Security access systems
Being able to verify people’s identities is critical for a nation’s growth and prosperity and yet nearly half of all African citizens can’t prove who they are to vote, travel freely and receive government benefits and services. HID Global, globally renowned trusted identity solutions provider, is launching an initiative to help close this identity gap and will be sharing details at the ID4Africa Movement (ID4Africa 2019). The three-day conference will be hosted this week from 1...
HID Global, a provider of trusted identity solutions, will showcase its latest physical access control and secure identity solutions at IFSEC London in Hall 7, stand IF 2130, June 18-20. For the first time in the UK, HID Global will present its recently launched biometric fingerprint reader for secure access control, and a new, game-changing augmented reality tool. The company will also highlight new integrations using HID’s cloud-based card issuance for streamlined enterprise deployments...
Morse Watchmans, the industry pioneer in key control and asset management systems, is showcasing the benefits of their KeyWatcher Touch and AssetWatcher key and asset management solutions at IFSEC International 2019 (stand no. IF620) in London, from June 18-20. The company is also introducing KeyWatcher Fleet, a key control system specifically for fleet management, to IFSEC attendees. “We’re thrilled to once again showcase the exciting features of our AssetWatcher and KeyWatcher Tou...
Controlsoft, global developer, manufacturer and distributor of access control solutions, has fully integrated its latest Identity Access platform with the Aperio wireless locking technology from the ASSA ABLOY Door Hardware & Access Control Group. Identity Access platform upgraded By updating and upgrading its Identity Access platform to fully integrate with the Aperio AH30 1-to-8 communication hub, Controlsoft’s customers can easily add mechanical doors to their existing access cont...
The healthcare sector is a crucial part of a functioning society as it provides life-saving care and reassurance to the population. A key part of ensuring the professionals in this industry have the best work environment is the ongoing security of the facilities. Overcoming environmental challenges Hospitals are challenging environments for security integrators. There is little room for mistakes because staff, patients and assets cannot be compromised. Medical centres and their facilities can...
According to a recent report published by business intelligence provider IHS Markit, Genetec Inc., a technology provider of unified security, public safety, operations, and business intelligence solutions, was named the world’s number one vendor of Video Management Systems (VMS). IHS-reported results from 2015-2018 also point to the company sustaining a 24.1% CAGR (compound annual growth rate) for the past 3 years in this category. In the Americas, Genetec remains the leading VMS manufact...
Access control manufacturer Inner Range will be rewarding lucky visitors to its stand with a drone every day of IFSEC International (June 18-20). Delegates who watch a demonstration of an Inner Range product will be invited to enter their details into the manufacturer’s flagship product, Integriti, and the system will randomly select a winner at the end of each day. Winners will receive a Holy Stone Mercury 3 racing drone, which can travel at 45km an hour and transmit HD video and aerial photos in real time. The camera, which has a 120-degree wide-angle lens, is easy to install or remove, and the drone is designed to reduce wind resistance for more stable filming conditions. Integration of Inception with XProtect VMS The integration allows the Inception controller to become the security and access mechanism supporting the Milestone systemInner Range has two demonstrations linked to IFSEC’s official ‘Show Me How’ series of presentations and trials. The first showcases how Inner Range’s Entry-level access control system, Inception, can now integrate with the Milestone XProtect video management system. The integration allows the Inception controller to become the security and access mechanism supporting the Milestone system. Inner Range’s Enterprise-level intelligent integrated access control system, Integriti, will also feature in the ‘Show Me How’ series. Delegates can see how ‘user qualifications’ can boost health and safety procedures, or ease car park credit renewals by alerting users when qualifications or credits are about to expire. Chance to win a racing drone Tim Northwood, General Manager at Inner Range said: “We love showing what our products can do and will happily demonstrate any aspect of our systems that people are curious about. To add an element of fun, anyone who has had a demonstration can enter our prize draw to win a racing drone. IFSEC is full of technology enthusiasts and drones are the latest gadget, whether people use them for serious business purposes or fly them just for fun. We hope delegates will like them, either way.” The Inner Range stand will include eight large screens to demonstrate the manufacturer’s access control systems The Inner Range stand (Stand IF1030) will include eight large screens to demonstrate the manufacturer’s award-winning access control systems and software in action at IFSEC International on June 18-20 at ExCel London. Inner Range has been a pioneer in the design and manufacture of intelligent security solutions since it was established in 1988. More than 150,000 Inner Range systems have been installed in over 30 countries. Customers include hospitals and high-security units, colleges, distribution centres and pharmaceutical companies, government and critical national infrastructure.
PAC & GDX, providers of access control and door entry solutions, are showcasing the range and depth of their innovative technology on Stand IF2930 at IFSEC International 2019. From a single door installation to a fully integrated network based system, the company’s extensive portfolio provides unbeatable reliability and robust functionality, at a price point that enables installation in a diverse range of residential and commercial buildings. In order to provide integrators and end users with the highest level of flexibility and ease of operation, PAC & GDX have joined forces with STid, the principal manufacturer of instinctive, contactless security technologies. NFC based readers By incorporating STid’s Bluetooth and NFC based readers with PAC or GDX controllers, a mobile phone can be used to gain access. To enjoy all the benefits of a handsfree option, all an individual has to do is tap their phone twice and the Bluetooth signal is sent to the reader to unlock a door. By downloading the STid app a virtual credential can be configured in a smartphone wallet By downloading the STid app a virtual credential can be configured in a smartphone wallet, allowing the user to have multiple virtual ‘keys’ for different areas or sites. The system can also be configured to use proximity based near field communication (NFC) instead of Bluetooth, or a combination of the two. Furthermore, it is available with a PAC or PAC 64 output and, when using a PAC 512 or PAC 212 access controller, two readers can be connected to provide true read in/out from a single channel. Access control systems Also on display is the PAC Residential Cloud solution, which leads the way in allowing organisations to remotely manage and monitor their access control systems in a secure, modern and cloud based environment. Users can address technical issues, deal with key fob management, view status, set and unset a system, and gain access to an event log more easily than ever before – all from a remote location. Various site communication options are available including PSTN, GSM and GPRS and it can be configured and managed via a smartphone, tablet or PC. At IFSEC PAC is demonstrating how Residential Cloud can be integrated with 3xLOGIC cameras to provide a fully hosted solution, which is perfect for the residential sector. This system allows designated personnel to be notified if, for example, a door is forced or left open. Network switches By sending an alarm to the camera, it starts to record and transmits images to a mobile device via a push notification. This allows the system to provide vital information that elicits a fast response and immediate action. With an optional camera, a backlight LED to provide clear visitor images in low light levels Sharing the limelight with STid and Residential Cloud is GDX7 – a next generation IP based door entry system that offers integrated access control for up to 1,000 keyholders using a standard two-core cable. With an optional camera, a backlight LED to provide clear visitor images in low light levels, and an inbuilt reader, GDX7 has an incredibly high level of functionality and enables integrators to install an IP system without being skilled in IT or familiar with network switches. Identification devices The GDX7 door entry panel can be provided with multiple button options, including those that meet the requirements of the Equality Act, and its readers and identification devices have also been approved by Secured by Design – a police service initiative that aims to improve the security of buildings. Already a huge success, GDX7 has a new seven-inch apartment station and a new landing card, which enables it to provide up to 96 handset connections. It too has recently been augmented with STid integration providing property owners, engineers or contractors with a flexible way of gaining access to remote properties. “PAC & GDX are driven by constant innovation and the desire to push the boundaries of what’s possible with access control,” commented David Hughes, the company’s global product manager. “We also pride ourselves on our customer service and technical support, which includes the provision of a new online training platform that offers a great way to get the most out our products.”
Frontier Pitts will be exhibiting at the IFSEC Exhibition at Excel, London between the 18th and 20th of June 2019. Frontier Pitts will be showcasing a fully operational Secured by Design accredited LPS1175 Automatic Bi-folding Gate SR2 on the stand. This is the first automatic Bi-folding Speed Gate on the market to achieve Secured by Design accreditation and LPS1175 Security Rating! Many clients had been installing unrated Security Gates that had not been tested alongside LPS1175 security rated fence lines. By testing and upgrading certain elements on all models of their Automatic Security Gates, Frontier Pitts is now pleased to bring to the market the first complete LPS1175 Anti-Intruder Gate Range to the market, introducing another perimeter security layer to the security onion. Platinum Automatic Security Gate range Frontier Pitts can offer the complete solution for all Mob Attack scenarios and Crowded Place, Public Realm venuesThe Platinum Automatic Security Gate range with Security Ratings of 2 and 3 includes: Platinum Sliding Gate up to 10m wide Platinum Bi-folding Gate; double leaf up to 10m wide, single leaf up to 5m wide Platinum Hinged Gate; double leaf up to 10m wide, single leaf up to 5m wide Platinum Pedestrian Gate: Fully Automatic, Semi-Automatic, Manual operation. The Platinum range joins the large portfolio of high security products, further bridging the gap between Frontier Pitts Security Range and their high security Anti-Terra IWA14/PAS68 impact tested products, enhancing their accreditations further. They can offer the complete solution for all Mob Attack scenarios and Crowded Place, Public Realm venues. Frontier Pitts’ technical consultants will be available to discuss the perimeter security requirements, and advise on the best IWA 14, PAS 68 & LPS 1175 solutions.
Meesons, one of the UK’s leading specialists in entrance control, has strengthened its commercial team as part of its ongoing business expansion. Ciprian (Cip) Cioclei, joins as Business Development Manager for London and the South East and has a wealth of experience in the access solutions industry gained over the past 10 years. At Meesons, he will be responsible for developing new business opportunities for the company’s renowned products, including Speed Gates and Security Portals for the new build and refurbishment markets. Physical entrance control solutions expert Cip has extensive knowledge of working with system integrators looking for a robust physical entrance control solution Cip has extensive knowledge of working with architects, contractors and system integrators looking for a robust physical entrance control solution, which means Meesons customers will gain from his extensive understanding of this specialist area. Prior to joining Meesons, Cip worked at a global security and entrance systems company. Recent installations and the development of innovative new products at Meesons was a strong signal to Cip that the company was moving forward and was a key player in the entrance control market. Meesons has grown significantly in this market over the last few years with a large number of high profile installations, many in iconic buildings throughout the UK. Construction and engineering major The Meesons team has been strengthened further with the appointment of Nic Cowley as Project Manager for London and the South East. He will work alongside Meesons’ existing team of Project Managers. Nic brings with him extensive experience of managing construction projects from call off, scheduling, installation, commissioning and hand over. Meesons customers will benefit from his extensive experience in the construction industry and his proven track record of delivering projects efficiently, on time and within budget. Speed Gate and Security Portal solutions The appointment of these two industry specialists mean that Meesons' customers will continue to receive a joined up approach from the first point of contact, through to handing the completed Speed Gate or Security Portal solution over to the client. “We have strengthened our team in the South due to continued business growth and our pipeline of projects to deliver”, said Michael Clark, Chief Operating Officer at Meesons. “We feel it is important to offer our customers an end-to-end solution from first enquiry through to completion on site. Both Cip and Nic bring a wealth of experience with them. Security specifiers that choose Meesons can be assured that they are partnering with the UK’s trusted entry control innovator.” Entry control solutions Meesons has supplied and installed its Speed Gates and Security Portals into a number of landmark buildings With over 30 years’ worth of experience delivering secure entry control solutions, Meesons has supplied and installed its Speed Gates and Security Portals into a number of landmark buildings. This has included recent projects such as 10 South Colonnade, St James Market, Southbank Place, The Scalpel, 1 Canada Square and 2 London Wall Place, all located in the city, along with many other sites across a wide range of sectors throughout the UK. Meesons has recently introduced a number of innovative, first to market products including its C3 and C190-S1 to S3 Security Portals, the first in the world to gain approval to Loss Prevention Standard (LPS) 1175: Issue 7 Security Ratings 1 to 3 and Secured by Design. FPJ140 2SF Security Portals More recent innovations include its FPJ140 2SF Security Portals achieving fire protection and smoke control on both sides of the flat side doors as per the European Fire Resistance norm: EN 13501-2 & EN 1634-1: 2014. Meesons is committed to developing innovative new products where there is a market need, in line with its mission to ‘help you keep your premises and staff safe and secure from unauthorised personnel’. Meesons is on target to deliver significant growth during 2019, with strategic plans in place to continue this throughout 2020 and beyond.
SimonsVoss Technologies GmbH, part of the Allegion group - a pioneer in digital locking and physical access control systems - enters a technology partnership in Europe with Morphean. The new technology partnership, that will utilise SimonsVoss’ digital access control system SmartIntego, extends Morphean’s cloud-based capabilities beyond video surveillance and into the access control-as-a-service (ACaaS) market, forecast to reach US$2.8b by 2024. Integrated security system We are seeing considerable growth in demand for wireless locks" The secure Morphean platform informs decision making and drives efficiencies for organisations by generating unique and actionable insights from a multitude of data sources. The combination of an integrated security system hosted in the cloud that now combines video surveillance and access control promises not only greater security with two factor authentication but also a wealth of rich data. This will help businesses optimise operations and processes, such as by gaining greater insight into customer and employee behaviours or how office space is utilised. Martyn Ryder, VP Sales & Marketing at Morphean says, “We are seeing considerable growth in demand for wireless locks so we welcome this timely agreement to partner with SimonsVoss. This will allow us to extend our current access control offering and meet growing market and customer demand for both wired and wireless locking solutions via our cloud managed access control solution. The powerful combination of video security and access control as-a-service will bring many operational and business benefits for our customers across Europe and beyond.” Access control data The advance of smart cities, a more stringent regulatory environment and rising crime rates are some of the factors behind the appeal of ACaaS and outsourcing access control functions to guarantee accurate maintenance of key cards. Digital access control systems are valued highly in security technology for buildings" With this system set up, only access control hardware systems are deployed on premise while the software and access control data are shifted to a remote location and provided as a service to users on a recurring monthly subscription. The benefits of such an arrangement are numerous but include avoiding large capital investments and shifting the onus of cybersecurity and firmware updates to the vendor. “Digital access control systems are valued highly in security technology for buildings,” commented Evert te Pas, International Sales Manager at SimonsVoss. Snap-in installation “SmartIntego by SimonsVoss is a state-of-the-art digital access control solution that is easy and simple to deploy into existing physical and digital infrastructure such as doors and IT networks. The cable free and snap-in installation means it is compatible with most doors with no drilling of holes, so is scalable and flexible without limitation.” Morphean’s ACaaS system utilises door controllers from Axis Communications, namely the AXIS A1001 and the AXIS A1601, that serve as the interface between the cloud and the SimonsVoss’ SmartIntego system. Stephanie Hensler, Director Business Development at Axis Communications, said, “Axis is totally committed to this market and creating innovative solutions based on its open standards that allow partners to integrate different types of software and hardware for a fully scalable, flexible and future proof solution. We look forward to working even more closely with Morphean.” Morphean will be attending IFSEC 2019, 18-20 June, ExCel, London (Axis stand IF920).
Cable-free access control provider, LOCKEN has launched a new website, which reflects its position as a market pioneer, showcasing its expertise and commitment to innovation and future technologies. Following the company’s merger with ISEO, LOCKEN is increasing its activity within new and emerging markets and is continuing to create innovative solutions that are tailored to its clients’ individual demands and requirements. Industries served by LOCKEN With 15 years’ knowledge and experience, the new website provides information about the variety of specialist industries which LOCKEN services, including water, utilities, telecoms, transport and local government. Testimonials from some of LOCKEN’s flagship clients demonstrate the international reach of its expertise and the ability to meet customer requirements. Catherine Laug, Marketing & Communication Manager at LOCKEN explains: “Our new website is the face of our commitment: there, you'll find all of our specialist industries, customer testimonials and our software solutions, product ranges and news.”
In 2017, IoT-based cyberattacks increased by 600%. As the industry moves towards the mass adoption of interconnected physical security devices, end users have found a plethora of advantages, broadening the scope of traditional video surveillance solutions beyond simple safety measures. Thanks in part to these recent advancements, our physical solutions are at a higher risk than ever before. With today’s ever evolving digital landscape and the increasing complexity of physical and cyber-attacks, it’s imperative to take specific precautions to combat these threats. Video surveillance systems Cybersecurity is not usually the first concern to come to mind When you think of a video surveillance system, cybersecurity is not usually the first concern to come to mind, since digital threats are usually thought of as separate from physical security. Unfortunately, these two are becoming increasingly intertwined as intruders continue to use inventive methods in order to access an organisation's assets. Hacks and data breaches are among the top cyber concerns, but many overlook the fact that weak cybersecurity practices can lead to physical danger as well. Organisations that deploy video surveillance devices paired with advanced analytics programs often leave themselves vulnerable to a breach without even realising it. While they may be intelligent, IoT devices are soft targets that cybercriminals and hackers can easily exploit, crippling a physical security system from the inside out. Physical security manufacturers Whether looking to simply gain access to internal data, or paralyse a system prior to a physical attack, allowing hackers easy access to surveillance systems can only end poorly. In order to stay competitive, manufacturers within the security industry are trading in their traditional analogue technology and moving towards interconnected devices. Due to this, security can no longer be solely focused on the physical elements and end users have taken note. The first step towards more secured solutions starts with physical security manufacturers choosing to make cybersecurity a priority for all products, from endpoint to edge and beyond. Gone are the days of end users underestimating the importance of reliability within their solutions. Manufacturers that choose to invest time and research into the development of cyber-hardening will be ahead of the curve and an asset to all. Wireless communication systems Integrators also become complicit in any issues that may arise in the future Aside from simply making the commitment to improve cyber hygiene, there are solid steps that manufacturers can take. One simple action is incorporating tools and features into devices that allow end users to more easily configure their cyber protection settings. Similarly, working with a third party to perform penetration testing on products can help to ensure the backend security of IoT devices. This gives customers peace of mind and manufacturers a competitive edge. While deficient cybersecurity standards can reflect poorly on manufacturers by installing vulnerable devices on a network, integrators also become complicit in any issues that may arise in the future. Just last year, ADT was forced to settle a $16 million class action lawsuit when the company installed an unencrypted wireless communication system that rendered an organisation open to hacks. Cybersecurity services In addition, we’ve all heard of the bans, taxes and tariffs the U.S. government has recently put on certain manufacturers, depending on their country of origin and cybersecurity practices. Lawsuits aside, employing proper cybersecurity standards can give integrators a competitive advantage. With the proliferation of hacks, malware, and ransomware, integrators that can ease their client's cyber-woes are already a step ahead. By choosing to work with cybersecurity-focused manufacturers who provide clients with vulnerability testing and educate end users on best practices, integrators can not only thrive but find new sources of RMR. Education, collaboration and participation are three pillars when tackling cybersecurity from all angles. For dealers and integrators who have yet to add cybersecurity services to their business portfolios, scouting out a strategic IT partner could be the answer. Unlocking countless opportunities Becoming educated on the topic of cybersecurity and its importance for an organisation is the first step Physical security integrators who feel uncomfortable diving headfirst into the digital realm may find that strategically aligning themselves with an IT or cyber firm will unlock countless opportunities. By opening the door to a partnership with an IT-focused firm, integrators receive the benefit of cybersecurity insight on future projects and a new source of RMR through continued consulting with current customers. In exchange, the IT firm gains a new source of clients in an industry otherwise untapped. This is a win for all those involved. While manufacturers, dealers and integrators play a large part in the cybersecurity of physical systems, end users also play a crucial role. Becoming educated on the topic of cybersecurity and its importance for an organisation is the first step. Commonplace cybersecurity standards Below is a list of commonplace cybersecurity standards that all organisations should work to implement for the protection of their own video surveillance solutions: Always keep camera firmware up to date for the latest cyber protections. Change default passwords, especially those of admins, to keep the system locked to outside users. Create different user groups with separate rights to ensure all users have only the permissions they need. Set an encryption key for surveillance recordings to safeguard footage against intruders and prevent hackers from accessing a system through a backdoor. Enable notifications, whether for error codes or storage failures, to keep up to date with all systems happenings. Create/configure an OpenVPN connection for secured remote access. Check the web server log on a regular basis to see who is accessing the system. Ensure that web crawling is forbidden to prevent images or data found on your device from being made searchable. Avoid exposing devices to the internet unless strictly necessary to reduce the risk of attacks.
Edge devices (and edge computing) are the future. Although, this does seem a little cliché, it is the truth. The edge computing industry is growing as quickly as technology can support it and it looks like we will need it to. IoT global market The IoT (Internet of Things) industry alone will have put 15 billion new IoT devices into operation by the year 2020 according to a recent Forbes article titled, “10 Charts That Will Challenge Your Perspective of IoT’s growth”. IoT devices are not the only edge devices we have to deal with as the total number of connected edge devices includes the likes of devices like security devices, phones, sensors, retail sales devices, and industrial and home automation devices. The IoT (Internet of Things) industry alone will have put 15 billion new IoT devices into operation by the year 2020 The sheer number of devices begins to bring thoughts of possible security and bandwidth implications into perspective. The amount of data that will need to be passed and processed with all of these devices will be massive. There needs to be consideration taken by all business owners and automation engineers into how this amount of data and processing will be conducted. Ever-expanding edge devices market As the number of edge devices in the marketplace and their use among consumers and businesses rises, the need to be able to handle the data from all of these devices is no longer going to be suitable for central server architectures. We are talking about hundreds of billions and even trillions of devices. According to IHS Markit researchers’ study, there were 245 million CCTV cameras worldwide. One has to imagine there are at least 25% of that many access control devices (61.25 million devices) based on a $344 million market cap also calculated by IHS Markit’s researchers. If all the other edge devices mentioned earlier are considered then one can see that trying to route them all through servers for processing is going to start to become difficult if it hasn’t already, -which arguably it already has, as is evidenced by the popularity of cloud-based solutions amongst those businesses that already use a lot of edge devices or are processing a lot of information on a constant basis. Cloud computing The question is whether cloud computing the most effective and efficient solution as the IoT industry grows The question is this; is cloud computing the most effective and efficient solution as the IoT industry grows and the amount of edge devices becomes so numerous? My belief is that it is not. Taking the example of a $399 USD device that is just larger than the size of a pack of cards and runs a CPU benchmarked at the same level as a mid-size desktop. This device has 8GB RAM and 64GB EMMC built-in and a GPU that can comfortably support a 4K signal at 60Hz with support for NVMe SSDs for add-on storage. This would have been unbelievable five years ago. As the price of edge computing goes down, which it has done in a dramatic way over the last 10 years (as can be seen with my recent purchase), the price to maintain a central server that can perform the processing required for all of the new devices being introduced to the world (due to the low cost of entry for edge device manufacturers) becomes more expensive. This introduces the guarantee that there will be a point where it will be less expensive for businesses, and consumers alike, to do the bulk of their processing at the edge as opposed to in central server architectures. Cloud computing is now being overtaken by edge computing, the method of processing data at the edge of the network in the devices themselves Edge computing There are a plethora of articles discussing and detailing the opposition between the two sides of the computing technology coin, cloud computing and edge computing. The gist of it is that “cloud computing” was the hot new buzzword three years ago and is now being overtaken by “edge computing.” The truth is that cloud computing is a central server architecture hosted at someone else’s location. Edge computing is going to be a necessary development in the technology industry Edge computing is the method of processing data at the edge of the network (in the devices themselves) and allowing for less resources required at a central location. There is certainly a use case for both, however the shift to edge computing amongst the general public and small to mid-sized businesses will not be a surprise to those players, who have been paying attention. One article titled, “Next Big Thing In Cloud Computing Puts Amazon And Its Peers On The Edge” by Investor’s Business Daily takes the stance that edge computing is going to completely displace centralised cloud computing and even coins the phrase, “Cloud computing, decentralised” to explain edge computing. It speaks for the stance that most experts in technology seem to be taking, including Amazon Web Services’ VP of Technology, Marco Argenti according to the same article. We know that edge computing is going to be a necessary development in the technology industry, and it is happening as I write this, and quickly at that. Cost efficiency of edge processing As time goes on, the intersection between the prices of network bandwidth, edge processing and maintaining super powerful central servers will cause edge processing to be the most efficient and cost-effective way to maintain a scalable network in any environment, including datacenters. Owning a central server or utilising edge computing become the better options As it currently stands, most residential users can only achieve a 1Gbps WAN (internet) connection, and small to medium-sized business can’t get much more but seem to get much less, based on my personal experience. When more than 1Gbps needs to be processed, cloud computing becomes very expensive at which point, owning a central server or utilising edge computing become the better options. Then you look a total cost of ownership and when the cost of edge computing is less expensive than the cost of maintaining central server architectures, edge computing becomes the single best option. So, I’ll say it again, edge devices (and edge computing) are the future.
Johnson Controls recently unveiled the findings of its 2018 Energy Efficiency Indicator (EEI) survey that examined the current and planned investments and key drivers to improve energy efficiency and building systems integration in facilities. Systems integration was identified as one of the top technologies expected to have the biggest impact on the implementation in smart buildings over the next five years, with respondents planning to invest in security, fire and life-safety integrations more so than any other systems integration in the next year. As advanced, connected technologies drive the evolution of smart buildings, security and safety technologies are at the center of more intelligent strategies as they attribute to overall building operations and efficiencies. SourceSecurity.com spoke with Johnson Controls, Building Solutions, North America, VP of Marketing, Hank Monaco, and Senior National Director of Municipal Infrastructure and Smart Cities, Lisa Brown, about the results of the study, smart technology investments and the benefits of a holistic building strategy that integrates security and fire and life-safety systems with core building systems. Q: What is the most striking result from the survey, and what does it mean in the context of a building’s safety and security systems? The results show an increased understanding about the value of integrating safety and security systems with other building systems Hank Monaco: Investment in building system integration increased 23 percent in 2019 compared to 2018, the largest increase of any measure in the survey. When respondents were asked more specifically what systems they we planning to invest in over the next year, fire and life safety integration (61%) and security system integration (58%) were the top two priorities for organisations. The results show an increased understanding about the value of integrating safety and security systems with other building systems to improve overall operations and bolster capabilities beyond the intended function of an individual system. Q: The survey covers integration of fire, life safety and security systems as part of "smart building" systems. How do smarter buildings increase the effectiveness of security and life safety systems? Hank Monaco: A true “smart building” integrates all building systems – security, fire and life-safety, HVAC, lighting etc. – to create a connected, digital infrastructure that enables individual technologies to be more intelligent and perform more advanced functions beyond what they can do on their own. For example, when sensors and video surveillance are integrated with lighting systems, if abnormal activity is detected on the building premise, key stakeholders can be automatically alerted to increase emergency response time. With integrated video surveillance, they also gain the ability to access surveillance footage remotely to assess the situation. When sensors and video surveillance are integrated with lighting systems abnormal activity on the premise can automatically be detected Q: How can integrated security and life safety systems contribute to greater energy efficiency in a smart building environment? Hank Monaco: Security, fire and life-safety systems can help to inform other building systems about how a facility is used, high-trafficked areas and the flow of occupants within a building. Integrated building solutions produce a myriad of data that can be leveraged to increase operational efficiencies. From an energy efficiency standpoint, actionable insights are particularly useful for areas that are not frequently occupied or off-peak hours as you wouldn’t want to heat or cool an entire building for just one person coming in on the weekend. When video surveillance is integrated with HVAC and lighting systems, it can monitor occupancy in a room or hallway. The video analytics can then control the dimming of lights and the temperature depending on occupant levels in a specific vicinity. Similarly, when access control systems are integrated with these same systems, once a card is presented to the reader, it can signal the lights or HVAC system to turn on. In this example, systems integration can ultimately help enable energy savings in the long run. Security and life safety systems contribute to help enable greater energy efficiency and energy savings in the long run Q: What other benefits of integration are there (beyond the core security and life safety functions)? Hank Monaco: Beyond increased security, fire and life-safety functions, the benefits of systems integration include: Increased data and analytics to garner a holistic, streamlined understanding of how systems function and how to improve productivity Ability to track usage to increase efficiency and reduce operational costs Enhanced occupant experience and comfort Increased productivity and workflow to support business objectives Smart-ready, connected environment that can support future technology advancements Q: What lesson or action point should a building owner/operator take from the survey? How can the owner of an existing building leverage the benefits of the smart building environment incrementally and absent a complete overhaul? Lisa Brown: Johnson Controls Energy Efficiency Indicator found that 77% of organisations plan to make investments in energy efficiency and smarter building technology this year. This percentage demonstrates an increased understanding of the benefits of smart buildings and highlights the proactive efforts building owners are taking to adopt advanced technologies. There is an increased understanding that buildings operate more effectively when different building systems are connected As smart buildings continue to evolve, more facilities are beginning to explore opportunities to advance their own spaces. A complete overhaul of legacy systems is not necessary as small investments today can help position a facility to more easily adopt technologies at scale in the future. As a first step, it’s important for building owners to conduct an assessment and establish a strategy that defines a comprehensive set of requirements and prioritises use-cases and implementations. From there, incremental investments and updates can be made over a realistic timeline. Q: What is the ROI of smart buildings? Lisa Brown: As demonstrated by our survey, there is an increased understanding that buildings operate more effectively when different building systems are connected. The advanced analytics and more streamlined data that is gathered through systems integration can provide the building-performance metrics to help better understand the return on investment (ROI) of the building systems. This data is used to better understand the environment and make assessments and improvements overtime to increase efficiencies. Moreover, analytics and data provide valuable insights into where action is needed and what type of return can be expected from key investments.
Who is more likely to rob your home – a friend or a stranger? Is a burglary more likely to occur when you are at home or away? Does gun ownership contribute to more effective home security? What about a loud, barking dog? A recent survey by Reviews.org considered these and other consumer preconceptions about home security and how they compare with the facts. "Everyone wants to feel safe at home but not everyone knows which home safety measures will actually help protect them,” says Mindy Woodall, Reviews.org’s Home Security Expert. “This survey was interesting because it gives us a better idea of how some people think about home security and what measures they personally feel they should take to protect themselves and their families, as well as how their chosen methods compare to what experts say actually works." Survey results and facts Here are some of the survey’s results (compared with the facts, according to experts): Survey results: 50.4% of respondents thought a stranger is most likely to rob them, while 28% thought a friend (even a social media friend) is most likely to rob them. Another 21.6 percent thought a family member most likely to rob them. Fact: In robberies, 65.1% of attackers are someone the victim knows. In nonviolent robberies, 30% of attackers are known to the victim, 24% are strangers, and 46% are unable to be identified. Survey results: Guns were voted as providing the most effective home security by 24.4% of respondents, while 20.6% rated them as least effective. The next highest percentage, 22.8%, thought a professional home security system is the most effective. Only 11.8% of people thought dogs to be the most effective method for home security, although burglars often recommend a loud dog to deter theft (it ranked third most effective). Fact: Residents are three times more likely to be robbed if they don’t have a security system. Time when burglary takes place Survey results: 89.4% of people (correctly) thought that they are most likely to be burglarised when away from home. Survey results: 44.2% of people thought that burglaries occur in the middle of the night, between midnight and 5 a.m. (which conflicts with the above stat because most people are at home during those times.) Fact: Burglaries are more likely during the day, between 10 a.m.– 3 p.m., when people are away from home for work and errands, and kids are at school. Survey results: 50.8% of respondents don’t think burglars knock on the door before breaking in. Fact: Burglars often knock on the door before entering. It’s a good way to see if anyone is home, or if there is a big noisy dog on the premises. If anyone answers, they often say they were looking for their friend’s house, need directions, or will offer cleaning/repair services. The survey results from consumer website Reviews.org are based on a survey of 500 people in the United States of varying ages and locations to find out what they thought they knew about home break-ins, robbers, and burglars.
The focus of the global security industry will shift to London this month for IFSEC International, Europe’s ‘integrated’ security event focusing on the latest technologies and the opportunity to learn from the industry’s top leaders and experts. IFSEC will be held from 18-20 June, 2019, at ExCel London, welcoming 27,000 security directors and managers, installers, integrators and distributors. The exhibition at IFSEC may not be as large as previous years, and several big players are conspicuously absent. Even so, there will be plenty of innovation on display, including big exhibitors such as Avigilon, Axis, Dahua, dormakaba, FLIR, Genetec, Hanwha Techwin, HID Global, Hikvision, IDIS, and Uniview. Exhibitions will likely reflect a continuing shift in emphasis away from individual products and toward integrated solutions, including some end-to-end solutions provided by single manufacturers. Also, likely to be abundantly evident at IFSEC will be a trend toward manufacturers who partner together to provide integrated solutions. For example, look for some manufacturers to host other manufacturers at kiosks within their stands. Texecom will explain the value of training and digital services and their impact on the future of the industryValue of security training Emphasis will continue to be on the practical aspects of using technology: Throughout the show floor, designated technicians wearing ‘Show Me How’ badges will provide demonstrations of products and solutions on display at the various stands. Texecom will explain the value of training and digital services and their impact on the future of the industry. The Loss Prevention Certification Board (LPCB) Attack Testing Zone features LPCB’s security experts conducting live attack tests on a range of perimeter and façade security products, as well as safes, security enclosures and padlocks. More than 35 hours of seminar sessions will cover timely topics such as ‘Future Proof your CCTV Networks’, ‘Social Media and Internet Security’ and ‘AI and Machine Learning for Security’. Security topics at the Keynote Arena This year, topics will include video analytics, AI, machine learning, GDPR, Brexit and security in smart citiesThe new programme will replicate last year’s successful changes. The Keynote Arena will again be placed at the heart of IFSEC, sponsored by Western Digital. The Keynote Arena will host influential speakers and real-life case studies to inspire attendees. Topical issues will take front and centre, from cybersecurity to ethical and legal challenges to extremism. This year, topics will also include video analytics, AI, machine learning, GDPR, Brexit and security in smart cities. The Future of Security Theatre will present CPD-accredited sessions and presentations that share a vision of the industry’s future and answer burning questions about critical topics, technologies and issues. Education partner Tavcom will present the programme of education dedicated to the ideas, products and innovations driving the industry’s development. The Converged Security Theatre will highlight new approaches that combine cyber and physical defences to tackle dangerous security threats. Included will be real-time technical solutions enhanced by artificial intelligence, powered by Vidsys and partners. Participation by government organisations The Government Pavilion will feature representatives from government bodies such as JSaRC, DIT, and DSOFor the third consecutive year, The Government Pavilion will feature representatives from government bodies such as JSaRC (Home Office & Counter Terror Unit), the Department of International Trade (DIT), and the Defence & Security Organization (DSO). New this year will be participation by the British Transport Police. IFSEC 2019 will again present a snapshot of how manufacturers from across video, access control and intrusion detection are continuing to innovate and collaborate to stay competitive in the challenging market. Innovations first unveiled in the spring at the ISC West 2019 show in the United States will be promoted anew for the European and global markets. IFSEC will be co-locating with FIREX International, a dedicated fire safety event that attracts 18,000 fire prevention and protection professionals; the FACILITIES Show highlighting building management and workplace technologies; and the Safety & Health Expo, dedicated to innovative health and safety products. IFSEC attendees can access the Smart Buildings Expo, the Workplace Wellbeing Show, and the Sprinkler & Suppression Presentation Area within the co-located events.
Among the cloud’s many impacts on the physical security market is a democratisation of access control. Less expensive cloud systems are making electronic access control affordable even to smaller companies. Cloud-based access control With the growing cloud-based access control market, integrators can find more opportunities in small businesses and vertical markets that typically wouldn’t be on the radar of their sales team. Large upfront costs for a server, software and annual licensing previously made a typical electronic card access system cost-prohibitive. With cloud access, integrators can offer less expensive upfront costs with low monthly subscription fees that cover all software updates, database backups, security patches and more. The benefit for the integrator is recurring revenue that increases their profitability The benefit for the integrator is recurring revenue. While helping clients save money on server, software and IT infrastructure costs, integrators secure recurring revenue that increases their profitability. Building recurring revenue not only provides cash flow but also keeps a manufacturer’s name on the top of the minds of customers and leads to additional sales. Mobile access Continued investment in mobile access and cloud technology is essential to meet the access control needs of the booming multi-family housing and shared office-space markets. Managing access control for end users and residents in these verticals is challenging. Use of mechanical keys in these environments is too expensive and time consuming; it’s necessary to deploy wireless, technologically-advanced solutions. Managing access control for end users in different verticals is challenging, thus it’s necessary to deploy wireless, technologically-advanced solutions While the security industry has traditionally been slow to adopt IT technologies, the cloud is the exception. Large IT industry cloud players such as Amazon Web Services, Microsoft, and Google are being used by security industry professionals to provide systems that are easier to install, maintain, and administer and are far more secure and less expensive than a customer can provide on their own. Advancing cloud technology Cloud technologies give people access through their mobile phones and other devices Enterprise customers increasingly want to be able to use smartphone apps to open doors, authenticate to enterprise data resources or access a building’s applications and services. They seek to create trusted environments within which they can deliver valuable new user experiences; in effect, there is a demand for “digital cohesion.” Cloud technologies are a key piece of the solution. They give people access through their mobile phones and other devices to many new, high-value experiences. At the same time, they help fuel smarter, more data-driven workplace environments. With the arrival of today’s identity- and location-aware building systems that recognise people and use deep learning analytics to customise their office environment, the workplace is undergoing dramatic change. Application programming interfaces Cloud-based platforms and application programming interfaces (APIs) will help bridge biometrics and access control in the enterprise, overcoming previous integration hurdles while providing a trusted platform that meets the concerns of accessibility and data protection in a connected environment. Cloud-based platforms, APIs will help bridge biometrics and access control in the enterprise “A big growth driver for the cloud is demand from enterprises that no longer look at access control simply for securing doors, data and other assets,” says Hilding Arrehed, Vice President of Cloud Services, HID Global, one of our Expert Panelists. “They want to create trusted environments within which they can deliver valuable new experiences to users. Cloud technologies make this possible by enabling people to use mobile devices for new applications and capabilities.”Cloud-based platforms and application programming interfaces (APIs) will help bridge biometrics and access control in the enterprise Cloud-based platforms For example, cloud-based platforms will provide the backbone for quickly adding complementary applications like biometrics, secure print, virtual photo IDs, and vending as well as other access control use cases and emerging permission-based capabilities yet to be developed. “Cloud-based platforms facilitate new managed service models for mobile IDs and secure issuance and will fuel simplified development environments and easy integration into vertical solutions,” says Arrehed. “They have the potential to give organisations greater flexibility to upgrade and scale security infrastructure, improve maintenance and efficiency, and accelerate ROI.”
NEC Corporation has announced that NEC Technologies India (NECTI), a pioneer in the integration of IT and network technologies, has partnered with the Centre for Development of Advanced Computing (C-DAC) to deploy its industry-leading automated fingerprint identification system (AFIS) for the Kerala State Police in India. The new AFIS will be used by the Kerala State Police to match unknown fingerprints against a central database of known fingerprints for criminal investigation. More than 600 police/enforcement facilities across the state, including police stations and the district police headquarters, will have access to the system for verification and new registration of fingerprints. Faster and accurate fingerprint verification The new system is able to enhance the quality of fragmented fingerprints captured at crime scenesThis new system will help state police accelerate investigations more efficiently by providing a faster and more accurate fingerprint verification. The new system is able to enhance the quality of fragmented fingerprints captured at crime scenes and makes it possible to match the prints against the central database. NEC's AFIS boasts the world's no. 1 authentication accuracy and is a core technology of the company's portfolio of leading biometric solutions, ‘Bio-Idiom’. Mr. Takayuki Inaba, Managing Director, NECTI, said, "NEC has always been at the forefront of public safety. As a world leader in biometrics technologies, we are delighted to be working with C-DAC and the Kerala State Police to implement a new fingerprint recognition infrastructure, and are committed to building safer and smarter cities in India."
A boiler business subjected to hundreds of thousands of pounds of theft has installed Palisade fencing, electric doors and barriers to combat the threat. Perimeter security specialists Fieg Access Systems (FAS Ltd) of Madeley have beefed up protection at the victimised business on recommendations made by security consultant John Bracewell. He recommended Palisade fencing from Wolverhampton steel fencing manufacturer Zaun Ltd, the first panels of which were delivered within a week. Bracewell said: “Their service was excellent; their product is always top quality; and their lead times and delivery were great – and the combination of measures should drive the thieves away.” Uncompromised site security Zaun’s Palisade fencing comes with either ‘D’ or ‘W’ and with three different pale head options – triple point, round and notched and single point – in heights from 1.2m to 3.6m. Palisade fencing panels can be easily raked to follow the undulations of the site without compromising the rigidity of the system or the security of the site. Zaun is the sole remaining manufacturer of Palisade, welded and woven mesh fencing systems that manufactures the entire system in the UK. FAS Ltd was initially set up to provide the end user with a repair and service provider of perimeter security and access control equipment. The business now fabricates its own gates and supplementary equipment from a factory in Madeley, Telford.
South Africa’s Athlone Campus is home to the Western Cape College of Nursing, a sprawling complex of lecture halls, administration blocks and four hostels that house around 2000 nursing students. Gallagher Command Centre was chosen as the most effective system to manage access to the hostels and keep the students safe. The nursing college had no method of limiting access to its hostels. People came and went as they liked, there was no record of who was on site and it was difficult to enforce visitor hours. Theft was a problem and reported cases of sexual assault had become a major concern. Access needed to be more secure. Access control system for authorised entry Biometric fingerprint readers were mounted on turnstiles at each of the hostel entrances and exits to manage general accessSafety and security are essential to providing a healthy living and learning environment for students. Athlone Campus partnered with local security solutions provider, FS Systems, to install access control and video surveillance in its hostels. Gallagher Command Centre was chosen to manage the access control system, monitoring access points and allowing only authorised students, staff and visitors to enter the hostel buildings. Biometric fingerprint readers were mounted on full-height turnstiles at each of the hostel entrances and exits to manage general access. Fingerprint readers prevent unauthorised entry from people using lost or loaned cards, and the anti-passback measures built into Command Centre means students can’t ‘pass in’ a visitor or bypass the system, as it recognises and records that someone has tried to enter twice. Integrated visitor management system Gallagher’s integrated visitor management system now monitors visitors and allows the college to control visiting hours. Visitors to the college hostels must register at reception and have their fingerprint captured by the visitor management system. They are then granted access to only the hostel they are visiting. In the evening, the system generates an alarm and reports on visitors still on site – allowing security to ask people to leave and prevent further visitors from entering. The general feeling from students and staff is that they are more secure" Jason Adams, Cost and Estimating Manager for FS Systems says, “The general feeling from students and staff is that they are more secure knowing that everyone entering the facility has gone through some sort of screening or registration process at the security office. The presence of physical security barriers (full-height turnstiles) is reassuring, in that not just any person can gain entry without the necessary authorisation.” Installation of video surveillance solution Alongside access control, the college installed a comprehensive video surveillance solution to reduce incidents of violence, vandalism and crime. The entire video management system is seamlessly integrated with Command Centre, creating one easily managed security solution to track student, staff and visitor movements and ensure that when an incident does occur, security staff are quickly informed and able to respond effectively. “It’s essential for the system to be user-friendly and easy to operate and manage,” says Jason. “The detailed maps that appear onscreen with Gallagher Command Centre clearly indicate the location of alarms and give security staff the ability to respond more quickly to emergencies.” Using Gallagher Command Centre, the nursing college now has a powerful and versatile security system that meets the unique needs of its site. Reduction in criminal activity The college has achieved significant cost savings through the prevention of vandalismThe system provides a reliable way to clearly capture data to monitor students, staff and visitors, lower criminal activity and improve onsite safety. In particular, security personnel can easily find the right information for quick incident resolution, which has led to improved processes, procedures and convictions when necessary. The college has also achieved significant cost savings through the prevention of vandalism and a significant reduction in reported cases of theft. The combination of the new access control system and an increase in physical security barriers means they have also been able to decrease the number of security guards patrolling the facility, reducing overhead costs. Customising and generating reports for college management is also a straightforward task, saving time and money. Most importantly, Gallagher’s security solution has given Western Cape College of Nursing control of who is on site and when – allowing its students to be safe, secure and focussed on learning.
Ahli United Bank (AUB) is a leading financial institution providing banking, investment, and wealth management services from 147 branches in eight countries. Utilising Gallagher’s business and security solutions in Bahrain since 2008, Ahli United Bank decided in 2017 to undertake a full upgrade of the systems at its headquarters. Installing controlled doors As part of upgrading the full product suite at its Bahrain Headquarters – which included all controlled doors and software – Ahli United Bank (AUB) also took the opportunity for a complete re-design of the set-up and locations of its security system. The bank was committed to finding a product that was cost effective and had a long life expectancy. While researching their options, AUB management saw a demonstration of Gallagher’s Mobile Connect technology and were immediately convinced that this was the ideal product for the bank’s upgrade. Gallagher Mobile Connect uses Bluetooth wireless technology to enable users to badge at a reader using a smartphone Gallagher Mobile Connect In late 2018, AUB began testing the new mobile solution on site then to be rolled out to most of its staff at headquarters. Gallagher Mobile Connect uses Bluetooth wireless technology to enable users to badge at a reader using a smartphone instead of an access card. A huge benefit for AUB is the solution’s capability to add additional layers of security where needed. Gallagher’s Mobile Connect solution provides the option to apply two-factor authentication via the smartphone – either fingerprint, PIN, or facial recognition – delivering heightened security over access to restricted areas. According to AUB’s management, the two-factor capability was very appealing to them. “Using mobile with facial recognition is far more secure than card and PIN, and it’s immensely more cost-effective than buying biometric readers,” they said. Temporary remote access control From an administrative and site management perspective, Gallagher Mobile Connect provides AUB with significant flexibility. Easy provisioning means that authorised staff can remotely allocate temporary access in advance and can also schedule when a user’s access can begin and end – ideal for visitors and contractors who come to the bank’s headquarters. Beyond Mobile Connect, readers and controllers, AUB uses Gallagher’s security software platform, Command Centre, to manage alarms and access for its headquarters and all branches, all from a centralised location. “The power of Command Centre is enormous,” said AUB’s Management. “It integrates with our CCTV equipment and gives excellent oversight of our operations.”
It creates challenges when a mechanical locking system grows organically over the years: Managers at South Denmark’s Syrenparken mental health treatment facility no longer had a trustworthy overview of all their physical keys in circulation. Yet, to serve the people treated there, Syrenparken must store medicines and psychotropic drugs. However, it is critical that only trusted personnel gain access. On-site access control solution As part of a modernisation program, it was decided to upgrade on-site access control. One key aim was to replace old-fashioned keys, which can easily be lost, increasing the risk they fall into the wrong hands. Managers also wanted to make a working day more efficient for their trusted employees. They were each carrying three or four keys just to perform daily tasks in multiple areas of the site. Syrenparken installed the SMARTair wireless access control system from ASSA ABLOY to meet all their security needs Syrenparken installed the SMARTair wireless access control system from ASSA ABLOY to meet all their security needs. To date, 143 SMARTair wireless locking devices are fitted on resident bedrooms, as well as doors to offices, the medicine room and storage for patient records, plus other confidential areas. Staff and residents open doors with a standard, programmable MIFARE credential. SMARTair wireless access control system System reliability was a key factor in their choice of SMARTair, according to Henrik Jürs, Head of Syrenparken: "It is possible to put our access control system on a virtual server. Should a computer go down, we can put a new computer on and then we have access to it again. We trust the data security,” he emphasises. Another important parameter was flexibility in system management: SMARTair makes it easy to administrate who should have access to which areas, and when. Instead of a bundle of keys, each employee has a key-card encoded with access rights to the exact areas they need. Online, offline access management With SMARTair, it’s easy to combine online and offline access management within the same installation With SMARTair, it’s easy to combine online and offline access management within the same installation. At Syrenparken, 133 offline SMARTair escutcheons and 3 updaters, plus 8 offline SMARTair cabinet locks, work side-by-side within the same system as 10 SMARTair online escutcheons. If a key-card is lost, it's quick to disable it and activate a new one. There is no danger anyone unauthorised will enter controlled medicine rooms with a lost card as a result. Because managers no longer need to call a locksmith to replace the compromised escutcheon, SMARTair is also a cost-effective solution for Syrenparken. SMARTair deployment is ongoing at Syrenparken — and currently projected to reach a total of up to 200 doors.
Boon Edam Inc., globally renowned security entrances and architectural revolving doors manufacturer, has announced that a multi-story office building in London was recently refurbished to upgrade its existing Boon Edam revolving doors and optical turnstiles. Now adorning the entrance are two all-glass Crystal TQ revolving doors, accompanied by an array of slim Lifeline Speedlane Swing optical turnstiles in the lobby. Revolving doors, optical turnstiles Originally opened in 1980, Riverscape is a 63,000 square foot, multi-story office space located at 10 Queen Street Place. The modern development sits on the sought-after area of the River Thames, just minutes from the bustling area of Cannon Street Station. Recently, the building owners decided to upgrade the look and feel of Riverscape, incorporating the current trends of open atriums, flexible floor space and usable rooftop space. Project also included the replacement of legacy Boon Edam revolving doors and optical turnstiles with updated solutions The refurbishment project also included the replacement of legacy Boon Edam revolving doors and optical turnstiles with updated solutions. Leading the design of the renovation were architect Aukett Swanke; interior designer Barr Gazetas; and Overbury as main contractors. High-tech security entrances As is common with older entrance installations, Riverscape decided to renew its revolving doors and optical turnstiles to achieve a more modern look and feel, and to upgrade the associated technology. The client returned to Boon Edam when selecting their new entrance solutions. At the main entrance to the office space, the existing TQM manual doors were replaced with two, tall Crystal TQ revolving doors. Constructed virtually completely from glass with minimal stainless steel accents, the Crystal TQ accentuates Riverscape’s all-glass façade, providing an elegant and timeless entry experience for all employees and guests. Lifeline Speedlane Swing In the main atrium space, the original Speedlane 900 optical turnstiles were upgraded to the new Lifeline Speedlane Swings. The Speedlane Swing combines security with aesthetics and is particularly popular because it features the slimmest cabinets in the industry – only four inches wide. To enhance security at the facility, Riverscape wanted a solution for monitoring and managing visitors to the office space. To enhance security at the facility, Riverscape wanted a solution for monitoring and managing visitors to the office space To achieve this, they decided to integrate the Lifeline Boost access control pedestal with their Speedlane Swing optical turnstiles. The Boost attaches to the end of the Swing and allows for integration with a variety of access control technologies, such as biometric devices, card collectors and barcode scanners. Integrated technology Employees enter the work area by scanning their credentials at the turnstile itself, while guests are issued a temporary access card with a special barcode that is scanned at the Boost pedestal. The Boost retains the card, enabling the reception staff to eventually reuse that card for future guests. “Using our barcode scanners, visitors can book in with reception, receive an entrance card and badge in and out conveniently through the lanes,” says Boon Edam Limited’s Field service Sales Executive, Graham Coulter.
Round table discussion
Cybersecurity has become the ultimate buzzword in the physical security market. And it also represents one of the industry’s most intractable challenges. Several years ago, the problem with cybersecurity was lack of awareness among physical security practitioners. It’s now safe to say that awareness has increased. Everyone today talks about cybersecurity, but has it helped the larger problem? We asked this week’s Expert Panel Roundtable: Is greater awareness helping to increase the cybersecurity of physical security systems?
Technology advancements often come with new terms and definitions. The language of our marketplace evolves to include new words that describe innovations in the industry. In the skilled hands of marketers, terms intended to be descriptive can also take a new element of ‘buzz,’ often presaging exciting developments that will drive the future. We asked this week’s Expert Panel Roundtable: What new buzzword have you heard, and what does it mean for the industry?
ISC West 2019 is in the industry’s rear-view mirror, and what a show it was! The busy three days in April offered a preview of exciting technologies and industry trends for the coming year. We asked this week’s Expert Panel Roundtable: What was the big news at ISC West 2019?