The Austrian market for video security technology is booming. And the demand specifically for the ‘Made in Germany’ mark of quality in the country next door has never been higher. To do justice to this market trend and at the same time deliver its expertise to customers and partners as immediately as possible, last month the Germany-based Dallmeier enterprise opened a branch of its main office in Brunn am Gebirge, a suburb of the Austrian capital city Vienna. Video technology pione...
Orion Entrance Control, Inc. products are designed to solve business problems with an architect’s eye in mind. Orion ThinLine™ optical turnstiles are designed to look fantastic while delivering paramount security measures that one has come to expect from their experienced engineers. Clients need to secure lobbies in brand-new facilities, and ones built more than 100 years ago. From the class A high-rise lobby to the industrial warehouse, Orion Entrance Control, Inc. has a secure and...
Evolution, the integrated fire and security systems business, has bolstered its design capabilities within its Risk & Design team with the appointment of two new CAD Technicians. Alexandra Craciunas, joins the team with more than six years of experience working on various projects across all stages of the design process within the MEP sector. Alexandra’s immediate focus will be on developing her skills and capabilities within the High Security sector, producing detailed architectural...
Security and commercial real estate companies have long searched for solutions to safely monitor private areas where cameras, as well as other technologies, cannot be used. This includes conference rooms, bathrooms, sensitive intellectual property areas, and many others. Competitive people counters have notorious accuracy weaknesses which is why Orion Entrance Control, Inc. sought out a better solution featuring radar because it identifies presence detection through micro movements such as hear...
Hikvision, an IoT solution provider with video as its core competency, has introduced its All-in-one Indoor Station product, a tablet device for converging security solutions in homes and offices. With the intelligent indoor station as the management center, users now can enjoy simple control and flexible linkage among various Hikvision devices, including video intercom, access control, intrusion alarm, IP cameras, NVRs, and more. Protecting home and office Through the built-in Hik-Connect ap...
Many of us take critical infrastructure for granted in our everyday lives. We turn on a tap, flip a switch, push a button, and water, light, and heat are all readily available. But it is important to remember that computerised systems manage critical infrastructure facilities, making them vulnerable to cyber-attacks. The recent ransomware attack on the Colonial Pipeline is an example of the new types of threats. In addition, any number of physical attacks is also possibilities. We asked this we...
ComNet, a globally renowned company in transmission solutions across fibre optic, copper, Internet, and wireless mediums, has announced the launch of Razberi Monitor software. Razberi Monitor is the latest addition to the ComNet product portfolio and the first solution to be rolled out from the recently acquired Razberi brand. Razberi Monitor Razberi Monitor is a software platform that provides a top-down view of the physical security network and ecosystem without IT resources. It monitors and manages all the system components for both cyber security and system health, and can be deployed from the Cloud or on-premise. Iain Deuchars is the General Manager of ComNet International. Commenting on the launch of the product, Iain Deuchars said, “This software has been purpose-built for security professionals. It provides secure visibility into the availability, performance, and cyber posture of servers, storage, cameras, and other networked security devices. Not only that, but it predicts and prevents problems while providing a centralised location for IT departments to view video data.” Protection against cyber-attack vulnerabilities The benefit of having Razberi Monitor ensures shorter response times to cyber security events" A vital benefit of the solution is that it protects against the multiple commonly cited cyber-attack vulnerabilities. These include weak passwords, the failure to update software or firmware, the lack of best practices for routine maintenance, and not aligning with network IT policy. Iain Deuchars weighs in further, by stating “The benefit of having Razberi Monitor ensures shorter response times to cyber security events, along with real-time alerts and logs to proactively notify users of active threats. The fact that it can detect cyber posture and problems with servers, cameras, and other IoT devices in real time is a promising unique selling point for the ComNet brand. We are very excited to deliver this product to our loyal customer base.” Enhancing cyber security Mike Issa, ComNet’s Region Manager for South Europe, the Middle East, and Africa, points out that Razberi Monitor can be offered to enterprises as a managed service, with a monthly subscription. This means no significant upfront costs and the ability to free up cash flow. He said, “The addition of Razberi to the ComNet portfolio is a great step forward for us as a brand. This software will optimise and secures networks, reducing costs, time, and manpower required to install and manage an enterprise network.” Protecting networks from cyber threats Mika Issa adds, “Moving forward, I am confident that Razberi will provide a unique selling point for integrators and end customers wishing to protect their security systems with cyber security solutions that can deter, detect, delay, deny and defend against hackers.” Razberi Monitor is available to view on the newly launched ComNet webshop.
Fugue, the company helping organisations innovate faster and more securely in the Cloud, announced a 1.0 release for Regula, an open source policy engine for infrastructure as code (IaC) security. The release includes comprehensive support for common IaC tools, such as Terraform and AWS CloudFormation, pre-built libraries with hundreds of policies that validate Amazon Web Services (AWS), Microsoft Azure, and Google Cloud resources, and new developer tooling to support custom rules development and testing with Open Policy Agent. This latest release further advances Fugue’s leadership in innovating on policy as code for IaC and the cloud infrastructure runtime. Regula, open source engine for IaC security Regula supports a broad set of IaC inputs, including Terraform HCL, Terraform plan JSON, AWS CloudFormation, and Serverless Application Model templates. Extensive rule libraries check for common security and compliance violations and advanced, multi-resource misconfigurations, and can detect when required resources are missing. Regula supports standardised output formats, such as JUnit, Test Anything Protocol (TAP), and JSON, allowing it to integrate seamlessly with CI/CD tools and testing frameworks, including Jenkins, CircleCI, Travis CI, and Conftest. Infrastructure as code (IaC) Infrastructure as code presents cloud teams with the opportunity to shift left on cloud security pre-deployment" Cloud and security engineers can use their Regula policies in the Fugue SaaS platform to check their AWS, Microsoft Azure, and Google Cloud environments, giving them a unified policy engine for securing the entire cloud development lifecycle (CDLC) from IaC through deployment and runtime. “Infrastructure as code presents cloud teams with the opportunity to shift left on cloud security pre-deployment, and they need better tooling to develop and test policies, integrate them into their CI/CD workflows, and apply those same rules to their cloud runtime environments,” said Josh Stella, Co-Founder and CEO of Fugue. Open policy agent framework Josh adds, “These new Regula capabilities and policies make it easier than ever for cloud teams to secure their IaC and apply policy consistently across the CDLC and across cloud platforms, and avoid the overhead of maintaining and reconciling different policy frameworks.” Regula utilises the Cloud Native Computing Foundation’s Open Policy Agent framework, with expressive and powerful rules written in the Rego language. Developers can create their own custom rules to meet organisational requirements, and Regula includes additional tooling for running tests on these rules. Rules can be waived to designate exceptions for specific resources or disabled entirely to fit an organisation's needs. Out-of-the-box support Regula provides out-of-the-box support for the CIS Foundations Benchmarks and additional Regula policies check for cloud vulnerabilities that compliance frameworks can miss, such as dangerously permissive AWS IAM policies, Lambda function policies allowing global access, EBS volumes with encryption disabled, and untagged cloud resources.
Ringway Jacobs, a renowned highway services provider, has become the first UK fleet operation to adopt a video-enabled lone worker service that is designed to better safeguard drivers operating in the field. Ringway Jacobs’ H&S and Fleet departments teamed up with Peoplesafe and SureCam to roll-out the integrated safety solution, by using a mobile phone app that enables the benefits of lone worker protection with those of video telematics. Video-enabled lone worker service David Bonehill, Head of Fleet at Ringway Jacobs said, “Health, wellbeing and safety is at the heart of everything we do, so our aim is to provide a safe working environment for our employees at all times. We are committed to adopting industry best practice technology and processes, which is why we are rolling out the video-enabled lone worker service.” David adds, “This latest initiative, developed with our valued partners at Peoplesafe and SureCam, will not only increase compliance of our lone worker processes, but also extend and enhance the levels of protection we provide to drivers in and out of the vehicle.” Partnership with Peoplesafe and SureCam Ringway Jacobs has been using Peoplesafe’s lone worker protection service since 2016 Ringway Jacobs has been using Peoplesafe’s lone worker protection service since 2016, providing peace of mind to 300 employees that assistance is available, should they need it. The company is now taking advantage of a strategic partnership between Peoplesafe and SureCam, to integrate the service with dual-facing, connected dash cams, fitted on 163 vans and specialist vehicles last year. This will enable footage to be viewed direct from the cameras fitted on the vehicles, in the event of an alarm being raised. Lone worker protection Lone workers will scan a QR code when entering a vehicle, to register a unique ID and confirm exactly who is driving. This will enable controllers at Peoplesafe’s Alarm Receiving Centre (ARC) to access audio and video, as well as incident data via its portal, when an incident is reported such as injury, illness or an act of violence. This will include footage from forward-and rear-facing vehicle cameras, providing immediate visual insight into what has happened, so the most appropriate action can be quickly taken. Video evidence for faster response Naz Dossa, the Chief Executive Officer (CEO) of Peoplesafe commented, “The added understanding provided by the video evidence means our service can act faster and respond better, when an alarm is raised. We are working closely with Ringway Jacobs to support their health and safety strategy, and best protect drivers from the risks they face, when they are working alone, especially in isolated locations or out of hours.” Sam Footer, Strategic Partnership Director at SureCam said, “By bringing together these proven technology solutions, we are offering customers such as Ringway Jacobs an effective way of not only improving safety and reducing fleet risk, but also safeguarding staff when they are in or out of the vehicle.”
As vaccination rates for COVID-19 continue to rise, the global business community is advancing the conversation about returning to work. Employees that were housed in large private and multi-tenant office spaces in major urban and suburban centres are being presented an array of options, many of which include a part-time return to an office environment that prioritises spaces for collaboration over desks, at which individual employees sit and work. The redrawing of workspaces for this new elastic workforce presents challenges and opportunities for facilities and operations staff. While there may be fewer individuals in the office on any given day, the spaces in which they gather must be conducive to face to face interactions, while adhering to current health and safety regulations. Next-gen smart cameras New generation of smart cameras is providing enhanced security and safety functionality to building staff Technology is the key to this transition. A new generation of smart cameras is providing enhanced security and safety functionality to building tenants and staff. At the same time, these same cameras also handle return to work measures, where required — monitoring adherence to social distancing, face mask requirements or corporate occupancy management policies. These cameras, which operate on an open platform from Security & Safety Things GmbH (S&ST), are capable of running a variety of different apps, much like a smartphone. When equipped with AI-enabled video analytics, these cameras help facility operators to more efficiently manage day-to-day operations, automate staff intensive processes and optimise the usage of space. Optimised building traffic flow with analytics Data provided by these devices assists security managers, landlords and building managers in analysing foot traffic with people counting or flow detection applications. These analytics can improve building or lobby flow, by identifying the cause of bottlenecking or other choke points, during busy morning and evening walk-in/walk-out hours. Conversely, as many businesses are considering adopting a longer-term virtual workforce model, smart security camera applications can help facility managers evaluate facility usage for space utilisation or real estate decisions. Enhancing facility maintenance Smart cameras are also helpful in basic facility maintenance, by identifying open work and meeting spaces with sufficient space for social distancing and assessing the cleanliness of each area or recording the last time the area had been sanitised. Additionally, they’re able to identify if conference room lights or devices have been left on or notify personnel of stock items needed in office break rooms. Smart surveillance prioritises building safety One additional benefit is how smart cameras play an important role in fire and safety prevention One additional benefit is how smart cameras play an important role in fire and safety prevention, through the early detection of flames, smoke or spills in buildings. Video analytics, combined with AI and other current technologies, can detect such incidents in an early state and trigger alarms faster, and more reliably than humans. This prioritisation of building safety can lead to a decrease in insurance risk and high premium costs, as costs of property insurance correlate with risks from fire or water damage. Future of IoT in buildings Smart video analytics can help to manage buildings more easily and efficiently. Now is an ideal time for landlords and operators of commercial buildings to invest in this new breed of smart security cameras, which can be flexibly equipped and re-equipped with many different video analytics applications from an application store. With this model, cameras are powerful, intelligent edge sensors that can be used for dynamic healthy workplace concerns and in the future, could be repurposed to improve building safety and visitor experience. The key is to invest into this technology today, in order to have the flexibility when it will be needed.
Evolution, the integrated fire and security systems business, has continued to invest in the growth of its Risk & Design team, with two new appointments. Ex-Army person appointment David Watson joins Evolution Risk & Design as Operational Risk Manager. With more than 10 years served in the British Army, David has spent the last 15 years working in various different roles and sectors within the domestic and international security industry, managing risks for sites in hostile environments, protecting high net worth individuals, and high-profile commercial clients. In his new role, David will be responsible for engaging with clients to provide integrated collaborative solutions to their Risk Profiles and utilising the end-to-end processes Evolution can offer in the market. Ex-air force person appointment Following a wide-ranging 23-year career in the Royal Air Force working as a Weapons Technician including roles in Bomb Disposal and Aircraft Operations, Kevin Stephenson joins the team as Operational Risk Adviser and will be applying his expertise gained in managing risks in the dynamic airworthiness and air safety environments to the security industry to deliver effective risk appreciation and assurance to new and existing clients. The experiences and disciplines gained from serving in the forces can prove extremely valuable in the security industry Domestic and international security Brendan McGarrity, Director of Evolution Risk & Design, says supporting ex-servicemen and women and the skills they can bring is very important to the business, “The experiences and disciplines gained from serving in the forces can prove extremely valuable in the security industry.” “If you’ve worked on or fixed a highly complex radar or weapons system, then there’s a good chance that can be easily transferred to a commercial environment,” Brendan says. “I’m delighted to welcome David and Kevin to the team, and look forward to harnessing their expertise and capabilities.” Evolution pledged its support to the defence and armed forces community in 2020 by signing the Armed Forces Covenant (AFC) and also joined the Defence Employer Recognition Scheme (Bronze).
Keyless, a pioneering privacy-first biometric authentication firm announced that it has joined the DizmeID Foundation, to develop an open ecosystem for decentralised management of digital identities. Control over digital identity DizmeID Foundation operates to combine the benefits of self-sovereign identity with necessary compliance and regulation, to enable wallet holders with ownership and control over their digital identity, data access, and distribution. Keyless will work alongside Algorand, Fabrick, and InfoCert within the foundation to make it easier and more secure for users to share their personal information in exchange for blockchain-based services. Blockchain technology "Many users find the idea of blockchain services intimidating and that has caused the adoption of this revolutionary technology to be painfully slow." By integrating with Dizme, the biometric software will make it more intuitive for users to enroll, and benefit from" "We hope that by integrating with Dizme, that our biometric software will make it more intuitive for users to enroll, and begin benefitting from the services offered on its decentralised identity platform," said Andrea Carmignani, co-founder and chief executive officer at Keyless Technologies. Digital Identity verification Dizme enables organisations to both issues and verifies a user's identity through verifiable digital credentials – a digital version of a real-world identity document such as a driver's license or birth certificate. "The way organisations manage their customer's personal data must change if we want to stop privacy and security breaches from being a daily occurrence," said Daniele Citterio, DizmeID Foundation Chairman. "Currently, our identities are managed by multiple, siloed parties – like private and public organisations. Not only can this leave us exposed to a higher number of threats, but it can also create friction during the identification process," Daniele Citterio continued. Digital credentials With Dizme, organisations can issue and verify verifiable digital credentials to provide services, goods, or resources to users. Once a user has their digital credentials issued to them, they can choose to share their credentials with organisations via their Dizme wallet. Data security "Verifiable digital credentials can help build trust between organisations and users, while also enabling users to control what personal information they share with organisations, and how long for, to ensure their data is not being misused or mishandled" explained Daniele Citterio. Zero-trust authentication platform Keyless zero-trust authentication platform offers strong compliance while ensuring biometric data is never at risk Keyless zero-trust authentication platform offers strong compliance with obligations outlined in the European Union's General Data Protection Regulation – while also ensuring biometric data is never at risk of being compromised or mishandled – making it easier for both companies to target enterprises who need to meet strict compliance obligations. Privacy based biometric solution "At Keyless, we understand that for organisations to fully realize the benefits of emerging technologies, we must make them compliant, private, and secure.” “To protect biometric data from threats, we've combined the security benefits of distributed architecture with privacy-enhancing cryptography. The result is a zero-knowledge biometric solution that ensures biometric data and other personally identifiable information is never at risk," explained Carmignani. DizmeID Foundation Joining the likes of Algorand, Fabrick, and InfoCert, this integration also marks Keyless' participation as a founding member to the DizmeID Foundation – the first decentralised identity network that combines the benefits of decentralised identity as well as the compliance to eIDAS regulations.
When we talk about security, people are often quick to jump to conclusions and picture bouncers, heavy steel doors and alarms that go off as soon as a door is opened. Access control is in fact one of the most common and least invasive methods of adding extra security to a home, communal or business premises – controlling who is able to enter a space based on the use of entry codes, key fobs, and/or access cards. Communal flats and office blocks are where access control is often an important factor in keeping the building secure, though private residences also have their own lowkey methods of access control with burglar alarms and personalised codes. With that said, what is it that makes access codes so effective across so many spaces – and why are they so important in today’s society? Benefits of access control Every time you visit an office space, enter a block of flats, or drive into a gated community, you will likely be faced with restricted access and a code pad – plus a button to ring through if you are a visitor. This is a prime example of access control, whereby the owner of the premises has installed a gate or security door which requires a code to enter from the outside. Pressing the request button puts you through to a controller who can then either grant access or deny access. The primary benefit of access control is that it ensures that a space remains secure Some of these code pads have cameras so that the controller can see the visitor – some just have a microphone and speaker. The primary benefit of access control is that it ensures that a space remains secure – only visited by those who are granted access. This restriction helps to keep residents and property safe, not only deterring burglars but ensuring that they are unable to gain entry without permission. Access control panels Some of the examples of access control panels in use include: Private car parks, granting access to employees or residents or paying guests based on the location. Communal buildings and flat entranceways, granting access to residents. These kinds of access control panels will have multiple buttons, one for each flat so that guests can buzz and speak to their contacts. Offices, granting access to employees and their guests. Another key benefit of access control is that entry and exit data can be tracked Another key benefit of access control is that entry and exit data can be tracked, and data can be used for anything from tracking the use of a building, to understanding and logging when individuals have entered and left the premises. For those who have ever watched a Detective drama, you will know how crucial this kind of data can be to determining alibis! Replacing lost keys Inhouse, this can also be useful in identifying who is around when an incident occurs, and in ascertaining how many people are in the premises in the event of a fire or emergency situation. On top of knowing when individuals are accessing certain spaces, access controls can also be used to restrict access to spaces during certain time periods – for example at the end of a shift, or overnight. This is most often found in commercial spaces and car parks, as private residences will grant access at all hours to residents. Access control plays an important role in security and can impact everything from your insurance bills and insurance cover to the amount you spend on replacing lost keys. By keeping certain spaces restricted, only granting access to those who are supposed to be there for work or through their private residence, you are able to keep individuals safe and protect them from the effect of theft. Preventing unlawful access Access control is particularly crucial in tracking the movement of employees should an incident occur In a workspace, access control is particularly crucial in tracking the movement of employees should an incident occur, as well as making the life of your team much easier in allowing them to move between spaces without security personnel and site managers present. It can also reduce the outgoings of a business by reducing the need for security individuals to be hired and paid to remain on site. For a private homeowner or flat owner, access control is what grants you the privacy and security that you deserve in your own space. Whether the control is placed on the outside of a bin store, car parks, communal entrance way or your own personal flat, creating barriers to prevent unlawful access can make a private residence more appealing to tenants or homeowners, and can also provide information and data about who has entered a building and when. Vacant property security The value of access control is that there are a range of solutions according to your budget, your requirements, and the way that you intend to use access control across your site or inside space. For the most part, access control is considered to be a cost effective way of increasing security, cutting back on personnel while ensuring that access is only granted to those who are supposed to be a specific space. The value of access control is that there are a range of solutions according to your budget According to construction site and vacant property security company Sicuro, access control systems with a built in camera are becoming increasingly popular, particularly on the exterior of a building when it comes to granting access to visitors – as those inside can see who is asking to be let in. Managing access control Meanwhile, across inside workspaces and sites, access control managed by pin numbers or fingerprints is often sufficient. Access control is an important part of modern security, ensuring that everywhere from office spaces to private residences are protected from unwanted or unlawful visitors. For the most part, access control is managed automatically, tracking and storing data on who has entered and exited a specific space and at what time – though some examples are tracked and managed manually (for example in a school reception or private residence).
Whenever you say the word “security” in today’s world of digitalisation and technology, minds immediately jump to online security. Encryption, passwords, and website security are all common areas of concern for today’s security teams – so much so that we often pass over physical security installations entirely. But we shouldn’t, because contrary to popular belief, security doors aren’t just for banks and safes. High-security doors are deployed and used across everything from home spaces to offices, venues, communal entrances, and more – offering an extra level of safety designed to keep unwanted guests out and keep the people inside safe. In this blog, we will be uncovering some of the benefits of installing high-security doors besides the obvious – offering a high level of security. Benefits of high-security doors When you start telling someone about high-security doors, they often immediately think of thick steel doors with unbreakable locks. But modern security doors are nothing like that, with the marketplace filled with different options including ventilated louvre doors, reinforced hammer glass doors, and classic metal doors. And with each style comes a different set of benefits. 1) High-security doors keep businesses and properties safe If anything is going to put burglars off and keep your inside space safe, it’s high-security doors. High-security doors not only help keep burglars away but also saves on the cost of investing in expensive home security systems With such a wide array of options on the market, from double or triple glazing through to top-level security doors for industrial properties and homes, customers can choose the weight of their door and its finish – meaning that they have a choice between making their high-security decision obvious or concealing it for the benefit of aesthetics. This not only helps keep burglars away from your home or office space and reduces the crime rate, but also saves on the cost of investing in expensive alarms and home security systems. 2) Dual purpose benefits from top-level manufacturers Modern high-security doors from retailers like Premier SSL not only provide industrial-strength but are also classed as fire doors – meaning that they keep people inside safe on two accounts. On top of that, high-security doors no longer look like the entrance to a bank – in fact, most manufacturers now work with materials that deliver an aesthetically pleasing finish that can complement your building or inside space. This means you can benefit from everything from a wood effect finish to a decorative trim and more. 3) Cut costs in Winter and Summer Managing bills at home often mean juggling the art of keeping the house cool enough in summer and warm enough in winter. On one hand, with high-security doors which are effective fire doors and are made to measure and tailored to your home, the heat and warm air inside your home are trapped inside during the winter to keep your home cozy. This helps to cut the cost of heating and ensures your family is protected during the winter months. Mesh layered security Meanwhile, for those who opt for the mesh layered security doors or Louvre doors, in summer you can keep your home or inside space cool and filled with fresh air even while the doors are closed and secured. This ensures adequate ventilation and is a popular choice with homeowners today as it cuts the cost of bills and expensive air conditioning and helps prevent issues like mould which can occur in damp spaces with little airflow. Louvre security doors also help to retain the same level of privacy as a solid door but with a high level of airflow – making them ideal for communal areas and spaces with a high footfall. 4) Keep pets and children safe A security door is enough to deter a burglar to keep your little ones and pets safe and contained inside the house A security door is enough to deter a burglar – so is certainly more than sufficient to keep your little ones and pets safe and contained inside the house. Preventing access to dangerous situations such as being outdoors on their own and entering the kitchen on their own is a benefit that many families revel in – with a range of options including the mesh-covered security doors to retain ventilation and natural light and create more of a homely feel. 5) Feeling safe and secure in your own space This one may seem obvious but it’s one of the biggest benefits – feeling safe even when on your own. Security doors mean that you can rest easy in your own space, in complete control of the locking mechanism and the entry of anyone besides yourself. Most of the security doors recognised by modern standards can withstand ballistics and crowbar tampering – even those with ventilation breaks. On top of that, they have a certain degree of water tightness and resistance to wind, meaning that they also keep you safe from home or building damage. 6) Versatility The vast array of security doors on the market right now means that versatility is possible – in the way that doors are locked, the way that they look, and the additional features they provide. Many of the high-security doors we and other retailers offer also provide complete sound ventilation and are ideally suited to everything from a modern new build to something more traditional in its feel and aesthetics. Uses of security doors High-security doors are a popular addition to modern homes and office spaces, as well as communal spaces and venues As previously touched on, security doors are no longer just for banks and high-security institutes. High-security doors are a popular addition to modern homes and office spaces, as well as communal spaces and venues. The versatility presented by the locking mechanism and access tools means that users can select everything from an entry fob to a code and a traditional key as a means of getting inside. The Takeaway High-security doors are an increasingly popular solution for nurturing safety both in commercial spaces and private homes. With options from solid steel doors to louver doors, triple and double glazed doors, and fire doors available on the market for every space and with made to measure manufacturing options, it has never been easier to equip your home against intruders and keep your family or work team safe and comfortable. Best of all for the modern homeowner, high-security doors no longer create an eyesore – instead, reflecting the same design aesthetic focus as you might expect from an interior company.
With the continued rolling back of COVID restrictions in the UK, there is a palpable sense of relief. A mixture of mass vaccinations, widespread testing, and track and tracing of the infection is helping to enable a healthy bounce back for businesses – with secure access control taking an important role in facilitating this. However, rather than just being a reaction to the wake of the pandemic, there is every sign that the economy, and consequently the security sector as well, are both rebuilding and reshaping for the long-term new normal. Prioritising Safety Already deemed an essential service even during the first wave of the pandemic, the security industry has of course taken a vital role in protecting people and property throughout the crisis. Now that venues in the UK are starting to reopen again, our services are key to occupancy management and ensuring that disease transmission is limited as far as possible. Access control is also key in reassuring people that their safety is a priority. Making the upgrade It’s all been about choosing the most suitable components and technology that already existed with a few “tweaks” Businesses and organisations have a duty of care to their employees and the safety of visitors – so controlling access, employing lateral flow testing, and deploying suitable Track & Trace mechanisms are all key components. I think those outside our industry are surprised to learn that most of the technology being deployed and used hasn’t just magically developed since COVID appeared – it’s all been about choosing the most suitable components and technology that already existed albeit with a few development “tweaks” or adjustments for the situation at hand. This includes using or installing facial recognition readers rather than using fingerprint or contact tokens, it is swapping to automatic request to exit sensors instead of buttons; it is using powered secure doors rather than having people all grab the same handle. Using mobile credentials is also a key technology choice – why not use the highly secure, easy to manage, cost-effective, and of course contact-free benefits of this approach? Touchless solutions We have seen a clear shift in organisations looking to protect their staff and visitors. For instance, we have a big utility customer in Southeast Asia that has just replaced close to 200 sites using fingerprint readers with an additional facial recognition capability. We have also seen a big rise in demand for touchless request to exit sensors and Bluetooth Low Energy Readers for use with smartphone authentication. Working together Integration of security systems is of course nothing new, but in the post-pandemic or endemic age, it has perhaps never been more important. Installations need to be simple, straightforward, and rapid to help maintain safe distancing but also to ensure systems can be deployed as soon as they are needed. The world is changing and developing rapidly and there is simply no place for systems that don’t work with others or cause the end-user considerable cost and inconvenience to upgrade. This flexible delivery of security solutions perfectly matches the evolving and increasing demands of the market. It’s clear that end-users want systems that work well and can easily integrate with their existing systems – not only security but all the other business components which work in unison with each other over a shared network. Great opportunities ahead The recent work-from-home trend is also clearly changing the way organisations and businesses interact with the built environment. Lots of companies are downsizing, offices are being split up, there is lots of revitalisation and reuse of existing office space – all of which creates considerable opportunities for security providers. UK inflation more than doubled in April 2021 with unemployment figures dropping and the Pound rising in value There are also, in the UK at least, clear signs that the construction industry is rapidly growing again -with a forecast of 8% rebound and growth this year. UK inflation more than doubled in April 2021 with unemployment figures dropping and the Pound rising in value – all positive signs for UK-based security providers. Undoubtedly the highly successful UK vaccination rollout has helped considerably, but there are signs that the Eurozone looks set to improve considerably over the next few months as well. Using integrated access control Undoubtedly the pandemic has made security markets around the world more aware of the benefits of integrated access control in managing the needs of the new normal COVID endemic environment. For example, as a business, we have always had keen interest from the UK healthcare sector, but over the last 12 months, we have seen a big growth in previously modest international markets including Morocco, Kuwait, Bahrain, Thailand, Singapore, Hong Kong, and Thailand – all of which are very keen to adopt improved access control solutions. Learning the lessons Nobody would deny the last year or so has been unprecedentedly tough on everyone, as a society we have had to make huge changes and sacrifices. Governments, organisations, and businesses all need to be better prepared in the future, to understand the things that went wrong and those that were successful. However, there is a world beyond the immediate pandemic and its effects. Flexible working practices and the changes these will have to the way we live and work will undoubtedly present great opportunities for the security sector in helping the world evolve. The pandemic has been a wake-up call for many organisations with regards to their duty of care to employees – particularly when it comes to mental health and providing a sensible work/life balance. Where we work and the safety of these facilities has received far more scrutiny than before. Flexible security systems Integrated security solutions have a vital role to play in not only protecting the safety of people during the post-lockdown return to work but also in the evolution of the built environment and move towards smart cities - which inevitably will now need to consider greater flexibility in securing home working spaces rather than just traditional places of work. Importantly, powerful access control and integrated security systems need to be flexible to the uncertainties ahead. The COVID pandemic has shown that nothing can be considered certain, except the need for greater flexibility and resilience in the way we operate our professional and personal interactions.
Convergint Technologies’ rapid growth has come through a combination of organic growth and acquisitions — they have acquired 35 companies since 2014. Growth has been a focus since day one when the founders started the systems integration company with 10 colleagues in a basement. Today, the diverse company includes more than 5,000 employees globally. As technology has advanced and business practices have evolved, Convergint’s core values and beliefs have guided their path forward. Customer-centric approach Convergint’s culture is a critical aspect of the company, from the executive level to frontline colleagues. “It is essential that the companies we look to acquire and develop partnerships with directly align with our people-first, customer-centric, inclusive culture centered on colleagues and customers,” says Mike Mathes, Executive Vice President, Convergint Technologies. “This approach has allowed us to maintain and grow our number of colleagues across our acquisitions and enables us to continue being our customers’ best service provider.” Integration practices Many practices have to be form-fitted to each individual acquisition A simple but important consideration as Convergint grows through acquisitions is: No two companies are the same. While some integration practices can be standardised across the company, many practices have to be form-fitted to each individual acquisition, says Mathes. “Our objective is not to come in and immediately implement change. We want to build on what has already been successful within the local market and share our learned experiences. There is plenty we can learn from each other and create a much better organisation.” Mathes says that Convergint’s view of a successful acquisition is that 1+1=3. “The end result is always much more impactful than what we anticipated,” he says. “Every acquisition brings with it an experienced leadership team, dedicated and skilled colleagues, vertical market and technological expertise. Most acquisitions are in geographies where we do not already operate, so with every acquisition, we increase our capability to serve our customers much better.” Also, the network of Global Convergint Technology Centres (CTCs) helps expand clientele, and the Convergint Development Centre (CDC) offers new support capabilities allowing acquisitions to grow at a very high rate. Expanding service Are there more acquisitions to come? Mathes says Convergint is always open to further expanding its footprint across the globe, improving its ability to service customers, deepening their technical expertise, and continuing to expand service offerings across the current and new vertical markets. However, the current focus remains on several key factors: service to colleagues, customers, and communities. “While obviously, acquisitions fuel our growth, the addition of these organisations to Convergint has really improved our ability to service clients on a global basis,” says Mathes. Acquiring ICD Security Solutions in Asia, for example, made Convergint a pioneer in that market for U.S.-based multi-national companies. Meeting customers demand “Convergint does not weigh market conditions when making an acquisition decision,” says Mathes. Rather, they are primarily focused on meeting or exceeding their customer’s needs on a local to a global level. They see acquisitions as a potential way to extend their geographic reach so they can be closer to customers. An acquisition might also expand technological or vertical market expertise. “The end goal is for us to enhance our service capabilities by attracting and retaining talented colleagues and leaders to better service our customers,” says Mathes. Enhancing and expanding services Convergint identifies how to leverage the expertise to further enhance and expand current service options “Economies of scale” have not been a consideration. They have never sought to acquire companies and restructure them in the process, for example. Rather, each company brings forth a unique skillset, is carefully vetted by the executive team, and provides purpose in the company's mission and vision for the future.” “Frontline colleagues are Convergint’s most valuable assets,” says Mathes. Rather than restructuring and eliminating skilled, knowledgeable colleagues, Convergint identifies how they can leverage the expertise to further enhance and expand current service options for customers. “Our colleagues and their skill sets are our competitive advantage—they remain an essential element to our success,” says Mathes. Demand for integrator services “We continue to experience a growing demand for innovative solutions across electronic security, fire alarm, and life safety,” says Mathes. “As companies innovate further and rely on technologies such as artificial intelligence, cybersecurity, IoT, and cloud solutions, we expect to see an increased demand for integrator services. Our customers demand a local service provider who is responsive and can meet their needs, which is why Convergint aims to be its customers’ best service provider.” This year, Convergint is celebrating its 20th anniversary. In 2021, they will continue to focus on the same critical components that have dominated since day one taking care of colleagues, customers, and the communities where they operate.
Can a smart card be used securely for multiple applications (and among multiple manufacturers )? End users are demanding such interoperability, and they also want openness to switching out components of their access control systems in the future without being “locked in” to one vendor. Those are the goals of the LEAF Identity consortium, a collection of companies that share and support end user-owned encryption keys stored securely in smart cards with MIFARE DESFire EV2 chips and are used to authenticate access control credentials and read the data required to access multiple applications secured by multiple vendor devices. Smart card systems - more secure Almost everyone in the industry now knows that low-frequency (125 kHz) “prox” cards are not secure; in fact, low-cost cloning equipment is readily and inexpensively available. As the industry transitions to encrypted cards, challenges of interoperability persist. Keeping smart card systems more secure are AES 128 encryption keys encoded onto the card chips. Information is exchanged via radio frequency (RF) in a challenge-response interaction when a card is presented to a reader. The most recent LEAF EV2/EV3 cards allow up to 16 devices to be individually accessed using 16 unique keys, respectively that are stored in the smart cards (and among a variety of manufacturers). LEAF Identity Consortium enables interoperability with encrypted Smart Cards LEAF Memory Model specifies a standard EV2 (EV1 backward compatible) smart card data format and application access protocols that ensure each manufacturer’s devices can interface with a card chip in the same way. Specifically, each card has a “common data structure” based on the LEAF Memory Model, which means that the location of information is arranged on a card chip in a predictable and consistent manner. Each end-user application (for door readers, secure printing, vending, etc.) stored in the card is secured with their own cryptographic key. Member companies adhere to that structure in order to be interoperable with a single credential. There are no license fees or intellectual property rights involved. Keysets The approach involves a LEAF Custom Cryptographic Keyset (LEAF Cc Keysets) owned by the end-user. “When we present these concepts to integrators, they realize that, first, they need to get their clients to pay attention to the risks around proximity cards and to migrate to encrypted card technology,” says Laurie Aaron, Executive Vice President, WaveLynx Technologies Corp. “Then we explain the benefits of customer-owned keys and of the LEAF data structure. Then integrators can differentiate themselves by selling the value of the end-user staying in control and having unlimited interoperability.” WaveLynx Access control manufacturer WaveLynx is implementing the LEAF concept, which is the brainchild of CEO Hugo Wendling, who saw the advantages of leveraging the ability of an EV2 chip card to authenticate access to multiple applications by multiple manufacturer’s devices. WaveLynx set up the specification, maintains the website, and is involved when a manufacturer wants to become LEAF Enabled. They provide a key management service (for life) to end-users based on LEAF capabilities. End-users “own” the keys and can submit a request to WaveLynx to have us securely share them with any other manufacturer. Sharing a key involves two key custodians from WaveLynx Technologies and the Vendor who is receiving the customer’s keys, each of whom only has access to half of the encrypted key in order to keep it secure. Keys are shared via a “key ceremony”. Combining capabilities The LEAF consortium provides a way for manufacturers to work together to provide an ecosystem of devices that are compatible with a single encrypted smart card without the need to embed proprietary reader modules in their devices or license another manufacturer’s technology, thereby making it possible for them to increase their market share. Working together, independent manufacturers can assemble a group of devices to compete more effectively with larger manufacturers. In effect, they combine their capabilities in order to offer the end-user viable options and to compete. LEAF Consortium partners include Allegion, ASSA ABLOY, Brivo, Eline by DIRAK, Linxens, RFIDeas, and Telaeris. Biometric partners include Idemia and IrisID. Biometric devices may either store their biometric on the card or on a central database and access it through the badge number. The LEAF standard continues to evolve. Although the standard does not currently offer mobile credentials, a common mobile credential standard is currently being discussed and designed by the Consortium.
The task of protecting shared spaces, such as offices and schools, has become increasingly complex, particularly with ever-rising political tensions and the difficulties of assessing threats for schools, workplaces and law enforcement. Given the randomness of when and where a violent person may strike, those who manage facilities need an emergency plan, as well as robust training, detection and awareness. To gain more insights into dealing with such threats, we interviewed John Torres, President of Security and Technology Consulting, Guidepost Solutions. Guidepost Solutions is a global team of investigators, security and technology consultants, and compliance and monitoring experts. They provide security design and consulting, investigations, and compliance and monitoring leadership for critical client needs. Torres has extensive investigative and security experience. Previously, he served as the Special Agent in Charge for Homeland Security Investigations in Washington, D.C. and Virginia. His background includes more than 27 years of experience providing investigative and security management for the U.S. Departments of Homeland Security and Justice, including serving as the Acting Director and the Deputy Director of U.S. Immigration and Customs Enforcement. Q: Why is it difficult for schools, workplaces and law enforcement to assess threats of violence? How can they differentiate between a threat and a non-threat? Torres: With mobile technology and social media, threats are more than just physical. Schools are often not screening student social media accounts and are restricted in what they can and cannot monitor due to privacy laws. Proactive business and educational institutions are working closely with law enforcement, providing training and increasing awareness of potential threats or abnormal behaviour. Proactive business and educational institutions are working closely with law enforcementEmerging tools include software that allows monitoring of students’ school-issued email and file storage accounts. Communications software and apps provide real-time notification of emergency messages to students, parents, employees and the community to provide critical instructions during an emergency. The combination of training and new tools has enabled trends and threatening language to be identified and appropriate authorities notified. Q: What tools and/or insights can Guidepost Solutions add to the mix? What are the elements of a “comprehensive risk assessment?” Torres: Comprehensive risk assessments include adopting a tiered approach to assessing the school or office and the surrounding environment. A typical approach includes site perimeter review, identifying gates, fencing, vehicle barriers etc., the parking lot, building exterior, interior paths of travel and individual classroom measures. Review and observation of systems including mass notification, video surveillance, access control, intrusion and visitor management, etc. are critical to ensure that they are equipped to maintain functionality in the event of power loss etc. As an insight, always engage with people, they have the knowledge of each unique facility. Elements we can add to the mix include assessments, physical security improvements and mass notification systems, as well as emergency response training, operational policies and procedures, and behaviour analysis. Q: How can the elements of a risk assessment be translated into recommendations of specific technologies or processes (such as video surveillance and/or access control)? Torres: Risk assessments often drive and identify the need for technologies to be implemented into the security programs of schools, business or places of mass gathering, such as stadiums, convention centers and houses of worship. Risk assessments often drive the need for technologies to be implemented into places of mass gatheringRisk assessments help identify weaknesses in security procedure and then often support phased security enhancement programs as funds become available for investment. Each entity is different, and stakeholders should be included. For example, video surveillance may be a priority at one location but controlling the main point of entry may be more important at another. Technology and process recommendations must meet the operational needs and support the goals of the security team and operational managers. Q: How can the risk of an incident be mitigated and lives protected? Torres: While multiple steps are helpful, all of them in combination are key to implementing a comprehensive security plan. They include: Assessments – physical, cyber and procedural Physical Security Improvements – visitor management, fencing and barriers, locks and cameras Emergency Response Training – law enforcement coordination; muscle memory response Mass Notification Systems – current software, clear concise directives, testing Operational Policies and Procedures – termination, evacuation, communication, intervention Behavioural Analysis. Q: What are the elements of behaviour analysis? Torres: They include things like changes in appearance and behaviour, including social media behaviour, and isolation from family or friends. They also include studying or taking pictures of potential targets, and real or perceived bullying. An individual may advocate violence or hate, and/or consume violent extremist information/propaganda. He or she may talk about traveling to places that sound suspicious, and/or have an obsession with weapons. Q: What is the role of training? Torres: Training is critical regarding emergency situations in schools, be it a fire drill, earthquake, lockdown, active shooter situation, etc. Training and drills educate those present, including employees and staff, with information about actions that may save lives and reduce casualties in a real emergency. Training is critical regarding emergency situations in schoolsTraining should hold people responsible and set standards for acceptable behaviour. There should be a plan that is implemented, including practice and drills. You should also provide training and communication skill building classes. Develop intervention strategies. Work with HR and legal (and others as appropriate). Finally, document everything. Q: What challenges still remain? Torres: Cultural and behavioural change remains at the forefront of schools and businesses when addressing safety and security measures. A large percentage of violent acts may be preventable if a bystander shares his/her concerns with the proper authorities. According to the FBI, perpetrators exhibited behavioural indicators in 93% of incidents. And bystanders had prior knowledge in 81% of school attack incidents and 80% of terrorist-inspired behaviours or activities before an attack. Q: What progress are you seeing? Torres: With each tragedy that occurs, leaders are engaging with safety and security head on. There is a shift in schools and businesses to engage with professionals that can help them understand what they do not know. Simple things such as improved communication and enforcement of policies and procedures can have a tremendous positive impact on an organisation’s security posture. Assessments and technology upgrades are important and effective, but it all starts with acknowledging the need to provide and maintain safe and secure environments for students, employees and the community.
LibertySpace, a provider of flexible offices, workshops, industrial and self-storage spaces, has chosen Yardi® Kube space management and Yardi Kube access control to manage six locations within its growing portfolio. Yardi® Kube space management will help LibertySpace streamline operations, provide real-time availability for members and foster community connection. Yardi Kube access control will enable 24/7 access to offices and meetings room, offering its members more flexibility and security. Providing better experience "We wanted a solution that would improve internal processes but also helped build our brand," said Jerry Alexander, Managing Director at LibertySpace. "Yardi's connected platform provides the tools to manage our portfolio and allows for growth. We can use a white label app and connect with our members in real-time, providing better communication and an enhanced experience." "We're delighted to continue working with LibertySpace as they adopt Yardi Kube space management and Yardi Kube access control," said Justin Harley, Regional Director at Yardi®. "We are always looking at ways to develop our platform and provide a better experience for our clients and their members."
Integrated security manufacturer TDSi announces the new integration of its powerful GARDiS access control range with Thinking Software’s RotaOne Time & Attendance platform. The new integration enables businesses and organisations to incorporate the two market-leading solutions, providing a complete overview of staff movements and the security of facilities. Time & attendance solution Reflecting on the new integration, Gwen Curran, Channel Partner Manager North at TDSi commented, “GARDiS is designed to not only deliver the most secure of integrated access control solutions but also to be highly flexible and adaptable to the needs of our customers.” “As a highly popular Time & Attendance solution, RotaOne is the perfect integration partner for GARDiS, enabling users of both systems to link their technology investments and enjoy the benefits of combining data and having a powerful overview of operations.” Integrated access control TDSi’s GARDiS represents the best-of-breed in access control and working together means ease of benefits to our customers The integration with TDSi’s GARDiS platform was a clear choice for Thinking Software too, as Paul Coombes, Sales and Marketing Director also commented, “No systems developer can specialise in all areas of expertise, so integration is a far better approach than trying to be the best at everything.” “TDSi’s GARDiS represents the best-of-breed in access control and working together means we can both add additional ROI and ease of management benefits to our customers.” Central monitoring Integrating GARDiS with RotaOne enables businesses to mitigate risk by ensuring staff is safe and facilities are secure. It also provides an accurate record of people's movement, which is perfect for the time and cost savings when running a business that employs contracted, casual, and salaried staff on complex or repeating shift patterns. The integrated solution also ensures full monitoring for compliance reporting and safety. Cloud compatibility Integration is backward compatible with existing installations to provide a professional solution for customers For added flexibility and resilience RotaOne can be deployed remotely and hosted in the cloud (either private or securely shared) and is fully scalable - from a small SME team up to a full multi-national enterprise. Integration is backward compatible with existing installations (running the latest updates of both platforms) and both TDSi and Thinking Software offer their solutions through fully trained installation partners, to provide a professional integration solution for customers that can be swiftly implemented. Integrated systems Gwen Curran concluded, “As the world begins to adjust to the complex post-pandemic landscape, integrated systems will be at the forefront of enabling people to get back to work successfully, managing social distancing and reducing the possibilities of cross-infection.” “We are proud that by integrating two solutions that are best-of-breed in their respective spheres, we can help businesses get back to concentrating on their core functions with full peace of mind.”
Boon Edam Inc., a front-runner in security entrances and architectural revolving doors, announced that the Arta’a Arts Centre in Aalter, Belgium has installed a Crystal TQ revolving door, bringing the Arts Centre into full compliance with European safety requirements. The all-glass door also enhances the environment by creating a comfortable entryway full of natural light. Constructed in 2020, the Arta’a Arts Centre houses numerous facilities, including the Academy for Music, Literature and Dance; the Academy for Visual Arts; the municipal library; a documentation centre; and the culture and tourism unit. In addition to these public areas, there are residential apartments above the Centre that are also accessed by the building’s main entry. In coordination with Basil Architecture, Boon Edam took on the challenge of designing an entrance solution that would be safe and secure while also complimenting the building’s beautiful architecture. Designing a multi-use building The Arts Centre building is six stories tall, with two of the stories located underground level. The residential apartments are located on stories 2-4, and the facilities that comprise the Arts Centre are located on the first floor, and the two underground floors. The Basil Architecture team was challenged to incorporate natural light into the two underground floors while also buffering the sound of a full rehearsing orchestra in the evening for those living in the upstairs apartments. The addition of the Crystal TQ door at the entrance also lent a hand in flooding the building with natural light To address the lighting issue, the architects strategically placed large glass areas, or “light wells” in areas that would shine down onto the underground floors. They also incorporated a bright and unique yellow colour into the Centre to give the impression of more light in the building. The addition of the Crystal TQ all-glass revolving door at the entrance also lent a hand in flooding the building with natural light. The Crystal TQ revolving door is constructed from glass with only the most minimal stainless-steel frame and capping. Because the Crystal TQ is the most transparent revolving door available, it makes an excellent addition to any building facade. The door is available in 3- or 4-wing configurations and is easy for the general public to push through. Requirements for the building’s main entrance When considering the type of door to incorporate into the Arts Centre entrance, architects had several requirements: The capability of handling the large flow of residents and visitors, especially during peak times Easy to use for young and old The ability to lock the door down after-hours, while still allowing entry to apartment residents An open, bright, and elegant design to match the building interior The Crystal TQ revolving door checked all these boxes and more.
Busy offices need convenient interior security for any private spaces. Not everyone should be reading the important memo on the CEO’s desk. But nobody wants to be left looking after the keys. At one co-working space in Barcelona, Code Handle® Door locks solve the problem. Augusta 29 supplies flexible office rentals to small companies and those without a permanent HQ, as well as services including mail handling, virtual assistants, and meeting room bookings. Part of their remit is to control access everywhere in a secure and efficient way, separating private from “public” areas around the workspace. Managers sought a keyless system; a secure, wire-free digital alternative to keys and access smartcards that would help them stand out in Spain’s booming co-working sector. Any solution for private offices and meeting rooms should enable them to achieve this as simply as possible without having to hand out and track many mechanical keys, as they had done in the past. No more lost keys Code Handle® Door locks enable Augusta 29 to offer their tenants simple, keyless locking. Clients gain convenient access to their rented offices via individual 4- to 6-digit PINs. With Code Handle’s optional auto-locking feature enabled, their offices are securely locked as soon as the door closes. There is no need for Augusta 29 staff— or anyone else— to manage physical keys, or for any wires or access control system. Administrators issue up to 9 different user PINs per lock, which they can cancel or change anytime. Keys are no longer lost or unreturned. Everything is digital. Easy to configure and program The main advantage for us is that users can go to the office with no keys, as it provides enough security" The project ran in two phases. After a successful 2015 installation of 13 Code Handle locks, managers rolled out a further 27 in 2020. Meeting rooms are fitted with Code Handle locks, making them more private. “The main advantage for us is that users can go to the office with no keys, as it provides enough security for our needs,” says Augusta 29’s CEO, Miguel Ángel Villota Mocho. Installation was straightforward. Retrofitting a Code Handle to almost any interior door requires two screws: the existing cylinder remains, with just a change of handle. “Code Handle locks are easy to configure and program,” he adds. Unlike push-button locks, Code Handle looks good, too: brushed steel and chrome styling offers a product design that “fits perfectly with the types of doors we have and the overall design of the business centre,” says Villota Mocho. With Code Handle Door, Augusta 29 retains the premium feel to its office interior.
ATG Access has launched the next generation in bridge protection technology: the Bridge Deck Expansion Beam. The system was developed in response to a call to the industry by the Centre for the Protection of National Infrastructure after it identified the need for a hostile vehicle mitigation solution that could span across large bridge expansion joints. The system was developed after the identification of unique characteristics encountered when trying to secure bridge infrastructure from a hostile vehicle mitigation attack. A tested solution was required that could span across large bridge expansion joints facilitating a continuous line of protection. Impact of the Bridge Deck Expansion Beam The Bridge Deck Expansion Beam has an unrivaled expansion capacity of more than 250mm, and can also be used within a street scene environment to span across other obstructions such as service chambers or manhole covers, to achieve a continuous line of security measures. The new system was impact tested at the MIRA testing facility fitted on two of ATG’s Populus Bridge Bollards with unconnected foundations with a span of over five metres, simulating a wide double bridge expansion joint. It achieved the IWA 14-1 standard, successfully arresting a 7,200kg vehicle travelling at 48 kph. Vehicle access This means that the product can generally be accommodated within existing road finishes The Populus Bollard system onto which the Expansion Beam is mounted sits in a 40 mm deep foundation. This means that the product can generally be accommodated within existing road finishes and doesn’t require a new or additional upstanding curb to accommodate the bollard structure. The beam can be removed to allow for occasional vehicle access. As an additional benefit, the Expansion Beam’s slim profile means that it can be clad to accommodate a wide range of aesthetic options, including bespoke heritage designs if desired. Double expansion bridge joints Robert Ball, engineering director at ATG Access, commented, “Following the tragic terror attacks on Westminster Bridge and London Bridge, the security industry has been working hard to develop new solutions to ensure pedestrians and cyclists are as safe as possible when using bridges.” “Our new Bridge Deck Expansion Beam has been shown to work very effectively in tandem with our existing Populus system. While this system was already capable of dealing with normal bridge expansion joints, this next stage of innovation will now enable it to cope with large or double expansion bridge joints.” “We are very pleased to have developed a solution that will further improve the level of safety and security the Populus provides, while also complementing the surrounding aesthetics thanks to the array of cladding options available.”
Aeroturn LLC, a globally renowned turnstile manufacturer that offers 100% Made in the USA turnstiles, has announced that it has been selected to deploy its turnstiles by one of the nation’s largest family housing finance leader. Contactless biometric technology Currently, the multiple building campus consists of five buildings and is in the middle of a major security upgrade that includes the latest contactless biometric technology. The finance lender was looking for a turnstile manufacturer who was up to the challenge of developing a customised solution that could integrate easily with brand new biometric facial recognition readers with high throughput capabilities. Aeroturn was the clear winner and joined forces with Siemens to ensure a successful deployment. Aeroturn also designed, fabricated, and delivered a single lane test rig prior to the project commencement to help with a seamless integration to the new biometric technology. Aeroturn X-wing turnstiles Aeroturn has been working closely with Siemens to ensure a seamless installation of our X-wing turnstile" “We are thrilled to have been selected by this financial giant for this important upgrade as the best turnstile solution in the industry to meet their security needs,” states Michael Stoll, Vice President of Technical Sales & Marketing at Aeroturn. Michael adds, “Aeroturn has been working closely with Siemens to ensure a seamless installation of our X-wing turnstile, which offers durability, reliability our 5-year warranty & zero maintenance mechanisms, and a 10 million passages guarantee.” Customised biometric reader interface The project currently consists of 15 lanes of Aeroturn X-wing turnstiles with a customised biometric reader interface being installed within a one-year timeframe. Additional HQ buildings are in the initial specifying stages. Aeroturn continues to raise the bar on quality turnstile solutions and help high-profile facilities in multiple vertical markets improve safety and security.
Round table discussion
In the past few weeks, the light at the end of the COVID-19 tunnel has brightened, providing new levels of hope that the worst of the pandemic is behind us. Dare we now consider what life will be like after the pandemic is over? Considering the possible impact on our industry, we asked this week’s Expert Panel Roundtable: Which security technologies will be most useful in a post-pandemic world?
During the coronavirus lockdown, employees worked from home in record numbers. But the growing trend came with a new set of security challenges. We asked this week’s Expert Panel Roundtable: What is the impact of the transition to remote working/home offices on the security market?
When the United Kingdom voted to leave the European Union, a world of uncertainty unfolded for those doing business in the UK and the EU. The referendum was passed in July 2016. Including subsequent delays, the separation was completed after four years in January 2020, with a transition period ending December 2020. Even with the deadlines past, there are still pockets of uncertainty stemming from the separation. We asked this week’s Expert Panel Roundtable: How has Brexit affected the security industry?