RFID technology is nowadays considered to be almost pervasive. Thanks to this technology, objects or even living things can be identified and localised without contact. In order to meet the increasing demand for RFID hardware components, GERA-IDENT has now significantly renewed and expanded its production. Ramin Hassan, Managing Director of GERA-IDENT GmbH stated that "Demand for the construction of customer-specific ID points and their basic components such as RFID readers and antennas has inc...
TE Connectivity Ltd., a global industrial technology company with leading positions in connectivity and sensing solutions, completed its public takeover of First Sensor AG. TE now holds 71.87% shares of First Sensor. Sensor technology First Sensor, founded as a technology start-up company in the early 1990s, is a globally renowned firm in the scope of sensor technology and sensing solutions. With its expertise in chip design and production, as well as microelectronic packaging, First Sensor de...
From buildings to vehicle fleets and enterprise networks to perimeter gates, having access control to let the right people in—while keeping everyone else out—is a security necessity. ELATEC, a global specialist in radio frequency identification (RFID) readers enabling user authentication for these and other access control applications, will introduce its latest new product the TWN4 Palon Compact Panel Reader at the ISC West Conference and Exhibition, to be held March 17-20, 2020 in...
Pedestal PRO, a world renowned manufacturer for access control pedestals, in cooperation with 2N, an Axis company, has introduced a line of purpose-built pedestal solutions designed for use with the 2N IP Verso security intercom system. Integrators and 2N customers can choose from a selection of pedestal and housing options that provide the most elegant presentation of their 2N IP Verso units in settings that preclude wall-mounting. Pedestals are available in various heights and colours and may...
As security requirements expand to smaller buildings and lobbies, architects and specifiers are looking for compact optical turnstiles that provide a high level of security in the limited space available. With this problem in mind, Alvarado has introduced its most compact barrier optical turnstile to date, the SU4500. Designed for high-end facilities where space is at a premium, the new SU4500 has a compact 38” cabinet length but doesn’t compromise on security, throughput performanc...
Checkpoint Systems has unveiled a host of new, pioneering solutions at EuroShop 2020 that demonstrate how technology can help brands navigate the evolving retail landscape. The only fully vertically integrated solutions provider, Checkpoint, has developed an extensive understanding of the complex challenges presented by the retail digital transformation. And, its collaboration with leading retailers, such as LPP and Desigual, demonstrates how it is building an agile, responsive in-store environ...
Matrix COSEC Time-Attendance Solution promotes a smart and productive workplace. It is a one-stop solution for managing and controlling the attendance data. Time-attendance solution The Time-Attendance Solution is designed to meet the diverse requirements of any organisation by offering a superlative range of flexibility in attendance policies, configuration, integration and report generation. Additionally, it offers features like automatic calculation of overtime and much more! Key Features of the Matrix COSEC Time-Attendance Solution include: Multiple Credentials - Mobile, Biometric, RFID Cards Real-time Monitoring Comprehensive Reports Real-time Alerts and Notifications Seamless Integration with Payroll, ERP or HRM Software Security and Telecom solutions expert Established in 1991, Matrix is a globally renowned company in the field of Security and Telecom solutions for modern businesses and enterprises. As an innovative, technology driven and customer focused organisation, the company is committed to keep pace with the revolutions in the Security and Telecom industries. With around 40% of its human resources dedicated to the development of new products, Matrix has launched cutting-edge products like Video Surveillance Systems - Video Management System, Network Video Recorder and IP Camera, Access Control and Time-Attendance Systems as well as Telecom Solutions such as Unified Communications, IP-PBX, Universal Gateways, VoIP and GSM Gateways and Communication Endpoints.
Mountain Warehouse, a major UK outdoor apparel and equipment retailer, has selected !D Cloud, Nedap’s inventory management solution for a global deployment to 400 stores. The deployment started in January 2020 in the United Kingdom, continuing with Europe, North America and New Zealand with the main objective being to improve inventory accuracy, leading to better product availability. Strategic roadmap around RFID Mountain Warehouse has been growing year on year for two decades now. To continue this success, it’s vital that the retailer continues to be agile and move with customer behaviour. Aligning bricks and mortar with the digital experience of using RFID is an essential ingredient to maintain this growth. “We have been very successful over the past 22 years at Mountain Warehouse. To build on this growth, we made the decision in 2019 to RFID source tag our inventory. As a result of this, we will benefit hugely from having full inventory visibility. Knowing what is in stock allows us to provide better product availability, improving our customer proposition, whilst increasing sales,” comments Jamie Morgado, Head of Retail Operations at Mountain Warehouse. Eliminating a high level of investment with Virtual Shielding We feel that Nedap’s approach to RFID, fits in very well with our objectives and culture at Mountain Warehouse" Mountain Warehouse ran a previous project looking into the benefits of RFID. The improvement in accuracy, although with a different supplier, supported the business case which in turn started the Request for Proposal process. “We were looking for an experienced supplier with a platform that was simple to integrate to, could scale internationally with ease, and was lightweight to setup from an IT perspective. We also wanted an application that is easy and fun for our store staff to use. We feel that Nedap’s experience in the market and approach to RFID, fits in very well with our objectives and culture at Mountain Warehouse, not only now, but where we want to be in the future too”, comments Alexandria Smuts, Head of IT Delivery at Mountain Warehouse. Maximising on-shelf availability In addition to experience and references, not having to invest in shielding materials was an important driver for Mountain Warehouse when selecting !D Cloud. Alexandria Smuts says, “One key aspect in choosing Nedap was their Virtual Shielding solution, which will help stores with their shop floor replenishment process, maximising on-shelf availability. Virtual Shielding removes the requirement to physically shield stock rooms with RFID blocking paint or foil, which facilitated a lower level of investment for roll out.” “It is an absolute pleasure to welcome Mountain Warehouse to our !D Cloud community”, comments Nick Markwell, Business Lead !D Cloud UK at Nedap. “We share the same philosophy that inventory accuracy is the fundamental building block to enabling product availability. This will open more doors for future growth, opening up omni-channel initiatives, and ultimately providing their customers with better choice. We are looking forward to helping Mountain Warehouse deploy RFID globally, and supporting them to develop their RFID roadmap, so that they can continue to build on their very strong 22 years of trading.”
Secutech Vietnam, the region’s trade fair for connected IoT-based security, fire safety and smart building solutions will return to the Saigon Convention and Exhibition Centre for its 13th edition from 20 - 22 August 2020. Following record high participation at its 2019 edition, and amidst buoyant market conditions, the fair is expected to attract 400 exhibitors and 15,000 trade buyers from across the ASEAN region. The impressive rise of Secutech Vietnam over the past ten years has coincided with consistent growth in the market for safety and security solutions, and according to fair organiser Messe Frankfurt New Era Business Media Ltd, there has never been a more opportune moment to enter the marketplace. Regardless of whether it’s the security, fire safety or smart building sector, business prospects continue to emerge, and integrated solutions have become a major driving force for business. Video surveillance market The economy grew at 7% in 2019 and the FDI environment remains extremely welcoming" Ms Regina Tsai, the General Manager of Messe Frankfurt New Era Business Media Ltd, says that Secutech Vietnam is the perfect platform for foreign players to gain a foothold in the market, “Continued support from government departments and key industry associations ensures that relevant buyers from both the public and private sectors visit Secutech Vietnam. What’s more, the fair’s wide coverage across multiple industries including construction, industry, retail and hospitality will attract system integrators, distributors and related trade buyers from both the north and the south of the country.” Ms Tsai added, “Vietnam’s fundamentals make the country a highly attractive proposition. The economy grew at 7% in 2019 and the FDI environment remains extremely welcoming.” Expected to grow at a CAGR of 12.4% until 2022, the video surveillance market is particularly promising, representing one of the fastest growing surveillance markets in South East Asia. Industrial Internet of things (IIoT) Furthermore, thanks to strong government support of Industry 4.0 initiatives, significant opportunities are arising in Vietnam’s smart factory sector, a field in which the Industrial Internet of things (IIoT) is having far reaching implications for automation, predictive maintenance, logistics and supply chain management. In fact, according to Vietnam’s Central Institute for Economic Management, Industry 4.0 solutions have the potential to raise Vietnam’s GDP by between 7 - 16% from 2019 to 2030. Government backed smart city projects, a strong construction sector, and urbanisation are also significant growth drivers - supporting a flourishing market for IoT based smart building and home solutions. Larger SMABuilding event At previous editions, CCTV cameras and NVRs were the main focus for buyers" Perhaps the most noticeable change at the 2020 edition of Secutech Vietnam will come in the form of a larger SMABuilding event. Explaining the expansion, Ms Tsai said, “In terms of commercial and residential property, facility managers are not only in charge of security and fire safety, but also temperature control, energy efficiency, lighting and parking. With this overlap in mind, it makes sense for SMABuilding to add to its existing portfolio of security solutions so that trade visitors can source the full spectrum of smart home and building solutions. Visitors can expect a larger event scale and even more opportunities to conduct business.” She further explained that end users in the commercial security sector are also demanding more sophisticated products, “At previous editions, CCTV cameras and NVRs were the main focus for buyers. But now, end users are searching for components and solutions that can enable new unified turnkey solutions with added value and flexibility.” Single management platform Combining security with other functionalities is also proving popular in the factory, home, parking and retail sectors, all of which will have dedicated application pavilions at the show. With related technologies grouped together, it’s much easier for trade visitors to find specific solutions" “These are all vertical markets where buyers demand unified solutions to their challenges,” said Ms Tsai. “Taking retail as an example, store managers and business owners increasingly prefer to handle security, retail analytics, heat mapping, people counting and inventory management through a single management platform rather than a series of separate sub-systems.” But although popular, it is not only ‘total solutions’ that channel buyers are searching for, single function solutions are also in demand. According to Ms Tsai, this is where the fair’s four application zones will deliver even more value, “With related technologies grouped together, it’s much easier for trade visitors to find the specific solutions that they need, whether it be access control, perimeter monitoring or license plate recognition.” Seven product zones Alongside the fair’s application zones, Secutech Vietnam will also feature seven product zones, displaying the latest surveillance cameras, components and accessories, software and management platforms, PA systems, biometrics and RFID. Three of the zones will be located at the concurrent ‘Fire & Safety Vietnam’ event, which recorded its largest ever edition in 2019, connecting practitioners with extinguishing equipment, alarms, personal protection equipment, disaster prevention solutions, fire proof materials, rescue equipment and more.
The retail industry is undergoing a significant period of change. Consumer demand is constantly evolving led by rising expectations for an improved experience, both online and in-store. Today’s connected consumer firmly sets the pace for change and retailers must respond to stay in the race. What can visitors to Checkpoint’s stand at EuroShop 2020 expect to see? 78% of consumers want an enjoyable in-store experience, coupled with store design contributing to a potential sales increase of up to 40%. This means a visually appealing and seamless customer experience is vital to retailers in today’s competitive landscape. Seamless consumer experience In retail, supply chain visibility is essential to create a seamless consumer experience Checkpoint’s investment in R&D and its ongoing collaboration with customers, is forging new EAS & RFID antenna design possibilities. At EuroShop 2020, visitors can learn how the next-generation antennas balance loss prevention with store aesthetics. The broad product range of antennas includes many varieties, from unobtrusive in-lane protection to free-standing, wall or door mounted sensors. Checkpoint has a solution for every store format and industry. In retail, supply chain visibility is essential to create a seamless consumer experience. The rise of omnichannel retailing means consumers expect immediate service and exceptional levels of personalisation. How can retailers create the same experience whether in-store, online or via a mobile device? End-to-end solution RFID-based supply chain solutions offer an end-to-end solution. By building an agile and collaborative supply chain, retailers can gain real-time information visibility that is reliable. This facilitates intelligent inventory management and decision making, maximising merchandise value with timely sales opportunities. LPP will, in corporation with Checkpoint, present the results of its large-scale RFID programme Find out how RFID can help you in this omnichannel retail world. On Monday, 17 February, LPP will, in corporation with Checkpoint, present the results of its large-scale RFID programme which saw improved merchandise availability, operational efficiency and the consumer experience. Head to the Retail Technology Stage in Hall 6 from 15:40-16:00 to find out more. Don’t miss out on this great opportunity. Ground-breaking antenna technologies Checkpoint’s specialist in-house RFID Label Applications Development Team work closely with RFID chip suppliers. At EuroShop 2020 Checkpoint will showcase the latest RFID tags and labels, including sustainable developments; together with ground-breaking antenna technologies to enhance the user experience. The continued expansion of its world-class global footprint will allow Checkpoint to serve customers the most effectively with all label needs. As the largest RF label manufacturer in the world, Checkpoint has made significant investments into R&D, manufacturing, testing and digital printing. Checkpoint will continue to lead label innovation in 2020, setting new standards in the industry and achieving the improbable with first-to-market labels. Stop by to see groundbreaking new RF labels that can now protect product categories' that could not previously be effectively protected. Protect high-theft merchandise Checkpoint’s software solutions help retailers measure, monitor, and manage stores Connected stores merge retail and technology, bringing the retail store experience into the digital age with Internet of Things (IoT) technology. Checkpoint’s software solutions help retailers measure, monitor, and manage stores, with actionable data helping them sell more and lose less. Going beyond EAS, Checkpoint’s software solutions allow stores to enhance the entire customer journey by better satisfying their needs and desires, while delivering better profits for retailers in return. Engaging, creative packaging design is an essential part of the marketing mix and vital to differentiate brands from competitors. At EuroShop 2020, Checkpoint will also unveil new, security accessories engineered to protect high-theft merchandise without compromising the look and feel of the products. Helping retailers improve performance From labelling innovations designed for any packaging material to Alpha High-Theft Solutions, Checkpoint offers a solution for every product and packaging format. Mike French at Checkpoint Systems UK, commented: “We understand the complex challenges facing retailers and that there is no single answer. At EuroShop we will highlight the tangible solutions that will help retailers improve performance and deliver a seamless consumer experience.” Visitors are more than welcome to find out more about Checkpoint’s intelligent retail solutions at EuroShop from 16-20 February 2020 in Düsseldorf, Germany.
Evolis, global company involved in personalisation solutions and instant printing systems, has announced launching a new Card Lamination Module (CLM) for Avansia, compatible with its Avansia card printer. In a very demanding market, the Evolis Card Lamination Module reduces the risk of card fraud and increases significantly the useful life of the official identity documents or the access control badges. Avansia Lamination system The Avansia Lamination system combines the Avansia Printer with the retransfer technology The Avansia Lamination system combines the Avansia Printer with the retransfer technology and the Card Lamination Module (CLM for Avansia) for the issuance of high-quality secure cards. The retransfer technology allows the card integral printing and its 600 dpi print head to generate an optimal quality of image, including texts and high-resolution security features (UV, micro-texts, guilloches and 2D codes). Secure access control solution This solution meets the specific needs of employee badges personalisation, secured control access, student cards, national IDs, driving licenses, etc. CLM for Avansia laminates single or double-sided cards providing durability for up to 10 years. Avansia Lamination thus creates secure cards for every need. In a single operation, an Avansia printer equipped with a CLM can encode various cards (magnetic stripe, contact or contactless smart cards), print them using retransfer technology, and laminate them in one pass. The printing and lamination modules work in parallel, producing up to 133 printed and laminated single-sided cards per hour or 79 printed and laminated dual sided cards. Evolis High Trust consumables Avansia Lamination is adapted to print large batches without interruption thanks to its high capacity card feeder and card output hopper (250 cards each) and to the Evolis High Trust consumables range, developed specifically for this kind of impression. All our patches and varnishes propose high capacities of printing to allow a huge autonomy of the system. In order to meet specific needs, Avansia Lamination can benefit from all the encoding options: magnetic, contactless and contactless smart cards (combinable with each other). Avansia’s retransfer technology makes it possible to print on all types of cards (PVC, PET, polycarbonate, ABS, etc.) including those with irregular surfaces, such as smart cards. RFID electronic key solution To prevent any unwanted attempts at use, Avansia Lamination is fitted with an RFID electronic key To prevent any unwanted attempts at use, Avansia Lamination is fitted with an RFID electronic key which prevents printing from starting, once removed. It is also optionally equipped with a mechanical locking system. The CLM module for Avansia simply connects to the Avansia printer to form a single system. The installation of the films is intuitive, and all the laminates are automatically recognised by Avansia. Fully personalised laminates Evolis offers a wide variety of patches and varnishes, whether or not incorporating holograms. Upon request and within the framework of specific projects, Evolis is able to develop fully personalised laminates. “With Avansia Lamination, Evolis is enriching its catalog with a high-end product which allows us to strengthen our capacity to meet the needs of high-volume markets, particularly in the fields of security, education and government projects “, Says Philippe Lesellier, Product Manager at Evolis. Plastic cards personalisation expert Evolis a globally renowned company that develops, manufactures and markets a complete range of personalisation solutions for plastic cards on a worldwide scale. Evolis card printers provide all the options needed for graphic and electronic (magnetic stripes, contact or contactless smart cards) personalisation of all types of cards (national ID cards, payment cards, employee badges, student cards, etc.) Evolis also markets a broad range of products and services for identifying people and goods: software for customising cards via its subsidiary cardPresso, a complete line of card accessories as well as signature pads and support services, through Sogedex Accessories.
With the OS50 firmware upgrade, several new features have been implemented to make the SM-6300 faster and even more powerful. New filter options in the search for Bluetooth devices enable the selection of specific devices, energy consumption is significantly reduced. Additionally, the generation of authorisation media for the LEGIC Master-Token-System-Control (MTSC) solution and the creation of LEGIC prime and advant segments on LEGIC smartcards are possible with the new SM-6300init. LEGIC Master-Token-System-Control solution The SEARCH command for LEGIC reader ICs offers an easy and efficient way to communicate with different devices. When using the Bluetooth Low Energy transparent mode of the SM-6300, there is a growing demand for a filtering capability to precisely select a device, as more and more Bluetooth devices are around. With the new OS50, there are now more filter options available, allowing the reader to specifically find Bluetooth Low Energy devices that advertise certain data. In previous firmware versions the SEARCH command executed sequentially for every technology which cost valuable time in the search for the various ID media and slowed down the opening process noticeably. With the new upgrade, the search for Bluetooth Low Energy devices can be started and continued in the background while simultaneously searching for RFID media. SM-6300 reader ICs One of the strengths of the SM-6300 reader ICs is their design for use in battery-powered readers One of the strengths of the SM-6300 reader ICs is their design for use in battery-powered readers or other infrastructure components. Energy consumption is therefore essential and determines whether a solution is successful or not. If a reader design consumes less energy, the battery lasts longer, and maintenance costs are reduced. LEGIC has already introduced optimizations for energy consumption with enhancements to the sleep mode in September 2019. Since then, a reader can be woken up not just by inductive Wake Up, but also capacitive, with a timer or via GPIO. With the latest OS50 firmware upgrade, the SM-6300 is now also considerably more power-efficient when the IC is active. The improvements not only lead to a further reduction in energy consumption, but also significantly reduce the peaks in current consumption, which opens up new design possibilities. Generate authorisation media To allow MTSC users to generate authorisation media themselves, LEGIC reader ICs offer corresponding commands to create an authorisation medium from a Master-Token blank. Until now, the generation of authorisation media as well as the initialisation of advant and prime applications on LEGIC smartcards could only be done with the SM-4500. With the new SM-6300init, these commands are now also supported by the 6000 series. This means that all applications can now be covered with just one design based on the SM-6300init.
It amazes me how in a few short years security systems have gone from simple, dumb cameras witnessing events to intelligent eyes, ears, speech and touch solutions that boost situational awareness far beyond human capabilities. It seems the only senses missing from the equation now are smell and taste. And who knows, someone might be working on those in a lab somewhere right now. But what’s really fascinating to me is how the Internet of Things (IoT) has opened a world of possibilities for transforming security technology into something new yet again. With IoT we’re able to push and pull nuggets of intelligence from sources we never considered before: environmental sensors, pressure plates, door lock timers and much more. It’s helped us break through the constraining mindset that security systems are strictly single-purpose. With interconnectivity at the core, we’re starting to imagine myriad ways to apply these tools to challenges outside the realm of security. Here are just a few examples. Flood management assistance Network camera adds another dimension and timeliness to flood management by helping responders investigate remotely As recent hurricanes and floods have shown, water damage can be devastating to a community. That’s why some municipalities are using their city surveillance cameras in conjunction with water sensor to proactively address the problem. Water sensors collect data from multiple sources such as rain gutters, sewer systems and pump stations, in order to monitor fluctuations in water levels and water quality. If an alert triggers, having a network camera in proximity to visually verify the situation helps responders determine the best course of action. For instance, if multiple water detection sensors trigger alerts simultaneously or sequentially over a large area it’s probably due to natural runoff from recent rainfall. But without eyes on the scene, how can you be sure? Network camera adds another dimension and timeliness to flood management by helping responders investigate and identify the cause of a trigger remotely. It might be a fire hydrant spewing water, a water main break or even a chemical spill. With video streaming live to the command center, staff can remotely inspect the area, determine the cause of the trigger and decide whether remediation is required, thus avoiding the expense of dispatching an investigative crew to a non-event. Some municipalities are using their city surveillance cameras in conjunction with water sensor to proactively address the problem Environmental control assistance Data centers house the lifeblood of a business so it’s no wonder why companies work hard to protect them. We’re all familiar with the integration of network cameras with access control systems to visually verify who is actually using the credentials. Network camera adds another dimension and timeliness to flood management by helping responders investigate and identify the cause of a trigger remotely But there’s another aspect to protecting data centers and that’s environment control. Data centers need to maintain optimum humidity and temperature for the racks of electronics. When environmental sensors in the facility detect out-of-norm ranges technicians can remotely command a network camera to zoom in on the gauges and help them determine whether remediation might be necessary. Coupling network cameras with other sensors in the data center can provide visual confirmation of other conditions as well. For instance, every time a data rack door-open-close sensor detects an event it can trigger the camera to pan to the location and stream video to security. Some data centers employ weight sensors at the doorway to weigh personnel and equipment as they enter the room and when they exit to ensure no additional hardware is being taken out of the facility or left inside without permission. Any discrepancy would trigger the camera to zoom in for a close-up of the individual’s face and send a visual alert and ID information to security. Roadway management and parking assistance Network cameras have long played a part in city-wide traffic management. Adding video analytics and integration with network sensors, makes those cameras that much smarter and versatile. They can detect cars driving in bike lanes or driving in the wrong direction and capture license plates of offenders. Their ability to detect anomalous traffic flow patterns can be integrated with car counting sensors, networked electronic road signs and traffic light systems to automatically redirect vehicles to alternate routes. They make great, intelligent parking lot attendants, too. Working in conjunction with weight sensors network cameras can count vehicles coming into and leaving a lot or garage and verify when the facility has reached capacity. License plate recognition and video analytics can be used to ascertain that a vehicle entering a reserved parking space doesn’t match the credentials and vehicle attributes in the database. With the addition of noise sensors and audio analytics, network cameras can improve roadway and parking facility safety by detecting and identifying specific sounds – breaking glass, car alarms, gun shots, and aggressive speech – and triggering a visual alert to first responders. Network cameras can improve roadway and parking facility safety by detecting and identifying specific sounds and triggering a visual alert to first responders Shopper experience assistance In the early days of online shopping, e-tailers designed their sites to replicate the in-store customer experience. In an ironic turn of events, today brick-and-mortar stores are trying to mirror the online shopping experience. To do so, they’re turning their security systems into adjunct sales assistance. With network video and audio system automation they can recognise and acknowledge loyal customers with personal greetings. Retailers are applying people counting video analytics to checkout activity to create rules-based consistency in customer service With heatmapping analytics they can measure how much time a customer spends in a specific department or observe how they walk through the aisles of the store. They can track shopping behaviors such as items looked at that made it into the cart or didn’t, or whether a customer actually checked out or left the merchandise behind. By capturing these shopping patterns and trends retailers can shape a more positive, more profitable customer shopping experience. For instance, integrating video analytics with point of sale systems and RFID sensors on merchandise tags can result in timely alerts to sales associates to recommend additional merchandise. This is a case of emulating how e-tailers let the customer know that other customers who bought X often also purchased items Y and Z. Or to avoid disappointing customers due to stock outages, retailers are linking weight sensors and video analytics to make sure their shelves are well-stocked and if not, quickly alert associates to what items need to be restocked. Capturing business intelligence Retailers are also using video cameras to monitor checkout queues and trigger automated announcements over the public-address system, closed system such as smartphones or other wireless communications devices that checkers are needed rather wait for a person to call for backup. IoT laid the groundwork for network security solutions to seamlessly integrate with other IP-based technologies, sensors and programs They’re applying people counting video analytics to checkout activity to create rules-based consistency in customer service. While retailers will always use their surveillance camera for loss prevention, they’re finding that integrating traditional technology in new ways can yield even bigger returns. Linking network video surveillance, video analytics, network communications system and sensors with point-of-sale systems and customer loyalty databases, retailers are capturing the business intelligence they need to get back in the game and make brick-and-mortar a greater overall experience than online shopping. A natural cross-over technology This trend towards integration has forever changed how organisations view their investment in security technology. The intelligence and versatility of a tool that can see, verify and analyse what’s happening in real-time is spurring users to tap its cross-over potential for a host of other tasks that could benefit from more astute situational awareness – everything from manufacturing and equipment maintenance to logistics, inventory control and beyond. IoT laid the groundwork for network security solutions to seamlessly integrate with other IP-based technologies, sensors and programs. How we capitalise on that connection is only limited by our imagination.
Over the past few years, biometrics has rapidly expanded into consumer applications, like the financial market for customer authentication, to payment services and withdrawing cash from ATMs in high-fraud markets. However, its adoption as an additional authentication factor for physical access control systems (PACS) and other enterprise applications, hasn’t been as rapid. But this is changing. Biometrics offers numerous benefits at the door and throughout the enterprise. With the advent of new anti-spoofing capabilities, and its integration into secure trust platforms that protect privacy and support a variety of RFID credential technologies, biometric authentication is poised to deliver a much higher matching speed and better overall performance. This will dramatically improve an organisation's security, whilst enhancing user convenience.Newer solutions are overcoming security and convenience hurdles to help realise the full potential of biometrics Challenges for biometric authentication Biometrics fuses convenience and security while validating “true identity” versus identity that is associated to the possession of an ID card. As an example, biometrics prevents a user from taking someone else’s card and obtaining access to privileged resources. This adds the human element to traditional methods of authentication, strengthening security by combining something the user “is” with something the user “has” or “knows.” According to the firm ABI Research in its May 2018 study, Biometric Technologies and Applications, the total fingerprint sensor shipments for the entire consumer market is “estimated to reach 1.2 billion worldwide for 2018, thus ensuring its market dominance.”It has been far too easy for fraudsters to create a fake fingerprint and present it to a reader Despite the benefits of fingerprint authentication in numerous consumer applications, there have been impediments to its broader adoption in the enterprise. While price has been one big roadblock, there have also historically been other reasons for its slower-than-expected growth. First, many technologies are still vulnerable to spoofs and hacking. It has been far too easy for fraudsters to create a fake fingerprint and present it to a reader. Equally troublesome, older products have not been able to move users through the doors as fast as a simple ID card and reader. In general, all fingerprint capture technologies are not equal amongst older products, and there can be significant differences in performance. Developing Technology Performance Newer solutions are overcoming these security and convenience hurdles to help realise the full potential of biometrics. Their development has focused on three key areas: How fingerprint images are captured – if the image can’t be properly captured, the rest of the process fails The implementation of liveness detection to enhance trust – even in the case when the image is properly captured, if it is fake the system cannot be trusted Optimising performance through a combination of new technology and algorithms, whilst ensuring interoperability so the performance can be trusted. The skin is illuminated at different depths to deliver much richer data about the surface and sub-surface features of the fingerprint Optimising capture The quality of the captured image is critical, across all types of fingerprints and environments. Many customers choose sensors that use multispectral imaging because it collects information from inside the finger to augment available surface fingerprint data. The skin is illuminated at different depths to deliver much richer data about the surface and sub-surface features of the fingerprint The skin is illuminated at different depths to deliver much richer data about the surface and sub-surface features of the fingerprint. Additionally, the sensor collects data from the finger even if the skin has poor contact with the sensor, because of environmental conditions such as water or finger contamination. Multispectral sensors work for the broadest range of people with normal, wet, dry or damaged fingers, across the widest range of usage conditions – from lotions or grease to sunlight to wet or cold conditions. The sensors also resist damage from harsh cleaning products and contamination from dirt and sunlight. Liveness detection Liveness detection is the ability to determine that the biometric data captured by the fingerprint reader is from a real living person, not a plastic fake or other artificial copy. An increasingly visible dimension of biometric performance in commercial applications, liveness detection is critical for preserving trust in the integrity of biometrics authentication. At the same time, it must not impede performance or result in excessive false user rejections.While liveness detection optimises performance, it is also important to ensure that this performance can be trusted The most trusted multispectral imaging fingerprint sensors with liveness detection provide a real-time determination that the biometric captures are genuine and are being presented by the legitimate owner, rather than someone impersonating them. This capability leverages the image-capture approach of using different colors or spectrum of light to measure the surface and subsurface data within a fingerprint. In addition to this optical system, the biometrics sensor features several core components, including an embedded processor that analyses the raw imaging data to ensure that the sample being imaged is a genuine human finger rather than an artificial or spoof material. Advanced machine learning techniques are used so the solution can adapt and respond to new threats and spoofs as they are identified. While liveness detection and the underlying capture technology optimises performance, it is also important to ensure that this performance can be trusted. This requires adequate testing to ensure interoperability with template matching algorithms. The first requirement for incorporating biometrics into a physical access control solution is a secure trust platform Trusted performance The top-performing solutions capture usable biometric data on the first attempt for every user. They also speed the process of determining that the biometric data is not a fake, and they quickly perform template matching to reject impostors and match legitimate users.The card/mobile plus finger mode is one of the fastest-growing two-factor authentication use cases for securing access to both physical and digital places To trust this performance, though, the focus must be elsewhere: on interoperability with template-matching algorithms. Extensive interoperability testing must be performed by skilled and independent third parties like the National Institute of Standards and Technology (NIST) so that performance data can actually be trusted in all template-matching modes, and not simply a vendor claim. Template matching modes Template-on-card and card/mobile + finger modes using “1:1” template-matching profiles authenticates a person’s identity by comparing the person’s captured biometric template with one that is pre-stored in a database. Template-on-device mode for finger-only authentication using “1:N” matching compares the person’s captured biometric template against all stored biometric templates in the system). The card/mobile plus finger mode is one of the fastest-growing two-factor authentication use cases for securing access to both physical and digital places.Cryptography prevents any man-in-the-middle attacks while also protecting the biometric database As an example of how to deliver trusted performance, HID Global uses the top-ranked NIST certified MINEX III minutia algorithm to ensure interoperability with industry-standard fingerprint template databases. This interoperability ensures that today’s systems, which are based on much more powerful hardware than in the past, will perform accurate 1:N identification of a full database in less than a second. Physical access control integration The first requirement for incorporating biometrics into a physical access control solution is a secure trust platform designed to meet the concerns of accessibility and data protection in a connected environment. The platform should leverage credential technology that employs encryption and a software-based infrastructure to secure trusted identities on any form factor for physical access control, access to IT networks and beyond. Cryptography prevents any man-in-the-middle attacks while also protecting the biometric database. This system also must encompass remote management of all readers and users, spanning all onboarding as well as template loading and enrolment activities for supported authentication modes. Properly implemented, biometrics solutions with liveness detection also protect privacy – if you can’t use a fake finger, it is meaningless Other important focus areas include configuration and administration, plus all logs, reports and monitoring.New system architectures and data models have been created to protect personal information and maintain user privacy It should be possible to manage biometric readers as groups or individually over the network, and tools should be available to allow system administrators to manage all configuration settings from time and data to language, security and synchronisation. The system should enable continuous live monitoring of authentication, alerts and system health, and provide a rich set of associated reporting tools. There are also backend implementation decisions to be made, including how a biometric authentication system will be seamlessly integrated into third-party systems. This is another major pain point of biometric technology. To simplify deployment, application programming interfaces (APIs) should be available for direct integration of the biometrics authentication solution with the access control infrastructure. Privacy considerations Properly implemented, biometrics solutions with liveness detection also protect privacy – if you can’t use a fake finger, then even if you did obtain someone’s fingerprint data, it is meaningless. Strong and updatable liveness protection is critical if biometrics are to eliminate the need to use PINs or passwords.Strong and updatable liveness protection is critical if biometrics are to eliminate the need to use PINs or passwords Biometrics data must be handled like all sensitive and identifying information, and properly architected system designs will always consider and protect against both internal and external threats and attacks. New system architectures and data models have been created to protect personal information and maintain user privacy. Beyond the encryption of the data itself, there are now many good alternatives available for building highly secure and well protected systems, including the use of multi-factor and even multi-modal authentication to maintain security even if some identifying data is compromised. Today’s modern fingerprint authentication solutions are on a fast track to deliver a unique combination of ease of use, availability and convenience and higher security to physical access control systems. With their latest improvements in liveness detection, system architectures, performance and ability to be easily incorporated into access control solutions, they seamlessly combine security and convenience to make them a viable option when accessing a facility, networks and services. These solutions deliver a higher confidence of “who” is being admitted through the building’s front door, where it really matters.
The Food Standards Agency (FSA) in the UK has begun investigations into meat wholesalers after a raise in concern for food hygiene. This investigation has impacted businesses such as Wetherspoons, as well as schools and care homes up and down the country. Consumers are beginning to lose trust in businesses that are supplied by untrustworthy production companies and it seems to be becoming more common, if we are to look back to the horse meat scandal in 2013. But what are the benefits of having security systems within these types of production facilities? From ensuring consumer confidence, to maintaining quality control within products, what does it achieve? Finally, what crime exists surrounding the industry and how can the implementation of protective systems boost satisfaction? Instant barriers for unwanted people The world is becoming more advanced and revolutionary technology is allowing us to make the necessary changes to ensure ethical working practices — whether this is protecting people from a physical threat or a threat that is much more devious within our foods. Food factories should start with access control systems. This will put an instant barrier between operations and any entry attempts by unauthorised personnel. Whether this a swiped identification card, biometrics or a passcode way of entry, only authorised personnel will be granted access. Revolutionary technology is allowing us to make the necessary changes to ensure ethical working practices Another security system that could be put in place to help food factories and encourage them to work more efficiently is CCTV. By spring 2018, all slaughterhouses within England are required to have CCTV systems in place that can be reviewed by the FSA who have unprecedented access to footage within a 90-day period — is this something we should be looking to do in food factories to ensure safety for the British people? CCTV is a worthwhile investment for production companies who want to gain visibility of their entire operation and gain the respect from consumers across the country. The benefits for CCTV Customer reassurance — as food factories don’t operate openly and everything is hidden away, this instantly creates suspicion from a consumer’s perspective as they will be the ones buying the final product once distributed to stores around the country. CCTV will counter this issue as it shows that operation centres have nothing to hide — giving them the ability to publish any footage if accused of misconduct. Maintaining quality — using more advanced CCTV within food factories will enable production companies to monitor the production line and maintain the standards that they sell themselves on. Sometimes, a human error is unavoidable on a production line after several hours of non-stop work — being able to detect it instantly is essential. Criminal activity across food factories 89% of manufacturers on a global scale were impacted by fraud in 2015 — 2017 saw a 7% rise on this result. It has been proven that CCTV can deter criminals. By installing these systems, food factories can protect themselves from threats that are external and internal as well as being able to support themselves in any claims of violation. Although produced goods have been at the centre of news stories regarding the integrity and containments of what is being delivered, another common crime within this industry is fraud. 89% of manufacturers on a global scale were impacted by fraud in 2015 — 2017 saw a 7% rise on this result. Common perpetrators in fraud When it comes to the most common types of fraud, information theft stood at 30%, compliance breach at 30% and intellectual property theft standing at 26% of the respondents who were asked — all of which could cause great impacts to production lines. It was also found that those who had recently started working for the company, such as junior employees, were the most common preparators when it came to fraud within a manufacturing factory (39%). Temporary manufacturing workers came in at second place with 37%, while those in senior or middle management positions were at 33% — the same as ex-staff members. However, vendors/suppliers who do not have as much access to your business accounted for 33% too. This clarifies that anyone has the potential to commit a crime within a factory. To ensure protection for the British consumer, food production factories should seriously consider implementing similar systems to UK slaughterhouses. This article was contributed by IP security provider 2020Vision.
All schools and universities need to address three different levels of security when considering access control. The first level is the least vulnerable of the three and concerns the perimeter entry and exit points. Here, incorporating some level of electronic access control should be a consideration, whether that is a combination of electronic and mechanical door hardware, or a complete electronic solution. An electromechanical solution, such as electric strikes, can be beneficial in the effectiveness of perimeter security as they provide greater visitor management and traffic control. Data capture form to appear here! Facilitating visitor entry Electric strikes are able to control access via keypads, cards and proximity readers Electric strikes are able to control access via keypads, cards and proximity readers. When combined with mechanical locks, they provide the benefits of unrestricted egress. The second level is more vulnerable than the first and relates to the point at which people are screened before entering the interior of the school. As this area will be designed primarily to facilitate visitor entry, it will require adequate monitoring of access control. To do this, the latches used on access-controlled egress doors can be electronically controlled from the reception area or school office. Exit or entry doors can be opened by a push from the inside and, if the entry area is also an emergency exit, electronically-powered panic bars can also provide an effective solution. More and more schools are installing visitor management systems to control who can and cannot get into the building. Access control solutions Finally, the third level – and the most vulnerable – refers to the core of the school that both students and staff occupy. These are internal hallways, corridors, stairwells, entry points and restricted areas (such as staff lounges and science laboratories). These are the areas where a school must foster the safest environments for pupils, while also providing protection as they often contain confidential information, expensive equipment or chemicals. The access control system is linked to all doors within the school building A number of different access control solutions are beneficial, whether electronic, mechanical or a combination of the two. For electronic solutions, there are two options available: remote or centralised systems. With remote lockdown systems, individual locks are activated by remote control within proximity to the door. With integrated centralised systems, the access control system is linked to all doors within the school building and locked at the touch of a button. Prevent unauthorised persons Mechanical solutions, which include a cylinder lock and key, are also suitable for places such as classrooms, as doors can be locked externally with a key or internally with a thumbturn, to prevent unauthorised persons from entering. At one university in the United States, a smart RFID wire-free access control solution has been installed At one university in the United States, a smart RFID wire-free access control solution has been installed. The SALTO Virtual Network (SVN) wire-free system pushes and pulls data from the university’s ‘hot spot’ entry points to all their offline locks. By choosing a wire-free solution, the university only had to run wires to their exterior doors. The interior doors do not require wiring as these locks are stand-alone wire-free locks. Student accommodation block Securing access to student accommodates is another concern among colleges. One university in the United Kingdom wanted a security system to protect their student accommodation; in particular, a keyless system that would grant 24/7 access to its students while also enabling campus security to monitor these activities remotely. They chose Vanderbilt’s ACT365, which keeps audit trails by monitoring and recording fob activity. When another English university sought electronic locks for its newest student accommodation block, it turned to Aperio wireless locking technology from ASSA ABLOY. They used the wireless locks to extend the Gallagher Command Centre access control system to a student residence with 231 en suite rooms separated into flats for between 8 and 13 postgraduates. Aperio wireless locks are battery-powered and use less energy than wired magnetic security locks.
The mindset behind a new law to prohibit the use of facial recognition and other security-related technologies by San Francisco police and other city agencies is obvious in the name of the new ordinance: “Stop Secret Surveillance.” Ordinance to stop secret surveillance The San Francisco Board of Supervisors passed the ordinance 8-1 with two abstentions on May 14, and there will be another vote next week before it becomes law. We have an outsize responsibility to regulate the excesses of technology precisely because they are headquartered here" The irony of such a law emanating from northern California, where tech giants promote the use of numerous technologies that arguably infringe on privacy, is not lost on Aaron Peskin, the city supervisor who sponsored the bill. “We have an outsize responsibility to regulate the excesses of technology precisely because they are headquartered here,” he told the New York Times. Regulating facial recognition technology Although the facial recognition aspects of the ordinance have been the most publicised, it also targets a long list of other products and systems. According to the ordinance, "Surveillance Technology" means “any software, electronic device, system utilising an electronic device, or similar device used, designed, or primarily intended to collect, retain, process, or share audio, electronic, visual, location, thermal, biometric, olfactory or similar information specifically associated with, or capable of being associated with, any individual or group.” Broadly interpreted, that’s a lot of devices. Includes biometrics, RFID scanners The ordinance lists some examples such as automatic license plate readers, gunshot detection hardware and services, video and audio monitoring and/or recording equipment, mobile DNA capture technology, radio-frequency ID (RFID) scanners, and biometric software or technology including facial, voice, iris, and gait-recognition software and databases. Among the exceptions listed in the ordinance are physical access control systems, employee identification management systems, and other physical control systems; and police interview rooms, holding cells, and internal security audio/video recording systems. The ordinance ban applies to city departments and agencies, not to the general public and exceptions include physical access control systems, employee identification management systems, and internal security audio/video recording systems Airport security not part of ordinance The ban only applies to city departments and agencies, not to private businesses or the general public. Therefore, San Franciscans can continue to use facial recognition technology every day when they unlock their smart phones. And technologies such as facial recognition currently used at the San Francisco airport and ports are not impacted because they are under federal jurisdiction. Furthermore, the San Francisco police department does not currently use facial recognition anyway, although it has been deployed in places such as Las Vegas, Orlando, Boston and New York City. Safeguarding privacy of citizens The ordinance appears to have a goal of avoiding government uses of technologies that can invade individual privacy, seeking to avoid worst-case scenarios such as an existing system in China that uses millions of surveillance cameras to keep close tabs on the Uyghurs, a Muslim minority population. Any new plans to use surveillance technology must be approved by the city government, and any existing uses must be reported and justified by submitting a Surveillance Technology Policy ordinance for approval by the Board of Supervisors within 180 days. Surveillance technology policy Banning use of facial recognition just when its capability is being realised is counterproductive But might such a ban on technology uses undermine their potential value as crime-fighting tools just when they are poised to become more valuable than ever? Ed Davis, a former Boston police commissioner, told the New York Times it is “premature to be banning things.” He notes: “This technology is still developing, and as it improves, this could be the answer to a lot of problems we have about securing our communities.” Technology development doesn’t happen in a vacuum and banning uses of facial recognition and other technologies just when their capabilities are being realised is counterproductive. We should be thoughtful, deliberate and transparent in how we embrace new technologies. However, discarding them out-of-hand using emotionally charged words such as “secret surveillance” does not promote the best use of technology to the benefit of everyone.
The Global Security Exchange (GSX) seems smaller this year, which is not surprising given the absence on the show floor of several big companies such as Hikvision and ASSA ABLOY (although their subsidiary HID Global has a big booth). A trend affecting the number of companies exhibiting at GSX 2018, and other trade shows, is industry consolidation, which is impacting the show even beyond the fewer exhibitors this year in Las Vegas. GSX is the new branding for the trade show formerly known as ASIS. There was an impressive crowd of visitors waiting for the show floor to open Tuesday morning; the conference part of the program began on Monday. After the attendees filed through the doors, the foot traffic seemed brisk throughout the morning, and was somewhat steady until the end of the first day. Exhibitors as a whole seemed pleased with the first day and cautiously optimistic about the rest of the show. Acquisitions and consolidation HID Global announced on the first day that they will acquire Crossmatch - emphasising the impact of consolidation Emphasising the impact of consolidation on the industry as a whole, and on this show, was an announcement from HID Global on the first day that they will acquire Crossmatch, a biometric identify management and secure authentication solutions provider. It’s a comparatively large acquisition for the company specialising in trusted identity solutions. Just days earlier, another acquisition also seemed to confirm the trend when UTC Climate, Controls and Security — the owner of Lenel — announced an agreement to acquire S2 Security. The fruits of another recent acquisition was on display at the GSX 2018 hall, where Isonas took its place near the front entrance as part of the Allegion booth, just three months after the global security provider acquired the ‘pure IP access control company.’ Isonas is well positioned in two of the three fastest growing segments of the access control market — IP hardware, which is growing 41 percent per year globally, and access control as a service, or ‘cloud’ technology, which is also outpacing the overall access control market. Allegion also has the third fast-growing segment, wireless locks, covered with its Schlage brand. "New avenues of growth" The early days of new ownership is opening fresh opportunities for both organisations as Allegion seeks to leverage Isonas’ intellectual property and the smaller company finds new avenues of growth in the larger organisation, says Rob Lydic, Isonas Global Vice President of Sales. Motorola joined Avigilon in a higher profile role at their booth, emphasizing consolidation in the industry Lydic sees a likelihood of additional acquisitions in the near future in the security space, given the large amount of capital currently available to be deployed, and the large number of entrepreneurial companies looking to make the leap, as Isonas did, from a small booth at the back of the hall to front-and-center as part of a big industry player. Another reflection of consolidation: Motorola Solutions is taking a much higher-profile role in the Avigilon booth. In addition to signage, ownership by Motorola is also impacting the Avigilon product offerings. For example, the Motorola Ally security incident management and communications system has been integrated with Avigilon’s analytics-based event detection, and is being positioned to serve the enterprise market. The system simplifies security operations with a single platform that allows access to critical data, including video and access control systems, directly from any web-enabled device. Another reflection of consolidation: Motorola Solutions is taking a much higher-profile role in the Avigilon booth Avigilon is displaying Motorola Solutions’ CommandCenter Aware integrated with Avigilon’s systems for use with public safety applications to provide dispatchers and intelligence analysts with video feeds, incident details, alerts, data mapping and responder location. Avigilon has also integrated its AI-driven Appearance Search technology with its Access Control Manager system, so video searches can be performed based on a badge credential. The system can automatically pull up any information, whether video or events in the access control system, based on the badge information. It can also be used to search for lost badges, or to view where a person is located in the building. Avigilon introduced an AI appliance that allows existing cameras to be integrated with Appearance Search The company introduced an AI appliance that allows existing (non-Avigilon) cameras (up to 20 two-megapixel cameras) to be integrated with Appearance Search. Also, the next generation of analytics allows detection of more things, such objects a person may be holding, or detection based on what they are wearing. The growth of the cannabis market Although attendees at GSX are generally understood to be more end users than integrators, Joe Grillo, CEO of ACRE, the parent company of Vanderbilt Industries and ComNet, says he sees little difference in attendees at GSX compared to the ISC West show in the spring. “We see all our resellers here,” he says. Grillo noticed that Day One booth traffic was “not consistently busy, but steady.” Grillo says ACRE expects to be active again soon in the mergers and acquisitions market. The company has grown through six acquisitions since its founding, and has had one divestiture (when it sold Mercury Security to HID last fall). Since selling Mercury, ACRE has been ‘back in the buying mode,’ just looking for the right opportunity, says Grillo. New markets are a theme at GSX, and one of the biggest new opportunities is the cannabis industry. Marijuana has been legalised in dozens of U.S. states, and Canada is on the verge of legalising the drug. March Networks works with multiple cannabis operators to provide video solutions, point-of-sale transaction data, and customer analytics March Networks is among the companies targeting the cannabis industry in a big way. Already across the U.S., March Networks works with multiple cannabis operators to provide video solutions, point-of-sale transaction data, and customer analytics. The business intelligence solutions also aid compliance in the highly-regulated industry. March Networks provides radio frequency identification (RFID) tag to track plants throughout the channel, and tracking is integrated with video systems to provide correlated video views. A couple of exhibitors mentioned to me the need for commercial companies to deploy a comparable level of automation as their employees are accustomed to in the smart home environment. That suggests a need for things such as smartphone integration and voice commands. One exhibitor putting its toe in the water is Hanwha Techwin, which showed an Amazon Echo device used to control a video management system (VMS) with voice commands. Could the simple integration be a preview of the future of control rooms, where security officers merely talk to their equipment rather than operating controls? We’ll be talking to more companies (and maybe a few machines) on Day Two of the show, and will be reporting what we hear.
Around 7,000 people pass through the Luminy faculty’s suburban campus every day. As part of a major project to modernise two buildings, university managers sought a retrofit-ready access control solution to upgrade security. Aperio locks University administrators selected Aperio locks to secure doors in the new buildings. With Aperio, facilities, the staff can deal with lost keys more efficiently. The laborious process of changing locks and reissuing keys — part of the daily workload with mechanical locking — vanishes. Luminy campus is equipped with 372 Aperio Electronic Cylinders & 42 Aperio Electronic Handles with built-in RFID readers The Luminy campus is now equipped with 372 Aperio electronic cylinders & 42 Aperio electronic handles with built-in RFID readers. Locks are integrated seamlessly, wirelessly and online with Luminy’s ARD access control system. One key goal was to deter theft, which was becoming a problem in teaching areas — especially those with computers. “Since we installed Aperio, we have not had a break-in,” says Cédric Lopez, Maintenance Manager at Luminy. Campus security and incident management In addition to theft deterrence, Aperio met broad, stringent criteria for the security upgrade. Staff and students carry individual access smart-cards. Doors and credentials are easily programmed and reprogrammed to accommodate everyone’s changing access needs. Luminy’s security team has complete control over access permissions and campus traffic — in real time. Because their new Aperio devices are integrated online, the staff can see a ‘live’ overview of the campus and respond proactively to incidents. Aperio is trusted to protect the most sensitive areas of the campus. “We have critical premises, including for the storage of chemicals, some with radioactive properties,” adds Lopez. Seamless integration with university’s scheduling system Aperio locks are built on an open platform for easy integration with the university’s scheduling system Aperio locks are built on an open platform, so they are flexible enough to integrate with the university’s room scheduling system. “Teachers are able to reserve their rooms. Students no longer have to wait for the teacher’s arrival, because they have access to the right rooms in defined time slots,” says Cédric Lopez. The credential students already carry automatically opens classroom doors, if they have pre-authorised access rights. For the facilities team, the ARD interface displays scheduling for all relevant rooms in real time. Aperio wireless technology Luminy site managers have already scheduled further real-time access control upgrades built around award-winning Aperio wireless technology. As Luminy staff discovered, the benefits of Aperio extend beyond just enhanced campus safety and student security. The Aperio for Universities Solution Guide explains how you can upgrade and streamline security at your campus. Learn more about Aperio® at https://campaigns.assaabloyopeningsolutions.eu/aperio-university
Doncaster Culture and Leisure Trust (DCLT) is a registered charity delivering premier leisure provision venues across Doncaster. DCLT offers a diverse range of health, fitness, leisure, and entertainment activities to customers to help to achieve a healthier community across Doncaster. DCLT’s premier venue, The Dome, required a new solution that would protect several areas, including one of the largest gym’s in Doncaster, The Fitness Village. DCLT had a specific brief for this project that specified enhancing the staff and customer experience, while simultaneously providing access control solutions to restricted areas from the general public, members, and staff alike. Alongside interfacing the onsite gym membership system to enable a single source of data to populate the access control and automate the process, the Trust was also in a transition period of moving members from barcode to RFID badges. Advanced fast-acting swing speed gates Moreover, the entrance to The Fitness Village gym was also under renovation. The access control system would also need to feature advanced fast-acting swing speed gates and slim lanes. Advanced user obstacle protection also had to be kept in consideration to keep members safe during peak times when there would be a high level of footfall from visitors. Solutions Provided: Oliver Law Security (OLS) did not hesitate to recommend the Vanderbilt ACT365 system. ACT365 is not only a fully cloud-based product; it offers a flexible solution for installation and management that OLS identified as a key ingredient to meet DCLT’s project brief. In addition to DCLT’s security requirement, OLS also realised ACT365 as an ideal solution for this task, given the product’s very focused API integration. Thanks to the ACT365 interface, OLS was able to integrate DCLT’s gym management system to enable single-source data to be used to populate the access control system, keep records up-to-date, and enhance customer experience. For instance, previously, the older system had taken up to 3-5 seconds to validate members and open the entry turnstiles. Once the API interface had been achieved, this validation is now done instantly through ACT365 and allows members with active memberships through the entry points without any minimal delay. The scope of this project, although not significant in the number of doors, was a very technical project with integration into SQL server and a third-party membership system with the potential for thousands of would-be users. Key Highlights: According to OLS, using ACT365 and its API interface is a game-changer for this type of project. With multiple updates per day, the access control system is always fully populated with the correct, validated members ensuring DCLT’s premier venue, The Dome, is protected against memberships that have lapsed. The system is very user-friendly and can grow with DCLT’s plan for the future, and adding further developed integration for other areas within the near future. The system is entirely cloud-based offers an off-premise solution with no additional new servers required or PC’s running software. Through the ACT365 app, DCLT’s site administrators can manage the system for staff. The solution that OLS has implemented has removed the need for old, antiquated technologies and moved DCLT’s security system forward to the cloud and future-proof solutions. The beauty of the interface is once the schedule runs, all information is autonomously sent to the ACT365 database, meaning adding new memberships, updating memberships, or revoking access is seamless, not tying up staff verifying and administering the membership/access control systems respectively.
Around 7,000 people pass through the Luminy faculty’s suburban campus every day. As part of a major project to modernise two buildings, university managers sought a retrofit-ready access control solution to upgrade security. University administrators selected Aperio locks to secure doors in the new buildings. With Aperio, facilities staff deal with lost keys more efficiently. The laborious process of changing locks and reissuing keys, part of the daily workload with mechanical locking, vanishes. The Luminy campus is now equipped with 372 Aperio Electronic Cylinders and 42 Aperio Electronic Handles with built-in RFID readers. Locks are integrated seamlessly, wirelessly and online with Luminy’s ARD access control system. One key goal was to deter theft, which was becoming a problem in teaching areas, especially those with computers. “Since we installed Aperio, we have not had a break-in,” says Cedric Lopez, Maintenance Manager at Luminy. Access smart-cards In addition to theft deterrence, Aperio met broad, stringent criteria for the security upgrade. Staff and students carry individual access smart-cards. Doors and credentials are easily programmed and reprogrammed to accommodate everyone’s changing access needs. Luminy’s security team has complete control over access permissions and campus traffic, in real time. Because their new Aperio devices are integrated online, staff see a “live” overview of the campus and respond proactively to incidents. Aperio is trusted to protect the most sensitive areas of the campus. “We have critical premises, including for the storage of chemicals, some with radioactive properties,” adds Lopez. The benefits of Aperio extend beyond just enhanced campus safety and student security Real-time access control upgrades Aperio locks are built on an open platform, so they are flexible enough to integrate with the university’s room scheduling system. “Teachers are able to reserve their rooms. Students no longer have to wait for the teacher’s arrival, because they have access to the right rooms in defined time slots,” says Cedric Lopez. The credential students already carry automatically opens classroom doors, if they have pre-authorised access rights. For the facilities team, the ARD interface displays scheduling for all relevant rooms in real time. Luminy site managers have already scheduled further real-time access control upgrades built around award-winning Aperio wireless technology. As Luminy staff discovered, the benefits of Aperio extend beyond just enhanced campus safety and student security. The Aperio for Universities Solution Guide explains how you can upgrade and streamline security at your campus.
Student accommodation is a fast-growing sector. Student numbers across France have grown around 10 percent in a decade. Around $1 billion was invested in France’s purpose-built student accommodation just between 2016 and 2018. Efficient solutions to help manage security for these student properties are always welcome. For new premises in Rennes, France, specialist provider Easy Student sought reliable, key-free locking. They wanted their new residence to run efficiently, “like a hotel,” and without the unnecessary workload that comes with managing and keeping track of physical keys. SMARTair Wall Readers Wireless Electronic Escutcheons with inbuilt RFID readers control access through 83 doors at Easy Student Rennes Following a positive experience with the same technology in Nantes, Easy Student chose SMARTair Update on Card wireless access control. Wireless Electronic Escutcheons with inbuilt RFID readers control access through 83 doors at Easy Student Rennes. SMARTair Wall Readers secure non-standard entrances. SMARTair’s TS1000 software was one major reason for Easy Student’s choice. The intuitive interface and time-saving functionality make it easy for administrators to manage their access system. “SMARTair does not require any technical knowledge. I trained quickly and found the software very easy,” says Cyril Verger, Managing Director at Easy Student Rennes. “The solution corresponds perfectly to our needs. Installation was simple.” If someone loses a credential, the TS1000 interface makes cancelling it fast and easy, a major change from the old days of physical keys, mechanical locks and key organisation charts. “A lost key can still be used,” M. Verger adds. “A lost credential can be cancelled easily.” Flexible door entry It gives Easy Student managers the ability to change a user’s access permissions anytime, without visiting the doors SMARTair provides secure, flexible access control for every student, service provider and facilities manager who uses the residence. Around 100 access credentials are active at any one time. It gives Easy Student managers the ability to change a user’s access permissions anytime, without visiting the doors. If an incident occurs, they act quickly and decisively. Security managers program every student credential to open multiple doors: the student’s own room, the main door and bike park around the clock; a common relaxation area and the laundry room between 6.30am and 11.30pm only. “Managing this way avoids comings and goings by people who don’t live here,” M. Verger says. “Our students are very happy with the solution,” he adds. “They got used to it quickly, because this type of access control is found in lots of hotels and private homes. I highly recommend installing SMARTair at other student residences.” Learn more about SMARTair® https://campaigns.assaabloyopeningsolutions.eu/student-accommodation
Fast-growing Spanish menswear brand Álvaro Moreno has selected ID Cloud, Nedap’s renowned RFID-based inventory visibility platform. The deployment of the RFID solution at source of production, in the distribution center and throughout the 50 stores across Spain started in June 2019 and was completed in September 2019. RFID inventory visibility platform Álvaro Moreno leverages RFID for complete traceability within the supply chain. “We believe RFID is a main pillar in our digitalisation strategy as this allows us to close the gap between online and brick-and-mortar store experience”, says Álvaro Moreno, CEO of the menswear brand. Ultimate customer satisfaction is very important for our current and future success" “Ultimate customer satisfaction is very important for our current and future success. That is why we recently implemented omni-channel services such as BOPIS (Buy Online, Pick up in Store) and BORIS (Buy Online, Return in Store). In order to do this successfully, inventory accuracy as provided by RFID is key. For the future, we are considering to offer services like ship-from-store, mobile payment and self-checkout as well”, he continues. ID Cloud software suite Álvaro Moreno wanted to roll-out nationwide at a fast pace and was looking for a reliable partner. He said, “We selected Nedap because of their extensive experience within RFID projects. This enabled us to quickly deploy this technology throughout our 50 stores in just three months.” Nedap’s ID Cloud software suite is a Software-as-a-Service solution specifically developed for retail RFID applications. It offers retailers the quickest route to implement RFID and improve their in-store inventory accuracy to over 98%. Álvaro Moreno integrates ID Cloud with the Comerzzia POS-system. This enables seamless data transfer and provides the most accurate real-time business information.
DHL Express is the global provider of international shipping and courier delivery services, and has a major market share of express logistics in the Middle East with a strong customer base in Saudi Arabia. DHL Express has facilities at all the major airports and in most of cites in Saudi Arabia and the fastest clearance in KSA when compared to its competition. Saudi Arabia is one of DHL’s key markets and the delivery firm strives to be close to its customers here. But with facilities spread across the Kingdom, DHL faced issues in securing its critical assets. Particularly in terms of preventing unauthorised access to critical operational sites; unauthorised access for employees and contractors outside working hours; and unauthorised vehicle access to its warehouse facilities and receiving and responding to critical alarms. Intrusion detection Nedap’s AEOS access control and intrusion detection system was selected as the ideal solution One of DHL’s main aims was to switch to a new security system that would support all the latest access control and intrusion detection features, meet its business requirements and use its existing investments effectively Nedap’s AEOS access control and intrusion detection system, integrated with the Milestone VMS system, was selected as the ideal solution. AEOS is based on an open architecture, and offers flexible integration. So DHL was able to quickly implement its new access control and security system while retaining the investments it had made in existing readers and cards. RFID identifiers After using Nedap’s AEOS access control and intrusion detection system in one of the airport facilities, DHL decided to extend its use across the Kingdom. This set a roadmap for unifying all its facilities under the same access control and intrusion system. And ultimately, gave DHL the opportunity and flexibility to use the same cards across all its facilities. Nedap was able to provide secure, convenient access for DHL’s people and vehicles using RFID identifiers Through AEOS, Nedap was able to provide secure, convenient access for DHL’s people and vehicles using RFID identifiers. With the intrusion alarm system activated to restrict access during non-operational hours, unauthorised access to DHL’s operational sites has been prevented. And integrating AEOS with Milestone’s CCTV Video Management system has enabled DHL to receive graphical alarms on video walls. It’s also allowed it to view all related video footage associated with each alarm or event. SecuTronic, based in the Kingdom of Saudi Arabia, implemented the project successfully and efficiently. Flexible access control platform AEOS, secured and flexible access control platform has helped DHL Saudi Arabia to protect all its facilities, with access control and intrusion alarms, from one centralised control room. All the service points are equipped with a burglar alarm system and an enterprise-level access control platform connects all its sites across the country. AEOS has helped DHL to address all the security challenges it faced in Saudi Arabia and stay ahead of them, winning the trust of the customers by ensuring their shipments are secure. In addressing its security and operational challenges, DHL Saudi Arabia has been able to meet every TAPA (Transported Asset Protection Association) regulation. And by implementing such a secure monitoring system, it’s positioning itself as the last-mile fulfilment giant in the Middle East region.
Round table discussion
The new year comes with new opportunities for the security industry, but what technologies will dominate our discussions in 2020? Topics such as artificial intelligence (AI) and HCI (hyperconverged infrastructure) became familiar in conversations during 2019, and they are likely to dominate our thoughts again in the new year. But other buzzwords are also gaining steam, such as “blockchain” and “frictionless access control.” Connectivity and the cloud will also be timely technology topics as the industry evolves. We asked this week’s Expert Panel Roundtable: What technology buzz will dominate the security industry in 2020?
The ability to treat patients in a secure environment is a base requirement of hospitals and other healthcare facilities. Whether facilities are large or small, security challenges abound, including perimeter security, access control of sensitive areas, video surveillance, and even a long list of cyber-risks. We asked this week’s Expert Panel Roundtable: What are the security challenges of hospitals and the healthcare industry?
Using a smart phone as an access control credential is an idea whose time has come – or has it? The flexible uses of smart phones are transforming our lives in multiple ways, and the devices are replacing everything from our alarm clocks to our wallets to our televisions. However, the transformation from using a card to using a mobile credential for access control is far from a no-brainer for many organisations, which obstacles to a fast or easy transition. We asked this week’s Expert Panel Roundtable: When will mobile credentials dominate access control, and what are the obstacles to greater adoption?
Beyond security: access control for multi-tenant sitesDownload
Reducing the cost of video surveillance system deployment and operationDownload
Genetec to host its first virtual tradeshow Connect’DX 2020 to connect with physical security professionals