Suprema, global provider of biometrics and access control solutions, has announced that it will showcase new-generation mobile solution and latest facial recognition biometrics at IFSEC 2019 in London on June 18. Suprema mobile credential service Suprema's new mobile credential service provides the end-to-end solution including a cloud-based portal services, a mobile app, BLE readers, open API and in-app SDK for 3rd party support. The new service provides users with easier mobile card administ...
Morse Watchmans, the industry pioneer in key control and asset management systems, is showcasing the benefits of their KeyWatcher Touch and AssetWatcher key and asset management solutions at IFSEC International 2019 (stand no. IF620) in London, from June 18-20. The company is also introducing KeyWatcher Fleet, a key control system specifically for fleet management, to IFSEC attendees. “We’re thrilled to once again showcase the exciting features of our AssetWatcher and KeyWatcher Tou...
Matrix aims at increasing the networking opportunities by explaining decision makers the application of latest telecom and security solutions at the International Police Expo. The event organised on 19th and 20th July’19 gathers high level professionals of defence forces and gives them an overview of technologically advanced solutions. From telecom domain, Matrix will be showcasing enterprise meeting solution - PARISAT meeting server at the event. The conferencing server is engineered for...
ELATEC introduced the TCP3 authentication/release station, a small network appliance that enables devices without a USB port to incorporate an RFID or biometric reader, PIN pad or other form of user authentication and access control, and which supports USB 3.0 and gigabit Ethernet networks. Most organisations extend the use of their employee ID badge or card to authenticate for applications beyond building access. This includes most multi-function printers. However, not all printers and devices...
Redrock Biometrics, a provider of palm-based biometrics for authentication and identification, announces the official launch of their breakthrough identification solution – PalmID-X at the exclusive invitation-only Finovate Spring 2019. PalmID-X expands the applicability of biometric identification to large groups of people, creating a basis for seamless services and transactions without physical tokens. “Identification is much more challenging task than authentication. Most biometr...
ELATEC is pleased to announce its recent hire of Ron J. Fiedler, who joins the ELATEC team as Vice President of Strategic Alliances. In this role, Fiedler will expand ELATEC’s global presence through business development, strategic partnerships, and penetration of new markets. ELATEC RFID readers ELATEC designs and manufactures unique radio frequency identification (RFID) readers for user authentication and access control applications. ELATEC readers recognise and decode over 60 RFID tra...
Matrix, a manufacturer and provider of Telecom and Security Solutions, to showcase its solutions at Indelex Smart Home Expo in collaboration with PowerTech Electronics. Matrix will be showcasing an enterprise-grade IP video surveillance solution designed, engineered and built specifically for growing multi-location organisations. The entire solution focuses on automating processes, easy integration with access control and enhancing efficiency of organisations. They will also be showcasing a range of audio compatible and compact Professional and Project Series IP cameras powered by SONY STARVIS series sensors with Exmor technology. This gives the cameras an edge over others in terms of exceptional low light performance, consistent image quality during varying light conditions (True WDR), better bandwidth optimisation and many other features. We will also be showcasing our PTZ Cameras for 360° security. Showcasing Extreme series of NVRs These latest NVRs are backed with an intelligent software that helps detect threats and send instant notificationsFurthermore, they will be displaying their new Extreme series of Network Video Recorder (NVRX) at the event. This NVR is equipped with 4K decoding capacity and characteristics like Cascading (up to 20 NVRs), Camera-wise Recording Retention and Database Level Integration. Moreover, these latest NVRs are also backed with an intelligent software that helps detect threats and send instant notifications for real-time security. In the event, Matrix will showcase futuristic technologies from the security domain. Matrix Access Control and Time-Attendance domain will showcase its newly launched Face Recognition technology for authentication through IP Cameras/Tablet/Mobile. The technology enables contactless authentication with precise and accurate authentication. Apart from this, they will display their high-end cloud-based Time-Attendance and Access Control solution. Mobile based access control solution Mobile being the next generation technology in the security domain, they will showcase mobile based access control solution whereby user can either scan QR code or just twist his/her phone for authentication. User can mark attendance automatically using GPS or Wi-Fi through mobile application. Thus, Matrix being the front face in innovation, they are going to show some extraordinary biometric door controllers useful for applications in Time-Attendance, Access Control, Visitor Management, Cafeteria Management and many more. Furthermore, access control being the prime requirement in terms of security, Matrix will present its Standalone Access Control solution with License Free Environment, whereby a single panel can handle up to 255 doors and 25,000 users. Get a glimpse into the cutting-edge Matrix biometric solutions with multiple credentials such as face, fingerprint, palm vein, RF card and PIN options. Unified Communication Platform Matrix will highlight ETERNITY NENX, their newly launched Unified Communication Platform for SOHO and SMBAt the event, Matrix will highlight ETERNITY NENX, their newly launched Unified Communication Platform for SOHO and SMB. Increasing number of small and medium organisations are migrating to leverage benefits of IP. For such applications, Matrix ETERNITY NENX is a perfect fit. Matrix Telecom domain will also be showcasing its comprehensive telecom solutions which includes IP-PBX, Communication Endpoints, Media Gateways, Mobile Application and much more. Along with that, Matrix Hospitality solution, which is specifically designed to enhance guest experience at hotels, will also be one of the major highlights. Hotel staff can enhance guest experience and improve staff productivity with hospitality features, front desk, PMS integration, staff mobility extensions and voicemail with personalised greetings. “With a portfolio of innovative Security and Telecom products, Matrix can cater a wide spectrum of industries. We are looking forward to meeting our existing and prospect end customers at Indelex Smart Home Expo,” said Jatin Desai, Marketing Manager.
Security expert Abloy UK is inviting visitors to IFSEC 2019 to learn more about its innovative new global vision, ‘Abloy - For Trust’, and meet the company’s new brand ambassador, Finnish motor racing icon Valtteri Bottas. Held on 18th – 20th June 2019 at ExCeL London, IFSEC International is Europe's leading security event and the only global stage committed to the future of integrated security. Valtteri Bottas - who is currently top of the Formula 1 leaderboard - will be on the stand to explain why he is the ideal match to embrace and reflect Abloy’s brand values. Better representation of digital offering Abloy’s ‘For Trust’ campaign revitalises our core brand values and positions us for continued future growth"Aaron Yule, Managing Director at Abloy UK, said: “Abloy’s ‘For Trust’ campaign revitalises our core brand values and positions us for continued future growth, with refreshed branding to better represent our modern digital offering. “We’re keen for visitors to learn more about how Valtteri fits perfectly with our brand – he is trustworthy, technologically pioneering, innovative, has a first-class performance and puts teamwork at the heart of everything he does.” Products on display at IFSEC 2019 Alongside launching ‘For Trust’ with Valterri, Abloy is also showcasing a number of innovative products at IFSEC 2019. These include: PROTEC2 CLIQ - The easy-to-use access control system. It enables remote key management and provides comprehensive audit trails on locks and padlocks which fulfils the demands of regulators. It also has the ability to electronically remove lost or stolen keys from the system, meaning security can still be confidently maintained in circumstances where a key has been misplaced. PROTEC2 CLIQ can also ensure the safety of the people on site through not just managing and controlling access but delivering significant health and safety benefits by guaranteeing only the most competent and compliant staff are allowed on site, reducing risk. PROTEC2 CLIQ Connect recently won a prestigious Platinum ‘Govie’ Award in the USA, honoured as an outstanding government security product. Managing building security The CLIQ Go app enables users to control security in their building and premises from their mobile deviceCLIQ Go - The CLIQ Go app enables users to control security in their building and premises from their mobile device. Features include the ability to schedule access to rooms or give contractors time-limited access. If a key is lost, access can also be revoked using the CLIQ Go app, all managed from a cloud-based system which is ideal for SMEs, education, retail and hotels. Abloy OS - This is a contemporary, modular and scalable operating system, integrated with CLIQ Web Manager, which allows users to control door environments and secure access. The visual map-based user interface provides role and area-based access control, with a real time situational view. This accurate and convenient management of keys, identities and access reduces the resources required, thereby improving efficiency and user satisfaction. The system is Cloud hosted and is future-proofed to develop according to customer needs. Easy access and egress Escape Door System (EDS) - The EDS offers easy access and egress while ensuring compliance, safety and security with the ability to implement dynamic lockdown procedures. With the EDS, it is now possible to provide a compliant solution for an escape door when read-in/read-out access control is specified, combining the three components required for BS EN 13637 (electronically controlled escape door systems for doors along escape routes) - Blocking, Control and Trigger. Traka21 helps trace and account for every key or keyset ensuring that critical business operations are never jeopardisedTraka21 - Traka21 is a sophisticated stand-alone key management system, which combines innovative RFID technology and attractive, robust design to provide small and medium sizes businesses with the advanced management of keys or keysets in an affordable plug and play unit. Simple, efficient and cost-effective, Traka21 helps trace and account for every key or keyset, which are individually locked in place, ensuring that critical business operations are never jeopardised. Ensuring access to authorised personnel Electric locks - Products such as the Abloy EL560 solenoid lock and EL520 motorised lock work by controlling either the latch or the handle, or by motorising the bolt back once a proximity card is presented or a request to exit device is used. This ensures that only authorised personnel are able to gain access to the building, and the system will prevent any unauthorised persons from entering. This is ideal for exit and fire rated doors within the interior of premises such as business offices, public buildings, hospitals and schools. Electric locks also offer energy and emission reductions in comparison to door magnets. There are also safety benefits to be gained by choosing an electric solution, including removing the fire risks associated with the installation of door magnets on fire escape points.
As one recent market report highlights, more and more organisations are switching to wireless access control to secure premises. Their motivations are well rehearsed. Wireless devices offer greater flexibility without sacrificing security. With integrated RFID readers, they are easy to retrofit to existing doors and buildings, giving security managers much more control over a site. And because they are battery powered and use almost no electricity when idle, wireless access control helps companies reduce energy bills. But choosing to cut the cables is only the first of many welcome choices when you switch to wireless. Wireless access control solutions Electromechanical CLIQ and fully electronic eCLIQ cylinders are available for doors, cabinets, lifts, alarm boxes, and entrance gatesWireless access control — including Aperio, SMARTair and CLIQ wireless locking from ASSA ABLOY — gives you the widest possible choice of credentials. You don’t even need to abandon physical keys. In ASSA ABLOY’s CLIQ key-based access control system, programmable keys with batteries power the cylinder or padlock via an encrypted interface. Electromechanical CLIQ and fully electronic eCLIQ cylinders are available for doors, cabinets, lifts, alarm boxes, machines and entrance gates. Users reprogram or revalidate their key access rights at wall devices, with portable programming devices or making a Bluetooth connection between the key and the CLIQ Connect mobile phone app. Compatible with RFID proximity protocols Card-based access control leaves your credential options wide open. Both Aperio wireless locking devices for upgrading access control systems and SMARTair access control systems are compatible with all leading RFID proximity protocols, including MIFARE, DESFire and iCLASS. Users can pick from standard smart-cards, tags, bracelets and other convenient formats, tailored to the site. Wireless escutcheons come with optional PINpads, for doors where multi-factor authentication is needed for upgraded security. In addition, a SMARTair system offers mobile-ready access. With SMARTair, administrators can open electronic door locks remotely. At the user end, the Openow app stores validated virtual keys on a smartphone, so there’s no need for anyone to visit a security office to physically collect or update a credential. SMARTair virtual keys can be sent or revoked over the air — for maximum, time-saving flexibility. Users just tap the SMARTair lock to open up via Bluetooth. Protection for various sectors ASSA ABLOY wireless access control protects single-unit shops and whole shopping mallsWhatever size your premises, and no matter what work you do, a wireless access control system fits. In the healthcare sector, our card-based access systems manage huge hospitals and small doctors’ surgeries — where optional anti-bacterial coatings preserve hygienic environments. ASSA ABLOY wireless access control protects single-unit shops and whole shopping malls; care homes and corporate headquarters. From Helen Oy power stations in Helsinki to ULab, Alicante’s newest co-working space, wireless is the right solution. Key-based access system CLIQ, for example, caters to complex, multi-location businesses with thousands of locks securing hundreds of employees, plus contractors who need access round the clock. Many utilities operate remote sites, miles from reliable mains electricity, and often at the mercy of extreme weather. None of these challenges stops CLIQ cylinders and padlocks delivering the trusted security critical infrastructure demands. CLIQ is not just for the giants. One user-friendly extension of the technology, CLIQ Go enables small business owners to manage an access system from a mobile app. A few taps on the screen is all it takes to cancel, issue or change the door permissions for an employee’s CLIQ key. Software accessibility via PC or smartphone Aperio devices integrate online or offline (or both) with access systems from over 100 different manufacturersWireless access control does not restrict your system management workflows. The backbone of every ASSA ABLOY wireless access system is intuitive software which makes it easy for facility managers to control, identify and update exactly who can open every door. For all ASSA ABLOY wireless access ecosystems, a user-friendly software interface is accessible from almost any standard PC, tablet or smartphone. It gives facility managers an instant overview of their site’s security status from anywhere. With Aperio wireless locks, you manage the new doors from the same interface as your existing access control system. Aperio devices integrate online or offline (or both) with access systems from over 100 different manufacturers. System administrators see only one, familiar admin interface. SMARTair offers a menu of management options from standalone operation through offline and Update on Card control to real-time control via SMARTair Wireless Online functionality. With wireless, the choice is yours.
Farpointe Data, the access control industry's OEM for RFID credentials and readers, announces that its Conekt mobile smart phone access control identification solution now integrates advantages that Apple iOS 12 delivers, such as 3-D touch, Widget and Auto-Unlock, into the Conekt Wallet App, version 1.1.0. All new improvements create increased user convenience. “These improved Wallet App features let access control system manufacturers, integrators and dealers provide their customers with the simplest to use mobile access credentials in the market,” explains Scott Lindley, general manager of Farpointe Data. Mobile access control “Our Conekt solution provides the easiest way to distribute mobile credentials with features that include allowing the user to register only once and requires only the handset's phone number. We need no portal accounts or activation features. By removing these and additional information disclosures, we've also addressed privacy concerns that have been slowing adoption of this technology.” The newly improved Widget lets the user make up to three mobile access control credentials as widgets For instance, the newly improved Widget lets the user make up to three mobile access control credentials as widgets. This saves time by allowing quicker access to credentials supporting divergent building systems such as payroll, parking and cafeteria systems, directly from the smartphone's home screen. Biometric defences With 3-D Touch, a new pressure-sensitive feature, the user simply pushes on the Wallet App to select from up to three of the most commonly used mobile credentials. Each user can choose their own combination. For example, a delivery driver may gain entrance to the van parking area while the vice president gets access to the boardroom. Lastly, Auto-Unlock lets a user select a MAC as their favourite. Once designated, a little star appears in the upper right corner of the mobile access credential. As the favourite, it is transmitted immediately whenever the Wallet App is selected. All new Wallet App features are available immediately and will continue to operate securely behind the smart phone's PIN code and biometric defences.
ProdataKey (PDK), an innovator of cloud-based networked and wireless access control products and services, releases a whitepaper that explores why widespread adoption of mobile credentialing in conjunction with access control systems has lagged behind other smart phone applications, and how new technologies promise to overcome barriers related to a security/convenience trade-off previously inherent in such solutions. By virtue of their processing power, smart phones can provide superior encryption, and security, than RFID cards, fobs and smart cards. They are also more carefully guarded by employees. Cumbersome activation process Workers may loan a card to a colleague, but would never part with their phone and, unlike an access card, they would immediately seek to deactivate their phone if it were ever lost or stolen. Despite these and other security benefits, most mobile credentialing systems have fallen short in the area of convenience, requiring users to unlock and remove their phones from pocket or purse in order to use them as a credential. These systems require a cumbersome activation process for users and additional effort by administrators These systems also often require a cumbersome activation process for users and additional effort by administrators to manage. In order for smartphones to become the preferred method of credentialing, they need to provide a superior user experience to what they’re replacing – cards or fobs. Better user experience Readers of this white paper will learn how, and why, this equation is changing. Topics include: How mobile credentials can improve both security and convenience. The long-term benefits of deploying and using mobile credentials. How to create a better user experience over cards, fobs, and other less convenient mobile credentials. Why the convenience versus security trade-off is ending. Josh Perry, PDK’s CTO, states, “The next generation of mobile credentialing, that leverages all the capabilities of cloud, smartphone and Bluetooth technology in exciting new ways, will deliver a consistently superior experience to security management teams, employees who use these systems, and security integrators who provide installation and support. Within a few years, I predict that the popularity of mobile credentialing will skyrocket.” ‘Moving Toward Mobile Credentials; How New Technologies Offer Smoother Sailing Ahead’ can be downloaded from PDK’s website
Security industry stakeholders from around the world are readying themselves for a productive three days of business in Taipei, as the countdown to the 22nd edition of Secutech enters its final few weeks. On top of the business and networking opportunities that Secutech creates, the fair also plays a crucial role for information exchange within the security industry. This year, the fair’s fringe programme will cover all of the most important topics for the Asian market, including the applications of AI in safe cities, new intelligent transportation technologies and smart building IoT solutions. Smart Building IoT Industry players such as system integrators, installers, distributors and importers will be able to identify key market trends" “Industry players such as system integrators, installers, distributors and importers will be able to identify key market trends through the fringe programme,” said Ms Regina Tsai, the Deputy General Manager of Messe Frankfurt New Era Business Media Ltd. “Three concurrent events of ‘Mobility’, ‘SMABIoT’ (smart building IoT), and ‘Fire & Safety’, each offer insightful seminars and forums for their related sectors, while the ‘Security & AI’ Forum is another significant highlight that will provide visitors with market intelligence and new trends for smart cities, smart factories and more. The information gathered by attendees will be of business value and can be put into use after the show for the benefit of the wider security industry.” The 2018 fringe programme was well received by the industry, and with an updated agenda to fit the requirements of today’s market, fair organisers are anticipating another positive response to the show’s forums and seminars. Security & AI Forum This year’s Security & AI Forum will feature presentations by project managers, engineers and industry experts from Vivotek, Twoway and eRay. AI technology has been at the forefront of a paradigm shift for the security industry, offering automated threat detection with greater and greater accuracies. By exploring new application scenarios for AI, the forum will give attendees insights into business opportunities in verticals such as smart manufacturing. Other points of discussion include the Internet of Things and OSSA (the Open Security and Safety Alliance) – a non-profit organisation that encourages collaboration among security organisations. Intelligent transport solutions (ITS) The ‘Asia Pacific Intelligent Rail Transportation Forum’ takes place on the first day of the programme As the destination for intelligent transportation solutions (ITS), the concurrent ‘Mobility’ event will feature a series of three forums and seminars dealing with the sector’s most innovative technologies. The ‘Asia Pacific Intelligent Rail Transportation Forum’ takes place on the first day of the programme to deliver railway industry updates from across Asia. Topics include future outlooks and the potential for ITS implementation in Taiwan and Malaysia. Among the speakers will be experts from the Taiwan Railways Administration, Gamuda Berhad and CECI Engineering Consultants. Smart transportation solutions The second day of the programme will see speakers from ACCOMP, 3S Pocketnet Technology, GNSS Asia, and STMicroelectronics discuss ITS trends in the wider mobility sector. Among the topics to be explored are video technology solutions and smart transportation platforms On the final day, the subjects of temperature-controlled logistics and fleet management will be covered at the ‘Asia Pacific Cold-Chain Logistics Seminar’. Other topics to be discussed at the seminar include RFID logistics solutions and updates on the local industries in Indonesia, Myanmar and Taiwan. SMABIoT to focus on IoT trends As the first event of its kind in Asia, SMABIoT serves as a business hub for the growing smart building IoT sector. As part of the event, the ‘Asia Pacific Smart Building with IoT Solutions Forum’ has invited leading property developers and engineering companies to share smart building case studies and new trends in sustainability and smart devices. In addition, the aptly named ‘Smart Living Solutions Seminar’ will take place to update the market on new smart solutions for residential communities and home. Speakers at the seminar include industry professionals from Ardomus Networks Corporation, I-TEK, and WFE Technology. Asia Pacific Disaster Management Summit Asia’s fire and safety fraternity also have a lot to look forward to at the fair Asia’s fire and safety fraternity also have a lot to look forward to at the fair. At the concurrent ‘Fire & Safety’ event, the ‘Asia Pacific Disaster Management Summit’ will gather industry experts and government officials from the Philippines, Myanmar, Indonesia and Vietnam. The summit will examine methods of large-scale disaster prevention, earthquake early warning systems, structural safety monitoring systems, the role of IoT in disaster management, recovery plans, flood disaster risk assessments, debris flow management and international co-operation. The upcoming edition of Secutech will be held at the Tapei Nangang Exhibition Center from 8 – 10 May 2019 with more than 400 exhibitors, from 15 countries and regions in attendance. At the previous edition, the fair attracted 19,907 visitors from vertical markets such as building, transportation, retail and manufacturing. The fair is organised by Messe Frankfurt New Era Business Media Ltd and is part of a global network of Safety Security and Fire trade fairs.
It amazes me how in a few short years security systems have gone from simple, dumb cameras witnessing events to intelligent eyes, ears, speech and touch solutions that boost situational awareness far beyond human capabilities. It seems the only senses missing from the equation now are smell and taste. And who knows, someone might be working on those in a lab somewhere right now. But what’s really fascinating to me is how the Internet of Things (IoT) has opened a world of possibilities for transforming security technology into something new yet again. With IoT we’re able to push and pull nuggets of intelligence from sources we never considered before: environmental sensors, pressure plates, door lock timers and much more. It’s helped us break through the constraining mindset that security systems are strictly single-purpose. With interconnectivity at the core, we’re starting to imagine myriad ways to apply these tools to challenges outside the realm of security. Here are just a few examples. Flood management assistance Network camera adds another dimension and timeliness to flood management by helping responders investigate remotely As recent hurricanes and floods have shown, water damage can be devastating to a community. That’s why some municipalities are using their city surveillance cameras in conjunction with water sensor to proactively address the problem. Water sensors collect data from multiple sources such as rain gutters, sewer systems and pump stations, in order to monitor fluctuations in water levels and water quality. If an alert triggers, having a network camera in proximity to visually verify the situation helps responders determine the best course of action. For instance, if multiple water detection sensors trigger alerts simultaneously or sequentially over a large area it’s probably due to natural runoff from recent rainfall. But without eyes on the scene, how can you be sure? Network camera adds another dimension and timeliness to flood management by helping responders investigate and identify the cause of a trigger remotely. It might be a fire hydrant spewing water, a water main break or even a chemical spill. With video streaming live to the command center, staff can remotely inspect the area, determine the cause of the trigger and decide whether remediation is required, thus avoiding the expense of dispatching an investigative crew to a non-event. Some municipalities are using their city surveillance cameras in conjunction with water sensor to proactively address the problem Environmental control assistance Data centers house the lifeblood of a business so it’s no wonder why companies work hard to protect them. We’re all familiar with the integration of network cameras with access control systems to visually verify who is actually using the credentials. Network camera adds another dimension and timeliness to flood management by helping responders investigate and identify the cause of a trigger remotely But there’s another aspect to protecting data centers and that’s environment control. Data centers need to maintain optimum humidity and temperature for the racks of electronics. When environmental sensors in the facility detect out-of-norm ranges technicians can remotely command a network camera to zoom in on the gauges and help them determine whether remediation might be necessary. Coupling network cameras with other sensors in the data center can provide visual confirmation of other conditions as well. For instance, every time a data rack door-open-close sensor detects an event it can trigger the camera to pan to the location and stream video to security. Some data centers employ weight sensors at the doorway to weigh personnel and equipment as they enter the room and when they exit to ensure no additional hardware is being taken out of the facility or left inside without permission. Any discrepancy would trigger the camera to zoom in for a close-up of the individual’s face and send a visual alert and ID information to security. Roadway management and parking assistance Network cameras have long played a part in city-wide traffic management. Adding video analytics and integration with network sensors, makes those cameras that much smarter and versatile. They can detect cars driving in bike lanes or driving in the wrong direction and capture license plates of offenders. Their ability to detect anomalous traffic flow patterns can be integrated with car counting sensors, networked electronic road signs and traffic light systems to automatically redirect vehicles to alternate routes. They make great, intelligent parking lot attendants, too. Working in conjunction with weight sensors network cameras can count vehicles coming into and leaving a lot or garage and verify when the facility has reached capacity. License plate recognition and video analytics can be used to ascertain that a vehicle entering a reserved parking space doesn’t match the credentials and vehicle attributes in the database. With the addition of noise sensors and audio analytics, network cameras can improve roadway and parking facility safety by detecting and identifying specific sounds – breaking glass, car alarms, gun shots, and aggressive speech – and triggering a visual alert to first responders. Network cameras can improve roadway and parking facility safety by detecting and identifying specific sounds and triggering a visual alert to first responders Shopper experience assistance In the early days of online shopping, e-tailers designed their sites to replicate the in-store customer experience. In an ironic turn of events, today brick-and-mortar stores are trying to mirror the online shopping experience. To do so, they’re turning their security systems into adjunct sales assistance. With network video and audio system automation they can recognise and acknowledge loyal customers with personal greetings. Retailers are applying people counting video analytics to checkout activity to create rules-based consistency in customer service With heatmapping analytics they can measure how much time a customer spends in a specific department or observe how they walk through the aisles of the store. They can track shopping behaviors such as items looked at that made it into the cart or didn’t, or whether a customer actually checked out or left the merchandise behind. By capturing these shopping patterns and trends retailers can shape a more positive, more profitable customer shopping experience. For instance, integrating video analytics with point of sale systems and RFID sensors on merchandise tags can result in timely alerts to sales associates to recommend additional merchandise. This is a case of emulating how e-tailers let the customer know that other customers who bought X often also purchased items Y and Z. Or to avoid disappointing customers due to stock outages, retailers are linking weight sensors and video analytics to make sure their shelves are well-stocked and if not, quickly alert associates to what items need to be restocked. Capturing business intelligence Retailers are also using video cameras to monitor checkout queues and trigger automated announcements over the public-address system, closed system such as smartphones or other wireless communications devices that checkers are needed rather wait for a person to call for backup. IoT laid the groundwork for network security solutions to seamlessly integrate with other IP-based technologies, sensors and programs They’re applying people counting video analytics to checkout activity to create rules-based consistency in customer service. While retailers will always use their surveillance camera for loss prevention, they’re finding that integrating traditional technology in new ways can yield even bigger returns. Linking network video surveillance, video analytics, network communications system and sensors with point-of-sale systems and customer loyalty databases, retailers are capturing the business intelligence they need to get back in the game and make brick-and-mortar a greater overall experience than online shopping. A natural cross-over technology This trend towards integration has forever changed how organisations view their investment in security technology. The intelligence and versatility of a tool that can see, verify and analyse what’s happening in real-time is spurring users to tap its cross-over potential for a host of other tasks that could benefit from more astute situational awareness – everything from manufacturing and equipment maintenance to logistics, inventory control and beyond. IoT laid the groundwork for network security solutions to seamlessly integrate with other IP-based technologies, sensors and programs. How we capitalise on that connection is only limited by our imagination.
Over the past few years, biometrics has rapidly expanded into consumer applications, like the financial market for customer authentication, to payment services and withdrawing cash from ATMs in high-fraud markets. However, its adoption as an additional authentication factor for physical access control systems (PACS) and other enterprise applications, hasn’t been as rapid. But this is changing. Biometrics offers numerous benefits at the door and throughout the enterprise. With the advent of new anti-spoofing capabilities, and its integration into secure trust platforms that protect privacy and support a variety of RFID credential technologies, biometric authentication is poised to deliver a much higher matching speed and better overall performance. This will dramatically improve an organisation's security, whilst enhancing user convenience.Newer solutions are overcoming security and convenience hurdles to help realise the full potential of biometrics Challenges for biometric authentication Biometrics fuses convenience and security while validating “true identity” versus identity that is associated to the possession of an ID card. As an example, biometrics prevents a user from taking someone else’s card and obtaining access to privileged resources. This adds the human element to traditional methods of authentication, strengthening security by combining something the user “is” with something the user “has” or “knows.” According to the firm ABI Research in its May 2018 study, Biometric Technologies and Applications, the total fingerprint sensor shipments for the entire consumer market is “estimated to reach 1.2 billion worldwide for 2018, thus ensuring its market dominance.”It has been far too easy for fraudsters to create a fake fingerprint and present it to a reader Despite the benefits of fingerprint authentication in numerous consumer applications, there have been impediments to its broader adoption in the enterprise. While price has been one big roadblock, there have also historically been other reasons for its slower-than-expected growth. First, many technologies are still vulnerable to spoofs and hacking. It has been far too easy for fraudsters to create a fake fingerprint and present it to a reader. Equally troublesome, older products have not been able to move users through the doors as fast as a simple ID card and reader. In general, all fingerprint capture technologies are not equal amongst older products, and there can be significant differences in performance. Developing Technology Performance Newer solutions are overcoming these security and convenience hurdles to help realise the full potential of biometrics. Their development has focused on three key areas: How fingerprint images are captured – if the image can’t be properly captured, the rest of the process fails The implementation of liveness detection to enhance trust – even in the case when the image is properly captured, if it is fake the system cannot be trusted Optimising performance through a combination of new technology and algorithms, whilst ensuring interoperability so the performance can be trusted. The skin is illuminated at different depths to deliver much richer data about the surface and sub-surface features of the fingerprint Optimising capture The quality of the captured image is critical, across all types of fingerprints and environments. Many customers choose sensors that use multispectral imaging because it collects information from inside the finger to augment available surface fingerprint data. The skin is illuminated at different depths to deliver much richer data about the surface and sub-surface features of the fingerprint The skin is illuminated at different depths to deliver much richer data about the surface and sub-surface features of the fingerprint. Additionally, the sensor collects data from the finger even if the skin has poor contact with the sensor, because of environmental conditions such as water or finger contamination. Multispectral sensors work for the broadest range of people with normal, wet, dry or damaged fingers, across the widest range of usage conditions – from lotions or grease to sunlight to wet or cold conditions. The sensors also resist damage from harsh cleaning products and contamination from dirt and sunlight. Liveness detection Liveness detection is the ability to determine that the biometric data captured by the fingerprint reader is from a real living person, not a plastic fake or other artificial copy. An increasingly visible dimension of biometric performance in commercial applications, liveness detection is critical for preserving trust in the integrity of biometrics authentication. At the same time, it must not impede performance or result in excessive false user rejections.While liveness detection optimises performance, it is also important to ensure that this performance can be trusted The most trusted multispectral imaging fingerprint sensors with liveness detection provide a real-time determination that the biometric captures are genuine and are being presented by the legitimate owner, rather than someone impersonating them. This capability leverages the image-capture approach of using different colors or spectrum of light to measure the surface and subsurface data within a fingerprint. In addition to this optical system, the biometrics sensor features several core components, including an embedded processor that analyses the raw imaging data to ensure that the sample being imaged is a genuine human finger rather than an artificial or spoof material. Advanced machine learning techniques are used so the solution can adapt and respond to new threats and spoofs as they are identified. While liveness detection and the underlying capture technology optimises performance, it is also important to ensure that this performance can be trusted. This requires adequate testing to ensure interoperability with template matching algorithms. The first requirement for incorporating biometrics into a physical access control solution is a secure trust platform Trusted performance The top-performing solutions capture usable biometric data on the first attempt for every user. They also speed the process of determining that the biometric data is not a fake, and they quickly perform template matching to reject impostors and match legitimate users.The card/mobile plus finger mode is one of the fastest-growing two-factor authentication use cases for securing access to both physical and digital places To trust this performance, though, the focus must be elsewhere: on interoperability with template-matching algorithms. Extensive interoperability testing must be performed by skilled and independent third parties like the National Institute of Standards and Technology (NIST) so that performance data can actually be trusted in all template-matching modes, and not simply a vendor claim. Template matching modes Template-on-card and card/mobile + finger modes using “1:1” template-matching profiles authenticates a person’s identity by comparing the person’s captured biometric template with one that is pre-stored in a database. Template-on-device mode for finger-only authentication using “1:N” matching compares the person’s captured biometric template against all stored biometric templates in the system). The card/mobile plus finger mode is one of the fastest-growing two-factor authentication use cases for securing access to both physical and digital places.Cryptography prevents any man-in-the-middle attacks while also protecting the biometric database As an example of how to deliver trusted performance, HID Global uses the top-ranked NIST certified MINEX III minutia algorithm to ensure interoperability with industry-standard fingerprint template databases. This interoperability ensures that today’s systems, which are based on much more powerful hardware than in the past, will perform accurate 1:N identification of a full database in less than a second. Physical access control integration The first requirement for incorporating biometrics into a physical access control solution is a secure trust platform designed to meet the concerns of accessibility and data protection in a connected environment. The platform should leverage credential technology that employs encryption and a software-based infrastructure to secure trusted identities on any form factor for physical access control, access to IT networks and beyond. Cryptography prevents any man-in-the-middle attacks while also protecting the biometric database. This system also must encompass remote management of all readers and users, spanning all onboarding as well as template loading and enrolment activities for supported authentication modes. Properly implemented, biometrics solutions with liveness detection also protect privacy – if you can’t use a fake finger, it is meaningless Other important focus areas include configuration and administration, plus all logs, reports and monitoring.New system architectures and data models have been created to protect personal information and maintain user privacy It should be possible to manage biometric readers as groups or individually over the network, and tools should be available to allow system administrators to manage all configuration settings from time and data to language, security and synchronisation. The system should enable continuous live monitoring of authentication, alerts and system health, and provide a rich set of associated reporting tools. There are also backend implementation decisions to be made, including how a biometric authentication system will be seamlessly integrated into third-party systems. This is another major pain point of biometric technology. To simplify deployment, application programming interfaces (APIs) should be available for direct integration of the biometrics authentication solution with the access control infrastructure. Privacy considerations Properly implemented, biometrics solutions with liveness detection also protect privacy – if you can’t use a fake finger, then even if you did obtain someone’s fingerprint data, it is meaningless. Strong and updatable liveness protection is critical if biometrics are to eliminate the need to use PINs or passwords.Strong and updatable liveness protection is critical if biometrics are to eliminate the need to use PINs or passwords Biometrics data must be handled like all sensitive and identifying information, and properly architected system designs will always consider and protect against both internal and external threats and attacks. New system architectures and data models have been created to protect personal information and maintain user privacy. Beyond the encryption of the data itself, there are now many good alternatives available for building highly secure and well protected systems, including the use of multi-factor and even multi-modal authentication to maintain security even if some identifying data is compromised. Today’s modern fingerprint authentication solutions are on a fast track to deliver a unique combination of ease of use, availability and convenience and higher security to physical access control systems. With their latest improvements in liveness detection, system architectures, performance and ability to be easily incorporated into access control solutions, they seamlessly combine security and convenience to make them a viable option when accessing a facility, networks and services. These solutions deliver a higher confidence of “who” is being admitted through the building’s front door, where it really matters.
The Food Standards Agency (FSA) in the UK has begun investigations into meat wholesalers after a raise in concern for food hygiene. This investigation has impacted businesses such as Wetherspoons, as well as schools and care homes up and down the country. Consumers are beginning to lose trust in businesses that are supplied by untrustworthy production companies and it seems to be becoming more common, if we are to look back to the horse meat scandal in 2013. But what are the benefits of having security systems within these types of production facilities? From ensuring consumer confidence, to maintaining quality control within products, what does it achieve? Finally, what crime exists surrounding the industry and how can the implementation of protective systems boost satisfaction? Instant barriers for unwanted people The world is becoming more advanced and revolutionary technology is allowing us to make the necessary changes to ensure ethical working practices — whether this is protecting people from a physical threat or a threat that is much more devious within our foods. Food factories should start with access control systems. This will put an instant barrier between operations and any entry attempts by unauthorised personnel. Whether this a swiped identification card, biometrics or a passcode way of entry, only authorised personnel will be granted access. Revolutionary technology is allowing us to make the necessary changes to ensure ethical working practices Another security system that could be put in place to help food factories and encourage them to work more efficiently is CCTV. By spring 2018, all slaughterhouses within England are required to have CCTV systems in place that can be reviewed by the FSA who have unprecedented access to footage within a 90-day period — is this something we should be looking to do in food factories to ensure safety for the British people? CCTV is a worthwhile investment for production companies who want to gain visibility of their entire operation and gain the respect from consumers across the country. The benefits for CCTV Customer reassurance — as food factories don’t operate openly and everything is hidden away, this instantly creates suspicion from a consumer’s perspective as they will be the ones buying the final product once distributed to stores around the country. CCTV will counter this issue as it shows that operation centres have nothing to hide — giving them the ability to publish any footage if accused of misconduct. Maintaining quality — using more advanced CCTV within food factories will enable production companies to monitor the production line and maintain the standards that they sell themselves on. Sometimes, a human error is unavoidable on a production line after several hours of non-stop work — being able to detect it instantly is essential. Criminal activity across food factories 89% of manufacturers on a global scale were impacted by fraud in 2015 — 2017 saw a 7% rise on this result. It has been proven that CCTV can deter criminals. By installing these systems, food factories can protect themselves from threats that are external and internal as well as being able to support themselves in any claims of violation. Although produced goods have been at the centre of news stories regarding the integrity and containments of what is being delivered, another common crime within this industry is fraud. 89% of manufacturers on a global scale were impacted by fraud in 2015 — 2017 saw a 7% rise on this result. Common perpetrators in fraud When it comes to the most common types of fraud, information theft stood at 30%, compliance breach at 30% and intellectual property theft standing at 26% of the respondents who were asked — all of which could cause great impacts to production lines. It was also found that those who had recently started working for the company, such as junior employees, were the most common preparators when it came to fraud within a manufacturing factory (39%). Temporary manufacturing workers came in at second place with 37%, while those in senior or middle management positions were at 33% — the same as ex-staff members. However, vendors/suppliers who do not have as much access to your business accounted for 33% too. This clarifies that anyone has the potential to commit a crime within a factory. To ensure protection for the British consumer, food production factories should seriously consider implementing similar systems to UK slaughterhouses. This article was contributed by IP security provider 2020Vision.
The mindset behind a new law to prohibit the use of facial recognition and other security-related technologies by San Francisco police and other city agencies is obvious in the name of the new ordinance: “Stop Secret Surveillance.” Ordinance to stop secret surveillance The San Francisco Board of Supervisors passed the ordinance 8-1 with two abstentions on May 14, and there will be another vote next week before it becomes law. We have an outsize responsibility to regulate the excesses of technology precisely because they are headquartered here" The irony of such a law emanating from northern California, where tech giants promote the use of numerous technologies that arguably infringe on privacy, is not lost on Aaron Peskin, the city supervisor who sponsored the bill. “We have an outsize responsibility to regulate the excesses of technology precisely because they are headquartered here,” he told the New York Times. Regulating facial recognition technology Although the facial recognition aspects of the ordinance have been the most publicised, it also targets a long list of other products and systems. According to the ordinance, "Surveillance Technology" means “any software, electronic device, system utilising an electronic device, or similar device used, designed, or primarily intended to collect, retain, process, or share audio, electronic, visual, location, thermal, biometric, olfactory or similar information specifically associated with, or capable of being associated with, any individual or group.” Broadly interpreted, that’s a lot of devices. Includes biometrics, RFID scanners The ordinance lists some examples such as automatic license plate readers, gunshot detection hardware and services, video and audio monitoring and/or recording equipment, mobile DNA capture technology, radio-frequency ID (RFID) scanners, and biometric software or technology including facial, voice, iris, and gait-recognition software and databases. Among the exceptions listed in the ordinance are physical access control systems, employee identification management systems, and other physical control systems; and police interview rooms, holding cells, and internal security audio/video recording systems. The ordinance ban applies to city departments and agencies, not to the general public and exceptions include physical access control systems, employee identification management systems, and internal security audio/video recording systems Airport security not part of ordinance The ban only applies to city departments and agencies, not to private businesses or the general public. Therefore, San Franciscans can continue to use facial recognition technology every day when they unlock their smart phones. And technologies such as facial recognition currently used at the San Francisco airport and ports are not impacted because they are under federal jurisdiction. Furthermore, the San Francisco police department does not currently use facial recognition anyway, although it has been deployed in places such as Las Vegas, Orlando, Boston and New York City. Safeguarding privacy of citizens The ordinance appears to have a goal of avoiding government uses of technologies that can invade individual privacy, seeking to avoid worst-case scenarios such as an existing system in China that uses millions of surveillance cameras to keep close tabs on the Uyghurs, a Muslim minority population. Any new plans to use surveillance technology must be approved by the city government, and any existing uses must be reported and justified by submitting a Surveillance Technology Policy ordinance for approval by the Board of Supervisors within 180 days. Surveillance technology policy Banning use of facial recognition just when its capability is being realised is counterproductive But might such a ban on technology uses undermine their potential value as crime-fighting tools just when they are poised to become more valuable than ever? Ed Davis, a former Boston police commissioner, told the New York Times it is “premature to be banning things.” He notes: “This technology is still developing, and as it improves, this could be the answer to a lot of problems we have about securing our communities.” Technology development doesn’t happen in a vacuum and banning uses of facial recognition and other technologies just when their capabilities are being realised is counterproductive. We should be thoughtful, deliberate and transparent in how we embrace new technologies. However, discarding them out-of-hand using emotionally charged words such as “secret surveillance” does not promote the best use of technology to the benefit of everyone.
The Global Security Exchange (GSX) seems smaller this year, which is not surprising given the absence on the show floor of several big companies such as Hikvision and ASSA ABLOY (although their subsidiary HID Global has a big booth). A trend affecting the number of companies exhibiting at GSX 2018, and other trade shows, is industry consolidation, which is impacting the show even beyond the fewer exhibitors this year in Las Vegas. GSX is the new branding for the trade show formerly known as ASIS. There was an impressive crowd of visitors waiting for the show floor to open Tuesday morning; the conference part of the program began on Monday. After the attendees filed through the doors, the foot traffic seemed brisk throughout the morning, and was somewhat steady until the end of the first day. Exhibitors as a whole seemed pleased with the first day and cautiously optimistic about the rest of the show. Acquisitions and consolidation HID Global announced on the first day that they will acquire Crossmatch - emphasising the impact of consolidation Emphasising the impact of consolidation on the industry as a whole, and on this show, was an announcement from HID Global on the first day that they will acquire Crossmatch, a biometric identify management and secure authentication solutions provider. It’s a comparatively large acquisition for the company specialising in trusted identity solutions. Just days earlier, another acquisition also seemed to confirm the trend when UTC Climate, Controls and Security — the owner of Lenel — announced an agreement to acquire S2 Security. The fruits of another recent acquisition was on display at the GSX 2018 hall, where Isonas took its place near the front entrance as part of the Allegion booth, just three months after the global security provider acquired the ‘pure IP access control company.’ Isonas is well positioned in two of the three fastest growing segments of the access control market — IP hardware, which is growing 41 percent per year globally, and access control as a service, or ‘cloud’ technology, which is also outpacing the overall access control market. Allegion also has the third fast-growing segment, wireless locks, covered with its Schlage brand. "New avenues of growth" The early days of new ownership is opening fresh opportunities for both organisations as Allegion seeks to leverage Isonas’ intellectual property and the smaller company finds new avenues of growth in the larger organisation, says Rob Lydic, Isonas Global Vice President of Sales. Motorola joined Avigilon in a higher profile role at their booth, emphasizing consolidation in the industry Lydic sees a likelihood of additional acquisitions in the near future in the security space, given the large amount of capital currently available to be deployed, and the large number of entrepreneurial companies looking to make the leap, as Isonas did, from a small booth at the back of the hall to front-and-center as part of a big industry player. Another reflection of consolidation: Motorola Solutions is taking a much higher-profile role in the Avigilon booth. In addition to signage, ownership by Motorola is also impacting the Avigilon product offerings. For example, the Motorola Ally security incident management and communications system has been integrated with Avigilon’s analytics-based event detection, and is being positioned to serve the enterprise market. The system simplifies security operations with a single platform that allows access to critical data, including video and access control systems, directly from any web-enabled device. Another reflection of consolidation: Motorola Solutions is taking a much higher-profile role in the Avigilon booth Avigilon is displaying Motorola Solutions’ CommandCenter Aware integrated with Avigilon’s systems for use with public safety applications to provide dispatchers and intelligence analysts with video feeds, incident details, alerts, data mapping and responder location. Avigilon has also integrated its AI-driven Appearance Search technology with its Access Control Manager system, so video searches can be performed based on a badge credential. The system can automatically pull up any information, whether video or events in the access control system, based on the badge information. It can also be used to search for lost badges, or to view where a person is located in the building. Avigilon introduced an AI appliance that allows existing cameras to be integrated with Appearance Search The company introduced an AI appliance that allows existing (non-Avigilon) cameras (up to 20 two-megapixel cameras) to be integrated with Appearance Search. Also, the next generation of analytics allows detection of more things, such objects a person may be holding, or detection based on what they are wearing. The growth of the cannabis market Although attendees at GSX are generally understood to be more end users than integrators, Joe Grillo, CEO of ACRE, the parent company of Vanderbilt Industries and ComNet, says he sees little difference in attendees at GSX compared to the ISC West show in the spring. “We see all our resellers here,” he says. Grillo noticed that Day One booth traffic was “not consistently busy, but steady.” Grillo says ACRE expects to be active again soon in the mergers and acquisitions market. The company has grown through six acquisitions since its founding, and has had one divestiture (when it sold Mercury Security to HID last fall). Since selling Mercury, ACRE has been ‘back in the buying mode,’ just looking for the right opportunity, says Grillo. New markets are a theme at GSX, and one of the biggest new opportunities is the cannabis industry. Marijuana has been legalised in dozens of U.S. states, and Canada is on the verge of legalising the drug. March Networks works with multiple cannabis operators to provide video solutions, point-of-sale transaction data, and customer analytics March Networks is among the companies targeting the cannabis industry in a big way. Already across the U.S., March Networks works with multiple cannabis operators to provide video solutions, point-of-sale transaction data, and customer analytics. The business intelligence solutions also aid compliance in the highly-regulated industry. March Networks provides radio frequency identification (RFID) tag to track plants throughout the channel, and tracking is integrated with video systems to provide correlated video views. A couple of exhibitors mentioned to me the need for commercial companies to deploy a comparable level of automation as their employees are accustomed to in the smart home environment. That suggests a need for things such as smartphone integration and voice commands. One exhibitor putting its toe in the water is Hanwha Techwin, which showed an Amazon Echo device used to control a video management system (VMS) with voice commands. Could the simple integration be a preview of the future of control rooms, where security officers merely talk to their equipment rather than operating controls? We’ll be talking to more companies (and maybe a few machines) on Day Two of the show, and will be reporting what we hear.
There’s a new big player – and familiar household name – coming into the security marketplace with the announcement of Motorola’s intent to acquire Canadian video manufacturer Avigilon Corporation, provider of video surveillance and analytics. Motorola Solutions points to an “avalanche of video in public and private sectors” as a motivation for the acquisition. Motorola Solutions’ dominance in the public safety market – where the Chicago company supplies police technologies, radios and other products – will provide new opportunities for Avigilon in a realm where it previously has not been dominant. Avigilon has millions of cameras deployed across airports, rail, streets, and public and private buildings. Meanwhile, Avigilon will “bring [its] advanced video surveillance and analytics platform to [Motorola’s] rapidly evolving public safety workflow,” according to Motorola, and enhance the larger company’s portfolio of “mission-critical communications technologies.” Avigilon’s end-to-end security and video surveillance platform includes cameras, analytics, video management and video storage. Avigilon has millions of cameras deployed across airports, rail, streets, and public and private buildings The broader solution Early clues point to Motorola positioning Avigilon as part of a broader solution, especially in the municipal/safe cities market. The company says the acquisition will enable more safe cities projects and more public-private partnerships between local communities and law enforcement. Motorola sees Avigilon as “a natural extension to global public safety and U.S. federal and military” applications, according to the company. The all-cash deal pays CAD$27.00 per share of Avigilon, and totals approximately $1 billion including Avigilon’s net debt. Not a bad price considering Avigilon’s stock price has traded as low as $13 a share in the last year. Avigilon has 1,200 employees with locations in Vancouver and Richmond, British Columbia, and Dallas and Plano, Texas. Revenue was $354 million in 2016. The transaction is expected to be completed in Q2 of 2018. Deploying pre-engineered solutions As an innovator in the security market, Avigilon has spearheaded an end-to-end solutions approach. Their success has even prompted some component manufacturers to expand their proposition into a broader “solutions” sale. Led largely by Avigilon, the industry pendulum has swung toward the simplicity of deploying pre-engineered end-to-end solutions. Open systems integrated using best-in-breed components from several manufacturers still have their devotees, and are needed in some situations, but Avigilon has made a strong case for the end-to-end alternative. Others have followed. The all-cash deal pays CAD$27.00 per share of Avigilon, and totals approximately $1 billion including Avigilon’s net debt Avigilon has also lately been a leader in implementing artificial intelligence and deep learning, including Appearance Search technology that can locate a vehicle or person from video across a site. Avigilon’s video surveillance platform seeks to transform video from reactive – looking back at what has taken place – to proactive, issuing alerts in real time. Avigilon also recently introduced Avigilon Blue cloud service platform to enable video system users to manage more sites with fewer resources. Investing and building Motorola is not a completely new name to the security market. Old-timers will remember Motorola Indala, a previous presence in the RFID access control market that was sold to HID Corp. in 2001. More recently, Motorola Solutions has invested in Vidsys, a provider of converged security and information management (CSIM) software and has implemented Vidsys CSIM through its Protect Series unified platform that aggregates and analyses information from multiple inputs for military and federal government properties. Motorola is also known as the inventor of the Six Sigma quality improvement process - and commitment to quality plays well among security integrators and end users. Motorola would presumably continue Avigilon’s licensing program, but rules-based video analytics patents’ importance may fade Avigilon owns 750 U.S. and international patents, including some covering basic underlying principles of video analytics, for which several video companies currently pay licence fees. Motorola would presumably continue the licensing program, although the importance of rules-based video analytics patents may fade as new deep learning and artificial intelligence (AI) approaches to video analytics emerge. Channel conflict A possible concern surrounding the acquisition is the issue of channel conflict. When it comes to larger end user customers, Motorola has embraced a direct-to-user approach that could be problematic in the eyes of Avigilon’s 2,000 resellers. Among the benefits Motorola says they bring to the table is the ability to “leverage [their] direct enterprise safes force for large deals.” They also say they “complement Avigilon’s channel with [Motorola’s] channel network.” The security industry has a spotty history of larger companies entering the market to buy existing businesses. Some have been a good fit, while others have not. The entrepreneurial spirit of more than one successful security company has suffered under larger corporate ownership, sometimes withering as new corporate overlords cut costs and stifle R&D. The more successful recent large acquisitions in our market – notably Canon’s acquisition of Milestone Systems and Axis Communications – have worked well because the acquired companies have retained some degree of independence and preserved the existing corporate culture. In the case of Motorola and Avigilon, obviously, time will tell.
CoreRFID supplies the UK's largest outsourcing company Serco with 100,000 RFID access cards for its Caledonian Sleeper railway service. The cards will provide passengers with access to rooms and will improve security on routes between London and Scotland. The cards are completely re-usable and replace paper-based RFID tickets, which were judged to not be as cost effective in the long-term. Specialist locks Serco had specialist locks provided by a Spanish company and needed cards which were compatible" Munzi Ali, technical director of CoreRFID comments: “Our knowledge and experience on similar work in the hotel industry helped us to meet the challenges of this project. Serco had specialist locks provided by a Spanish company and needed cards which were compatible. Consultancy is a big part of the larger projects we undertake and we were able to solve the issue with Serco.” The Caledonian Sleeper service, which is operated by Serco as a standalone franchise, can trace its origins back to 1873. It serves a number of destinations in Scotland - including Inverness, Aberdeen, Fort William, Glasgow and Edinburgh - on route to and from Euston Station. RFID solutions Graham Kelly, guest experience director at Serco Caledonian Sleeper, said: "Our new trains are designed to improve every aspect of the guest experience. We strive to deliver a hotel experience and a major part of that is having keycard entry for rooms. We've only been running our new trains for a few weeks but the feedback from guests on the keycard has been excellent, with CoreRFID's solution proving extremely effective." Ali added: “RFID solutions can provide real benefits in efficiency, costs and in this case significantly cutting down on waste.” CoreRFID's clients include ICL, London Underground and Thomas Cook.
Responsible for the safety and security of a huge number of public facilities, including leisure centres, libraries and event spaces, local authorities are increasingly looking for ways to improve security, while also streamlining the security management process. With multiple requirements from a legislative, insurance and public safety perspective, local authorities need a simple and effective solution that provides flexibility through advanced technology. Security must be closely monitored and access restricted where necessary, while at the same time enabling easy access to public areas. Electronic key technology Advanced software suites can provide access to all operations performed by users Through innovative electronic key technology, local authorities can simply and cost-effectively replace existing mechanical locks, with a solution that provides integrated intelligence in the key, with permissions stored within it. If your key has authorisation for that lock, it will open. If you don’t, you won’t be allowed to enter and all of the activity carried out by your key will be recorded. With high volumes of people entering and exiting local authority facilities, it is important to be able to trace who has been where, when and for how long. Advanced software suites can provide access to all operations performed by users, including a complete audit trail. This information is often used by local authorities for audits, improvements or compliance. Utilising the latest contactless technology further enhances the electronic key solution, enabling multiple access options and deeper levels of access rights. Manage access operations The most innovative system is compatible with badges and cards, and the keys are equipped with a radio-frequency identification (RFID) module. Combining the solutions enables local authorities to manage access operations in great detail, with access rights granted depending on specific conditions. For example, the members of an orchestra may only be able to access the music conservatory, using their membership card or badge, if a music professor has already entered the premises using his electronic key. Permissions can be added or updated from a computer or, even more conveniently, using an app on a smartphone at any time, which will update your key's permissions via Bluetooth. This allows shortened validity periods, constrains movements to be in line with local authority access policies and removes travel and fixed authoriser costs. Public safety and security Saint-Avertin's access points are now managed by the new LOCKEN solution In turn, this delivers increased flexibility and higher levels of security. With public safety and security high on the government’s agenda, local authorities are increasingly required to adopt the most technologically advanced access control solutions and LOCKEN, the leader in cable free access control solutions is on hand to help with their solution based on advanced software LOCKEN Smart Access. Equipped with LOCKEN electronic cylinders since 2010, Saint-Avertin's access points are now managed by the new LOCKEN solution. More efficient and communicative, this makes it possible to adapt to even more varied types of access. Laurent Lacour, head of the municipal police, highlighted the benefits of this decision: “It is a very positive step for us. Firstly, because the new contactless key is much faster than the previous one. It is impressive and very important for our day-to-day work: as soon as the key is entered into the lock, the cylinder opens. It opens regardless of whether any dust or foreign bodies have built up." New-generation keys “Above all, the MyLocken app significantly enhances the system’s security by allowing rights to be allocated anywhere and at any time.” Christophe Fort, deputy head of the police, added: “The new-generation keys offer another vital advantage for our town. The system is compatible with the use of badges and the keys are equipped with an RFID module, which acts as a badge.” While an electronic key cannot be given to every member of a sports association, it is possible to give the members a badge. This means that, eventually, several thousand people will have access to the facilities while respecting the security of the premises as a whole. Access control solution Combining the solutions does not stop the management system from remaining perfectly effective" “Combining the solutions does not stop the management system from remaining perfectly effective. On the one hand, because the program manages access operations in great detail. And on the other, the badge reader specific to a building is only triggered if access to the site has previously been unlocked by an electronic key belonging to a manager. For example, the members of a swimming association will only be able to access the building if a swimming pool manager is already on the premises.” The future prospects mentioned by the two police officials - installation in a new gymnasium, fitting electronic padlocks to the mobile barriers around the château, etc.- demonstrate the extent to which the solution meets the municipality's needs across the board. Saint-Avertin, is a dynamic town with a population of 15,000, which forms part of the university town of Tours, twenty times larger. LOCKEN hopes to extend its access control solution to other areas of this historic city.
IndiaNivesh is one of the leading financial services conglomerate in India. IndiaNivesh is into various aspects of investment banking and consulting business. It plans to emerge as a dynamic, customer-centric, and progressive financial group in the country with PAN India presence. Having its head office in Mumbai, IndiaNivesh is growing with eight regional offices and 29 branch offices across India. Project specifics Application: Time-Attendance and Access Control Locations: 32 (PAN India) Users: 500 Units Installed: 60 Readers: Fingerprint and RFID Card IndiaNivesh being widely involved in financial services business with 29 branch offices and 8 regional offices across India, required eradication of forged attendance data and manual attendance process, as security is a crucial aspect for them. To streamline and manage attendance data of all employees accurately and perform calculation of error-free salary has been a tedious task. It has been challenging to integrate their existing payroll software with the time-attendance software. COSEC time-attendance solution Matrix offered COSEC time-attendance solution helped in connecting all its regional and branch offices to their head office in Mumbai Matrix offered COSEC time-attendance solution which has web-based architecture and helped in connecting all its regional and branch offices to their head office in Mumbai. Implemented automatic salary calculation as Matrix COSEC time-attendance software got easily integrated with existing payroll software. Result Real-time attendance of all employees at a centralised location Integration with its existing payroll software Ease of Implementation using the existing infrastructure Fraudulent timekeeping is completely eliminated Accurate In/Out time of each employee recorded Live monitoring of In/Out timing Generation of time-attendance and access control reports and charts for all branches Improved overall productivity of the organisation Continuous operations with excellent service support Biometric access control solutions COSEC DOOR FOP - Optical fingerprint-based door controller for access control and time-attendance COSEC DOOR CAS – Card-based door controller for access control and time-attendance COSEC PANEL - Site controller to manage multiple door controllers and advanced access control Features COSEC LE PLATFORM - Application server platform for 1000 users and expandable up to one million users COSEC LE TAM - Comprehensive time-attendance and leave management module for COSEC LE platform COSEC LE ACM - Comprehensive access control module for COSEC LE platform
HID Global, provider of trusted identity solutions, announces that the European Molecular Biology Laboratory (EMBL) in Grenoble, France has selected HID’s radio frequency identification (RFID) tags and its patented direct bonding technology for automated handling of biological samples at cryogenic temperatures of 196°C (-321° F) in liquid nitrogen. EMBL Grenoble creates high-resolution pictures and 3D atomic models of biological macromolecules using a specialised imaging process called macromolecular crystallography (MX). These images are useful for studying biological materials, developing highly efficient medicine, and fighting cancer more effectively. Limited storage density The images require molecular samples to be prepared in a crystalised form and frozen The images require molecular samples to be prepared in a crystalised form and frozen. Handling these samples is a complex task: tiny crystals must be grown, harvested, frozen on a sample holder at the tip of a tiny needle, and stored in liquid nitrogen at cryogenic temperatures and identified for further processing while remaining cool. Most current sample holders used in MX imaging offer limited storage density and poor initial crystal-positioning, which affects processing and limits the benefits of automated crystal harvesting systems. As a result, EMBL set out to design a storage and identification solution robust enough to function at extreme cold temperatures, but small enough to facilitate high precision and storage density. It also needed to support high-speed, automated handling by robots. Direct bonding technology “The HID Global technology has proven to be reliable against temperature cycling between room and liquid nitrogen temperatures, and the HID team was very supportive in helping us with our new designs,” said Florent Cipriani, Head of Instrumentation Team, EMBL Grenoble. HID’s direct bonding further allows the secure attachment of antennas to chips without the bulk of added modules Embeddable RFID tags and direct bonding technology from HID were chosen for identification in EMBL’s new sample holders due to the tags’ tiny footprint, proven track record to work in cryogenic environments, and ability to be custom designed to meet the needs of EMBL. HID’s direct bonding further allows the secure attachment of antennas to chips without the bulk of added modules, making the units the smallest HF formats available in the market that deliver uncompromised performance. Reliable sample tracking “HID Global’s proven RFID technology has been used in various cryogenic environments for years,” said Richard Aufreiter, Director Product Management, Identification Technology with HID Global. “It was a natural partnership between HID and EMBL to design a tracking system resistant to frosting and other aspects of extreme cold. Our team worked directly with EMBL engineers to ensure the best tracking system was deployed in their newly designed sample storage solution.” With HID technology, EMBL developed two new sample holders optimised for high throughput, precision, and reliable sample tracking of more than 200 thousand crystals per year. The new RFID-enabled sample holders increase throughput by allowing the crystal harvesting, cryogenic storage, and MX beamline feeding process to be fully automated using robot grippers and specifically designed RFID readers. Available memory space in the RFID tags can store additional information about the samples.
Most retailers invest in a video surveillance solution to improve security. Many also use it as an investigation tool to help resolve customer disputes, liability claims and reduce losses from theft and fraud. Intelligent video solutions Complete Releaf relies on its intelligent video solution for all of those reasons, however compliance with state regulations was the primary objective when CEO and owner Eric Ryant started looking for a video system for his new, 3,000 square foot cannabis dispensary in Lafayette, Colorado. Unlike many other types of retail environments, cannabis dispensaries must comply with strict rules governing the type of video surveillance equipment used, where cameras and equipment are placed, and how long video evidence must be retained. Already familiar with the regulations based on his experience operating a second dispensary and a cultivation centre in Lafayette, Colorado, Ryant sourced multiple bids for his new video solution. In the end, I selected the March Networks proposal. It had everything I was looking for, including POS integration, and additional capabilities" POS integration “Once all the bids were in, I went through the process of analysing each one and ended up narrowing the contenders down to two,” said Ryant. “In the end, I selected the March Networks proposal from our systems integrator, Falcon Networks. The solution had everything I was looking for, including POS integration, and additional capabilities I thought might be useful down the road. It met all of the compliance criteria, and the price was comparable.” Prior to opening the boutique dispensary in January 2018, Ryant worked with its system integrator to design and install a fully-compliant video solution. IR dome cameras Today, IR dome cameras mounted inside the dispensary capture clear 4MP video of all activity at entrances and exits, in storage and equipment rooms, and at each point-of-sale (POS) system. In addition, 360° cameras are installed above the sales floor and in every corner to provide further panoramic coverage. The 360° cameras are also installed on the dispensary’s exterior to capture people entering and exiting, as well as any activity in the surrounding parking lot and back loading area. The cameras were selected and placed strategically to ensure that the system meets multiple legislated requirements, such as recording all activity occurring within 20 feet of any ingress/egress point, capturing clear video in all lighting conditions, and making sure that the recorded video is sharp enough to identify customer and employee facial features at each POS. Hybrid network video recorder At the centre of Complete Releaf’s video solution is a hybrid network video recorder (NVR) At the centre of Complete Releaf’s video solution is a hybrid network video recorder (NVR). The recorder provides IP and analog video capture and unparalleled reliability through features such as diagnostic LEDs, an internal battery backup, and a customised embedded Linux operating system. All IP channel licenses are included with the recorder, making it a convenient and cost-effective option for the dispensary. Equally important, the recorder provides Complete Releaf with 32TB of internal storage, so it is compliant with the state’s 40-day video retention requirement. “Essentially, we need 100 percent coverage with no ‘blind spots’ on our retail floor, and a clear picture of people’s faces. It’s a truly reliable product, and we’ve had no difficulties achieving our 40 days of archived video,” said Ryant. Searchlight intelligent software While security and compliance were both top priorities for Ryant, finding a video solution that would also help him run Complete Releaf more efficiently – and profitably – was also important. That’s why he’s so pleased with the March Networks Searchlight for Retail application software he is also using. The intelligent software enables Ryant and his team to proactively identify and review suspect transactions using integrated video and transaction data pulled from the dispensary’s Green Bits POS system. It provides them with an easy-to-use loss prevention tool that reduces the time it takes to investigate incidents from hours to minutes. It also arms them with strong video and data evidence to support successful prosecutions or recoveries. Ryant is also testing the Searchlight application in his cultivation facility “Having video surveillance in our dispensary definitely deters theft,” said Ryant. “Combining the video with transaction data goes a step further and really causes people to think twice before they do something they’ll probably regret.” Radio Frequency Identification tags Ryant is also testing the Searchlight application in his cultivation facility, taking advantage of the software’s ability to integrate with data from the Radio Frequency Identification (RFID) tags he is required to add to each plant through the cultivation process as part of Colorado’s Inventory Tracking System (Metrc). The software would enable Ryant to leverage his RFID investment by making the data searchable in the dashboard and tying it to recorded video. If there’s ever an incident during the cultivation process, Ryant could use the software to easily locate the video footage to see what actually happened and who was involved.
Losing keys is a given. It’s just something that happens at some point. One study in the UK estimated around 10,000 annually end up just in the refuse, by mistake*. At CROUS Montpellier student accommodation block in southern France, they sought a solution to lost keys and the other hassles of managing an outdated mechanical master-key system for a large facility with a transient population. Aperio wireless locking devices CROUS Montpellier fixed lost key problems by exchanging their mechanical locks for Aperio cylinders. Aperio wireless locking devices with built-in RFID readers are already trusted at universities all over Europe to protect staff, students and assets against burglary and unauthorised intruders. Easy-to-fit Aperio locks have transformed facility management for the accommodation block. To date, 1,500 wireless Aperio cylinders are seamlessly integrated online with their ARD security system, which gives facility managers an overview of block security in real time. Aperio cylinders integrated with ARD security system Now, when a student loses their key-card, it’s simple for a site manager to cancel the old credential and issue a new one. There is no need to engage a locksmith to replace physical locks, saving everyone’s time and CROUS money. A constant drain on resources has been eliminated. Aperio easily integrates with payment and other smart-card systems, as well as access control Because Aperio integration at CROUS is online, managers block lost credentials quickly using the software, without visiting the door. It is just as easy to de-authorise credentials for students who leave, even if they forget to return their smart-card. An operator simply removes them from the system database, and they are locked out. Aperio-access control system integration Aperio easily integrates with payment and other smart-card systems, as well as access control. “Aperio provides a comfortable access solution. Our students can access their accommodation, use the printer and pay in the canteen with the same card,” explains Cyril Combacal at CROUS Montpellier. Because Aperio is easily scalable and can expand any security system when needs change, investments in new wireless locking can be rolled out over time. It has made logistics and budgeting much easier for CROUS. Refurbishment at CROUS Montpellier is ongoing: up to 500 new Aperio cylinders are installed efficiently and wirelessly every year.
Round table discussion
Using a smart phone as an access control credential is an idea whose time has come – or has it? The flexible uses of smart phones are transforming our lives in multiple ways, and the devices are replacing everything from our alarm clocks to our wallets to our televisions. However, the transformation from using a card to using a mobile credential for access control is far from a no-brainer for many organisations, which obstacles to a fast or easy transition. We asked this week’s Expert Panel Roundtable: When will mobile credentials dominate access control, and what are the obstacles to greater adoption?
Hospitality businesses work to provide a safe and pleasant customer experience for their guests. Hotels offer a “home away from home” for millions of guests every day around the world. These are businesses of many sizes and types, providing services ranging from luxury accommodations to simple lodging for business travelers to family vacation experiences. Hospitality businesses also include restaurants, bars, movie theaters and other venues. Security needs are varied and require technologies that span a wide spectrum. We asked this week’s Expert Panel Roundtable: What are the security challenges of the hospitality market?
People using computers to surf the Internet is "so 20th century". Today, the big trend involves machines using the Internet to communicate, exchange and analyse data in what has widely become known of as the Internet of Things. Various security devices are among the IoT components, and how devices connect effectively using the Internet – even devices not related to security – will constitute a large part of the future business of security integrators and installers, whether in the residential space or eventually in the enterprise sector. We asked this week's Expert Panel Roundtable to look ahead: What will be the impact on the security market of the “Internet of Things”?