Cozaint Corporation, manufacturer of ‘smart’ physical security platforms, has announced the launch of the BOBBY-W wall-mounted physical security kiosk. Available immediately, this ‘Video Surveillance as a Service’ (VSaaS) device has been designed to augment human security guard environments that need additional eyes and ears on their premises. BOBBY-W physical security kiosk BOBBY-W is based on a custom, Cozaint-built expandable platform that allows for the integration...
An essential component of modern network protection, firewall technology is increasingly relied upon as organisations secure distributed networks and rapidly expanding remote and mobile workforces. To ensure cyber security administration is easier and more accessible, SonicWall announces new zero touch enabled, multi-gigabit SonicWall TZ firewalls with SD-Branch capabilities, along with a redesigned cloud-native management console that helps streamline operations through fresh and modern user in...
Ajax Systems have announced that the latest OS Malevich 2.9 update brings significant changes for users and security industry professionals. The new data import feature simplifies the process of replacing old hubs with new ones. Remote activation/deactivation Detectors that work incorrectly can now be deactivated remotely and still be part of the system. Button and transmitter got new types of alarm notifications, adjustable in the app. Automation devices can now work in pulse mode and a...
Aiphone, the globally renowned manufacturer of intercom and security communication products, has announced the release of its IX Series PC Master Station Software. The new IX-SOFT is capable of transforming any computer into a feature-rich intercom, with an easy-to-use and intuitive interface. IX-SOFT PC Master Station Software The IX-SOFT PC Master Station Software is a PC-based intercom solution, which is ideal for any customer type, as it fits into everyday scenarios with ease. Whether the...
Building on the success of HID’s Mercury, HID Global, a worldwide provider in trusted identity solutions, has announced the HID Aero platform featuring its next generation of open-architecture intelligent controllers that increase choices for a wide range of businesses while future-proofing access control investments as requirements change. “HID Aero is providing a broader market with features that were generally available only in solutions for larger organisations, while eliminatin...
A hotel environment is fast-paced and ever-changing, with staff and guests coming and going 24 hours a day. Despite this, it is a business owner’s job to ensure that the building - and everyone in it - is safe and secure. CLIQ® technology from security provider Mul-T-Lock offers a smart security solution for all types of hotels, resorts, holiday parks, B&Bs and short-break properties. eCLIQ for hotel chains and resorts Mul-T-Lock’s eCLIQ access control system utilises CLIQ...
RAS Watch, a provider of managed global security operations centers and scalable security programs, has announced that it has partnered with CONTRACE Public Health Corps to help scale its contact tracing service. As part of the partnership, CONTRACE will work with RAS Watch to provide trained, qualified individuals to clients whose goal is to identify potential exposure to COVID-19 and halt the spread of the disease across an organisation. Contact tracing service Contact tracing has traditionally been a manual process where individuals work with patients to develop a list of everyone they have been in close contact with during a certain period. However, RAS Watch leverages advanced monitoring services technology, targeted communications and emergency response to augment this process and offer its contact tracing service for customers. Organisations that opt for contact tracing through RAS Watch can help protect employees and customers from exposure to COVID-19 and potentially aid in the goal of safely returning to work. Deploying army of contact tracers to fight COVID-19 CONTRACE is focused on deploying an army of qualified contact tracers to help fight COVID-19 CONTRACE is focused on deploying an army of qualified contact tracers to help fight COVID-19 and safely reopen the U.S. economy. “Our organisation focuses on connecting highly qualified contact tracers with organisations like RAS Watch that can use their expertise to help identify and isolate confirmed cases of COVID-19,” said Steve Waters, Founder and CEO, CONTRACE. Steve Waters adds, “We’re excited to partner with RAS Watch as they aim to help businesses return to work safely and put the health and well-being of employees front and centre by leveraging advanced technology to streamline this process.” Ensuring employees’ and public safety “Working with an organisation like CONTRACE opens up a vast network of trained individuals to support the work we’re doing with organisations across the country, allowing us to scale quickly to expand support when there’s an immediate need,” said Ryan Schonfeld, Founder and CEO, RAS Watch. Ryan adds, “We want to provide an alternative for companies that span multiple geographic areas by providing a single service that allows them to share information, rapidly communicate and keep both employees and the public safe, all while maintaining privacy.”
Pulse Secure, a renowned provider of software-defined Secure Access solutions, announced that Enterprise Management Associates (EMA) has honoured Pulse Secure among the industry’s top secure access platform vendors. Pulse Secure was selected by EMA as a “Top Three” vendor in enabling secure remote access across hybrid business networks. According to the 2020 EMA Secure Access Decision Guide, remote workforces increasingly require access to business applications, data, and services from a variety of devices through the Internet and unsecured public networks, increasing exposures to attack and risks of compliance failures. Secure remote access We surveyed IT decision makers to identify the top 10 key secure access initiatives" Secure access solutions with identity and device security features must create intuitive, compliant and protected connections for workers to access essential IT resources across business networks, private clouds, and SaaS environments. In 2020, requirements for enabling secure access from remote workers to hybrid IT business networks accelerated rapidly and substantially. As a result of the COVID-19 pandemic and global stay-at-home orders, workforces in nearly every business sector were suddenly required to enable remote access capabilities in order to continue operations. Solutions enabling employees to work remotely became a critical lifeline during the most challenging days of operational restrictions and trends towards increased workplace flexibility and permanent work from home requirements are expected to define secure remote access capabilities as a key element of IT enablement into the future. Minimise risk profiles The EMA Decision Guide provides actionable advice on the best practices and solutions organisations should adopt to empower end-user productivity and minimise risk profiles when enabling secure access to business IT resources. “We surveyed IT decision makers to identify the top 10 key secure access initiatives and then evaluated over 100 products across these business priorities by analysing a broad array of vendor product briefings, case studies and demonstrations,” noted EMA Research Director and Report Author, Steve Brasen. Access business applications Pulse Secure brings together core secure access capabilities with required interoperability for hybrid IT "EMA's detailed and independent assessment of this market clearly identified Pulse Secure among leading secure access platform providers and top three solution for enabling workforces to remotely and securely access business applications, data, and IT services across hybrid IT environments." Pulse Secure brings together core secure access capabilities with required interoperability for hybrid IT. The company’s Zero Trust value proposition is realised through its Pulse Access Suite, which delivers protected connectivity, endpoint compliance, operational intelligence, and threat mitigation across mobile, network, and multi-cloud environments. Data protection requirements Pulse Connect Secure (PCS), the company’s flagship secure remote access solution, offers rapid deployment and single-pane-of-glass management while ensuring user productivity with easy, optimised and protected access to data centre and multi-cloud applications. “Pulse Secure enables enterprises to accelerate their digital transformation strategies and flexibly migrate from data centre to multi-cloud computing while addressing diverse user, business and data protection requirements,” said Scott Gordon, Chief Marketing Officer at Pulse Secure. Clientless web access portal Pulse Secure has also extended its Pulse Cares programme through September 30, 2020 “EMA’s recognition of Pulse Secure as an industry-leading secure access vendor for hybrid IT is testament to our focus on enabling user productivity and our passion to innovate while being mindful to optimise our customers’ business opportunities, resources and investments.” Pulse Access Suite and Pulse Connect Secure capabilities highlighted in the EMA report include: Extensive Secure VPN connection modes: always-on, on-demand, or only when utilising specific applications, as well as split tunneling and multi-tunneling. Layer 2, layer 3 and layer 7 access security with broad application support. Ensures compliance with support for MFA and SSO authenticators (e.g., SAML IdP and SD), and user and device security before and during connections. Simplifies administration with wizards, granular policy settings, and adaptive access with built-in UEBA. Pulse One management platform to automate appliance and policy administration while viewing an operational dashboard. Unified Client, agent and agentless, for VPN, SDP and NAC, as well as clientless web access portal. Accelerate digital business Organisations can try Pulse Connect Secure and other integrated solutions that comprise the Pulse Access Suite by visiting the official website of the company. Pulse Secure has also extended its Pulse Cares programme through September 30, 2020, providing flexible licensing and expedited deployment and capacity enhancement to support business continuity as organisations extend workplace flexibility and accelerate digital business in the wake of the COVID-19 global health crisis. The abridged version of the “2020 EMA Top 3 Report and Decision Guide for Enabling Secure Access to Enterprise IT Services” can be downloaded from EMA website.
Paxton Access Ltd. (Paxton) has announced new additions to their renowned Net2 access control product line, helping installers make their customers’ buildings more COVID-secure. The latest version of Net2 – v6.04 has been in rapid development since May 2020 and is now ready for installers to download. Net2 – v6.04 The latest version features Net2 Occupancy Management, which allows enterprises to limit the number of people in any given area, either barring access or sending an email or text to the building manager when a space nears capacity. It works across multiple areas of a site and can be set to operate a one-in, one-out system to support social distancing measures. In addition to this update, installers who want to use thermal scanning to help limit the spread of the virus can do so with three new thermal scan integrations. Making buildings more COVID-secure We understand the important part that access control plays in managing the flow of people around a building" Adam Stroud, Chief Executive Officer (CEO) at Paxton Access Ltd. stated, "We understand the important part that access control plays in managing the flow of people around a building in order to support a hygienic environment. In addition, controlling the density of people in any given area is a valuable tool to help businesses of all types to become 'COVID-secure'." Adam adds, “Net2 is one of the best-selling access control systems and so we have developed the new Occupancy Management feature to meet this specific need. For new and existing Net2 customers we hope that this new functionality helps the efforts that we are all making to observe social distancing and keep people safe." Occupancy Management with Net2 v6.04: Ensure users maintain a safe social distance by setting and controlling the maximum number of people in any given area. Real-time visual reports - see live occupancy levels in a clear, web-based visual report from smartphone, tablet, PC or widescreen wall display. Dynamic control of entry permissions - set alerts and prevent user access when maximum capacity is neared or reached. Simplified area management - set and manage multiple areas simultaneously, with specific occupancy levels per area. Support continuous flow of people movement with one-in-one-out user access when people numbers are high. Thermal scan hardware Paxton has also tested a range of thermal scan hardware and the company’s free 45-minute webinars will take installers through what is available and how to apply it. Paxton references solutions from Hikvision - Face Recognition Terminal (Minmoe), Dahua Technology - Thermal Temperature Station and ZKTeco – SpeedFace to help ensure health and wellbeing in high security areas and identify people that could be at risk, quickly. Net2 integrations with Hikvision, Dahua, and ZKTeco solutions Paxton has validated Net2 integrations with Hikvision, Dahua, and ZKTeco Paxton has validated Net2 integrations with Hikvision, Dahua, and ZKTeco. However, Net2 can work with most thermal devices that utilise a Wiegand output. Paxton has been running their ‘Guide to COVID-secure Buildings’ webinars to help get the U.S. back to work safely. Installers receive a live 45-minute webinar that will take them through the CDC and OSHA guidelines, as well as a free end-user guide to help their customers understand the access control solutions available when updating their buildings. ‘Guide to COVID-secure Buildings’ webinars Gareth O’Hara, the Chief Sales Officer at Paxton Access Ltd. said, “We’ve had a great response from customers so far, with hundreds joining us in the first couple of weeks. The webinar provides installers with practical access control solutions that businesses need now.” He adds, “The new Occupancy Management feature in Net2 has been eagerly anticipated and we are looking forward to getting it out there to help with social distancing on sites around the world. We are continuing to develop Net2 in line with installer feedback to provide even more flexibility for COVID-secure buildings, so watch this space.” Paxton’s latest webinar, the Guide to COVID-secure Buildings with Net2 started on June 30 and runs twice weekly.
Researchers at Check Point have identified security flaws in Apache Guacamole, one of the world’s most popular IT infrastructures for remote work. With over 10 million downloads, the free open-source software enables remote workers to access their company’s computer network from anywhere, by using only a web browser. Apache Guacamole software Apache Guacamole runs on many devices, including mobile phones and tablets, giving remote workers ‘constant, world-wide, unfettered access to computers’, according to the software’s creators. Eyal Itkin, a Vulnerability Researcher at Check Point, demonstrated that a threat actor with access to a computer inside an organisation can execute a Reverse RDP attack, an attack in which a remote PC infected with certain malware takes over a client that tries to connect to it. Reverse RDP attack Once in control of the gateway, an attacker could eavesdrop on all incoming sessions In this case, the Reverse RDP attack would enable a threat actor to take control of the Apache Guacamole gateway that handles all of the remote sessions in a network. Once in control of the gateway, an attacker could eavesdrop on all incoming sessions, record all the login credentials used, and even control other sessions within the organisation. Check Point researchers say this foothold is equivalent to gaining full control over the entire organisational network. Check Point researchers classified their findings into two attack vectors: Reverse Attack Scenario: A compromised machine inside the corporate network leverages the incoming benign connection to attack the Apache gateway, aiming to take it over. Malicious Worker Scenario: A rogue employee uses a computer inside the network to leverage his hold on both ends of the connection and take control of the gateway. Data security in remote work operations Omri Herscovici, Vulnerability Research Team Leader at Check Point said, “While the global transition to remote work is a necessity, we cannot neglect the security implications of such remote connections, especially as we enter the post-coronavirus era. This research demonstrates how a quick change in the social landscape directly affects what attackers might focus their efforts on. In this case, it’s remote work.” Omri adds, “The fact that more and more companies have externalised many internally-used services to the outside world opens a number of new potential attack vectors for threat actors. I strongly urge companies and organisations to keep their servers up-to-date to protect their remote workforces.” Check Point Research responsibly disclosed its findings to The Apache Software Foundation (Apache), the maintainers of Guacamole, on March 31, 2020. On May 12, Apache issued 2 CVE-IDs to the 4 reported vulnerabilities, and Apache has released a patched version in June 2020.
SonicWall announced it had appointed Tristan Bateup as Country Manager for Ireland, building on the company’s long-established collaboration with distributors in the region as it continues to expand its presence and capabilities in the country. Tristan has over a decade of experience in the cyber security industry, including five years managing SonicWall partner business at long-time distributor Exertis. From there, he joined SonicWall, where he served as Strategic Account Manager for the UK and Ireland until his recent appointment in February 2020. Throughout his career, Tristan has helped the IT channel community arm itself with the right technology and services to offer the highest level of protection — laying the groundwork for his new role, in which he is challenged to drive double-digit growth in the region. Chronic skills shortage Will Benton, Regional Director, Northern Europe at SonicWall, said: “Tristan’s experience and skills have already proved invaluable in establishing our presence in Ireland since his appointment. SonicWall places great importance in its partner relationships, and Tristan’s strong experience on both sides of the relationship contributes to bringing us even closer to our partner network in Ireland.” The announcement comes after recent enhancements were made to SonicWall’s MSSP programme last April. The programme was designed to assist MSSPs in helping their customers bridge the cyber security business gap resulting from the expansion of threat vectors coupled with tightening budgets and the chronic skills shortage. Enterprise cyber security solutions SonicWall has evolved its Boundless security offering to cover the skills and budget gaps caused" To address the needs of Ireland-based customers in the era of Boundless Cybersecurity, SonicWall will be consolidating its channel strategy in the region, responding to the rising demand for enterprise cyber security solutions in the growing Irish economy and the strong competitive market. “Ireland is growing strongly, and that brings security concerns,” Bateup said. “Recently, Irish businesses have had to deal with increasingly insidious threats from cybercriminals while adjusting to a 100% remote workforce. SonicWall has evolved its Boundless security offering to cover the skills and budget gaps caused by just such a scenario. So, joining the team when today's Irish customers need hyper-distributed IT is the right move at the right time." Sales engineering resources SonicWall is also expanding its partner base in order to refine its focus in the Irish market and offer a wider range of solutions to customers. To this end, it is also strengthening its position by establishing additional resources such as dedicated sales engineering resources and field sales. SonicWall, a 100% channel-focused company, has over 20,000 partners worldwide. Partners have the benefit of participating in the award-winning SecureFirst partner programme and SonicWall University, designed to educate partners while helping them grow and expand their business. With innovation as well as disruption accelerating across EMEA, it is more important than ever that extensive partner communities fully leverage the wide breadth of solutions businesses offer, from wireless, cloud and endpoint to remote access and more.
Pulse Secure, the provider of software-defined Secure Access solutions, announced that Pulse Secure was recognised among Representative Vendors within Gartner’s Market Guide for Zero Trust Network Access (ZTNA). Pulse SDP provides direct device-to-application trusted connectivity only after successful user, device and security state verification. The solution offers enterprises the only dual-mode VPN and SDP architecture that yields single-pane-of-glass management with unified policy administration, simplified device coverage and granular, stateful access enforcement. As a result, organisations gain Zero Trust control by working within their existing hybrid IT infrastructure and security ecosystem. June 2020 Gartner report According to the June 2020 Gartner report: “ZTNA augments traditional VPN technologies for application access, and removes the excessive trust once required to allow employees and partners to connect and collaborate. Security and risk management leaders should pilot ZTNA projects as part of a SASE strategy or to rapidly expand remote access. Gartner recommends security and risk management leaders responsible for infrastructure security should:" "Deploy a ZTNA product that relies on multiple contextual aspects to establish and adapt trust for application-level access. Stop relying primarily on IP addresses and network location as a proxy for trust." "Evaluate the use of a cloud-based ZTNA to offload some use cases if one’s traditional remote access VPN is experiencing limitations in capacity or bandwidth limitations because of an expanded remote workforce." "Choose ZTNA products that integrate with common multifactor authentication products to expand identity assurance beyond a single factor, which is an important supplement to the ZTNA principle of context-based adaptive access control.” Pulse Secure offers a portfolio of Secure Access solutions and Suites that provide exceptional usability, contextual intelligence and policy orchestration to enable easy, protected user and device access to resources and applications across data centre and cloud environments. Pulse SDP extends the company’s foundation of Zero Trust with additional adaptive “verify, then trust” capabilities. Key features of Pulse SDP include: Dual-mode VPN, multi-factor authentication and secured connections Dual-mode VPN and SDP architecture that provides enterprises with unified management and operational visibility across public cloud, private cloud, and data centre. Extensive multi-factor authentication (MFA) and authorisation options to ensure users, their devices, and the applications they access are verified before and during transactions. Uniform policy management that enables consistently provisioned secure connections. Stateful access enforcement, Single Sign-On Unified Secured Access Platform Granular, stateful access enforcement with on-demand, application-level access that supports anytime, anywhere access and preferred device use. Enhanced user experience offering users easy and seamless access options including web portal, application-activated, single sign-on (SSO), and captive portal. Deployment flexibility with freedom to move or extend on-premise implementation through public and private cloud, or with a hosting provider or managed service provider of choice. Reduced total cost of ownership with unified Secure Access platform that works with a customer’s existing investment and access ecosystem. Secure access from any device “Enabling users with secure access to applications and resources in Hybrid-IT environments from anywhere, and from any device, is increasingly critical to organisations to ensure productivity and business continuity as they accelerate their digital transformation journeys” said Sudhakar Ramakrishna, CEO at Pulse Secure. “We are pleased to be acknowledged in the ZTNA market and invite enterprises and resellers to leverage our solutions and to experience how best to significantly enhance enterprise productivity, visibility and compliance with Zero Trust deployment.”
We all know that having CCTV around your home can help to protect you and your family. Without CCTV, you could end up in danger and an intruder could get away with breaking into your house, hurting your loved ones and stealing your possessions. Similarly, without CCTV in the office, you’ll be leaving yourself open to all kinds of damage and could lose a lot of equipment in the process. In short, making sure you have CCTV is important for both home and business security. However, it can be improved to become a more effective system so that you’re better protected, and can even deter a potential intruder without having to panic. In our world of ever-changing technology, we’re able to upgrade and enhance our CCTV systems so they can become a monitored system. Remote CCTV monitoring is an ideal way to protect everyone and everything whether you’re at home or at a workplace. What is remote CCTV monitoring? For a long time, CCTV was one of the best ways to keep your home, the office and people safe. But people started to notice that it would only deter people so much of the time and often the cameras were ignored by intruders. They would just cover their faces and hope for the best as they steal from a home, office or any other premises. Remote CCTV monitoring is a system that can loop into your existing CCTV, or come preinstalled with a new system. This technology sends a feed to a control room full of trained operators that are on call 24/7. Within this control room, operators are able to respond to any sort of distress call or unauthorised movement on the property line. How does it work? Remote CCTV monitoring works by attaching to a live feed of your CCTV system, existing or new, so that the signal and images can be passed to a team of operators. These operators are on hand 24/7 so that if there is a problem, you know that you're safe in the hands of a specialist team. The specialist team has been trained to mitigate the chances of somebody breaking into your home when the system is triggered; similarly they call the local authorities instantly so that the potential intruder has less time to flee the scene. This is especially important if an intruder is already inside your property because they have less time to steal your items and leave. Without CCTV in the office, you’ll be leaving yourself open to all kinds of damage and could lose a lot of equipment in the process One of the biggest questions that revolve around remote CCTV monitoring is the idea of operators watching the CCTV at all times. Luckily most remote CCTV monitoring systems will incorporate a motion detection system to accompany your CCTV. Motion detection offers the ability to alert a control room if there is an unauthorised entry to the property line. These motion detection systems are state-of-the-art and so, depending on the system that you choose, they can watch over your property from a number of angles. Once the motion detection system has been triggered and the alert has been sent to the control room, then and only then will the operators get involved. This means that until the motion detection system has been triggered, nobody will watch your live CCTV feed. After one of the systems has been triggered, one of the specialist operators will instantly jump into action. This means that they can take different measures to deter any potential intruder and make sure that they do everything in their power to stop any damage or theft from the premises. In addition to the motion detection system and CCTV, you are able to opt for a public address (PA) system too. This means that an operator is able to shout commands through the PA system and potentially scare away any intruder. The intruder will also be warned about the fact that local authorities have already been called to the location. Remote monitoring versus traditional CCTV Motion detection offers the ability to alert a control room if there is an unauthorised entry to the property line Having a monitored CCTV system means that you're able to better protect yourself, your business, employees and even your loved ones. Whether you're at home or in the office, having someone looking over your shoulder protecting your every move is something that can be appreciated by everybody. The biggest problem with just having traditional CCTV, is that it is a reactive system. This means that rather than stopping crime, a CCTV system just records it. While the thought is that having a CCTV camera visible can deter some intruders, there's no real evidence to suggest that it stops anybody; anyone can simply cover their face and carry on breaking into your home, office or even your car. As mentioned, remote CCTV monitoring is going to tackle that problem and make sure that someone is on hand to protect you at all times.
COVID-19 has been a thorn in the side of countless companies within the security industry and far beyond. Here, we speak with Richard Huison, Regional General Manager for the UK and Europe at Gallagher Security, who summises his personal experience from these recent months and how Gallagher has adapted in the face of pandemic-induced adversity. How has the COVID-19 crisis impacted Gallagher on a day-to-day basis? Gallagher was actually well placed as a result of work already in progress with a number of visionaries and innovators within our business, such as our CIO Neville Richardson. They are determined to put the business on the front foot, making it more digital and proactive in delivering high speed change and we had already been migrating to Microsoft Teams before COVID-19 first reared its ugly head. It’s part of our philosophy to make our business and the solutions we create as stable, reliable and resilient as possible. Gallagher has adapted to the new way of operating fairly seamlessly, while still working alongside the evolving guidance from governments around the world It means Gallagher has adapted to the new way of operating fairly seamlessly, while still working alongside the evolving guidance from governments around the world. When lockdown was imposed, we set about prioritising our clients’ needs and delivering on our commitments as a critical supplier. The Gallagher leadership team quickly rolled out the means to stay connected, positive and safe as each region went into isolation. Effective communication, both internally and externally, has always been a critical success factor for our business. That hasn’t changed with the more remote and virtual nature of our communication now and, if anything, it’s even more important both for business continuity and for the personal wellbeing of each and every one of our colleagues. We’ve quickly adapted to this new way of working and have even become quite adept at recognising people’s contributions and acknowledging a job well done in new ways, such as using the emojis on Microsoft Teams. Perhaps the most striking example of this is our new European marketing manager Bethan Thompson, who joined Gallagher on 1 April, little over a week after lockdown was imposed in the UK. She has enjoyed the richest and most comprehensive introduction to the business from the safety of her own home armed with just a laptop and Teams. What can be the benefits of having employees working from home? There are many benefits of working remotely with productivity right up the top of the list. By reducing the unproductive time spent commuting and travelling to meetings, we are able to get much more done in a day. Add to this the reduction in stress and improved work-life balance and it makes for an impressive formula of happier, healthier and more motivated colleagues. And it’s still easy to measure results no matter where someone is working. We’ve quickly adapted to this new way of working and have even become quite adept at recognising people’s contributions and acknowledging a job well done To be honest, before COVID, we didn’t disconnect enough, close the laptop, switch off our technology and allow ourselves NOT to respond instantly. But trust is an integral part of our culture at Gallagher and we can easily and effectively continue to champion the right balance and support for the team moving forward. How can employees ensure they keep a healthy work/life balance? Working from home can require some personal discipline around taking regular breaks and disconnecting from technology. I encourage all my colleagues to stay active and get regular exercise during the day. Taking time out allows you to process ideas with greater clarity, to be more creative, to plan your day and use your time more effectively – all of which is part of achieving that balance. And it’s important that we do switch off and close our laptop at the end of the day, which requires some discipline when you work for a business headquartered in New Zealand, where they are 11 hours ahead. It’s good to cultivate hobbies and welcome distractions that you are passionate about, to switch off from work more effectively. Personally, I love to be outside on a long dog walk with no technology. It’s liberating. Are you seeing that businesses are already beginning to think differently about their security? We have to remember why security is important. We all have a different view on how we should maintain business continuity. Yes, properties need a reliable detection and defence solution to resist the opportunist. With the mass migration to work remotely, business leaders are concerned that their IT systems are vulnerable to attack and we read daily about the growth in cyber-attacks. It’s common sense to protect your business with a suitable access control and intrusion detection system and the pandemic has proven to business the value of being truly resilient and able to still operate whatever circumstances ensue. What will be the biggest security challenges facing businesses over the next six months? In that timeframe, I don’t see us returning to how things were prior to the pandemic, so businesses will have to adapt to a new normal. We will have to adopt a more holistic view of security, encompassing safety, security and wellbeing, with our teams at the heart of that. In the new world, how can we maintain our teams’ safety at home, or limit them to certain floor space or introduce rotas for office attendance and keep surfaces virus free while they’re there? We need to be alert to where the next threat will come from and mitigate risk against both cyber and biological threat as we’ve seen a virus in either domain can be devastating. How is Gallagher meeting the evolving demands of the market? To be honest, Gallagher has always been ahead of the curve. We’ve been talking about competencies, compliance and resilience for decades, long before cyber became the buzzword. Everything we do is related to business resilience and continuity and security is baked in to our products and solutions at source, providing confidence and reliability for all of our customers.
The safeguarding of premises through the monitoring of entrance and exit points has traditionally been a very manual aspect of security. Human operators have been relied on to make decisions about who to admit and deny based on levels of authorisation and the appropriate credentials. But the access control business, like many industries before it, is undergoing its own digital transformation; one where the protection of premises, assets and people is increasingly delivered by interconnected systems utilising IoT devices and cloud infrastructure to offer greater levels of security and protection. Modern access control solutions range from simple card readers to two factor authentication systems using video surveillance as a secondary means of identification, right through to complex networks of thermal cameras, audio speakers and sensors. These systems, connected through the cloud, can be customised and scaled to meet the precise requirements of today’s customer. And it’s the ease of cloud integration, combined with open technologies and platforms that is encouraging increasing collaboration and exciting developments while rendering legacy systems largely unfit for purpose. Remote management and advanced diagnostics Cloud technology and IoT connectivity means remote management and advanced diagnostics form an integral part of every security solution.Cloud technology and IoT connectivity means remote management and advanced diagnostics form an integral part of every security solution. For example, as the world faces an unprecedented challenge and the COVID-19 pandemic continues to cause disruption, the ability to monitor and manage access to sites remotely is a welcome advantage for security teams who might otherwise have to check premises in person and risk breaking social distancing regulations. The benefits of not physically having to be on site extend to the locations within which these technologies can be utilised. As an example, within a critical infrastructure energy project, access can be granted remotely for maintenance on hard to reach locations. Advanced diagnostics can also play a part in such a scenario. When access control is integrated with video surveillance and IP audio, real-time monitoring of access points can identify possible trespassers with automated audio messages used to deter illegal access and making any dangers clear. And with video surveillance in the mix, high quality footage can be provided to authorities with real-time evidence of a crime in progress. Comprehensive protection in retail Within the retail industry, autonomous, cashier-less stores are already growing in popularity The use of connected technologies for advanced protection extends to many forward-looking applications. Within the retail industry, autonomous, cashier-less stores are already growing in popularity. Customers are able to use mobile technology to self-scan their chosen products and make payments, all from using a dedicated app. From an access control and security perspective, connected doors can be controlled to protect staff and monitor shopper movement. Remote management includes tasks such as rolling out firmware updates or restarting door controllers, with push notifications sent immediately to security personnel in the event of a breach or a door left open. Remote monitoring access control in storage In the storage facility space, this too can now be entirely run through the cloud with remote monitoring of access control and surveillance providing a secure and streamlined service. There is much to gain from automating the customer journey, where storage lockers are selected online and, following payment, customers are granted access. Through an app the customer can share their access with others, check event logs, and activate notifications. With traditional padlocks the sharing of access is not as practical, and it’s not easy for managers to keep a record of storage locker access. Online doors and locks enable monitoring capabilities and heightened security for both operators and customers. The elimination of manual tasks, in both scenarios, represents cost savings. When doors are connected to the cloud, their geographical location is rendered largely irrelevant. Online doors and locks enable monitoring capabilities and heightened security for both operators and customers They become IoT devices which are fully integrated and remotely programmable from anywhere, at any time. This creates a powerful advantage for the managers of these environments, making it possible to report on the status of a whole chain of stores, or to monitor access to numerous storage facilities, using the intelligence that the technology provides from the data it collects. Open platforms power continuous innovation All of these examples rely on open technology to make it possible, allowing developers and technology providers to avoid the pitfalls that come with the use of proprietary systems. The limitations of such systems have meant that the ideas, designs and concepts of the few have stifled the creativity and potential of the many, holding back innovation and letting the solutions become tired and their application predictable. Proprietary systems have meant that solution providers have been unable to meet their customers’ requirements until the latest upgrade becomes available or a new solution is rolled out. This use of open technology enables a system that allows for collaboration, the sharing of ideas and for the creation of partnerships to produce ground-breaking new applications of technology. Open systems demonstrate a confidence in a vendor’s own solutions and a willingness to share and encourage others to innovate and to facilitate joint learning. An example of the dynamic use of open technology is Axis’ physical access control hardware, which enables partners to develop their own cloud-based software for control and analysis of access points, all the while building and expanding on Axis’ technology platform. Modern access control solutions range from simple card readers to two factor authentication systems using video surveillance as a secondary means of identification Opportunities for growth Open hardware, systems and platforms create opportunities for smaller and younger companies to participate and compete, giving them a good starting point, and some leverage within the industry when building and improving upon existing, proven technologies. This is important for the evolution and continual relevance of the physical security industry in a digitally enabled world. Through increased collaboration across technology platforms, and utilising the full range of possibilities afforded by the cloud environment, the manufacturers, vendors and installers of today’s IP enabled access control systems can continue to create smart solutions to meet the ever-changing demands and requirements of their customers across industry.
The COVID-19 global pandemic will have a profound and lasting impact on the physical security industry. It will boost adoption of new technologies to address new types of threats. It will map out a path for new involvement of physical security technologies in areas of public health. It will raise new notions of privacy and turn previous thinking about privacy on its head. And the aftermath of the pandemic will give rise to all these changes in a breathtakingly accelerated timeframe. In the wake of the pandemic, change will come faster than ever, and the industry will be more challenged than ever to keep pace. Security and the futureIn the wake of the pandemic, change will come faster than ever, and the industry will be more challenged than ever to keep pace These were some of the thoughts I heard recently in a panel discussion titled “Crisis and the Everyday,” which was part of Genetec’s Connect’DX virtual trade show, April 20-21. The virtual conversation – emphasising both in form and content the current topsy-turvy state of the world – included interesting insights on the current pandemic and its near- and long-term impact on the industry. “In the middle of this pandemic, there is an opportunity to help security reinvent itself,” said Brad Brekke, Principal, The Brekke Group, one of the panelists. “Amid the business disruption, we should ask ‘what’s the new playbook?’ It’s an opportunity for security to look at ourselves now and look at a business plan of what the future might look like. We need to align with the business model of the corporation and define our role more around business and not so much around security. “How do you support the business and, more broadly, societies and communities?” The new normal for security The “new normal” for security will include addressing biological risks alongside our traditional emphasis on physical risk and digital risk. “Some industry sectors are being challenged in a way I have not seen in my lifetime,” said Brekke. “But they are learning fast.” “We should take a look at where we have been and where we are going,” said Brekke, whose firm develops comprehensive strategies to align security organisations with corporate missions. “This is a point in time that has never existed, and a time to take a fresh look at what security is to the corporation and greater community. It’s more a mindset than a specific set of tasks. “We just need to take a fresh look from a mix of perspectives.” “Crisis and the Everyday" was part of Genetec’s Connect’DX virtual trade show Infrared cameras and access control technologies New technologies to address the pandemic are enabling some nations around the world to track how people come and go and who they are exposed to. Technologies like infrared cameras are being used to detect body temperatures, and access control helps to monitor occupancy and social distancing. But what will such use of these technologies mean in the long term? Technologies like infrared cameras are being used to detect body temperatures, and access control helps to monitor occupancy and social distancing “We will see whether people will become more comfortable with this technology,” said Ken Lochiatto, President and CEO, Convergint Technologies, a service-based security integration company. “Tools are in hand, and coming soon, that will allow us to be more proactive, to step in and measure the health of colleagues, for example,” said Lochiatto. “There are a lot of questions that will have to be addressed, and a lot of discussion will have to happen. Coronavirus will knock down the barriers (to the use of newer technology) in the short term, but where will it settle two years from now?” Manufacturer philanthropy Security product manufacturers are expanding their scope beyond law enforcement and emergency management and stepping forward to help with the public good. “Technology in the security space is moving faster than the political establishment is thinking about,” adds Lochiatto. “We have to manage it as an industry so the government will not step in. We need to manage the discussion.” An accelerated timeline will raise the stakes even further. “All the questions that would have taken longer to answer will be answered in the next 6-8 months. For the security industry, it will drive even greater need for products,” said Lochiatto. “The biggest question is ‘Where does this all go?’” said Brekke. “What is the new normal? What is the future, and how do we prepare our companies for it? What does technology look like in the future? There isn’t just one particular set of questions, just a constant stream of ‘What’s next?’” Public health versus individual liberty The current environment of disruption will shift the playbook and rebalance the tradeoff between privacy and protection, especially as it pertains to sharing medical information. “There will be a new balance between public health and safety as a whole versus individual liberties,” said Brekke. “Technology providers need to be at the table talking about the solutions. We should all be engaged in government affairs to balance the discussion and add our own perspectives. As a society and country, we have to come to a different perspective on this.” The current environment of disruption will shift the playbook and rebalance the tradeoff between privacy and protection “There are not enough ethics and guard rails,” said Jonathan Ballon, Vice President and General Manager, Intel Corp. “The majority of people are not afraid enough. They should be afraid; we need more regulation. We need to establish an ethical code of conduct for use of technology in these situations. We need to eliminate bias, respect individuals, and ensure people are being treated fairly. “In the next several years, there will be a lot of experimentation in the quest to get to a future state we can see and almost grasp. There will be black eyes and bruises on the path to getting there.” From smart security to more intelligent technology After the pandemic, the innovation climate will befit new technology adoption. “Platforms are only limited by our imaginations, and it creates an extraordinary opportunity and drives a lot of economic value,” said Ballon. “Long-term, the future is extremely bright. Companies should ensure that they are resilient and take advantage of another period of technology adoption, which we see coming out of every economic downturn.” After the pandemic, the innovation climate will befit new technology adoption Another evolution in the market is a transition from “smart” systems to more “intelligent” ones. Intelligence includes the ability to “learn” using tools such as deep learning and artificial intelligence. “Systems are going from smart to intelligent to autonomous, including systems that can operate within the constraints we have established,” said Ballon. Pierre Racz, president and CEO of Genetec, offered some words of caution about the growth of artificial intelligence in his keynote presentation, “AI Hype Self Defense.” Racz sought to provide guidance on the limits of the technology and urged the online audience to be skeptical of technology that “works best when you need it least.” “Science and technology are morally neutral,” he said. “How we use them is not.” Intelligent automation over artificial intelligence Specifically, Racz contends that artificial intelligence “doesn’t exist” and provides the “reasoning power of an earthworm”. AI systems don’t know anything that isn’t included in their input data – for better and for worse. Racz contends that artificial intelligence “doesn’t exist” and provides the “reasoning power of an earthworm” “A properly designed system can be useful [only] if you engineer around the false positives, false negatives and the unanticipated training set biases,” said Racz. For example, because AI is based on probabilities, it doesn’t perform as well when identifying improbable things. In lieu of “artificial intelligence,” Racz recommends the term “intelligent automation” (IA), which describes using a machine (computer) for heavy computational lifting and keeping a human in the loop to provide intuition and creativity. “Do not misinterpret crafty guessing for intelligence or thinking,” Racz warns. “AI doesn’t exist, but real stupidity exists. And we must design our systems taking into account the legitimate fears of the public we serve.”
All schools and universities need to address three different levels of security when considering access control. The first level is the least vulnerable of the three and concerns the perimeter entry and exit points. Here, incorporating some level of electronic access control should be a consideration, whether that is a combination of electronic and mechanical door hardware, or a complete electronic solution. An electromechanical solution, such as electric strikes, can be beneficial in the effectiveness of perimeter security as they provide greater visitor management and traffic control. Data capture form to appear here! Facilitating visitor entry Electric strikes are able to control access via keypads, cards and proximity readers Electric strikes are able to control access via keypads, cards and proximity readers. When combined with mechanical locks, they provide the benefits of unrestricted egress. The second level is more vulnerable than the first and relates to the point at which people are screened before entering the interior of the school. As this area will be designed primarily to facilitate visitor entry, it will require adequate monitoring of access control. To do this, the latches used on access-controlled egress doors can be electronically controlled from the reception area or school office. Exit or entry doors can be opened by a push from the inside and, if the entry area is also an emergency exit, electronically-powered panic bars can also provide an effective solution. More and more schools are installing visitor management systems to control who can and cannot get into the building. Access control solutions Finally, the third level – and the most vulnerable – refers to the core of the school that both students and staff occupy. These are internal hallways, corridors, stairwells, entry points and restricted areas (such as staff lounges and science laboratories). These are the areas where a school must foster the safest environments for pupils, while also providing protection as they often contain confidential information, expensive equipment or chemicals. The access control system is linked to all doors within the school building A number of different access control solutions are beneficial, whether electronic, mechanical or a combination of the two. For electronic solutions, there are two options available: remote or centralised systems. With remote lockdown systems, individual locks are activated by remote control within proximity to the door. With integrated centralised systems, the access control system is linked to all doors within the school building and locked at the touch of a button. Prevent unauthorised persons Mechanical solutions, which include a cylinder lock and key, are also suitable for places such as classrooms, as doors can be locked externally with a key or internally with a thumbturn, to prevent unauthorised persons from entering. At one university in the United States, a smart RFID wire-free access control solution has been installed At one university in the United States, a smart RFID wire-free access control solution has been installed. The SALTO Virtual Network (SVN) wire-free system pushes and pulls data from the university’s ‘hot spot’ entry points to all their offline locks. By choosing a wire-free solution, the university only had to run wires to their exterior doors. The interior doors do not require wiring as these locks are stand-alone wire-free locks. Student accommodation block Securing access to student accommodates is another concern among colleges. One university in the United Kingdom wanted a security system to protect their student accommodation; in particular, a keyless system that would grant 24/7 access to its students while also enabling campus security to monitor these activities remotely. They chose Vanderbilt’s ACT365, which keeps audit trails by monitoring and recording fob activity. When another English university sought electronic locks for its newest student accommodation block, it turned to Aperio wireless locking technology from ASSA ABLOY. They used the wireless locks to extend the Gallagher Command Centre access control system to a student residence with 231 en suite rooms separated into flats for between 8 and 13 postgraduates. Aperio wireless locks are battery-powered and use less energy than wired magnetic security locks.
The phrase ‘eye in the sky’ is taking on a whole new meaning as the concept of home security drones becomes a plausible idea that could be realised in the not-too-distant future. It’s a possibility that came to light recently in the form of a patent that was granted to Amazon for ‘Image Creation Using Geo-Fence Data’. The patent specifies a “geo-fence, which may be a virtual perimeter or boundary around a real-world geographic area.” An unmanned autonomous vehicle (UAV) may provide surveillance images of data of objects inside the geo-fence. Any video captured outside the geo-fence would be obscured or objects removed to ensure privacy. Detecting break-ins and fires The Amazon patent outlines how its UAVs could perform a surveillance action at a property of an authorised party. It would be ‘hired’ to look out for open garage doors, broken windows, graffiti, or even a fire. The drone would only view authorised locations and provide information back to the homeowner. The idea is to deploy Amazon’s ‘delivery drone’ to provide surveillance of customers’ homes The idea is to deploy Amazon’s previously proposed (but not yet realised) ‘delivery drone’ to provide surveillance of customers’ homes between making deliveries. (One could say the employment situation has truly peaked when drones start taking second jobs!) In a ‘surveillance as a service’ scenario, Amazon’s customers would pay for visits on an hourly, daily or weekly basis. Drones would be equipped with night vision and microphones to expand their sensing capabilities. (The microphone aspect seems creepy until you remember that Amazon’s Echo devices already have a microphone listening to what happens inside our homes.) A remaining obstacle for such a plan is the matter of U.S. Federal Aviation Administration regulations that restrict commercial drone operations and even hobbyist or consumer drone flights outside an operator’s line of sight. Drones would be equipped with night vision and microphones to expand their sensing capabilities Amazon company officials have stressed that the plan is still in its infancy and implementation would be in the future. “The patent clearly states that it would be an opt-in service available to customers who authorise monitoring of their home,” Amazon’s John Tagle told National Public Radio (NPR). Although use of drones for security is in the future, the launch of delivery drones appears to be on the nearer-term horizon. Amazon has said it hopes to launch a commercial service in a matter of months. Amazon’s competitor – Alphabet’s Wing – has already been granted FAA approval to make deliveries in the United States. Autonomous drone monitoring Another company, Sunflower Labs, is also working on security drones and has created a prototype that uses an autonomous drone to monitor activity in conjunction with a series of motion and vibration sensors located around the house. The sensors, which can detect footsteps or car engines, are placed around the home to create a virtual map, track objects and guide the drone. The ground sensors would alert a homeowner of something moving around the house. The homeowner could then elect to deploy the drone, which would stream a live video feed to a smart phone or tablet. Smart home technologies are in the process of transforming the home security market Smart home technologies and do-it-yourself security installations are in the process of transforming the home security market. The traditional ‘alarm service’ model is barely recognisable today among all the changes and new products, from home automation to video doorbells to personal assistants such as Siri and Alexa. Technology-loving consumers are looking at an expanding menu of options just as they are embracing new ways to protect their homes. Instead of a call to an alarm company, a consumer today may instead view a video of a burglary-in-progress live-streamed to their smart phone. Amazon and the other Big Tech companies are already playing a role in the disruption. Home security provided by a drone (on its way to delivering a package down the street) may seem like an extreme divergence from the norm. But such is the changing world of smart homes and residential security.
Loughborough University has selected the ASSA CLIQ® Remote system from the ASSA ABLOY Door Hardware Group to help secure its plant control rooms. With more than 18,000 students at Loughborough University for 2018-19, the award-winning ASSA CLIQ® Remote technology has been used across the site for a range of different applications, including teaching laboratories and offices. Its success as a security and access control solution has led to it being extended to cover the university’s plant control rooms too. Providing an easy-to-use electromechanical locking system, the ASSA CLIQ® Remote solution uses high-end micro-electronics and programmable keys and cylinders to offer flexible control over access rights. ASSA CLIQ® Remote solution Loughborough University can programme and update each key remotely, removing or granting access privileges for the key holder in real-time. This allows only those with the necessary authority at the university to enter a plant control room. Furthermore, the system removes the security risks associated with lost or stolen keys, eliminating the time and cost spent on replacing a mechanical lock. For staff that have access to these areas and then leave the university, their access rights can be easily be removed by using the system’s simple, web-based interface, ensuring ex-employees and contractors never pose a security risk. ASSA CLIQ® Remote also provides a full audit trail for assured peace of mind around who has accessed the plant control rooms and - because the locks are powered by a battery inside the programmable ASSA CLIQ® Remote key - no extra wiring is required when installing the system. Wireless electronics locks Phil Sheppard, Senior Clerk of Works at Loughborough University, said: “For us, a big advantage to ASSA CLIQ® Remote is that its electronics effectively extend the patent of the key indefinitely. The system cannot be copied, which means ASSA CLIQ® Remote provides a long-lasting access control solution.” “The audit capabilities of the system are also really useful, ensuring we know exactly who accessed a plant control room, and when. The system can be extended really easily as well, which has been another key reason why we continue to use ASSA CLIQ® Remote to meet our access control needs across the university.” “Ultimately, by working with a trusted manufacturer such as ASSA ABLOY, we can be safe in the knowledge that only authorised individuals can access the university’s plant control rooms.” Secure access control solution Sean Falkinder, National Sales Manager for ASSA CLIQ® Remote, adds: “We have provided a range of solutions for Loughborough University over the years, and the use of ASSA CLIQ® Remote for the university’s plant control rooms is just the latest success story. We’re delighted that the technology is able to provide such a safe and secure access control solution for the site.”
Staff safety and customer service will be boosted across Sydney’s rail network with the deployment of SafeZone®, the safety, security and emergency management solution from CriticalArc. The ground-breaking technology will enable Sydney Trains to manage a wide range of situations, including mitigating risks to staff and customers and strengthening the capacity to respond to incidents and emergencies across the network. For example, SafeZone will put up to 2,500 of Sydney Trains’ front-line staff directly in touch with security control room teams, letting them summon immediate assistance at the touch of a button. High safety standards The investment in SafeZone will cover over 175 stations across the greater Sydney area and is the latest step in a modernisation drive to transform Sydney Trains’ operations, with more than a million customer journeys taken on the network every weekday. SafeZone enables staff to call for assistance and receive optimised response at the touch of a button, via their assigned smartphone. This capability is as valuable on crowded city platforms at rush-hour as it is on more remote suburban stations where staff may be working alone late at night. “Sydney Trains is committed to fulfilling our duty of care to all of our staff and enhancing our high safety standards in order to maintain and enrich customer service levels on station platforms,” explains Mark Edmonds, Manager of Security Capability, Network Operations. Real-time situational awareness Sydney Trains will now have real-time situational awareness, and a more complete picture of critical events “Employing proven technology such as SafeZone will help us solve day-to-day challenges, further improving the safety of our staff and helping them work more effectively to continue to deliver world-class service.” Across its transportation network, Sydney Trains will now have real-time situational awareness, and a more complete picture of critical events. This makes possible a wide range of security management functions, such as sending targeted alerts to specific individuals and groups. It enables control room operators to pinpoint the location of individuals needing help so they can initiate the most efficient and rapid emergency response. Primary safety concern “This visionary deployment by Sydney Trains will have a significant impact on the safety and wellbeing of staff and thus will produce dividends with regards to customer service and satisfaction, and the potential for streamlined operations moving forward,” says Glenn Farrant, CEO, CriticalArc. “With staff safety a primary concern for all rail operators internationally, implementation of this technology by Sydney Trains represents a significant step forward for the sector and will be the blueprint for many implementations to follow.”
Family-owned and run company, Bijou Wedding Venues, that offers exclusive wedding venues coupled with exceptional food and service, is improving its safety in response to the COVID-19 pandemic by implementing a state-of-the-art body temperature monitoring solution from ANT Telecom to reduce the risk of virus transmission. With restrictions lifting to enable larger groups of people to meet, weddings can begin to take place with greater numbers of guests. Bijou therefore wanted a solution that could enable special days to go ahead with confidence and reached out to ANT Telecom to implement its thermal imaging cameras at wedding venue entrances to ensure a significant reduction in risk to guests. Temperature monitoring cameras With Bijou operating across a range of venues, the cameras will be used to scan guests discreetly as they enter the venues to ensure minimum disruption to the day, and allow full focus to be on the couple’s celebration with families and friends. It comes as part of a range of other initiatives the company is implementing, such as changes to seating arrangements to ensure ample distancing; provision of outdoor ceremonies where possible; new methods of serving food and drink; as well as many other adaptations to minimise risk. ANT Telecom’s temperature monitoring cameras can be set up very quickly and are easy to use. The camera can detect multiple people at the same time, so is perfectly suited to scan wedding guests entering the venue. Protect guests and staff Our cameras support fast temperature measurement with discreet notifications to ensure minimal disruption" Sam Cutmore-Scott, Managing Director, Bijou Wedding Venues, comments: “We’ve made a range of changes in light of the pandemic to ensure that weddings can continue as planned and we’re pleased to offer couples this extra layer of safety alongside other measures. The temperature monitoring cameras allow us to protect all of our guests and staff right from the entrance of the venue. This is one of our key initiatives, and on top of this our exclusive venue model means venues can be completely sanitised between events and essentially acts as a private home for the couple, unlike hotel venues which have other people and staff entering and leaving the site.” Discreet notifications Upon camera detection of a temperature above the guidelines, that guest can be discreetly notified by a nominated person on behalf of the couple and alternative arrangements made, for instance inviting them to watch live streamed footage of the ceremony. Klaus Allion, Managing Director, ANT Telecom, states: “We’re delighted to support Bijou in enabling couples’ memorable days to continue and take place as close to as expected as possible. Our cameras support fast temperature measurement with discreet notifications to ensure minimal disruption and peace of mind for both the couple and guests at the venue, as well as staff. It’s an essential component of hospitality and event management and will help many types of gatherings similar to this take place safely as the fallout from the pandemic continues.”
ISONAS Inc., a globally renowned IP access control and hardware solutions provider, and part of the Allegion family of brands, has announced that the ISONAS Pure IP access control solution has been installed at a new flagship distribution centre for Premier Packaging, an international packaging solutions company, with facilities in 14 locations nationwide. ISONAS Pure IP access control In the summer of 2018, Premier Packaging was looking to implement an access control system to help secure their brand-new 320,000-square-foot facility in Louisville, Kentucky. After working closely on a recent project with Orion Networks, a trusted IT infrastructure provider, Premier Packaging relied on their recommendation to implement a cutting-edge access control solution from ISONAS. With no access control system in place at any of their 14 locations and a combination of office workers, support staff, truck drivers and warehouse employees entering and existing the building daily, a process to control access was a necessity. Monitoring and tracking visitors to distribution centre A major challenge facing the new distribution centre was truck drivers, who came into the facility, were not company employees. With on average 250 people coming in and out of the new facility in Kentucky daily, monitoring and tracking who those people were and if they belonged there was imperative. They were also looking for the flexibility to manage the locking and unlocking of doors remotely, rather than having to rely on physical keys. “After comparing ISONAS to other access control systems out there, we knew that ISONAS was the right flexible access control solution to meet Premier Packaging’s security needs,” states Brock Jamison, VP and Director of Sales at Orion Networks. ISONAS RC-04 reader-controllers installed ISONAS Pure Access software was implemented to give the packaging company remote access capabilities The initial project consisted of 18 ISONAS RC-04 reader-controllers installed at their new distribution centre in Louisville. The RC-04 reader-controllers from ISONAS delivers advanced technical functionality with an easy installation process. In addition to the ISONAS hardware, the ISONAS Pure Access software was implemented to give the packaging company remote access capabilities. Pure Access Pure Access, ISONAS’s industry-renowned software, is a cloud-based access control application that provides users the ability to manage their access control from anywhere at any time, on any device. “We are extremely happy that our unique access control solution could help Premier Packaging improve safety and security at their new distribution center seamlessly,” states Jonathan Mooney, ISONAS Sales Leader. ISONAS cloud-based platform By using both the ISONAS hardware and software solution together, Premier Packaging was able to improve security and keep employees safe. With the ISONAS cloud-based platform, Premier now required all Louisville employees to enter the building using their ID badges to gain access. If an employee was not in the database and verified, then access would be denied. Future plans include rolling out the ISONAS access control solution to additional buildings and possibly integrating it with other security systems.
Places of leisure, where one spends one’s downtime, are public by design. Unlike a bank vault or power plant, they actively invite visitors. One can’t just lock them down and hope no one turns up. Equally, to ensure user and property safety, access must not be a free for all. Managing risk - separating authorised from unauthorised people and locations - is part of every site manager’s daily routine. Intelligent locking makes this workload a whole lot easier. Intelligent keys combine the powerful features of electronic access control with the convenience and familiarity of mechanical keys. In hugely diverse leisure settings across Europe, they already help managers do more with less. Everyone treasures their leisure. The right access solution can help one do it safely without putting a burden on those responsible for one’s security. We treasure our leisure. The right access solution can help us do it safely without putting a burden on those responsible for our security. Controlling access to outdoor sites and visitor attractions Obviously, for many leisure attractions, wired electronic security is not an option. Locations may be remote - far beyond the reach of mains electricity. Assets themselves may be outside. Thankfully, cabling is not essential for effective intelligent access control. Robust, battery-powered locking, backed by intuitive admin software one can access from anywhere, matches or exceeds the functionality of traditional wired access control. Padlocks built to withstand climate extremes integrate within one’s system exactly like standard interior locks. Intelligent electronic key systems are also budget friendly. Making the switch from mechanical security is not an all-or-nothing decision. The best intelligent key systems let one roll out gradually, as needs evolve and budgets allow. For example, the Llyn Brenig Reservoir and Visitor Centre in Wales attracts tens of thousands of tourists every year. Both mechanical and electromechanical locking protect a site which houses critical infrastructure and watersports facilities - with disparate security needs. Here electromechanical locking brings long-term cost savings to site owners Welsh Water, because locks no longer need to be changed when keys are lost. Permissions are simply deleted from the system software. In 2015, Twycross Zoo launched a £55 million, two-decade development plan. High on the agenda was a new intelligent key solution to replace a mechanical master-key system which was labour-intensive to administer. The new system’s flexibility has put zoo security managers in full control of their site. Only staff with the necessary authority and training can access animal enclosures. Carrying one programmable key able to open doors, windows and padlocks makes the security team’s rounds easier It’s simple for system administrators to issue time-defined user keys. These can permit vets or zookeepers access to enclosures for a specific time period outside regular hours - for example, in an emergency. When the period expires, the key no longer works and site integrity is automatically restored. Access control in the museum sector When Edvard Munch’s painting “The Scream” was stolen from an Oslo museum in 1994, thieves left a note which read: “Thanks for the poor security”. Securing museums - open spaces with priceless contents - presents one of security’s biggest challenges. Around 50,000 artworks are stolen every year, according to some estimates. Adding further complexity, many museums are located within historic properties. The building itself may be integral to the attraction - and come with strict heritage protections. Any new locking installation must make minimal mess. For this reason, wireless is increasingly the preferred choice. Wireless access systems based on robust, key-operated locking, rather than cards and other keyless credentials, combine a familiar technology (the metal key) with the intelligence to keep staff and collections safe. Carrying one programmable key able to open doors, cabinets, windows and padlocks makes the security team’s rounds easier. It also minimises the number of keys in circulation - with obvious security benefits. Companion software makes key tracking straightforward: one always knows who exactly is carrying credentials, can refine or amend those permissions quickly and order a full audit trail on demand. And these locks are discreet enough to maintain the property’s appearance. Museum access control in action London’s Design Museum needed access control designed to protect high-value assets and exhibits. Devices here protect a contemporary site with three galleries, a restaurant/café and an events space, with 100 permanent staff and hundreds (sometimes thousands) of daily visitors. The building has multiple door sizes and must meet British Standards compliance. Installation was easy and wire-free, because encrypted electronics inside CLIQ locks are powered by the standard batteries Electromechanical locks now control access through 56 doors, forming part of a security ecosystem which incorporates traditional mechanical locks, too. Using intuitive management software, security managers ensure every staff member accesses only the right areas. Contractors are issued with temporary programmable keys, which saves time formerly wasted escorting them around the building. The system the Design Museum chose - CLIQ® from ASSA ABLOY - also enables integration with third-party cloud-based solutions, for control via a single, central management interface. The delicate balance between protecting a precious building and guarding its contents sets a major challenge. Security and access control must be “subtle, but ever present,” according to one former moderator of the Museum Security Network. Invasive installation, showy or inappropriately designed devices and components cannot be considered. This was the checklist facing France’s Musée Maurice Denis: the museum is inside a listed 17th-century monument, so they turned to CLIQ access control technology for a solution. Drawing on extensive experience in the heritage sector, ASSA ABLOY delivered security without disrupting the building aesthetic. Installation was easy and wire-free, because encrypted electronics inside CLIQ locks are powered by the standard batteries inside every programmable key. No further power supply is needed at the door. Around 70 robust, hard-wearing cylinders and padlocks now secure doors and windows inside and outside the main building; waterproof padlocks protect CCTV camera housing on the exterior. Every employee receives access to relevant areas via a single CLIQ key, which administrators program with only the appropriate permissions. Insurance compliance is another major concern in the heritage sector. Indeed, insurers for 17th-century warship Vasa demand Sweden’s highest level of locking: Class 3. Yet the Vasamuseet’s access system must also allow 1.2 million annual visitors to move around freely, while keeping exhibits safe. To upgrade an existing mechanical system, around 700 interior door cylinders were equipped with CLIQ Remote electromechanical technology. Museum staff used to carry heavy chains with ten or more keys. Now facility managers can amend the access rights of everyone’s single CLIQ key at any time, even remotely, using the CLIQ Web Manager. It’s easy to issue contractors such as carpenters with access rights scheduled to end automatically as soon as their work is complete. Security for shopping and indoor leisure sites The electronics inside CLIQ locks are powered by the standard battery inside every key, not mains electricity According to one study completed two decades ago, one spends 87% of one’s time indoors. The number is probably higher now - and includes a huge chunk of one’s leisure time. Large retail multiplexes like Festival Place in the UK are a popular destination. Here over 170 shops, a cinema, sports centre and restaurants have an ever-changing roster of permanent staff, cleaners and out-of-hours contractors. Every person requires secure entry on demand. The public also needs open access for 18 hours every day. Yet a single lost mechanical key could become a security problem for all users and tenants. Installing 100 CLIQ electromechanical cylinders drastically cut the burden of mechanical key management. Now, cleaners and maintenance workers carry an intelligent key which unlocks specific doors for a pre-defined time period. Using simple online admin software, site managers can immediately de-authorise and reissue a lost key or amend any key’s permissions. Generating a comprehensive audit trail - who accessed which lock, and when - takes a couple of mouse clicks. CLIQ also cuts Festival Place operational costs. The electronics inside CLIQ locks are powered by the standard battery inside every key, not mains electricity. Installation was wireless, a huge saving on potentially expensive electrical work. At Festival Place and wherever one gathers to enjoy leisure - indoors or outside - CLIQ enables easy access control for all openings with just a simple, single, programmable key. To learn how you can put CLIQ® intelligent key technology to work in agile, flexible, secure public services, download a free introductory guide at https://campaigns.assaabloyopeningsolutions.eu/eCLIQ
Perusahaan Gas Negara (PGN) is a company in Indonesia for the transportation and distribution of natural gas. The total length of distribution pipelines of this company is 3,187 km, serving around 84 million customers. As the owner and operator of four transmission pipelines, PGN is responsible for guaranteeing security along the entire chain of conservation and distribution of gas and for delivering products and services in accordance with the needs of consumers. Securing gas supply lines During the transport phase, the gas is pushed through the pipelines at very high pressure. When it reaches the end-users, however, its delivery pressure must be adjusted so that it falls within an acceptable range (as detailed in the contractual delivery specifications). This is to prevent consumers from being exposed to the full transport pressure reached within the pipeline. A metre and regulator station is used to regulate the Natural Gas outlet pressure, and reduce it to an acceptable value. To this end, PGN has developed a meter and regulator station (the Master Control Station) that works via remote control, directed from the control room. This project plays an active role in the PGN's commitment to achieving Operational Excellence in process management, with the focus on optimising safety, improving efficiency and on maximising reliability throughout the gas supply chain operations. PTZ cameras and remote monitoring To guarantee reliability and security of the control function, it is necessary to monitor the process using specialised CCTV equipment for hazardous zones. 10 PTZ units from the MPXHD series have been chosen for the realisation of this surveillance system, because of their reliability in providing perfect video footage and their compliance with the security standards for operation in hazardous areas. The PTZ units are used to directly monitor the metreing and regulating operations remotely from the master control room.
Round table discussion
Cloud systems are among the fastest-growing segments of the physical security industry. The fortunes of integrators can improve when they embrace a recurring monthly revenue (RMR) model, and cloud systems are expanding the services and features manufacturers can provide, from remote diagnostics to simplified system design. But for all the success of cloud systems, there remains confusion in the market about the exact definition of “cloud”. Or does there? We asked this week’s Expert Panel Roundtable: what is “the cloud”? Is there agreement in the market about what the term means?
In the digital age, software is a component of almost all systems, including those that drive the physical security market. A trend toward hardware commoditisation is making the role of software even more central to providing value to security solutions. Software developments make more things possible and drive innovation in the market. We asked this week's Expert Panel Roundtable: How do software improvements drive physical security?
Cloud computing has been around since the turn of the millennium. Over the years, the concept of storing and accessing programs over the Internet (instead of using an on-premises computer system) has grown in almost every realm of business. Some might say the physical security industry has come late to the party, delayed in some instances by (misguided?) concerns about cybersecurity of cloud systems. The bandwidth needed to transfer video to the cloud has also been a challenge. We asked this week’s Expert Panel Roundtable: What features of Cloud-based software-as-a-service (SaaS) are the most valuable to the average user?