Radio frequency Identification
Matrix COSEC ARGO is a performance, design and engineering wonder that brings a modern design to the access control and time-attendance applications. The device is equipped with an enhanced 3.5” IPS LCD touchscreen for optimising users’ visual experience. The door controller is designed to meet the aesthetics, technology and harsh environment application requirements of the large & multi-location enterprises, SME & SMB organisations. Matrix COSEC ARGO door controller: Enh...
Public spaces in cities and suburbs are important places for community development and promoting outdoor recreation. These areas may include main streets, parks, promenades, band shells and fields. Such locations are often utilised by public event planners for community activities, including summer festivals, wintertime ice skating rink installations, music concerts and art fairs. As the year drew to a close, holiday and Christmas markets as well as major New Year’s Eve events, presented...
User authentication deficiencies, endpoint data leakage and excessive user permissions are the three most common cybersecurity risks facing health systems and hospitals, according to new data from Clearwater CyberIntelligence Institute. At the HIMSS19 Global Conference and Exhibition, February 11-15, 2019 in Orlando, Florida, ELATEC will be demonstrating its uniquely flexible radio frequency identification (RFID) reader, which mitigates these issues by strengthening user authentication for acce...
Rosslare Enterprises Ltd., global provider of professional security solutions, announces that it has been awarded CE (RED) 2017 Edition, and FCC (CFR 47 – Part 15.B) certification on its new AY-U920BT and AY-H915BT UHF SMART BLE-ID and long-range UHF Readers.“We are very pleased to be able to present these products to North America and European Union channel partners that are certified to operate within the radio equipment limits of those countries,” said Ezra Ozer, Director of...
Johnson Controls announces the release of CEM Systems AC2000 v10.1, which contains a number of new features that improve functionality and the user experience and help to mitigate health and safety risks. Support for a range of new third-party products that increase the performance and scope of the CEM Systems AC2000 access control system has also been added. The Health and Safety (H&S) Induction Check application for CEM Systems emerald intelligent access terminals allows cardholders to se...
CeComunica, a Professional Mobile Radio (PMR) operator in Panama, is slated to launch in December a Digital Mobile Radio (DMR) Tier III trunking network supplied by Hytera, global provider of innovative PMR solutions. This new nationwide network will provide advanced and reliable mission and business critical communications services to a large number of users from sectors such as ports, airports, ground transportations, hospitality, retailing and security companies in Panama. DMR Tier III trunk...
ETELM, global manufacturer of advanced mission critical communications radio infrastruture, has announced a recent strategic partnership with HALYS and ENENSYS to provide a full end-to-end infrastructure solution that will fill the operational requirements of tactical LTE deployments. Tactical LTE deployments The partnership’s solution addresses the challenges that PMR users are facing when requiring autonomous private LTE deployments, as well as providing an advanced solution for communications, surveillance, maintenance, telemetry, data flow and video streaming. “ETELM is thrilled to have partnered with two great companies, HALYS and ENENSYS, and achieved a full end-to-end infrastructure solution,” said Nicolas Hauswald, Sales and Marketing Director at ETELM. “This globally-renowned solution that is fit for tactical deployments, private networks and PPDR users. The solution is easy to deploy and is adaptable for critical communications in the field – the initiative is fully driven by SMEs and we’re proud to be working with HALYS and ENENSYS on this great achievement.” Integrated end-to-end infrastructure solutions The solution is today the only one available that works in the latest PPDR 68 band The solution allows for dynamic allocation of the bandwidth in broadcast situations in order to optimise radio resources usage, which no other solution in the market currently offers. Additionally, the solution is today the only one available that works in the latest PPDR 68 band. One of the key strengths offered is all the components for successful operations, from radio to applications are included. It can be used in multi-technology radio, both TETRA and LTE. TETRA-LTE integration solution “An integrated solution is the new approach to interconnection. TETRA is widely deployed and has been a relied upon technology for nearly two decades,” explained Hauswald. “The costs associated with TETRA are lower, but it does not offer the bandwidth that LTE can provide. As the two become integrated, it is crucial that solutions like the one we have created with HALYS and ENENSYS can cater to both networks.” The solution have created is currently compliant with 3GPP release 13 and meets the requirements of users in a wide range of sectors, including defence & security, transport, energy and utilities.
The global market for licensed mobile radio (LMR) infrastructure and system integration grew 14 percent, reaching $4.6 billion in 2017. Significant growth was noted in Asia, as revenues increased by 26 percent. However, Europe also experienced 8 percent growth in infrastructure and system integration revenue. Cost-optimised digital technology Cost-optimised digital technology accounted for the largest infrastructure and system integration market in 2017, accounting for 50 percent of all infrastructure revenues globally. The Association of Public-Safety Communications Officials Project 25 (APCO P25) continued to be a significant revenue generator of LMR infrastructure, particularly in North America, which accounted for more than three-quarters of the world’s P25-derived infrastructure revenue. TETRA and LMR infrastructure Terrestrial Trunked Radio (TETRA) infrastructure revenues increased in every major region in 2017 Terrestrial Trunked Radio (TETRA) infrastructure revenues increased in every major region in 2017, and IHS Markit projects revenues will exceed $1 billion by 2022. Investments in LMR infrastructure are growing globally, as users continue to rely on LMR infrastructure to support their mission-critical and business-critical communications networks across the globe. Cost-optimised digital technologies are increasingly popular in public safety and security sectors in developing parts of the world where no national TETRA or P25 network exists, such as in China, Hong Kong and other parts of Asia, as well as Africa and Eastern Europe. Cost-optimised digital technology is also successful in business-critical sectors in developed regions, like North America, Japan and the United Kingdom. IHS Markit projects that cost-optimised digital technology will be the fastest growing infrastructure and systems integration market over the next five years, competing with TETRA not only in commercial and business critical sectors, but also public-safety and security sectors in developing regions. APCO P25 critical communications network APCO P25 is a significant market for LMR infrastructure and systems integration. P25 provides high-end critical-communications networks to governments and commercial sectors around the world -- from Australia, to parts of the Middle East and Africa, to Latin America and Asia – but the largest single market is North America, which adopted P25 as the communications of choice for its emergency services. Despite the coexistence of FirstNet, the broadband data network for emergency services, the narrowband P25 continues to see renewed investment across North America, with large-scale network upgrades in 2018. Examples include the Motorola Solutions multi-million-dollar contract to modernise the P25 network in Portsmouth, Virginia and provide P25 technology to its emergency services, and the Harris deal to upgrade the United States Customs and Border Protection (CBP) network. North America is forecast to remain the largest global market for P25 infrastructure and systems integration. TETRA and TETRAPOL communication networks TETRA is one of the fastest growing infrastructure and systems integration markets in the world TETRA is one of the fastest growing infrastructure and systems integration markets in the world. TETRA-derived infrastructure revenues increased in every major region in 2017, with particular growth noted across Europe, the Middle East, Africa and the Americas, however the real success story was China, which has increased investment into TETRA sharply over the last couple of years, providing secure communications to transportation hubs in metropolitan areas. Europe has a diverse mix of LMR technologies. It is home to the world’s largest share of TETRA and TETRAPOL networks serving nationwide mission-critical public-safety networks over many years. Investment into narrowband technology continues to increase despite the emergence of LTE networks. Germany, the United Kingdom and Nordic countries have invested heavily in TETRA and will continue to do so. In fact, this year the United Kingdom announced that it will extend its Airwave network until at least 2022. ASTRID, PIT and C2000 networks There are also ongoing upgrades to the ASTRID network in Belgium, the C2000 network in the Netherlands and the PIT network in Italy. Investment continues in many parts of Western Europe, with new entrants in Eastern Europe and developing parts of Europe. TETRAPOL, despite the maturity of this technology, also continues to provide upgrades to existing users, including a midlife upgrade to Switzerland’s Polycom network and the Hamburg transport hub. Furthermore, investment into cost-optimised digital technology also increases, as countries with nationwide public-safety networks adopt cost-optimised digital networks for their business-critical sectors, and nations like Croatia, without a nationwide TETRA or TETRAPOL network, consider cost optimised digital technology for their mission critical requirements. Police Digital Trunking (PDT) Asia has a large network of cost-optimised digital technologies, in both the public-safety and security sectors, and business-critical sectors, alike Asia has a large network of cost-optimised digital technologies, in both the public-safety and security sectors, and business-critical sectors, alike. The Chinese government officially backed the nationwide migration of police forces across China to police digital trunking (PDT), which bolsters investment into cost-optimised digital technologies in this region. Other Asian countries have invested in cost-optimised digital technology, such as India, Mongolia, Kazakhstan, Bangladesh and Indonesia. China was the real success story in 2017, with significant growth noted in cost-optimised digital technologies and TETRA infrastructure and system integration and the largest LMR infrastructure and system integration market in the world. Investment into LMR infrastructure increased by over 40 percent in 2017, as TETRA infrastructure projects continued to materialise in the transportation sector and cost-optimised digital technology investment continued with digital mobile radio (DMR) and police digital trunking (PDT) across vertical sectors. LTE technology Despite the emergence of LTE technology, investment in LMR infrastructure continues to grow, as governments and commercial sectors utilise secure, low-latency, high-resilience narrowband networks to fulfil their critical communications requirements. In the short term, LTE will complement critical voice with data, rather than replace LMR altogether, as investment into LTE is required to increase coverage and resilience. Only in the next five to ten years could LTE substitute for TETRA, TETRAPOL or other high-end LMR technologies, as capital investments are considered in nationwide or large-scale deployments.
For over a century, IEEE's mission has been to advance technology for the benefit of humanity. As the world’s largest technical professional organisation, IEEE’s global community includes over 420,000 members in engineering, computing and technology, collaborating on communications, consumer electronics, robotics, sustainable energy, aerospace, life sciences, and many other critical initiatives. Dave George felicitated with IEEE Life Membership Dave George has been an active IEEE member for over 40 years As the Chief Technologist behind Pryme Radio’s communications innovations, Dave George has been an active IEEE member for over 40 years. Recently, Mr. George was honoured with IEEE Life Membership, a top echelon designation reserved only for those individuals demonstrating long-standing leadership, dedication, and who have made a significant impact on the development of technology. “I’m grateful for IEEE’s recognition, but it’s my job to find ways to better the lives and professions of Pryme’s customers through communications,” said George. “The fact that technologies have become ever more exotic and exciting is a bonus.” Never comfortable tooting his own horn, George’s demure demeanor belies the important role he’s played in moving the communication industry forward. In fact, George credits IEEE as being his primary source for leading edge electronic science data, which often help lead him to develop ground-breaking new products at Pryme. Pryme's future product line in sync with IoT George is a regional member of the IEEE Communications Society (ComSoc), Robotics & Automation Society (RAS), Intelligent Transportation Systems Society (ITS), and the Vehicular Technology Society (VTS.) His involvement has given rise to future product developments at Pryme that support emerging networks such as IoT, mesh, 5G, soon to be 6G, as well as intelligent vehicle to vehicle communications. George may shy away from the spotlight, but he is fearless when it comes to entering unexplored technological territories. The reward Dave George reveres most is creating products that make a difference. George’s philosophy mirrors the IEEE’s mission and is also reflected in Pryme’s guiding principle — Invent communications technologies that benefit public safety, security, government, education, transit, utilities, construction, manufacturing, retail, hospitality, field services, facilities, healthcare, professionals and humanity as a whole.
Vicon Industries, Inc., designer and manufacturer of video surveillance and access control software, hardware and components brings a new level of convenience and simplicity to its VAX Access Control solution with today’s introduction of mobile credentialing. This new feature allows VAX customers to present their smartphones, instead of cards or fobs, to specialised Bluetooth-enabled VAX door readers. Smartphone and mobile credentialing Upon installation of a custom smartphone “wallet” app and a simple authentication process that links that app to the specific phone, users enter their personal VAX credentials into the wallet. Multiple credentials can be accommodated. No additional activation steps, such as entry of personal information or Bluetooth linking, are required. To unlock doors using the mobile credentials, users unlock their phone, access the credential within the wallet app and push the “unlock” button. Credentials are uniquely linked to each smartphone and cannot be shared or installed across multiple devices. Android and iOS devices are supported. Strong AES encryption, combined with smartphone PINs or biometrics, make the mobile credentials even more secure than traditional smart cards. Two models of contactless door readers are available; one requires immediate proximity (1.5 inches) and one with read range of up to 15 feet. The Bluetooth readers can also accommodate traditional RFID access cards, providing flexibility to administrators wishing to offer both types of solutions to employees. Access Control Bret McGowan, Vicon’s V.P. of Sales and Marketing, says, “Access control is as much about convenience as it is security. If a solution isn’t easy for customers to use, doors will remain propped open and the system can’t do its job. Our new mobile solution makes it possible for employees to always have their credentials with them, even when they’re not carrying a purse or wallet. It’s another way we are using cutting-edge technology to deliver ‘advanced simplicity’ to the security marketplace.”
Getac has announced the launch of the new F110-Ex fully-rugged tablet, as an enhancement to its popular F110 model, designed to deliver unrivalled efficiency, reliability and safety to workers in hazardous environments. In many industrial sectors, extreme temperatures, poor weather conditions and close contact with dangerous substances are all factors to contend with daily. Workers need devices they can rely on for efficient field maintenance, accurate safety checks and equipment monitoring tasks. IT failure not only has a significant impact on productivity, it also puts lives at risk. Functionality in extreme conditions The F110-Ex features intrinsic safety design limiting electrical and thermal energy output to a level below that required to ignite hazardous atmospheric mixtures The new F110-Ex fully-rugged tablet has been designed with this in mind. Featuring an 11.6-inch sunlight readable display and weighing just 1.49kg, it is both versatile and compact providing reliable operation in the field. MIL-STD810G and IP65 water and dust resistance certifications ensure seamless operation in wet, dirty environments, while an operating temperature range of -21°C to +60°C ensures full functionality in even the most extreme conditions. The F110-Ex features intrinsic safety design limiting electrical and thermal energy output to a level below that required to ignite hazardous atmospheric mixtures. Like all of Getac’s Ex fully-rugged tablets it is certified to ATEX, UL913 and IECEx standards, for complete operator safety. Powering digital transformation Advances in AI and IoT technologies are powering digital transformation across all industrial sectors and the F110-Ex allows those businesses working in hazardous environments to fully benefit from productivity and process improvements and migrate legacy paper-based documentation to live and even cloud solutions.Full data protection is provided by Windows 10, with an optional face recognition camera compatible with Windows Hello Chris Bye, President at Getac U.K. Ltd, comments, “The F110-Ex enables users to safely collect and send digital data, capture images and even engage in video communication in high-risk environments, helping enterprises complete the last mile of digital transformation.” Exceptional performance and security Equipped with the 7th generation Intel Kaby Lake Core processors and multi-factor security mechanisms, the F110-Ex provides exceptional computing power and secure authentication. Full data protection is provided by Windows 10, with an optional face recognition camera compatible with Windows Hello, as well as bar code scanner and (LF/HF) RFID reader. As one of the world’s leading rugged tablet solution providers (source VDC 2018), Getac offers a comprehensive portfolio of vertically integrated solutions for all types of extreme operating conditions. In addition to the new F110-Ex, Getac’s fully rugged tablet portfolio includes the EX80, ZX70, T800 and other ATEX-certified models, all delivering exceptional ruggedness and performance for hazardous industries.
LOCKEN was established in 2003, combining the knowledge and expertise of its three founders, Arnaud Flecchia, Roland de la Chapelle and Stéphane Conreux. Well established within the telecom and IT world, this threesome has transformed the business of access control: thanks to breakthrough technology, based on intelligent keys and user-friendly software, they brought to the market a solution that required no wiring or maintenance. This was a remarkable leap forward that has fully benefited major telecom, energy and water distribution infrastructures, where isolated and sensitive, external sites are the norm. LOCKEN Key and Web Request software 2014 saw the advent of the MyLocken application and new customised services were developed around access control In 2004, just a year after the company was setup, the LOCKEN key was sending its data via a remote device directly connected to the system. Awarded the "Trophée de l'innovation" in 2007, LOCKEN picked up the pace of innovation from then on. In 2009, the company released the LOCKEN Web Request software application, a complementary module improving coordination of the activities of technicians on sites. 2014 saw the advent of the MyLocken application and new customised services were developed around access control. The following year, the application took on a new dimension to meet the specific needs of customers with customised functions, such as authorisations, declarations of presence on site and reporting of anomalies, combined with new technologies like beacon and RFID. LOCKEN Smart Access In 2015, LOCKEN completed development of the software application termed LOCKEN Smart Access (LSA) In 2015, LOCKEN completed development of the software application termed LOCKEN Smart Access (LSA), the first multi-technology access management platform, making it a major breakthrough that would emerge as the cornerstone of its future strategy, since the system could now control different types of identifiers such as keys, badges and smartphones. In 2017, LSA's ergonomics were upgraded to a more graphic approach, in line with new practices using applications like Google Maps. Contactless Key and Bluetooth module Over time, major companies in the transport, industry, banking, and local government sectors have followed the lead of multi-site companies and turned to LOCKEN, attracted by its "customer business line optimisation" philosophy. In 2016, the merger with the Italian manufacturer ISEO opened up new avenues: the contactless key with a Bluetooth module arrived on the scene. More efficient and more secure, it has allowed LOCKEN to build leading-edge equipment into its offering. And to empower, today, its customers with tomorrow's cutting-edge technology.
From satellite imagery to street views to indoor mapping, technology has disrupted our past world. This has left us dependent upon new ways to visualise large spaces. This new world has brought many benefits and risks. But what does that mean for the security professional or facility manager today and what technologies can be used to secure buildings and improve facility operations? A brief history of 3D technology Starting May 5, 2007 (inception 2001), Google rolled out Google Street View to augment Google Maps and Google Earth; documenting some of the most remote places on earth using a mix of sensors (Lidar/GSP/Radar/Imagery). The mission to map the world moved indoors May 2011 with Google Business Photos mapping indoor spaces with low cost 360° cameras under the Trusted Photographer program. In the earlier days, 3D scanning required a high level of specialisation, expensive hardware and unavailable computing power With the growth of 3D laser scanning from 2007 onwards, the professional world embraced scanning as effective method to create digitised building information modelling (BIM), growing fast since 2007. BIM from scanning brought tremendous control, time and cost savings through the design and construction process, where As-Built documentation offered an incredible way to manage large existing facilities while reducing costly site visits. In the earlier days, 3D scanning required a high level of specialisation, expensive hardware, unavailable computing power and knowledge of architectural software. Innovation during the past 8 year, have driven ease of use and lower pricing to encourage market adoption. Major investments in UAVs in 2014 and the commercial emergence of 360° photography began a new wave of adoption. While 3D scanners still range from $20K – $100K USD, UAVs can be purchased for under $1K USD and 360° cameras for as low as $100. UAVs and 360° cameras also offer a way to document large spaces in a fraction of the time of terrestrial laser scanners with very little technical knowledge. Access to building plans, satellite imagery, Google Street View, indoor virtual tours and aerial drone reconnaissance prove effective tools to bad actors The result over the past 10+ years of technology advancement has been a faster, lower cost, more accessible way to create virtual spaces. However, the technology advances carry a major risk of misuse by bad actors at the same time. What was once reserved to military personal is now available publicly. Access to building plans, satellite imagery, Google Street View, indoor virtual tours and aerial drone reconnaissance prove effective tools to bad actors. Al Qaeda terror threats using Google Maps, 2007 UK troops hit by terrorists in Basra, 2008 Mumbai India attacks, 2016 Pakistan Pathankot airbase attacks, ISIS attacks in Syria using UAVs, well-planned US school shootings and high casualty attacks show evidence that bad actors frequently leverage these mapping technologies to plan their attacks. The weaponization of UAVs is of particular concern to the Department of Homeland Security: "We continue to face one of the most challenging threat environments since 9/11, as foreign terrorist organisations exploit the internet to inspire, enable or direct individuals already here in the homeland to commit terrorist acts." Example comparison of reality capture on the left of BIM on the right. A $250 USD 360° camera was used for the capture in VisualPlan.net software What does this mean for the security or facility manager today? An often overlooked, but critical vulnerability to security and facility managers is relying on inaccurate drawing. Most facilities managers today work with outdated 2D plan diagrams or old blueprints which are difficult to update and share.Critical vulnerability to security and facility managers is relying on inaccurate drawing Renovations, design changes and office layout changes leave facility managers with the wrong information, and even worse is that the wrong information is shared with outside consultants who plan major projects around outdated or wrong plans. This leads to costly mistakes and increased timelines on facility projects. Example benefits of BIM There could be evidence of a suspect water value leak which using BIM could be located and then identified in the model without physical inspection; listing a part number, model, size and manufacture. Identification of vulnerabilities can dramatically help during a building emergency. First Responders rely on facilities managers to keep them updated on building plans and they must have immediate access to important building information in the event of a critical incident. Exits and entrances, suppression equipment, access control, ventilation systems, gas and explosives, hazmat, water systems, survival equipment and many other details must be at their fingertips. In an emergency situation this can be a matter of life or death. Example benefit of reality capture First Responders rely on facilities managers to keep them updated on building plans A simple 360° walk-through can help first responders with incident preparedness if shared by the facility manager. Police, fire and EMS can visually walk the building, locating all critical features they will need knowledge of in an emergency without ever visiting the building. You don’t require construction accuracy for this type of visual sharing. This is a solution and service we offer as a company today. Reality capture is rapidly becoming the benchmark for facility documentation and the basis from which a security plan can be built. Given the appropriate software, plans can be easily updated and shared. They can be used for design and implementation of equipment, training of personnel and virtual audits of systems or security assessments by outside professionals. Our brains process visual information thousands of times faster than text. Not only that, we are much more likely to remember it once we do see it. Reality capture can help reduce the need for physical inspections, walk-throughs and vendor site-visits but more importantly, it provides a way to visually communicate far more effectively and accurately than before. But be careful with this information. You must prevent critical information falling into the hands of bad actors. You must watch out for bad actors attempting to use reality capture as a threat, especially photo/video/drones or digital information and plans that are posted publicly. Have a security protocol to prevent and confront individuals taking photos or video on property or flying suspect drones near your facility and report to the authorities. Require authorisation before capturing building information and understand what the information will be used for and by who.There are a number of technologies to combat nefarious use of UAVs today Nefarious use of UAVs There are a number of technologies to combat nefarious use of UAVs today, such as radio frequency blockers and jammers, drone guns to down UAVs, detection or monitoring systems. Other biometrics technologies like facial recognition are being employed to counter the risk from UAVs by targeting the potential operators. UAVs are being used to spy and monitor for corporate espionage and stealing intellectual property. They are also used for monitoring security patrols for the purpose of burglary. UAVs have been used for transport and delivery of dangerous goods, delivering weapons and contraband and have the ability to be weaponised to carry a payload.Investigating reality capture to help with accurate planning and visualisation of facilities is well worth the time The Federal Aviation Administration has prevented UAV flights over large event stadiums, prisons and coast guard bases based on the risks they could potentially pose, but waivers do exist. Be aware that it is illegal today to use most of these technologies and downing a UAV, if you are not Department of Justice or Homeland Security, could carry hefty penalties. Facility managers must have a way to survey and monitor their buildings for threats and report suspicious UAV behaviours immediately to authorities. At the same time, it’s critical to identify various potential risks to your wider team to ensure awareness and reporting is handled effectively. Having a procedure on how identify and report is important. Investigating reality capture to help with accurate planning and visualisation of facilities is well worth the time. It can help better secure your facilities while increasing efficiencies of building operations. Reality capture can also help collaboration with first responders and outside professionals without ever having to step a foot in the door. But secure your data and have a plan for bad actors who will try to use the same technologies for nefarious goals.
In 1901 New York state made a pioneering regulation move and became the first US state to require automobile owners to register their vehicles. This marked the beginning of regulation on modern traffic, which - following decades of development - resulted in a multi-layer concept of regulation relating to vehicles and driver’s licenses, traffic signs and insurance mechanisms that we are all familiar with nowadays. While certain parallels can be drawn between the early days of cars and our contemporary experience with quadcopters, we are facing a new challenging era that is far more complex to organise and regulate. Integrating drones in existing regulatory ecosystem Similar to other pioneering technologies in the past, drones need to integrate into a long existing and well-balanced ecosystem, the rules of which have first been drafted some one hundred years ago and have evolved without taking vehicles such as drones into account. Yet the safety risks related to aviation hinder the quick integration of drones into that ecosystem, broadening the gap between existing regulatory landscape and the exponentially growing popularity and ever-advancing technology of drones. The safety risks related to aviation hinder the quick integration of drones into the legislative ecosystem For the past several years, governments and legislators have been trying to tackle this problem by trying to answer two questions: how to properly integrate drones into the airspace without creating a hazardous impact on existing airborne operations, and how to enforce regulations in order to prevent the side-effects related to careless or malicious drone flights, taking into consideration public safety and physical security. Counter-UAS measures and regulations Up until 2018, legislators tried to tackle these two questions as a whole by introducing bundled legislation drafts covering the entire landscape of gaps they needed to address, which resulted in multi-parliamentary committee efforts both in the US and abroad to review and approve each bill - a process that is very slow by design. It was only in the beginning of this year that the issues were starting to be addressed separately: legislation related to limitations and counter-drone measures on the one hand, and legislation related to integration into airspace on the other. Let’s take a closer look at Counter-UAS (unmanned aerial systems) measures and what makes them challenging in terms of regulation. Over the past years, various counter-drone technologies have been introduced to enable control over rogue drones in order to either stop them from achieving their flight purpose or prevent them from creating safety hazards to people or property. These measures can be grouped into 3 types of technologies: Military grade solutions - including lasers and surface-air missiles Kinetic solutions - including net-guns and autonomous drones set out to catch the rogue drone and disable it airborne Non-kinetic RF-based solutions - aimed at either disabling, disrupting or accessing the drone’s communications channels in order to trigger a return-to-home function, or guide the drone into a safe landing route Aside from combat military operations, the legality of using the above technologies is questionable as they tamper with an airborne aircraft, might be considered as wiretapping and/or violate computer fraud laws. Therefore, one can conclude that unless changes to regulation are made, non-military facilities will continue to be defenceless from and vulnerable to rogue drones. One can conclude that unless changes to regulation are made, non-military facilities will continue to be defenceless from and vulnerable to rogue drones European c-UAS legislation Next, let’s look at the state of c-UAS legislation in both Europe and US to better understand different legislative ecosystems and how they affect the possibilities of using counter drone measures. In the European Union, there is currently no uniform legislation, and the member countries rely on their own existing legal infrastructures. Roughly speaking, most countries use a method of exemptions to the communications and aviation laws to allow the use of counter drone measures after a close examination by the relevant authorities. Such exemptions are approved under scrutiny to particular sites, which provide some relief, but they do not allow broad use of countermeasures. Further discussion regarding a broader regulation change, on a country level or EU-wide, is only preliminary. US c-UAS legislation Preventing Emerging Threats - provides an initial infrastructure for counter drone measures to be used by various DoJ and DHS agenciesUnlike the EU, in the US exemptions are not possible within the existing legal framework, and the possible violation of US code title 18 means that the hands of both the government or private entities are tied when attempting to protect mass public gatherings, sports venues, or critical infrastructure. Therefore, it was more urgent to introduce legislation that would allow countermeasures to some extent. In September, US Congress approved the FAA-reauthorisation act for the next 5 years (H.R. 302), which was shortly after signed by the President and came into effect. Division H of the act - Preventing Emerging Threats - provides an initial infrastructure for counter drone measures to be used by various DoJ (Department of Justice) and DHS (Department of Homeland Security) agencies under strict limitations. However, the act avoids determining which technology the agencies should use, yet it requires minimal impact on privacy and overall safety in order to strike the necessary balance. This is the first profound counter-drone legislation and is expected to be followed by additional measures both in the US and in other countries. Updating counter-drone legal infrastructure In summary, 2018 has been a pioneering year for counter-drone legislation, and while technology already allows taking action when necessary, legal infrastructure needs further updates in order to close the existing gaps: covering additional federal assets, state-level governments, and private facilities of high importance, such as critical infrastructure sites. Legislators in the US and around the world need to continue working in a rapid tempo to keep up with the growing threat of drones. As with cars a century ago, the number of accidents will rise with the increase in time taken to regulate.
The use of drones has increased dramatically in the last few years. Indeed, by 2021, the FAA says the number of small hobbyist drones in the U.S. will triple to about 3.55 million. With that growth, drone capabilities have increased while costs have decreased. For example, the DJI Phantom 4 can deliver a 2-pound payload to a target with 1.5m accuracy from 20 miles away for the less than $1000.00. This is an unprecedented capability accessible to anyone. This new technology has created an entirely new security risk for businesses and governments. Drone security risks Already, rogue groups such as ISIS have used low cost drones to carry explosives in targeted attacks. Using this same method, targeting high profile locations within our borders to create terror and panic is very possible. Security professionals and technologists are working furiously to address the gaps in drone defence. Currently, the most common technologies in use for drone detection are video, acoustic sensors, radio, and air surveillance radar. Each of these has advantages, but they also have flaws that make it difficult to detect drones in all conditions. Both optical and thermal cameras, as well as acoustic sensors, do not operate in severe weather such as fog and snow. And while radio and air surveillance radar cover a wide area of detection, they suffer from high installation costs and limiting technical challenges, such as being unable to detect low flying drones on autopilot. Compact Surveillance Radar (CSR) Compact Surveillance Radar (CSR) is a security technology addressing the problems with other types of detection. CSR, like traditional radar, has the benefit of being able to detect and track foreign objects in all weather conditions, but at a fraction of the size and cost. The compact size allows the radar to be mounted on existing structures or even trees, providing extensive perimeter defence almost anywhere that you can imagine. CSR can also filter out clutter such as birds by using an advanced algorithm reducing the number of false alarms. While the use of CSR and the other detection technologies are legal in the US and in most locations throughout the world, the response mechanisms are generally not. Current regulations in the US prohibit the use of jamming or GPS spoofing in all cases except for a few federal agencies Regulations limiting drones Current regulations in the US prohibit the use of jamming or GPS spoofing in all cases except for a few federal agencies. This makes it difficult to stop the damage that drones can cause. The FAA has put into place new regulations that limit some uses of drones. However, in most cases it is still illegal for even state or local governments to stop or interfere with drones other than to locate the operator and have them land the drone. In 2016 the first law to neutralise a drone in the United States was passed in Utah to respond to drones in wildfire areas because of their interference with airborne firefighting. This law may very well provide a model for other states dealing with drones in situations where people’s lives are being put at risk by drones. At the federal level, much effort is being put into evaluating the regulations and technology surrounding the misuse of drones. In the 2016 reauthorisation bill for the FAA, Section 2135 included a pilot program for the investigation of methods to mitigate the threat of unmanned aircraft around airports and other critical infrastructure. There are many federal agencies that are evaluating the use of a variety of technologies to respond to this threat. Both optical and thermal cameras, as well as acoustic sensors, do not operate in severe weather such as fog and snow Effective countermeasure technologies The most effective countermeasure for drones is jamming, currently off-limits to the private sector. This includes stadiums, convention centres, and other large gathering areas. A number of companies are developing new response technologies that do not require the use of jammers or hacking. Several companies have developed net guns that shoot a net at an approaching drone. These are only effective at less than 100m and frequently miss the target, especially when the drone is approaching at high speed. Several other companies have taken this method a step further, with drones that capture other drones. Once a radar detects a drone, another defence drone is launched and flies to the point of detection. Then, using video analytics it homes in on the drone and fires a net to disable the drone and take it to a safe location. While this drone capturing technique is still in its infancy, it shows a great deal of promise and will not be restricted in the same fashion as jamming. However, even this solution is difficult under current regulations, as all commercial drones in the US must be under direct control of a human operator within their line of sight. This effectively means that a drone operator is required to be on-site at all times to protect a facility, event, or persons. One thing is for certain, technology will continue to adapt and security companies will continue to invent new methods to protect their facilities and the people they are sworn to protect.
I have been thinking a lot about the U.S. government’s ban on video surveillance technologies by Hikvision and Dahua. In general, I question the wisdom and logic of the ban and am frankly puzzled as to how it came to be. Allow me to elaborate. Chinese camera manufacturers Reality check: the government ban is based on concerns about the potential misuse of cameras, not actual misuse. Before the government ban, you occasionally heard about some government entities deciding not to use cameras manufactured by Chinese companies, although the reasons were mostly “in an abundance of caution.” Even so, I find the targeting of two Chinese companies – three if you count Hytera Communications, a mobile radio manufacturer – in a huge government military spending bill to be a little puzzling. I can’t quite picture how these specific companies got on Congress’s radar. The government ban is based on concerns about the potential misuse of cameras, not actual misuse What level of lobbying or backroom dealing was involved in getting the ban introduced (by a Missouri congresswoman) into the House version of the bill? And after the ban was left out of the Senate version, was there a new wave of discussions to ensure it was included in the joint House-Senate version (with some minor changes, and who negotiated those?). It all seems a little random. Concerns for the U.S. Furthermore, the U.S. ban solves neither of the two main concerns that are generally used as its justification: Concern: Cybersecurity. The U.S. ban “solves” the issue of cybersecurity only if both of the following statements are true. No security system that uses a Hikvision or Dahua camera or other component is cybersecure. Any system that does not use a Hikvision or Dahua camera or other component is cybersecure. What level of lobbying or backroom dealing was involved in getting the ban introduced into the House version of the bill? The ban ignores the breadth and complexity of cybersecurity and instead offers up two companies as scapegoats. Our industry has sought to address cybersecurity, and the one principle that has guided that effort is that cybersecurity is an issue that must be addressed by manufacturers, consultants, integrators and end users – in effect, everyone in the industry. Cybersecurity does not begin and end with the manufacturer and banning any manufacturers from the market does not ensure better cybersecurity. Concern: “Untrustworthy” Chinese companies. Hikvision and Dahua are only two Chinese companies. Any response to concerns about whether Chinese companies are trustworthy would need to cover many more companies that manufacture their products in China. Australian TV recently claimed that “all Chinese companies pose a risk. Because of Chinese laws, there is a requirement for companies to be engaged in espionage on behalf of the state.” Even if one embraces that extreme view, the logic fails when only two companies are targeted. One source told me that 60 to 65 percent of the global supply of commercial video cameras are manufactured in China, so it’s a much bigger issue than two companies.The Chinese government has much more effective ways of conducting espionage than exploiting security cameras And is U.S. security at risk unless or until it is cut off from more than half of the world’s supply of video cameras? Even Western camera companies manufacture some of their cameras and/or components in China. Why name only two (or three) companies, only one of which has ties to the Chinese government? If the goal of the U.S. ban was to address the possibility of cybersecurity and/or espionage by the Chinese government, shouldn’t there be other companies and product categories included? Clearly, video surveillance is not the only category that has the potential for abuse. The Chinese government has much more effective ways of conducting espionage than exploiting security cameras. Global response to U.S. ban And now that the U.S. ban has been passed, how is the ban being misused to justify a new level of alarm about Chinese companies? Australian television effortlessly made the leap from “software backdoors” to a concerted and organised effort by the Chinese government to use cameras to be the “number one country for espionage.” And it’s not just about government facilities: “Even on the street, [cameras] have the potential to inadvertently contribute toward Chinese espionage activity by providing real-time information about the situation on the ground,” says the Australian TV report. If all Chinese companies pose a risk, why is the U.S. government targeting specific companies rather than all Chinese companies? If all Chinese companies pose a risk, why is the U.S. government targeting specific companies rather than all Chinese companies, or at least those with electronics or computer products that could be used for espionage? What about the espionage potential of the 70% of mobile phones that are made in China? What about other consumer electronics such as PCs or smart TVs? How many government facilities that are eliminating Dahua and Hikvision cameras have employees who use iPhones or use other electronic equipment from China? Artificial intelligence & IP-over-coax Also, consider the impact of the ban on business. Hikvision and Dahua have had many successes in the video surveillance market, including in the U.S. market. They have added value to many integrators and end user customers. They have been on the forefront of important trends such as artificial intelligence and IP-over-coax. And, yes, they have made technologies available at lower prices.Cybersecurity issues have plagued several companies in the industry, not just Hikvision and Dahua Cybersecurity issues have plagued several companies in the industry, not just these two, and both Hikvision and Dahua have worked to fix past problems, and to raise awareness of cybersecurity concerns in general. Is a U.S. ban on two companies an appropriate response to a series of geo-political concerns that are much bigger than those two companies (and bigger than our entire market)? Should two companies take the brunt of the anti-Chinese backlash? Video surveillance cameras Is the video surveillance market as a whole better or worse for the presence of Hikvision and Dahua? Is it up to the U.S. government to make that call? In some ways, thoughts of Chinese espionage are a sign of these uncertain political times. Fear of video surveillance is perfectly congruent with long-standing anxieties about “Big Brother;” suspicion about China taking over our video cameras just rings true at a time when Russia is (supposedly) controlling our elections. But should two companies be targeted while broader concerns are shrugged off?
ADT is looking to "bring the voice of the customer" into the continuing development and expansion of Z-Wave, the radio frequency (RF) communication and product-level interoperability technology that enables wireless networking of battery-powered devices in the home. ADT is the newest Principal Member of the Z-Wave Alliance consortium. Z-Wave is one of the enabling technologies of ADT’s Pulse security and home automation system, which enables a home's electronics to communicate with each other and with the user. Z-Wave unifies devices like door locks and lighting controls into an integrated network. ADT is the Z-Wave Alliance’s seventh and newest Principal Member, and also the first service-based company represented on the Z-Wave Board of Directors. The other Principal Members are original equipment manufacturers GE/Jasco, Ingersoll-Rand, Linear, Evolve, FAKRO and Sigma Designs. “As a service provider who touches the end user directly, we bring a different perspective that rounds out the Z-Wave board,” says Steve Shapiro, ADT’s Vice President of Industry Relations. ADT was previously a full-level member and has been active in the Z-Wave Alliance since implementing Z-Wave as part of ADT Pulse. Becoming a Principal Member “reaffirms [ADT’s] commitment to the technology going forward,” he adds. The Z-Wave Alliance oversees development and implementation of the technology. The Alliance is made up of member companies participating at various tiers in technology working groups and accessing the technology to develop products. The Z-Wave Alliance includes 160 full-level members involved in developing products and about 110 Affiliate members (mostly resellers and installers). At the top level of the Z-Wave Alliance are the companies that guide development and implementation of the technology, the Principal Members whose representatives make up the Alliance Board of Directors. Shapiro is joining the Z-Wave Alliance Board. Z-Wave technology is used throughout the security and home automation markets, enabling radio frequency (RF)communication and product-levelinteroperability among battery-powereddevices in the home Z-Wave technology is used throughout the security and home automation markets, enabling radio frequency (RF) communication and product-level interoperability among battery-powered devices in the home, including climate controls, door locks, security sensors, appliances and remote control. There are 1,000 or so products from 100 companies that are Z-Wave certified, which means they communicate within a 50-foot range using low power consumption that allows one- or two-year battery life. Mesh networks of these devices, each communicating and also relaying signals from other devices, can extend the operable range to cover an entire house or small commercial facility. Z-Wave enables greater wireless networking in the home and realization of home automation systems with more capabilities. “ADT adds a complementary view to the board based on their knowledge of customer needs,” says Mark Walters, Z-Wave Alliance chairman. “Having North America’s leader in residential security advising the Z-Wave Alliance at the Board level brings a focus to that market segment in terms of guiding the alliance in both marketing and technical development. Security companies now have someone representing them who understands and directly participates in their business.” Principal Members must be nominated by an existing Principal Member and then approved by the Board of Directors. “We are not just a security company, but a service provider for home and business automation,” Shapiro says. “Security is a great platform for automation, and it’s a natural combination.” He notes that 44 percent of ADT customers opt for the ADT Pulse service, and the number has been climbing quarter over quarter since 2010. “It confirms how the different kinds of systems make sense together,” he says.
Most retailers invest in a video surveillance solution to improve security. Many also use it as an investigation tool to help resolve customer disputes, liability claims and reduce losses from theft and fraud. Intelligent video solutions Complete Releaf relies on its intelligent video solution for all of those reasons, however compliance with state regulations was the primary objective when CEO and owner Eric Ryant started looking for a video system for his new, 3,000 square foot cannabis dispensary in Lafayette, Colorado. Unlike many other types of retail environments, cannabis dispensaries must comply with strict rules governing the type of video surveillance equipment used, where cameras and equipment are placed, and how long video evidence must be retained. Already familiar with the regulations based on his experience operating a second dispensary and a cultivation centre in Lafayette, Colorado, Ryant sourced multiple bids for his new video solution. In the end, I selected the March Networks proposal. It had everything I was looking for, including POS integration, and additional capabilities" POS integration “Once all the bids were in, I went through the process of analysing each one and ended up narrowing the contenders down to two,” said Ryant. “In the end, I selected the March Networks proposal from our systems integrator, Falcon Networks. The solution had everything I was looking for, including POS integration, and additional capabilities I thought might be useful down the road. It met all of the compliance criteria, and the price was comparable.” Prior to opening the boutique dispensary in January 2018, Ryant worked with its system integrator to design and install a fully-compliant video solution. IR dome cameras Today, IR dome cameras mounted inside the dispensary capture clear 4MP video of all activity at entrances and exits, in storage and equipment rooms, and at each point-of-sale (POS) system. In addition, 360° cameras are installed above the sales floor and in every corner to provide further panoramic coverage. The 360° cameras are also installed on the dispensary’s exterior to capture people entering and exiting, as well as any activity in the surrounding parking lot and back loading area. The cameras were selected and placed strategically to ensure that the system meets multiple legislated requirements, such as recording all activity occurring within 20 feet of any ingress/egress point, capturing clear video in all lighting conditions, and making sure that the recorded video is sharp enough to identify customer and employee facial features at each POS. Hybrid network video recorder At the centre of Complete Releaf’s video solution is a hybrid network video recorder (NVR) At the centre of Complete Releaf’s video solution is a hybrid network video recorder (NVR). The recorder provides IP and analog video capture and unparalleled reliability through features such as diagnostic LEDs, an internal battery backup, and a customised embedded Linux operating system. All IP channel licenses are included with the recorder, making it a convenient and cost-effective option for the dispensary. Equally important, the recorder provides Complete Releaf with 32TB of internal storage, so it is compliant with the state’s 40-day video retention requirement. “Essentially, we need 100 percent coverage with no ‘blind spots’ on our retail floor, and a clear picture of people’s faces. It’s a truly reliable product, and we’ve had no difficulties achieving our 40 days of archived video,” said Ryant. Searchlight intelligent software While security and compliance were both top priorities for Ryant, finding a video solution that would also help him run Complete Releaf more efficiently – and profitably – was also important. That’s why he’s so pleased with the March Networks Searchlight for Retail application software he is also using. The intelligent software enables Ryant and his team to proactively identify and review suspect transactions using integrated video and transaction data pulled from the dispensary’s Green Bits POS system. It provides them with an easy-to-use loss prevention tool that reduces the time it takes to investigate incidents from hours to minutes. It also arms them with strong video and data evidence to support successful prosecutions or recoveries. Ryant is also testing the Searchlight application in his cultivation facility “Having video surveillance in our dispensary definitely deters theft,” said Ryant. “Combining the video with transaction data goes a step further and really causes people to think twice before they do something they’ll probably regret.” Radio Frequency Identification tags Ryant is also testing the Searchlight application in his cultivation facility, taking advantage of the software’s ability to integrate with data from the Radio Frequency Identification (RFID) tags he is required to add to each plant through the cultivation process as part of Colorado’s Inventory Tracking System (Metrc). The software would enable Ryant to leverage his RFID investment by making the data searchable in the dashboard and tying it to recorded video. If there’s ever an incident during the cultivation process, Ryant could use the software to easily locate the video footage to see what actually happened and who was involved.
Losing keys is a given. It’s just something that happens at some point. One study in the UK estimated around 10,000 annually end up just in the refuse, by mistake*. At CROUS Montpellier student accommodation block in southern France, they sought a solution to lost keys and the other hassles of managing an outdated mechanical master-key system for a large facility with a transient population. Aperio wireless locking devices CROUS Montpellier fixed lost key problems by exchanging their mechanical locks for Aperio cylinders. Aperio wireless locking devices with built-in RFID readers are already trusted at universities all over Europe to protect staff, students and assets against burglary and unauthorised intruders. Easy-to-fit Aperio locks have transformed facility management for the accommodation block. To date, 1,500 wireless Aperio cylinders are seamlessly integrated online with their ARD security system, which gives facility managers an overview of block security in real time. Aperio cylinders integrated with ARD security system Now, when a student loses their key-card, it’s simple for a site manager to cancel the old credential and issue a new one. There is no need to engage a locksmith to replace physical locks, saving everyone’s time and CROUS money. A constant drain on resources has been eliminated. Aperio easily integrates with payment and other smart-card systems, as well as access control Because Aperio integration at CROUS is online, managers block lost credentials quickly using the software, without visiting the door. It is just as easy to de-authorise credentials for students who leave, even if they forget to return their smart-card. An operator simply removes them from the system database, and they are locked out. Aperio-access control system integration Aperio easily integrates with payment and other smart-card systems, as well as access control. “Aperio provides a comfortable access solution. Our students can access their accommodation, use the printer and pay in the canteen with the same card,” explains Cyril Combacal at CROUS Montpellier. Because Aperio is easily scalable and can expand any security system when needs change, investments in new wireless locking can be rolled out over time. It has made logistics and budgeting much easier for CROUS. Refurbishment at CROUS Montpellier is ongoing: up to 500 new Aperio cylinders are installed efficiently and wirelessly every year.
The Eurofighter will be equipped with a new generation of radar which will enhance the aircraft’s capabilities and survivability. In the Euroradar consortium, the sensor solutions provider HENSOLDT is pressing ahead with the development of the Eurofighter’s new Captor-E radar system. Following the successful acceptance test, HENSOLDT has now delivered the second antenna ready for series production to Leonardo UK in Edinburgh. This means that the production of the so-called e-scan antenna can commence at the HENSOLDT site in Ulm/Germany according to plan. This paves the way for the delivery of the first radar systems as of mid-2019. Resource management As early as spring 2018, the radar has successfully completed two flight campaigns at British Aerospace Systems (BAES) in Warton and at Airbus Defence and Space in Manching and met the requirements of the Critical Design Review (CDR) exactly on schedule. The Captor-E radar is based on AESA (Active Electronically Scanned Array) technology and will significantly enhance the performance of the Eurofighter The Captor-E radar is based on AESA (Active Electronically Scanned Array) technology and will significantly enhance the performance of the Eurofighter. Electronic beam scanning combined with flexible radar resource management provide outstanding detection performance and ensure simultaneous multi-target tracking, missile guidance and perception of the situation. The Eurofighter’s nose is larger than that of all the comparable fighters, which means that the antenna is much larger and consequently more powerful than that of competing aircraft. Radio-frequency components This, together with the ability to mechanically rotate the antenna with a larger angle of view, increases both the detection area and the field of regard in comparison with the AESA radar systems used by the competitors. The further development of radar technology is one of the main focal points of the sensor specialist HENSOLDT. For this reason, HENSOLDT operates one of the largest cleanroom production lines for radio-frequency components in Europe. HENSOLDT’s radar systems are deployed worldwide by armed forces, including the US and German Navy, as well as at the bases of the Canadian, Australian and German Air Force. The Eurofighter radar is being developed by the Euroradar consortium comprising Leonardo (Great Britain, Italy), Indra (Spain) and HENSOLDT (Germany). The consortium has already developed and produced more than 400 Captor radars.
The Polizei Bayern successfully opened its first operations centre in mid-September at its Police Headquarters in Central Franconia in Nuremberg. At the heart of the communication system was the Frequentis 3020 LifeX platform including digital radio connections and the newly developed AudioHub. The headquarters in Nuremberg is the second largest operations centre in the German state of Bavaria. It comprises 21 operator working positions that receive and process between 800 and 1,200 police calls per day. In the event of an emergency, an additional 13 operator working positions can be activated. Dispatch calls successfully Within the first week of operation the system was put to the test during a storm which led to over 900 emergency calls in the space of seven hours Within the first week of operation the system was put to the test during a storm which led to over 900 emergency calls in the space of seven hours. The system proved its stability and operators were able to dispatch calls successfully without issue. "The professionalism of Frequentis during the preparation, implementation and follow-up commissioning of the system gave us confidence in their abilities. All of the aspects important to us as customers were immediately considered and processed by the Frequentis team. Above all, the usability of the system was well received by the operators.", said Anton Beierweck, Head of State-wide IT Procedures at the Police Headquarters Upper Bavaria South. Provides highest protection LifeX was first deployed for Bavarian Police Force in 2015, ahead of the G7 summit. The system was adapted to the needs of the event which required 18,000 emergency services personal to protect government leaders and control demonstrations. The police headquarters of Mittelfranken is the pilot for the rollout of nine additional control rooms in Bavaria through October 2020 "What has been clear from the start of the project is the willingness of the Polizei Bayern to innovate. We are very proud to have met their high requirements in terms of technology and services and appreciate the professional cooperation with the organisation who provides the highest protection and security in Bavaria.", Robert Nitsch, Frequentis Vice President Public Safety. The police headquarters of Mittelfranken is the pilot for the rollout of nine additional control rooms in Bavaria through October 2020. Two more operational centres are planned to be brought on line before the end of 2018.
In the booming workspace market, a professional welcome is crucial to success. At Barcelona’s Gran Vía Business Centre, 2,500m2 of offices and shared collaborative workspaces in the heart of the city, managers chose SMARTair wireless access control system — because it protects and manages their premises, and also projects the right image for a contemporary co-working environment. Gran Vía is a flexible and well-equipped home for companies from international corporates to local start-ups. Fibre optic broadband, LED lighting, an on-site restaurant and adjacent rental apartments are also part of Gran Vía’s high-end service. This is why, they sought an upgrade and replacement for an existing, out-of-date access control system. SMARTair access control locks SMARTair access control locks now control access to Gran Vía’s six floors of offices, meeting spaces and communal areasGran Vía needed more flexibility and control over access to their premises; a system to seamlessly manage diverse access needs of permanent versus temporary users, and that would cope with rapid personnel turnover. Locking devices must complement the professional, modern image of the workspace, which attracts high-profile, design-savvy business clients. On top of these demands, any new system would have to be fitted without disrupting day-to-day business. SMARTair access control locks now control access to Gran Vía’s six floors of offices, meeting spaces and communal areas. Access requirements change all the time at the business centre, and security managers now have a system where programming and reprogramming access rights is fast and easy. Thanks to the slick, flexible management software behind SMARTair, everything works in the background — keeping site users safe almost without anyone noticing. "SMARTair is an effective solution that is easy to use,” says Esther Portillo, Marketing Director at Gran Vía Business Centre. RFID operated wireless escutcheons SMARTair wireless door and wall devices complement Gran Vía’s contemporary aestheticOver 50 new SMARTair wireless escutcheons are operated with RFID smart-cards, so security is not compromised if an office user loses their credential. Security administrators simply cancel the lost credential’s access rights — much quicker, cheaper and more professional than replacing a traditional mechanical lock. The user gets their new smart-card validated at one of five SMARTair wall updaters: it is the perfect combination of contemporary image and efficient user experience for Gran Vía’s clients. Importantly, SMARTair wireless door and wall devices complement Gran Vía’s contemporary aesthetic. “SMARTair has a modern design and suits our installations perfectly,” confirms Esther Portillo. Bringing more doors into any installed SMARTair system is straightforward, because SMARTair escutcheons fit wood, glass, emergency exit and fire-resistant doors. Gran Vía now has an access control system they can reconfigure and expand to suit both their needs and their clients’.
Hytera, a global provider of innovative Professional Mobile Radio (PMR) communications solutions, announces that it has signed contracts with Secretariat of Public Security of the State of Alagoas, Brazil to provide TETRA communications infrastructure as the expansion of the statewide mission critical communications network and four-year maintenance service. The total contracts value is around 6.5 million US dollars with the infrastructure contract around 1.3 million and the service contract around 5.2 million. “We are excited being chosen as the equipment and service provider of Alagoas’s statewide TETRA system. The state authority shows confidence in Hytera’s ability to deliver advanced and reliable public safety communications networks. For the expansion, we presented the latest development of TETRA technologies,” said John Zhou, the General Manager of Hytera Brazil. “The new contracts as a milestone for Hytera Brazil recognise us not only as a leading TETRA solution provider, but also a trusted service provider, and it is the embodiment of Hytera transformation globally.” In early 2014 Hytera delivered TETRA infrastructure, terminals and dispatcher to the public safety users of State of Alagoas TETRA communications network In early 2014 Hytera delivered TETRA infrastructure, terminals and dispatcher to the public safety users of State of Alagoas, who were modernising its communications systems to better serve the communities and prepare for the global soccer fiesta, the World Cup 2014. The newly signed equipment contract includes 31 sites with Hytera’s latest TETRA innovation, DIB R5 base station. It adopts a maintenance-free, space-saving design and can be installed on walls, antenna masts or in tunnels. Thanks to its low power consumption and passive cooling, it is ideal for use in areas where power supply is critical or where there is a need for battery-based, portable base station solutions. With the expansion of the TETRA network, different public safety forces such as police, firefighters and emergency response in the State of Alagoas will share the network to facilitate optimal cooperation when the situation requires, which is another big step forward by the local authorities to improve the security of the state.