay for the long haul and passwords increasingly under scrutiny, evaluating alternative secure authentication methods to keep companies’ data and networks safe is important to protect these ‘new normal’ ways of working. The end of the humble password? A recent report by Raconteur found that the most common method of authentication for securing the digital aspects of workplaces is passwords. Unfortunately, however, between phishing, hacking and simple guesswork, passwords are easily compromised – a problem that is only getting worse, with IT professionals reporting an increase in phishing attacks in the last few years. Once compromised, passwords can be used to enter untrusted apps or websites and, worst and most commonly of all, give rise to even greater data breaches. Between phishing, hacking and simple guesswork, passwords are easily compromised Alongside security concerns, 6 in 10 people worry about forgetting their passwords and, according to a recent Balbix study, 99% of people reuse the same password across different work accounts. This, undoubtedly, is a side effect of the increasingly complex character requirements implemented by many enterprises. This stress and effort leads to frustrated employees, but, more worryingly, forgotten passwords can also cost IT departments millions of dollars a year. In our flexible, hyper-connected world, it is clear then that the humble password is no longer effective. Additional or alternative layers of authentication are needed to help enterprises maintain their workplace security in a more convenient and cost-effective way. Smarter workplace authentication with biometrics Often, hacking incidents involve the use of stolen credentials. One authentication solution that could bring an end to these large-scale hacking attacks is biometrics, as unique biological traits are extremely hard to steal and spoof. In addition to being a more secure method to authenticate users and prevent fraud in companies’ networks, it is also possible to layer biometric modalities to create a highly convenient and secure multi-modal authentication solution for sensitive areas or information. Spoofing two biometric modalities, such as fingerprint and iris, in the same attack is virtually impossible, but that doesn’t mean this level of security needs to impair the UX. After all, you can put your finger on a touch sensor, while at the same time glancing at a sensor. For businesses, biometrics can be used in a wide variety of use cases, from securing laptops and applications to authenticating employees at secured access and entry points. It can also be used to add frictionless layers of additional security to any aspect of current security systems, such as key fobs or USB sticks, or to access personalized settings or employee accounts when using shared devices, such as a printer system. This way, beyond playing a role in securing the modern workplace, biometrics can also give employees greater flexibility and convenience over how, when and where they work. Privacy and biometrics - explained Many employers and employees worry about safeguarding privacy in the workplace. Considering biometric data is highly personal, it is no wonder, then, that many are concerned about collecting this data for the purpose of workplace security and what liabilities this may expose them to. For businesses, biometrics can be used in a wide variety of use cases, from securing laptops and applications to authenticating employees Employers must adhere to the relevant workplace privacy laws, such Europe’s GDPR, and this duty extends to biometrics, of course. But, providing biometrics is implemented in line with best practice, it can actually protect employees’ privacy far more effectively than its predecessor, passwords. When employers use an on-device approach, their employees can rest assured no one will be able to access or steal their biometric data, as all biometric data is stored and processed on the device - whether that is a laptop, smartphone, USB stick or key fob. Removing the need for data to ever enter the cloud, this also removes the technical and legal complexities of managing a biometric database and, if a key fob is lost for example, all parties can rest assured there is no chance of anyone else being able to use it. A win-win. Precisely because biometric data is so difficult to steal and spoof, adding biometric authentication to end-point devices can considerably reduce data breaches to keep both sensitive employee and corporate data safe and secure. Reimagining workplace security As people work more flexibly, systems are shared more frequently, and attacks get smarter, it is clear to see that passwords alone are no longer enough to secure the modern-day workplace. Adding biometric authentication to end-point devices can considerably reduce data breaches Now is the time to reassess the physical and logical access control infrastructure. To keep personal and corporate data safe, it is crucial to add new and additional authentication methods to the security infrastructure. Luckily, the benefits of biometrics are often far simpler to realize than many enterprises imagine. The beauty of biometrics is its combination of both security and convenience. Compared to other forms of authentication, biometrics offers considerably stronger protection and an enhanced UX that can easily be integrated into existing enterprise security infrastructure – without the need for huge biometric databases to manage or fear. So, whether to replace outdated passwords or as part of a multi-modal authentication system, biometrics can play an important role in pushing workplace security into a new era for both physical and logical access control.
Can a smart card be used securely for multiple applications (and among multiple manufacturers )? End users are demanding such interoperability, and they also want openness to switching out components of their access control systems in the future without being “locked in” to one vendor. Those are the goals of the LEAF Identity consortium, a collection of companies that share and support end user-owned encryption keys stored securely in smart cards with MIFARE DESFire EV2 chips and are used to authenticate access control credentials and read the data required to access multiple applications secured by multiple vendor devices. Smart card systems - more secure Almost everyone in the industry now knows that low-frequency (125 kHz) “prox” cards are not secure; in fact, low-cost cloning equipment is readily and inexpensively available. As the industry transitions to encrypted cards, challenges of interoperability persist. Keeping smart card systems more secure are AES 128 encryption keys encoded onto the card chips. Information is exchanged via radio frequency (RF) in a challenge-response interaction when a card is presented to a reader. The most recent LEAF EV2/EV3 cards allow up to 16 devices to be individually accessed using 16 unique keys, respectively that are stored in the smart cards (and among a variety of manufacturers). LEAF Identity Consortium enables interoperability with encrypted Smart Cards LEAF Memory Model specifies a standard EV2 (EV1 backward compatible) smart card data format and application access protocols that ensure each manufacturer’s devices can interface with a card chip in the same way. Specifically, each card has a “common data structure” based on the LEAF Memory Model, which means that the location of information is arranged on a card chip in a predictable and consistent manner. Each end-user application (for door readers, secure printing, vending, etc.) stored in the card is secured with their own cryptographic key. Member companies adhere to that structure in order to be interoperable with a single credential. There are no license fees or intellectual property rights involved. Keysets The approach involves a LEAF Custom Cryptographic Keyset (LEAF Cc Keysets) owned by the end-user. “When we present these concepts to integrators, they realize that, first, they need to get their clients to pay attention to the risks around proximity cards and to migrate to encrypted card technology,” says Laurie Aaron, Executive Vice President, WaveLynx Technologies Corp. “Then we explain the benefits of customer-owned keys and of the LEAF data structure. Then integrators can differentiate themselves by selling the value of the end-user staying in control and having unlimited interoperability.” WaveLynx Access control manufacturer WaveLynx is implementing the LEAF concept, which is the brainchild of CEO Hugo Wendling, who saw the advantages of leveraging the ability of an EV2 chip card to authenticate access to multiple applications by multiple manufacturer’s devices. WaveLynx set up the specification, maintains the website, and is involved when a manufacturer wants to become LEAF Enabled. They provide a key management service (for life) to end-users based on LEAF capabilities. End-users “own” the keys and can submit a request to WaveLynx to have us securely share them with any other manufacturer. Sharing a key involves two key custodians from WaveLynx Technologies and the Vendor who is receiving the customer’s keys, each of whom only has access to half of the encrypted key in order to keep it secure. Keys are shared via a “key ceremony”. Combining capabilities The LEAF consortium provides a way for manufacturers to work together to provide an ecosystem of devices that are compatible with a single encrypted smart card without the need to embed proprietary reader modules in their devices or license another manufacturer’s technology, thereby making it possible for them to increase their market share. Working together, independent manufacturers can assemble a group of devices to compete more effectively with larger manufacturers. In effect, they combine their capabilities in order to offer the end-user viable options and to compete. LEAF Consortium partners include Allegion, ASSA ABLOY, Brivo, Eline by DIRAK, Linxens, RFIDeas, and Telaeris. Biometric partners include Idemia and IrisID. Biometric devices may either store their biometric on the card or on a central database and access it through the badge number. The LEAF standard continues to evolve. Although the standard does not currently offer mobile credentials, a common mobile credential standard is currently being discussed and designed by the Consortium.
The task of protecting shared spaces, such as offices and schools, has become increasingly complex, particularly with ever-rising political tensions and the difficulties of assessing threats for schools, workplaces and law enforcement. Given the randomness of when and where a violent person may strike, those who manage facilities need an emergency plan, as well as robust training, detection and awareness. To gain more insights into dealing with such threats, we interviewed John Torres, President of Security and Technology Consulting, Guidepost Solutions. Guidepost Solutions is a global team of investigators, security and technology consultants, and compliance and monitoring experts. They provide security design and consulting, investigations, and compliance and monitoring leadership for critical client needs. Torres has extensive investigative and security experience. Previously, he served as the Special Agent in Charge for Homeland Security Investigations in Washington, D.C. and Virginia. His background includes more than 27 years of experience providing investigative and security management for the U.S. Departments of Homeland Security and Justice, including serving as the Acting Director and the Deputy Director of U.S. Immigration and Customs Enforcement. Q: Why is it difficult for schools, workplaces and law enforcement to assess threats of violence? How can they differentiate between a threat and a non-threat? Torres: With mobile technology and social media, threats are more than just physical. Schools are often not screening student social media accounts and are restricted in what they can and cannot monitor due to privacy laws. Proactive business and educational institutions are working closely with law enforcement, providing training and increasing awareness of potential threats or abnormal behaviour. Proactive business and educational institutions are working closely with law enforcementEmerging tools include software that allows monitoring of students’ school-issued email and file storage accounts. Communications software and apps provide real-time notification of emergency messages to students, parents, employees and the community to provide critical instructions during an emergency. The combination of training and new tools has enabled trends and threatening language to be identified and appropriate authorities notified. Q: What tools and/or insights can Guidepost Solutions add to the mix? What are the elements of a “comprehensive risk assessment?” Torres: Comprehensive risk assessments include adopting a tiered approach to assessing the school or office and the surrounding environment. A typical approach includes site perimeter review, identifying gates, fencing, vehicle barriers etc., the parking lot, building exterior, interior paths of travel and individual classroom measures. Review and observation of systems including mass notification, video surveillance, access control, intrusion and visitor management, etc. are critical to ensure that they are equipped to maintain functionality in the event of power loss etc. As an insight, always engage with people, they have the knowledge of each unique facility. Elements we can add to the mix include assessments, physical security improvements and mass notification systems, as well as emergency response training, operational policies and procedures, and behaviour analysis. Q: How can the elements of a risk assessment be translated into recommendations of specific technologies or processes (such as video surveillance and/or access control)? Torres: Risk assessments often drive and identify the need for technologies to be implemented into the security programs of schools, business or places of mass gathering, such as stadiums, convention centers and houses of worship. Risk assessments often drive the need for technologies to be implemented into places of mass gatheringRisk assessments help identify weaknesses in security procedure and then often support phased security enhancement programs as funds become available for investment. Each entity is different, and stakeholders should be included. For example, video surveillance may be a priority at one location but controlling the main point of entry may be more important at another. Technology and process recommendations must meet the operational needs and support the goals of the security team and operational managers. Q: How can the risk of an incident be mitigated and lives protected? Torres: While multiple steps are helpful, all of them in combination are key to implementing a comprehensive security plan. They include: Assessments – physical, cyber and procedural Physical Security Improvements – visitor management, fencing and barriers, locks and cameras Emergency Response Training – law enforcement coordination; muscle memory response Mass Notification Systems – current software, clear concise directives, testing Operational Policies and Procedures – termination, evacuation, communication, intervention Behavioural Analysis. Q: What are the elements of behaviour analysis? Torres: They include things like changes in appearance and behaviour, including social media behaviour, and isolation from family or friends. They also include studying or taking pictures of potential targets, and real or perceived bullying. An individual may advocate violence or hate, and/or consume violent extremist information/propaganda. He or she may talk about traveling to places that sound suspicious, and/or have an obsession with weapons. Q: What is the role of training? Torres: Training is critical regarding emergency situations in schools, be it a fire drill, earthquake, lockdown, active shooter situation, etc. Training and drills educate those present, including employees and staff, with information about actions that may save lives and reduce casualties in a real emergency. Training is critical regarding emergency situations in schoolsTraining should hold people responsible and set standards for acceptable behaviour. There should be a plan that is implemented, including practice and drills. You should also provide training and communication skill building classes. Develop intervention strategies. Work with HR and legal (and others as appropriate). Finally, document everything. Q: What challenges still remain? Torres: Cultural and behavioural change remains at the forefront of schools and businesses when addressing safety and security measures. A large percentage of violent acts may be preventable if a bystander shares his/her concerns with the proper authorities. According to the FBI, perpetrators exhibited behavioural indicators in 93% of incidents. And bystanders had prior knowledge in 81% of school attack incidents and 80% of terrorist-inspired behaviours or activities before an attack. Q: What progress are you seeing? Torres: With each tragedy that occurs, leaders are engaging with safety and security head on. There is a shift in schools and businesses to engage with professionals that can help them understand what they do not know. Simple things such as improved communication and enforcement of policies and procedures can have a tremendous positive impact on an organisation’s security posture. Assessments and technology upgrades are important and effective, but it all starts with acknowledging the need to provide and maintain safe and secure environments for students, employees and the community.
Many venues are using access control, video surveillance systems, sensors, and additional hardware solutions as part of a broader security strategy. By utilising so many disparate systems, corporate security teams are left with information “silos” that create inefficiencies and hamper communication. This abundance of hardware has left teams with too much data or too many tools, to manage effectively. Armored Things offers a software solution. The company’s “spatial intelligence platform” currently collects more data than other security intelligence solutions, utilising a broader range of sources and fusing data together rather than integrating it. The platform currently focuses on taking in data from WiFi, access control, and video surveillance systems and applying machine learning to deliver customers features such as real-time predictive analytics to prevent incidents like bottlenecks or overcrowding. Spatial Intelligence is an approach to physical security that enables users to collect, manage, and interpret data in a single platform. Combine machine learning with data The term can best be used to describe how digital transformation has affected physical security. Spatial Intelligence in its infancy looked like video surveillance data combined with machine learning to produce video analytics. The spatial intelligence solutions of today can combine machine learning with data of any source, type, and size to deliver value across a large organisation, not just the security team, says the company. Armored Things’ Spatial Intelligence platform unifies data from information silos to support data-driven decisions around operations and security. By fusing data from multiple sources, we can produce more consistent and useful insights for our customers” A suite of analytics, reporting and visualisation tools helps customers gain a real-time understanding of people and flow in their space. By removing the guesswork of everyday decisions, the product enables customers to make data-driven decisions at a moment’s notice, according to the company. Armored Things is more than a data management tool. “By fusing data from multiple sources (rather than only cameras or only WiFi), we can produce more consistent, accurate, and useful insights for our customers,” says Kevin Davis, Chief Security Officer at Armored Things. "Being able to collect the data is the first step, but turning it into actionable intelligence is where Armored Things excels.” IP cameras and other IoT-enabled devices The range of data sources includes IP cameras and other IoT-enabled devices and even outside data sources like bus schedules and weather reports. Armored Things has built a team of public safety and technical experts with the mission to keep people safe where they live, work, and play. By leveraging emerging technology to enhance physical security, the company built the software-centric Spatial Intelligence Platform for large organisations to enhance the safety and operations of their space. Schools and education facilities are among the customers that can benefit. The leadership at Armored Things cares deeply about school safety, so the recent epidemic of campus violence has definitely been a large topic of conversation, according to the company. “By delivering our products to a greater number of customers, Armored Things hopes to continue making schools a safe place to learn and gather,” says Davis. Recently, there was a significant bottleneck lasting nearly 30 minutes at the Syracuse-Clemson football game. Unifying data into one platform Digital transformation is disrupting the way our customers think about physical security,” Using Armored Things technology and providing real-time data to security and operations personnel could have identified the bottleneck as it began to form. This would have notified relevant personnel, who could have taken steps to mitigate the problem before it turned into a security risk. Keeping the security infrastructure simple is imperative to success. Integrating a software solution into the security strategy shouldn’t complicate existing operations, says the company. “Armored Things Spatial Intelligence Platform can bring your security and operations into focus by unifying all of your data into one platform for ease of use,” says Davis. For this reason, the team chose to integrate not only with customers’ existing security infrastructure but with non-traditional data sources (e.g. WiFi, event schedules, ticketing) as well. “By combining and analysing a more diverse dataset, Armored Things can help our customers make better decisions with deeper data-driven insights,” says Davis. "Digital transformation is disrupting the way our customers think about physical security,” says Davis. “As a team, our aim is to help our customers adapt to the digital age, as they transition from hardware to software-centric security solutions. Fostering organisational change is difficult, and our team hopes to make the transition process easier for our customers.”
The 100 Mount Street premium-grade office tower completed in May 2019, is the tallest (152m) building in North Sydney. With an innovative cross-braced exoskeleton structure and a soaring glass curtain wall, the tower celebrates Sydney‘s history of excellence in architecture and structural engineering. The 35-story office tower offers panoramic views of Sydney Harbour, Sydney Opera House and Sydney Harbour Bridge, and is occupied by some of Sydney’s best-known companies. The site also benefits from its proximity to key transport infrastructures with a train station, bus stops, ferry wharf and taxi stand all within walking distance. This high traffic location required a convenient and secure way to ensure controlled access for the 2,000 people entering the building everyday, while maintaining the aesthetics of the 8 metres-high ceiling lobby. Efficient control access to the building In order to efficiently control access to the building, the security contractor supplied top quality COMINFO EasyGate SPT entrance control gates equipped with IDEMIA’s MorphoWave™ Compact high-end biometric contactless devices. COMINFO is an experienced manufacturer of turnstiles and speed gates. EasyGate SPT models were installed, equipped with the latest MDD motor technology (Magnetic Direct Drive: no gearbox, no oil, no brush) and advanced infrared optical sensors which ensure safe passage and detect tailgating and cross-over, to ensure that only authorised people can pass through the gates. MorphoWave Compact™ is the flagship biometric device for physical access control from IDEMIA, the front-runner in Augmented Identity. The terminal performs a 3D scan and verification of 4 fingerprints in less than 1-second, in a quick and easy touchless wave gesture. Aesthetic integration The features of the product are particularly well-suited for high traffic locations with the capability to authenticate up to 50 people per minute thanks to advanced algorithms based on Artificial Intelligence. COMINFO carried out an aesthetical integration of MorphoWave™ Compact into EasyGate SPT, resulting in a powerful solution that brings the latest physical access control system using only a simple wave of a hand. The project was deployed by Centaman, COMINFO’s partner for Australia/New Zealand. First to implement biometric technology Dexus and Dexus Wholesale Property Fund who owned the building were the first to implement this biometric technology in office buildings and have now more than 2,000 people registered with their biometrics, removing the need for physical access cards or touching anything when entering or leaving the secured premises. The installation is highly acclaimed by employees who appreciate the frictionless and hygienic use of MorphoWave™ Compact and EasyGate SPT.
Custom Consoles announces the completion and delivery of Steelbase Lite desks and a MediaWall video monitor display mounting system for the Agricultural Development Bank of Ghana (ADB). Commissioned by Virtual InfoSec Africa, the new installation is situated at ADB's headquarters in Ghana's capital city, Accra. "We were looking for a production partner with a good understanding of video technology, able to produce robustly built and ergonomically efficient control room furniture," says Bondzie Acquah, VP Operations at Virtual Infosec Africa. “With its long experience of the security business and proven ability to meet the demands of heavy industry, Custom Consoles was the logical choice both for the desks and the display mounts. Based on SteelBase Lite and MediaWall, we were able to integrate a complete system into a compact 8 by 5-metre room while at the same time ensuring that all staff could function safely and effectively. Computer equipment is housed in ventilated desk frames with easy front and rear access via black-finished lockable doors for routine technical maintenance." Video display screens Largest of the two desks is a 5.1-metre wide by a 1-metre front-to-back four-bay in-line unit designed for simultaneous use Largest of the two desks is a 5.1-metre wide by a 1-metre front-to-back four-bay in-line unit designed for simultaneous use by up to four operators. Two 24-inch video display screens are mounted in front of each work position on individually adjustable support arms. The desk is located 70 centimetres forward of a 5.2-metre wide MediaWall giving a clear view of eight 55-inch Samsung video display screens mounted in a four wide by two high configuration. Front to back depth of the MediaWall is just 50 centimetres. The second desk is a single-bay dual-screen unit measuring 1.5 metres wide by 1-metre front-to-back. This is configured for use by a supervisor. Both desks are finished in rust-coloured Marmoleum with black PVC edging and silver anodised aluminium legs. The supervisor's desk faces a 76-centimetre high printer support unit with a 60 by 60-centimetre top surface, height-adjustable shelf and integral cable tray. Control room consoles "SteelBase, SteelBase Lite and MediaWall continue to be in strong demand for a very wide range of process control, security and corporate applications," says Custom Consoles' Sales Manager Gary Fuller. "We are very pleased to have worked with Virtual InfoSec Africa on this project and look forward to partnering with them in the future." A variant of Custom Consoles' long-established SteelBase series, SteelBase-Lite is a compact structured desking system which can be configured from 1.2-metre wide powder-coated modules and Marmoleum finished work surfaces, providing a self-assembly hard-wearing ergonomic solution for control room consoles. Panels and ventilation SteelBase Lite comes complete with two VESA mounts per module, mounted on height adjustable beams SteelBase Lite comes complete with two VESA mounts per module, mounted on height adjustable beams. Additional design features of the SteelBase Lite range include hinged removable access doors, 19-inch equipment racking, heavy cable management, power distribution panels and variable-speed ventilation fans. Worktops can be configured to suit individual client requirements. All elements of SteelBase and SteelBase Lite are guaranteed against component failure for five years of normal use. SteelBase-Lite is designed to conform to ISO 9241 part 5, ISO 11064 Part 4 and EN 527 Parts 1, 2 and 3. MediaWall monitor displays First announced in 2006, Custom Consoles' MediaWall allows flat-screen monitor displays of practically any width to be constructed from standard horizontal and vertical support elements. MediaWall can be used as a fully self-supporting structure or coupled directly to the studio wall. Individual screens can be positioned so that the edges meet exactly to form a continuous horizontal display limited only by the boundary of the monitor panel. All wiring is fully concealed and can enter or leave the structure at any desired point. MediaWall is available in any required element widths.
SMARTContactless, a value-added distributor for contactless solutions, ABS Technology and STid have been selected by INIT Innovation in Transportation Inc., a US provider of intelligent transportation systems for public transit, to create new mobile access control for its employees and visitors. STid Mobile ID, pictured, from the access control product company STid, is a Bluetooth access control reader. Common supported credential technologies are MIFARE, MIFARE DESFire EV1/EV2, NFC and STid’s mobile credentials using smartphone and Bluetooth for communications. The solution includes a free mobile app, the latest multi-technologies Architect Blue readers, and offline and online programming tools. Mobile Access INIT Innovation in Transportation Inc. has installed numerous STid’s Architect Blue readers at doors and entrances to secure their new Corporate head offices. Employees and visitors use STid’s patented identification mode features and can access the building or other sensitive entrances within the offices, without taking their smartphones out of the pocket or bag. Jamie Thomas, Systems Engineer for ABS technology in Virginia Beach, Virginia, says of the STid Mobile ID: “This Bluetooth reader has so much technology built into it; it’s future proof, easy to install and programme.” Feedback on the mobile access has been positive and INIT USA Inc. is exploring the STid Mobile ID’s options to remotely assign and revoke mobile credentials to employees and visitors over the air. Access control solution INIT USA Inc. Director of IT, David Page said: “As a provider of innovative technology to our public transit customers, INIT desired an access control solution which mirrored our innovative technology solutions, matched our company culture, and was simple to install and administer. In addition, we wanted the ability to start with a small proof of concept and eventually grow it as this type of technology inevitably transitions to a fundamental employee expectation instead of a bleeding edge innovation.” RFID reader solutions Robert Gailing, President of SMARTContactless, STid’s US Distributor said: “STid is really leading the market with innovative RFID reader solutions for security-minded professionals and end-users. The new STid Mobile ID reader solution, with its five methods of mobile credential presentation using the smartphone and customisable distance to 60 feet, there is virtually nowhere the reader cannot be utilised throughout any access control deployment.” According to Vincent Dupart, CEO of STid, this new implementation is a testament of the growing smartphone adoption that merges security and convenience. “We are pleased that both INIT USA Inc. employees and managers are enjoying the experience. We are also proud to work with strategic partners like SMARTContactless, offering high-quality customer support to promote our mobile access solution. The ability to use smartphones for high-security access control is becoming increasingly important, as these devices are part of our everyday lives in the business workplace.”
Boon Edam Inc., a provider of security entrances and architectural revolving doors, announces that 32-41 West Street, a retail headquarters building in Reading, United Kingdom, has upgraded the building’s entrance with an energy-saving revolving door and an array of optical turnstiles for increased lobby security. Nestled in Reading, Berkshire, in the United Kingdom, 32-41 West Street serves as a home to 580+ employees working in over 130,000 sq. ft. of office space. In 2018, Morey Smith Architects were hired to redesign the headquarters building, including an office expansion, as well as a new café and staff gym. Revolving door solution The building entry and atrium were to also undergo an upgrade, with architects designing with aesthetics and high-quality functionality in mind. First, the entrance to the building was outfitted with a unique revolving door solution. Architects combined features of two revolving door models to create the ultimate entrance Architects combined features of two revolving door models to create the ultimate entrance. They mixed the all-glass look of the Crystal TQ with the minimal metal framing of the TQA to create an automatic entrance that would add to the prestige of the building while also saving on energy and creating a comfortable environment inside. The revolving door was also connected to the building’s access control system so that it could be locked afterhours and still allow access to employees with an authorised credential. Tall glass barriers For security into the atrium, architects didn’t want to impose on the open, airy feeling of the building’s large atrium. As a result, Morey Smith installed an array of Speedlane Swing optical turnstiles with tall glass barriers to deter and detect tailgating into the office space. The turnstiles were placed near a reception desk so that staff are able to respond to alarms, as well as grant access to authorised visitors through the use of a BoonTouch remote control panel. James Cox, Area Sales Manager for Boon Edam UK mentions, “Boon Edam optical turnstiles are always a popular choice for corporate offices, not only for security reasons but because they’re aesthetically nice to look at which is ideal for an open environment building.”
IBM and Daimler announced that they have expanded their agreement and Daimler will implement an intelligent cloud solution and migrate its global after-sales portal to the IBM public cloud. This will allow Daimler to drive innovation, while also benefiting from one of the industry's most open and secure public clouds for business. The global after-sales portal is key for Daimler's market activities, supporting workshop processes in the retail sector. In order to meet the growing demands of the portal core products, the company was looking for a new technical platform to improve agility and scalability, while maintaining a high level of security. Protection of sensitive data The platform, based on the IBM Cloud Kubernetes Service, is designed to allow the client to transform the application into a modern and scalable microservices architecture. Hosting its portal on IBM public cloud will help Daimler scale as needed and quickly introduce new offerings to help meet the needs of its users. At the same time, the data will be transferred and stored in the IBM public cloud, which is protected by comprehensive security capabilities, such as IBM Hyper Protect Services, accommodating Daimler's highest requirements for the protection of sensitive data. Encryption "As organisations redefine their operations by adopting public cloud, they're able to drive innovation and modernise their infrastructures, while still prioritising security," said Howard Boville, Senior Vice President, IBM Cloud. "IBM public cloud provides industry-leading encryption capabilities that give our clients exclusive control of their keys and data, delivering our highest level of protection for our clients' sensitive data; a key requirement for business across all highly regulated industries." Leveraging IBM public cloud will offer a significant number of advantages; it is designed to be highly scalable, and therefore the efficient administration of the services can help to lower subsequent costs. Furthermore, critical services in the IBM Cloud's multi-zone regions achieve 99.99% platform availability, thus providing reliable operation.
A used car lot owner had re-occurring issues with intruders cutting holes in the perimeter fence during night-time hours and vandalising or burglarising the area. The intruders would not enter the small office building, so the security system was never triggered. The customer did own a video surveillance system and it would record criminal activity but it did not prevent or deter crime. Integrating motion detectors Using the existing intrusion alarm panel (Interlogix NX8-v2 panel) and the existing video system, the system integrator introduced two OPTEX Visual Verification Bridges and four OPTEX Redwall SIP-3020 Outdoor PIR motion detectors. The motion detectors were installed over the two main perimeter light poles pointing into the lot with IP cameras located directly above each of the motion detectors. Access to camera visual With the two Visual Verification Bridges installed, the integrator can provide operators immediate access to eight live cameras during every alarm event. The Redwall SIP-3020 provided up to 30m of distance coverage and 20m width, complete with anti-masking and vandal tampers. With this simple but effective solution, the integrator was able to provide their customer with immediate visual verification of alarm sensors, only when the alarm panel is armed. Wireless key fobs were provided so the dealer can arm and disarm the system from outside the gate helping to eliminate false alarms during arming and disarming. Reduced false alarms Since the completion of this installation, there have been several nuisance alarms caused by cats that were immediately disregarded. Due to the visual verification solution there was no intrusion and the client has not had any vandalism or crime since. Per the customer’s request, the OPTEX Bridge has been installed on three additional car lots.
Round table discussion
Public spaces provide soft targets and are often the sites of terrorist or active shooter attacks. Public spaces, by definition, require easy accessibility and unrestricted movement. Given that openness, what security technologies can provide real results? We asked this week’s Expert Panel Roundtable: How is technology innovation impacting the security of public spaces?
Artificial intelligence is on the verge of changing the face of multiple industries – from healthcare to entertainment to finance, from data security to manufacturing to the cars we drive (or that will drive themselves!) In the physical security market, AI has garnered a lot of attention as a buzzword and as a harbinger of things to come. We asked this week's Expert Panel Roundtable: What security markets are most likely to embrace artificial intelligence (AI)?
The physical security industry is embracing the cloud in a big way. Cloud-based systems – which involve accessing a shared pool of information technology resources via the Internet – are much higher-profile in the video and access control markets, and large and small companies are getting on the cloud bandwagon. We asked this week's Expert Panel Roundtable: What factors are contributing to growth in cloud systems in the security market?