Security access systems
Alarm.com announces a majority-stake acquisition of OpenEye, a provider of cloud-managed video surveillance solutions for the commercial market. OpenEye is optimised for enterprise-level commercial customers requiring expansive video recording capabilities, in addition to remote viewing, administration and diagnostic reporting. Combined with the Alarm.com for Business offering, service providers partnered with Alarm.com now have a best-in-class solution to accommodate commercial accounts of any...
Video, access control and visitor management are among the technologies that are enabling greater safety and security at hospitals and other healthcare facilities. Video surveillance systems enable hospital management and security professionals to know what goes on in and around a medical facility. Recording images in high resolutions (megapixels and gigapixels) is becoming more and more important in healthcare, says Jason Ouellette, Product Line Director – Access Control, Tyco Security P...
A larger proportion of cyberattacks in the first half of 2019 can be attributed to electronic criminals (eCrime adversaries) compared to state-sponsored or unidentified attacks. CrowdStrike, a cybersecurity company that provides the CrowdStrike Falcon endpoint protection platform, observes that 61% of targeted cybersecurity campaigns in the first half of 2019 were sourced from eCrime adversaries, compared to 39% from other sources. Technology was the top vertical market targeted by cyber-attack...
Ping Identity, a pioneer in Intelligent Identity, announces an expansion of its Northern European operation with the opening of a new office in Utrecht, Netherlands. The growth of the identity market has been rapid across Benelux and Scandinavia, and Ping Identity continues to drive attention to the importance of identity security in the cybersecurity landscape, as well as support for its local clients and channel partners. Providing secure access to applications The Ping Identity ecosystem i...
PAC & GDX, global provider of access control and door entry solutions, has announced the availability of its new Architect range of readers. By integrating cutting edge radio frequency identification (RFID), near field communication (NFC) and Bluetooth technologies into the Architect range, PAC & GDX has made it possible for smartphones to be used as an access control identification tool, thereby providing the highest level of convenience, flexibility and ease of operation. Integrating...
IFSEC hosts globally renowned security content and events, with shows in the United Kingdom, India, Bangladesh, Malaysia, Thailand, South Korea and the Philippines. Soon, the IFSEC brand will extend into mainland Europe with the launch of IFSEC Europe, a brand-new biennial security event providing a new gateway to the European integrated security market. Taking place for the first time on 20-22 September 2021 at RAI Amsterdam Convention Centre, IFSEC Europe will create a pan-European home for i...
Security Essen is continuing to consolidate its position as a platform for the security industry. Numerous companies have confirmed their participation in the leading international trade fair, which will take place at Messe Essen from 22 to 25 September 2020. Particularly pleasing: In addition to many long-standing customers, the registrations also include companies which will take part in Security Essen again for the first time after a break. Amongst others, Telenot and Securiton will present their innovations at Messe Essen. "We are delighted about the exhibitors' commitment to Security Essen," says Oliver P. Kuhrt, CEO of Messe Essen. "This emphasizes the significance of Security Essen as an important platform for the security industry". Innovations in burglar alarm technology The application specialist for everything to do with alarm and security systems will present its innovations Thomas Taferner, Head of Marketing and Sales at Telenot Electronic, justifies the return to Security Essen as follows: "We are delighted to be on board again at Security Essen 2020. In the past three years, we have increasingly tested smaller events. But Security Essen has proved to be the only all-encompassing trade fair for us where the entire industry from the installing specialist company to security officers from industry, planning offices, trade associations, building property insurers, CID advisory centers, fire departments and many other target groups obtains information. “The trade fair is particularly interesting for us in 2020, because Telenot will present extensive innovations and will greatly expand its spectrum. In addition to burglar alarm technology, we now also have fire alarm technology in our portfolio and, from 2020, access control technology, too." Also after a break, Securiton Deutschland will take part in Security Essen again. The application specialist for everything to do with alarm and security systems will present its innovations in Hall 3 - the exhibition area for access, mechatronics, mechanics, systems and perimeter protection. Locking technology and electronic access systems The two North Rhine-Westphalian companies Dom and Wilka have been continuous exhibitors at Security Essen for many years already. Moreover, they have already registered again for Security Essen 2020. Dom Sicherheitstechnik GmbH & Co. KG, headquartered in Brühl, is a manufacturer of innovative locking technology and electronic access systems. Wilka Schließtechnik GmbH is at home in the key Velbert region. Robert Schlieper, Managing Partner, Wilka: "In our industry, the focus is naturally on the security topic. For more than 150 years, Wilka has represented high quality standards in an area where it really matters that the product delivers what it promises. We are always looking forward to the interesting discussions on our stand""At Security, we have shown our (potential) customers exactly that for years already - patented mechanical cylinders, locks and locking systems for a wide range of requirements and the innovations from the field of electronics. And of course, we are always looking forward to the interesting discussions on our stand, because personal contact is rarely as easy to establish as it is there". Participation in Security Essen 2020 Many other companies - including market leaders, niche providers and new entrants - have also already confirmed their participation in Security Essen 2020. From Germany, these include Abus August Bremmicker Söhne, EVVA Sicherheitstechnik, Kötter Security, lunaHD, NSC Sicherheitstechnik, Salto Systems, T-Systems International, Videor E. Hartig and the Wagner Group. The trade fair will be a premiere, for example, for the Bosch start-up SAST. The young company will present its Internet of Things platform for security cameras for the first time at the trade fair. Security Essen is also seeded for international stars: Hanwha Techwin Europe, Hikvision, Inim Electronics, Vanderbilt International, Zhejiang Dahua and Zhejiang Uniview, among others, have confirmed their participation in the world's leading trade fair. Open, functional architecture After a construction period of around three and a half years, the modernisation of Messe Essen has been concluded since September 2019. From now on, exhibitors at and visitors to Security Essen will benefit from open, functional architecture, short distances, eight spacious, single-storey halls and plenty of daylight. For example, visitors can, for the first time, expect a complete and coherent range of available video products in the new Hall 5.
Confederation of European Security Services, CoESS and Euralarm have published a joint brochure on cyber security. The first copy of the brochure ‘Cyber security - Threat or Opportunity? It’s up to you!’ was launched during the General Assembly of CoESS held on 11 October in Rome. Cyber security breaks up the borders between product development, design, installation, operational continuity and alarm response. The guidelines highlight that when addressing cyber security, it is important to understand that all steps are inter-related in a security supply chain. ‘Cyber security - Threat or Opportunity? It’s up to you!’ CoESS and Euralarm's brochure covers the complete supply chain for the fire and security market With CoESS and Euralarm as publishers of the brochure, it covers the complete supply chain for the fire and security market – from manufacturers of products to private security companies and their customers. The brochure highlights in an understandable language the risks and responsibilities for each stakeholder in the chain and what companies need to do to mitigate these risks – both from a human and technological perspective. Many are not yet aware of the importance of these, sometimes simple, measures for the security and reputation of their business. Importance of cyber security Cyber security is a top priority for businesses and governments. Many large, but also small enterprises already have structures and people in place to enhance resilience against the risks of cyber security. But with a rapidly increasing number of devices connected to a network, the cyber security risks are getting bigger. Taking measures to enhance resilience against cyber-threats is therefore crucial - for business continuity of fire and security companies and their customers; security of data and assets; and both the industry’s and its clients’ reputation. Cyber security rules and regulations The brochure informs the reader about cyber security risks and solutions in the different phases Although most of the products offer tools to provide a level of protection and many companies have internal cyber security rules and procedure in place, the importance of the human factor in achieving and maintaining cyber security is often forgotten. With the joint brochure, CoESS and Euralarm want to create awareness that, with the right security measures, cyber-threats can be mitigated. The brochure looks at the whole supply chain and gives recommendations on the role of companies, their employees and end-users in carrying out security measures to minimise cyber security risks. This requires an awareness that each part of the chain needs to implement its own measures. Cyber security risk mitigation The brochure also highlights what is already being done to mitigate existing risks and what companies can do in order to ensure the integrity of the chain. On a step-by-step basis the brochure informs the reader about cyber security risks and solutions in the different phases.
Johnson Controls is introducing the Ethos line of multi-tech contactless access readers from WaveLynx Technologies. Ethos readers are equipped with a choice of credential technologies, enabling customers to choose migration paths to deploy secure credentials. WaveLynx Ethos multi-tech contactless access readers feature a modern aesthetic and state-of-the-art feature set. All Ethos readers are capable of reading legacy Proximity credentials, MIFARE DESFire® smart card credentials, LEAF enabled smart card credentials and mobile credentials. Security and event management system WaveLynx Ethos Readers are integrated with the Tyco Software House C•CURE 9000 security Ethos readers simultaneously work with old and new credentials. WaveLynx Ethos Readers are integrated with the Tyco Software House C•CURE 9000 security and event management system, providing 24x7 mission-critical security and safety protection for people, buildings, and assets. All ET-Series readers, including the ET10 Mullion Mount, ET20 Wall mount and ET25 Keypad Reader feature OSDP communication with the patented auto-detect feature. This feature allows the reader to automatically switch from the Wiegand protocol to OSDP when the panel is upgraded to OSDP, with no need to re-wire or re-configure the reader for OSDP functionality. Secure smart cards or Mobile credentials can be introduced at any time. Key features OSDP auto-detect capable LEAF Si enabled off the shelf, LEAF Cc ready MIFARE DESFire® EV2/EV1 compatible Mobile credential ready Tristate LED Light Bar (red, green, amber) and buzzer Easy install bracket (patent pending) and wiring system Accelerometer-based tamper detection
Fugue, the company delivering autonomous cloud infrastructure security and compliance, has announced its support for Open Policy Agent (OPA), an open source general-purpose policy engine and language for cloud infrastructure. Fugue is leveraging OPA and Rego, OPA’s declarative policy language, for cloud infrastructure policy-as-code to provide customers with maximum flexibility when implementing their custom enterprise policies. The Cloud Native Computing Foundation (CNCF) accepted OPA as an incubation-level hosted project in April 2019. Focus of OPA has been on developing access policies for Kubernetes, while Fugue is driving the adoption of OPA Open Policy Agent on access policies While much of the focus of OPA has been on developing access policies for Kubernetes, Fugue is driving the adoption of OPA to address a wider variety of use cases for securing cloud environments on Amazon Web Services (AWS) and Microsoft Azure, including the application of common compliance frameworks to full cloud infrastructure stacks. The Fugue team has developed tools and enhancements to improve OPA’s developer experience. Fugue has provided many of these enhancements to the OPA open source project, and will continue to do so. Enhancing enterprise security Fugue has also added support to its product for customer-defined rules written using OPA and Rego. This sets Fugue apart from all other cloud infrastructure policy management solutions that rely on proprietary and inflexible rule languages that lock-in customers and are incompatible with other policy languages used elsewhere in the enterprise. Fugue also uses OPA to provide out-of-the-box support for commonly used compliance frameworks including CIS Foundations Benchmarks, GDPR, HIPAA, ISO 27001, NIST 800-53, PCI, and SOC 2. Cloud infrastructure policies Fugue has been developing policy-as-code solutions for some time, and now we’re offering an open source solution"“It’s very simple to build custom policies for our cloud infrastructure environments and validate those configurations pre-deployment using OPA and Fugue,” said Dave Williams, cloud architect and senior consultant at New Light Technologies. “Fugue simplifies the implementation and enforcement of custom cloud infrastructure policies we’ve written using OPA and helps us prove compliance at all times.” “Fugue has been developing policy-as-code solutions for some time, and now we’re offering an easy-to-use, open source solution for writing policies for cloud infrastructure,” said Phillip Merrick, CEO of Fugue. Cloud security He adds, “Our customers can use the same open language for defining their cloud infrastructure policies in Fugue that they are using for other enterprise policy needs. This eliminates the need to learn other vendors’ proprietary, inflexible policy languages.” Fugue’s custom rules capabilities that leverage OPA enable users to: Build and manage custom, user-defined cloud infrastructure rules in OPA Rego via the Fugue API, CLI, and web interface Validate and test custom rules while they are being written with helpful errors that save time Continuously validate and report on compliance for custom rules and out-of-the-box policy frameworks Security rule evaluations “Fugue is running millions of security rule evaluations every day using OPA, so we've put a lot of work into improving performance and developer tooling and will be contributing all of that back to the open source community,” said Josh Stella, co-founder and CTO of Fugue. Josh said, “OPA is a significant development for policy-as-code, and Fugue is fully committed to supporting and contributing to it.”
Crossword Cybersecurity plc, the technology commercialisation company focusing exclusively on the cyber security sector, is pleased to announce the signing of a two-year contract with a FTSE 250 global chemical manufacturer. The customer will use Rizikon Assurance to issue onboarding assessments to their 250 strategic suppliers, in turn displaying their key risk data in the tool’s ‘Supplier Scorecard’ feature. Rizikon Assurance will automate the supplier management process, replacing manual, time-consuming and resource-intensive processes that the company has used to date. Rizikon Assurance will play a pivotal part in the customer’s overall Supplier Management Framework Supplier Management Framework Rizikon Assurance will play a pivotal part in the customer’s overall Supplier Management Framework, increasing the efficiency of their supplier assurance process and enabling them to identify and mitigate their biggest areas of supplier risk. Each category of supplier will be assessed against their criticality and risk to the business. The customer will take full advantage of the new features that Rizikon Assurance has to offer, including the industry-first Assurance Framework Dashboard which displays a holistic view of the risk-criticality score of all suppliers, on one matrix. The tool will aid in the selection of low-risk suppliers, as well as re-evaluating suppliers who are currently operating above acceptable risk thresholds and are in the process of carrying out remediation efforts to lower their overall risk. Risk management All the assessments and due diligence the customer performs through Rizikon Assurance will work towards providing them with an Approved Supplier Register. Rizikon Assurance will help to classify and prioritise suppliers based on their level of risk, manage question sets and improve the ease in carrying out required audits, as all the necessary information will be located in the one centralised platform. Ken Fraser, Rizikon Assurance Product Manager, commented, “Third-party assurance is particularly important for organisations with large, complex supply chains who face multiple challenges when managing third-party risk, so we are pleased to work alongside this organisation in taking proactive measures to mitigate third-party risk." Mitigating threats and risks Ken added, “Crossword is now really gaining traction with business customers for Rizikon Assurance. All businesses need to do a better job of third-party risk management - and we believe that we have a unique system that helps them take control.”
Nexkey, an end-to-end provider of mobile access control solutions, today announced that it has raised a $6 million Series A round led by Upfront Ventures. Manu Kumar’s K9 Ventures, Mark IV Capital and Anand Chandrasekaran, former Head of Platform for Messenger at Facebook also participated in the round. Secure, cloud-connected app Nexkey’s secure, cloud-connected app turns any smartphone into a digital key, allowing businesses to do away with cumbersome keycards, fobs, and metal keys. Administrators can use the Nexkey app to send smart keys, manage when and how users can access a given space, and remotely unlock doors for guests. The Nexkey Core is a smart cylinder that can transform any existing mechanical lock into a smart lock Nexkey also offers two unique hardware solutions that can turn any existing doorway into a fully functional smart door. The Nexkey Controller ties any electrified door, from commercial entrances to driveway gates, garage doors or elevators into the Nexkey ecosystem. The Nexkey Core, meanwhile, is a smart cylinder that can transform any existing mechanical lock into a smart lock in under two minutes. Recognises and selects matching smart keys “There are more than 300 million commercial doors in the United States and Nexkey is the only provider that is universally compatible,” said Aditi Maliwal, partner at Upfront Ventures and former Google product manager, who is joining Nexkey’s board as part of this investment. “Today's access control solutions don't align with the modern workforce’s needs for flexibility and convenience, it's time for change and Nexkey is uniquely positioned to drive that change.” Just six months after Nexkey’s launch, the company’s mobile access solutions are already revolutionising the way more than 8,500 active users deal with the daily headaches of fumbling for their keys: the Nexkey app automatically recognises and selects matching smart keys as individual users approach different doors. Users who do not have the Nexkey app can unlock doors via text messages with a unique code. Mobile keyless entry Nexkey has dramatically increased our efficiency by making access to our space totally frictionless" Nexkey’s offerings are proving especially useful for businesses such as coworking spaces, gyms, and real estate offices, which have a constant influx of new tenants, members, contractors, and other visitors. “Nexkey has dramatically increased our efficiency by making access to our space totally frictionless,” said Amir Mortazavi, CEO of Canopy, a San Francisco-based coworking spaces chain. “We took a close look at everything that’s on the market, and Nexkey came out on top. We got their solution installed throughout 32 private offices in under eight hours –– it was crazy fast.” Businesses can track how their smart keys are being used in real time via the Nexkey App or Web Portal, delivering actionable intelligence and streamlining staffing and customer-service logistics. Nexkey’s customers can also integrate Nexkey’s API with their own apps and devices to create truly integrated and customised access experiences for their employees and customers. “The $8 billion access control market is ripe for disruption and our Series A round will help us become the new standard of access,” says Eric Trabold, Nexkey’s CEO. “We make the installation process extremely easy, fast and affordable, so every business can take advantage of the numerous benefits that come with mobile keyless entry.”
The jury is in: traditional security is out — and it’s being replaced with service-based solutions. The bottom line is: if you’re not embracing it, you’ll soon be left behind. XaaS — the collective term referring to the delivery of anything as a service — includes all services made possible through the use of the cloud. Security-as-a-Service (SaaS), which encompasses any type of system from access control to video surveillance, has paved the way for users to gain significant functionality and scalability not previously experienced with more traditional methods. Complicated IT functions SaaS allows manufacturers to provide numerous benefits to their customers As such, there is a marked transition for manufacturers from simply designing and building products to providing a service rooted in a partner- and customer-centric focus. This change hasn’t come easily. Some are still holding out and waiting for the “fad” to pass. However, the potential advantages for all parties involved far outweigh the perceived negative points. First and foremost, SaaS allows manufacturers to provide numerous benefits to their customers. An “as-a-service” model shifts the burden of data maintenance and infrastructure spending to an integrator/dealer partner or service provider. This relieves the end user of the expertise necessary to implement complicated IT functions to keep networked and on-premise solutions up-to-date. Traditional security systems Additionally, end users demand solid customer service. For some end users, traditional security systems are so similar in features and functionality that the key differentiator is the ability of the integrator or manufacturer to provide exceptional customer service and training. This is made possible through the service-based model, where customers appreciate a strong relationship with their integrator or manufacturer that provides them with additional knowledge and assistance when necessary. The cloud has proven to be highly functional, flexible, and convenient for organisations Everyone also wants convenience. In the consumer market, we invest in things like meals that are pre-measured, prepped, and ready to be cooked, or companies that auto-ship dog food to our door each month. This ease-of-use translates over to the B2B market, where time is money and systems that save valuable resources are highly regarded. The role of the cloud The cloud has proven to be a highly functional, flexible, and convenient method for organisations to leverage as part of their strategies to protect and modernise their facilities. And the service-based nature lends itself well; forward-thinking integrators and dealers can diversify their product arsenal while still capitalising on a recurring monthly revenue model (RMR). But then why has there been so much resistance to this change? Over the last 10 to 15 years, the cloud has gotten a bad rap for a myriad of reasons, including usability, management, and unreliability. However, that view of the cloud is changing for the positive as the technology becomes more advanced and innovators learn more about what it means to design a product or service with security at its core. "As-a-service” platform For example, one of the biggest misconceptions that plagues the cloud is the idea that it is not secure. However, the security of public cloud service providers is integral to their success because their business depends on it. Developing an ongoing and trustworthy relationship with customers can only be made possible through the assurance that their services are safe and the customer’s data is protected. As such, they’ve embraced the service-based model that is, at its core, the future of the business world as we know it. There isn’t a person, manufacturer, or integrator partner out there today who isn’t somehow touched or influenced by an “as-a-service” platform. And it’s about time the service-based model that leverages the public cloud reaches the masses.
Today, the world is connected like never before. Your watch is connected to your phone, which is connected to your tablet and so on. As we’ve begun to embrace this ‘smart’ lifestyle, what we’re really embracing is the integration of systems. Why do we connect our devices? The simplest answer is that it makes life easier. But, if that’s the case, why stop at our own personal devices? Connection, when applied to a business’ operations, is no different: it lowers effort and expedites decision making. Integrating security systems Systems integration takes the idea of connected devices and applies it to an enterprise Systems integration takes the idea of connected devices and applies it to an enterprise, bringing disparate subcomponents into a single ecosystem. This could mean adding a new, overarching system to pull and collect data from existing subsystems, or adapting an existing system to serve as a data collection hub. Regardless of the method, the purpose is to create a single, unified view. Ultimately, it’s about simplifying processes, gaining actionable insights into operations and facilitating efficient decision-making. Although integration is becoming the new norm in other areas of life, businesses often opt out of integrating security systems because of misconceptions about the time and resources required to successfully make the change. So, instead of a streamlined operation, the various security systems and devices are siloed, not communicating with each other and typically being run by different teams within an organisation. Time-intensive process When systems are not integrated, companies face a wide range of risks driven by a lack of transparency and information sharing, including actual loss of property or assets. For example, a team in charge of access control is alerted to a door being opened in the middle of the night but can’t see what exactly is taking place through video surveillance. Without integrated systems they have no way of knowing if it was a burglar, an equipment malfunction or a gust of wind. Without integration between systems and teams, the ability to quickly put the right pieces in front of decision makers is missing. Instead, the team would have to go back and manually look for footage that corresponds with the time a door was open to figure out which door it was, who opened it and what happened after, which can be a time-intensive process. Integrating access control and surveillance systems Theft and vandalism occur quickly, meaning systems and users must work faster in order to prevent it This slowed response time adds risk to the system. Theft and vandalism occur quickly, meaning systems and users must work faster in order to prevent it. Security systems can do more than communicate that theft or vandalism occurred. Properly integrated, these systems alert users of pre-incident indicators before an event happens or deter events altogether. This gives teams and decision makers more time to make effective decisions. Integrating access control and surveillance systems allows for a more proactive approach. If a door is opened when it’s not supposed to be, an integrated system enables users to quickly see what door was opened, who opened it and make a quick decision. Integrated solutions are more effective, more efficient and help drive cost-saving decisions. Ideally, companies should establish integrated solutions from the start of operations. This allows companies to anticipate problems and adjust accordingly instead of reacting after an incident has occurred. Security camera system Although starting from the beginning is the best way to ensure comprehensive security, many companies have existing security systems, requiring integration and implementation to bring them together. Typically, companies with established security systems worry about the impact to infrastructure requirements. Is additional infrastructure necessary? How and where should it be added? What financial or human resources are required? These concerns drive a mentality that the benefits gained from an integrated solution aren’t worth the costs of implementation. Thankfully, this is becoming less of a problem as security providers, like Twenty20™ Solutions, work to offer adaptable solutions. With flexible options, operators don’t worry about adding or replacing infrastructure to align with a provider’s model. This allows users to monitor camera footage and gate traffic from one system If a company has an existing security camera system, but identifies a need for access control, a modern integrated solution provider can supply the gates for access points and equip the gates and cameras with the technology to connect the two. This allows users to monitor camera footage and gate traffic from one system. This model also spares operators additional costs by using a sole vendor for supplemental needs. Overall management of security While a single, unified system is beneficial for cost saving, it can also help the overall management of security. The ability to view all operating systems in one dashboard allows security personnel to manage a site from any location, reducing the expense and effort required to manage a system. The mobile world today means security directors no longer need to be in a centralised operations center to see alerts and make decisions. This simplifies processes by allowing users to quickly see an alert, pull up a camera, delete a user or check an access log from a phone. Modern networks are secure and accessible to those with permissions, without requiring those users to be physically present. Consolidating security systems is the first step companies can take toward streamlining work, information and costs. The next step is integrating all sites, both remote and on-grid. Energy and communication technology The integration of sites and systems turns mountains of data and information into actionable intelligence Traditional methods demanded two systems: one for on-grid facilities and another for off-grid locations. With advancements in energy and communication technology, the need for multiple systems is gone. Data from remote sites can be safely and securely fed into an existing system. These remote locations may gather, distribute and manage data in a different manner than a connected system due to the cost of transmission via remote connections (i.e., cellular or satellite connection). The end result, however, is a consistent and holistic view of operations for the decision maker. The integration of sites and systems turns mountains of data and information into actionable intelligence. With connected devices monitoring occurrences at individual sites, as well as events across locations, the data tells a story that is unhindered by operational silos or physical space. Identifying patterns and trends Instead of providing 10 hours-worth of footage that may or may not be relevant, system analytics can provide users with the specific set of information they need. Incidents once discarded as ‘one-off’ events can now be analysed and data-mapped to identify patterns and trends, directing future resources to the most critical areas first. Consumers are increasingly expecting everything they need to be right where they need it – and businesses are right behind them. The current generation of security professionals are increasingly expecting the simplicity of their everyday personal tasks to be mirrored in enterprise systems, which means giving them the ability to see what matters in one place. A unified system can provide just that, a single view to help simplify processes, promote cost saving and accelerate decision making.
The statistics are staggering. The death tolls are rising. And those who now fear environments that were once thought to be safe zones like school campuses, factories, commercial businesses and government facilities, find themselves having to add the routine of active-shooter drills into their traditional fire drill protocols. The latest active shooter statistics released by the FBI earlier this year in their annual active-shooter report designated 27 events as active shooter incidents in 2018. The report reveals that 16 of the 27 incidents occurred in areas of commerce, seven incidents occurred in business environments, and five incidents occurred in education environments. Deadly active-shooter events Six of the 12 deadliest shootings in the country have taken place in the past five years Six of the 12 deadliest shootings in the country have taken place in the past five years, including Sutherland Springs church, Marjory Stoneman Douglas High School, the San Bernardino regional center, the Walmart in El Paso and the Tree of Life Synagogue in Pittsburgh, which have all occurred since 2015. Although these incidents occurred in facilities with designated entry points common to churches, schools and businesses, the two most deadly active-shooter events since 2015 were the Route 91 Harvest music festival shooting in Las Vegas that left 58 dead and the Pulse nightclub killings in Orlando where 49 perished. As Christopher Combs, special agent in charge of the FBI field office in San Antonio, Texas, said during a news conference following the August 31 mass shooting in Odessa, Texas that claimed seven lives: “We are now at almost every two weeks seeing an active shooter in this country." Active shooter incidents Between December 2000 and December 2018, the FBI’s distribution of active shooter incidents by location looks like this: Businesses Open to Pedestrian Traffic (74) Businesses Closed to Pedestrian Traffic (43) K-12 Schools (39) Institutions of Higher Learning (16) Non-Military Government Properties (28) Military Properties—Restricted (5) Healthcare Facilities (11) Houses of Worship (10) Private Properties (12) Malls (6) What the majority of these venues have in common is they all have a front entrance or chokepoint for anyone entering the facilities, which is why any active-shooter plan must include a strategy to secure that entry point. Situational awareness in perimeter and door security Preventing people with the wrong intentions from entering the space is the goal" According to Paul Franco, an A&E with more than 28 years of experience as a consultant and systems integrator focusing on schools, healthcare and large public and private facilities, that while active shooter incidents continue to rise, the residual effect has been an increase in situational awareness in perimeter and door security. “Certainly, protecting people and assets is the number one goal of all our clients. There are multiple considerations in facilities like K-12 and Healthcare. Preventing people with the wrong intentions from entering the space is the goal. But a critical consideration to emphasise to your client is getting that person out of your facility and not creating a more dangerous situation by locking the person in your facility,” says Franco. High-security turnstiles “Schools today are creating a space for vetting visitors prior to allowing access into the main facility. Using technology properly like high-security turnstiles offer great benefits in existing schools where space constraints and renovation costs can be impractical.” What steps should they be taken when recommending the proper door security to ensure the building is safe As a consultant/integrator, when discussions are had with a client that has a facility in a public space like a corporate building, government centre or industrial facility, what steps should they be taken when recommending the proper door security to ensure the building is safe and can protect its people and assets? For Frank Pisciotta, President and CEO of Business Protection Specialists, Inc. in Raleigh, North Carolina, a fundamental element of his security strategy is making appropriate recommendations that are broad-based and proactive. Properly identifying the adversaries “As a consultant, my recommendations must include properly identifying the adversaries who may show up at a client’s door, the likelihood of that event occurring, the consequences of that event occurring, determining if there are tripwires that can be set so an organisation can move their line of defence away from the door, educating employees to report potential threats and creating real-time actionable plans to respond to threats. A more reactionary posture might include such thing as target hardening such as ballistic resistant materials at entry access points to a facility,” Pisciotta says. Veteran consultant David Aggleton of Aggleton & Associates of Mission Viejo, California recommends that clients compartmentalise their higher security areas for limited access by adding multiple credential controls (card + keypad + biometric), along with ‘positive’ access systems that inhibit tailgating/piggybacking such as secure turnstiles, revolving door and mantrap if your entrances and security needs meet the required space and access throughput rates. Integrated solution of electronic access control Defining a single point of entry in some public facilities is becoming the new standard of care according to many A&Es and security consultants, especially in a school environment. This approach allows a concerted effort when it comes to staffing, visitor monitoring and an integrated technology solution. The bottom line remains: most buildings are vulnerable to a security breach A proactive stance to securing a door entryway will use an integrated solution of electronic access control, turnstiles, revolving doors and mantraps that can substantially improve a facility’s security profile. The bottom line remains: most buildings are vulnerable to a security breach, so it’s not a matter of if there will be a next active shooter tragedy, it’s only a matter of where. Enhancing access control assurance “There is no easy answer to this question,” says Pisciotta referring to how a secured entrance can deter an active shooter. “There have been at least two high-profile incidents of adversaries shooting their way into a facility through access control barriers. So, if the threat so dictates, a ballistic resistant might be required.” He concludes: “There is obviously no question that turnstiles, revolving doors and man traps enhance access control assurance. Electronic access control is easy to integrate with these devices and providing that credentials are secure, approval processes are in place, change management is properly managed and the appropriate auditing measures in place, access control objectives can be met.”
Private video systems are offering new sources of evidence for police investigations. Growing popularity of private camera registration schemes are facilitating police department access to video captured by cameras in homes and businesses for use in their investigations. Camera registration programmes are organised locally by individual police departments but have common features and operation. By registering their camera systems, citizens and business people provide information to a confidential database listing any cameras police can quickly access in the event of a crime. Knowing which cameras may be near a crime scene avoids police having to go door-to-door in search of possible video footage. Because perpetrators are more careful and aware of possible video coverage in and around a crime scene, video to solve a crime may also come from a camera several blocks away. The best evidence may not be of the crime scene itself but video of nearby pathways and streets. Today’s camera systems also provide information such as location, date and time that can help an investigation Ability to record and retain video Access to cameras can also provide additional viewing angles to provide police new leads such as type of car, clothing, etc. Another benefit is possible use of a camera’s view to help locate lost children, elderly or disabled persons. In addition to actual video, today’s camera systems also provide information such as location, date and time that can help an investigation or be used as evidence in court. Basic requirements for participating video systems are exterior-facing cameras and the ability to record and retain video. It is important to note that registering a camera system with a local police department does not provide active surveillance or a “live feed” of video. Video is only shared after a crime has been committed and when the police request specific video as possible evidence. Registration of camera systems is voluntary Registration merely enables a police department to know where accessible cameras are located. Police then arrange viewing of video footage after the fact by communicating with the camera owners; if a police visit to a residence might pose an additional risk for any reason, camera video today can often be accessed remotely. Registration of camera systems is voluntary; a state-wide proposal in New Jersey in 2015 calling for mandatory camera registration faced privacy backlash and was later amended to make registration voluntary. Collected information is typically the name of the camera owner, contact information, an address where the cameras are located; how many cameras are at the location, the area recorded by the cameras and how the footage is saved. Police arrange viewing of video footage by communicating with the camera owners Residential security camera Portland, Oregon, launched its CrimeReports camera registration programme in 2017, part of its wider effort to get residents involved in fighting crime. In Philadelphia, the police department has been registering cameras since 2011 under its SafeCam programme. The Philadelphia Department of Commerce offers a payment, up to $3,000, to reimburse business owners who install cameras and register them with the police. Camera registration is yielding results. Baltimore’s Citiwatch camera registration system has had a direct impact on criminal apprehension. The San Luis Obispo, California, Police Department reports a high success rate identifying suspects in cases where additional video evidence exists because of the camera registration programme. In Fort Worth, Texas, last May, a residential security camera played a role in capturing a kidnapping suspect. Privacy concerns and community feedback Many of the camera registration schemes have localised branding or acronyms, such as the S.C.R.A.M. (Security Camera Registration and Mapping) programme of Milton, Georgia; the C.A.P.T.U.R.E. (Community and Police Team Up to Record Evidence) programme of New Braunfels, Texas; or the RockView programme of Rockville, Maryland. The idea is based on willing participation of public citizens in helping law enforcement do their jobs Privacy concerns and community feedback prompted Vancouver, Washington, to suspend a camera registration programme for weeks until it could be re-launched earlier this year. Although cities seek to protect information about the locations of cameras, it might be subject to disclosure because of public records laws. Law enforcement and crime prevention Registration of cameras is another aspect of involving the community in law enforcement and crime prevention, not unlike the commonplace Neighbourhood Watch programmes. The idea is based on willing participation of public citizens in helping law enforcement do their jobs. Making video footage available provides important evidence in much the same way a witness to a crime would hopefully testify if asked. By multiplying the availability of cameras that could view elements of a possible crime, the idea is also akin to the modern concept of “crowdsourcing” – the practice of obtaining information or input by enlisting a large number of people. Local jurisdictions stipulate that registrants in the programme should not be construed as agents and/or employees of the police department. There is also a crime prevention element to the programmes, in addition to helping police do their jobs better and more efficiently. Some camera registration programmes provide stickers or yard signs to let the neighbourhood know that their security cameras are helping to fight local crime.
The healthcare market is rife with opportunity for security systems integrators. Hospitals have a continuous need for security, to update their systems, to make repairs, says David Alessandrini, Vice President, Pasek Corp., a systems integrator. “It’s cyclical. Funding for large projects might span one to two years, and then they go into a maintenance mode. Departments are changing constantly, and they need us to maintain the equipment to make sure it’s operating to its full potential.” The experience of Pasek Corp. is typical of the opportunities available for security integrator companies in the healthcare vertical. A single large hospital system can supply a dependable ongoing source of revenue to integrator companies, says Alessandrini. Hospitals are “usually large enough to provide enough work for several people for an extended length of time.” Healthcare customers in Pasek’s service area around Boston provide the potential for plenty of work. “We have four major hospitals, each with in excess of 250 card readers and 200 cameras, in the Boston area,” Alessandrini says. One appeal of the healthcare market for North Carolina Sound, an integrator covering central North Carolina, is the breadth of possible equipment they can sell into the healthcare market, including access control and video, of course, but also other technologies, such as audio-video systems in a dining room. North Carolina Sound has also installed sound masking in some areas with waiting rooms to protect private patient information from being overheard. Locking systems on pharmaceutical doors are another opportunity. Data capture form to appear here! IP based networked video systems A facility’s IT folks must be convinced an IP solution will function seamlessly on their network Among North Carolina Sound’s customers is Wayne Memorial Hospital, Goldsboro, N.C., which uses about 340 video cameras, with 80 percent or more of them converted to IP. The hospital is replacing analogue with IP cameras as budget allows, building network infrastructure to support the system. The healthcare market tends to have a long sales cycle; in general, sales don’t happen overnight or even within a month or two. In fact, the period between an initial meeting with a healthcare facility and installation of a system could stretch to a year or longer. A lot happens during that time. Healthcare systems involve extensive planning, engineering, and meetings among various departments. Physical security systems that involve the information technology (IT) department, as do most systems today, can be especially complex. Installation of networked video systems based on Internet protocol (IP) requires deep and probing discussions with the IT team about how a system fits into the facility’s network infrastructure. A facility’s IT folks must be convinced an IP solution will function seamlessly on their network. Compatible with the network They must vet the technology to ensure the devices and solutions will be compatible with the network, and must sign off on technology choices. And even more important is determining if the security system will adhere to cyber security requirements of the facility. A complete solution that integrates nearly any system that lives on or uses a facility’s network is ultimately what the healthcare vertical is moving toward, says Jason Ouellette, General Manager – Enterprise Access Control & Video, Johnson Controls. Healthcare security professionals are early adopters of technology, implementing the best technology available” “We are hearing more and more from customers across industries that they want to be able to use their security systems and devices for more than just security: they want added value,” says Ouellette. Many want to use access control, video surveillance and other data sources to assess their business operations and/or workflows with the goal of improving efficiency. Upgrade cost-effectively Historically, three factors have prevented many organisations from moving forward with new technologies: lack of money, proprietary systems, and the need to “rip and replace” large parts of the installed systems, says Robert Laughlin, CEO and Chairman, Galaxy Control Systems. "Today, while funding is almost always a limiting factor at some level, the progression of industry standards and ‘open’ systems has made a big positive impact on the ability of organisations to upgrade cost-effectively,” he says. Despite any obstacles, healthcare customers generally welcome new innovations. “I would say healthcare security professionals in general are early adopters of technology and like to implement the best technology available,” says Jim Stankevich, Global Manager – Healthcare Security, Johnson Controls/Tyco Security Products. “For most, rapid implementation is limited by budgets and available funding." Read parts one and three of our heathcare mini series here and here.
When violence or a life-threatening incident occurs, hospitals and other healthcare institutions are often in the crosshairs. Hospitals increasingly face a reality of workplace violence, attacks on patients, and threats to doctors and other support staff. And even if violence happens outside a hospital – such as an active shooter at a public place – the local hospital must be prepared to respond to an influx of injured victims. When conflicts arise inside a hospital, there is an urgent need to lock the facility down quickly. Security professionals and their teams need access control options that allow lockdowns to occur at the touch of a button. Lockdown capabilities are an important aspect of safety and security for hospitals, doctor’s offices and medical facilities The need for mass notification is also growing in the healthcare environment Fire alarm public address system The need for mass notification – another aspect of responding in an emergency – is also growing in the healthcare environment. Various systems can communicate through the fire alarm public address (PA) system to notify people in an emergency, or, alternately, to use email notification, text messaging, pagers, smart phones and/or personal computers (PCs). In lockdown situations, access control systems provide an emergency button with various triggers in the system – a hospital can lockdown specific units or the entire facility. Data capture form to appear here! Jim Stankevich, Global Manager – Healthcare Security, Johnson Controls/Tyco Security Products, points out that the safety of hospital staff, particularly nurses, cannot be overlooked. In the emergency room, 55 percent of nurses are assaulted in some way each year, which is a high percentage. The safety of nurses and all hospital staff deserves more attention. Duress/emergency notification technology Stankevich says one solution is to use duress/emergency notification technology: staff can carry and wear a ‘panic button” or have a two-key combination on their computer as an alarm trigger. When the staff member hits the panic button, a direct message can be sent to security, alerting security staff about the event and requiring a response. There has been an increase in demand for the safety and security of patients, staff and visitors at healthcare institutions, as evidenced by the recent CMS (Centers for Medicare and Medicaid Services) Emergency Preparedness Rule. As of Nov. 17, 2017, healthcare institutions that participate in Medicare or Medicaid must demonstrate compliance with the rule. Emergency preparedness systems A major challenge in compliance to this rule is balancing patient safety with comfort At its core, the rule seeks to establish national emergency preparedness requirements to ensure adequate planning for both natural and man-made disasters, and coordination with federal, state, tribal, regional and local emergency preparedness systems. A major challenge in compliance to this rule is balancing patient safety with comfort. Institutions should consider two-way communication that enables leadership to disseminate targeted messages quickly and efficiently, while arming all employees with a tool that can alert the appropriate staff should an incident occur. Solutions like this enable swift communication of issues without disturbing patients and visitors unless necessary. Effective response to emergencies “Fortunately, hospitals and their security departments are generally well equipped to respond to most emergency situations”, said John M. White, president/CEO of Protection Management, a consultant who works with hospitals to address their security needs. During the Ebola scare in 2014, however, hospitals had to re-examine their plans to ensure they were prepared to meet the challenges specific to rare and deadly disease. “Hospitals are prepared for most things, but Ebola seemed to have caught the whole world off guard, so people responded in different ways,” says White, who previously was security director of two multi-campus medical facilities before becoming a consultant. Hospital security Hospitals made adjustments to their emergency programs to determine how best to handle Ebola patients" He adds, “Hospitals made adjustments to their emergency programs to determine how best to handle Ebola patients and to protect other patients and staff. It was a new threat that healthcare organisations had not specifically addressed.” A particular concern was the possibility of an infected person walking into an emergency room and infecting other people and/or requiring facility decontamination. One role the hospital security department plays in such an emergency is to control access to the facility and to control visitors’ movements once they are inside the facility, says White. If the Ebola scare had progressed to the point that a hospital would need to screen patients, security would be positioned at the front entrance to help with that screening and, if necessary, to direct patients to a specific area for quarantine. Protective equipment Security might also need to wear protective equipment to handle a patient who is resistant to treatment, for example. There are often interactions between security personnel and the general public, a scenario that becomes more complicated if Ebola or a similar infection is likely. In general, security would be tasked with maintaining order and keeping people where they need to be, freeing up the medical professionals to do their jobs more efficiently, says White. To prepare for the impact of the Ebola scare, hospitals addressed various training and equipment needs and adjusted their disaster/emergency response plans. Read parts two and three of our heathcare mini series here and here.
A global UK department store, with a commitment to offering quality products and outstanding service, has ensured the protection of its customer service mobile equipment with Traka’s intelligent locker solutions. Traka’s specialist locker systems The high street favourite has integrated Traka’s specialist locker systems throughout its branch network and top ranking online operations, to store, charge and manage dedicated mobile devices, enabling instant availability for customer service teams across the UK. The high street favourite has integrated Traka’s specialist locker systems throughout its branch network The move was part of a key store investment strategy, which introduced the mobile devices to enable authorised users to take web orders and respond to customer enquiries and stock checks, instantly and efficiently. Digital key management Speaking about the use of digital key management and its impact on the department store processes, a representative for the store said, “We are devoted to working on every aspect of our operations, to continue our pledge of delivering quality products and outstanding service. We believe this, put together with our continued commitment to price matching is what is resonating with our customers.” “We want to streamline our stores and online services to be equally enjoyable places to shop. We are aware we need to respond to personalised customer queries quickly and efficiently, with the right information on any product or service. Intelligent tracking technology “To achieve this, we need our customer-facing teams to be equipped with fast working intelligent technology. Here, Traka excelled at providing a branch solution that allows us to not only store dedicated devices securely, but also integrates into our daily operational systems. We can track where each device is and provide staff with peace of mind that every device is fully charged and up to date with our latest exclusive offers.” Traka’s intelligent lockers were fully networked into existing systems, using its latest generation TrakaWEB software Traka’s intelligent lockers were fully networked into existing systems, using its latest generation TrakaWEB software. This offered in-locker charging facilities, full audit control capability, dedicated fault reporting on any issues with a piece of equipment, and capability to exchange an item with minimal time or resource disruption. Intelligent locker systems Steve Bumphrey, Traka UK Sales Director added, “Any department store’s success is dependent on providing a high level of service, deep knowledge of what it is they’re selling, and a willingness to ensure customers receive the right item. Being able to do so quickly and efficiently, is where the introduction of mobile devices have proven invaluable.” Steve adds, “Traka’s involvement was to understand the unique requirements of the customer services teams and create and network our intelligent locker systems, to make a significant operational difference. Staff no longer need to hunt for working devices to respond to customer enquiries, safe in the knowledge they are ready to use with very latest cross brand and department product and service information and pricing.”
There are many matters that must be taken into account when organising a casino. A top priority is the security of the entire workforce and clientele. An access control system that is reliable and easy to operate provides the basis for that. Casino Baden-Baden is open 358 days a year. In addition to various different pay scale groups and work-time models, a variety of bonuses need to be assigned. Pay may therefore be partly exempt of tax or liable to tax, with holiday bonuses and weekend pay. Recording staff work timings Intensive workshops and consultations were conducted to establish the specific requirements of the casino, so that the best possible solution could be developed. The main focus was on recording work times and transmitting that data to the casino's own specially developed shift schedule program. Given the various different work time models and wage types in numerous variants, complex manual procedures must be automated in future. IF-4735, IF-810, and IF-800 access control terminals Employees can use their passes for cashless payment in the cafeteria and at the vending machines In 1991, a solution for physical access control and time recording was implemented in the form of the IF-5020 software. Since 1998, the IF-6020 software solution has been in use. The hardware terminals IF-4735, IF-810, and IF-800 ensure smooth recording of work times and grant authorised employees access to the various separate areas. Also, the employees can use their passes for cashless payment in the cafeteria and at the vending machines. The system solution from Interflex, with its hardware and software components, now brings employees and administrators substantial time savings and a great deal of convenience. Central access control system All access permissions and work times are now recorded and controlled in one central system, eliminating the disruption of transferring from one system to another, such as to the program for pay and shift planning. This has brought considerable improvement in transparency and in the freshness of data, and paper has been completely banished from work time control.
Delta Scientific, the prominent manufacturer of counter-terrorist vehicle control systems used in the United States and internationally, announced that, on Monday, October 7, at approximately 7 am, a Delta MP5000 portable barrier stopped a stolen Dodge Ram pick-up truck at an entrance gate of the Naval Air Station - Corpus Christi. The stolen car was chased by the local police onto the base. The barrier then impacted the rear of the vehicle, disabling it. Simultaneously, the Air Station announced that an unauthorised person was on base and the facility immediately would go under lockdown with all gates secured to all traffic. Having taken flight after the truck was stopped by the barrier, the intruder was quickly apprehended within the hour and taken into custody by the Bureau of Alcohol, Tobacco, Firearms and Explosives. "This is the second attempted intrusion into the Naval Air Station - Corpus Christi in eight months," explained Greg Hamm, Delta vice president of sales and marketing. Control vehicle access "On February 14, a Delta MP5000 portable barrier stopped a stolen Ford Edge crossover SUV at the North Gate. The trespasser had driven across the base to escape but crashed into the Delta unit and erupted into flames. The driver was shot and killed." Delta's totally self-contained MP5000 mobile deployable vehicle crash barriers now carry an ASTM rating as high as M50, able to stop and disable a 15,000 lb (66.7 kN) G.V.W. vehicle moving at 50 mph (80.4 kph). They tow into position to control vehicle access within 15 minutes. No excavation or sub-surface preparation is required. Once positioned, the mobile barricades will unpack themselves by using hydraulics to raise and lower the barriers off their wheels. DC-powered pumps will then raise or lower the barriers. Once the event is over, procedures are reversed and the barriers are towed away.
VuWall, the pioneer in video wall control and AV network management, announces that the Canadian Space Agency (CSA) successfully deployed VuWall's VuScape processor to monitor the launch of the satellites and their trajectory for the RADARSAT Constellation Mission (RCM). Installed by Applied Electronics, VuScape video wall controller shares and manages incoming content to the control rooms' video walls. Managing multiple surfaces and streams of information "The RCM will collect information from multiple satellites that is critical to maritime management, disaster management, and ecosystem monitoring in Canada," said Paul Vander Plaetse, CEO at VuWall. The CSA can manage multiple surfaces and streams of information, cutting down on the amount of cabling" "From a single VuScape processor, the CSA can manage multiple surfaces and streams of information, cutting down on the amount of cabling. This is an excellent example of how our affordable visualisation solutions can be scaled and tailored to meet the needs of any organisation — from the smallest to the largest and most mission-critical deployments — while adding capabilities that further the value of the system." Performing maintenance and control operations For the project, VuWall's VuScape processor shares the incoming information on the video wall in both mission control rooms and meeting rooms. Control room operators can easily configure and update the layouts as needed on each of the video walls, providing them with at-a-glance information that's vital for performing maintenance and control operations on the satellites that they are mandated to monitor. With a single VuScape processor driving multiple video walls in multiple rooms, the CSA is able to manage the access and control of each individual surface with user profile management, limiting access to view and/or manage video wall content only to authorised personnel.
AASA, The School Superintendents Association, has formed a new partnership with Armor At Hand™, a company that manufacturers Smart Shields™ connected to the internet and are capable of protecting users from handguns and high-powered rifles. The Shields serve as a first layer of protection in the event of an intrusion and serve as an alarm to alert those connected to the system a potential threat is occurring. Armor At Hand manufactures the world’s first lightweight, mobile Smart Shields with internet connectivity and U.S. National Institute of Justice (NIJ) level 3 equivalent test rating, giving it the ability to stop high-powered rifle rounds. Schools, workplaces, places of worship and other venues now have access to the Smart Shield. AASA members can receive a special offer to receive a Smart Shield from Armor At Hand. Immediate protection at first encounter "Armor At Hand’s partnership with AASA speaks to both organisations’ commitment to providing resources to assist school districts before, during and after a crisis,” said Chad Ahrens, founder and CEO, Armor At Hand. “With access to more than 12,000 school districts, the AASA partnership enables us to reach the people that the Smart Shields are designed to protect.” The Shields hide discreetly in plain sight, yet, provide immediate protection at first encounter. Once one of the shields is moved, all the shields in the area are alerted and will light up and buzz while autonomously sending an alert to authorities of a potential threat. Armor At Hand Smart Shield uses ArcGIS by Esri to map real-time danger areas and safe zones while simultaneously offering route guidance to safety for those in harm’s way. Activation movement amount and timeframes are setup at installation to meet the needs of each site. Emerging technology in security “AASA is proud to be partnering with Armor At Hand,” said Daniel A. Domenech, executive director, AASA. “Threats of violence at our schools has continued to be an issue that must be addressed. AASA is committed to keeping students, teachers and schools around the country safe. Launching this partnership with Armor At Hand is indicative of our commitment to doing that by using emerging technology in security.” AASA is the premiere membership organisation representing public school district superintendents across the country and the world. The primary goal of AASA is to advocate for highest quality public education for all students, as well as to develop and support school system leaders.
Globally renowned electronic locks manufacturer, Mul-T-Lock has announced providing Glenveagh National Park in County Donegal, Ireland with over 50 of its high-tech eCLIQ locks so as to enable them to efficiently manage access control rights across the whole estate. Spanning over 170 square kilometres in area size, Glenveagh National Park is the second largest national park in Ireland. It features a number of rugged mountains, pristine lakes, tumbling waterfalls and enchanted native oak woodlands that together make up its ecosystem. At the centre of the national park, on the edge of Lough Veagh, is Glenveagh Castle, a late 19th century castellated mansion, which was originally built as a hunting lodge. Advanced eCLIQ technology allows park managers to schedule individual access permissions for each lock eCLIQ locking system With multiple facilities located on the sprawling site, Glenveagh National Park required a high-security and fully customisable access control solution, and therefore opted for Mul-T-Lock’s advanced eCLIQ locking system. The new and advanced eCLIQ technology allows park managers to schedule individual access permissions for each lock, subsequently granting and revoking access to various areas of the estate whenever necessary. Remote access control solution Stephen Crowe, Regional Sales Manager for Mul-T-Lock, commented, “At Glenveagh National Park there is a need to restrict public access from certain areas for safety reasons, but at the same time, relevant staff should be able to access these areas whenever required”. He adds, “Our eCLIQ system proved the perfect solution for this, as administrators (those who manage the security system) can easily set-up tailored access permissions remotely via our CLIQ Remote Web Manager software. eCLIQ padlocks and cylinders Stephen further stated, “With eCLIQ, administrators also have the ability to set time-limited access – something that isn’t achievable with a mechanical system. For example, padlocks around the estate could be programmed to allow access to certain gates between Monday and Friday, from 8am to 6pm. It’s this customisation that makes our system so popular.” The Mul-T-Lock system was specified and installed by Paul Speer at JP Speer Locksmiths, who added, “We now have over 50 eCLIQ padlocks and cylinders securing gates, offices and the Visitor Centre within this impressive estate. The complete system is managed from the main office and once set up it is easily maintained, with the flexibility to change quickly whenever required.” Mul-T-Lock advanced eCLIQ technology Another great feature with eCLIQ is the way in which you can expand the system retrospectively when needed" Paul further said, “Another great feature with eCLIQ is the way in which you can expand the system retrospectively when needed. Glenveagh National Park has used mechanical systems in the past, but these haven’t been able to satisfy its access control requirements. Mul-T-Lock’s eCLIQ technology ensures that access rights are maintained for years to come.” Pat Vaughan, District Conservation Officer at Glenveagh National Park, finished by saying, “Mul-T-Lock’s eCLIQ system is the perfect fit for our Park as it has all the features that such a vast estate as ours requires. Park security He says, “During our summer season our visitor numbers quadruple and we have to employ seasonal staff to meet this demand. Having such a system as Mul-T-Lock’s eCLIQ means that we can set up temporary access for these workers, with all the relevant access rights required. The eCLIQ system also enables us to deactivate keys and revoke access at the click of a button.” Pat adds, “This is particularly helpful if any of our team accidently lose their keys, or if temporary staff forget to return keys after their time with us. We are extremely happy that we opted for the eCLIQ system to secure our beautiful estate; it will stand the test of time for years to come and has all the features we require to manage, build and secure our Park and its future.”
Round table discussion
Securing large campus environments can be particularly demanding and requires a range of technology solutions. In effect, a campus may represent a dozen or more individual facilities to be secured, in addition to protecting the overall environment. Seeking more insight into the number and variety of needs of securing a campus, we asked this week’s Expert Panel Roundtable: What are the security challenges of protecting large campus environments?
Along with the integration of security and other systems in an enterprise environment comes a need to centralise monitoring and control of the unified network. A control room is at the center of managing integrated systems, providing the focal point to collect information from a variety of sensors, analyse the data, and then respond appropriately. The technologies that drive these functions are changing and evolving, thus increasing the efficiency and efficacy of systems. We asked this week’s Expert Panel Roundtable: What’s new in command-and-control systems, and what is the impact?
While unpacking our bags from a trade show, it is interesting to consider the dominant themes and trends we heard and saw at the show. So it is with the recently concluded Global Security Exchange (GSX) show in Chicago, presented by ASIS International. Amid all the product promotion, training sessions, networking and tired feet at the show, what really stood out? We asked this week’s Expert Panel Roundtable: What was the big news at the GSX 2019 trade show in Chicago?
Security access systems: Manufacturers & Suppliers
- HID Security access systems
- Vanderbilt Security access systems
- CyberLock Security access systems
- CEM Security access systems
- Parabit Security access systems
- TruPortal Security access systems
- TESA Security access systems
- Delta Scientific Security access systems
- AMAG Security access systems
- Nedap AEOS Security access systems
- TDSi Security access systems
- Gallagher Security access systems
- BQT Solutions Security access systems
- Alpro Security access systems
- Dahua Technology Security access systems
- DSX Security access systems
- Morse Watchmans Security access systems
- Anviz Security access systems
- LifeSafety Power Security access systems
- Linear Security access systems