The retail industry is constantly evolving, with a fast-paced environment that requires retailers to quickly respond to changes in the market, while delivering a consistent service that inspires customer loyalty – all in a bid to maintain healthy margins and revenue in what is an increasingly competitive landscape. Helping retailers to drive efficiency and capitalise on new labelling innovations, Checkpoint Systems’ source tagging programme, which celebrates more than 25 years since...
ELATEC USA Inc., a developer and manufacturer of innovative RFID products, announced Paul K. Massey as Chief Executive Officer. In this newly created position, Massey will report to the ELATEC Board of Directors and Managing Director Stefan Haertel. As CEO of ELATEC USA, Massey will focus on the growth and proliferation of ELATEC solutions in its North American and Latin American markets. Customer focused communicator “We are fortunate to have someone of Paul Massey’s calibre and...
Identiv, Inc announced that the company is expanding its partnership with Les Bouchages Delage to deliver Internet of Things (IoT)-ready solutions for near field communication (NFC)-connected bottles in the wine and spirit industry. Identiv and Les Bouchages Delage originally partnered while collaborating on an intelligent NFC bottle cap for a luxury cognac brand. Now, the two companies are expanding their partnership by equipping a wide variety of Les Bouchages Delage cap designs with Identiv&...
ELATEC, global developer and manufacturer of innovative RFID products, welcomes Klaus Finkenzeller to its corporate management team as Innovation Manager. The qualified electrical engineer is a regarded international expert in the field of RFID technology. With the addition of this renowned specialist, ELATEC increases its innovation strength and consolidates its position as a global technology provider. RFID identification and application development Finkenzeller’s focus includes...
Checkpoint Systems, a pioneer in source to shopper solutions, has announced the launch of the G40, a small footprint acrylic antenna specifically designed to tackle theft in convenience stores. With small format stores growing at an exponential rate globally, the need to protect merchandise in high traffic, small footprint environments is increasing. The compact RF-based, G40 EAS antenna offers a solution to cover areas where installation of traditional EAS proves challenging. Maximising space...
Morse Watchmans, the provider of key control and asset management systems, will showcase its KeyWatcher Touch, AssetWatcher, and KeyWatcher fleet key and asset management solutions at GSX 2019 this week (booth #1153). “We are excited to show GSX 2019 attendees how key management and asset control can help them to create a state-of-the-art security system for their organisation,” said Fernando Pires, CEO, Morse Watchmans. “We continue to be completely focused on providing innov...
People and vehicle access control specialist Nortech is now offering Nedap’s ANPR Lumo, an advanced licence plate camera for vehicle access control. The ANPR Lumo is an all-in-one licence plate camera, including embedded software, analyser and IR illuminator. With a range of action of 2 to 10 metres, the advanced camera ensures a smooth recognition of vehicles. Applications include automatic toll collection Typical applications include vehicle access control, automatic toll collection, free flow applications at parking facilities or other situations in which it not desirable to issue RFID tags. If vehicles need to be granted access temporarily or incidentally, the licence plate camera is the perfect solution. Features include: Standalone solution - The ANPR Lumo offers built-in vehicle access control features. The option to configure time-based access control lists (white list, black list, ignore list, etc.) in the web based software enables the camera to be used as a standalone solution. High accuracy - The deep learning algorithms enable a high accuracy with common license plate formats, like Europe, and regions with non-standardised license plate formats, such as the USA and Pacific. In addition, the ANPR Lumo is able to recognise ADR Hazard Identification Numbers (HIN), also known as Kemler Codes, which are used for the road transport of dangerous goods. Libraries - The ANPR Lumo covers a broad list of countries supporting a large range of IR-reflective license plates. User-friendly configuration - The web based software enables easy configuration of the ANPR Lumo. It allows for configuration of the output messages for RS485, Wiegand or Ethernet. In addition, digital I/O, region of interest and network settings can be defined. REST interface - The ANPR Lumo is equipped with a REST API that allows third parties to easily integrate the camera. The REST interface enables third party systems to request the last read licence plate and add licence plates to the white list. Easy installation - A mounting bracket is included as standard with the ANPR Lumo to ensure easy installation. With this bracket, the licence plate camera can be mounted onto a wall or pole and allows the camera to be adjusted to ensure reliable reading. Communication interfaces - The ANPR Lumo supports the industry-standard communication interfaces: RS485, Wiegand and Ethernet. This enables seamless integration into any existing or new access control/parking system. Wiegand interface - Most access control panels support Wiegand. The ANPR Lumo converts licence plate numbers into Wiegand ID strings and the built-in Wiegand option ensures easy and seamless integration into any new or existing access control panel.
What could real-time access control do for your building security? In an instant, upgrading to real-time control boosts the intelligence of an access system, relaying live event reports and enabling you to change the security status of any door or user at any time. Real-time access control with wireless online locking provides options that do not exist with offline systems. With real-time functionality, facility managers get audit trails and change access rights for any door, user or credential instantly. You can lock or unlock any door remotely from the central admin software — which means no walking to the door in person and no delays when you need to take action at short notice. In schools, real-time wireless online access control enables security managers to remotely lock and open doors in any emergency, or whenever they choose. In hospitals equipped with real-time access control, staff see immediately who had access to drug stores or valuable equipment. Many more building types already benefit from real-time access control. Alerts are monitored in real-time, so you track and prevent any attempted unauthorised access Access anytime, anywhere Real-time access control relies on a network of communications hubs. These operate as a bridge between admin system software and access control door devices. In a SMARTair® Pro Wireless Online system, one communications hub links up to 30 wireless locking devices to the central system. Information is exchanged via an existing or new TCP/IP network, protected with AES-128 and SSL encryption. You can pass updates or read the event logs of any battery-powered SMARTair® escutcheon, knob cylinder, lock or wall reader anytime you choose. With real-time access control from SMARTair®, you can view the status of every door in your building at a glance. Alerts are monitored in real-time, so you track and prevent any attempted unauthorised access before it even happens. A real-time SMARTair® system alerts a facility manager in cases of intrusion, doors left open, low battery status, denied access or attempted use of any cancelled card or mobile credential.To amend door or time validity of any user credential takes a couple of clicks in SMARTair® admin software which you can access anytime and from anywhere. Plus SMARTair® gives you the option to combine wireless online and offline doors in the same system. You can fine-tune where you deploy real-time access control in different areas of your premises. Benefits for schools In an emergency, the school can remotely lock and open doors in real time via the admin softwareReal-time access control can impact your security and access management no matter what size or type your premises. At Westbridge Special Residential School, SMARTair® Wireless Online management proved a simple electronic solution for greater control and school security. Each staff member carries one RFID credential card programmed with access rights personalized to their role. In an emergency, the school can remotely lock and open doors in real time via the admin software.In Denmark, Vejle Friskole’s mechanical keys have been replaced by a SMARTair® online access control system. Over 80 doors and cabinets around the school are locked with SMARTair® wireless devices. Using the intuitive SMARTair® software, managers always have an overview of who has been at the school, and when. Audit trails are generated and monitored in real time using the SMARTair® system.
The new Aelement Fusion DIN lock from SALTO is packed with innovative features including a JustIN Mobile application for mobile access with NFC and BLE engine, SALTO BLUEnet wireless technology for real-time access control management and SALTO Virtual Network (SVN) data-on-card technology. Aelement Fusion electronic lock Aelement Fusion is an electronic lock with a sleek round reader that eliminates the need for lock hardware on the door Aelement Fusion is an electronic lock with a sleek round reader that eliminates the need for lock hardware on the door by encasing all electronic components inside the door itself, making security virtually invisible. The latest evolution in smart door lock engineering, it increases security, improves operations, enhances décor and is compatible with RFID and BLE (Bluetooth) technologies that integrate seamlessly with mobile applications including SALTO’s own JustIN Mobile. Electronic access control Providing a minimalistic design Aelement Fusion’s small, customisable light ring reader (available in Black or White colours) offers a discreet electronic lock for anyone looking to deploy electronic access control with a stylish, yet technologically-advanced solution. By offering both DIN and ANSI compatibility, Aelement Fusion can be installed in virtually any type of door making it an ideal choice for doors that require effective but discreet security. Smart door locks Security, efficiency and design are all essential aspects in the highly competitive access control market" “For more than a decade, our intention has been to create an invisible electronic smart door lock and Aelement Fusion is the realisation of that vision,” says Marc Handels, SALTO Systems CMSO. “Security, efficiency and design are all essential aspects in the highly competitive access control market. Aelement Fusion incorporates SALTO’s stand-alone, battery-powered SVN data-on-card and advanced wireless technology, with online, real-time capabilities — all without using wires.” SALTO BLUEnet wireless engine Marc adds, “It is packed with incredible new technologies, like the innovative JustIN Mobile application that allows users to use their smartphone as a key, a contactless reader with stylish light ring design, and SALTO BLUEnet wireless engine for real-time access control." To help security specialists decide which Aelement Fusion model is best suited for their project, SALTO has developed the innovative MyLock on-line tool which enables them to customise and visualise exactly what the lock will look like on a wide range of door types and finishes.
With security threats on the rise, LILIN Americas is answering the call by introducing an advanced yet easy-to-install Access Control System for monitoring entry to a building, resulting in a safer environment for personnel and assets. When integrated with other platforms such as IP cameras, fire alarms, and sensors, the system provides a layered security approach that significantly enhances peace-of-mind and acts as a deterrent for theft and vandalism. "The LILIN Access Control System is a single, streamlined and secure solution that can be controlled remotely and customised to individual requirements, from the simple to the most challenging," said Joe Cook, Vice President and General Manager of LILIN Americas. It tracks when employees enter and exit a building, creating an audit trail of data that can be analysed for actionable insights" "Besides keeping intruders out, it tracks when employees enter and exit a building, creating an audit trail of data that can be analysed for actionable insights. It also empowers administrators to restrict the locations each employee can enter, so they can set levels of security that balance safety and convenience." Reduces installation time Designed to work seamlessly together, the building blocks of the LILIN Access Control System are: TCP/IP Single Door RFID Card Reader and PIN Controller (AR2015) PoE Relay Box (ARR2010E) TCP/IP Multi- and Single-door Control Panels (AC1082, ACW10120) AC/DC Power Supply (PMH-PSU330) LILIN Access Control Software Various combinations of the hardware platform are installed depending on the three available configurations – Standalone mode, Standalone with PoE mode, or Mixed mode. By using only what hardware they need, LILIN customers can significantly reduce installation time and total cost of ownership, while achieving operational efficiencies and gaining greater visibility into their security environment. Gateway to unified access control Standalone and Standalone with PoE modes are targeted primarily at small commercial and select residential applications, while Mixed mode is recommended for enterprise-level deployments with Wiegand readers and integrates with LILIN's advanced Navigator series recording solutions. The software's multi-level mapping feature lets users monitor up to three live cameras at each intrusion area The web-based Access Control software provides a gateway to unified access control, enabling administrators to manage all of their security devices on a single interface. For example, the software's multi-level mapping feature lets users monitor up to three live cameras at each intrusion area, while logging the event in real time. If an alarm event occurs, the administrator is sent an e-mail notification and the software brings up live video on the screen for viewing. Capacity to store 20,000 card holders LILIN Access Control Software enables logged events to be fully searchable for later analysis, a process that is made easier by the software's ability to display individual logs with a snapshot of the person involved and employee information, if available, along with recorded surveillance video. Tampering with a card reader, forcing open a door, insufficient permissions, or propping open a door for an extended period of time are all events that would set off an alarm. Scalability of an access control system allows it to handle growing security concerns, whether it is hiring more employees or building an addition to a home. The LILIN system has the capacity to store up to 20,000 card holders and 65,500 events with support for a maximum of 1000 doors with three cameras per door. It also features high assurance Anti-Passback protection to prevent cardholders from double entering or exiting a door with a single card, along with a duress code to input for opening a door and sending an alarm.
Matrix will be participating in the Rail India Conference & Expo 2019 to be held at The Lalit in New Delhi on 29th – 30th August 2019. From Telecom domain, Matrix will be showcasing enterprise meeting solution - PARISAT meeting server at the event. The conferencing server is engineered for 10 video and 100 audio participants enabling police force to collaborate from different locations and solve critical situations at the earliest. At the event, Matrix will exhibit pure IP solution - PRASAR UCS that enables armed forces’ personnel to connect wirelessly from remote locations. Matrix Unified Communication Server – SARVAM UCS will also be highlighted at the event. Biometric attendance system Equipped to support radio ports and in-skin GSM connectivity, the solution enhances connectivity between field personnel, helping them manage emergency situations effectively in less time. Matrix will also showcase its GSM and VoIP Gateways that allows police and defence forces to make an easy switch to the modern network while retaining their existing infrastructure. Matrix will be presenting its other time-attendance and access control solutions at the event Matrix, from the portfolio of people mobility management solutions, will be presenting its Aadhaar enabled biometric attendance system at the event. This device allows secured attendance marking through dual authentication – biometric/RFID card and Aadhaar number. Matrix will also be presenting its other time-attendance and access control solutions at the event. Matrix will showcase its Aadhaar enabled biometric device. It is the only Linux based device available in Indian market with card and finger authentication. Time-attendance solutions The device comes with multiple connectivity options like Wi-Fi, PoE, Ethernet. This Aadhaar based authentication device is purposely designed for marking attendance of government employees and is the only embedded device available in Indian market currently. Matrix will be showcasing enterprise grade access control and time-attendance solutions engineered with features such as auto push events to server, automatic fingerprint distribution, instant notification, 300+ customised reports generation, scheduler services including backup and more. Furthermore, access control being the prime requirement in terms of security, Matrix will present its standalone access control solution with license free environment, whereby a single panel can handle up to 255 doors and 25,000 users. At Rail India, get a glimpse into the cutting-edge Matrix biometric solutions with multiple credentials such as face, fingerprint, palm vein, RFID card and PIN options at the Expo. Video management system Matrix will also be showcasing an enterprise-grade video management system designed, engineered and built specifically for growing multi-location organisations. The entire solution focuses on automating processes and enhancing efficiency of organisations. Matrix will also be showcasing a new range of audio compatible and compact professional series IP cameras powered by Sony STARVIS series sensors with Exmor technology. Matrix will be showcasing its new extreme series of Network Video Recorder (NVRX) at the event This gives the cameras an edge over others in terms of exceptional low light performance, consistent image quality during varying light conditions (True WDR), better bandwidth optimisation, video analytics such as intrusion detection, perimeter security, loitering detection and many other features. Furthermore, Matrix will be showcasing its new extreme series of Network Video Recorder (NVRX) at the event. Meeting system integrators These NVRs are equipped with 4K decoding capacity and characteristics like cascading (up to 20 NVRs), camera-wise recording retention, TCP notifications for remote locations and database level integration. Moreover, these latest NVRs are also backed with an intelligent software that helps detect threats and send instant notifications for real-time security. “We look forward to meeting system integrators and other business associates who can help us expand our business footprints at the event. We aim at using the event as a platform for hosting numerous meetings in the future and get a clear understanding of current market trends and needs”, commented Jatin Desai, Marketing Manager. Visit Matrix at stand number 6, at The Lalit in New Delhi on 29th to 30th August 2019 and learn how its enterprise grade solutions can assist in resolving communication and security issues.
As a long standing Development Partner, Third Millennium is pleased to further strengthen its status with LEGIC in providing new and design-led collaborative innovation within the security access marketplace. With headquarters based in Switzerland, LEGIC is a trusted supplier to corporations around the world in supplying secure credential and access authentication control, and for more than 25 years, it has been a developer in mobile and contactless smartcard technologies using RFID, BLE and NFC. Key and authorisation management tools Utilising state-of-the-art security standards to secure data integrity, LEGIC’s technology platform includes reader and smartcard ICs and key & authorisation management tools, as well as the software service - LEGIC Connect. Working closely with LEGIC, Third Millennium manufactures a comprehensive range of advanced access control readers, together with integral keypad and biometric fingerprint readers, and provides an unparalleled service of design, quality, and support to its customers.
It amazes me how in a few short years security systems have gone from simple, dumb cameras witnessing events to intelligent eyes, ears, speech and touch solutions that boost situational awareness far beyond human capabilities. It seems the only senses missing from the equation now are smell and taste. And who knows, someone might be working on those in a lab somewhere right now. But what’s really fascinating to me is how the Internet of Things (IoT) has opened a world of possibilities for transforming security technology into something new yet again. With IoT we’re able to push and pull nuggets of intelligence from sources we never considered before: environmental sensors, pressure plates, door lock timers and much more. It’s helped us break through the constraining mindset that security systems are strictly single-purpose. With interconnectivity at the core, we’re starting to imagine myriad ways to apply these tools to challenges outside the realm of security. Here are just a few examples. Flood management assistance Network camera adds another dimension and timeliness to flood management by helping responders investigate remotely As recent hurricanes and floods have shown, water damage can be devastating to a community. That’s why some municipalities are using their city surveillance cameras in conjunction with water sensor to proactively address the problem. Water sensors collect data from multiple sources such as rain gutters, sewer systems and pump stations, in order to monitor fluctuations in water levels and water quality. If an alert triggers, having a network camera in proximity to visually verify the situation helps responders determine the best course of action. For instance, if multiple water detection sensors trigger alerts simultaneously or sequentially over a large area it’s probably due to natural runoff from recent rainfall. But without eyes on the scene, how can you be sure? Network camera adds another dimension and timeliness to flood management by helping responders investigate and identify the cause of a trigger remotely. It might be a fire hydrant spewing water, a water main break or even a chemical spill. With video streaming live to the command center, staff can remotely inspect the area, determine the cause of the trigger and decide whether remediation is required, thus avoiding the expense of dispatching an investigative crew to a non-event. Some municipalities are using their city surveillance cameras in conjunction with water sensor to proactively address the problem Environmental control assistance Data centers house the lifeblood of a business so it’s no wonder why companies work hard to protect them. We’re all familiar with the integration of network cameras with access control systems to visually verify who is actually using the credentials. Network camera adds another dimension and timeliness to flood management by helping responders investigate and identify the cause of a trigger remotely But there’s another aspect to protecting data centers and that’s environment control. Data centers need to maintain optimum humidity and temperature for the racks of electronics. When environmental sensors in the facility detect out-of-norm ranges technicians can remotely command a network camera to zoom in on the gauges and help them determine whether remediation might be necessary. Coupling network cameras with other sensors in the data center can provide visual confirmation of other conditions as well. For instance, every time a data rack door-open-close sensor detects an event it can trigger the camera to pan to the location and stream video to security. Some data centers employ weight sensors at the doorway to weigh personnel and equipment as they enter the room and when they exit to ensure no additional hardware is being taken out of the facility or left inside without permission. Any discrepancy would trigger the camera to zoom in for a close-up of the individual’s face and send a visual alert and ID information to security. Roadway management and parking assistance Network cameras have long played a part in city-wide traffic management. Adding video analytics and integration with network sensors, makes those cameras that much smarter and versatile. They can detect cars driving in bike lanes or driving in the wrong direction and capture license plates of offenders. Their ability to detect anomalous traffic flow patterns can be integrated with car counting sensors, networked electronic road signs and traffic light systems to automatically redirect vehicles to alternate routes. They make great, intelligent parking lot attendants, too. Working in conjunction with weight sensors network cameras can count vehicles coming into and leaving a lot or garage and verify when the facility has reached capacity. License plate recognition and video analytics can be used to ascertain that a vehicle entering a reserved parking space doesn’t match the credentials and vehicle attributes in the database. With the addition of noise sensors and audio analytics, network cameras can improve roadway and parking facility safety by detecting and identifying specific sounds – breaking glass, car alarms, gun shots, and aggressive speech – and triggering a visual alert to first responders. Network cameras can improve roadway and parking facility safety by detecting and identifying specific sounds and triggering a visual alert to first responders Shopper experience assistance In the early days of online shopping, e-tailers designed their sites to replicate the in-store customer experience. In an ironic turn of events, today brick-and-mortar stores are trying to mirror the online shopping experience. To do so, they’re turning their security systems into adjunct sales assistance. With network video and audio system automation they can recognise and acknowledge loyal customers with personal greetings. Retailers are applying people counting video analytics to checkout activity to create rules-based consistency in customer service With heatmapping analytics they can measure how much time a customer spends in a specific department or observe how they walk through the aisles of the store. They can track shopping behaviors such as items looked at that made it into the cart or didn’t, or whether a customer actually checked out or left the merchandise behind. By capturing these shopping patterns and trends retailers can shape a more positive, more profitable customer shopping experience. For instance, integrating video analytics with point of sale systems and RFID sensors on merchandise tags can result in timely alerts to sales associates to recommend additional merchandise. This is a case of emulating how e-tailers let the customer know that other customers who bought X often also purchased items Y and Z. Or to avoid disappointing customers due to stock outages, retailers are linking weight sensors and video analytics to make sure their shelves are well-stocked and if not, quickly alert associates to what items need to be restocked. Capturing business intelligence Retailers are also using video cameras to monitor checkout queues and trigger automated announcements over the public-address system, closed system such as smartphones or other wireless communications devices that checkers are needed rather wait for a person to call for backup. IoT laid the groundwork for network security solutions to seamlessly integrate with other IP-based technologies, sensors and programs They’re applying people counting video analytics to checkout activity to create rules-based consistency in customer service. While retailers will always use their surveillance camera for loss prevention, they’re finding that integrating traditional technology in new ways can yield even bigger returns. Linking network video surveillance, video analytics, network communications system and sensors with point-of-sale systems and customer loyalty databases, retailers are capturing the business intelligence they need to get back in the game and make brick-and-mortar a greater overall experience than online shopping. A natural cross-over technology This trend towards integration has forever changed how organisations view their investment in security technology. The intelligence and versatility of a tool that can see, verify and analyse what’s happening in real-time is spurring users to tap its cross-over potential for a host of other tasks that could benefit from more astute situational awareness – everything from manufacturing and equipment maintenance to logistics, inventory control and beyond. IoT laid the groundwork for network security solutions to seamlessly integrate with other IP-based technologies, sensors and programs. How we capitalise on that connection is only limited by our imagination.
Over the past few years, biometrics has rapidly expanded into consumer applications, like the financial market for customer authentication, to payment services and withdrawing cash from ATMs in high-fraud markets. However, its adoption as an additional authentication factor for physical access control systems (PACS) and other enterprise applications, hasn’t been as rapid. But this is changing. Biometrics offers numerous benefits at the door and throughout the enterprise. With the advent of new anti-spoofing capabilities, and its integration into secure trust platforms that protect privacy and support a variety of RFID credential technologies, biometric authentication is poised to deliver a much higher matching speed and better overall performance. This will dramatically improve an organisation's security, whilst enhancing user convenience.Newer solutions are overcoming security and convenience hurdles to help realise the full potential of biometrics Challenges for biometric authentication Biometrics fuses convenience and security while validating “true identity” versus identity that is associated to the possession of an ID card. As an example, biometrics prevents a user from taking someone else’s card and obtaining access to privileged resources. This adds the human element to traditional methods of authentication, strengthening security by combining something the user “is” with something the user “has” or “knows.” According to the firm ABI Research in its May 2018 study, Biometric Technologies and Applications, the total fingerprint sensor shipments for the entire consumer market is “estimated to reach 1.2 billion worldwide for 2018, thus ensuring its market dominance.”It has been far too easy for fraudsters to create a fake fingerprint and present it to a reader Despite the benefits of fingerprint authentication in numerous consumer applications, there have been impediments to its broader adoption in the enterprise. While price has been one big roadblock, there have also historically been other reasons for its slower-than-expected growth. First, many technologies are still vulnerable to spoofs and hacking. It has been far too easy for fraudsters to create a fake fingerprint and present it to a reader. Equally troublesome, older products have not been able to move users through the doors as fast as a simple ID card and reader. In general, all fingerprint capture technologies are not equal amongst older products, and there can be significant differences in performance. Developing Technology Performance Newer solutions are overcoming these security and convenience hurdles to help realise the full potential of biometrics. Their development has focused on three key areas: How fingerprint images are captured – if the image can’t be properly captured, the rest of the process fails The implementation of liveness detection to enhance trust – even in the case when the image is properly captured, if it is fake the system cannot be trusted Optimising performance through a combination of new technology and algorithms, whilst ensuring interoperability so the performance can be trusted. The skin is illuminated at different depths to deliver much richer data about the surface and sub-surface features of the fingerprint Optimising capture The quality of the captured image is critical, across all types of fingerprints and environments. Many customers choose sensors that use multispectral imaging because it collects information from inside the finger to augment available surface fingerprint data. The skin is illuminated at different depths to deliver much richer data about the surface and sub-surface features of the fingerprint The skin is illuminated at different depths to deliver much richer data about the surface and sub-surface features of the fingerprint. Additionally, the sensor collects data from the finger even if the skin has poor contact with the sensor, because of environmental conditions such as water or finger contamination. Multispectral sensors work for the broadest range of people with normal, wet, dry or damaged fingers, across the widest range of usage conditions – from lotions or grease to sunlight to wet or cold conditions. The sensors also resist damage from harsh cleaning products and contamination from dirt and sunlight. Liveness detection Liveness detection is the ability to determine that the biometric data captured by the fingerprint reader is from a real living person, not a plastic fake or other artificial copy. An increasingly visible dimension of biometric performance in commercial applications, liveness detection is critical for preserving trust in the integrity of biometrics authentication. At the same time, it must not impede performance or result in excessive false user rejections.While liveness detection optimises performance, it is also important to ensure that this performance can be trusted The most trusted multispectral imaging fingerprint sensors with liveness detection provide a real-time determination that the biometric captures are genuine and are being presented by the legitimate owner, rather than someone impersonating them. This capability leverages the image-capture approach of using different colors or spectrum of light to measure the surface and subsurface data within a fingerprint. In addition to this optical system, the biometrics sensor features several core components, including an embedded processor that analyses the raw imaging data to ensure that the sample being imaged is a genuine human finger rather than an artificial or spoof material. Advanced machine learning techniques are used so the solution can adapt and respond to new threats and spoofs as they are identified. While liveness detection and the underlying capture technology optimises performance, it is also important to ensure that this performance can be trusted. This requires adequate testing to ensure interoperability with template matching algorithms. The first requirement for incorporating biometrics into a physical access control solution is a secure trust platform Trusted performance The top-performing solutions capture usable biometric data on the first attempt for every user. They also speed the process of determining that the biometric data is not a fake, and they quickly perform template matching to reject impostors and match legitimate users.The card/mobile plus finger mode is one of the fastest-growing two-factor authentication use cases for securing access to both physical and digital places To trust this performance, though, the focus must be elsewhere: on interoperability with template-matching algorithms. Extensive interoperability testing must be performed by skilled and independent third parties like the National Institute of Standards and Technology (NIST) so that performance data can actually be trusted in all template-matching modes, and not simply a vendor claim. Template matching modes Template-on-card and card/mobile + finger modes using “1:1” template-matching profiles authenticates a person’s identity by comparing the person’s captured biometric template with one that is pre-stored in a database. Template-on-device mode for finger-only authentication using “1:N” matching compares the person’s captured biometric template against all stored biometric templates in the system). The card/mobile plus finger mode is one of the fastest-growing two-factor authentication use cases for securing access to both physical and digital places.Cryptography prevents any man-in-the-middle attacks while also protecting the biometric database As an example of how to deliver trusted performance, HID Global uses the top-ranked NIST certified MINEX III minutia algorithm to ensure interoperability with industry-standard fingerprint template databases. This interoperability ensures that today’s systems, which are based on much more powerful hardware than in the past, will perform accurate 1:N identification of a full database in less than a second. Physical access control integration The first requirement for incorporating biometrics into a physical access control solution is a secure trust platform designed to meet the concerns of accessibility and data protection in a connected environment. The platform should leverage credential technology that employs encryption and a software-based infrastructure to secure trusted identities on any form factor for physical access control, access to IT networks and beyond. Cryptography prevents any man-in-the-middle attacks while also protecting the biometric database. This system also must encompass remote management of all readers and users, spanning all onboarding as well as template loading and enrolment activities for supported authentication modes. Properly implemented, biometrics solutions with liveness detection also protect privacy – if you can’t use a fake finger, it is meaningless Other important focus areas include configuration and administration, plus all logs, reports and monitoring.New system architectures and data models have been created to protect personal information and maintain user privacy It should be possible to manage biometric readers as groups or individually over the network, and tools should be available to allow system administrators to manage all configuration settings from time and data to language, security and synchronisation. The system should enable continuous live monitoring of authentication, alerts and system health, and provide a rich set of associated reporting tools. There are also backend implementation decisions to be made, including how a biometric authentication system will be seamlessly integrated into third-party systems. This is another major pain point of biometric technology. To simplify deployment, application programming interfaces (APIs) should be available for direct integration of the biometrics authentication solution with the access control infrastructure. Privacy considerations Properly implemented, biometrics solutions with liveness detection also protect privacy – if you can’t use a fake finger, then even if you did obtain someone’s fingerprint data, it is meaningless. Strong and updatable liveness protection is critical if biometrics are to eliminate the need to use PINs or passwords.Strong and updatable liveness protection is critical if biometrics are to eliminate the need to use PINs or passwords Biometrics data must be handled like all sensitive and identifying information, and properly architected system designs will always consider and protect against both internal and external threats and attacks. New system architectures and data models have been created to protect personal information and maintain user privacy. Beyond the encryption of the data itself, there are now many good alternatives available for building highly secure and well protected systems, including the use of multi-factor and even multi-modal authentication to maintain security even if some identifying data is compromised. Today’s modern fingerprint authentication solutions are on a fast track to deliver a unique combination of ease of use, availability and convenience and higher security to physical access control systems. With their latest improvements in liveness detection, system architectures, performance and ability to be easily incorporated into access control solutions, they seamlessly combine security and convenience to make them a viable option when accessing a facility, networks and services. These solutions deliver a higher confidence of “who” is being admitted through the building’s front door, where it really matters.
The Food Standards Agency (FSA) in the UK has begun investigations into meat wholesalers after a raise in concern for food hygiene. This investigation has impacted businesses such as Wetherspoons, as well as schools and care homes up and down the country. Consumers are beginning to lose trust in businesses that are supplied by untrustworthy production companies and it seems to be becoming more common, if we are to look back to the horse meat scandal in 2013. But what are the benefits of having security systems within these types of production facilities? From ensuring consumer confidence, to maintaining quality control within products, what does it achieve? Finally, what crime exists surrounding the industry and how can the implementation of protective systems boost satisfaction? Instant barriers for unwanted people The world is becoming more advanced and revolutionary technology is allowing us to make the necessary changes to ensure ethical working practices — whether this is protecting people from a physical threat or a threat that is much more devious within our foods. Food factories should start with access control systems. This will put an instant barrier between operations and any entry attempts by unauthorised personnel. Whether this a swiped identification card, biometrics or a passcode way of entry, only authorised personnel will be granted access. Revolutionary technology is allowing us to make the necessary changes to ensure ethical working practices Another security system that could be put in place to help food factories and encourage them to work more efficiently is CCTV. By spring 2018, all slaughterhouses within England are required to have CCTV systems in place that can be reviewed by the FSA who have unprecedented access to footage within a 90-day period — is this something we should be looking to do in food factories to ensure safety for the British people? CCTV is a worthwhile investment for production companies who want to gain visibility of their entire operation and gain the respect from consumers across the country. The benefits for CCTV Customer reassurance — as food factories don’t operate openly and everything is hidden away, this instantly creates suspicion from a consumer’s perspective as they will be the ones buying the final product once distributed to stores around the country. CCTV will counter this issue as it shows that operation centres have nothing to hide — giving them the ability to publish any footage if accused of misconduct. Maintaining quality — using more advanced CCTV within food factories will enable production companies to monitor the production line and maintain the standards that they sell themselves on. Sometimes, a human error is unavoidable on a production line after several hours of non-stop work — being able to detect it instantly is essential. Criminal activity across food factories 89% of manufacturers on a global scale were impacted by fraud in 2015 — 2017 saw a 7% rise on this result. It has been proven that CCTV can deter criminals. By installing these systems, food factories can protect themselves from threats that are external and internal as well as being able to support themselves in any claims of violation. Although produced goods have been at the centre of news stories regarding the integrity and containments of what is being delivered, another common crime within this industry is fraud. 89% of manufacturers on a global scale were impacted by fraud in 2015 — 2017 saw a 7% rise on this result. Common perpetrators in fraud When it comes to the most common types of fraud, information theft stood at 30%, compliance breach at 30% and intellectual property theft standing at 26% of the respondents who were asked — all of which could cause great impacts to production lines. It was also found that those who had recently started working for the company, such as junior employees, were the most common preparators when it came to fraud within a manufacturing factory (39%). Temporary manufacturing workers came in at second place with 37%, while those in senior or middle management positions were at 33% — the same as ex-staff members. However, vendors/suppliers who do not have as much access to your business accounted for 33% too. This clarifies that anyone has the potential to commit a crime within a factory. To ensure protection for the British consumer, food production factories should seriously consider implementing similar systems to UK slaughterhouses. This article was contributed by IP security provider 2020Vision.
All schools and universities need to address three different levels of security when considering access control. The first level is the least vulnerable of the three and concerns the perimeter entry and exit points. Here, incorporating some level of electronic access control should be a consideration, whether that is a combination of electronic and mechanical door hardware, or a complete electronic solution. An electromechanical solution, such as electric strikes, can be beneficial in the effectiveness of perimeter security as they provide greater visitor management and traffic control. Data capture form to appear here! Facilitating visitor entry Electric strikes are able to control access via keypads, cards and proximity readers Electric strikes are able to control access via keypads, cards and proximity readers. When combined with mechanical locks, they provide the benefits of unrestricted egress. The second level is more vulnerable than the first and relates to the point at which people are screened before entering the interior of the school. As this area will be designed primarily to facilitate visitor entry, it will require adequate monitoring of access control. To do this, the latches used on access-controlled egress doors can be electronically controlled from the reception area or school office. Exit or entry doors can be opened by a push from the inside and, if the entry area is also an emergency exit, electronically-powered panic bars can also provide an effective solution. More and more schools are installing visitor management systems to control who can and cannot get into the building. Access control solutions Finally, the third level – and the most vulnerable – refers to the core of the school that both students and staff occupy. These are internal hallways, corridors, stairwells, entry points and restricted areas (such as staff lounges and science laboratories). These are the areas where a school must foster the safest environments for pupils, while also providing protection as they often contain confidential information, expensive equipment or chemicals. The access control system is linked to all doors within the school building A number of different access control solutions are beneficial, whether electronic, mechanical or a combination of the two. For electronic solutions, there are two options available: remote or centralised systems. With remote lockdown systems, individual locks are activated by remote control within proximity to the door. With integrated centralised systems, the access control system is linked to all doors within the school building and locked at the touch of a button. Prevent unauthorised persons Mechanical solutions, which include a cylinder lock and key, are also suitable for places such as classrooms, as doors can be locked externally with a key or internally with a thumbturn, to prevent unauthorised persons from entering. At one university in the United States, a smart RFID wire-free access control solution has been installed At one university in the United States, a smart RFID wire-free access control solution has been installed. The SALTO Virtual Network (SVN) wire-free system pushes and pulls data from the university’s ‘hot spot’ entry points to all their offline locks. By choosing a wire-free solution, the university only had to run wires to their exterior doors. The interior doors do not require wiring as these locks are stand-alone wire-free locks. Student accommodation block Securing access to student accommodates is another concern among colleges. One university in the United Kingdom wanted a security system to protect their student accommodation; in particular, a keyless system that would grant 24/7 access to its students while also enabling campus security to monitor these activities remotely. They chose Vanderbilt’s ACT365, which keeps audit trails by monitoring and recording fob activity. When another English university sought electronic locks for its newest student accommodation block, it turned to Aperio wireless locking technology from ASSA ABLOY. They used the wireless locks to extend the Gallagher Command Centre access control system to a student residence with 231 en suite rooms separated into flats for between 8 and 13 postgraduates. Aperio wireless locks are battery-powered and use less energy than wired magnetic security locks.
The mindset behind a new law to prohibit the use of facial recognition and other security-related technologies by San Francisco police and other city agencies is obvious in the name of the new ordinance: “Stop Secret Surveillance.” Ordinance to stop secret surveillance The San Francisco Board of Supervisors passed the ordinance 8-1 with two abstentions on May 14, and there will be another vote next week before it becomes law. We have an outsize responsibility to regulate the excesses of technology precisely because they are headquartered here" The irony of such a law emanating from northern California, where tech giants promote the use of numerous technologies that arguably infringe on privacy, is not lost on Aaron Peskin, the city supervisor who sponsored the bill. “We have an outsize responsibility to regulate the excesses of technology precisely because they are headquartered here,” he told the New York Times. Regulating facial recognition technology Although the facial recognition aspects of the ordinance have been the most publicised, it also targets a long list of other products and systems. According to the ordinance, "Surveillance Technology" means “any software, electronic device, system utilising an electronic device, or similar device used, designed, or primarily intended to collect, retain, process, or share audio, electronic, visual, location, thermal, biometric, olfactory or similar information specifically associated with, or capable of being associated with, any individual or group.” Broadly interpreted, that’s a lot of devices. Includes biometrics, RFID scanners The ordinance lists some examples such as automatic license plate readers, gunshot detection hardware and services, video and audio monitoring and/or recording equipment, mobile DNA capture technology, radio-frequency ID (RFID) scanners, and biometric software or technology including facial, voice, iris, and gait-recognition software and databases. Among the exceptions listed in the ordinance are physical access control systems, employee identification management systems, and other physical control systems; and police interview rooms, holding cells, and internal security audio/video recording systems. The ordinance ban applies to city departments and agencies, not to the general public and exceptions include physical access control systems, employee identification management systems, and internal security audio/video recording systems Airport security not part of ordinance The ban only applies to city departments and agencies, not to private businesses or the general public. Therefore, San Franciscans can continue to use facial recognition technology every day when they unlock their smart phones. And technologies such as facial recognition currently used at the San Francisco airport and ports are not impacted because they are under federal jurisdiction. Furthermore, the San Francisco police department does not currently use facial recognition anyway, although it has been deployed in places such as Las Vegas, Orlando, Boston and New York City. Safeguarding privacy of citizens The ordinance appears to have a goal of avoiding government uses of technologies that can invade individual privacy, seeking to avoid worst-case scenarios such as an existing system in China that uses millions of surveillance cameras to keep close tabs on the Uyghurs, a Muslim minority population. Any new plans to use surveillance technology must be approved by the city government, and any existing uses must be reported and justified by submitting a Surveillance Technology Policy ordinance for approval by the Board of Supervisors within 180 days. Surveillance technology policy Banning use of facial recognition just when its capability is being realised is counterproductive But might such a ban on technology uses undermine their potential value as crime-fighting tools just when they are poised to become more valuable than ever? Ed Davis, a former Boston police commissioner, told the New York Times it is “premature to be banning things.” He notes: “This technology is still developing, and as it improves, this could be the answer to a lot of problems we have about securing our communities.” Technology development doesn’t happen in a vacuum and banning uses of facial recognition and other technologies just when their capabilities are being realised is counterproductive. We should be thoughtful, deliberate and transparent in how we embrace new technologies. However, discarding them out-of-hand using emotionally charged words such as “secret surveillance” does not promote the best use of technology to the benefit of everyone.
The Global Security Exchange (GSX) seems smaller this year, which is not surprising given the absence on the show floor of several big companies such as Hikvision and ASSA ABLOY (although their subsidiary HID Global has a big booth). A trend affecting the number of companies exhibiting at GSX 2018, and other trade shows, is industry consolidation, which is impacting the show even beyond the fewer exhibitors this year in Las Vegas. GSX is the new branding for the trade show formerly known as ASIS. There was an impressive crowd of visitors waiting for the show floor to open Tuesday morning; the conference part of the program began on Monday. After the attendees filed through the doors, the foot traffic seemed brisk throughout the morning, and was somewhat steady until the end of the first day. Exhibitors as a whole seemed pleased with the first day and cautiously optimistic about the rest of the show. Acquisitions and consolidation HID Global announced on the first day that they will acquire Crossmatch - emphasising the impact of consolidation Emphasising the impact of consolidation on the industry as a whole, and on this show, was an announcement from HID Global on the first day that they will acquire Crossmatch, a biometric identify management and secure authentication solutions provider. It’s a comparatively large acquisition for the company specialising in trusted identity solutions. Just days earlier, another acquisition also seemed to confirm the trend when UTC Climate, Controls and Security — the owner of Lenel — announced an agreement to acquire S2 Security. The fruits of another recent acquisition was on display at the GSX 2018 hall, where Isonas took its place near the front entrance as part of the Allegion booth, just three months after the global security provider acquired the ‘pure IP access control company.’ Isonas is well positioned in two of the three fastest growing segments of the access control market — IP hardware, which is growing 41 percent per year globally, and access control as a service, or ‘cloud’ technology, which is also outpacing the overall access control market. Allegion also has the third fast-growing segment, wireless locks, covered with its Schlage brand. "New avenues of growth" The early days of new ownership is opening fresh opportunities for both organisations as Allegion seeks to leverage Isonas’ intellectual property and the smaller company finds new avenues of growth in the larger organisation, says Rob Lydic, Isonas Global Vice President of Sales. Motorola joined Avigilon in a higher profile role at their booth, emphasizing consolidation in the industry Lydic sees a likelihood of additional acquisitions in the near future in the security space, given the large amount of capital currently available to be deployed, and the large number of entrepreneurial companies looking to make the leap, as Isonas did, from a small booth at the back of the hall to front-and-center as part of a big industry player. Another reflection of consolidation: Motorola Solutions is taking a much higher-profile role in the Avigilon booth. In addition to signage, ownership by Motorola is also impacting the Avigilon product offerings. For example, the Motorola Ally security incident management and communications system has been integrated with Avigilon’s analytics-based event detection, and is being positioned to serve the enterprise market. The system simplifies security operations with a single platform that allows access to critical data, including video and access control systems, directly from any web-enabled device. Another reflection of consolidation: Motorola Solutions is taking a much higher-profile role in the Avigilon booth Avigilon is displaying Motorola Solutions’ CommandCenter Aware integrated with Avigilon’s systems for use with public safety applications to provide dispatchers and intelligence analysts with video feeds, incident details, alerts, data mapping and responder location. Avigilon has also integrated its AI-driven Appearance Search technology with its Access Control Manager system, so video searches can be performed based on a badge credential. The system can automatically pull up any information, whether video or events in the access control system, based on the badge information. It can also be used to search for lost badges, or to view where a person is located in the building. Avigilon introduced an AI appliance that allows existing cameras to be integrated with Appearance Search The company introduced an AI appliance that allows existing (non-Avigilon) cameras (up to 20 two-megapixel cameras) to be integrated with Appearance Search. Also, the next generation of analytics allows detection of more things, such objects a person may be holding, or detection based on what they are wearing. The growth of the cannabis market Although attendees at GSX are generally understood to be more end users than integrators, Joe Grillo, CEO of ACRE, the parent company of Vanderbilt Industries and ComNet, says he sees little difference in attendees at GSX compared to the ISC West show in the spring. “We see all our resellers here,” he says. Grillo noticed that Day One booth traffic was “not consistently busy, but steady.” Grillo says ACRE expects to be active again soon in the mergers and acquisitions market. The company has grown through six acquisitions since its founding, and has had one divestiture (when it sold Mercury Security to HID last fall). Since selling Mercury, ACRE has been ‘back in the buying mode,’ just looking for the right opportunity, says Grillo. New markets are a theme at GSX, and one of the biggest new opportunities is the cannabis industry. Marijuana has been legalised in dozens of U.S. states, and Canada is on the verge of legalising the drug. March Networks works with multiple cannabis operators to provide video solutions, point-of-sale transaction data, and customer analytics March Networks is among the companies targeting the cannabis industry in a big way. Already across the U.S., March Networks works with multiple cannabis operators to provide video solutions, point-of-sale transaction data, and customer analytics. The business intelligence solutions also aid compliance in the highly-regulated industry. March Networks provides radio frequency identification (RFID) tag to track plants throughout the channel, and tracking is integrated with video systems to provide correlated video views. A couple of exhibitors mentioned to me the need for commercial companies to deploy a comparable level of automation as their employees are accustomed to in the smart home environment. That suggests a need for things such as smartphone integration and voice commands. One exhibitor putting its toe in the water is Hanwha Techwin, which showed an Amazon Echo device used to control a video management system (VMS) with voice commands. Could the simple integration be a preview of the future of control rooms, where security officers merely talk to their equipment rather than operating controls? We’ll be talking to more companies (and maybe a few machines) on Day Two of the show, and will be reporting what we hear.
The Tata Institute of Social Sciences (TISS) was established in 1936, as the Sir Dorabji Tata Graduate School of Social Work in Mumbai. It is the first graduate school of social work in India. It has subsequently influenced the direction of social work, education and social research in India. Later in 1944, it was renamed as the Tata Institute of Social Sciences. Managing time-attendance Tata Institute of Social Sciences wanted to manage time-attendance of more than 2,000 students and 300 employees at their Mumbai location. Initially, they were using traditional methods for attendance marking. As a result, they were facing many problems in maintaining records for the same. Hence, they required an efficient system for maintaining and recording accurate attendance data of students and staff. They needed biometric hardware solution with battery backup along with software compatibility. They wanted a solution that would mark in punch and out punch of students in every lecture and an automated system that would send data to the server. Additionally, TISS also wanted a solution, which can be integrated with third party payroll system for timely salary payment of their staff. Fingerprint plus RFID card based terminals Matrix has installed 54 fingerprint plus RFID Card based terminals with battery backup at the Mumbai campusAfter having a detailed discussion with the TISS team, Matrix offered a comprehensive Time-Attendance solution for students and staff members. Matrix has installed 54 fingerprint plus RFID Card based terminals with battery backup (COSEC VEGA BBU) at the Mumbai campus. All these devices are connected via LAN with the COSEC CENTRA server installed at TISS, Mumbai. HR/Admin can track attendance of all the employees and generate different reports for timely salary payment. Similarly, all the faculty members can generate monthly and semester-wise attendance reports of the students. Results after the installation Efficient Time-Attendance Management Fraudulent Time Keeping Eliminated Accurate Time-Attendance Data of Students SMS Notification to Parents Timely and Accurate Salary of Employees Increased Productivity Customised Reports as per Requirement Products installed at TISS COSEC VEGA FAX - Optical Fingerprint and Card based Time-Attendance Terminal COSEC VEGA BBU - Battery Backup for VEGA Series Door Controller COSEC LE CENTRA – Application Server for 1000 Users COSEC LE TAM - Time-Attendance and Leave Management Module
Village Roadshow Theme Parks (VRTP), Australia’s largest theme park operator, provides some of the most thrilling entertainment rides and slides available anywhere in the world. With its headquarters located on the Gold Coast, Australia’s holiday playground, it operates: Warner Bros. Movie World Wet ‘n’ Wild Water World Australian Outback Spectacular Sea World Paradise Country Sea World Resort and Water Park Over 5 million visitors per year, from families to thrill seekers, flock to this world of fun with action-packed shows and rides, marine and animal attractions, and adventure across seven large scale properties. Monitoring from Command Centre This enables monitoring from the Command Centre in the Gold Coast over all seven sites streamlining operationsWhen it comes to security, VRTP have always chosen access control and perimeter solutions supplier Gallagher as their long-term partner. A relationship that began in the mid-1980s, has grown to meet the expanding demands of each park. VRTP recently opened a new Wet ‘n’ Wild in Sydney, New South Wales, in December 2013. Two new parks based on Sea World and Wet ‘n’ Wild are currently under construction in Hainan, China. Wet ‘n’ Wild Sydney, opened to the public in December 2013, demonstrates Gallagher’s ability to extend security coverage across States, with its scalable and flexible solution. This enables monitoring from the main Command Centre in the Gold Coast over all seven sites streamlining operations. In the event of power loss from the main controller in the Gold Coast, Sydney sites have their own server backups to continue operations as normal. RFID wrists bands for staff access The model that VRTP and Gallagher have designed enables various operator levels to have separate divisions for creating cardholders. Different operator levels have authorised access to develop card holders for their sections. There are approximately 3,000 cardholders at all parks and growing. Wet ‘n’ Wild Sydney is the first Village Roadshow park to deploy staff RFID wrists bands that give them access to areas restricted by the public. Command Centre technology has given VRTP total site security across all parks VRTP’s guard workforce has been complimented by the Gallagher system working seamlessly together. Command Centre technology has also given VRTP total site security across all parks; within a year saving park operations approximately 20 hours a day in labour costs. Better visibility of services Gallagher delivers building automation and control through a high-level interface that provides strong communication between Gallagher Command Centre and the theme parks’ building systems. This has enabled integration to seven main panels and sub panels across the group giving security staff better visibility of all services, at all times. Efficiencies in alarm generation have improved with automatic escalation to the necessary staff member in a timely manner. Key industry challenges Health, safety, risk mitigation, and public relations Preserving assets and ambience Using integration to save costs and improve security efficiencies Gallagher technology used Gallagher Command Centre Gallagher T-Series Access Control Readers Gallagher high level video integration – more than 250 cameras Protection of marine animals Gallagher’s integrated security solution provides continuous surveillance across the parkAnimal safety and care is critical. Sea World is Australia’s premier marine park, with over 25 hectares (55 acres) of land. With a range of dolphins, seals, sharks, polar bears, and other marine life – their safety, and the reputation of Sea World, must be preserved. This also includes protecting Australian Outback Spectacular and Paradise Country animals and wildlife. Alongside video and alarm integration, Gallagher manages all primary entry points into parks. Once inside the parks, it manages restricted zones which include secured enclosures, particularly important for Sea World. Gallagher’s integrated security solution provides continuous surveillance across the parks, capturing any incidents which may occur on site. This is particularly important for Wet ‘n’ Wild water park which faces increased risk due to the nature of the environment. Wet ‘n’ Wild has been one of the group’s most successful theme parks with a growing attendance of approximately 1 million visitors every year. Investing in robust integrated system The VRTP security team has the ability to monitor and control from one locationVRTP are continually looking for ways to improve park operations, infrastructure, and processes to meet the needs of visitors and staff. With security taking a precedence in the last five years, VRTP made the decision to invest in a robust integrated system that to the public eye would go unseen. Gallagher’s strong history of service and the scope of their integrated security solutions gave VRTP confidence in selecting Gallagher for their upcoming internal infrastructure developments. With 250 cameras located discretely around all seven of VRTP’s properties, integrated back to the central control platform Gallagher Command Centre, the VRTP security team has the ability to monitor and control from one location. Intruder alarm management solution The integrated system plays an important role in securing the site overnight from would-be intrudersIn the Village Roadshow Studios, much importance is placed on securing assets, and protecting the privacy of high-profile guests. The Studios have attracted projects with a combined budget of around 2.5 billion dollars. There are eight large sound stages covering 10,844m2 (116,727 sq. ft), confirming it as one of the largest studios in the Southern Hemisphere. With intellectual property and assets that must be protected, the Gallagher 24-hour camera integration and intruder alarm management solution play a key role in protecting staff, visitors, and monitoring employee cash handling and service. The integrated system also plays an important role in securing the site overnight from would-be intruders. Duress alarm monitoring is a central integration used by security staff with 70 alarm zones across all parks. In the event of an emergency, a wireless help-call system can identify back to the Command Centre the name, description, and location via a detailed site plan for each park. This is a vital security element for protecting captive mammals and animals, and IT infrastructure.
The first forensic science-based crime prevention system in New York State was installed at luxury Swiss watch manufacturer, Richard Mille. It is the fourth system to be deployed in the United States. The technology, the Intruder Spray System from SelectaDNA, utilises forensic science to reduce burglary, robbery and high-value theft by a documented range of 40 to 86 percent. The cutting-edge technology was installed at the world-renowned watch brand’s architecturally stunning flagship boutique, located on ‘Billionaire’s Row’ on 57th Street in Manhattan. Irrefutably identify criminals The forensic technology is synthetically manufactured in an accredited ISO 17025 laboratory The system uses the power of forensic marking science to considerably deter crime and, if a crime is committed, enhances law enforcement ability to irrefutably identify criminals, then apprehend and prosecute them. The technology has been used for more than ten years in 46 countries on five continents. It is now available and beginning to be deployed in the United States. The forensic technology is synthetically manufactured in an accredited ISO 17025 laboratory. It is scientifically structured, and functions, the same as organic DNA – but is more durable. Each unit of the forensic solution contains a universally unique code (sequence), which is never replicated; thus; providing an exclusive identifying marker for each client. Each unique forensic code provides an uncontestable link between a criminal, or stolen item, to a specific crime scene and the rightful owners. Remote video monitoring The system – comprised of a control box, spray head and PIR – is easily integrated with other security systems such as burglary, access control, intrusion, video, and many others. Installations take approximately four hours. The system can also be installed as a standalone crime-fighting solution. There are various modalities of system activation, including but not limited to panic buttons, money clips, remote video monitoring via Milestone Systems, RFID and facial recognition technology. When the system is activated, the invisible, non-toxic and water-based forensic solution remains on marked criminals’ skin for four to six weeks, and clothing for two to three months. The solution is only visible via a special frequency UV light, leaving criminals exposed to identification and apprehension well after leaving the crime scene. Crime-fighting technology SelectaDNAs forensic marking technology is a well-documented tool to prevent and deter a large percentage of crime" “We’re pleased to provide Richard Mille with a proven crime-fighting technology to further enhance its already impressive security measures,” said Henrik Olsen, CEO of CSI Protect, the exclusive provider of SelectaDNA technology in the United States. “SelectaDNAs forensic marking technology is a well-documented tool to prevent and deter a large percentage of crime across the globe and now in the United States.” Many Fortune 500 and iconic, well-known companies have used SelectaDNA technology, including, Tag Heuer, LVMH, Chanel, Pandora, Watchfinder & Co., 7-Eleven, Circle K, G4S, Securitas, GlaxoSmithKline, Lloyds Bank, The Royal Bank of Scotland (RBS), Bank of New Zealand, McDonald’s, KFC, Balfour Beatty, Shell, Texaco, Raptis Rare Books and thousands of others. Offender marking solutions The co-founder of Milestone Systems, Henrik Friborg Jacobsen, is a major proponent of the technology and anticipates major growth of its use in the United States. Friborg Jacobsen is also an investor in, and chief advisor to, CSI Protect. SelectaDNA is a pioneer in forensic marking offering a full range of property, infrastructure and offender marking solutions, using a completely secure and unique forensic technology. SelectaDNA, which is water-based, non-toxic and non-flammable, is proven to reduce crime (especially robbery, burglary and high-value theft) by up to 86%. SelectaDNA not only reduces crime, but also enables law enforcement to link criminals to crime scenes and secure convictions.
CoreRFID supplies the UK's largest outsourcing company Serco with 100,000 RFID access cards for its Caledonian Sleeper railway service. The cards will provide passengers with access to rooms and will improve security on routes between London and Scotland. The cards are completely re-usable and replace paper-based RFID tickets, which were judged to not be as cost effective in the long-term. Specialist locks Serco had specialist locks provided by a Spanish company and needed cards which were compatible" Munzi Ali, technical director of CoreRFID comments: “Our knowledge and experience on similar work in the hotel industry helped us to meet the challenges of this project. Serco had specialist locks provided by a Spanish company and needed cards which were compatible. Consultancy is a big part of the larger projects we undertake and we were able to solve the issue with Serco.” The Caledonian Sleeper service, which is operated by Serco as a standalone franchise, can trace its origins back to 1873. It serves a number of destinations in Scotland - including Inverness, Aberdeen, Fort William, Glasgow and Edinburgh - on route to and from Euston Station. RFID solutions Graham Kelly, guest experience director at Serco Caledonian Sleeper, said: "Our new trains are designed to improve every aspect of the guest experience. We strive to deliver a hotel experience and a major part of that is having keycard entry for rooms. We've only been running our new trains for a few weeks but the feedback from guests on the keycard has been excellent, with CoreRFID's solution proving extremely effective." Ali added: “RFID solutions can provide real benefits in efficiency, costs and in this case significantly cutting down on waste.” CoreRFID's clients include ICL, London Underground and Thomas Cook.
Responsible for the safety and security of a huge number of public facilities, including leisure centres, libraries and event spaces, local authorities are increasingly looking for ways to improve security, while also streamlining the security management process. With multiple requirements from a legislative, insurance and public safety perspective, local authorities need a simple and effective solution that provides flexibility through advanced technology. Security must be closely monitored and access restricted where necessary, while at the same time enabling easy access to public areas. Electronic key technology Advanced software suites can provide access to all operations performed by users Through innovative electronic key technology, local authorities can simply and cost-effectively replace existing mechanical locks, with a solution that provides integrated intelligence in the key, with permissions stored within it. If your key has authorisation for that lock, it will open. If you don’t, you won’t be allowed to enter and all of the activity carried out by your key will be recorded. With high volumes of people entering and exiting local authority facilities, it is important to be able to trace who has been where, when and for how long. Advanced software suites can provide access to all operations performed by users, including a complete audit trail. This information is often used by local authorities for audits, improvements or compliance. Utilising the latest contactless technology further enhances the electronic key solution, enabling multiple access options and deeper levels of access rights. Manage access operations The most innovative system is compatible with badges and cards, and the keys are equipped with a radio-frequency identification (RFID) module. Combining the solutions enables local authorities to manage access operations in great detail, with access rights granted depending on specific conditions. For example, the members of an orchestra may only be able to access the music conservatory, using their membership card or badge, if a music professor has already entered the premises using his electronic key. Permissions can be added or updated from a computer or, even more conveniently, using an app on a smartphone at any time, which will update your key's permissions via Bluetooth. This allows shortened validity periods, constrains movements to be in line with local authority access policies and removes travel and fixed authoriser costs. Public safety and security Saint-Avertin's access points are now managed by the new LOCKEN solution In turn, this delivers increased flexibility and higher levels of security. With public safety and security high on the government’s agenda, local authorities are increasingly required to adopt the most technologically advanced access control solutions and LOCKEN, the leader in cable free access control solutions is on hand to help with their solution based on advanced software LOCKEN Smart Access. Equipped with LOCKEN electronic cylinders since 2010, Saint-Avertin's access points are now managed by the new LOCKEN solution. More efficient and communicative, this makes it possible to adapt to even more varied types of access. Laurent Lacour, head of the municipal police, highlighted the benefits of this decision: “It is a very positive step for us. Firstly, because the new contactless key is much faster than the previous one. It is impressive and very important for our day-to-day work: as soon as the key is entered into the lock, the cylinder opens. It opens regardless of whether any dust or foreign bodies have built up." New-generation keys “Above all, the MyLocken app significantly enhances the system’s security by allowing rights to be allocated anywhere and at any time.” Christophe Fort, deputy head of the police, added: “The new-generation keys offer another vital advantage for our town. The system is compatible with the use of badges and the keys are equipped with an RFID module, which acts as a badge.” While an electronic key cannot be given to every member of a sports association, it is possible to give the members a badge. This means that, eventually, several thousand people will have access to the facilities while respecting the security of the premises as a whole. Access control solution Combining the solutions does not stop the management system from remaining perfectly effective" “Combining the solutions does not stop the management system from remaining perfectly effective. On the one hand, because the program manages access operations in great detail. And on the other, the badge reader specific to a building is only triggered if access to the site has previously been unlocked by an electronic key belonging to a manager. For example, the members of a swimming association will only be able to access the building if a swimming pool manager is already on the premises.” The future prospects mentioned by the two police officials - installation in a new gymnasium, fitting electronic padlocks to the mobile barriers around the château, etc.- demonstrate the extent to which the solution meets the municipality's needs across the board. Saint-Avertin, is a dynamic town with a population of 15,000, which forms part of the university town of Tours, twenty times larger. LOCKEN hopes to extend its access control solution to other areas of this historic city.
IndiaNivesh is one of the leading financial services conglomerate in India. IndiaNivesh is into various aspects of investment banking and consulting business. It plans to emerge as a dynamic, customer-centric, and progressive financial group in the country with PAN India presence. Having its head office in Mumbai, IndiaNivesh is growing with eight regional offices and 29 branch offices across India. Project specifics Application: Time-Attendance and Access Control Locations: 32 (PAN India) Users: 500 Units Installed: 60 Readers: Fingerprint and RFID Card IndiaNivesh being widely involved in financial services business with 29 branch offices and 8 regional offices across India, required eradication of forged attendance data and manual attendance process, as security is a crucial aspect for them. To streamline and manage attendance data of all employees accurately and perform calculation of error-free salary has been a tedious task. It has been challenging to integrate their existing payroll software with the time-attendance software. COSEC time-attendance solution Matrix offered COSEC time-attendance solution helped in connecting all its regional and branch offices to their head office in Mumbai Matrix offered COSEC time-attendance solution which has web-based architecture and helped in connecting all its regional and branch offices to their head office in Mumbai. Implemented automatic salary calculation as Matrix COSEC time-attendance software got easily integrated with existing payroll software. Result Real-time attendance of all employees at a centralised location Integration with its existing payroll software Ease of Implementation using the existing infrastructure Fraudulent timekeeping is completely eliminated Accurate In/Out time of each employee recorded Live monitoring of In/Out timing Generation of time-attendance and access control reports and charts for all branches Improved overall productivity of the organisation Continuous operations with excellent service support Biometric access control solutions COSEC DOOR FOP - Optical fingerprint-based door controller for access control and time-attendance COSEC DOOR CAS – Card-based door controller for access control and time-attendance COSEC PANEL - Site controller to manage multiple door controllers and advanced access control Features COSEC LE PLATFORM - Application server platform for 1000 users and expandable up to one million users COSEC LE TAM - Comprehensive time-attendance and leave management module for COSEC LE platform COSEC LE ACM - Comprehensive access control module for COSEC LE platform
Round table discussion
The ability to treat patients in a secure environment is a base requirement of hospitals and other healthcare facilities. Whether facilities are large or small, security challenges abound, including perimeter security, access control of sensitive areas, video surveillance, and even a long list of cyber-risks. We asked this week’s Expert Panel Roundtable: What are the security challenges of hospitals and the healthcare industry?
Using a smart phone as an access control credential is an idea whose time has come – or has it? The flexible uses of smart phones are transforming our lives in multiple ways, and the devices are replacing everything from our alarm clocks to our wallets to our televisions. However, the transformation from using a card to using a mobile credential for access control is far from a no-brainer for many organisations, which obstacles to a fast or easy transition. We asked this week’s Expert Panel Roundtable: When will mobile credentials dominate access control, and what are the obstacles to greater adoption?
Hospitality businesses work to provide a safe and pleasant customer experience for their guests. Hotels offer a “home away from home” for millions of guests every day around the world. These are businesses of many sizes and types, providing services ranging from luxury accommodations to simple lodging for business travelers to family vacation experiences. Hospitality businesses also include restaurants, bars, movie theaters and other venues. Security needs are varied and require technologies that span a wide spectrum. We asked this week’s Expert Panel Roundtable: What are the security challenges of the hospitality market?