Research & Testing
IHS Markit projects that the market for physical electronic access control solutions has grown to over $5.2 billion in 2018. The market has experienced stable and predictable growth rates that have hovered around 6 percent over the past several years. Electronic locks remain both the largest and the fastest growing product type in access control, representing nearly 40% of the global market size for all access control equipment. Impact of technological developments While market growth rates ha...
Aqua Security announced that its Aqua Container Security Platform (CSP) has been certified by CIS Benchmarks to compare the configuration status of Kubernetes clusters against the consensus-based best practice standards contained in the CIS Kubernetes Benchmark. Organisations that leverage Aqua CSP can now ensure that the configurations of their critical assets align with the CIS Benchmarks consensus-based practice standards. “We are thrilled to have our platform certified by the CIS for...
telent Technology Services Ltd (telent) has announced that it has been awarded a multi-million-pound contract to test the Emergency Services Network (ESN) for the Home Office as it transitions to 4G based communications. The win will see telent deliver the ESN Assure service and follows an announcement from the Home Office in September for a ‘new strategic direction’ for ESN. It aims to save £200 million in public money per year by fully replacing the current radio-based netwo...
Imagine ideas such as flat thin lenses that could shrink the size, weight and cost of phones and cameras; or a soft, flexible skin for robots that gives them a gentle human-like sense of touch; or blockchain-based health record storage that reduces medical costs while guarding privacy and improving trust between patients and doctors. These are among the new artificial intelligence, electronics and optoelectronics inventions and research that will soon be unveiled at the Future Tech Expo 2018 ex...
HID Global, a worldwide provider of trusted identity solutions, announced its patented Lumidigm multispectral imaging solution is the first fingerprint technology certified to the ISO/IEC 30107-3 Presentation Attack Detection (PAD) standard, which focuses on anti-spoofing and liveness detection to determine whether fingerprint data captured from the sensor is from a real, living person or from a plastic fake or other artificial copy. Since the specification’s release more than a year ago,...
Ava Group, a market provider in the provision of risk management services and technologies, announces the launch of the Global Cybersecurity Centre of Excellence (CCoE). This new programme demonstrates Ava Group’s strong commitment to data security of customers, by providing expert guidance and assurance that the products deployed on their data network infrastructure exceed stringent globally-recognised cybersecurity standards. NIST Cybersecurity Framework The CCoE takes full advantage o...
EUSAS and Euralarm, hosted by Airbus, recently organised their second joint conference, which was this year on the topic of aviation safety and security. It showed once again the importance of technological development for an industry endeavoured to protect lives with a particular relevance to the aeronautics and air transport sectors. Aviation safety & security The US Federal Aviation Administration reports yearly over 100 false fire alarms on airplanes, resulting in unplanned landings and turn-backs. The consequences for passengers, airlines’ reputations and managing flight routes make the issue of false alarms a priority for the companies providing fire detection devices for airplanes – and this is just one example of the challenges of safety and security on airplanes. Several organisations and companies gathered for two days on July 11th and 12th in Bremen, the second-largest Airbus site in Germany, where airplanes’ wings and fuselages are manufactured. Airbus, the biggest aeronautics and space company in Europe and a worldwide leader in the sector, was the host of a series of lectures and presentations on fire detection, fire suppression, evacuation and security in the aviation sector. This event was jointly organised by the European Society for Automatic Alarm Systems (EUSAS), a group connecting academia and industry, and Euralarm, which represents the European fire safety and security industry. Fire detection technologies The event addressed the special challenges of fire detection and extinguishing in airplanes, airports and in the aviation industry. From the depleting extinguishing agent reserves worldwide, to the large number and sheer size of airport buildings and hangars, which require specific solutions on top of traditional fire detection technologies. Furthermore, are the financial and time constraints for compliance testing in an industry where efficiency and safety are a must. Detection systems must provide an indication to the flight crew within one minute after the start of a fire The criteria used for fire detection testing on airplanes are stringent. Detection systems must provide an indication to the flight crew within one minute after the start of a fire, but also be highly resistant to false-alarms. This has led the aviation industry to ask for the most advanced technologies to be used on aircrafts: such as multi-wavelength, multi-scattering angle photoelectric detection, a field at the edge of applied physics, and which was presented by Kenneth Bell, from UTC Aerospace Systems. Green fire suppression system Another issue for the industry is the replacement of Halon, a gas that has a high global-warming factor and attacks the ozone layer in our atmosphere. This fire suppression agent is used in cargo compartments, as well as for turbine fire due to its favourable characteristics. The production of Halon has now been discontinued and stocks of recuperated gas are rapidly declining. While Terry Simpson and Edda Liu from UTC Aerospace Systems presented the overall current progress on the replacement of Halon for fire extinguishing and suppression, Dr. Jan Boris Philipp, from Diehl Aviation, in Germany, presented an alternative green fire suppression system manufactured by his company. Computer-simulated airport evacuation Many solutions presented at the conference were based on computer simulations. Real life fire extinguishing tests on airplanes are part of the certification process of new airplanes. To avoid environmental consequences, a newly developed simulation technique presented by Airbus’ Dr. Konstantin Kallergis, can now predict the fire suppressant’s behaviour inside the cargo compartment. Project ORPHEUS allows the computer-simulated modelling of an airport’s evacuation, as well as smoke spread prediction in case of fire Another illustration was the research project ORPHEUS, financed by the German federal government, which was presented by Dr. Lukas Arnold, from the Institute of Advanced Simulation in Jülich, near Cologne. It allows the computer-simulated modelling of an airport’s evacuation, as well as smoke spread prediction in case of fire. The evacuation test concept of an A380 aircraft was impressively shown by Wolfgang Moeller from Airbus: all 850 passengers and crew members could escape the aircraft in significantly less than 90 seconds. Video-based detection technologies On the topic of airports and hangars, the width and height of the buildings is generally the main problem, as was explained by Securiton’s Stefan Brügger. Automation and integration of electronic safety and security solutions presented by Maarten Wings from Bosch, while Roland Voraberger from g+m elektronik, a company in Switzerland, provided a concrete example for the connection of voice alarm systems to fire alarm systems, which is not as straightforward in airports as it would be in smaller buildings. The challenges of fire detection in buildings with high-ceilings, which is a case for most modern terminals, or half open hangars could be overcome in the future with video-based detection technologies or thermal radiation-based fire detectors, presented respectively by Soeren Wittmann from Bosch and Dr. Simon Trippler together with Dr. Jörg Kelleter from GTE Industrieelektronik. Video is, of course, also useful when it comes to security with video analysis against intrusion in security zones being presented by Securiton’s Thomas Hermes and Michael Seidl, from the Frankfurt Airport, the busiest in Europe by cargo traffic. Adaptive Escape Routing Systems Finally, in a demonstration that stood-out by its focus on a non-technology related topic, Dr. Sebastian Festag, representing Germany’s electronic industry association ZVEI, explained the concept of Adaptive Escape Routing Systems and shows why human behaviour is of major significance in an optimised evacuation and guidance strategy. The solution to fire and security challenges in aviation clearly lies in cutting edge technologies and research on fire safety and security, as well as in the standards, which sometimes lag behind the technology. Dr. André Freiling, from Airbus, a speaker at the event, noted that some standards used to testing smoke detection in aircrafts for example can date as far back as 1994.
Zhejiang Dahua Technology Co., Ltd., a solution provider in the global video surveillance industry, signs a strategic partnership agreement with Denmark’s top parking and traffic solutions provider Scanview Systems, who has smoothly delivered the Copenhagen Airport and Billund Airport car parking projects upon close and successful cooperation with Dahua Technology. Mr. Michael Chen, Dahua VP, General Manager of Overseas Business, Mr. Zhang Xingming, Dahua VP, General Manager of R&D Center, and Mr. Dan Blirup, CEO of Scanview Systems attended the signing ceremony together, kicking off the significant moment for both companies. Customized services Scanview Systems is a technical concept solution provider who features in unique products, consulting, design and installation. It delivers customized services for license plate video analysis, registration for parking and traffic systems, and various types of LED info boards. Its customers include municipalities, Copenhagen Airports, Billund Airport, and APCOA, ranging from government to private companies. Through the agreement, Scanview Systems will be involved in the early development and testing stages of specific Dahua new products, and both companies will keep a close position in technological communication. In the meantime, business co-operations are expected to be more frequent between the two sides, where Dahua will leverage Scanview system’s unique insights to finetune its product portfolio, and Scanview systems will also better utilize Dahua’s product solutions to expand its business in Nordic and EU markets. The partnership between Dahua Technology and Scanview Systems will be a win-win choice" Win-win choice Mr. Zhang Xinming highly commented on the partnership: “I believe the partnership between Dahua Technology and Scanview Systems will be a win-win choice. Dahua technology will continuously input resources to expand our ability to give better, faster, and much more effective service in Demark. Also, our R&D team will optimize allocation of resources to provide Denmark with great innovation of products and technology, to offer more advanced and competitive solution.” “We at Scanview Systems are very proud and honored to have signed this Strategic Agreement with Dahua Technology. I think we are the perfect match where we Scanview Systems are coming with all the fantastic ideas and Dahua can make all the ideas real and make things happening.” Said Mr. Dan Blirup. Mr. Michael Chen is also optimistic about the partnership. He concluded: “Dahua is dedicated to customers’ success. We will collect true market needs from our customers and optimize our products and services accordingly. With a mission of ‘Enabling a Safer Society and Smarter Living’, we will continue to focus on Innovation, Quality, and Service to serve partners and customers around the world.”
Gallagher celebrates its 80th anniversary as a technology company in the security, fuel systems and animal management industries. The family owned-and-operated global security giant was founded in 1938 by the late Bill Gallagher Senior and 80 years ago was a 10-person business that designed and delivered New Zealand’s first electric fence solution. Today, the company employs 1,100 people across a global network in ten countries. Research and development alone makes up 135 of the workforce, 75 of whom are software developers. To celebrate 80 years, Gallagher holds a series of events for customers and employees throughout North America, Europe, Asia, South Africa, Australia and New Zealand. Our longevity is a credit to our employees, business partners and customers whose dedication to the brand are absolutely key to our success" Transform working lives Gallagher chief executive and chairman Sir William Gallagher says: “The innovative spirit of my father, our founder Bill Gallagher Senior – who 80 years ago worked to solve our first problem – is alive in the generations of our people who continue to deliver previously unthought-of solutions.” “Each year, for 80 years, our customers have experienced continual increases in the power of Gallagher technology to transform their working lives.” “Our longevity is a credit to our employees, business partners and customers whose dedication to the brand are absolutely key to our success. We’ll be celebrating throughout our anniversary year the strength of those partnerships built over decades.” Celebrating the spark A milestone ceremony kicked off the anniversary year at the Hamilton headquarters in New Zealand where workers from across the globe and all New Zealand employees and their families gathered for a celebration of headline entertainment, fun family activities and food inspired by office locations across the globe. The focus on innovation has given rise to a new strapline, ‘80 years of celebrating the spark’, which is captured in a giant ‘spark’ graphic that now adorns Gallagher’s head office. Gallagher captures key moments over the eight decades in a commemorative digital format, to be published at the end of the year, as a reflection of the brand’s presence over the past 80 years. Gallagher entered Europe in the 1990s and Gallagher Security (Europe) Ltd celebrated its 25th anniversary last year Develop electric fence The brand entered Europe in the 1990s and Gallagher Security (Europe) Ltd celebrated its 25th anniversary last year. Regional manager Dave Bentley has been with the business almost from the beginning. He was the first on site in the UK at customers like Severn Trent Water, EDF, United Utilities and National Grid, which has evolved to be Gallagher’s largest UK client and its biggest worldwide for perimeter, covering a total of 700 sites via different channel partners via the Gallagher Command Centre in two Alarm Receiving Centres. Spotting the opportunity He recalls: “If product releases weren’t quite behaving as we expected, I was there at the sharp end making it work for the client. One evening, I was working late in the warehouse mending some fence controllers when Sir William walked through and asked who I was.” “That’s where our relationship started 23 years ago, and my huge respect for him, his father and the energy that drives the company.” He explains that innovation has been key to the success of Gallagher Security, with Sir William spotting the opportunity to develop the electric fence his father had invented for agricultural purposes, into a perimeter security fence to deter would-be intruders. Gallagher moved from perimeter protection to providing a holistic solution, which was unique in the market on a single platform Ground-breaking developments The purchase of PEC in 1999 was a real game changer for the company, adding access control to its portfolio. It meant Gallagher moved from perimeter protection to providing a holistic solution, which was unique in the market on a single platform. This has continued to develop with recent ground-breaking developments allowing users to access buildings with their mobile phones using Gallagher Mobile Connectivity. Gallagher culture Bentley says: “There are two things about the Gallagher culture for me. Innovation is the first, it's an exciting environment to be in, always changing, and it means that nothing is impossible.” “The second is that when you find yourself part of a team that has integrity, respect, a great work ethic and trust flowing from the top down, it's something you want more of because it's special.” “That's the spark, that's what makes Gallagher such a great organisation, and that's why our business is growing so fast. What a great thing to be a part of!” We’ve achieved a lot in the past 80 years, but we are just getting started" Considerable growth Gallagher marks the 80th anniversary this week with an event at key customer Kings College London attended by Sir William, its approved channel partner network, customers and industry representatives. Bentley says: “The event was a great way to thank our team and customer base for their business and celebrate in London – an area in which we’ve invested heavily and have seen considerable growth as a result.” Sir William concludes: “We’ve achieved a lot in the past 80 years, but we are just getting started.”
While many door closers are stated as being approved for metal fire doors, in a number of cases this only applies to insulated metal fire doors. And with around 8 out of 10 metal fire doors sold in the UK being non-insulated, this means many door closers are not fit for purpose – with potentially disastrous results. Fire-resistant doors Non-insulated systems provide certified fire resistance for integrity only, protecting against the passage of fire and smoke. However, as the name implies, these fire doors are not certified for insulation and so cannot protect against the passage of heat. This becomes an issue for a door closer that is filled with mineral semi-synthetic mix oil, as it can ignite when it reaches a high enough temperature. Certifire, the testing organisation, has recently revised their certification to more accurately state the type of metal fire door that a door closer is approved for use Certifire, the testing organisation, has recently revised their certification to more accurately state the type of metal fire door that a door closer is approved for use. But with so many installers and specifiers unaware of this risk, UNION is urgently calling on installers and property owners to check their closing devices are suitable for non-insulated metal fire doors. Certifire documentation David Hindle, Door Closer Specialist at UNION, explains: “We believe many door closers could have been incorrectly specified for non-insulated metals fire doors, which could pose a real danger to lives in the event of a fire. These door closers are not suitable for fire escapes or other applications where extreme heat could risk lives or cause serious damage to property. Certifire have taken a proactive stance on this matter and updated their certification to give a specifier or installer more detailed information.” “Professionals can overcome this issue by following three simple steps. First of all, check all relevant Certifire documentation and make sure this has been updated for any recent amendments. Next, check whether the documentation includes details on the type of fire doors that the door closer has been tested on. Finally, where metal fire doors are covered, are there any restrictions on the type of fire door? By following these steps, you can discover if you have any issues to resolve with your door closers.” All UNION door closers are supplied with a glycol mix that has been successfully tested on non-insulated fire doors by two UKAS accredited fire testing facilities UNION door closers “For complete peace of mind, all UNION door closers are supplied with a glycol mix that has been successfully tested on non-insulated fire doors by two UKAS accredited fire testing facilities. Therefore, those choosing a UNION door closer can be safe in the knowledge that they are fitting a device that does not contain an oil that could possibly ignite in the case of a fire.” “This is a hugely serious issue that all specifiers and installers need to be aware of. Anyone worried that they may have a door closer that is not safe can also call us for advice on 0845 2232124.”
ASSA ABLOY Security Doors, a UK division of ASSA ABLOY, global supplier of door opening solutions, has delivered a successful security testing day in partnership with BRE. Held at the Security Doors factory in Lisburn, Northern Ireland, the day saw a fantastic turn-out of security professionals who witnessed various methods of attack on both steel and timber doorsets. The event consisted of an overview of the LPS 1175 test standard, a comprehensive factory tour and a practical demonstration that showed the difference between certified and non-certified security doors. Ian Broadley, Business Development Manager for ASSA ABLOY Security Doors said: “We hosted this event to help illustrate the difference between investing in a certificated product versus a product that may look similar visually but can be compromised very easily when put to the test.” A test rig was set up at our factory, housing two steels doors and two timber doors" Standard-compliant doors “A test rig was set up at our factory, housing two steels doors and two timber doors. The BRE team used various methods of attack to demonstrate how they were able to defeat the doors that were not built to meet LPS 1175 test standards.” “We received a great deal of positive feedback from attendees, which included security consultants, end users, police, and government personnel. Attendees commented on how thought-provoking it was to witness just how quickly un-certified doors could be compromised.” ASSA ABLOY Security Doors is the only UK company to manufacture steel and timber security doorsets to both LPS 1175 Commercial and CPNI HM Government standards.
Microsemi Corporation, a global provider of semiconductor solutions differentiated by power, security, reliability and performance, has announced interoperability between its 12 gigabits per second (Gbps) SAS/SATA host bus adapters (HBAs) and redundant array of independent disk (RAID) adapters, including the Microsemi Adaptec HBA 1100, SmartHBA 2100 and SmartRAID 3100, part of its Smart Storage adapters portfolio, and AMD’s EPYC processor series. Data centre customers looking for a storage adapter solution for EPYC processor deployments can now utilise Microsemi’s full suite of Smart Storage solutions with confidence as a fully compatible end-to-end solution. “As AMD-based processors are increasingly being considered for next-generation server deployments in cloud data centres, extensive interoperability testing between our companies has shown our feature-rich high performance Smart Storage adapters to be a powerful storage solution when paired with AMD’s EPYC processors,” said Pete Hazen, vice president and general manager of storage solutions at Microsemi. “We are pleased to work closely with a well-respected industry leader, as this collaboration provides data centre customers with the confidence to make Microsemi their first call when looking to adopt AMD’s unique EPYC processors.” The server processor market is experiencing tremendous change as workloads and applications continue to evolve" High performance and flexibility Market research firm IDC recently reported the worldwide server market grew nearly 20 percent in the third quarter of 2017, reaching $17 billion and trending even higher than the same research firm’s long-term forecast of 4 percent compound annual growth rate (CAGR) from 2015-2020. The Microsemi Smart Storage platform, which leverages the company’s unified Smart Storage Stack, is optimised for a variety of server storage applications for data centres, server original equipment manufacturers (OEMs) and server original design manufacturers (ODMs) due to its high performance and flexibility. “The server processor market is experiencing tremendous change as workloads and applications continue to evolve, consuming more memory bandwidth and I/O than ever before,” said Raghu Nambiar, CVP and CTO of Datacenter Ecosystems and Application Engineering, AMD. Security partnerships “This is where the AMD EPYC processor stands apart, delivering leading performance and scale for cloud and enterprise customers. Now these customers can benefit from Microsemi’s feature-rich Adaptec Smart Storage technologies combined with the AMD EPYC processor to help them achieve new levels of total cost of ownership savings in the data centre.” The Accelerate Ecosystem is designed to reduce time-to-market for end customers and time-to-revenue for Microsemi and ecosystem members AMD collaborates with Microsemi as part of Microsemi Accelerate Ecosystem, which facilitates collaboration between Microsemi and leading firms in the semiconductor integrated circuit (IC), intellectual property (IP), systems, software, tools and design spaces to integrate, test and deliver pre-validated designs and system-level solutions for end customers in Microsemi’s key vertical markets—aerospace and defense, data centre, communications and industrial. The Accelerate Ecosystem is designed to reduce time-to-market for end customers and time-to-revenue for Microsemi and ecosystem members via technology alignment, joint marketing and sales acceleration. Smart storage adapters The Microsemi Adaptec HBA 1100, as well as the company’s SmartHBA 2100 and SmartRAID 3100, leverage the unified Smart Storage Stack. The combination of its Unified Smart Storage Stack, SmartRAID and SmartHBA, HBA product families and Microsemi SXP family of SAS expanders provide a complete server solution for storage management and connectivity. Each family has unique differentiating features. The HBA 1100 is optimised for SDS, cloud storage and raw high-performance connectivity. It also includes: Adapters with up to 24 ports using 28nm SAS/SATA-optimised silicon, offering an optimal power profile for the target applications Support for host-managed and host-aware SMR drives Broad OS driver support, including inbox driver support Performance of up to 1.7 million input/output operations per second (IOPS) SmartHBA 2100 is industry's only basic RAID solution with more than eight portsOptimised for SDS applications The SmartHBA 2100 is optimised for SDS applications which desire hardware RAID for OS boot drives as well as entry-level RAID for SMBs. It also provides: Basic RAID without compromising on the requirement for a fully featured and functional HBA, which is required for multi-path IO and SDS applications Mixed mode enables drives to be independently configured as raw drives or as part of a logical volume True hardware RAID for RAID 0,1,10 and RAID 5 Industry's only basic RAID solution with more than eight ports Enterprise storage The SmartRAID 3100 is optimised for enterprise storage applications which require the highest level of data availability and data centre applications which benefit from caching. It also features: Adapters with up to 24 ports using 28nm SAS/SATA-optimised silicon, offering an optimal power profile for the target applications Zero Maintenance Cache Protection (ZMCP) with a cache size of up to 4GB and integrated cache backup circuitry for optimal cost, thermal performance and operating efficiency Board options without cache backup maxCache 4.0 included on all adapters with up to ~2TB SSD cache Roadmap to maxCrypto controller-based encryption
Brexit will bring sweeping changes to the way the UK not only interacts internationally, but also internally. With the country standing alone with regards to trade and exports, it is vital for us to be fully prepared. However, there is one area that I think needs much greater scrutiny—the UK technical skills gap. Tellingly, there is a palpable shortage of technical training and skills right across the UK economy. With the country’s economic strength relying heavily on cutting-edge technology and knowledge, the UK security industry has particular reason to be anxious of movement restrictions on internationally sourced expertise and resources, as well as a potential ‘brain-drain’ of domestic talent. There is a lack of quantity and quality of home-grown talent in the pipeline, and there is a greater availability of talent from overseas Need for security education There are two distinct aspects that need to be addressed when you look at the requirements of the UK economy with regards to technical expertise. First of all, there is the quantity and quality of home-grown talent in the pipeline, and secondly, there is the availability and desire of talent from overseas wanting to work in the UK. In my own experience, it can be quite a challenge finding the best technical expertise (in the numbers needed) from the UK alone. Currently, alongside our British employees, our business employs a sizable amount of international security talent, ensuring we can fill key roles with exactly the right people. As well as sourcing expertise from abroad, I passionately believe we need to properly support and educate the next generation of UK security professionals too, ensuring we can also find the right talent closer to home in the future. T-Levels provide valuable business experience which can be lacking in traditional academic courses Technology-level training for modern needs It is frustrating to see the current skills gap—particularly as I felt the UK Government began moving in the right direction when it reintroduced the excellent national apprenticeships scheme a few years ago. There is no doubt we will always need excellent academic qualifications and people trained in research and development, but equally a stint in further education is certainly not for everyone! Undoubtedly apprenticeships are an excellent way of encouraging hungry young talent into any industry with on-the-job training. Importantly, this isn’t just academic training either—it also provides valuable business experience too, which can be lacking in more traditional academic courses. There has also been a lot of interest in ‘T-Levels’ in the UK. These are technology level courses that are designed to offer specific training for modern technology needs. It is very encouraging to see the promotion of technology education in this way, designed to appeal to students that are looking for a solid career in the UK technology sector. Apprenticeships are an excellent way of encouraging hungry young talent into any industry with on-the-job training Focus on engineering and vocational education Unfortunately, it seems the UK is still somewhat behind our European cousins when it comes to technology education and training. Germany, for example, is a country that has traditionally excelled in these areas. The education system in Germany has heavily focussed on engineering and vocational-based training programmes, which has seen noticeable benefits for its technology sector. The Germans have continued to focus on this for decades, meaning the country’s economy has an excellent pipeline of well-trained talent available. Taking this approach would greatly enhance training in the UK too, supporting up-and-coming talent and helping the next generation reach its potential. A healthy influx of highly talented individuals from across Europe has helped to fill the UK skills gap over recent decades Meeting business and technology needs A healthy influx of highly talented individuals from across Europe has helped to fill the UK skills gap over recent decades. Undoubtedly, like many British businesses we have significantly benefited from this open and vibrant skills market. With the fine details of Brexit being negotiated at the moment, I hope this valuable source of skilled professionals won’t be denied to UK businesses. Even if there are more stringent controls moving forward, the UK must continue to open its doors to this expertise—certainly until we can reap future generations of home-grown talent. It’s interesting (and somewhat ironic) that when you look at some UK universities’ engineering faculties, they often have half or over half of their students from other countries. The UK has world-renowned education facilities that we should be proud of, and yet paradoxically, we are still not educating enough UK engineers. There is a keen interest in technology from younger generations that needs to be nurtured Skill-based training for economic growth International trading and people movement will change after Brexit, but I hope there will also be a significant evolution in the education system to close the UK skills gap. The UK has some of the best educational establishments in the world and a long history of innovation and entrepreneurial skills to make our technology highly commercial. Frustratingly, there is a keen interest in technology from younger generations—just look how addicted young people are to their screens. This keen interest needs to be nurtured and career choices in technology encouraged. With the right training opportunities in place (university education, apprenticeships and T-Levels), the UK can easily implement the tools to create the right opportunities. However, what is really needed now is an impetus from political leaders to address training needs and ensure the economy continues to develop and grow to meet the challenges ahead.
Part 3 of our Intercoms in Security Series: Zenitel’s Call Access Panel manages intelligible critical communications through a security operations centre or control room Greater connectivity, security software enhancements, more customisation, and better sound quality are some of the enhancements driving the intercom market.An advantage now offered on Code Blue’s emergency speakerphones include self-diagnosing software that monitors the status of the phones and their components — microphones, buttons and speakers — and delivers instant notifications if there is ever an issue. Code Blue phones also come with full duplex capabilities with echo cancelling, sometimes known as open duplex, which allows the caller and first responder to communicate simultaneously and eliminates buzzing and static. IP-based networking systems Code Blue also builds its phones to open standards like Session Initiation Protocol (SIP), which allows calls to be easily processed with a wide variety of systems and software solutions, says David Fleming, Chief Design Officer for Code Blue Corp.Networking has impacted the intercom market, with the advent of IP-based systems. The corporate network now makes it possible to share information and to control units from a few yards to thousands of miles away, according to Bruce Czerwinski, U.S. General Sales Manager, Aiphone Corp. For example, central command centre guards can monitor and allow entrance to any networked satellite or unmanned facility 24/7. Multi-site communications Networks have also spawned mobile apps that allow roaming guards to use smartphones and devices to maintain total control of an intercom system while away from the master station and on the Wi-Fi. And network paging is another recently added communications tool, valuable for routine announcements or emergency instructions. "Voice is becoming the killer app for serving the safety and security needs of employees and customers" “We’re now able to offer large-scale multi-site communications using intercom systems,” says Czerwinski. “That’s not just connecting a few buildings on opposite sides of a campus quad, but all those separated by state lines, even across the country.”As markets and customers served by intercom products continue to evolve with new needs requiring new solutions, intercom companies continually poll the market and develop new and interesting solutions for these needs.All-in-one physical access control solutionBecause intercom manufacturer 2N’s products are often used as part of a physical access control system, convenience and security are key attributes. Bluetooth technology will be employed heavily. 2N has just introduced its Bluetooth access control reader for both standalone access control and integrated into 2N’s VERSO door station.The technology is based on Bluetooth Low Energy (BLE) technology, which offers long-range detection (up to 10 metres), low energy consumption and ‘banking’ level security. It can be combined with other technologies — near field communication (NFC) and radio-frequency identification (RFID) — for an all-in-one solution.Mobile video app for door intercoms 2N has also launched a mobile video app/service. It enables a consumer’s smart device to be used as an interface to the door intercom, allowing video calls from anywhere in the world, door access control, and as an ‘always on’ video and audio surveillance system. Notifications can be launched automatically; for example, if someone approaches the homeowner’s door, porch, or surrounding area. A low-cost all-in-one door station — Base — has been released for the residential and small business space, including HD video, audio, and door control but in a simpler-to-install and lower-cost format. Zenitel’s Customer Intercom Station Kit enables customers to build their own stations In the spring, 2N is releasing a Z-wave networked door control solution that’s easy to install and extends the reach of an access control system.Off-the-shelf communication devicesJim Hoffpauir, President of Zenitel North America, says the intercom company offers a choice of either off-the-shelf communication devices or components to enable customised stations to be built based on a customer’s aesthetics or form and/or function needs. Users also must be heard and be understood, says Hoffpauir. “We spend millions of dollars in research and development on the intellectual property that defines and sets the standard for intelligible voice audio in the communications industry,” he says. “And we focus on embedding that capability with strategic alliances in access control, video and unified communications.”“Voice is becoming the killer app for serving the safety and security needs of employees and customers,” says Hoffpauir. “We want to create new interoperable solutions such as our networked HD Video Door station that acts as a communication device as well as an access control station.” It has two-way communication for 24/7 video identification and support for IP phone or unified communications through SIP. Intelligible critical communications solutions Zenitel’s Call Access Panel manages intelligible critical communications through a security operations centre or control room. The panel has a small footprint with pre-programmable buttons for instantaneous emergency or mass notifications to all intercom stations or IP public address, alarms, or horns. And it is SIP-compatible for unified communications. Changes in hardware and software are transforming the intercom market, as are changes in how systems are combined and configured. There is also a trend toward more discernment in terms of audio quality and system performance. Including an evaluation ‘scorecard’ in a request for proposal (RFP), for example, can ensure there is a clear way to evaluate systems being considered. “We are teaching the market there can be a legitimate scorecard on intelligibility,” says Dan Rothrock, SVP of Global Strategic Alliances, Zenitel North America. “You may not know you have bad audio until something bad happens, and it’s too late.” Read part 4 in our Security Intercoms series here
Iris recognition measures the unique patterns in the coloured portion of the eye (the iris) and compares that ‘signature’ to the one on file Since the late 1990s, iris recognition technology has been used in banks and airports as a means of identity authentication. Today, its use is widespread in government facilities, schools/research centres, correctional/judicial facilities, healthcare and others. There are a number of reasons for its rising popularity, but first, a brief overview of the technology is in order. Iris recognition measures the unique patterns in the coloured portion of the eye (the iris) and compares that ‘signature’ to the one on file in the system to verify and authenticate identity. The iris pattern has the most desirable properties for verification compared to other biometrics because of its uniqueness, stability over time and relatively easy accessibility. It also has the highest accuracy among all biometrics. Today’s iris recognition systems have been designed for ease of use and to lessen any perceived concern about the technology 1. Ease of use Today’s iris recognition systems have been designed for ease of use and to lessen any perceived concern about the technology. In fact, it’s as simple as taking a selfie. In the enrolment process a camera captures a detailed image of the iris and the system’s biometric software makes a template or 'map' of the person's iris pattern for storage in the system. To verify identity later, an individual simply looks at the iris reader from a comfortable distance, and the system compares the patterns in the individual's iris against the templates stored in the database. If there's a match, the individual’s identity is verified. 2. Cost Whether used in security or business applications, iris readers are proving cost effective – particularly from a lifecycle perspective. There are no cards to be replaced when worn out or lost; no RFID blocking sleeves are necessary to prevent hacking; and operations can be streamlined through reduced time and labour. Some systems allow scanning of up to 30 people per minute from a distance of several feet. And because no contact with the camera is required, either for enrolment or authentication, wear and tear on the cameras and contamination issues are greatly reduced. In a real sense, card-based systems are using the card as confirmation of the identity of the person carrying the card 3. Vulnerability It has been said that using lower-accuracy access systems such as cards/readers for facility access is the equivalent of locking a car door – easily compromised. Stolen cards can be duplicated or the information contained in the card can be used to hack into other areas of a facility. These vulnerabilities can lead to a less secure environment and put the safety of employees, visitors and assets at risk. Iris readers can overcome many of these concerns and help ensure a higher level of security. There are no cards to be lost, loaned or duplicated, and iris information cannot be falsified. An iris cannot be shared or stolen, and iris readers cannot be fooled by makeup, hair or clothing changes. 4. Identity authentication In common access control systems, access is authorised either by the reader/controller or by the reader/server based on presentation of a pre-programmed access card by the individual. Neither decision is dependent upon any type of identity recognition. Without physical identity verification, the reader does not have the ability to confirm that the user is in fact the individual assigned to that card. Even two-factor authentication (i.e. access card plus PIN or password) can be defeated with readily available skimmers In a real sense, card-based systems are using the card as confirmation of the identity of the person carrying the card. However, because cards can be stolen, loaned, lost or duplicated, that link is both tenuous and vulnerable. Even two-factor authentication (i.e. access card plus PIN or password) can be defeated with readily available skimmers. Iris recognition access control systems on the other hand require authenticated identification before allowing access. The individual is uniquely and permanently linked to their iris. Some readers even work in outdoor environments as well as through eyeglasses, sunglasses, and contact lenses. 5. Multiple uses As an identity management solution, iris readers have been deployed in mainstream security locations in addition to environments as diverse as federal, state and local law enforcement, correctional facilities, travel and border security, healthcare and financial services as well as sports and entertainment venues. Outside security applications, organisations that are investigating ways to update and improve business procedures are considering the efficiency and productivity gains with the use of biometrics. Examples include protecting against insurance fraud, maintaining time and attendance records, and even ensuring a patient gets the right medication in a hospital. And, because of the non-contact interface – the user simply looks into the iris reader – the technology is often selected for applications where the user is gloved, such as in pharmaceutical manufacturing or in a construction site or port, or in environments where users wear protective clothing. A benefit of iris recognition systems is the capability for integration with other security systems to improve access control security 6. Integration Another benefit of iris recognition systems is the capability for integration with other security systems to improve access control security and provide greater operational efficiencies. For example, available today are IOM Android® tablets that fuse access control readers, biometrics, keypads, intercoms, cameras and more. These iris biometric-embedded tablets combine the accuracy and convenience of iris recognition with the functionality and customisation of a mobile computing platform for increased security levels. The high functioning tablets can also be integrated with building management functions and time and attendance systems for even greater efficiencies. The high functioning tablets can also be integrated with building management functions and time and attendance systems for even greater efficiencies 7. Throughput Efficiency in system usage is critical for high volume throughput in applications such as airports/border crossings. It’s also critical in maintaining efficient throughput in facility access or at large public venues where lengthy delays could lead to user dissatisfaction and ultimately security vulnerabilities. To overcome these obstacles, new systems on the market offer high speed, making it possible for users to simply walk through a checkpoint without the need to stop and look into a reader. Iris recognition’s accuracy rates also contribute to ease of throughput. It’s extremely low FAR (False Acceptance Rates) and FRR (False Rejection Rates) are superior to those of other biometric modalities, making it better positioned for widespread usage. Iris recognition has proven to be a game changer in both physical and logical security. Its strong authentication capability also has potential for the home security market in devices such as biometric locks, Bluetooth devices and even cloud-based security. As costs come down, innovations will abound and the seven things you now know will help you navigate the future of biometric security.
Cybersecurity talk currently dominates many events in the physical security industry. And it’s about time, given that we are all playing catch-up in a scary cybersecurity environment where threats are constant and constantly evolving. I heard an interesting discussion about cybersecurity recently among consultants attending MercTech4, a conference in Miami hosted by Mercury Security and its OEM partners. The broad-ranging discussion touched on multiple aspects of cybersecurity, including the various roles of end user IT departments, consultants, and integrators. Factors such as training, standardisation and pricing were also addressed as they relate to cybersecurity. Following are some edited excerpts from that discussion. The role of the IT department Pierre Bourgeix of ESI Convergent: Most enterprises usually have the information technology (IT) department at the table [for physical security discussions], and cybersecurity is a component of IT. The main concern for them is how any security product will impact the network environment. The first thing they will say, is “we have to ensure that there is network segmentation to prevent any potential viruses or threats or breaches from coming in.” The main concern for IT departments is how any security product will impact the network environment”They want to make sure that any devices in the environment are secure. Segmentation is good, but it isn’t an end-all. There is no buffer that can be created; these air gaps don’t exist. Cyber is involved in a defensive matter, in terms of what they have to do to protect that environment. IT is more worried about the infrastructure. The role of consultants and specifiers Phil Santore of DVS, division of Ross & Baruzzini: As consultants and engineers, we work with some major banks. They tell us if you bring a new product to the table, it will take two to three months before they will onboard the product, because they will run it through [cybersecurity testing] in their own IT departments. If it’s a large bank, they have an IT team, and there will never be anything we [as consultants] can tell them that they don’t already know. But we all have clients that are not large; they’re museums, or small corporations, or mom-and-pop shops. They may not be as vulnerable from the international threat, but there are still local things they have to be concerned about. It falls on us as consultants to let them know what their problems are. Their IT departments may not be that savvy. We need to at least make them aware and start there. Wael Lahoud of Goldmark Security Consulting: We are seeing more and more organisations having cybersecurity programs in place, at different maturity levels. At the procurement stage, we as consultants must select and specify products that have technology to enable cybersecurity, and not choose products that are outdated or incompatible with cybersecurity controls. We also see, from an access control perspective, a need to address weaknesses in databases. Specifying and having integrators that can harden the databases, not just the network itself, can help. The impact of physical security products on the network environment was a dominant topic at the MercTech4 consultants roundtable discussion The need for standards on cybersecurity Jim Elder of Secured Design: I’d like to know what standards we as specifiers can invoke that will help us ensure that the integrator of record has the credentials, knows what standards apply, and knows how to make sure those standards are maintained in the system. I’m a generalist, and cybersecurity scares the hell out of me.We’re not just talking about access to cameras, we are talking about access to the corporate network and all the bad things that can happen with that. My emphasis would be on standards and compliance with standards in the equipment and technology that is used, and the way it is put in. It can be easier for me, looking at some key points, to be able to determine if the system has been installed in accordance. We are seeing more and more organisations having cybersecurity programs in place, at different maturity levels"I’m taking the position of the enforcement officer, rather than the dictator. It would be much better if there were focused standards that I could put into the specification— I know there are some – that would dictate the processes, not just of manufacturing, but of installation of the product, and the tests you should run accordingly. Pierre Bourgeix: With the Security Industry Association (SIA), we are working right now on a standard that includes analysed scoring on the IT and physical side to identify a technology score, a compliance score, a methodology, and best-of-breed recommendation. Vendor validation would be used to ensure they follow the same process. We have created the model, and we will see what we can do to make it work. Terry Robinette of Sextant: If a standard can be written and it’s a reasonable process, I like the idea of the equipment meeting some standardised format or be able to show that it can withstand the same type of cyber-attack a network switch can withstand. We may not be reinventing the wheel. IT is the most standardised industry you will ever see, and security is the least standardised. But they’re merging. And that will drive standardisation. Jim Elder: I look to Underwriters Laboratory (UL) for a lot of standards. Does the product get that label? I am interested in being able to look at a box on the wall and say, “That meets the standard.” Or some kind of list with check-boxes; if all the boxes are checked I can walk out and know I have good cybersecurity threat management. IT is the most standardised industry you will ever see, and security is the least standardised" The role of training Phil Santore: Before you do any cybersecurity training, you would need to set the level of cybersecurity you are trying to achieve. There are multiple levels from zero to a completely closed network. Wael Lahoud: From an integrator’s perspective, cybersecurity training by the manufacturer of product features would be the place to start – understanding how to partner the database, and the encryption features. We see integrators that know these features are available – they tick the boxes – but they don’t understand what they mean. Cybersecurity is a complex topic, and the risk aspects and maturity levels vary by organisation. That would be a good starting point. The role of integrators Wael Lahoud: Integrators like convenience; less time means more money. So, we see some integrators cut corners. I think it is our role (as consultants) to make sure corners are not cut. If you rely solely on integrators, it will always be the weak password, the bypass. We have seen it from small projects to large government installations. It’s the same again and again. Even having an internal standard within an organisation, there may be no one overseeing that and double-checking. Tools will help, but we are not there at this point. I will leave it up to manufacturers to provide the tools to make it easy for consultants to check, and easier for integrators to use the controls. Cybersecurity is a complex topic, and the risk aspects and maturity levels vary by organisation - so training is very important The impact of pricing Pierre Bourgeix: The race to the cheapest price is a big problem. We have well-intended designs and assessments that define best-of-breed and evaluate what would be necessary to do what the client needs. But once we get to the final point of that being implemented, the customer typically goes to the lowest price – the lowest bidder. That’s the biggest issue. You get what you pay for at the end of the day. With standards, we are trying to get to the point that people realise that not all products are made the same, not all integrators do the same work. We hope that through education of the end user, they can realise that if they change the design, they have to accept the liability.It’s not just the product that’s the weakest link, it’s the whole process from design to securing that product and launching it" The big picture Wael Lahoud: The Windows platform has a lot of vulnerabilities, but we’re still using it, even in banks. So, it’s not just the product that’s the weakest link, it’s the whole process from design to securing that product and launching it. That’s where the cybersecurity program comes into play. There are many vulnerable products in the market, and it’s up to professionals to properly secure these products and to design systems and reduce the risk. Pierre Bourgeix: The access port to get to data is what hackers are looking for. The weakest link is where they go. They want to penetrate through access control to get to databases. The golden ring is the data source, so they can get credentialing, so they can gain access to your active directory, which then gives them permissions to get into your “admin.” Once we get into “admin,” we get to the source of the information. It has nothing to do with gaining access to a door, it has everything to do with data. And that’s happening all the time.
ONVIF will be eight years old in the next several weeks. It has been interesting to watch the open industry forum’s impact on physical security since it began in 2008 with a goal to develop a global standard for the interface of IP-based physical security products. ONVIF’s influence has accelerated just in the last year, with the number of ONVIF-conformant products in the market growing from about 5,000 a year ago to more than 7,000 today – more than a 40 percent increase. ONVIF’s Profile S for streaming video applications is one of their success stories. To stay on top of industry changes, ONVIF’s committees will be watching closely the changes in video streaming technologies, such as H.265, high-resolution cameras, etc., and their possible impact on Profile S and other work by ONVIF. A milestone for ONVIF occurred this summer with the final release of the ONVIF Profile Q, aimed at enabling integrators to connect cameras more easily for quicker installs. The profile also benefits manufacturers who don’t have to accommodate as many variables when connecting with their various technology partners. Profile Q has been available in the draft stage for six months or so. Now that the final version is available, ONVIF will be working with manufacturers to list the first Profile Q-conformant products. “We saw a gap, and this profile can certainly help,” says Jonathan Lewitt, Chairman of the ONVIF communication committee. “We expect significant adoption by the end of the year.” ONVIF and access control Slower to be embraced has been ONVIF’s activities in the access control arena – including their Profile A. “It’s fair to say we have had more mind share on the video side than access control,” says Lewitt, who is Pelco’s Director of Technology Leadership. “We are rolling up our sleeves and making sure we understand the needs of the access control marketplace and the standards that need to be in place.” "Cameras are the first IoTdevices, so there is a significantrole we can play by expandingour expertise from video devicesto other devices in the IoT" He says adoption of ONVIF profiles in access control has been slower because many access control manufacturers had already developed their own connectivity paradigms, and there is less integration of different systems in access control (compared to video). Still, Lewitt says IP-connected devices in access control communicate similarly to video devices, so there are parallels with ONVIF’s success in video. Profile A has not had its final release, but will come out as a ratified document in 2017. “There is more interest with some new entrants in the market, who can lead forward and catch up more quickly,” says Lewitt. What does the future of ONVIF hold? Lewitt says the emerging Internet of Things (IoT) offers a focal point. “Cameras are the first IoT devices, so there is a significant role we can play by expanding our expertise from video devices to other devices in the IoT.” Specifically, the lessons ONVIF has learned about detection, discovery and configuration paradigms of IP cameras when developing Profile Q can easily translate to data-driven devices such as IP sensors, whether temperature, motion, or IR proximity sensors, or even traffic sensors. “If you follow a standard workflow to find all the devices on a system, you can simplify the implementation process, reduce errors, and allow people to focus on more complex solutions,” says Lewitt. IoT is also closely related to another sector ONVIF is targeting – safe cities. ONVIF challenges Lewitt identifies two challenges that ONVIF faces. One is continuing to maintain engagement from their membership base as they work on new problems and areas. “We need to be sure we communicate the value that members bring and get their buy-in. It’s a challenge for any standards body,” says Lewitt. The second challenge is external: The need to communicate who ONVIF is, the value it brings to the market, and how it is working to keep pace with the changing dynamic of the physical security industry. ONVIF is an acronym for Open Network Video Interface Forum; the name was shortened as the scope of the organisation’s activities expanded. ONVIF will also be watching the market more closely to identify new opportunities, says Lewitt. There is a new “Use Case Working Group” in the organisation, which will connect to customers and users of the ONVIF standards, looking for new scenarios that standards could address and in general to “provide better context to drive the solutions forward,” says Lewitt.
We don’t usually report on financial news here, but a recent financial move by up-and-coming industry leader Hikvision warrants attention. Specifically, Hikvision in Hangzhou, China, has secured a $3.1 billion line of credit from the government-owned China Development Bank. Companies use a variety of financing tools to provide the currency they need to fuel growth, so in that regard, Hikvision’s move is to be expected. Given their ambitious growth timeline, both in China and throughout the world, it’s no surprise that they would be creating mechanisms to finance that growth. The surprise here is the size of the move. To put $3.1 billion into perspective, consider that Canon paid $2.8 billion when they bought Axis, and that transaction generated tons of interest in the industry and, arguably, shook up the whole market. Obviously, with $3.1 billion of credit at their disposal, Hikvision is well equipped to shake up the industry, too. For fast-growing Hikvision, $3.1 billion is an amount greater than its reported sales revenue of $2.78 billion in 2014. “The company is focused on global growth,” says Alex Asnovich, Head of Marketing at Hikvision USA. “Talking about North America, we are opening our new Hikvision USA headquarters in the Los Angeles area in the summer of 2016. We have our new logistics facilities in Miami to support North and South Americas. We recently opened our Hikvision Canada headquarters office in Montreal and started our own bilingual English and French Canadian tech support center on the East Coast.” Hikvision’s R&D operations R&D is also a big part of the picture. I saw the scale of Hikvision’s R&D operations first-hand on my China visit earlier this year. The company has more than 5,400 engineers, including more than 2,000 software engineers. I also saw the construction site for a new 28-floor facility, adjacent to Hikvision’s other two high-rises in Hangzhou. When the new tower opens in 2018, a large part of it will be devoted to research and development. Hikvision has said its research focuses on such topics as perceptive technology, intelligent analysis, Big Data and cloud storage. “We also plan to build up our R&D resources in North America,” says Asnovich. “Globally, our new European facilities are opening in 2016 in a new building the company owns, and we are also opening new branches and facilities on other continents.” Hikvision is looking to expand into other market segments such as drones Growing a business costs money, and growing a large business this much takes a lot of money. Hikvision reportedly plans to use $1.6 billion of the credit line inside China, and $1.5 billion outside China, including the important U.S. market. Expansion into different markets Hikvision is looking beyond security, too, and the line of credit will help to finance expansion into market segments such as robotics, industrial machine vision, and drones. There was a hint of what’s to come at the China Public Security Expo in October in Shenzhen, where attendees crowded around a demonstration of a Hikvision drone (available now in the Chinese market). Could an acquisition be in Hikvision’s future? “The line of credit we recently received could prepare us in advance of an M&A opportunity, if and when a good prospect arises,” Asnovich comments. Possible Hikvision acquisitions in the United States have long been a topic of cocktail hour rumors and speculation in the security market. “It is certainly a large amount of money for the security environment,” says Asnovich. “However, it’s not atypical for many other industries. This is not the first time for Hikvision to receive a substantial line of credit.” For example, the company recently was also extended lines of credit for 5 billion Chinese Yuan (around $0.77 billion USD) from international financial organisations such as Deutsche Bank, Citibank, HSBC, and others. Needless to say, Hikvision’s future ambitions in the security market, and others, are well financed. If the amount of available funds reflects the scope and nature of that expansion, we might expect some dramatic moves from Hikvision in 2016.
Students of all ages in state schools are entitled to a safe learning environment. If students don't feel safe, they are not able to stay focused during classroom lessons and activities. That’s why Narre Warren South. P-12 College has upgraded its security with the installation of a sophisticated SALTO access control and ID pass system. Located south east of Melbourne, Australia, Narre Warren South P-12 College is a unique school on one campus with two sub schools, Primary, (Prep to Year 6) and Secondary, (Years 7 to 12). It follows the P-12 Curriculum which is designed to provide diversity and pathway opportunities, ensuring students maximise opportunities that exist after school and ensure people achieve their learning goals in a fun and supportive learning environment. Mechanical key system The College previously used a mechanical key system for its security needs Home to over 2000 students and 200 staff, cultural diversity is a feature of the College with at least 50 ethnic groups being represented speaking 68 languages. A third of the College’s student population come from families where the language background is other than English. The College previously used a mechanical key system for its security needs; however this was increasingly complicated to manage as keys multiplied, and it was difficult to guard against key duplication and copying. Another negative was the cost of re-keying and replacing locks to maintain security if keys were lost or not handed back. Security arrangements The College also had a number of challenges when it came to managing and limiting traffic flow through the staff car parks, both inside and outside school hours. To alleviate such problems, the College decided to look into upgrading its security arrangements and called in local security specialists Eclipse Security Systems. Director Greg Flood takes up the story. “We met with Brett Dyer, (the College’s Property and Maintenance Manager), and explained how SALTO solutions are in use around the world in educational environments including universities, university housing, schools, research institutes, academies, kindergartens and more where they provide security, access control and campus management.” Cost-effective package Brett liked the fact that SALTO could offer a solution that was education proven" “Replacing keys with smart access control would give the school much more control over its security. For instance installing smart online wireless locks on main entrance doors would enable the school to incorporate these doors into its lock down procedure. At busy student drop off and pick up times in the morning and afternoon, the school gates could be automated to improve traffic flow and ease congestion.” “And since Narre Warren South P-12 like almost all state schools hire out their sports, meeting facilities etc to third party groups outside of school hours, the new access control solution would make it much easier to manage access for such short term visitors. Brett liked the fact that SALTO could offer a solution that was education proven and offered a secure, flexible way to have all the above benefits and more in a versatile, cost-effective package that was future proof and gave a great return on the schools investment dollars.” Scheduled automatic locking Most external doors have a mix of offline and online SALTO XS4 escutcheons" “The removal of the old system and the upgrade to smart locks was smooth and straightforward, and we’ve now retro-fitted in excess of 100 doors and automated a number of perimeter gates. Most external doors, plus the addition of a number of internal office doors across all the blocks, have a mix of offline and online SALTO XS4 escutcheons, as well as control units and wall readers.” “The most important thing for us is to ensure that we are doing everything we can to safeguard our children. Our new access control system furthers this goal” says Brett Dyer. “We went with Greg’s recommendation of SALTO for its functionality and value for money. We particularly like how easy it is to use and program, especially the issue and management of contactless smartcards for external user groups." "The scheduled automatic locking and unlocking of external doors and gates is a huge time saver, and so far we’re pleased with the product and the capabilities it now gives us.”
To grasp the current manufacturing trends and seize the Zeitgeist of Industry 4.0, a new smart IoT industrial park in Hangzhou has been put to use by Dahua Technology, a video surveillance solution provider. Dahua Smart (IoT) Industrial Park occupies in total 512 acres in Fuyang district of Hangzhou, about 20 minutes’ drive from Dahua headquarters, designed to host 6000 staff (by 2017, 4500 people have been working/living in the 262 acres of phase one area). With topnotch technologies, personnel, materials and other benefits, Dahua’s smart industrial park will bring productivity and quality to a brand new level. Efficient information integration The automatic production solution based on integrated information system not only grants a higher productivity that significantly shortens the delivery cycle time for Dahua customers, but also a greater flexibility to specialised requests and ever-changing reality.The employment of software such as ERP, PLM, PDM, MES, APS and WMS helps to achieve information integration The employment of software such as ERP, PLM, PDM, MES, APS and WMS helps to achieve information integration, which, combined with industrial cameras, RFID sensory technologies and automation technologies, can integrate personnel, logistics, works, engineering projects and finance from respective sections of production(preparation, assembly, testing, packaging, inspection, shipment), rendering the whole process visible, traceable and digital. The mounter serves as a good synecdoche to illustrate the incredible efficiency of the whole production system. The concerning high-end devices (including mounter, printer, automated optical inspection equipment, Ersa reflow soldering tools, etc.) provided by ASM (originally Siemens) achieve a speed among the fastest in the world. Fast processing According to IPC standard, X4iS, the latest high-speed mounter can process 125,000 components per hour, or 35 per second. X35 multifunctional mounter can do 54000 components per hour, or 15 per second. A production line in X series can enhance the productivity by 2.7 times while reducing the consumption of energy by 52%, comparing to the original production line in D series under the same conditions. Dahua Smart Industrial Park provides the great benefit of internal synergy The faster speed also applies to the development of new molding, since Dahua Smart Industrial Park provides the great benefit of internal synergy, allowing the end-to-end vertical supply chain with marketing, R&D and manufacturing efficiently integrated. The advanced organising system is supported by topnotch equipment, such as MAKINO high-speed graphite processing machine, GF CNC, GF WEDM-LS machine, Hexagon 3D Nikon projectors and electronic displays. With a processing accuracy of +/-0.002 to +/-0.005MM, while also supporting CAD / CAM / CAE collaborative development and simultaneous manufacturing, these machines enable Dahua to develop new mechanical molding in as short as 7 days.Higher quality results in less likelihood for products to malfunction especially when they are used in critical situations Time- and cost-saving solution By far, this developing system has already produced high precision molding for Lechange Robots, monitoring cameras in TP1-TC6 series, G20 intelligent head-gears, smoke alarm for fire detectors, etc., all of which proving the effectiveness of the system in shortening the development cycle and keeping the competitive edge with new products in the business. Higher quality saves lots of time and economic costs for clients. Even more importantly, higher quality results in less likelihood for products to malfunction especially when they are used in critical, not-allowed-to-go-wrong situations. Dahua’s products are guaranteed with a higher quality for two reasons: first, Dahua has set a high standard of accuracy in production; second, with a reliability lab at the production end, Dahua has put together an effectively closed loop for quality control in the manufacturing process. Accuracy has always been one vital index defining the manufacturing ability because it directly sets the limit to quality and range of products to be produced. Again, take the mounter mentioned above for example: it can process components, in metric size, as small as 03015(0.3x0.15mm), with a +-0.025mm SMD precision (within the 3-stigma range), boasting world leading performance and capable of covering basically all types of components used in the industry.Dahua industrial camera plays an important role in IoT, providing a closed loop for quality control in the manufacturing process Enhanced vision and intelligent analytics Dahua industrial camera plays an important role in IoT, providing a closed loop for quality control in the manufacturing process, in which all materials, personnel and devices are connected and products are traceable to the specific production line and precise time it got made. Boasting a variety of functions, Dahua industrial cameras are used in different sections of production, enabling automatic assembly, high-precision graphic inspection and product flaw inspection. Through high-definition machine vision, Dahua industrial cameras automatically and precisely locate the components, limiting the assembly error to micron level. Equipped with enhanced vision and intelligent analytics algorithm, the industrial camera can spontaneously detect and recognise flaws in the performance and outlook of products, thus promising not only the volume of cameras production but also the steady quality of each and every one of them.In the future phase, this industrial park is expected to be more intelligent to enable a safer society and smarter living Safe society and smart living Reliability must be put to test, in R&D as well as in manufacturing process. The reliability lab at the production end serves to assure quality by randomly taking products from production lines and put them into reliability tests simulating falling, high/low temperature, worn-out conditions, which are conducted by industry leading testing equipment in the lab. Thus what’s conceived in R&D is confirmed from the production line, the synergy of both ends promising better products (for common use or specialised needs). This lab is also responsible for testing all the raw materials. Thanks to the aforementioned information integration, all tests are automatically conducted, recorded and traceable. In conclusion, Dahua Smart (IoT) Industrial Park is endowed with the latest and world leading manufacturing equipment/system boasting high level automation and intelligence, which is essential to satisfy the ever higher demands from clients in terms of delivery time, specialised use and quality. There is still great potential to this new smart industrial park. It is literally only in its phase one. And in the future phase, it is expected to be more intelligent, to realise client-centred flexible production and to enable a safer society and smarter living.
ip.access has announced a collaboration with Imaginet, a provider of IT network and security solutions, to implement a rapidly deployable disaster response network in Makati City, the Philippines. Makati City, part of the Metro Manila region, is the main financial hub and has a population of 6 million people. Built on a drained mangrove swamp, the city’s infrastructure is at a high risk for significant damage in the event of an earthquake, typhoon or other natural disasters. In the event of a disaster it is likely that communications infrastructure would be affected – hindering efforts to direct the population to safety and locate people trapped in collapsed buildings. To improve the city’s preparedness for natural disasters, the local Disaster Risk Reduction & Management Office (DRRMO) worked with Imaginet to implement a rapidly deployable mobile network. Deployed via four command vehicles, the network will allow first responders to communicate with the population and report back to the central command office.The ip.access team has an inherent understanding of disaster situations, with extensive experience working in harsh environments Ensuring disaster preparedness Basing the network on 2G technology, to ensure that signals would be capable of penetrating collapsed buildings and enabling communication through SMS messaging, ip.access was tasked with designing, installing and testing the network in a tight six-week window. Following a successful commissioning period, the four command vehicles were first deployed in December 2017. Commenting on the partnership, Blair Duncan, CEO at Imaginet, said, “This was a challenging technical undertaking. As such, we needed confidence that we were working with a partner that could deliver a high quality solution. In that respect ip.access were an ideal partner – the team has an inherent understanding of disaster situations, with extensive experience working in harsh environments. We knew that we could rely on them to equip our vehicles with the robust and reliable radio network the DRRMO requires should a disaster strike.” Small cell solutions Nick Johnson, CTO at ip.access added, “We have a wide range of award winning commercial off-the-shelf (COTS) small cell solutions that can be easily integrated and operated within a wide range of specialist deployment scenarios – including in disaster response settings.” “Communication is critical in a disaster situation, so the fact our proven solutions deliver five nines availability with exceptional reliability makes them ideal for applications like the vehicle-borne network in Makati City.” Due to the success of the vehicles, the Makati City DRRMO is now looking to increase its fleet to nine vehicles to enable more flexibility and more robustness in its disaster readiness.
Concern for safety of the lab staff prompted IHEP to seek a more securely automated system The Institute of High Energy Physics (IHEP), the Chinese Academy of Sciences (CAS) is a comprehensive research base with its main efforts focused on high energy physics, R&D of advanced accelerator technologies, advanced synchrotron radiation technologies and applications. Advanced scientific research facility technologies and high-tech products with sophisticated science and technologies like radio frequency, UHV, microwave, precision magnet fabrication, etc. The developmental fields cover accelerator technology, nuclear medical instrument, nuclear instrument and meter technology, industrial automation technology, information technology, precision machining, etc. IHEP contains 11 laboratories. The research efforts are centred on high energy physics, cosmic ray and high energy astrophysics, theoretical physics, accelerator physics and technology, synchrotron radiation and free electron laser and nuclear analysis technology and application, etc. Large scientific tools include Beijing Electron Positron Collider (BEPC), Beijing Spectrometer (BES), Beijing Synchrotron Radiation Facility (BSRF) and Beijing Free Electron Laser (BFEL.). Solution Beijing Access Control Technology “We were seeking an advanced method of managing access control and for higher security,” said Li Tie Hui of The Accelerating Control Center in China. Access to restricted lab areas was being manually managed by staff – individuals requiring access to the lab had to physically use a key located in a central control unit. The key then had to be returned to its location and all staff had to evacuate the lab in order for the lab operations to initiate. The lack of a sophisticated security procedure generated a high risk of people remaining in the lab and potential exposure to radiation. Concern for safety of the lab staff prompted IHEP to seek a more securely automated system. "Convenience, safety and process automation were key considerations when we selected HID products" Solution Beijing Access Control Technology Co.(www.bj-access.com.cn), a local access control solutions provider, won the project out of nine bidders to exclusively develop an advanced safety and security system featuring HID RFID access control technology integrated with networked security, custom software, video surveillance, and a fire prevention/detection system. HID ProxPro® card readers “Convenience, safety and process automation were key considerations when we selected HID products. We had HID cards and readers at other IHEP facilities and knew those existing products were providing the kind of security needed at the lab,” said Hui. Manual access to each door of the lab is now accompanied by an HID reader with sound and a separate LCD. The HID® reader outputs an identification number that furnishes the customised system with a higher level of security and shows the identification of the entrant, time of day and how many people remain and/ or exit in and out of the restricted lab area, displaying their names on the LCD screen. Once a departure confirmation is complete by flashing on a “departure confirmation” reader, the remaining name on the LCD screen disappears. HID access control technology controls entry into the lab, prohibiting anyone from entering while the lab is operating. In addition, HID ProxPro® card readers were modified to overcome power disturbances created by the radioactive lab environment, delivering a reliable solution for the environmental challenges at the Institute of High Energy Physics
Two models of MOBOTIX IP camera were selected for the wind tunnel, as advised by R. Pierre Digital NEWTON S.r.l. is an independent testing laboratory established in 2000, recognised and certified by international bodies such as Accredia, FIA - Fédération Internationale de l’Automobile, SFI-USA, SNELL-USA, Italcert, Istituto Masini, TÜV Rheinland International, TNO and SNCH - Société Nazionale d’Homologation et de Certification for tests of motorcycle helmets and auto racing helmets (Formula 1 and WRC), children’s helmets for kart racing, HANS devices for Formula 1 drivers, devices to protect the head, eyes (goggles, masks, and visors) and body (riding, bike, and touring helmets) and for certification tests on high-performance seats. Wind tunnel project In addition, the Ministry of Infrastructure and Transport considers the laboratory’s equipment to be suitable for all tests required by Regulation 22 concerning helmets and visors for motorcycle drivers and for some of those concerning the approval of two- or three-wheeled motor vehicles. The Newton laboratory has recently completed the installation of a 280kW subsonic wind tunnel: this is a closed return, Göttingen-type wind tunnel, designed to be used with either an open or a closed test chamber, depending on the specific testing programme. The electric power needed is produced by a generator integrated into the structure. Thanks to the testing activity carried out within the laboratory, products obtain the certifications required by various Italian authorities (which vary according to the sector to which the tested product belongs) in order to be considered adequate, and consequently put on the market. “The idea of building an actual wind tunnel came about mainly to deal with the problem of ventilation inside the helmets,” explains Luca Cenedese, director of Newton. In fact, it seems that having solved the problem of head protection parameters, today there are large international groups focusing mainly on the study of comfort, concentrating mostly on thermal stresses and the analysis of how these phenomena affect the reaction and concentration abilities of automobile, motorcycle, and bicycle racers. “In existing wind tunnels, everything was focused on the machine, not on the helmet. So we decided to prepare by building ourselves a medium-sized wind tunnel that could also satisfy these new requirements. Today, with a wind speed of about 250 km per hour, we test helmets, bicycles, magnetic sirens for police cars and also traditionally large objects - for example subway cars or high-velocity train cars - that by utilising the principle of aerodynamic similarity, are proportionately reduced in scale,” continues Cenedese. Comparing data and images Built a few years ago, the Newton wind tunnel has now found approval from old and new clients from different sectors. The wind tunnel allows continuous and very effective activity. To obtain the greatest performance and offer something extra to our clients, Newton needed to identify a system that would permit keeping track of all inspection and test activities. “We work with the engineers who come to our laboratories during the testing phase to design and modify the prototypes currently being made while the product is being tested. Some tests last for many hours: we soon realised that we would have had surprising results if we had had a system available that allowed continuous recording.” "Network-integrated cameraswere needed that could not only communicate with each other but also be accessible remotely" The software used for tests inside the wind tunnels produce an enormous amount of numerical data: that is, numbers relating to performance that characterise an object, especially force, pressure, and temperature. The experts at Newton have augmented this type of numerical information, produced and processed by a PC, with a second, new perspective: the display of images produced by MOBOTIX cameras during the products’ testing phase. And thanks to the combination and comparison of numerical data and images, Newton can now provide its clients with much more accurate measurements, achieving levels of qualitative detail never before seen. Need for network-integrated cameras The years dedicated to this type of activity and the studies carried out in the Newton laboratories led to the awareness that the measurement of data, in and of itself, is very simple. Rather, the real problem is managing the amount of data produced by the system, which is quite often very difficult to read and make intelligible, so as to understand the various phenomena that occur in the products tested in the wind tunnel. To deal with this need, the idea was therefore to integrate the images by using video surveillance cameras. An idea that can now be described as a real pilot project, in other words a one of a kind application. “We could not rely on images taken with traditional movie cameras, because the test sessions often last for many hours and we needed images that would allow us to observe the phenomena from many angles at the same time. In addition, network-integrated cameras were needed that could not only communicate with each other but also be accessible remotely.” Two models of MOBOTIX IP cameras were chosen: one with a 360-degree view, and one AllroundMono model Quality, timeliness and immediacy with MOBOTIX Thanks to the support and advice of distributor R. Pierre Digital, two models of MOBOTIX IP cameras were chosen: one with a 360-degree view placed on the ceiling, perpendicular to the product test position, to offer a panoramic view; and one AllroundMono model, positioned at the side but movable as needed, which offers different details and angle shots within the same shot. Thanks to the high quality of the images from the two MOBOTIX cameras, the Newton engineers can guarantee the end user that they can take very timely action in the test phase of their products, managing any anomalies and malfunctions in real time and making the necessary changes. The advantage of MOBOTIX IP cameras is that they are also accessible remotely: a very significant plus since many of Newton’s clients come from abroad, and often some of their staff follow the product test operations remotely, thanks to a system access login offered to the client. “By combining data and images, we achieved surprising results in the test phase. When we analyze the data, if we see that the data changes, we go to retrieve pictures of the moment when the data changes and we can immediately understand the phenomenon. For example, during a test on a bicycle and a cyclist, the team’s engineers were simultaneously checking the numerical data regarding the bicycle’s efficiency and, from the images produced by the camera, the position of the cyclist at the moment when the efficiency was greatest. We are not information systems engineers, and in this sense, we were helped a lot by not having to use image management software: the images are processed on board the cameras and the result compared to other systems is surprising”, concludes Cenedese.
Airbus Defence and Space aims to validate the use of smartphones in different operational situations Airbus Defence and Space and its partner RIKS (the State Infocommunication Foundation), the technical operator of Estonia’s national Tetra network, is performing a field trial of the Tactilon Agnet smartphone application - formerly known as TSA - for two months. Voluntary civil defence and governmental organisations want to confirm Tactilon Agnet’s ability to fulfil the operational requirements for typical mission-critical communication. The field trial combines the use of public broadband networks and Tetra services. Airbus Defence and Space solutions For the field trial, Airbus Defence and Space has provided a service cloud environment and delivered an RCS9500 integrated radio dispatching system, an automatic vehicle location solution, a Tetra base station, several Tetra radios, and different types of smartphones equipped with the Tactilon Agnet application. The application enables smartphone users to make instant group calls (push-to-talk feature) and send messages to Tetra users as if they were equipped with Tetra devices. Challenging test environment During the field trial, Airbus Defence and Space and RIKS aim to validate the use of various types of smartphones in different operational situations. In addition, both Airbus Defence and Space and RIKS want to collect information about how mission-critical Tetra communication features have to be operated in an LTE environment. To push the LTE-based Tactilon Agnet application to its limits, RIKS has set up, in cooperation with commercial operators, a challenging and complete test environment that includes not only a regular LTE network on the 800 and 2600 MHz frequencies, but that also includes a mobile LTE base station that is connected to the core network via broadband satellite link. Demand for broadband group communication “As we observe an increasing demand for broadband group communication with multimedia features among mission critical users, Airbus Defence and Space offers a unique solution called Tactilon Agnet. It provides fully-fledged, seamless and secure integration of Tetra radio users with those who use Tactilon Agnet on their smartphones,” explains Olivier Koczan, Head of Secure Land Communications at Airbus Defence and Space. He points out that RIKS and Airbus Defence and Space are “clearly on the verge of introducing mission-critical communication features of the next generation”. Estonia’s public safety organisations have communicated within a nationwide Tetra network from Airbus Defence and Space since 2007. In 2015, the company delivered critical communication solutions enabling the use of LTE networks, which will also be used to test the Tactilon Agnet application. This solution provides high availability and secure access through commercial LTE network services.
Round table discussion
Finding the exact right technology to solve an end user’s problem is challenging, but the rewards are great when an integrator gets it right. A wide range of available product types, price levels and added features increases the likelihood of identifying a technology to solve any problem. But with so many technology and product choices in the marketplace, identifying that one solution can be akin to finding a needle in a haystack. We wondered whether a vast range of product choices is always a good thing. We asked this week’s Expert Panel Roundtable: Are security integrators and end users overwhelmed by “too many choices” related to security equipment and systems? How can they make sense of it all?