Globally renowned access control and door entry systems provider, Videx has introduced a new range of its 4000 series keypads that offer improved features and enhanced functionality. New range of 4000 series keypads The new range includes three new models that replace the existing keypads and now feature a new adjustable backlit keypad that’s available in a new matt finish 316 Marine grade stainless steel (Suffix /M) or mirror finish stainless steel. The new 4000 series keypad range pro...
Hikvision, the provider of innovative video security products and solutions, exhibited its latest innovative technologies, products and solutions at the China Public Security Expo (CPSE) 2019 in Shenzhen from October 28 to 31. This year marked the second anniversary of Hikvision’s AI Cloud. Hikvision’s presentation was dubbed ‘Fusing Data for a Smarter World’ and showcased its AI Cloud platform which supports integration of IoT and information network data designed to em...
PAC & GDX, global provider of access control and door entry solutions, has announced the availability of its new Architect range of readers. By integrating cutting edge radio frequency identification (RFID), near field communication (NFC) and Bluetooth technologies into the Architect range, PAC & GDX has made it possible for smartphones to be used as an access control identification tool, thereby providing the highest level of convenience, flexibility and ease of operation. Integrating...
Larson Electronics, a Texas-based company with over 40 years of experience spearheading the industrial lighting and equipment sectors, announced the release of an explosion proof network IP camera designed for observation in hazardous locations. This camera is explosion proof, dust proof, ignition proof, weatherproof and tamper resistant providing operators with a live feed from inside tanks, reactors, vessels and more. This camera comes with built-in infrared and a 3-port junction box. Explos...
Kwikset® brand of Spectrum Brands, Inc. – hardware & home improvement division, the pioneer in residential security, introduces Control4® compatibility to its Obsidian™ Electronic Touchscreen Deadbolt with Home Connect™ and the contemporary version of the SmartCode™ 916 Touchscreen Electronic Deadbolt. The new locks were shown at the Control4 booth (#3013) at CEDIA 2019 in Denver. In response to increased dealer demand for Control4 compatibility, two of Kwiks...
Matrix Comsec, a manufacturer of IP based phone systems and voice gateways is participating in GITEX Technology Week 2019, Dubai. During this event Matrix will unveil its server based ANANT UCS and will showcase its complete range of business IP-PBXs, VoIP & GSM gateways and new portfolio of IP communication endpoints. Matrix is going to unveil ANANT UCS at the event. ANANT is an enterprise-grade high capacity, high durability, high scalability and high efficacy software-based communication...
Johnson Controls will exhibit security technologies and platforms that are helping to advance the safety, comfort and intelligence of spaces in order to power the mission of its customers at Global Security Exchange (GSX) in Chicago from Sept. 8 through Sept. 12. In booth #703, Johnson Controls will showcase innovative technologies that work together to construct connected, intelligent facilities in an “Integrated Smart Buildings Command Center.” Attendees will have an inside look into Johnson Controls integrated security, building controls, and life safety offerings that help to create safer, smarter and more sustainable environments. Create smarter, more integrated buildings “As we help empower our customers to create smarter, more integrated buildings, it is important for us to exhibit our solutions in a connected environment instead of having siloed displays,” said Hank Monaco, vice president, marketing, Johnson Controls, Building Solutions North America. “At GSX, we have traditionally demonstrated our security, fire and life safety technologies, but we are excited to also layer in our additional capabilities in building controls and data-driven solutions to reinforce how critical they are to the equation of more secure and intelligent spaces.” Johnson Controls Digital Solutions group will be highlighting the following solutions that work at the nexus of data and business to gather insights that allow for smarter buildings, increased efficiencies and new business value. Assurance Services helps deliver preventative service insights to maintain high availability of security assets Enhancing life-safety standards Connected Converged Security (CCS), a SaaS-based platform that provides proactive, holistic, and smarter security solutions, CCS is a hardware agnostic software solution that enhances health and life-safety standards while providing measurable results and a basis for superior decision-making. As a result, customers can save on operational costs and hardware spend, and improve their security return on investment. Assurance Services and False Alarm Reduction Service (FARS), both offerings analyse data to increase safety, streamline operations and decrease costs through actionable insights into a facility’s space and security considerations. Assurance Services helps to deliver preventative service insights to maintain high availability and reliability of security assets. When problems are detected, a remote resolution team can automatically resolve issues in minutes, rather than days. FARS analyses and identifies alarm patterns to deliver to help reduce false alarms and their associated risks and costs. Identify false alarm triggers Athena Security sends authorities an alert, getting people to the scene faster with an up-to-speed video feed into what’s going onThe software leverages artificial intelligence and machine learning capabilities to identify false alarm triggers and help to stop the activities that trigger them. In addition, cutting-edge startups from Johnson Controls Open Innovation – a global innovation center in Tel Aviv, Israel launched to foster collaboration between the company, customers and the startups to deliver effective solutions worldwide – will be revealing emerging technologies, including: Indoor Robotics A smart robot that operates indoors after-hours to run security and inspection missions, follow up on alerts, detect leaks and fires, patrol the indoor space, learn the environment and respond to various anomalies detected. Weapons detection Athena Security offers a sophisticated AI-driven solution that utilises existing security cameras to work to detect dangerous objects, such as guns and knives, in real-time. The platform sends the authorities an alert, getting the right people to the scene faster with an up-to-speed video feed into what’s going on and where. Evolv Technology, a fully automated high-speed concealed weapons detection solution, integrates firearm and explosives detection with facial recognition for early detection of unauthorised concealed weapons or persons of interest.
SALTO KS- Keys as a Service provides a flexible, cloud-based access control management system that requires no software installation or the added expense of a fully-wired electronic lock product. All that is needed is an online device with an Internet connection. With SALTO KS, you can control admission to all door locations and access needs from anywhere, offering vastly better functionality and performance than a mechanical solution. There’s no need to replace a lock if keys are lost or stolen. Managing doors, keys, and user access levels has never been easier and more secure. Modern physical access control solution SALTO KS allows you to individually define who can enter which doors during which time periodsThe SALTO KS access control dashboard is an easy-to-use and simple-to-manage tool that supports your business needs for a modern physical access control solution that gets all doors online and unifies access with a single cloud solution. SALTO KS allows you to individually define who can enter which doors during which time periods. KS does what no conventional key can do – change, update, or eliminate access rights immediately and from anywhere. The SaltoKS.com website portal gives you the opportunity to quickly and easily determine who enters a property and when. If changes need to be made, then just log in, make the change, and it’s done! No updating of the SALTO KS Tag or SALTO KS access point is necessary. Can you do this with your current lock? Features and benefits Open doors remotely. With SALTO KS ‘Code’ – SALTO KS’ one-time password technology – users can open doors remotely without a key. One of the functional, yet really cool features of SALTO KS is the remote. Gain activity insights. Receive notifications regarding door and user activity. SaltoKS.com provides a message centre that allows users to self-configure messages. For example, learn who entered at what time, or when a door is left open. Messages can be configured to be sent to a number of recipients and to three receiving device types: Email, SMS, and App push notifications. Multiplatform. Manage SALTO KS from any device – phone, tablet, PC – all you need is an online device with an Internet connection. Security. The secure SALTO KS App Code one-time password technology makes sure users have the proper rights to perform changes.
SALTO BLUEnet Wireless has been developed to meet the highest demands related to security and ease. This access control system is networked through Bluetooth RF and is specially designed for doors where real-time control is required. SALTO BLUEnet wireless communication allows stand-alone electronic locks to update a user credential and provide real-time door monitoring. This enhances the performance and capabilities of the SALTO Virtual Network (SVN). SALTO BLUEnet can be installed as an independent system or can complement SALTO SVN in areas of a building where real-time control is required. Features, benefits and functionality Wireless electronic locks provide better cost, convenience, and aesthetics than a wired solution, achieving wired system benefits without the cost of hardwired systems. If radio frequency is interrupted or breaks down, the access system will continue to work, as the virtual network of the battery-operated locks remains operational through SVN. Wireless network communication architecture: One gateway can communicate with 7 nodes and each node can operate up to 16 doors – all by using just one IP address. Designed for easy integration into existing access control systems. SALTO BLUEnet gateways, nodes, and repeaters connect to the system via Ethernet. Advanced security with standard encryption communications. Escutcheons and cylinders receive blacklist information and remove cancelled keys from the system in real-time. Receive audit trail information in real-time. Real-time door control includes: door alarm, intrusion alarm, single lockdown, and remote door opening. Real-time battery control enables maintenance to view escutcheon power status in real-time.
PetroCloud, a provider of security, monitoring and automation solutions for customers with remote operations, announced that it has changed its name from PetroCloud to Twenty20 Solutions. “We’ve studied how to best represent ourselves to our customers, and this name transition is the perfect solution,” said Peter Shaper, interim CEO, Twenty20 Solutions. “Our new name better reflects who we are today and how we serve customers across many different industries.” Integrating security, monitoring and automation Twenty20 delivers real-time vision, intelligence and control into the remote operations of its customers, who work in a range of industries including energy, utilities, agriculture, construction and critical infrastructure. As the company continues expanding into new industries, the name change enables Twenty20 to reflect its broader market appeal and the level of clarity it gives customers into their remote operations. Twenty20 will continue to integrate real-time security, monitoring and automation in one place While the company name has changed, its commitment to serving its customers has not. Twenty20 will continue to integrate real-time security, monitoring and automation in one place and provide customers with unprecedented control of their remote operations. Industrial Internet of Things platform Founded in 2012, the company specialises in delivering surveillance, threat detection, access control and monitoring and automation of operations to customers via its advanced Industrial Internet of Things (IIoT) platform. Whether it’s providing clients with the ability to control who enters and exits remote facilities, protecting in-field assets from theft or vandalism, remotely detecting other threats to the environment or operations, or presenting a dashboard that provides customers with one place where they can see and control everything on their remote sites, Twenty20 is committed to supplying customers with breakthrough solutions to protect and improve their operations, no matter how remote the environment may be.
Legrand | AV Residential Solutions announces its 10-minute training schedule for CEDIA Expo 2019, taking place Sept. 12-14 at the Colorado Convention Center in Denver. In Booth 905, Legrand | AV brands and seven of its key technology partners will conduct 10-minute presentations covering a wide range of topics — all accompanied by giveaways — every half hour for the duration of the show. "Providing a quick and convenient way to learn about a wide of range of topics, our 10-minute trainings have always been very popular with our dealers at CEDIA," said Lauren Theobald, director of marketing at Legrand | AV. Deliver training sessions Legrand | AV will also give away products to participants at each session "This year, we've got a great lineup on tap that touches on every aspect of transforming the smart home. And as always, the giveaways aren't to be missed, so be sure to stop by our booth for all the fun." Over the course of the show, Legrand | AV and its partners will deliver 33 training sessions covering everything from TV mounting to human-centric lighting to remote monitoring and management. The company will also give away products to participants at each session. Presentation schedule A complete presentation schedule is provided below. Thursday, September 12 Time Presented by Title Presenter 10 a.m. On-Q Flat is where it's at! The secret to hiding power and AV cables James Rutherford 10:30 a.m. SANUS SANUS HeightFinder: The trick to saving you serious install time Ryan Hagberg 11 a.m. Luxul Introducing Legrand AV's new remote monitoring & management solution! Brannon Young 11:30 a.m. URC The value of a solid network for home automation platforms Jeff Rogers Noon Josh.ai Dynamics of voice control and the importance of the network Casey Levy-Tulloch 12:30 p.m. Ring Reducing crime in neighborhoods with three "Rings" of security Rich Way 1 p.m. Vantage Lighting for life: demystifying HCL & circadian rhythm Mark Moody 1:30 p.m. Nuvo Advantages of the new integrator-exclusive line of streaming audio players Gerald Willis 2 p.m. Domotz TRUCK ROLLS SUCK – the value out of your company Seth Rubenstein 2:30 p.m. Luxul Free network design with a guarantee! Josh Thurman 3 p.m. MAP The system approach Pat Kittridge 3:30 p.m. Sonos Networking for sound in all living spaces Matt Neumann 4 p.m. Just Add Power J+P AVoverIP: VLAN switching vs. IGMP switching Brian Sandifer 4:30 p.m. Luxul Luxul Epic Mesh: essentials for the connected home Chris Kovacek 5 p.m. Chief Outdoor mounts and AV storage solutions David Albright Friday, September 13 Time Presented by Title Presenter 10 a.m. Domotz TRUCK ROLLS SUCK – the value out of your company Seth Rubenstein 10:30 a.m. On-Q On-Q: RF lighting control – A better design and integration Shenali Parikh 11 a.m. SANUS SANUS HeightFinder: The trick to save you serious install time Ryan Hagberg 11:30 a.m. Luxul Free network design with a guarantee! Josh Thurman Noon IC Realtime Network security: best practices for surveillance Michael Caballero 12:30 p.m. Da-Lite The power of Parallax screen technology Wendy Cox 1 p.m. Just Add Power J+P AVoverIP: VLAN switching vs. IGMP switching Brian Sandifer 1:30 p.m. Vantage Lighting for life: demystifying HCL & circadian rhythm Mark Moody 2 p.m. Josh.ai Dynamics of voice control and the importance of the network Casey Levy-Tulloch 2:30 p.m. Ring Reducing crime in neighborhoods with three "Rings" of security Todd Towey 3 p.m. Luxul Luxul Epic Mesh: essentials for the connected home Chris Kovacek 3:30 p.m. Sonos Networking for sound in all living spaces Brian Yackel 4 p.m. Luxul Introducing Legrand AV's new remote monitoring & management solution! Brannon Young 4:30 p.m. Nuvo A speaker for every space, project, and price point Gerald Willis 5 p.m. QMotion QMotion: Using the QzHub3 for mobile app control and integration Shenali Parikh Saturday, September 14 Time Presented by Title Presenter 11 a.m. Luxul Luxul Epic Mesh: Essentials for the connected home Chris Kovacek 11:30 a.m. Luxul Introducing Legrand AV's new Remote Monitoring & Management Solution! Josh Thurman Noon Luxul Free Network Design with a Guarantee! Josh Thurman
Allied Universal®, a security and facility services company in North America, with headquarters in Santa Ana, California and Conshohocken, Pennsylvania, announces the acquisition of Midstate Security – a fully integrated electronic security and monitoring systems company based in Wyoming, Michigan. Terms of the deal were not disclosed. “The addition of Midstate is the first of many steps we are taking to build-out our technology services business following our platform acquisition of Securadyne Systems earlier this year,” said Steve Jones, CEO of Allied Universal. “This acquisition is an important part of our broader strategy to leverage technology across our entire business footprint.” Innovative security solutions Allied Universal aligns perfectly with Midstate’s mission and overall customer service philosophy" Midstate Security, with revenues exceeding $20 million and 89 employees, is known for providing innovative security solutions and world-class customer service throughout Michigan and the Midwest. Founded in 1980, the company designs, installs, services and maintains security systems for a wide variety of customers. It also provides an array of remote services from its UL listed central station in Wyoming, Michigan. “Allied Universal aligns perfectly with Midstate’s mission and overall customer service philosophy,” said David Nemmers, CEO of Midstate Security. “I am extremely proud of our employees and what we have built, and I am excited about the future growth potential offered by Allied Universal for them and our customers.” Electronic access control Midstate Security will expand the company’s Allied Universal® Technology Services division, which provides electronic access control, video surveillance, fire/life safety, alarm monitoring, emergency communications, hosted /managed services and a variety of Global Security Operating Center (GSOC-as-a-Service) offerings. “Midstate’s ability to expand our geographic reach into the Midwest, as well as their enterprise-class delivery capabilities are both strategically important additions to our business,” said Carey Boethel, president of Dallas-based Allied Universal® Technology Services. “We are excited to be partnering with such a great team as we continue to grow and expand across the US.” Midstate Security was represented by Barry Epstein of Vertex Capital Corp. and the law firm Rhoades McKee PC in the transaction.
There’s almost no installation that goes 100-percent smoothly in the field of video surveillance. Unexpected issues routinely arise that can increase time on the job, cost of the project and frustration. Manufacturers work on the product side to help ensure their products are easy to install and – when troublesome situations do arise – are flexible enough for installers to quickly find a remedy. Importance of ease of installation Ease of installation is a very important part of the project to the system integrator because the cost of labour is variable Ease of installation is a very important part of the project to the system integrator because the cost of labour is variable and can be very expensive. In some cases, the cost of labour to install a camera can be more than the cost of the camera! If labour costs are high – or are more expensive than a system integrator planned – they can lose a great deal of money on a project. If a cautious system integrator includes too high of an estimate for labour in a project bid, his overall bid will to high and it could cost him the project. The easier the camera is to install, the lower the labour cost, subsequently achieving higher savings for end-users. Hence it is essential that camera manufacturers develop products that are easy to install or are flexible in the field for system integrators and installers who know that time is money. Enterprise projects can involve thousands of cameras installed Simplifying installation of cameras Camera installation typically involves an electrician, the camera installer and the person who configures the VMS (Video Management Software). Of course, one person can play all three roles, and in many cases, does, but enterprise projects can involve dozens, hundreds or even thousands of cameras with teams of individuals involved in an installation. The electrician runs conduit with an electrical or PoE (Power over Ethernet) connection to the housing or the backplate of the camera; the installer then installs the camera at that location, hooking it up to power; and then a configurator adds cameras to the network and makes adjustments – renaming the camera, setting the frame rate, enabling WDR (Wide Dynamic Range), and the like. When it’s a project that involves different players for any of these functions, there is the potential for a bottleneck and delay in project completion. And if a system integrator is paying an electrician, installer and software configurator – and they are all three on site waiting for each other to finish – that’s a system integrator’s worst-case scenario. Enhancement through modular cameras Video surveillance camera manufacturers like Hanwha Techwin are producing products that take different roles Video surveillance camera manufacturers like Hanwha Techwin are producing products that take the different roles of electrician, installer and configurator into consideration, allowing them to complete their tasks independently. With a focus on modular design which includes a USB dongle, a device manager, magnetic module and included accessories, the Wisenet X series Plus is one of the fastest cameras to install, service and upgrade – saving installers time and money. Wisenet X series Plus cameras have a detachable camera module that utilise magnets to lock into the housing for instant configuration. Electricians can run conduit with a single PoE connection to the back plate/housing while the configurator is working on configuring the camera module, allowing security professionals to later snap the camera into place in just minutes. The VMS configurator can then come and add the cameras to the network and program their functionality. Modular cameras offer flexibility In the past, an end user might determine after the camera is installed that there aren’t enough pixels on target, or they need certain different functions like video analytics for example, resulting in the time-consuming replacement of the entire camera. With modular-designed cameras, the camera module can be swapped with a new one without having to focus or replace the camera – even to change the resolution or field of view, also Wisenet X series Plus has optional PTRZ modules that can be remotely adjusted to the field of view and the position of the camera lens. Making camera adjustments in the field is also now easier and perhaps even safer. Installers have been known to climb a ladder and juggle a bulky laptop to access the network to be able to see video of how the camera is positioned. Or they’ve had to use analogue video output to view the video feed on a separate monitor which provides the field of view, but not megapixel quality. Using a smartphone, the installer can wirelessly see full and not cropped quality video directly from the camera Wisenet X series Plus cameras have a USB port that allows installers to connect it to a small dongle that converts the camera to a Wi-Fi device. Using a smartphone, the installer can wirelessly see full and not cropped quality video directly from the camera. It’s a much easier way to evaluate video while at the camera. Eliminating the second person looking at live view on a computer guiding through a cellphone to the installer to accurately point the camera to the proper position. If system integrators can do some of the legwork prior to even getting on site, it can reduce cost and improve efficiency. Imagine having 300 cameras ready to send to a project site. To configure those cameras, a system integrator has to take each camera out of the box, plug each into a switch, configure it, take it off of the switch and put it back in the box. To improve this process, camera manufacturers have now developed packaging that provides access to the camera port without even having to remove it from the box. It’s an innovative solution that saves time. Modular cameras have optional PTRZ modules that can be remotely adjusted to the field of view Software programs help in enhancing installation Whether it’s a one-man show or a team of electricians, installers and configurators, software programs can greatly enhance the installation process. Device managers are important tools in adding multiple cameras to a project. Using that 300-camera project, for example, it’s easier when a manufacturer has a device manager that allows the mass programming and configuration of cameras. Adding 300 cameras one by one is time consuming and leaves room for error when making so many multiple entries. A device manager should be able to scan the network and locate its devices, allowing them to be grouped, configured and much more. Every video surveillance camera project is going to have its ups and downs. But camera manufacturers can do their part in the production process to address the many issues known to slow down progress. It’s impressive that many are taking the lead in producing innovations like modular camera design, flexibility in the field and accessible packaging that can truly reduce installation cost and improve efficiency.
As technology advances, the world is becoming increasingly connected, changing the way users think about and interact with security systems, which continue to evolve across all verticals and applications. With this change comes new opportunity for security integrators; security systems are advancing, creating new needs for products and services — some of which can be met through the adoption of cloud-based service systems. Cloud technology is no longer a dreamt-up version of the future of security — it’s here. If you’re hesitant to make the move to the cloud, consider these six reasons to embrace this new technology now.Cloud technology has created an opportunity for integrators to offer managed services to their customers Increased RMR Cloud technology has created an opportunity for integrators to offer managed services to their customers, producing a new business model that generates more stable and predictable income streams. By offering managed services on a subscription basis, integrators can build a part of their business to provide recurring monthly revenue (RMR), allowing them to scale faster. This business model is especially beneficial for customers who prefer to pay a fixed monthly or yearly rate for services rather than a large upfront fee, which can help attract new business while growing revenue from current customers. Stickier customers Providing managed services fosters a more involved relationship between integrators and their customers, which can help boost customer retention. This is primarily the result of three factors. Firstly, customers who buy managed services are committed for a specified term, which helps develop an ongoing business relationship between them and the integrator. Secondly, providing managed services creates an opportunity for more customer contact — each interaction is an opportunity to build rapport and monitor customer satisfaction.While the functionalities of each system vary, their potential is evident in the cloud-based services available Third, customers who purchase managed services generally tend to do business longer than customers who purchase products or services individually; with the monthly purchase of their services on autopilot, customers get into the habit of receiving these services, which helps reduce the chance that they’ll cancel their subscription while also building customer loyalty. High gross profit margins Cloud managed services create an opportunity for a service and technology to be purchased together, helping to generate a higher gross profit margin from the beginning of the customer relationship. On an ongoing basis, cloud service platforms offer a new level of accessibility to integrators, helping to provide better insight on activity trends to identify opportunities to continuously grow their revenue through subscription-based streams. Easier to provide managed services Traditionally, serving more sites required integrators to hire more technicians to meet the needs of their growing customer base, but the cloud has helped overcome this demand. While the functionalities of each system vary, their potential is evident in the cloud-based service platforms that are available today. When a problem occurs on a site that is managed by a cloud-based system, the integrator can receive a real-time notification regarding the issue The Avigilon Blue™ platform, for example, is a powerful new cloud service platform that helps integrators address the needs of their customer sites using fewer resources by offering the ability to administer system upgrades, fixes, health checks, and camera or system settings adjustments remotely. The Avigilon Blue platform automatically sends, and stores video analytics highlights in the cloud, which can easily be accessed from any PC browser or mobile device. This data can be used to efficiently manage customer sites and maintain the health of those sites, helping to increase speed of service and expand the capacity to have more sites up and running. Cloud service platforms have the potential to revolutionise the security industry by providing new opportunities for integrators Not only does this help integrators scale their business faster, it creates an opportunity to provide added value to the customer at a lower cost as new upgrades and services come out. Proactively fix problems before they occur In addition to automating notifications and tedious maintenance tasks, cloud service platforms help provide integrators with the information and abilities they need to keep their customer sites running smoothly. When a problem occurs on a site that is managed by a cloud-based system, the integrator can receive a real-time notification regarding the issue — possibly before the customer even notices a disruption in service. They can then identify the problem and determine whether it can be resolved remotely or requires a technician to be deployed. By having the capacity to pinpoint service needs and make certain adjustments via the cloud, integrators can streamline their customer service processes and lower their response times to provide better, more efficient service. Increased valuation of business Companies that utilise cloud technologies are experiencing as much as 53 percent higher revenue growth rates The ability of cloud service platforms to help integrators manage more sites remotely and expand their revenue through subscription-based streams offers a competitive business advantage. Security innovators have harnessed the power of the cloud to enhance integrator efficiency so that they can spare their attention, resources and effort for where it’s needed most. As a service that helps offer scalability and a high gross profit margin while requiring fewer resources to maintain customer sites, cloud service platforms have the potential to revolutionise the security industry by providing new opportunities for integrators that may ultimately increase their business valuation. According to a study by Dell, companies that utilise cloud, mobility, and security technologies are experiencing as much as 53 percent higher revenue growth rates compared to those who do not such technologies. Integrators who adopt cloud service platforms can benefit from numerous advantages — cost-saving maintenance capabilities, the potential to generate new monthly recurring revenue, and user-friendly design and data security — which make them a significant development within the industry as well as a potential lucrative new business model. The dream of cloud technology is no longer a distant idea of the future, it can become a present reality — and integrators who harness its power can reap its business benefits now.
Considering how much the modern smartphone has become a common everyday tool and cultural icon, it’s hard to believe it has only been with us for a relatively short space of time. The first Apple iPhone was launched in 2007 and yet in a little over a decade the smartphone has become as essential as our keys or wallet. From its conception as a multi-faceted communications device, it has morphed into something far more integrated in our daily lives. Services such as Apple Pay, Android Pay and PayPal have seen the smartphone become a credible replacement for cash and cash cards, but equally, it is possible to replace access cards and keys as well.Smartphones can easily receive authentication credentials remotely and access can be confirmed or denied instantly The ability to accurately authenticate an individual and the applications this offers for security purposes, is something that the security industry needs to continue to embrace and further promote to our customers. Considerable advantages Most security professionals understand the potential benefits of using mobile device authentication, with flexibility being the key advantage. Smartphones can easily receive authentication credentials remotely and access can be confirmed or denied instantly. Equally, smartphones already contain many secure options to ensure they are only used by the authorised user – fingerprint and face recognition, as well as pattern authentication and PIN, being prime examples. Unfortunately, there is still a lack of awareness amongst some security operators, customers and the public of these exciting benefits. Potentially there may also be some reluctance, in certain quarters, to trusting a mobile device with physical security. A lack of trust in seemingly ‘unproven’ technology is not unusual, but the security industry needs to demonstrate reliability along with the considerable security and convenience benefits of using it. Trusted part of security network Many smart devices already securely bind the mobile device with the right person by using 2-factor authenticationMobile device security needs to earn its trust, in much the same way as any other new ground-breaking application. In fairness to the doubters, it’s not hard to imagine how much of a risk a badly protected mobile device could be to any secure network! There are two key obstacles that smartphones need to clear before they can become a trusted part of the security network though. Firstly, that they are secure enough to be trusted as part of a security network, and secondly that they can reliably identify an authorised user in a real-world environment. Many smart devices already securely bind the mobile device with the right person by using 2-factor authentication. For example, this could combine a PIN code with the fingerprint or face of the authorised individual. In areas with particularly high security, you could also implement a wall-mounted biometric reader (fingerprint, facial recognition or iris scan) to add a further level of protection and ensure there is no wrongful use of the mobile device. Security tokens or access cards are typically rigid in their programming, only allowing access to certain areas Security by location With its many and varied functions, undoubtedly one of the most useful systems on any smartphone is its GPS location tracking. It’s also a perfect tool to assist with security systems interaction.A benefit of using smart device authentication is the cost savings over operating traditional tokens Consider any secure facility – it will feature different levels of access. This can vary from a humble canteen and break-out areas, right through to secured doors around potentially dangerous or highly sensitive areas - such as plant rooms, or even a nuclear facility! Security tokens or access cards are typically rigid in their programming, only allowing access to certain areas. A smartphone, however, can be granted or denied access depending on the location of the request by the individual – GPS literally adds a level of extra intelligence to security. Personal items Using QR codes seem to be a simple but reliable identity and access control authentication option Mobile devices tend to be guarded and protected with the same concern as your money or your keys. Many of us literally carry our mobile device everywhere with us, so they are relatively unlikely to be misplaced or lost – certainly in comparison to a key card for example. Also, think about how often you use or hold your smartphone – some estimates suggest 2,600 times each day! With that level of interaction, you’ll be aware very quickly if it’s been misplaced, not least because of the inconvenience and cost to replace it. This level of personal connection makes it perfect for use with security systems. Cost savings Another obvious benefit of using smart device authentication is the cost savings over operating traditional tokens. No more plastic badges, access cards, lanyards, printers and consumables used to administer security. This is something the security industry really needs to shout about! It will come as no surprise to hear that smartphones are exceptionally common too. Figures suggest that in 2015 there were nearly 41m in use in the UK and this is predicted to rise to 54m by 2022. With the UK population being just over 65m, that is a very high percentage of people already carrying this technology. Using a resource that people already have, and which is highly secure, makes unquestionable financial as well as practical sense. GPS location tracking is a perfect tool to assist with security systems interaction Integrated technology Agreeing on common and shared open protocols has unfortunately been one of the stumbling blocks for the security industry in adapting to a predominantly smartphone authentication approach. NFC (Near Field Communications) technology in mobile phones and smart devices has failed to be the universal success it promised.Not everyone has an iPhone, but it is such an important segment of the market for customers Mobile technology trends have dictated to the systems that use it. Apple’s earlier (Pre iOS 11) decision to restrict the use of NFC to Apple Pay on its devices has had a profound effect on the implementation of NFC in other applications too. Not everyone has an iPhone, but it is such an important segment of the market that other manufacturers are wary of how customers will be able to use any new technology. We have seen a much bigger focus on using Bluetooth Low Energy technology on mobile devices instead. With providers such as HID Global, STid in France and Nedap in the Netherlands now concentrating on developing Bluetooth Low Energy readers and mobile credential applications, this seems like a highly credible alternative. Along with NFC and Bluetooth Low Energy options, there also seems to be a lot of interest in using QR codes as simple but reliable identity and access control authentication. These can easily be displayed on a screen or printed if necessary, giving great flexibility over the type of technology that is used in the future. Upgrading existing security systems There are strong arguments for many businesses to continue using MIFARE+ systems if they suit operations well We are steadily seeing the signs of smartphone authentication replacing the cards and tokens we have been familiar with. However, many consumers still want options rather than to just be railroaded down one path. A business that has invested in cards or tokens will want to use that technology investment fully. The changes will come when readers are updated – this is when security specifiers and installers need to promote the advantages of dual-technology readers, which offer options to include smartphone authentication into the mix. There is still considerable diversity amongst smart devices, the operating systems they use, and the security technology employed by each. Android, Apple iOS and Blackberry devices all vary with regards to the biometric authentication available, so security administrators may need to be flexible on the types of authentication they accept. Interestingly, card technology has also progressed at an astonishing speed too – with MIFARE+ proving to be a highly cost-effective, practical and secure system that can easily be integrated. There are strong arguments for many businesses to continue using these systems if they suit operations well. NFC (Near Field Communications) technology in mobile phones and smart devices has failed to be the universal success it promised Hybrid systems A hybrid approach may be the best answer for many security operators. This means those who choose to enjoy the benefits in terms of flexibility and convenience of smartphone authentication can do so, whilst those who are more hesitant can continue to use more traditional methods. A hybrid approach may be the best answer for many security operators Larger organisations may find that the swap over is a slower and more gradual process, whilst smaller start-up businesses may prefer to jump to a smartphone-based approach straight away. If security systems are well integrated but modular in their approach, then it becomes much simpler to evolve as time goes on. Embracing the benefits Using their app-based systems architecture, smartphones are ideally placed to evolve with security systems in the future. There are many benefits for the security industry and our customers, but we need to remember that this move will involve a culture change for many security operators and users. The security industry needs to be mindful and respectful of any anxiety, but also be positive and promote the considerable benefits mobile authentication offers.
All schools and universities need to address three different levels of security when considering access control. The first level is the least vulnerable of the three and concerns the perimeter entry and exit points. Here, incorporating some level of electronic access control should be a consideration, whether that is a combination of electronic and mechanical door hardware, or a complete electronic solution. An electromechanical solution, such as electric strikes, can be beneficial in the effectiveness of perimeter security as they provide greater visitor management and traffic control. Data capture form to appear here! Facilitating visitor entry Electric strikes are able to control access via keypads, cards and proximity readers Electric strikes are able to control access via keypads, cards and proximity readers. When combined with mechanical locks, they provide the benefits of unrestricted egress. The second level is more vulnerable than the first and relates to the point at which people are screened before entering the interior of the school. As this area will be designed primarily to facilitate visitor entry, it will require adequate monitoring of access control. To do this, the latches used on access-controlled egress doors can be electronically controlled from the reception area or school office. Exit or entry doors can be opened by a push from the inside and, if the entry area is also an emergency exit, electronically-powered panic bars can also provide an effective solution. More and more schools are installing visitor management systems to control who can and cannot get into the building. Access control solutions Finally, the third level – and the most vulnerable – refers to the core of the school that both students and staff occupy. These are internal hallways, corridors, stairwells, entry points and restricted areas (such as staff lounges and science laboratories). These are the areas where a school must foster the safest environments for pupils, while also providing protection as they often contain confidential information, expensive equipment or chemicals. The access control system is linked to all doors within the school building A number of different access control solutions are beneficial, whether electronic, mechanical or a combination of the two. For electronic solutions, there are two options available: remote or centralised systems. With remote lockdown systems, individual locks are activated by remote control within proximity to the door. With integrated centralised systems, the access control system is linked to all doors within the school building and locked at the touch of a button. Prevent unauthorised persons Mechanical solutions, which include a cylinder lock and key, are also suitable for places such as classrooms, as doors can be locked externally with a key or internally with a thumbturn, to prevent unauthorised persons from entering. At one university in the United States, a smart RFID wire-free access control solution has been installed At one university in the United States, a smart RFID wire-free access control solution has been installed. The SALTO Virtual Network (SVN) wire-free system pushes and pulls data from the university’s ‘hot spot’ entry points to all their offline locks. By choosing a wire-free solution, the university only had to run wires to their exterior doors. The interior doors do not require wiring as these locks are stand-alone wire-free locks. Student accommodation block Securing access to student accommodates is another concern among colleges. One university in the United Kingdom wanted a security system to protect their student accommodation; in particular, a keyless system that would grant 24/7 access to its students while also enabling campus security to monitor these activities remotely. They chose Vanderbilt’s ACT365, which keeps audit trails by monitoring and recording fob activity. When another English university sought electronic locks for its newest student accommodation block, it turned to Aperio wireless locking technology from ASSA ABLOY. They used the wireless locks to extend the Gallagher Command Centre access control system to a student residence with 231 en suite rooms separated into flats for between 8 and 13 postgraduates. Aperio wireless locks are battery-powered and use less energy than wired magnetic security locks.
The phrase ‘eye in the sky’ is taking on a whole new meaning as the concept of home security drones becomes a plausible idea that could be realised in the not-too-distant future. It’s a possibility that came to light recently in the form of a patent that was granted to Amazon for ‘Image Creation Using Geo-Fence Data’. The patent specifies a “geo-fence, which may be a virtual perimeter or boundary around a real-world geographic area.” An unmanned autonomous vehicle (UAV) may provide surveillance images of data of objects inside the geo-fence. Any video captured outside the geo-fence would be obscured or objects removed to ensure privacy. Detecting break-ins and fires The Amazon patent outlines how its UAVs could perform a surveillance action at a property of an authorised party. It would be ‘hired’ to look out for open garage doors, broken windows, graffiti, or even a fire. The drone would only view authorised locations and provide information back to the homeowner. The idea is to deploy Amazon’s ‘delivery drone’ to provide surveillance of customers’ homes The idea is to deploy Amazon’s previously proposed (but not yet realised) ‘delivery drone’ to provide surveillance of customers’ homes between making deliveries. (One could say the employment situation has truly peaked when drones start taking second jobs!) In a ‘surveillance as a service’ scenario, Amazon’s customers would pay for visits on an hourly, daily or weekly basis. Drones would be equipped with night vision and microphones to expand their sensing capabilities. (The microphone aspect seems creepy until you remember that Amazon’s Echo devices already have a microphone listening to what happens inside our homes.) A remaining obstacle for such a plan is the matter of U.S. Federal Aviation Administration regulations that restrict commercial drone operations and even hobbyist or consumer drone flights outside an operator’s line of sight. Drones would be equipped with night vision and microphones to expand their sensing capabilities Amazon company officials have stressed that the plan is still in its infancy and implementation would be in the future. “The patent clearly states that it would be an opt-in service available to customers who authorise monitoring of their home,” Amazon’s John Tagle told National Public Radio (NPR). Although use of drones for security is in the future, the launch of delivery drones appears to be on the nearer-term horizon. Amazon has said it hopes to launch a commercial service in a matter of months. Amazon’s competitor – Alphabet’s Wing – has already been granted FAA approval to make deliveries in the United States. Autonomous drone monitoring Another company, Sunflower Labs, is also working on security drones and has created a prototype that uses an autonomous drone to monitor activity in conjunction with a series of motion and vibration sensors located around the house. The sensors, which can detect footsteps or car engines, are placed around the home to create a virtual map, track objects and guide the drone. The ground sensors would alert a homeowner of something moving around the house. The homeowner could then elect to deploy the drone, which would stream a live video feed to a smart phone or tablet. Smart home technologies are in the process of transforming the home security market Smart home technologies and do-it-yourself security installations are in the process of transforming the home security market. The traditional ‘alarm service’ model is barely recognisable today among all the changes and new products, from home automation to video doorbells to personal assistants such as Siri and Alexa. Technology-loving consumers are looking at an expanding menu of options just as they are embracing new ways to protect their homes. Instead of a call to an alarm company, a consumer today may instead view a video of a burglary-in-progress live-streamed to their smart phone. Amazon and the other Big Tech companies are already playing a role in the disruption. Home security provided by a drone (on its way to delivering a package down the street) may seem like an extreme divergence from the norm. But such is the changing world of smart homes and residential security.
Security isn’t easy for schools and universities. As education institutions increasingly become vulnerable targets for threats and attacks, they face the security challenges of maintaining a welcoming and open environment while ensuring the comprehensive safety of the students, teachers and staff. The balance between providing high levels of security with a certain level of convenience becomes crucial, especially when considering the large audience schools work with – the staff, administrators, students, parents and other organisations that utilise the facilities. In addition, schools are budget-conscious and must use their resources wisely. School administrators are often contacted repeatedly by organisations with multiple safety and security products The Partner Alliance for Safer Schools (PASS) is one of the organisations at the forefront of establishing security standards for schools. In 2014, the Security Industry Association (SIA) and the National Systems Contractors Association (NSCA) formed PASS, which brought together a cross functional group of members including school officials, safe schools’ consultants, law enforcement and security industry experts to collaborate and develop a coordinated approach to protecting K-12 students and staff. School administrators are often contacted repeatedly by organisations with multiple safety and security products. PASS has provided valuable insights regarding an ‘All Hazards’ approach to school safety and security. Data capture form to appear here! Ensuring procedures evolve There is no guarantee that what works to increase safety and security today will also work tomorrow. Because potential threats to safety and security can and do change, it is important that whatever policies, procedures and technology a school implements today can also evolve to address those changes well into the future. It is also important that schools take into account the need to distinguish among a wide variety of possible situations to ensure the appropriate people are notified and correct procedures followed. For example, the response to an active shooter situation is going to be very different from the response to a fight that occurs in a hallway. When it comes to protecting the entry, a video intercom, mounted just outside the main door, is a key component allowing two-way voice-and-video identification with visitors Two top priorities for school security are the ability to communicate within a facility, and the ability to control access of who comes and goes. Paul Timm, vice president of Facility Engineering Associates, an independent school security consulting firm, acknowledges the value (and popularity) of video cameras for school security, but says that value is almost completely realised in terms of forensics – reacting after an incident rather than during or before. A second priority for school security is controlling access to the building Communications, specifically mass notification systems, are an important tool for school security, says Timm. Mass notification must be able to provide emergency information to people in the gymnasium, or on a field trip. A second priority for school security is controlling access to the building. When it comes to protecting the entry, a video intercom, mounted just outside the main door, is a key component allowing two-way voice-and-video identification with visitors. But a video intercom works best in conjunction with other complementary products including remote-controlled locks that allow staff to admit visitors while safely sitting behind locked doors. The object of any solution is to eliminate or delay entry of an assailant long enough for police to respond and for school administrators to communicate with teachers and campus staff so they can lock down their classrooms or evacuate, depending on the situation.
Pulse Secure advances remote access to web applications such as Microsoft Office 365 and network resources to help 3,000 staff enjoy a better work-life balance leveraging Pulse Secure. Pulse Secure, a provider of software-defined Secure Access solutions, has announced the delivery of a successful project at one of Italy’s largest media organisations designed to help foster mobile workforce productivity while ensuring protected, compliant access to cloud and data centre applications. RCS MediaGroup is one of the leading multimedia publishing groups, active mainly in Italy and Spain across all publishing fields, spanning from newspapers to magazines, from digital to books, from TV to new media, and to training. It is also one of the top players in the advertising market and in the organisation of iconic events and major sporting formats, such as the Giro d’Italia. Protecting against cyber-attack We maintain several security controls across our network, as well as regularly cyber-security training" The RCS Group publishes the daily newspapers Corriere della Sera, La Gazzetta dello Sport, El Mundo, Marca and Expansion, as well as numerous magazines, the most popular including Oggi, Amica, Io Donna, 7, YO Dona and Telva. Like many other popular enterprises, being an integral part region’s culture and communications has made RCS Group a target for cyber threat actors. “Protecting our systems against cyber-attack is a critical requirement as is ensuring our staff and journalists have easy, flexible and secure access to their work,” says Monica Venanzetti, Network Manager for RCS MediaGroup in Milan. “To meet this need, we maintain several security controls across our network, as well as regularly conduct cyber-security training. We deployed our first VPN solution in 2006 to enable secure access to our systems and it was time to progress our capabilities.” New cloud services RCS MediaGroup employs over 3,000 staff including 700 journalists and as Giandomenico Oldano, Director of IT operations for RCS MediaGroup, explains, “As a group, we have an ongoing strategy to help our staff embrace smart working. This is part of an initiative to improve the work-life balance of our employees and reduce their traveling time, which in a busy city like Milan can be very time consuming.” As part of this work-life balance strategy, RCS MediaGroup has invested in more remote, mobile and cloud technologies and recently moved its staff onto Microsoft Office 365 to encourage this transition. “To meet this need and as part of our commitment to ensuring best practice secure access, we decided to upgrade our legacy VPN to provide more capacity and to better integrate with new cloud services such as Office 365,” says Venanzetti. Cloud single-sign on The simplified management interface allows RCS MediaGroup to set up enterprise-wide policies" “We examined several options and Pulse Secure provided us a modernised platform with more advanced features including endpoint compliance and cloud single-sign on. We found the tool comparatively simpler to administer, very interoperable and with a broader feature-set.” The upgrade process was straightforward, and the simplified management interface allows RCS MediaGroup to set up enterprise-wide policies that make it easy for its remote users to connect to its critical publishing systems. The solution also incorporates client checking technology that ensures that its users’ devices, both corporate and personally owned endpoints, are running the right system and security patches before they can attach to the corporate network. “One of the most important features was deep support for our users’ devices including tablets, laptops and PCs across both Apple and Microsoft environments,” says Oldano. Cloud-based applications “Our upgrade has been a success and provides a lot of potential for future projects that will allow us to offer secure access for more cloud-based applications. Pulse Secure has been with us throughout this process and its technology is helping us to deliver on our commitment towards smarter working for all our staff.” Pulse Secure enables enterprises to centrally manage Zero Trust Secure Access to applications, resources and services that are delivered on-premise, in private cloud and public cloud environments. The Pulse Access Suite delivers protected connectivity, operational intelligence and threat response across mobile, network and multi-cloud environments in order to provide easy, compliant access for end users and single-pane-of-glass management for administrators. “Enterprises are fortifying capabilities to accelerate mobile workforce productivity and take advantage of cloud computing.” Comprehensive and integrated Pulse Secure offers a proven, comprehensive and integrated suite that works with an enterprises hybrid IT infrastructure to enable a simpler, more manageable and scalable approach to secure access,” said Paul Donovan, vice president of EMEA sales at Pulse Secure. “We are pleased to have been selected by RCS MediaGroup, a prominent and progressive market leader in multimedia publishing and look forward to supporting their on-going digital transformation initiatives.”
Bolloré Logistics is one of the top ten transport and logistics companies in the world. Its warehousing and logistics facility near Auckland Airport, New Zealand, has seen significant growth in recent years and often handles in excess of 2,000 items in a day. As a customs bonded warehouse, the location is subject to strict security requirements. All movements and processing in the warehouse must therefore be monitored closely, as the consequences of damage to facilities or loss of stock could be catastrophic. A combination of c25, v25 and i25 hemispheric cameras, along with several MOBOTIX Dual D15 cameras, provides complete coverage of the 6,600-square-meter site. The new system provides full visibility of the warehouse aisles to protect both employees and customers should an incident occur. Tool for risk management A security system that enables monitoring of business processes and guarantees the availability of historical footage can help companies avoid facing expensive compensation claims. As such, the MOBOTIX system is an invaluable tool for risk management, compliance enforcement and dispute resolution. The stream of metadata generated alongside the video feed cannot be manipulated, which ensures that the images will hold up in a court of law. Moreover, this kind of security system even helps save money: Some insurance companies reduce their premiums when this kind of system has been installed.
Globally renowned electronic locks manufacturer, Mul-T-Lock has announced providing Glenveagh National Park in County Donegal, Ireland with over 50 of its high-tech eCLIQ locks so as to enable them to efficiently manage access control rights across the whole estate. Spanning over 170 square kilometres in area size, Glenveagh National Park is the second largest national park in Ireland. It features a number of rugged mountains, pristine lakes, tumbling waterfalls and enchanted native oak woodlands that together make up its ecosystem. At the centre of the national park, on the edge of Lough Veagh, is Glenveagh Castle, a late 19th century castellated mansion, which was originally built as a hunting lodge. Advanced eCLIQ technology allows park managers to schedule individual access permissions for each lock eCLIQ locking system With multiple facilities located on the sprawling site, Glenveagh National Park required a high-security and fully customisable access control solution, and therefore opted for Mul-T-Lock’s advanced eCLIQ locking system. The new and advanced eCLIQ technology allows park managers to schedule individual access permissions for each lock, subsequently granting and revoking access to various areas of the estate whenever necessary. Remote access control solution Stephen Crowe, Regional Sales Manager for Mul-T-Lock, commented, “At Glenveagh National Park there is a need to restrict public access from certain areas for safety reasons, but at the same time, relevant staff should be able to access these areas whenever required”. He adds, “Our eCLIQ system proved the perfect solution for this, as administrators (those who manage the security system) can easily set-up tailored access permissions remotely via our CLIQ Remote Web Manager software. eCLIQ padlocks and cylinders Stephen further stated, “With eCLIQ, administrators also have the ability to set time-limited access – something that isn’t achievable with a mechanical system. For example, padlocks around the estate could be programmed to allow access to certain gates between Monday and Friday, from 8am to 6pm. It’s this customisation that makes our system so popular.” The Mul-T-Lock system was specified and installed by Paul Speer at JP Speer Locksmiths, who added, “We now have over 50 eCLIQ padlocks and cylinders securing gates, offices and the Visitor Centre within this impressive estate. The complete system is managed from the main office and once set up it is easily maintained, with the flexibility to change quickly whenever required.” Mul-T-Lock advanced eCLIQ technology Another great feature with eCLIQ is the way in which you can expand the system retrospectively when needed" Paul further said, “Another great feature with eCLIQ is the way in which you can expand the system retrospectively when needed. Glenveagh National Park has used mechanical systems in the past, but these haven’t been able to satisfy its access control requirements. Mul-T-Lock’s eCLIQ technology ensures that access rights are maintained for years to come.” Pat Vaughan, District Conservation Officer at Glenveagh National Park, finished by saying, “Mul-T-Lock’s eCLIQ system is the perfect fit for our Park as it has all the features that such a vast estate as ours requires. Park security He says, “During our summer season our visitor numbers quadruple and we have to employ seasonal staff to meet this demand. Having such a system as Mul-T-Lock’s eCLIQ means that we can set up temporary access for these workers, with all the relevant access rights required. The eCLIQ system also enables us to deactivate keys and revoke access at the click of a button.” Pat adds, “This is particularly helpful if any of our team accidently lose their keys, or if temporary staff forget to return keys after their time with us. We are extremely happy that we opted for the eCLIQ system to secure our beautiful estate; it will stand the test of time for years to come and has all the features we require to manage, build and secure our Park and its future.”
Financial institutions require reliable IP video surveillance systems that provide high-performance, quality, and scalability. Unfortunately, with limited budgets, many financial institutions are still utilising outdated appliances. When security is not a priority, they are putting themselves at risk for fraud, theft, and data breaches. Security Integrators have an opportunity to help financial institutions by upgrading their systems with an up-to-date NVR server and overall video surveillance system which significantly increases performance and mitigates risk. Modern video surveillance system Integrators should utilise BCDVideo’s IP video surveillance appliances which are built for each unique project Budgets can vary depending based on the size of the financial institution. Since not all banks and credit unions have the same security budget as large institutions, it can be challenging to upgrade to a modern video surveillance system. To save on the overall cost, generic or often referred to as white-box solutions are viewed as the only reasonable option. Many white-box solutions are made without performance or quality in mind and built with miscellaneous parts. Ultimately, the end-user suffers from an unreliable system without extended warranties and support all because of short-term savings. White-box solutions are not the only option. Security Integrators should utilise BCDVideo’s IP video surveillance appliances which are purpose-built for each unique project, regardless of size. Giving customers greater security Most of their appliances offer a 5-year Keep Your Hard Drive warranty that lowers total cost of ownership. Standard warranties request that a failed hard drive be returned to the manufacturer during replacement. KYHD warranty gives customers greater security, compliance enablement, and complete control over their data BCDVideo understands that sensitive data could be compromised when the hard drive leaves the site, which is why they offer a Keep Your Hard Drive warranty. KYHD warranty gives customers greater security, compliance enablement, and complete control over their data. Security Integrators can feel confident quoting any project knowing they can turn to a live video surveillance expert to help them with network design or storage calculations. Mission-critical configurations Choose from a portfolio of products from entry level to enterprise to mission-critical configurations as well as a variety of supported architectures. There are three ways to get into contact with BCDVideo: call, email, or submit your request online. BCDVideo is the single source to troubleshoot any implementation or warranty issue. With post-sale support, save time and resources by not having to call multiple manufacturers to troubleshoot issues. Experts are on hand to answer questions or troubleshoot a system via remote access. Reduce your total cost of ownership over 5-years with BCDVideo’s lifetime tech & global on-site support warranty, in addition to a guaranteed response.
It’s no surprise that a growing number of people are turning to motorbikes as their primary method of transport due to Spanish cities becoming increasingly congested. In fact, according to a 2016 study by the Institute of Environmental Science and Technology (ICTA-UAB) and the UAB Department of Geography, Barcelona is now the European city with the highest number of motorbikes per inhabitant. The research found that 372,278 trips are made on motorbikes every day in the city. Motorbikes began to experience a boom in 2004 when the Spanish government enacted a regulatory measure that allowed car drivers with three years of experience to switch to motorbikes with capacity up to 125cc. The ability to avoid congestion and complete journeys more quickly promoted exponential growth. Protecting motorbikes from thieves Unattended motorbikes are vulnerable to theft and vandalism, so protecting them has become a key concernAlthough this has brought many benefits, it has also created a significant problem for users – where to park their motorbikes. Unattended motorbikes are vulnerable to theft and vandalism, so protecting them has become a key concern. Similarly, city councils are cracking down on illegally parked motorbikes that obstruct access, and are removing them from pavements and other areas. It’s this situation that prompted Alicante-based motorcyclist, Alejandro Martin, to create Mimoto Parking, along with two other biking friends. As the company’s managing director, he takes up the story and explains, “We want our customers to be able to keep their motorbikes secure and avoid the fines associated with illegal parking. By creating conveniently located facilities that can be accessed at street level, without the need to negotiate dangerous ramps, we have reinvented the parking concept. “We offer a revolutionary service where owners can safely park and also store belongings such as helmets, jackets and gloves in lockers. Users can access our parking lots on a 24/7 basis and go about their business without worrying about their motorbike’s security.” Access code to obtain a parking space Although it only operates a few sites at the moment, the response has been incredible and Mimoto Parking has plans to operate over 40 facilities by 2021 and, in order to finance this rapid expansion, Alejandro Martin and his team is looking to attract additional funding from interested parties. By registering online for free, a user is sent a six digit personal and non-transferable access code to obtain a parking space The company’s success is down to the fact that Mimoto Parking has simplicity at its heart. By registering online for free, a user is sent a six digit personal and non-transferable access code to obtain a parking space. They then identify the facility that is most convenient, key in the six-digit code via a keypad when they arrive, and enter and park. Remote monitoring via Ralset’s ARC Utilising a ‘pay as you go’ concept, leaving users simply re-enter the same six digit code at which point Mimoto Parking automatically charges them for the duration of their stay. Each facility is remotely monitored at all times via Ralset’s alarm receiving centre (ARC) and a full intercom system offers user assistance when they need it. Alejandro Martin says, “When developing Mimoto Parking we knew that our success would hinge on our ability to implement access control and intrusion detection technology that could not only guarantee the highest levels of security but also be intuitive, straightforward to roll-out across multiple sites, and be as reliable as possible. “In order to find out more about what we could do, we invited leading security integrator and PACOM approved partner, Cettec Seguridad, to come in and hear about our requirements.” Integrated access and alarm controller Doors and alarm points can be partitioned into different areas of security and controlled by multiple keypads"Cettec Seguridad configured a solution based around the PACOM 8002 integrated access and alarm controller – an all-in-one platform that integrates the functionality required for a remote security system. PACOM 8002 supports auto-discovery of peripheral devices for simplified installation and all doors can be individually configured to operate via card only, PIN only, or card and PIN, with access schedules providing additional control. Furthermore, doors and alarm points can be partitioned into different areas of security and controlled by multiple keypads. The PACOM 8002 system would have to integrate seamlessly with Mimoto Parking’s mobile app and allow the ARC to monitor events at all times. Alfonso Lorenzo Robledano, business development director for Southern Europe at PACOM, states, “Cettec Seguridad asked us to make some adaptations to the PACOM Graphical Management System (GMS), which is based on a data communications platform that successfully integrates access control, alarm monitoring, video surveillance and many other building services into a single, remotely accessible system. “PACOM’s technical experts were able to modify the software’s algorithms and design new schematics to meet Mimoto Parking’s exact requirements and, in addition, deliver uninterrupted system operation, intelligent self-testing and multiple back-ups.” Manages the parking occupancy status Signs can be operated to indicate availability and the system can even be remotely reset when necessaryAs well as allowing customers to communicate directly with personnel at the ARC, the modified PACOM GMS can also manage the parking occupancy status at each site. Signs can be operated to indicate availability and the system can even be remotely reset when necessary. This level of scalability also means that new technologies can simply be added to as they are developed, offering Mimoto Parking the ability to further develop the system as required and future proof its investment. Just as importantly, PACOM and Cettec Seguridad collaborated to ensure that the system can be quickly and easily rolled out across any new sites as they are acquired. Each system controls one entry and one exit door using a single controller and keypad, which means minimal wiring and allows minor adjustments to be made as necessary. Meeting the objective of securing bikes Mimoto Parking’s Alejandro Martin is delighted with what has been achieved and praised PACOM’s willingness to work closely with his team and Cettec Seguridad to devise a unique solution. He concludes, “Our ability to keep customers’ motorbikes secure is fundamental to our success and therefore we needed to be 100 per cent confident that the technology we installed was able to meet this objective. “PACOM’s experts were a pleasure to deal with and as keen as we were to optimise our entire security and access control infrastructure. I’m looking forward to working together in the future as we expand Mimoto Parking and introduce new sites to our portfolio.”
Allegion, globally renowned provider of security products and solutions, has announced that the Schlage AD electronic locks, NDE networked wireless locks, LE networked wireless locks and MT multi-technology readers now support contactless student IDs in Apple Wallet. Allegion - CBORD collaboration Allegion worked with CBORD and Apple to enable a mobile credential leveraging the industry global standard NXP DESFire EV1 security technology to provide higher education campuses with an easy-to-implement solution for the enablement of contactless student IDs for iPhone and Apple Watch. The University of Tennessee, University of Vermont and University of San Francisco are among the first schools to leverage the solution. “A recent study from The Center for Generational Kinetics found that 95 percent of Gen Z owns a smartphone and being connected is their norm. Because of this, universities are tasked with meeting student preferences while also ensuring campus security,” said Jeff Koziol, Allegion business development manager, campus software partner. “Allegion is proud to expand its product features to provide higher education campuses seamless yet flexible security solutions, and an improved mobile access experience for students and faculty members alike.” Contactless student IDs Having contactless student IDs in Apple Wallet makes it easier and more convenient for students and faculty to access buildings like residence halls or the library, as well as make payments on and around campus for coffee, laundry and other purchases with iPhone and Apple Watch. Universities can remotely issue credentials over-the-air, and those credentials are protected by two-factor authentication and can be remotely deactivated by the student or university. MIFARE DESFire EV1 technology, supported by Allegion in this program, is the widely accepted open global standard "As an institution that values innovation, it's important to us that we are always adapting to the way students use technology to enhance the campus experience," said Chris Cimino, senior vice chancellor for finance and administration. "Being able to access your VolCard on your iPhone is one of the many ways UT is continuously improving to meet expectations for a modern campus.” MIFARE DESFire EV1 technology MIFARE DESFire EV1 technology, supported by Allegion in this program, is the widely accepted open global standard and one of the top solutions in contactless credentials. By leveraging Allegion and CBORD’s solution with DESFire, higher education campuses are now able to take advantage of an open architecture and work with various manufacturers without being locked into a siloed proprietary solution. This new capability is compatible with the following Schlage commercial solutions: AD electronic locks - Schlage AD-400 wireless locks were designed to reduce installation costs on interior access-controlled doors, such as student rooms, faculty offices, classrooms and lab spaces, while offering the adaptability to support future evolutions in technology. The AD-400 and AD-300 wired locks are available in cylindrical, mortise, mortise deadbolt and exit trim chassis options, and they integrate into popular physical electronic access control systems (PACS). NDE networked wireless cylindrical locks - NDE wireless locks integrate into popular electronic access control systems from PACS providers to bring the benefits of electronic access control deeper into university buildings. NDE packages the cylindrical lock, credential reader and access control sensors together in to a small footprint that is both easy to install on university campuses and affordable. LE networked wireless mortise locks - The LE design packages the mortise lock, credential reader and access control sensors together into a small footprint that is both elegant and affordable. They feature two sleek trim options with broad range of decorative lever choices to match the style of any residence hall. MT Multi-Technology readers - Schlage MT multi-technology readers are designed to simplify university access control solutions and allow a transition from proximity or magnetic stripe (on a physical student ID) to more secure, encrypted smart card technology or mobile credentials in the Apple Wallet. Schlage’s AD Series Locks This extended offering is the next wave in Allegion’s pursuit to work with other providers in the industry for digital credential rollout in universities. Recently, the company announced its collaboration with Transact to enable contactless student IDs in Apple Wallet through Schlage’s AD Series Locks at Mercer University.
Round table discussion
In the digital age, software is a component of almost all systems, including those that drive the physical security market. A trend toward hardware commoditisation is making the role of software even more central to providing value to security solutions. Software developments make more things possible and drive innovation in the market. We asked this week's Expert Panel Roundtable: How do software improvements drive physical security?
Cloud computing has been around since the turn of the millennium. Over the years, the concept of storing and accessing programs over the Internet (instead of using an on-premises computer system) has grown in almost every realm of business. Some might say the physical security industry has come late to the party, delayed in some instances by (misguided?) concerns about cybersecurity of cloud systems. The bandwidth needed to transfer video to the cloud has also been a challenge. We asked this week’s Expert Panel Roundtable: What features of Cloud-based software-as-a-service (SaaS) are the most valuable to the average user?
How much does a security system cost? We all know that total costs associated with systems are substantially higher than the “price tag.” There are many elements, tangible and intangible, that contribute to the costs of owning and operating a system. Taking a broad view and finding ways to measure these additional costs enables integrators and users to get the most value from a system at the lowest total cost of ownership (TCO). However, measuring TCO can be easier said than done. We asked this week’s Expert Panel Roundtable to share the benefit of their collective expertise on the subject. Specifically, we asked: How should integrators and/or end users measure total cost of ownership (TCO) when quantifying the value of security systems?