Sepura has added to its portfolio of powerful AppSPACE applications for mission-critical organisations with SmartView, a unique application that allows team leaders to get a real-time view of their team’s indoor or outdoor location. The application will provide a significant operational advantage to organisations operating complex sites such as airports, utility plants, and sports stadiums, as well as those working in public safety. Visualising outdoor locations The application uses GPS...
STid, a creator of the world’s most awarded access control reader, announced the release of its new SPECTRE nano reader, which is expected to set a new standard in perimeter access control and simplified visitor management. The multi-technology reader quickly recognises employees, visitors, vendors, and their vehicles - simultaneously – for smooth, hands-free access control without compromising security. A great solution for facilities like car parks, industrial sites, campuses, an...
Schools were never designed and built with social distancing in mind. So it’s perhaps not surprising that as children returned to schools for the autumn term this year, the prospect of outdoor classes and assemblies was mooted in the media and by the Government. Many in the education sector are making the case that, should there be further COVID-19 outbreaks, in the coming months, it would be better to utilise outside space, rather than resort to closing schools. In the COVID-19 era, head...
Allegion plc, a global provider of security products and solutions, has been honoured as the winner of the National Safety Council’s prestigious 2021 Robert W. Campbell Award. The National Safety Council (NSC) is America’s foremost nonprofit safety advocate. Allegion was formally honoured during the opening session of the 2021 NSC Safety Congress & Expo in Orlando, Florida. Campbell Award winners are an elite group of organisations successfully integrating environmental, h...
The UK National Quantum Technologies Showcase will return live at the Business Design Centre, in London, United Kingdom, on November 5, 2021. Bob Cockshott, the UQ National Quantum Technologies Programme Lead at KTN, said “The UK is a world leader in the research, development and critically, the commercialisation of quantum technologies, and the Quantum Showcase is where the sector gets to show its progress, to the government and industry.” UK National Quantum Technologies Showcase...
Hikvision, a globally renowned company in delivering high-performance professional security solutions with tremendous value, offers an intelligent radar PTZ camera that combines advanced radar detection and a 4 MP high-resolution network speed dome, with long-range zoom capabilities. Hikvision's radar PTZ camera The Hikvision iDS-2SR8141IXS-AB Radar PTZ Camera operates effectively 24/7, in virtually any weather or lighting condition, with the ability to detect intrusion and line-crossing event...
Integrated security manufacturer TDSi announces the arrival of its latest student placement, Vlad Radoi. Vlad has joined the company’s Software Development Team for a twelve-month placement as part of his BSc (Hons) in Software Engineering studies at Bournemouth University. Supporting placement students Vlad is the latest in an ongoing line of TDSi placement students, as Managing Director John Davies elaborated, “As a business, we have a long heritage of supporting apprenticeships and placement students across all parts of our business, so we are always delighted to support a new student.” “Software Development is a key role within the access control and integrated security industry and one which is at the heart of what TDSi does, so Vlad is exactly the type of passionate young trainee professional we look to attract and support, as they enter the world of business as well as the technology of security.” About Vlad Radoi Vlad is looking forward to working directly with the TDSi team Originally from Romania (although he has lived in the UK for over 10 years) and a fan of the McLaren Formula One racing team and Arsenal Football Club, Vlad is looking forward to working directly with the TDSi team, as he stated, “Being at Bournemouth University has been fun and weird at the same time, for the last year and a half my experience has largely been online via Zoom and Teams, due to pandemic restrictions.” “However, I am excited to be getting first-hand experience in a commercial setting with TDSi, there is much to learn, and it will kickstart my career as a software engineer.” Gaining new experience Having started with TDSi at the beginning of August, Vlad is already working closely with the Software Development Team, helping it to enhance its GARDiS Access Control software for example. “At the moment, I am working with the GARDiS API, and whilst it is complex, I enjoy studying the intricacies of it. This role gives me lots of experience working with new frameworks and language, as well as learning how software development works in the real world.” Vlad is looking forward to the year ahead and added, “TDSi is an important player in the security and access control industry, and I look forward to learning a lot more about the company, its software, and software development as a whole.”
Johnson Controls, the pioneer for smart, healthy and sustainable buildings, announces the launch of its Tyco Software House iSTAR Ultra G2, a next-generation door controller designed for cyber resiliency, providing customers with faster processing power, advanced enterprise functionality and the building blocks needed for future expansion. Ideal for mid-size to large scale deployments in higher education, healthcare, government, data centre, industrial and manufacturing facilities, the iSTAR Ultra G2 is a highly flexible door controller, supporting both wired and wireless locksets, with expanded memory capacity to ensure the device grows with customer needs. Access control applications It can manage up to one million credentials for up to 32 doors. Advanced enterprise features such as dual GigE network ports using TLS 1.3 network authentication and cluster-based anti-passback provide the power to handle the most demanding access control applications. The iSTAR Ultra G2 assures confidentiality of code and data to help combat the most sophisticated hackers Its advanced hardware-based cyber security protection using Trusted Execution Environment (TEE) means that the iSTAR Ultra G2 assures confidentiality of code and data to help combat the most sophisticated hackers. The TEE guards against cyber-attacks while the OSDP secure channel communication standard provides encrypted two-way communication between devices, including readers and controllers. “The addition of the iSTAR Ultra G2 expands our portfolio of door controllers to include one of the most expandable solutions available in the market,” said Rick Focke, Director of Product Management, Enterprise Access Control, Security Products, Johnson Controls. Access control system “This device is an important solution for customers who need a highly scalable and cyber-resilient solution that serves as the heart of the access control system, connecting readers, sensors, software and locking devices.” Onboard Public Key Infrastructure (PKI) authentication services mean that the iSTAR Ultra G2 is a self-contained high-assurance solution and does not require third-party devices for authentication thereby saving money and install time. Global and peer-to-peer anti-passback technology prevent consecutive entries from single access control cards to keep multiple people from using the same credential. iSTAR Ultra has been built using the Johnson Controls ISASecure® certified development process in accordance with the ISA/IEC 62443 control systems security standard and includes a back-up communication path in the event of a primary network failure to eliminate system downtime. Additionally, iSTAR Ultra G2 uses the same form factor as other iSTAR door controllers, so it fits easily into existing control panel boxes.
Physical-Logical Access Interoperability or PLAI specification provides an open standard method of sharing and managing personnel, credential, card format, and biometric details across an enterprise with disparate physical access control systems (PACS) and biometric integrations. Through the use of open standards, customers can leverage the PLAI standard to use current badge technology and biometrics without the need for duplicate enrollments and/or the issuance of multiple credentials. PLAI also reduces the complexity of integration compatibly by moving to an open standard rather than per integration drivers. C•CURE 9000 is certified and supports PLAI and the management of personnel, credentials, and card formats through the C•CURE 9000 PLAI adapter compatible with any PLAI Agent that is specification compatible. Problems with having disparate PACS Users with multiple identities across security systems do not communicate with each other A manual process to reconcile user’s multiple identities is created in more than one system Multiple owners of a user’s identity in more than one PACS creates conflicts Changes made in one system not registered in the other results in risk unauthorised access Key Advantages of the PLAI Agent PLAI Agent delivers a secure and standardised approach to integrating identity and access control with disparate PACS Enterprise customers can benefit greatly from implementing the PLAI Agent into their security infrastructure along with the C•CURE 9000 PLAI adapter. The PLAI Agent delivers a secure and standardised approach to integrating identity and access control with disparate PACS. 1) Improved security and compliance Centrally manage access to critical infrastructure and assets via one source of authority reduces or eliminates conflicts Secure management and transfer of data in compliance with GDPR 2) Reduced administration cost and Total Cost of Ownership (TCO) Defer capital cost of standardising on one PACS by supporting the interoperability of market-leading access control technologies and biometrics Reduce operational administration through the easy aggregation of changes to users, credentials, locations, and roles 3) Scale security across the enterprise Extend the open standard integrations to include security events and door control Provide reporting on user activity and fault reports Develop flexible capabilities for managing visitors, contractors, and individuals who require temporary access to the facilities 4) Improve employee and user experiences Introduce one identity across the entire enterprise with credentials that can be used on multiple security systems Facilitate the provision of one badge which provides access across all locations Facilitate the use of mobile credentials for supported hardware
BIRD Aerosystems, a global provider of innovative defense technology and solutions that protect the air, sea, and land fleets of governments and related agencies, will participate and present its AMPS (Airborne Missile Protection Systems) family of solutions at the IDEX exhibition in Brno. Operational and combat-proven, AMPS is currently protecting hundreds of military and VIP aircraft worldwide, including aircraft of NATO member countries such as the Czech Republic. Spreos Dircm At the exhibition, BIRD Aerosystems will present its patented SPREOS DIRCM, which enhances aircraft protection by providing unique threat confirmation, tracking, and jamming of all advanced IR-guided missiles. Using semi-active interrogation radar, SPREOS confirms the validity of the incoming threat hence eliminating all false alarms, while precisely tracking and analysing the threat’s unique information to enable the most effective jamming response. Compact and Lightweight, SPREOS is an ideal solution for a range of airborne platforms and can be integrated with any legacy MWS system. AMPS AeroShield pod AMPS AeroShield pod is an all-in-one Pod solution that supports the installation of AMPS on narrow and wide-body aircraft The company will also present the AMPS AeroShield pod, an all-in-one Pod solution that supports the installation of BIRD’s AMPS on narrow and wide-body aircraft. The AeroShield pod offers the most comprehensive anti-missile protection by uniquely using both BIRD’s SPREOS DIRCM and Flares and enabling customers to fly fully protected in the most challenging theaters. Easily installed, the AeroShield POD can be simply transferred between different platforms. Efficiency Ronen Factor, Co-Chief Executive Officer, and Founder at BIRD Aerosystems, “BIRD Aerosystems AMPS has proved its efficiency in protecting military and VIP aircraft against all known Surface to Air Missiles (SAM), including MANPADS, Laser Beam Rider threats and radar-guided missiles. With the Czech air force amongst our customers, we are happy to participate at the IDET exhibition in Brno and present our innovative, combat-proven solutions.”
National Training Center (NTC) study books are commonly used by security technicians, locksmiths, and life-safety professionals, for self-improvement, company education, and to prepare for examinations of all kinds. From October 6 to October 8, 2021, save on NTC training book purchases, as the National Training Center has announced a flash sale on its publications. The sale applies to all the NTC training books and guides, including: Red Book | Fire Alarm Certification Guide Orange Book | Fire Codes at a Glance Blue Book | Low Voltage Systems Yellow Book | Video Security Systems Brown Book | Fire Alarm Systems Handbook Purple Book | Access Control Systems Handbook NTC’s distinguished lineup of training materials NTC's entire lineup of training materials is top shelf and highly respected, across the board NTC's entire lineup of training materials is top shelf and highly respected, across the board. They're often adopted by US states, as examination references and by commercial companies, as study guides for certification. For example, in the State of Florida, starting in October, 2021, the ‘Blue Book’ will replace two references that Florida State officials have traditionally allowed into the Electrical Contractors’ License Exam. The older reference materials were written in 1992 and 1999. State of New Jersey uses NTC's ‘Blue Book’ and ‘Yellow Book’ The State of New Jersey also allows use of NTC's ‘Blue Book’ and ‘Yellow Book’, in the State of New Jersey’s administered examinations and combinations of the same, including in electronic security system, fire alarm, burglar alarm, and locksmith exams. The State of Connecticut allows ‘Blue Book’ references, with the following state examinations, L-5 Limited Electrical Contractor and L-6 Limited Electrical Journey-Person exams. In addition, the State of Tennessee allows use of NTC's ‘Blue Book’, as a reference for their Burglar Alarm Qualifying Agent examination. Low-voltage examination books at reduced price For those individuals facing a low-voltage examination that involves security, access control, locksmith and life safety studies, all NTC training books are available at a reduced price, for a limited time only. They can buy one book for US$ 125 and buy five or more books for US$ 110 each.
Pyronix is delighted to announce that the ‘Enforcer on Tour’ is back to talk to UK and Ireland professional installers, about its latest all-in-one security solution, the new Enforcer V11, with AndroidTablet, HomeControlHUB app and SmartPlug, as well as its extensive support services. Hosted at various distribution centres across the United Kingdom and Ireland (UK&I), throughout October and November 2021, alongside online meetings, Pyronix Account Managers will be highlighting all the innovative new features, added value and up-sell opportunities that the brand-new solution delivers, with attending professional installers also able to claim a FREE £20 voucher (subject to terms and conditions). Enforcer V11 system “We can’t wait to bring the ‘Enforcer on Tour’ back, with our award-winning Enforcer system and the full capabilities that the Enforcer V11 brings, alongside the extensive full-package support that we offer installers through GAP. With the unprecedented circumstances of the COVID-19 pandemic, it’s been a long time since we’ve been able to do this and we’re really excited to bring it back, with such a solution,” said Laurence Kenny, Marketing Director at Pyronix. With Account Managers not only on-hand at selected distributor outlets, across the United Kingdom and Ireland, but also available for one-on-one sessions and Zoom presentations, this is the most accessible ‘Enforcer on Tour’ yet, giving professional security installers unprecedented access to see the latest evolution of the multi-award-winning ‘installer’s choice’ Enforcer system. Security, automation and video in one platform The Enforcer V11 system takes security and control to new heights for homes and businesses Incorporating security, automation and video in one platform, which is conveniently accessed via the tablet interface, the Enforcer V11 system takes security and control to new heights for homes and businesses. Featuring a range of new innovative features, including enhanced installation, Wi-Fi built onboard its PCB, unsupervised zones and occupancy timers on zones, the Enforcer V11 practically covers any installation requirement. The AndroidTablet enables users to surf the web, as well as open the dedicated HomeControlHUB app, for complete control of the Enforcer V11. The installer can also use the interface, as a portable keypad on maintenance visits, while existing ProControl+ and Hik-Connect accounts can be connected, to pull other Pyronix/Hikvision cameras on the property into view via HomeControlHUB. SmartPlug addition for value-added integration Meanwhile, the addition of the new SmartPlug provides value-added integration, thereby enabling users to manage any plug-in appliance, via HomeControlHUB on the AndroidTablet, where they can also access their cameras and security. Laurence Kenny stated, “The Enforcer V11 marks a significant milestone in the development of the Enforcer system, a complete one-platform solution that protects the property, its occupants, the perimeter, vans, elderly relatives and much more, while providing access to camera streams and the controlling of smart devices, around the home.” ‘Enforcer on Tour’ He adds, “The capabilities aren’t going to stop here either, as we’re already working on new innovations that will continue to add value and longevity to the Enforcer V11 system, for both the professional installer and their customers.” By registering and attending one of the tour dates, professional installers can also claim a free £20 All4One voucher (Terms & Conditions apply). The demand to attend and learn about the Enforcer V11 system and claim a voucher will be high, so installers should look to book early, at the ‘Enforcer on Tour’ page, on Pyronix’s official website, in order to avoid the disappointment of missing out.
Intrusion alarm systems are currently facing a growing number of potential error sources in the environment. At the same time, alarm systems must comply with increasingly demanding legal requirements for sensors and motion detectors. As a future-proof solution, detectors equipped with Sensor Data Fusion technology raise the level of security while reducing the risk of cost- and time-intensive false alarms. This article provides a comprehensive overview of Sensor Data Fusion technology. Anti-masking alarms A cultural heritage museum in the South of Germany for decades, the installed intrusion alarm system has provided reliable protection on the premises. But suddenly, the detectors trigger false alarms every night after the museum closes. The system integrators are puzzled and conduct extensive tests of the entire system. When they finally identify the culprit, it’s unexpected: As it turns out, the recently installed LED lighting system in the museum’s exhibition spaces radiates at a wavelength that triggers anti-masking alarms in the detectors. Not an easy fix situation, since a new lighting system would prove far too costly. Ultimately, the integrators need to perform extensive detector firmware updates and switch to different sensor architecture to eliminate the error source. This scenario is by no means an isolated incident, but part of a growing trend. Need for reliable detector technology Legal requirements for anti-masking technology are becoming stringent in response to tactics by criminals The number of potential triggers for erroneous alarms in the environment is on the rise. From the perspective of system operators and integrators, it’s a concerning development because every false alarm lowers the credibility of an intrusion alarm system. Not to mention steep costs: Every false call to the authorities comes with a price +$200 tag. Aside from error sources in the environment, legal requirements for anti-masking technology are becoming more stringent in response to ever more resourceful tactics employed by criminals to sidestep detectors. What’s more, today’s detectors need to be fortified against service outages and provide reliable, around-the-clock operability to catch intruders in a timely and reliable fashion. Sensor Data Fusion Technology In light of these demands, one particular approach has emerged as a future-proof solution over the past few years: Sensor Data Fusion technology, the combination of several types of sensors within one detector – designed to cross-check and verify alarm sources via intelligent algorithms – holds the keys to minimising false alarms and responding appropriately to actual alarm events. This generation of detectors combines passive infrared (PIR) and microwave Doppler radar capabilities with artificial intelligence (AI) to eliminate false alarm sources without sacrificing catch performance. Motion detectors equipped with Sensor Data Fusion technology present a fail-proof solution for building security “It’s not about packing as many sensors as possible into a detector. But it’s about including the most relevant sensors with checks and balances through an intelligent algorithm that verifies the data for a highly reliable level of security. The result is the highest-possible catch performance at the minimum risk for erroneous alarms,” said Michael Reimer, Senior Product Manager at Bosch Security Systems. Motion detectors with sensor data fusion Looking ahead into the future, motion detectors equipped with Sensor Data Fusion technology not only present a fail-proof solution for building security. The comprehensive data collected by these sensors also unlock value beyond security: Constant real-time information on temperature and humidity can be used by intelligent systems and devices in building automation. Integrated into building management systems, the sensors provide efficiency improvements and lowering energy costs Integrated into building management systems, the sensors provide the foundation for efficiency improvements and lowering energy costs in HVAC systems. Companies such as Bosch support these network synergies by constantly developing and optimising intelligent sensors. On that note, installers must be familiar with the latest generation of sensor technology to upgrade their systems accordingly, starting with a comprehensive overview of error sources in the environment. Prominent false alarm triggers in intrusion alarm systems The following factors emerge as frequent triggers of false alarms in conventional detectors: Strong temperature fluctuations can be interpreted by sensors as indicators of a person inside the building. Triggers range from floor heating sources to strong sunlight. In this context, room temperatures above 86°F (30°C) have proven particularly problematic. Dust contamination of optical detectors lowers the detection performance while raising susceptibility to false alarms. Draft air from air conditioning systems or open windows can trigger motion sensors, especially when curtains, plants, or signage attached to the ceilings (e.g. in grocery stores) are put in motion. Strong light exposure directly on the sensor surface, e.g. caused by headlights from passing vehicles, floodlights, reflected or direct sunlight – all of which sensors may interpret as a flashlight from an intruder. Extensive bandwidth frequencies in Wi-Fi routers can potentially confuse sensors. Only a few years ago, wireless routers operated on a bandwidth of around 2.7GHz while today’s devices often exceed 5GHz, thereby catching older detectors off guard. LED lights radiating at frequencies beyond the spectrum of visible light may trigger sensors with their infrared signals. Regarding the last two points, it’s important to note that legislation provides clear guidelines for the maximum frequency spectrum maintained by Wi-Fi routers and LED lighting. Long-term security But the influx of cheap and illegal products in both product groups – products that do not meet the guidelines – continues to pose problems when installed near conventional detectors. For this reason, Sensor Data Fusion technology provides a reliable solution by verifying alarms with data from several types of sensors within a single detector. Beyond providing immunity from false alarm triggers, the new generation of sensors also needs to comply with the current legislature. These guidelines include the latest EN50131-grade 3, and German VdS class C standards with clear requirements regarding anti-masking technology for detecting sabotage attempts. This is exactly where Sensor Data Fusion technology provides long-term security. Evolution of intrusion detector technology Initially, motion detectors designed for intrusion alarm systems were merely equipped with a single type of sensor; namely passive infrared technology (PIR). Upon their introduction, these sensors raised the overall level of building security tremendously in automated security systems. But over time, these sensors proved limited in their catch performance. As a result, manufacturers began implementing microwave Doppler radar capabilities to cover additional sources of intrusion alarms. First step detection technology In Bosch sensors, engineers added First Step detection to trigger instant alarms upon persons entering a room Over the next few years, sensors were also equipped with sensors detecting visible light to catch flashlights used by burglars, as well as temperature sensors. In Bosch sensors, engineers added proprietary technologies such as First Step detection to trigger instant alarms upon persons entering a room. But experience in the field soon proved, especially due to error sources such as rats and other animals, that comprehensive intrusion detection demands a synergetic approach: A combination of sensors aligned to cross-check one another for a proactive response to incoming signals. At the same time, the aforementioned bandwidth expansion in Wi-Fi routers and LED lighting systems required detectors to implement the latest circuit technology to avoid serving as ‘antennas’ for undesired signals. Sensor data fusion approach At its very core, Sensor Data Fusion technology relies on the centralised collection of all data captured by the variety of different sensors included in a single detector. These data streams are directed to a microprocessor capable of analysing the signals in real-time via a complex algorithm. This algorithm is the key to Sensor Data Fusion. It enables the detector to balance active sensors and adjust sensitivities as needed, to make truly intelligent decisions regarding whether or not the data indicates a valid alarm condition – and if so, trigger an alarm. Advanced verification mechanisms The current generation of Sensor Data Fusion detectors, for instance from Bosch, feature advanced verification mechanisms, including Microwave Noise Adaptive Processing to easily differentiate humans from false alarm sources (e.g. ceiling fans or hanging signs). For increased reliability, signals from PIR and microwave Doppler radar are compared to determine whether an actual alarm event is taking place. Additionally, the optical chamber is sealed to prevent drafts and insects from affecting the detector, while the detector is programmed for pet and small animal immunity. Sensor cross-verification Further types of sensors embedded in current and future generations of Sensor Data Fusion detectors include MEM-sensors as well as vibration sensors and accelerometers. Ultimately, it’s important to keep in mind that the cross-verification between sensors serves to increase false alarm immunity without sacrificing the catch performance of actual intruders. It merely serves to cover various indicators of intrusion. Protecting UNESCO World Cultural Heritage in China Intelligent detectors equipped with Sensor Data Fusion are protecting historic cultural artifacts in China from theft and damage. At the UNESCO-protected Terracotta Warriors Museum site, one hundred TriTech motion detectors from Bosch with PIR and microwave Doppler radar technology safeguard the invaluable treasures against intruders. To provide comprehensive protection amid the specific demands of the museum site, the detectors have been installed on walls and ceilings to safeguard the 16,300-square-meter museum site. To ensure an optimal visitor experience without interference from glass walls and other barriers, many detectors are mounted at a height of 4.5 meters (15 feet) above ground under the ceiling. Despite their height, the detectors provide accurate data around the clock while exceeding the performance limits of conventional motion detectors, which clock out at a mere 2 meters (6 feet) catchment area. Integrated video systems The site also presents additional error sources such as large amounts of dust that can contaminate the sensors, as well as visitors accidentally dropping their cameras or mobile phones next to museum exhibits. To distinguish these events from actual criminal activity, the intrusion alarm system is integrated with the museum’s video security system. This allows for verifying alarm triggers with real-time video footage at a fast pace: In the case of an actual alarm event, the system alerts the on-site security personnel in the control room in less than two seconds. Added value beyond security Sensor Data Fusion technology provides a viable solution for the rising number of error sources in the environment As of today, Sensor Data Fusion technology already provides a viable solution for the rising number of error sources in the environment while providing legally compliant building security against intruders. In light of future developments, operators can leverage significant added value from upgrading existing systems – possibly without fundamentally replacing current system architecture – to the new detector standard. Added value how? On one hand, the detectors can integrate with access control, video security, voice alarm, and analytics for a heightened level of security. These synergetic effects are especially pronounced on end-to-end platforms like the Bosch Building Management system. On the other hand, the data streams from intelligent detectors also supply actionable intelligence to building automation systems, for instance as the basis for efficiency improvements and lowering energy consumption in HVAC systems. New backward-compatible detectors Bosch will release a new series of commercial detectors by end of 2021, based on the latest research on risk factors for false alarm sources in the environment and line with current legislation and safety standards. Throughout these developments, installers can rest assured that all new detectors are fully backward compatible and work with existing networking/architecture. With that said, Sensor Data Fusion technology emerges as the key to more secure intrusion alarm systems today and in the future. TriTech detectors from Bosch For reliable, fail-proof alarms the current series of TriTech detectors from Bosch relies on a combination of different sensor data streams, evaluated by an integrated algorithm. These Sensor Data Fusion detectors from Bosch combine up to five different sensors in a single unit, including: Long-range passive infrared (PIR) sensor Short-range PIR sensor Microwave sensor White light sensor Temperature sensor Equipped with these sensors, TriTech detectors are capable of detecting the most frequent sources of false alarms; from headlights on passing cars to a mouse passing across the room at a 4.5-meter distance to the detector. What’s more, TriTech detectors provide reliable performance at room temperatures above 86°F (30°C) while fully guarding against actual intrusion and sabotage attempts from criminals.
From analogue to digital, from stand-alone to interlinked, building systems are in a state of transition. Moreover, the rate of change shows no sign of slowing, which can make it difficult to keep up to date with all the latest developments. If asked to pinpoint the single biggest driver of this revolution, one could point out the growing clamour for platform convergence. A security guard in a building doesn’t want to use different systems to check video cameras, fire alarms or if someone has entered a restricted area: – it simply isn’t efficient. For similar reasons, a building manager wants a single interface to control heating and lighting to match fluctuating occupancy levels, particularly in a hybrid working model. Applying the digital glue The demand from end-users for system convergence is growing, but to achieve full interoperability you still need to apply some ‘digital glue’ and that requires expertise. Yet bringing together disparate systems from different manufacturers can be problematic. Just as you get things to work, someone upgrades their solution and your carefully implemented convergence can start to come unstuck. Managing an implementation can quickly become more complicated, today’s quick-fix can become tomorrow’s headache This is one of the principal issues with all types of new technology; not everyone will choose the same path to reach the desired goal – it’s the old VHS/Betamax argument updated for building management and security systems. Managing and maintaining an implementation can quickly become more complicated than it first appears and without proper oversight, today’s quick-fix can become tomorrow’s technical headache. Effective support for a hybrid workforce Today’s hybrid workforce is a response to the pandemic that looks set to become an established part of working life for many companies across the world. Security systems have a massive role to play in facilitating this transformation that goes beyond simple intrusion detection, access control, and video monitoring. They can identify the most densely populated areas in a building to comply with social distancing guidelines and provide efficient use of space. The insights gathered from a security system can also be used to identify patterns of behaviour, which can then be used for planning and directing the use of building space to help create the best possible working environment while also minimising heating, lighting, and air conditioning expenditures. Identity credentials can help manage compliance with industry regulations by limiting access to certain areas Similarly, identity credentials – either biometric or mobile-based – can help manage compliance to industry regulations by limiting access to certain areas only to approved employees. Creating and maintaining the appropriate level of functionality requires a combination of innovative solutions and industry experience. The complete security package It’s not just physical security that’s important – cybersecurity is a major focus, too. Bringing together both the physical security and cybersecurity realms is increasingly becoming a ‘must have’ capability. What is evident is that the pace of technological change is faster than ever. Today’s functionality simply wouldn’t have been possible just a few years ago, while today’s leading-edge developments may seem commonplace in five years.
As the number of connected devices increases worldwide, the ways that they are being used, designed, and tested have also expanded. The rise of connected devices is demanding engineers to harness the power of the internet of things, which is expected to hit 28 billion by 2025. A comprehensive approach to device design is needed more than ever to address the challenges that this rapid growth will bring. Why engineers should be using IoT technology in product design The demand for devices designed to use the Internet of Things (IoT) technology is increasing as more industries are finding expanded ways to put them into use. Industries such as healthcare, automobiles, and agriculture are becoming more dependent on cloud capabilities and are therefore in need of new devices able to connect to it. Due to this rise in demand, an increasing amount of devices are delivering a multitude of benefits both to consumers and companies. However, this new wave of products has led to a growing list of challenges for engineers as they are forced to address IoT tech in regards to connectivity, regulations, longevity, and security. Ways to use IoT in the development process Engineers are facing these new challenges along with the normal pressure of deadlines and test considerations. By approaching all of these issues from a comprehensive point-of-view, the solutions become clearer and new device capabilities can be born. Let’s look at the challenges individually as well as possible solutions for them. Improving connectivity IoT enables data to be transferred between infrastructure, the cloud, and devices, making the process smooth Because IoT is based around connection, it’s no surprise that the primary challenge for engineers to overcome is the improvement of connectivity between devices. IoT enables data to be transferred between infrastructure, the cloud, and devices, so making this process as smooth as possible is crucial. The main challenges involved with connectivity have to do with development and product testing while meeting industry standards and best practices. Additionally, many companies lack the necessary equipment and technology to develop new IoT devices, which makes it difficult to create scalable prototypes and test new products. Suggested solutions To address the issue of not having the expertise and necessary tools for testing, we suggest outsourcing the prototyping and evaluation process instead of attempting to tackle this in-house. By doing this, you’re able to free up resources that would otherwise be needed for expensive equipment and qualified staff. Helping comply with regulations When working with devices that are connected across the world, there is a complex web of regulations and conformance standards that can lead to challenges for engineers. The necessity of complying with these regulations while also pushing to meet deadlines can be burdensome and lead to an increase in production time and expenses. Failure to comply with global and regional laws, as well as system and carrier requirements, can lead to fines and costly setbacks. This type of failure can destroy a company’s reputation on top of causing financial losses, often leading to the loss of business. Suggested solutions By testing the IoT device design and components early, engineers can address any pre-compliance issues that may arise. During the early stages of development, we suggest using scalable and automated test systems readily available in the marketplace. Improved communication with other devices New challenges arise as new devices hit the market and existing technologies are redesigned to offer a better experience In the rapidly growing number of connected devices, new challenges will arise as new devices hit the market and existing technologies are redesigned to offer a better user experience. This rapid growth in devices will lead to congested networks leading to the necessity of devices being able to function in the midst of increased traffic and interference. Failure to do this will lead to delayed responses which could prove to be fatal. Suggested solutions The best solution for this issue is found in the evaluation process and supporting test methods that the Institute of Electrical and Electronics Engineers (IEEE) published in the American National Standard for Evaluation of Wireless Coexistence (ANSI). This process addresses the interconnectivity issues present in radio frequency environments. The outlined process involves defining the environment and evaluating the wireless performance of the equipment through thorough testing. An in-depth version can be found in its entirety online. Increasing the longevity of devices IoT devices are being used in vital industries such as healthcare and automotive so battery life and power consumption are two challenges that engineers must take seriously. A failure in this area could potentially lead to loss of life or safety concerns on the road. As new firmware and software are being designed to address these factors, engineers must be implementing them into IoT devices with the ability to be continually updated. Suggested solutions Longevity should be addressed in all aspects of the design process and tested thoroughly using a wide range of currents. By doing this, an engineer can simulate consumer applications to best predict performance. Security Security and privacy are concerns with any technology, but with the use of IoT in medical devices, it’s paramount Security has been a controversial issue for IoT since its inception. Security and privacy are concerns with any technology, but with the widespread use of IoT in medical devices, smart home appliances, and access control and surveillance, it’s paramount. For example, medical devices may store information about health parameters, medications, and prescriber information. In some cases, these devices may be controlled by an app, such as a smart pacemaker, to prevent heart arrhythmias. Naturally, a security issue in these devices could be devastating. Another example of dangerous security concern is with surveillance cameras and access control, such as for home or business security systems. These intelligent door locking systems contain locks, lock access controllers, and associated devices that communicate with each other. Suspicious activities are flagged with alerts and notifications, but if a hacker gains access, it can lead to real-world, physical danger. Security design points Here are some key points for security design: Physical security: IoT devices may be in external, isolated locations that are vulnerable to attack from not only hackers but by human contact. Embedding security protection on every IoT device is expensive, but it’s important for general security and data safety. Security of data exchange: Data protection is also important because data gets transmitted from IoT devices to the gateway, then onto the cloud. With surveillance and access control information or sensitive medical information, and encryption is vital to protecting data from a breach. Cloud storage security: Similar to data exchange, the information stored in medical devices, surveillance and access control systems, and some smart appliances with payment features, must be protected. This includes encryption and device authentication through access control, which can police what resources can be accessed and used. Update: Security vulnerabilities will always occur, so the key to addressing them is having a plan to address errors and release patches. Customers should also have options to secure devices quickly and effectively. Suggested solutions Engineers can include security and protection into IoT devices with early and perpetual testing throughout the design process. Most security breaches occur at endpoints or during updates, giving engineers a starting point for how to address them. Creating more secure devices Ensuring the security of connected devices should be of supreme importance for engineers as these devices are vulnerable to security breaches. The ultimate security of devices goes beyond the scope of engineering as the network and enterprise levels must also be secure to protect against potential threats. However, engineers play a role in this protection as well and should consider device security in the design process. Suggested solutions On a device level, engineers can help protect IoT devices from vulnerabilities by implementing early testing and continuing it throughout the design process. Most security transgressions occur at endpoints so this continual testing can, and should, create barriers to breaches. Regulations and compliance For IoT engineers, the complex web of regulations and compliance standards present new challenges Regulations and compliance surrounding data and technology are nothing new, but for IoT engineers, the complex web of regulations and compliance standards present new challenges. Engineers are already addressing obstacles in security and connectivity, all while meeting deadlines, and working around regulations adds time and expense to the process. Unfortunately, a failure to comply with global, regional, or local laws can lead to setbacks and fines. In addition to time lost in production and possible fines, the damage to a company’s reputation can lead to even more losses. Suggested solutions Compliance should be considered early and often in the design process. In the early stages of development, the IoT device or components can be tested to address and compliance issues. If possible, use a scalable and automated test system. The comprehensive solution As we stare at an uncertain future full of possibilities, it’s clear to see that new challenges will continue to be presented as technology evolves and new innovative devices are designed by engineers. By addressing these issues early and often, solutions can be implemented and problems prevented before they even have a chance to occur thanks to sound engineering and solid design.
BIM (building information modeling) provides a process for creating and managing information during the building lifecycle and beyond. BIM is often equated with 3D modeling of construction projects, but the visual component is just part of the value of BIM. Additional data, such as specifications and other documentation, is also part of the process, underlying the visual aspects, helping to drive decision making and providing immediate access to detailed information about all facets of the building process. Incorporating BIM systems For the last six years, ASSA ABLOY Opening Solutions has worked with specification writers and architects in Europe, the Middle East, and Africa (EMEA) to make it easy to incorporate ASSA ABLOY Opening Solutions doors, hardware, and security solutions into BIM systems. Everyone on a project can work together in the interactive and information-rich BIM environment. BIM tools are also used by contractors, distributors, facility owners, and security consultants. BIM software BIM information relating to doors, hardware, and security solutions is available in the cloud BIM information relating to doors, hardware, and security solutions is available in the cloud with the company’s Openings Studio BIM software. This improves the process of door scheduling and visualisation and enables customers to focus on the design, installation, and management of openings. “If you have up-to-date information inside the BIM model, you can reduce mistakes and misunderstanding in the building industry,” says Marc Ameryckx, ASSA ABLOY Opening Solutions’ BIM Manager for the EMEIA region. “It helps to eliminate mistakes before they happen or as early as possible in the building process. The earlier, the less it costs. We provide data as soon as possible in the process.” (ASSA ABLOY Opening Solutions also has comparable systems available in other regions of the global company.) Centralised data in BIM 3D model Expanding the data available in BIM provides additional value compared to merely providing “BIM objects” that can be incorporated into a BIM 3D model. The combination of BIM modeling and the underlying specifications boosts the quality of the project and its key to success, says Marc Ameryckx. Even after the building is complete, the BIM model is still valuable, providing a repository of “as-built” information that can be used by building managers and security professionals tasked with operating and maintaining the building. For example, if a lock needs to be replaced, retrofitting is simpler because all the information about the lock and existing installation is available in a centralised data file. Revit and ArchiCAD A widely used BIM software is Revit from Autodesk, a program that brings architecture, engineering, and construction disciplines into a unified modeling environment to drive more efficient and cost-effective projects. Another BIM software program is ArchiCAD, developed by the Hungarian company Graphisoft. Openings Studio™ added a plugin for ArchiCAD this year, in addition to Revit. Tailor-made information security solutions We provide tailor-made information security solutions with various hardware on projects with more doors" “We can provide tailor-made information security solutions with various hardware on projects with more doors, adding more flexibility,” says Marc Ameryckx. “Customers do not need to be the experts on the products because we provide expertise as part of our specifications.” For example, how often do building mistakes occur because of a misunderstanding about the electrical needs of a lock and the wrong cabling is installed? The problem is especially expensive if it is discovered only after the walls are complete. Providing complete data about the electrical lock as part of a BIM system avoids the snafu. Another example is the specification of a deadbolt lock on a door that operates with an electric strike. The deadbolt undermines the intended operation of the electric strike and can interfere with escape routes in case of an emergency. The mistake becomes obvious in the BIM environment and can be rectified before consequences impact the real world. Data addition to Opening Suites site ASSA ABLOY Opening Solutions is continuously expanding the data it provides at the Opening Suites site, covering additional functionality and more components including the door, cabling, and electrical connections. Hardware sets are linked to specific doors in the BIM models, including all the details of various components, including article numbers, technical sheets, electrical requirements, all depending on customer expectations. Physical equipment includes QR codes that can be scanned by a smartphone to provide information on the door (A mobile app is in development). More details and more data Experienced BIM consultants work with the Openings Studio software on projects ranging from single doors to large buildings with many doors. Data will be more and more important, and there will be more data inside BIM models Adding more data and detail to the BIM process at the level of each door expands the usefulness of BIM, which has historically been focused on broader issues such as structural work and HVAC. “Openings Studio™ provides all the data to integrate doors and security in the BIM process,” says Marc Ameryckx. The higher level of detail may be a new aspect even for customers who already use BIM software. “Data will be more and more important, and there will be more data inside BIM models,” says Marc Ameryckx. In the future, the use of “digital twins” could expand the capabilities even further; for example, the software could simulate escape routes in case of fire. More data makes more things possible.
The coronavirus pandemic had a monumental impact on all aspects of the business world, including the security industry. However, amid the gloom and doom, many security professionals also saw opportunity: New ways the industry’s products could be applied to address the challenges of coping with the virus. This article will review some of those opportunities, based on our reporting throughout the year and including links back to the original articles. During and after the pandemic, security systems are an important asset when it comes to helping to keep occupants and buildings safe as employees return to work. For example, video analytics can provide insight into how spaces have previously been used and can help to predict where and when occupants encounter each other or congregate. Role of thermal cameras These foot-traffic patterns can inform settings for a variety of devices - like ventilation and temperature controls - and even help owners create social distancing plans and monitor personal protective equipment (PPE) compliance. Thermal surveillance, a mainstay of traditional physical security and outdoor perimeter detection, began being deployed early in the pandemic to quickly scan employees, contractors and visitors as part of a first line of defence to detect COVID-19 symptoms. These systems provide flexibility and can offer integrations with multiple VMS platforms and access control devices These systems provide flexibility and can offer integrations with multiple VMS platforms and access control devices. Thermal cameras can be a tool for detecting fever, but any use of the technology for this purpose is full of qualifications and caveats. Importantly, how the camera system is configured makes all the difference in whether temperature readings are accurate, and the downside of inaccurate readings is obvious - and potentially deadly. Temperature detection systems FDA guidelines limit how the cameras are used, not to mention guidance from other regulatory/government bodies such as the CDC. One of our Expert Roundtable panelists compares the market to a “wild west scenario,” and almost all the panelists are clear about how customers should approach the market: Buyer beware. There are many companies jumping into selling temperature detection systems to the state, local governments, hospitals, airports and local businesses, but do they know how to drive one? Anyone can get behind a car and drive it into a wall by accident. The same can happen with a temperature detection system. Customers need to know what questions to ask to ensure they maximise the accuracy of body temperature detection systems. Rise of contactless Spread of the novel coronavirus has jolted awareness of hygiene as it relates to touching surfaces such as keypads. No longer in favor are contact-based modalities including use of personal identification numbers (PINs) and keypads, and the shift has been sudden and long-term. Both customers and manufacturers were taken by surprise by this aspect of the virus’s impact and are therefore scrambling for solutions. Immediate impact of the change includes suspension of time and attendance systems that are touch-based Immediate impact of the change includes suspension of time and attendance systems that are touch-based. Some two-factor authentication systems are being downgraded to RFID-only, abandoning the keypad and/or biometric components that contributed to higher security, but are now unacceptable because they involve touching. "Users do not want to touch anything anymore,” says Alex Zarrabi, President of Touchless Biometrics Systems (TBS). Facial recognition system Another contactless system that benefits from concerns about spread of COVID-19 is facial recognition. New advancement in software, specifically in the areas of algorithms, neural networks and deep learning and/or artificial intelligence (AI), have all dramatically improved both the performance and accuracy of facial recognition systems, further expanding its use for an increasing number of applications. A low-tech solution - the face mask - became a leading preventative measure during the pandemic. But, a high-tech solution is necessary to ensure that everyone is wearing them. Cameras powered by artificial intelligence can now identify whether or not people entering a facility are wearing facemasks and help enforce adherence to mask mandates. This technology is proving to be a cost-effective solution that reduces risks of confrontations over masks policies and gives managers the data they need to document regulatory compliance and reduce liability. Smart video analytics Other technology approaches, including artificial intelligence (AI), were also brought to bear during the pandemic. The German data analytics powerhouse G2K, for example, has developed a Corona Detection and Containment System (CDCS) that is ready for immediate use in record time. Detection takes place in combination with AI-supported data analysis to specifically identify virus hotspots and distribution routes, as well as to identify other potentially infected persons. One specific AI application fuels the reopening of the world and successfully keeps the spread of the virus abated One specific AI application fuels the reopening of the world and successfully keeps the spread of the virus abated. A “collaborative security” application includes a synthesis of smart video analytics, facial recognition, object identification/detection, and thermal cameras that can support the reopening of businesses globally when installed within those facilities frequented by customers. Enforcing social distancing Several applications have been successful to date and will increase in usability in the foreseeable future, creating “smart cities” working together towards a safer, more secure world. The site of one pilot programme is the 250,000-square-foot HID Global facility in Austin. For the pilot programme, 80 HID Location Services readers were installed in a wide area in the facility, including a variety of environments. Initially 30 badges and 30 fobs, all BLE-enabled, were issued to employees. If a badge identifies another nearby beacon (suggesting a social distancing failure), it emits a blinking LED light, which can be seen by the offending co-worker. To ensure social distancing, a Bluetooth Low Energy (BLE) beacon is emitted from an employee’s fob (or from a badge that has the same functionality). The beacon communicates peer-to-peer with a beacon emitted by another employee’s fob or badge to alert if the location of the two employees is less than six feet apart. For contact tracing, the beacons communicate via a nearby “reader” (a BluFi BLE-to-Wi-Fi gateway) to the Bluzone cloud-based software-as-a-service. COVID-19 white papers In addition, we published several White Papers in 2020 that addressed various aspects of the coronavirus pandemic. They included: The top five security lessons learned that apply across all industries navigating COVID-19. Using video analytics to keep staff, visitors and customers safe by enforcing social distancing. How antimicrobial treatment on door handles and levers can reduce disease spread. How companies can put in extra precautions that will continue to grow and adapt with their environment over the long-term. Determining the practicalities and capabilities of today's thermal cameras to accurately detect body temperature.
As a cloud-based platform for service providers in the security, smart home and smart business markets, Alarm.com has adapted quickly to changing conditions during the coronavirus pandemic. In the recent dynamic environment, Alarm.com has kept focus on supporting their service provider partners so they can keep local communities protected. “We moved quickly to establish work-from-home protocols to protect our employees and minimise impact on our partners,” says Anne Ferguson, VP of Marketing at Alarm.com. The Customer Operations and Reseller Education (CORE) team has operated without interruption to provide support to partners. Sales teams are utilising webinars and training resources to inform and educate partners about the latest products, tools, and solutions. Alarm.com’s partner tools are essential for remote installations and support of partner accounts. Helping customers remain connected Adapting to challenges of the coronavirus pandemic, Alarm.com is further investing in solutions that help customers remain connected and engaged. The company has created a resource hub called “Succeeding Remotely” that provides tools, tips and news links that partners can use to adapt their business operations. From adjusting sales and installation techniques to maintaining cellular upgrades, Alarm.com is helping partners stay connected to customers remotely, keep their teams trained, and address rapidly evolving customer concerns without rolling trucks.The company has created a resource hub called “Succeeding Remotely “Additionally, after seeing all that our partners are doing to support their local communities in need, we were compelled to highlight those efforts with ongoing videos called Good Connections, which we’re sharing with our partner community to spark more ideas and ways to help,” says Ferguson. “Though our partners have experienced varying degrees of disruption to their business, we’re inspired by their adaptability, ingenuity and resilience,” says Ferguson. “Along with establishing proper safeguards for operating in homes and businesses, our partners are leveraging our support resources more heavily, while our entire staff has worked tirelessly to deliver new, timely resources.” Do-It-Together solutions Alarm.com partners are successfully employing Do-It-Together (DIT) solutions, focusing on 3G-to-LTE upgrades, and pivoting to new verticals like commercial and wellness. Many are also streamlining their business operations and taking advantage of virtual training opportunities to enhance their technicians’ skills and knowledge, says Ferguson. Do-It-Together installs involve depending on customers to perform part or all of the installation process. Partners can send customers fully configured kits with mounting instructions, or technicians may guide customers on a remote video call. Alarm.com’s tools, training and products help partners modify remote installation options depending on each customer’s needs. End users can validate the Alarm.com Smart Gateway with their central station that sensors they have mounted were done correctly using the Alarm.com mobile app Alarm.com Smart Gateway For example, the Alarm.com Smart Gateway can be pre-configured with indoor and outdoor cameras for easy customer installation and to reduce the likelihood of future service calls. Also, end users can validate with their central station that sensors they have mounted were done correctly using the Alarm.com mobile app. “DIT is helping our partners continue onboarding customers and avoid backlogs,” says Ferguson. “We’ve been pleasantly surprised by the resiliency and level of future investment that our residential and commercial partners have shown in the face of adversity,” adds Ferguson. For example, a significant number of business customers have used the slow period to install systems that are typically too disruptive to put in during normal business hours. Similarly, service providers are adopting new technologies or business models, such as cloud-based access control. “They’re often saying to us, ‘I’m going to take this opportunity to make changes to improve our business,’ and have been working closely with us on training and business consulting to support their efforts,“ she says. Shift to the cloud Ferguson sees a growing preference for cloud-managed surveillance and access systems over ones that have historically been run on-premise. The technology itself is attractive, but especially driving change is the enhancement to the daily lives of service providers and customers, which have been strained during this time. “The foundational benefit of our cloud-based solution is the hassle-free, seamless customer experience it delivers,” says Ferguson. “We make this possible by taking ownership of the servers, software maintenance, firmware updates, health monitoring, and more. With cloud technology, these aspects become invisible to the customer and take a lot off their plate, which is more important than ever.” End users can take advantage of Smart Tip video tutorials to help with DIT installations, or they can use the Alarm.com Wellcam to connect with loved ones anywhere.End users can take advantage of Smart Tip video tutorials to help with DIT installations Partners can attend training workshops focused on remote installation tactics, while driving consumer interest in new offerings through Alarm.com’s Customer Connections platform. The goal is to make it simple for partners to stay connected to their customers to maximise lifetime account value. “We are well-positioned to endure the pandemic because of the strength of our partners in their markets along with our investments in technology, hardware and our team,” says Ferguson. “As restrictions slowly lift, there is cautious optimism that the residential, commercial, property management, plumbing/HVAC, builder and other verticals will recover quickly. We believe that as more partners adopt the DIT model and add commercial and wellness RMR, they will find increasing opportunities to deploy security, automation, video, video analytics, access and more throughout their customer base.”
Type of site: Grade A multi-tenant office Location: The Bailey, 16 Old Bailey, London, UK Site size: 115,000 sq. ft over ten floors Client needs: Easy access for users Touch-free and digital sign-in Free flowing movement through reception, avoiding crowds and queues Fast access to other floors via lifts Visitor management system that can be used by multiple tenants and reception staff easily Secure and clear intercom/entry phone and door automation for out-of-hours, deliveries and trades people access Easy access and parking for disabled users Reliable and resilient security, including CCTV monitoring of strategic locations Integriti intelligent integrated access control system Inner Range’s enterprise-level intelligent integrated access control system, Integriti, provides robust security, as well as seamless integration, to an array of other building management systems. Some of the key features of Integriti include: Easy to use proximity card entry for users and tenants Forge Bluepoint, powered by Yardi, visitor management system to create secure, but easy to use credentials for visitors, including via smartphone High-level lift integration, by Mitsubishi that reads user credentials and directs users to the quickest lift, for their desired destination Integrated CAME BPT video entry phone and access control to automate doors, for disabled access near dedicated parking bay, for disabled users, as well as for out-of-hours access, deliveries and trades people Hard-wired IP closed circuit television system (CCTV) with Hikvision cameras, to monitor strategic locations End-to-end encrypted messaging, through every interface and integration, by Inner Range’s Integriti for high-level security Provision for future entry turnstiles/speed lanes Richard Harvell, Engineering Director at Knight Harwood, who managed the refurbishment at The Bailey, said “Our key requirement was to be able to move users, including visitors, swiftly through reception, to their correct floors, with minimal or no touch points. And, all of this, without compromising security.” High-level lift integration Antron Security’s solution, centered on Inner Range’s intelligent access control system, Integriti" Richard Harvell adds, “Antron Security’s solution, centered on Inner Range’s intelligent access control system Integriti, more than delivers. The high-level lift integration automatically directs users to the fastest lift for their floor and only allows access beyond reception, for those with bona fide credentials. We have been impressed with Integriti’s sophistication and integration capabilities, as well as Antron Security’s expertise and diligence in designing and installing our bespoke access and security system.” The Client - The Bailey UK property firm Endurance Land, which is a member of the Hong Kong-based property conglomerate, Nan Fung Group, owns The Bailey. The property, which is situated directly opposite the famous Old Bailey High Court in London, was originally built in the early 20th Century for the Chatham and Dover Railway Company. Its Grade II listed Edwardian Baroque façade features classical reclining figures, while a larger ‘western extension’ was built in 1999, to modern city office standards. Knight Harwood commissioned for refurbishment Knight Harwood was recently commissioned to refurbish the whole site, along with architect, Orms and building design consultancy, GDM Partnership. The commercial site meets Grade A office specifications and offers exceptional internet reliability, and speed for tenants. It achieved a platinum connectivity rating, by WireScore, the Mayor of London’s digital connectivity rating scheme, in 2020. Sophisticated access and security management system A new and sophisticated access and security management system was part of the refurbishment brief. Knight Harwood stipulated an access and security management system that would ensure a free flow of users and tenants through reception, without crowding or queues. This would need to include integrating intelligent lift controls, so as to ensure users were swiftly taken to their designated floor, as well as a good visitor management system that all tenants could use, without the need for a central security team to manage requests. Touchless access and digital sign-in for users Touchless access, as well as digital sign-in for users was also important for the client Touchless access, as well as digital sign-in for users was also important for the client. An intercom or entry phone and access control operated doors were needed for disabled users, who would be accessing the building from the dedicated disabled parking bay, as well anyone arriving ‘out of hours’, or for trades people and deliveries. High-levels of physical and cyber security were needed to keep all legitimate users and the site safe, without hindering access. CCTV monitoring would be needed in strategic locations. Future proofing, including laying under-floor cables ready for entry turnstiles/speed lanes, was desired. Antron Security managed the project Antron Security project managed the design, supply and installation of the access control and security system for The Bailey and acted as the ‘go to’ contact for Knight Harwood. Antron Security is a globally renowned installer of bespoke security solutions and has been providing security installations for the past 30 years. Taking care of the supply, design, installation and maintenance of security systems, Antron Security is NSI and Safe Contractor approved, meaning all staff and systems installed comply with the latest industry standards and are regularly inspected. Bespoke security solutions Inner Range provided the core access and security management system, Integriti, which enabled Antron Security to build the bespoke solutions needed for The Bailey. Inner Range has been a globally renowned company in the design and manufacture of intelligent security solutions, since it was established in 1988. Inner Range systems have been installed in over 25 countries. Its flagship product, Integriti, offers enterprise-level intelligent security and integrated smart building controls, for single sites through to global estate portfolios. Key integration Inner Range’s powerful Integriti intelligent access control system integrates with Mitsubishi’s high-level lift controls Inner Range’s powerful Integriti intelligent access control system, known for its breadth of integration options, integrates with Mitsubishi’s high-level lift controls and Bluepoint’s visitor management system, to ensure all users and visitors can access their floors, and designated areas with ease. The Mitsubishi lifts are able to read credentials from proximity cards, or mobile phones, at a user check-in point, at the reception, or in the lift lobby itself. High-level lift controls to reduce crowding and queues The high-level lift integration with ‘destination control’ means the lift software takes into account, where each of the building’s lifts are, where the user’s ‘home floor’ is, as well as where other users are going/due to go, and instantly calculates the quickest lift for the new user. The user is immediately directed to the most efficient lift via a display screen at reception, or in the lift lobby. If users are able to go to more than one floor, they can update their preference in the lift itself. This integration ensures users move through reception quickly and efficiently, with no unnecessary stops. Fully integrated visitor management Inner Range’s Integriti intelligent access control system also allowed Bluepoint’s visitor management system to integrate with the Mitsubishi lifts. For visitors to access tenanted floors within the building, the following has to take place: A tenant creates the meeting via Bluepoint An email is generated and sent to the visitor’s inbox, where they can create a mobile QR code pass and save it to their smart phone wallet When the visitor arrives, they use their mobile phone to scan the QR code in the Bluepoint invite, at the reception desk to check-in The reception team can then direct them to the Mitsubishi lifts, which display the lift car that they need to get to their meeting To leave, the visitor presents their QR code at the lift or door reader, which tells the system they’re leaving The QR codes are only valid for one entry and one exit, and only on the appointment date and at the planned appointment time. Afterwards, the QR code becomes invalid and is deleted from the system CAME BPT entry panels and video intercom system The QR code gives the visitor the ability to access everything they will need, including the lifts and any locked doors en-route. The integration between Integriti and Bluepoint’s visitor management system was achieved using the Bluepoint API. Bluepoint is cloud-based, hosted on the Microsoft Azure platform. CAME BPT entry panels were installed to allow disabled users to access the building, near the dedicated disabled parking bay, as well as for any visitors entering the facility out-of-hours, to contact the security team, or for deliveries and trades people to use, in order to access doors at the rear of the building. The entry panels allow for a reliable and intuitive video entry intercom system. Hikvision CCTV cameras installed CCTV cameras from Hikvision have been installed throughout the site, to create a hard-wired IP CCTV system CCTV cameras from Hikvision have been installed throughout the site, to create a hard-wired IP closed circuit television (CCTV) system. They are integrated with the Integriti access control system, which allows for intelligent ‘cause and effect’ monitoring. System protocols automatically bring up specific camera feeds for security managers to view, in response to alerts and footage can be viewed together with additional information from Integriti, such as if a door has been left open. Intelligent access control Inner Range’s enterprise product, Integriti, provides seamless integration with a multitude of other smart building management systems, underpinned by robust security. This includes encrypting all communications through every device and interface, and providing intruder detection to European standard EN50131. Integriti helps building managers create greener and more energy efficient sites, by tracking how tenants use the building, and amending heating and lighting settings, as a result. Integriti also provides trace reporting, that can identify a user’s movements, if they have become unwell and identify who else has been near them. System benefits for users include: Touch-free entry and digital sign-in for users and visitors No unnecessary stops for users on their way into the building Reduced risk of crowding or queues in reception area Easy to use visitor management system Robust security that doesn’t impinge on access Future proofing with cabling provision for speed lanes/entry turnstiles in place
Foreign embassies are an essential part of establishing and maintaining peaceful cooperation, and collaboration between countries all over the world. They can also be the focus of tensions, peaceful and violent protests, terrorism, and many other risks, which mean that thorough and effective security solutions are essential to keep people, property and sensitive documents safe. Foreign embassies Usually located in capital cities, each foreign embassy is the workplace and often residence, of a Country Ambassador. They are used for important diplomatic meetings, holding events, hosting VIPs, and a range of other activities that focus on the political, cultural and social relationships with the host nation. In some instances, foreign embassies even provide sanctuary to their nationals and individuals from other nations In some instances, foreign embassies even provide sanctuary to their nationals and individuals from other nations, during times of trouble. G4S security services in Jordan “Anywhere in Amman, where a foreign embassy has outsourced their security, you can be certain that G4S is the company they have come to,” said Ashraf Abul-Hajj, the Managing Director of G4S in Jordan. Ashraf Abul-Hajj adds, “We’ve been doing this for decades and have excellent, long-standing relationships providing security for many embassies in the capital city. We secure over 30 embassies at the moment, and we’ve been working with some of them for over 20 years.” In fact, it was a small Jordanian security company, called Safe and Sound (now under G4S), which started to provide embassy security in Amman, Jordan, all those years ago, before it became a part of G4S, in 2004. Embassy security services G4S now provides a wide range of services to the embassies that it secures in Jordan. These include manned guarding, installing and maintaining security systems, such as CCTV, access control and alarms, secure escorting for VIPs, during their visits, with G4S vehicles and highly-trained drivers, and coordinating security for events, which are being hosted at the embassy. “The main purpose of most of our security solutions is to ensure that nobody gains access to an embassy, who shouldn’t be there,” said Ashraf Abul-Hajj, adding “There are a lot of different risks that embassies face - big and small. Terrorist incidents, while very rare, remain a threat, so our security teams are trained to be vigilant and notice any suspicious behaviour.” Securing embassies during protests Protests at embassies are more common, when people disagree with the actions of a specific country" Ashraf Abul-Hajj adds, “Protests at embassies are more common, when people disagree with the actions of a specific country. Protests, even peaceful ones, are volatile and have the potential to turn violent, so our security officers and systems are there to monitor tensions, continuously assess the risk levels and prevent breaches.” Terrorism and protests are the more extreme examples of security threats, but day-to-day G4S security teams also deal with lower level threats that still need to be managed sensitively and professionally. Preventing breaches Ashraf Abul-Hajj stated, “People try to access their foreign embassies for a variety of reasons, often at times of personal stress or hardship, and can become distressed, and even aggressive, if they are not permitted to enter.” He adds, “Sometimes, we have to deal with very unusual scenarios. At one embassy, a man turned up saying that he had been informed by the embassy that he had won a competition and he was visiting the embassy to collect his cash prize. It was obvious to the team that he was the victim of a con, but his behaviour became very challenging, when he realised this and could not gain entry. Our security officers had to try to calm him down, while stopping him from entering the embassy, without consent.” Ashraf Abul-Hajj concludes, “This shows how varied the challenges facing our teams at foreign embassies can be. An embassy can be peaceful for a long time, but it can only take one negative news story or a single social media post, to spark a significant protest. With our security systems, highly trained security officers and extensive experience, G4S is more than prepared to meet those risks. We are proud to deliver such an important service, keeping foreign embassies safe and secure in Jordan.”
Smiths Detection, a globally renowned company in threat detection and security inspection technologies, has secured a contract with Japan Customs, to provide two Hi Energy 9 MeV, interlaced, dual view HCVS high-performance cargo inspection systems for screening trucks and cargo containers, to Tokyo Customs, at Jyonanjima and Kobe Customs, at Mizushima, in Japan. Installations will start in April 2022. HCVS X-ray screening system This improved HCVS X-ray stationary screening system utilises a new upgraded conveyor mechanism, which optimises security checks, by scanning whole trucks (cabin included), containers, and vehicles for threats and contraband. The HCVS reduces the need for manual inspection while producing rapid and reliable results With the ability to discriminate between organic and inorganic materials, the HCVS reduces the need for manual inspection, while producing rapid and reliable results. It is already deployed at various ports, across Japan and at international ports, such as Belgium’s Port of Antwerp and Israel’s Haifa Port. Japan, major importer and exporter of goods Japan is the world’s fourth largest importer and exporter of goods, making trade essential for the country’s economy. In August 2021, imports and exports rose by over 20 percent, on a year-on-year basis, as Japan’s economy continues to recover from the impact of the COVID-19 pandemic. “As the volume of goods and trade increases globally, being technologically innovative is vital for establishing trust between stakeholders and maintaining the flow of goods, through our local and global markets,” said Kevin Davies, the Global Director of Ports and Borders for Smiths Detection. Ease of trade and securing movements of cargo Kevin Davies adds, “Smiths Detection is proud to support Tokyo and Kobe Customs, in creating the safest port environments possible. With state-of-the-art technology and our global team, we look forward to strengthening the region’s ease of trade and securing movements of cargo, around the world.”
Cumbria Police have refreshed their fleet of frontline TETRA radios, deploying Sepura SC21 hand-portable radios to police officer roles and SCG22 mobile radios in vehicles. In total over 1,400 radios have been deployed to enable the force to upgrade to the latest standard of TETRA radio capability. Enhanced mobile communication Aware of the need to refresh their radio fleet, the force organised field trials for new radios. Feedback from officers using the new Sepura SC21 TETRA radio was overwhelmingly positive. A vital advantage for the SC21 over the previous Airwave estate being the powerful TETRA engine and receive sensitivity. These combine to allow Cumbria Police officers to maintain Airwave coverage and keep communicating in the county’s many rural locations, where less powerful handsets frequently lose coverage. This deployment was further supported by the ability of the SCG22 to act as a Gateway, extending Airwave coverage where it might not otherwise reach and further enhancing the overall critical communications solution. Minimised training required The radios were programmed with a bespoke user interface designed to offer officers a familiar user experience The mobile radio was chosen as it has comprehensive deployment options, including car, van, motorcycle, and desk mount options, and shares a common interface to the SC21 meaning officer training is minimised. The transition to the new Sepura devices was undertaken during the COVID pandemic in the UK, with the Sepura team working with Cumbria Police to identify safe and effective ways to support an accelerated transition. This included Sepura supporting the force with a provisioning service, meaning the radios were pre-programmed and delivered to force headquarters ready to deploy. In addition, the radios were programmed with a bespoke user interface designed to offer Cumbria Police officers a familiar user experience, minimising officer training. Secure communication solution Adrian Johnson, ICT Operational Change Business Lead at Cumbria Police said, “Our officers require reliable secure communications with the easy-to-handle, reliable kit. Our old terminals were no longer supported by the manufacturer and were starting to fail. Our officers have been providing Policing services to our citizens and visitors to Cumbria throughout the COVID pandemic.” “The Sepura rollout has occurred during this global pandemic, during which the team had to learn new ways of doing things safely. The project team worked effectively with Sepura’s support teams to successfully deliver this new equipment to our teams.” “It is imperative in a mission-critical environment that we have excellent relationships with suppliers and immediate access to subject matter experts when our technicians need help or advice. Sepura understands Cumbria Police’ requirements and willingness to work together was key to achieving the agreed solution.” Providing effective solutions Dawn Griffiths, Business Development Manager for Sepura said, “We are delighted to support Cumbria Police in upgrading their hand-portable radios to the SC21.” “The expectation for modern radios is much greater than it was previously, and Sepura’s SC range can support these demands with powerful data applications, intelligent connectivity, and advanced features such as wireless Over The Air Programming which will enable the force to keep evolving their TETRA solution for many years to come.”
Here East is an innovation and technology campus located at the heart of Queen Elizabeth Olympic Park in London, UK. Once the Press and Broadcast Centre for the 2012 Olympic Games, it is home to a thriving community of over 4,500 creative, academics, and innovators. Designed as a mini-city, the campus is a mixed-use development that houses offices, retail units, university facilities, cultural exhibitions, and public spaces. Notable tenants include BT Sport, the V&A Museum, Sports Interactive, and the studios of noted choreographer Wayne McGregor. In total, the site offers 1.2 million square feet of flexible space and caters to a wide range of visitors. Modernising data The previous video management system was still functioning. Yet, Here East’s Head of Security, Leighton Jones, was familiar with the Genetec unified platform and was confident it could deliver more. The advanced capabilities of the Genetec system would enable his team to gain a deeper understanding of the environment, resolve incidents in real-time and ensure a positive user experience. “Here East is a truly iconic location with a diverse list of high calibre visitors and tenants,” explains Jones. “I wanted to be able to say we use the best technology available and in my experience that is Genetec.” Here East has begun a multi-year phased adoption of Genetec solutions, starting with the deployment of Genetec Clearance to modernise data handling and the secure sharing of digital evidence. GDPR compliance Implementation of the EU GDPR has led Here East to revisit its processes for the sharing of video surveillance footage Like many organisations, the implementation of the EU General Data Protection Regulation (GDPR) has led Here East to revisit its processes for the sharing of video surveillance footage. Each time Here East received a validated evidence request, operators burned footage onto physical storage media such as a CD or a USB stick. The process was time-consuming and also created chain-of-custody issues. Here East had no control over how that footage was stored and shared by others. “It wasn’t a situation I was comfortable with,” explains Jones. “We find ourselves needing to share footage internally and externally. We need to retain controls on our data.” Clearance simplifies evidence sharing All digital evidence is now collected, shared, and distributed through Genetec Clearance. The team at Here East can put appropriate safeguards in place to minimise the risk of footage being inappropriately shared or lost. For example, it can specify viewing rights for specific users, set time limits, and revoke access to previously shared footage. The automatic redaction features available within Genetec Clearance have also streamlined the processing of requests for video evidence. Under the terms of the EU GDPR, any citizen can submit a subject access request, with Article 15 of the legislation presenting specific challenges concerning video surveillance. Article 15 states “the right to obtain a copy… shall not adversely affect the rights and freedoms of others. Video surveillance operators must redact the identities of multiple other third parties in relevant frames of video before footage can be shared. On a busy night, the canalside restaurants and bars on the Here East site can contain 1,000 people in a single camera’s field of view. Before the user had to spend significant time manually redacting the identifies of innocent parties in the footage. With Genetec Clearance, that task is instant and automated. Improved incident reporting capabilities Genetec Clearance has bolstered Here East’s incident analysis capabilities, simplifying the process of reporting back Genetec Clearance has bolstered Here East’s incident analysis capabilities, simplifying the process of reporting back to the senior management. Each month the Here East team runs an automated report breaking down incidents by time, date, and location. It then uses this data to make recommendations surrounding security operations and the deployment of resources. Where it’s applicable they run educational workshops for tenants. For example, phone snatching and bike theft are two of the most common crimes in their London borough. By closely monitoring the data, Here East can take proactive steps to detect, deter, and discourage perpetrators from operating on the Here East site. “It’s all well and good having the data but the most important thing is being able to visualise it, spot the meaningful patterns, and take the right preventative actions,” explains Jones. “Genetec Clearance makes this seamless”. The foundations for future growth Here East is still in the early phases of a long-term rollout with Genetec but is already benefitting from a unified approach to security, digital evidence-sharing, and operations. Further deployments will see the innovative site continue to work closely with Genetec to maximise value, push the boundaries of the technology and exceed the expectations of its tenants. “We’re continuing the legacy of the 2012 Olympics and have ambitious plans for the day-to-day management of this iconic site,” concludes Jones. “Our tenants expect a gold medal standard service and we have no intentions to disappoint”.
Adani Group is an Indian multi-national conglomerate, with its headquarters located in Ahmedabad, Gujarat, in India. The group’s diversified businesses include resources, logistics, energy sectors and agriculture business. Adani Group is the largest port developer and operator in India, with the Mundra port, located in Gujarat, the largest commercial port in India. Having multiple ports, branches, manufacturing units and corporate offices at various locations, Adani Group is one of the largest business units in India. In all, this business group has 15,000+ employees and 50,000+ workers (with 900+ third-party contractors), who are involved in the incorporation of various work orders, across 25+ business units. Attendance and shift record maintenance Adani Group is widely engaged in multiple business units and ports, with strength of 50,000+ workers, who are engaged under 900+ contractors employed at various locations. Maintaining and managing the entire attendance details, diverse shifts and leave policies for the various locations and numerous workers at a central place was critical for the multi-national conglomerate. Moreover, task allotment to workers based on its requirements, skills under a contractor and its verification against the respective contractor's report were tedious tasks for the management to deal with on a regular basis. To provide approved and appropriate induction of each worker, at a defined level, monitor progress status of each work order and its segregation, based on reports were quite challenging. COSEC Contract Workers Management solution Report generation to eliminate the fraudulent and erroneous payment of wages, at contractors' end, had been the need of the hour. Moreover, their requirement of timely and error-free payroll processing was to improve overall productivity. After a comprehensive discussion, with regards to the problems and requirements of the Adani Group’s management, Matrix offered its COSEC Contract Workers Management solution for their 50,000+ workers, who are working under 900+ contractors, spread across the enterprise’s four locations in India. Centralised attendance management solution Matrix’s COSEC Contract Workers Management solution offers a centralised attendance management solution Matrix’s COSEC Contract Workers Management solution offers a centralised attendance management solution for various branches that are spread across multiple locations, which automates all processes right from recording entries and exits, up to processing salaries. The COSEC Contract Workers Management solution facilitates enrolment of the worker credentials, along with photographs, documents and induction details. It helps contractors to manage workers efficiently, using contractors’ self-service portal. The solution provides multiple connectivity possibilities, via Ethernet, Wi-Fi and Mobile broadband. Seamless integration with SAP The solution also eases the tracking of work order progress. It offers seamless integration with SAP, using the database to database linking and offers the feature of real-time notifications, in cases of exceptional situations, via Email and SMS. Results: Enhanced security with effective worker’s enrolment process, abiding by various induction levels. Increase in productivity of administration by 20%. Easy decision making, due to the generation of customised reports. Smooth and effective monitoring of work orders. Improved security with centralised control and monitoring, with reduced time spent by the security department. Error-free man hours’ computation for quick & effective wages’ calculation. Minimised manual interventions. Products offered by Matrix include: COSEC CENTRA LE - Application software platform, expandable up to one million users. COSEC LE CWM - Contract Workers Management module for COSEC CENTRA LE. COSEC DOOR FOW - Fingerprint and RF card-based door controller with Wi-Fi connectivity. COSEC PATH DCFM - Fingerprint, Mifare card, and NFC-based door controller. COSEC VEGA FAX - Fingerprint and RF card-based premium door controller with Touch Sense LCD, IP65, Wi-Fi and POE connectivity options. COSEC DOOR FOP - Fingerprint and RF card-based premium door controller with LCD and keypad.
Round table discussion
Perimeter security is the first line of defence against intruders entering a business or premises. Traditionally associated with low-tech options such as fencing, the field of perimeter security has expanded in recent years and now encompasses a range of high-tech options. We asked this week’s Expert Panel Roundtable: What are the latest trends in perimeter security technology?
Public spaces provide soft targets and are often the sites of terrorist or active shooter attacks. Public spaces, by definition, require easy accessibility and unrestricted movement. Given that openness, what security technologies can provide real results? We asked this week’s Expert Panel Roundtable: How is technology innovation impacting the security of public spaces?
Our Expert Panel is an opinionated group on a wide variety of topics, and we are dedicated to providing a useful and flexible forum to share those opinions. This week, our panelists address a range of opinions about several self-selected topics, culled from the large number of Expert Panelist responses we have collected in the last year. In this Expert Panel Roundtable article, we will share these varied and insightful responses to ensure they are not lost to posterity!
Outdoor Security: Manufacturers & Suppliers
- Axis Communications Outdoor Security
- Hikvision Outdoor Security
- Bosch Outdoor Security
- Vanderbilt Outdoor Security
- Software House Outdoor Security
- Suprema Outdoor Security
- Avigilon Outdoor Security
- CyberLock Outdoor Security
- Arecont Vision Outdoor Security
- ASSA ABLOY Outdoor Security
- AMAG Outdoor Security
- OPTEX Outdoor Security
- Anviz Outdoor Security
- VIVOTEK Outdoor Security
Protecting dormitory residents and assetsDownload
Protecting Critical Infrastructure through facial recognitionDownload
12 questions to ask your access control providerDownload
Providing frictionless cloud Video Storage as a Service (VSaaS)Download