Security access systems
Secure Logiq is thrilled to announce the launch of 'The Power of Partnerships: Intelligent Integration' at The Security Event 2024. Technology partners Featuring a selection of esteemed Technology Partners in an immersive and interactive live demonstration, the event will spotlight how the meticulous selection of best-of-breed hardware and software components for enterprise electronic security systems can deliver unparalleled results. Alongside Secure Logiq’s cutting-edge server technol...
Delta, a global pioneer in power management and a provider of IoT-based smart green solutions announced its participation in the upcoming Advanced Factories 2024 with a showcase under the theme "Connecting Devices, Shaping Solutions." VTScada and the IIoT The exhibit will include the VTScada energy management solution and the IIoT Solution for Industry 4.0. VTScada is a cutting-edge SCADA software that has been supporting the world’s largest mission-critical applications for over three d...
Synectics, a pioneer in advanced security and surveillance systems, announces its latest Synergy software release. Tools for improved incident management and team collaboration dominate the features list, with a new mobile app, simplified web-based system access, and remote camera sharing among the latest additions. Clear collaboration on vital tasks Synergy’s new mobile app delivers coordinated security management beyond the control room. The app offers seamless task management....
The security industry offers a vast array of technologies and vendors. This can be overwhelming for end users, who depend on security integrators for guidance and service. But how well do security integrators provide end users with what they need? We asked this week’s Expert Panel Roundtable: What are the biggest challenges that end users face when working with integrators?
Vitaprotech, the European security solutions group, has announced the appointment of Delphine Guerrier as CEO for the EMEA region (Europe, Middle East, and Africa). With many years’ experience in the general management of major international groups in the security industry, Delphine Guerrier brings to Vitaprotech significant expertise and a strategic vision to propel the group towards new challenges. Delphine's responsibilities Her appointment follows the recent signing of an acquisitio...
Colt Technology Services, the digital infrastructure company, announced it has been formally recognised as a Gold Google Verified Peering Provider. The prestigious accreditation was secured on the basis of its extensive global infrastructure and its deep experience with hyperscalers in delivering business-critical cloud services for enterprises. Now, businesses can select Colt as a Verified Peering Provider to simplify and automate their enterprise-level access to Google resources such as Works...
News
Federation of Gujarat Industries (FG)), Vadodara has conferred the Outstanding MSME Excellence Award at the 18th FGI Awards presentation ceremony. The objective behind the institution of these awards is to recognise excellence in economic, social, and scientific areas. The FGI believes that through these awards, the industrial and social achievements in Gujarat will be recognised publicly and encourage others to contribute to the country's efforts of globalisation and economic development. Technology solutions Speaking about the achievement, Ganesh Jivani, the CEO of Matrix Comsec, said “We are honoured to be recognised for making a meaningful and positive contribution to the economic and technological development of our community and country. Each of us at Matrix is passionate about our shared purpose to create a world-class technology organisation." Ganesh Jivani adds, "The award is a testimony to the efforts of all our employees and associates, whose efforts have enabled us to deliver world-class products consistently and to win and keep the faith of our customers. This award boosts our confidence and encourages us to work harder towards our mission of building world-class technology solutions for the world.”
Let’s face it, any security product fixed to a substrate in a public space is only as secure as its fixings, and key safes are no exception. The integrity of a key safe isn't solely reliant on its resistance to tampering and vandalism, although that's undeniably crucial; the quality and size of the fixings used to attach it to a wall are equally pivotal. Otherwise, it runs the risk of being easily removed from a wall in a matter of minutes, if not seconds, potentially causing a property break-in, costly key and lock replacements, and undermining end-users confidence not only in a specific product but the entire concept of keys storage at the point of entry, all due to a single underperforming key safe fixing. Size or quality? striking the balance When tested in real-world scenarios, fixings of identical size do not necessarily ensure identical performance Size indeed matters. It is common sense that when under attack, chunky, large structural bolts would hold a key safe in place far more effectively than smaller anchors or more wood screws, which some key safe brands offer as a standard securing method. However, the numerous professionally executed attack tests that Keynetics has conducted underscore that the quantity and quality of fixings are equally important. When tested in real-world scenarios, fixings of identical size do not necessarily ensure identical performance. Fixing tests within the security accreditation process Through years of product development and continuous accreditation, Keynetics has discovered that the choice of fixings can be the final deciding factor in whether a key safe passes or fails during an attack test. Keynetics’ accreditation with LPCB encompasses two critical facets of key safe robustness: attacking the key safe itself and detaching it from a substrate. The latter is significantly dependent on both the fixings used and the product’s design. Trial-and-error approach For Keynetics, this means conducting extensive research into fixings and ongoing testing, which sometimes includes a trial-and-error approach to identify the best-performing fixings for the key safe applications. Furthermore, the company provides different types of fixings sourced from meticulously selected suppliers, based on the type of substrate, such as brick, concrete, or metal. Installing it right While key-safe installation may seem straightforward and takes little time, it must be done correctly Fixings imply installation. While key-safe installation may seem straightforward and takes little time, it must be done correctly to eliminate potential security risks, especially in commercial applications. Keynetics offers a nationwide installation service for all key safes. Alternatively, full training and support materials are provided to clients’ installers to ensure that the process is executed correctly, prevent missteps that could compromise key safes’ security rating and certifications, and reassure end users that keys are stored safely. Robust security solutions When in doubt, always seek information from the key safe supplier to find out more about the most crucial elements and product components. Keynetics is always eager to help and answer any questions regarding key safe products, access management, security accreditations, and commercial applications, underscoring its commitment to ensuring robust security solutions.
Metrasens, a provider of advanced detection systems for security and safety applications, is pleased to announce its partnership with the Central Indiana Educational Service Centre (CIESC), which provides cooperative purchasing programmes for member school districts across Indiana. Through this partnership, CIESC member schools, as well as 270 other districts that are members of other Education Service Centres (ESC) across Indiana, can purchase Metrasens Ultra weapons detection systems through the CIESC Cooperative Contracts programme. Ultra weapons detection systems This collaboration empowers all school districts in Indiana that are a member of their ESC with readily available, discounted contracts for Metrasens Ultra weapons detection systems. By tapping into the CIESC Cooperative Contracts product and service procurement programme, schools can avoid the costs and administrative complexities associated with initiating their request for proposal (RFP) process. Safety and security solutions “We are happy to welcome Metrasens as an approved vendor and integral part of our Cooperative Contract purchasing service,” said Kelly Taylor, Director of Cooperative programmes. “This collaboration enables our member schools to access Metrasens’ cutting-edge technology when evaluating safety and security solutions. We value the contribution of the Metrasens Ultra, a pivotal weapons detection system that empowers our member schools to prioritise the safety of students, staff, and the broader community.” Proactive and accurate approach Portable and easy to operate, Metrasens Ultra allows for efficient and respectful screening Metrasens epitomises a proactive and accurate approach to identifying potential risks within educational settings. Trusted by school districts nationwide, Metrasens Ultra systems play a vital role in weapons detection at extracurricular events and vape detection within school premises. Harnessing magnetic detection technology, Metrasens Ultra is designed with safety in mind for all individuals, including pregnant women and those with medical conditions, operating with a passive search method. Portable and easy to operate, Metrasens Ultra allows for efficient and respectful screening, ensuring a secure environment without hindering access. Invaluable dual-functionality tool “We are excited to be working with Central Indiana Educational Service Centre and to provide our support to their member school districts in achieving their safety and security objectives,” said Chris Arbeitman, Vice President of Market and Business Development at Metrasens. “Metrasens Ultra stands as an invaluable dual-functionality tool, seamlessly integrating weapons and vape detection capabilities into a school’s security infrastructure. It achieves a delicate balance between effectiveness and non-invasiveness, enhancing existing layers of protection.”
The Security Executive Council, with Rice University and MD Anderson Cancer Centre, will facilitate a day and a half of expert-led sessions on workplace violence risk management for corporate security practitioners, cross-functional partners, and police and emergency responders. According to the Bureau of Labour Statistics, in 2020 there were more than 37,000 nonfatal workplace injuries inflicted intentionally by another person and nearly 400 workplace homicides. Healthcare workers are five times more likely to suffer workplace violence than workers in other industries. These numbers underline the criticality of strong cross-functional workplace violence prevention, preparedness, and response efforts in every organisation. Real-time for offsite participants The event will take place at Rice University in Houston and will also be streamed in real-time The Workplace Violence Management State of the Industry conference will include seven seminar sessions, networking opportunities, and a keynote by Shibu Varghese, Senior Vice President of People, Culture & Infrastructure for MD Anderson Cancer Centre. Individual sessions will tackle a range of issues, including awareness, regulatory considerations, program strategy and planning, incident response, and proven practices. The event will take place at Rice University in Houston and will also be streamed in real-time for offsite participants. Discounts are available for students and active law enforcement. Takeaways and industry connections “In today's environment, workplace violence is an ever-present risk for every organisation,” said Dean Correia, SEC Emeritus Faculty of Business Continuity. “Every function responsible for managing workplace violence will benefit from attending this event. The takeaways and industry connections will better enable pioneers to proactively train their people and increase their confidence in current and future people and asset protection programs.”
Invicti, the pioneering provider of application security testing solutions, announced its new AI-enabled Predictive Risk Scoring capability. The feature assigns predicted risk to applications and helps organisations gain a strategic view of their overall application security risk. Predictive Risk Scoring allows organisations to determine which web applications should be scanned first and proactively prioritise remediation efforts. This new capability remaps the application security testing process to profile and calculate a risk score on all discovered web applications–before any scanning begins. New advancement in AppSec Risk management and prioritisation are ongoing challenges in application security with the high volume of vulnerabilities that are discovered across web applications and APIs. While vulnerability severity helps order which vulnerabilities might require attention over others, there’s still a lack of information around exploitability and risk. Risk control and prioritisation are ongoing challenges in application guard with the high volume “Everyone working in cybersecurity needs to work faster, with more confidence that they are doing the right thing to protect their organisations. This new advancement in AppSec testing helps make that a reality,” said Neil Roseman, CEO at Invicti. “CISOs can now look at their application attack surface using a risk-based approach, guaranteeing that their AppSec program is focusing efforts in the right areas.” Advantages of this innovation Predictive Risk Scoring addresses the gap in vulnerability severity information by applying an AI model on discovered assets and calculating risk score from a set of 220 parameters with a minimum 83% confidence level. Among many advantages of this innovation, no scanning resources are required and no customer data is required to assess the risk score. “Protecting applications is crucial for companies of all sizes but it’s challenging with the complexity and noise in the application security market, amplified with the adoption of AI. Now more than ever, security teams need to prioritise their efforts to address to the riskiest issues, with speed and scale,” said Melinda Marks, Practice Director, Cybersecurity at ESG. “Risk-based prioritisation can help organisations best deploy their resources and optimise efficiency to secure their environments to support business growth.” Predictive Risk Scoring is currently available to Invicti customers using both Acunetix and Invicti (formerly Netsparker) product lines.
The Cygnus ALERT notification and monitoring platform is a cloud-based solution designed to strengthen site safety. Using Cygnus ALERT, construction professionals and site administrators can receive event, fault, or mesh information in real time, enabling swift responses to on-site situations. Cygnus ALERT Cygnus ALERT is a subscription-based cloud portal solution, accessed through a 2G and 4G cellular hardware module, with easy user management and notifications provided through the cloud portal via a Windows browser or intuitive, user-friendly Android app. The ability for integrators to assign engineers and also end users provides enhanced support not only to the integrator but also added benefit to on-site managers. Real-time information Cygnus ALERT module can be fitted into the SITENET control panel on-site during installation Designed for seamless integration with the SITENET range of fire detection and alarm systems, the Cygnus ALERT module can be fitted into the SITENET control panel on-site during installation and can also be retrofitted into pre-existing installations. Real-time information is automatically communicated to site administrators through the cloud portal to the app and via SMS, enabling prompt action to be taken, thereby, enhancing response times. Adaptable to a wide range of applications Each control panel allows for one module to be installed. The cloud portal can view and notify on multiple sites, this level of scalability ensures that the Cygnus ALERT platform is adaptable to a wide range of applications. It can also remotely display system information once a fault is detected to provide more in-depth detail on the issue, such as battery status faults, mesh status, and fault history. Cygnus ALERT is versatile and applicable to various settings such as industrial facilities, transport hubs, airports, shipyards, construction sites, and other environments. Efficiency and responsiveness “The Cygnus protocol is the backbone of the SITENET system, and we are delighted to be building on our solution with the new Cygnus ALERT platform,” comments Carl Leeson, Head of Sales at Bull Products. He adds, “It offers impressive efficiency and responsiveness and when combined with its seamless integration with SITENET, easy to use cloud portal and app, Cygnus ALERT ticks every box. We are delivering solutions to our customers that allow them to stay a step ahead while ensuring optimum safety and peace of mind.” SITENET range Cygnus ALERT users can enjoy a complimentary subscription with their first purchase to provide immediate access. For continued access and uninterrupted benefits, a subscription is required beyond the initial period. The SITENET range is a robust, reliable, and scalable solution. Featuring patented, self-forming, and self-healing wireless mesh protocol technology, SITENET provides a cause-and-effect programming capability for timed and zone-controlled evacuations making it the perfect fire-safety solution for any temporary project.
Expert commentary
As we head into a new year, it’s fair to say that it isn’t easy out there for the security integrator community. That’s understandable given the big ruptures felt in the market for physical security in 2023. Typically, Commercial Real Estate (CRE) landlords are the biggest and most influential buyers of physical security hardware and software, but this is starting to wane as heightened borrowing costs and biting inflation cause real estate valuations to plunge. Building security upgrades A lot of CRE landlords are in a fight for survival which unfortunately doesn't leave much room for budget spend on building security upgrades. This state of affairs is a problem for security integrators with extensive connections in the CRE space. Where do they pivot their services to keep their business growing in 2024? From the conversations I’ve been having with integrators and customers alike over the past few months – the answer is that the growth potential lies in the enterprise space. The trajectory of enterprise IT and physical security Aren’t enterprises carrying out cost-cutting efficiency drives and downsizing office space to reflect hybrid working It might initially feel unnatural to see the enterprise segment as a potential driver of demand for physical security services and products. Aren’t enterprises carrying out cost-cutting efficiency drives and downsizing office space to reflect hybrid working habits? These things are true but also present an opportunity for the right physical security proposition. Standardisation of enterprise IT Take efficiency drives as an example. A key element of such efforts is an acceleration towards the standardisation of enterprise IT platforms, hardware, and solutions, using the cloud. What was once a focus on moving on-prem systems and workloads to the cloud has shifted to efforts to keep cloud OpEx costs down by centralising as much as possible. Practically, this means utilising APIs to plug disparate IT applications and services into central platforms that boast a “single pane of glass” view. APIs APIs drive consumption, open new business models, and foster cross-industry partnerships APIs aren’t anything new to enterprises. They drive consumption, open new business models, and foster cross-industry partnerships. However, the use of APIs in the physical security sphere has been surprisingly slow to take off. There are multiple elements to this but a key reason is that some security software products on the market aren’t cloud-based. Adding cloud-based solutions to network Others are cloud-based, however, and these are the solutions that security integrators need in their portfolio to serve the influential enterprise market segment and its approach to IT networks. Selling the value of these solutions requires integrators to take it a step further by speaking the language of the enterprise IT buyer and understanding their goals. The power of cloud-based access control in the enterprise Hybrid working and the occupancy rate fluctuations it brings require closer monitoring of access events The continued relevance of physical security for enterprises can’t be understated. After all, hybrid working and the occupancy rate fluctuations it brings require closer monitoring of access events – not less. Despite the discourse around office downsizing, the reality for most enterprises is that the office can’t be done away with completely and there’s always going to be growth experienced by successful companies that require an upgrade in physical square footage. Physical security Access control systems that are cloud-based will be preferred by the enterprise to fulfill the essential function of physical security. That’s because they align with the push towards centralisation in the cloud that enterprises are carrying out business-wide. Access control has the potential to result in lots of disparate dashboards and apps. Think video management, license plate recognition, building management software, elevator monitoring, hot desking solutions, guest booking software, room booking functions, and more. Uniting all of these functions in one platform suits enterprise security teams well. Access control solutions Linking employee databases to an IAM solution, or creating seamless experiences by tying access credentials But this only scratches the surface. Access control solutions that can be integrated with hugely popular corporate software applications like Okta, Azure Active Directory, and Google Workspace quickly catch the eyes of enterprise IT security teams by pulling in the same direction as the broader tech stack. Whether it’s applying AI analytics to anomaly detection, linking employee databases to an Identity Access Management (IAM) solution, or creating seamless experiences by tying access credentials to things like meeting room bookings, it’s through APIs that cloud-based access control can thrive in an enterprise setting. Security integrators It’s worth also noting that as enterprises grow, access control gets harder. Managing the access requirements of thousands of employees across a global real estate footprint requires the scale that cloud computing is best placed to bring. Security integrators who can join the dots to make that link are well positioned to pivot toward the enterprise. Broadening horizons Concepts like smart access and applying AI to access data to automate the monitoring of occupancy rates This pivot is understandably a daunting prospect but the potential for natural synergy shouldn’t be overlooked. Concepts like smart access and applying AI to access data to automate the monitoring of occupancy rates and security anomalies won’t be completely alien to cloud-first enterprises. That’s an opportunity for integrators to upsell more sophisticated security set-ups in a way that they may have found more difficult with CRE clients and prospects. Tailored propositions It would be remiss to avoid mentioning that ‘enterprise’ is a very loose term that encompasses businesses across multiple industry verticals. To better pivot, security integrators need to offer tailored propositions specific to set verticals that cover all bases as opposed to offer, for example, piecemeal alarm or video product solutions. Enterprise industry verticals Security integrators should be weary of all-encompassing narratives in 2024. Whether or not the global economic picture darkens, there are always going to be pockets of growth within certain enterprise industry verticals. Plus, anecdotally, the indicators point to enterprises being the driver of demand for cloud-based access control as we head into the new year. Integrators who can dial into that shift have a lot to gain and nothing to lose.
When a bomb detonated in the Port of Beirut, I had hundreds of employees under my care inside the blast zone. Within just two hours, I was able to determine who was impacted, understand their safety conditions, and share resources for on-the-ground support—all thanks to mobile technology. For Chief Security Officers, receiving calls like these launches a variety of protocols and necessary decision-making with the safety and security of people and assets as a top priority. And these calls are only becoming more common. Dependence on threat intelligence Mobile phones have dominated the post-COVID environment where people work from anywhere Threats ranging from natural disasters to geopolitical conflicts are becoming more frequent and complicate the responsibility organisations have in keeping their people safe. To meet these needs CSO’s are staying ahead of negative outcomes through creating a greater dependence on threat intelligence. In these times, effective, real-time risk management depends on hyper-local data from technology that is accessible, portable, and dynamic–such as cell phones. Mobile phones have revolutionised the way people live and work. They allow us all to walk around with a computer in our pocket, bringing the world to our fingertips and eliminating digital borders for over 90% of the world's population. Mobile phones have dominated the post-COVID environment where people work from anywhere and have geographically distributed teams but are also more vulnerable to threatening events. Mobile-friendly risk management platforms Mobile technology assigns workers with easy entry to data that can help keep them and their teams safe As we approach 2024, many organisations are adopting comprehensive risk management tools that empower personnel across the organisation with the intelligence and knowledge they need to stay safe wherever they are. Mobile-friendly risk management platforms, such as Crisis24 Horizon, provide always-on awareness, on-hand threat intelligence, and immediate communications and distress signalling through location monitoring. Users receive location risk assessments and push notifications directly to their devices about nearby issues and threats no matter if they are on or off the job. While only select risk managers have complete control of the platform and all sensitive employee data is protected through encryption, the app distributes critical intel to foster a culture of shared awareness and responsibility. Thus, mobile technology empowers employees with easy access to information that can help keep them and their teams safe. Creating a culture of mobile technology adoption In the last few years, the world has proven the importance of being well-informed of risks and mitigation plans to minimise harm. However, psychological barriers tend to trump physical barriers when it comes to accessing the vast array of tools our mobile devices offer. World has proven the matter of being well-informed of risks and relief plans to minimise harm Adopting this technology and establishing a culture that enforces risk management across an organisation is a daunting challenge that demands substantial commitment from leadership to be successful. Some companies have tackled this challenge by positioning security technology as part of the organisation’s employee benefits package, such as commuter benefits and health insurance, to encourage people to take advantage of these resources and learn how to use them. Cohesive risk management culture Technology is only as effective as the people whose actions it informs, which is why adoption and integration are so important. When a cohesive risk management culture meets a powerful technology platform, individuals are enabled to receive threat alerts and counter their impacts, letting others know when and how to take the necessary precautions to protect themselves and their team. For more information on mobile technology and other security trends, check out the Global Risk Forecast, an annual report by Crisis24 that provides a comprehensive analysis of key events around the world most likely to affect operations in the coming year.
These days, business is more collaborative, adaptable and connected than ever before. In addition to offering new identities and access privileges, new applications and data also increase the attack surface available to cyber criminals, hacktivists, state actors and disgruntled insiders. These new identities need to be handled carefully. CISOs must develop an identity management strategy that is consistent across on-premises, hybrid and cloud systems. Good security is built on solid identity governance and administration (IGA) principles. From ransomware to supply chain intrusions, high-profile cybersecurity events frequently take advantage of weak identity and access management procedures. The Identity Defined Security Alliance found that 84% of organisations experienced an identity-related breach during its one-year study period. Robust IGA system Consequently, organisations need to find best-of-breed solutions for each section of the fabric Some of the most well-known cyber-attacks have not been made possible by a nation-state exploiting a remote zero-day vulnerability; rather, they have been made possible by something as basic as a hacked orphaned account. This resulted in lateral movement from an insecure platform to a high-value system, illegitimate privilege escalation or unsanctioned access to a computer system. To safeguard against such attacks, organisations must be aware of who has access to their systems and apps, and guarantee that access is revoked when it is no longer required. Here, a robust IGA system is helpful. It is not the whole picture, though; IGA is part of a larger identity fabric. A report by KuppingerCole noted that “Identity Fabrics are not necessarily based on a technology, tool or cloud service, but a paradigm for architecting IAM within enterprises.” The report pointed out that the paradigm is created using several tools and services. That’s because, contrary to marketing claims, no one vendor has a platform that provides all the needed elements. Consequently, organisations need to find best-of-breed solutions for each section of the fabric. Threats to the new corporate landscape Due to their exclusion from the corporate firewall and the security culture that comes with working on-site, remote employees and third parties are desirable targets for hackers. The transition to online office suites is another vulnerability that hackers are taking advantage of–for instance, through bogus authentication login dialogues. Additionally, hackers are using technologies like machine learning and artificial intelligence to circumvent current security tactics. A cyberattack powered by AI will imitate human behaviour and develop over time. Even publicly available information might be used by this "weaponised AI" to learn how to get past a target’s defences. CISO and the business users Attackers will finally find an entryway, but firms can protect the new perimeter–their identities It's no longer possible to secure the traditional perimeter. Attackers will eventually find an entryway, but businesses can protect the new perimeter–their identities. To defeat these threats, organisations must look again at identity and access management tools and how they are weighed against the impact on the organisation. Should you mandate multi-factor authentication (MFA) more often and earlier? Should only company-owned devices have access to networks, or should access be restricted to specific business hours or regions? Should access to sensitive information and critical systems be given just temporarily or should it be offered on a task-by-task basis? Both the CISO and the business users they assist should be asking these questions. Staying ahead of threats with identity Access control limits decrease dangers but can come with a cost. If you give your users too much access, your organisation becomes susceptible; if you give them too little, productivity suffers. But there are ways to strike a balance with security, compliance and productivity. More CISOs are turning to Zero Trust–which is based on the principle of maintaining strict access controls and not trusting anyone by default–to protect their systems from new attack types. However, Zero Trust is reliant upon having a thorough and baked-in strategy that underpins it. Other actions that companies can take include implementing automation for identity management, such as automating workflows for approval. This would significantly lessen the administrative burden and friction that security solutions like multifactor authentication (MFA) or time-restricted access to critical systems have on business users. This might include restricting access to particular devices, capping access hours during the day or enforcing MFA based on user behaviour. Identity fabric: Putting it all together Make sure your identity architecture is scalable, secure, and provides a seamless user experience These are just two elements of the identity fabric approach. Most organisations today have implemented pieces of an identity fabric, which is basically an organisation’s identity and access management (IAM) infrastructure and typically includes a mix of modular IAM solutions for multi-cloud and/or hybrid environments. Now, organisations need to define, enhance and develop this infrastructure. They must also institute guiding principles for how it should operate, meet current and future business requirements as well as identity-related cybersecurity challenges. In doing so, businesses can move past identity platforms and adopt an identity fabric perspective. The key is to make identity governance the starting point of your identity fabric strategy, ensuring seamless interoperability within your identity ecosystem. Make sure your identity architecture is scalable, secure, and provides a seamless user experience. Aligning security with business Due to the increase in knowledge workers using the cloud and working remotely, attackers are focusing on this group. These employees are easier to compromise, give access to valuable data and offer more attack targets. Knowledge workers also lack an administrator’s level of security expertise. Therefore, as part of their security fabric strategy, enterprises require a scalable IGA system. It is easier to comply with security and access regulations and takes less time for IT teams to do normal administrative activities when they invest in IGA, a crucial tenet of identity security. CISOs and boards, though, are currently looking at more than identity management. IGA is at the centre of the debate about security and governance. Taking an identity fabric-based approach, with a foundation built on modern, cloud-based IGA, will safeguard identities, increase productivity, and make staff adherence to organisational procedures easier.
Security beat
Active shooter situations grab the most attention, but there is a long list of other threats facing schools, including bullying, vandalism and emergency medical situations. Broadly speaking, a comprehensive approach to school security should prioritise prevention, preparedness and response to all threats. Holistic security approach “Fostering a culture of safety within a school, which involves strong relationships, trust, and communication, is highly effective and does not require significant costs,” says Christin Kinman, End User Sales Consultant with Allegion, a security manufacturer. “It is crucial to educate stakeholders about the unintended consequences of quick fixes, like barricade devices, to ensure informed decision-making and a holistic security approach. The goal should be to promote safety and security for all, every day, in every situation.” Integrated and successful security plans While this might solve a particular challenge, it can also create unintentional conflicts" "Creating an integrated security plan requires a multi-faceted approach," says Kinman. "Too often, security measures are implemented as a reaction to either an event or a specific vulnerability. While this might solve a particular challenge, it can also create unintentional conflicts," adds Kinman. “Creating a successful security plan involves a comprehensive approach,” she says. “An effective, systematic approach begins with assessing, identifying, and valuing assets, identifying threats and vulnerabilities, quantifying the impact of a loss, analysis and prioritisation, and finally, development of mitigation measures.” Safety and security An effective resource is the Partner Alliance for Safer Schools (PASS), which provides a framework to help with school assessments, including identifying and valuing assets, identifying external threats and internal vulnerabilities, assessing the impact of loss, and analysing and prioritising mitigation measures. Safety and security are words used seemingly interchangeably when it comes to schools, but they mean different things. “How we define these terms influences planning and addressing challenges,” says Kinman. “It is easiest to think of these terms as being either external or internal to the individual.” Coordinated security Safety is internal to the individual and relates to the individual’s perception of being free from harm Security is external to the individual and encompasses the protective physical, emotional, and environmental measures implemented in conjunction with policies, procedures, and training, as well as mental health measures and social and emotional learning. Safety is internal to the individual and relates to the individual’s perception of being free from harm or danger. Coordinated security measures create an environment of safety. Four main elements of physical security Kinman lists four main elements to physical security, often referred to as the 4D’s. These elements are deter, detect, delay, and deny: Deter refers to measures implemented to prevent an attack or threat from happening. These are usually visual deterrents that communicate legitimate use. Detect refers to measures that can detect the presence of a threat, such as video surveillance and monitoring. Delay refers to measures that slow down an attack or increase the level of effort needed for an incident to occur. Finally, deny refers to measures that prevent or restrict access to valued assets. Four layers of ground perimeter A layered approach to school security creates “layers” that must be defeated for an event to occur, says Kinman. Typically, the four layers are the ground perimeter, the private grounds around the building, the building perimeter, and the building interior. The ground perimeter layer demarcates public vs private space, and deterrence is the primary objective. The grounds layer allows for identification of legitimate vs illegitimate users and detection is the primary objective. The building perimeter layer prevents illicit users’ intent on harm from gaining access. The primary objectives at this layer are delay/deny. The building interior protects the most valuable assets, and the denial of an unauthorised individual is the primary objective. Report on Indicators of School Crime and Safety The second element is impact, also rated on a scale of 1-5 and ranging from negligible to catastrophic “Quantifying loss and assessing risk is one of the most important steps in creating an integrated security plan,” says Kinman, who explains that the two elements that guide this step are probability and impact. Probability is the likelihood that an event will occur, typically rated on a scale of 1-5 ranging from rare to almost certain. The second element is impact, also rated on a scale of 1-5 and ranging from negligible to catastrophic. “Probability multiplied by impact equals risk, which has a score ranging from 1-25,” says Kinman. “The higher the score, the higher the risk.” An analysis of vulnerabilities and threats using a matrix yields a systematic approach to prioritise improvements and identify mitigation measures. For statistics on crime and safety in schools, visit the Report on Indicators of School Crime and Safety: 2022. Security improvements “The costs of school security encompass various aspects, including physical measures, personnel, training and policy enforcement,” says Kinman. “While there is no fixed amount, it often involves investments in technology, such as access control and emergency response systems. Many security improvements do not require additional funding, like training staff and students on security protocols and implementing policies to create a culture of safety.” Generally, funding for public school security is a shared responsibility among federal, state and local governments; communities also contribute. “Striking a balance between shared responsibility and ensuring adequate resources is crucial for effective school security,” says Kinman. K-12 school security Community members and parents can donate by being vigilant and noting any suspect activities Various stakeholders play crucial roles in enhancing K-12 school security in addition to schools and communities. Stakeholders include community members, parents, local government, local law enforcement, first responders and non-profit organisations. “Engaging these stakeholders fosters a comprehensive approach to school security,” says Kinman. Community members and parents can contribute by being vigilant and reporting any suspicious activities. Local government can support schools with funding and resources, while local law enforcement and first responders can provide expertise, conduct drills, and establish emergency response protocols. Safe and secure learning environment In addition, non-profit organisations can offer valuable resources, training, and support programmes to address specific security concerns. “By involving all these stakeholders, schools can tap into a diverse range of expertise, resources and perspectives, pioneering to a more effective and comprehensive approach to school security,” says Kinman. “Collaboration and communication among these entities are vital to ensure a safe and secure learning environment for students and staff.”
Companies at GSX 2023 emphasised new ways that technologies such as artificial intelligence (AI) and the cloud can address long-standing issues in the security market. Among the exhibitors at the event in Dallas were companies seeking creative ways to apply technology, lower costs, and make the world a safer place. Reflecting on the exhibition, here are some additional takeaways. Expanding AI at the edge i-PRO is a company reflecting the continued expansion of edge AI capability in the security market. Today, more than half of the company’s lineup supports AI at the edge so the customer has a wide choice of form factors when seeking to leverage the feature set. AI processing relay, extended warranty i-PRO is increasing their warranty period from 5 to 7 years, which could be a lifetime warranty in some cases I-PRO also has an “AI processing relay” device that accepts non-AI video streams and applies edge analytics. AI has progressed from a high-end technology to a feature available in a variety of cameras at different price points. i-PRO is also increasing its warranty period from 5 to 7 years, which could be a lifetime warranty in some cases depending on a customer’s refresh schedule and lifecycle management. Active Guard, MonitorCast The company’s video management system (Video Insight) is continuing to build new features including “Active Guard,” an integrated metadata sorter. Their access control platform, MonitorCast, is a Mercury-based solution that is tightly integrated with Video Insight. Their embedded recorders now have PoE built in. “We can move at a faster pace to fill out our product line since leaving Panasonic,” says Adam Lowenstein, Director of Product Management. “We can focus our business on adapting to the market.” Emphasis on retail and other verticals Shoplifting is a timely issue, and retail is a vertical market that got a lot of attention at GSX 2023. “We see a lot of retailers who are primarily interested in protecting employee safety, but also assets,” says Brandon Davito, Verkada’s SVP of Product and Operations. “Shrinkage is a CEO-level priority.” “Retailers are getting more engaged with security posture, instead of letting perpetrators walk,” Davito adds. Intrusion detection Verkada has an intrusion product that will notify a central station if there is an alarm On the alarm side, Verkada has an intrusion product that will notify a central station if there is an alarm, and operators can review videos to confirm the alarm. Other capabilities seeking to discourage trespassers include sirens, strobes, and “talkdown” capabilities. International expansion Verkada continues to expand internationally with 16 offices in all, including Sydney, Tokyo, and London. The core value proposition is to enable customers to manage their onsite infrastructure more simply, including new elements such as PTZ cameras, intercoms, and visitor management. Verkada emphasises ease of use, including a mobile application to allow access to be managed across the user base. Forging partnerships “We are committed to the channel and industry, and we continue to build relationships and expand our reach,” says Davito. Among the industry relationships is a new partnership with Convergint, which was hinted at during the show and announced later the same day. They are also expanding their partnerships with Schlage, Allegion, and ASSA ABLOY. Working with other verticals They offer new features for K -12 schools, and a new alarm platform is easier to deploy and manage Verkada has also found success across multiple other verticals, notably healthcare, where they integrate with an electronic medical records system. They offer new features for K-12 schools, and a new alarm platform is easier to deploy and manage. They are integrating wireless locks to secure interior doors in schools, looking to secure the perimeter, and installing guest management systems. Transitioning the mid-market to the cloud Salient is squarely focused on the “mid-market,” a large swath of systems somewhere between small businesses and enterprise-level systems. Pure cloud systems are not as attractive to this market, which has a built-out infrastructure of on-premise systems. Adding a camera to an existing system is easier and less expensive than tying it to the cloud. Benefits of cloud It’s a market that may not be ready for the pure cloud, but there are benefits to be realised from adding a cloud element to existing systems. “We are continuing to augment our premise-based solutions with added cloud capabilities and flexibility,” says Sanjay Challa, Salient’s Chief Product Officer. The feedback Salient hears from their customers is “I want to own my data.” The hybrid cloud approach offers the right mix of control, flexibility, and unit economics. Cloud add-on capabilities We want to provide the flexibility for customers to go full-cloud as it becomes more economically attractive" Cloud add-on capabilities include bringing more intelligence about system operation to the user via the cloud. Over time, Salient expects to sell more cloud-centric offerings based on feedback from integrators and customers. “We want to provide the flexibility for customers to go full-cloud as it becomes more economically attractive over time,” says Challa. Vaidio AI technology Salient seeks to be a transition pioneer to help customers realise the path to the cloud. Their approach is “crawl, walk, run,” and helping customers make the transition at each stage. Salient has added AI to its product offering, incorporating Vaidio AI technology from IronYun into a powerful suite and broad array of on-premise analytics, which are gaining traction. The seamless approach makes it easy for customers to embrace AI analytics, although Salient remains broadly committed to open systems. Addressing ‘soft’ features for integrators AMAG is in the process of enhancing its product line with the next generation of access control panels. However, “product” is just part of the new developments at AMAG. In addition to “hard” features (such as products), the company is looking to improve its “soft” features, too; that is, how they work with the integrator channel. Integrator channel Rebuilding a process to make your organisation more efficient, is relatively easy; it just takes a lot of persistence" “We have the depth of our legacy customer base we can learn from, we just need to close the feedback loop quicker,” says Kyle Gordon, AMAG’s Executive Vice President of Global Sales, Marketing, and commercial Excellence, who acknowledges the value of reinstating face-to-face meetings after COVID. “We are laser-focused on nurturing our integrator channel,” he says. “Developing new features takes time, but rebuilding a process to make your organisation more efficient, that’s relatively easy; it just takes a lot of persistence,” says Gordon. More cohesive internal communication is another useful tool, he says. Disrupting the cloud based on price Wasabi is working to make cloud applications less expensive by offering a “disruptive” price on cloud storage, $6.99 per terabyte per month (80% less than hyperscalers). Contending “hyperscalers” like AWS are charging too much for cloud storage, Wasabi is using its own intellectual property and server equipment co-located in data centres around the world. Wasabi sells “hot cloud storage,” which refers to the fact that they only have one tier of storage and data is always accessible. In contrast, a company such as AWS might charge an “egress fee” for access to data stored in a “colder” tier. Cloud storage “We saw that several video surveillance companies had not yet adopted cloud storage, and we saw an opportunity to make it easy to use,” said Drew Schlussel, Wasabi’s Senior Director of Product Marketing. “We just install a little bit of software that allows them to store data in the cloud and bring it back from the cloud.” Performance, protection (cybersecurity), and price Wasabi works with integrators, resellers, and distributors and also integrates with VMS companies Wasabi works with integrators, resellers, and distributors and also integrates with VMS companies such as Genetec and Milestone. Emphasising performance, protection (cybersecurity), and price, their data centres are certified to SOC 2 and ISO 27001 standards. Faster throughput for weapons detection Xtract One is a young company focusing on weapons detection in a time of accelerated concern about gun issues post-COVID. Founded in Canada and based on technology developed at McMaster University, Xtract One has found a niche in providing weapons detection at stadiums and arenas. These customers already have budgets, and it is easy to shift the money to a newer, faster technology. Madison Square Garden in New York City is among its customers. Cost savings solution Xtract One can increase throughput to 30 to 50 people per entrance per minute (compared to 5 to 6 people per minute when using metal detectors). The solution doesn’t require anyone to empty their pockets and the system alarms on items beyond guns and knives. Using Xtract One allows customers to reduce the number of screening lanes and security staff, providing additional cost savings, all while getting fans through the screening process in half the time. Purpose-built sensors The system uses purpose-built sensors looking for specific characteristics, such as reflective and density properties In addition to stadiums and arenas, Xtract One, formerly Patriot One, is also getting “inbound” interest from schools, hospitals, manufacturers, and other verticals that makeup 50% of their business. “We’re on a rocket ride, mainly because the weapons issues are not going away,” says Peter Evans, CEO and Director at Xtract One. The system uses purpose-built sensors looking for specific characteristics, such as reflective and density properties, all correlated by an AI engine. Providing early warning of violence ZeroEyes is another company focused on weapons detection. Their AI gun detection system works with video images to identify if someone is “brandishing” (carrying) a weapon. In other words, the system does not detect concealed weapons. Identifying someone carrying a weapon provides early warning of a possible violent act. Increased response with AI-enables images Images are identified by AI and sent to a monitoring centre where a human confirms the image before contacting first responders. Knowing the location of a shooter enables staff to lock entry points, move people to safety, and direct first responders. The company was founded to leverage existing camera views to stop mass shootings and gun violence by reducing response times.
A pioneer in the access control sector since 1971, AMAG Technology is looking to the future and the next generation of products that will expand its services to customers. “In our vision, we have advanced approaches that will not only provide our partners with advanced technologies but also ones that are easier to install with tools to expand their services,” says David Sullivan, who was appointed President of the venerable access control company in September 2022. New challenges at AMAG Sullivan brings a new outlook to the AMAG business, a part of Allied Universal, and a new vision to lead the company into the future. We caught up with David Sullivan to discuss his new challenges at AMAG and the journey ahead as the company looks to the future. Q: How does your background inform your approach to leading AMAG? I believe that it helps me to define a vision for AMAG that will be unique and on the leading edge of our industry David Sullivan: With the exception of only a few short years, my career has been in access control. I have experience with several systems and have had the privilege to manage several successful access control companies. As a result, I bring a great deal of experience into my role at AMAG. I believe that it helps me to define a vision for AMAG that will be unique and on the leading edge of our industry. Q: How would you describe AMAG’s journey over the last several years and how do you see the future? Sullivan: Prior presidents of AMAG always shared their leadership vision and direction with senior leaders located in the United Kingdom. This had an impact on the full direction of the business, sometimes limiting its ultimate success. Before I became a part of AMAG, these senior leaders that were located in the UK retired, placing for the first time the full management responsibilities of the president. This has allowed me to integrate the business into a single team, with single objectives, and a single vision. We expect to begin to reveal this new vision in the coming weeks. We are excited about the future of AMAG and believe we will surprise the industry with our new products and approach in the coming months and years. Q: How important is it that a manufacturer provides both hardware and software solutions? How does AMAG’s approach (in general) differentiate it in the market? We can design the complete solution, providing functionality that others may find more difficult to accomplish Sullivan: Regardless of the manufacturer, we all provide hardware and software. An access control solution is not complete without both. Some of us choose to make our panels, and others do not. Those who are dependent on third-party suppliers are restricted to the developments and direction of that company, and while it might be perceived to be an open technology, it still is proprietary to the hardware manufacturer. AMAG has controlled its manufacturing of panels from day one. The result means that we can design the complete solution, providing functionality that others may find more difficult to accomplish. Q: How does the breadth of AMAG’s product suite provide advantages to customers and/or integrators? Sullivan: AMAG’s product portfolio is unique and provides the end user with an end-to-end identity management solution from one company. Our Control Room PSIM, Symmetry CONNECT Identity Management Solution, Symmetry Access Control, and Symmetry GUEST solutions all integrate to provide the user with a broad set of features and capabilities from a single provider. There is no finger-pointing when we come to support your system. We hold full responsibility for making it work and can quickly provide a resolution to any application difficulties the user may be experiencing. Q: How does AMAG address the divide between on-prem and cloud systems? How do you help customers make the transition and/or plan for the future? We are in the early stages of developing our next generation of access control in which we intend to provide on-prem Sullivan: In our current product portfolio, we have three products that are cloud-based. Our mobile credential platform (Symmetry Mobile), our visitor management solution (Symmetry GUEST), and our physical identity and access management solution (Symmetry CONNECT) are all offerings that operate in the cloud. We are in the early stages of developing our next generation of access control in which we intend to provide on-prem, web client, and cloud-based offerings. One of the primary objectives is to ensure that the large installed base of systems that are out there today will be able to migrate not only to our next generation but as well to the cloud if the client so desires. Q: What is AMAG’s approach to mobile credentialing? Sullivan: As an access control provider, adding Symmetry Mobile credentialing to our portfolio just made sense. We want our customers to have a forward-thinking solution with the opportunity to save money not only on the physical badges but the cost of printing and distributing badges. Mobile credentials can be easily issued and revoked remotely, reducing administrative overhead, and eliminating the need for physical inventory management. Organisations can centrally configure what devices are used and the read range for each type of device and operating system, thus providing flexibility. Symmetry Mobile offers a customised questionnaire that controls access and reduces liabilities. Q: What has surprised you the most in your first year or so leading AMAG? Not many companies are blessed with such a broad portfolio that is supported by a resource-rich company Sullivan: I wouldn’t say I was surprised by this as much as happy to see, but I would say that the quality of our people was a pleasant surprise. As well, the AMAG product offering is broad and has some unique elements. When coupled with the depth of the resources that we have in AMAG, I know that we are second to none. Not many companies are blessed with such a broad portfolio that is supported by a resource-rich company that has so many talented people. Q: Please describe your dealer channel, and how you are seeking to expand it. Sullivan: The AMAG products are sophisticated and typically are installed for higher-end applications. With this sophistication comes a need to be well able to install such a solution. We have a strong group of certified and loyal partners who help us to deliver these enterprise solutions. We desire to provide our existing partners with updated and competitive systems to offer to their end users. Q: What is the security industry’s (and/or AMAG’s) biggest challenge in the next five years? We need to find ways to provide both our channel partners and the customers with solutions that are easily integrated Sullivan: I believe that the advancements that we are seeing in technology provide our industry with the opportunity to truly change how security is provided to our collective customers. As we advance these solutions, we will need to do so responsibly and in a way that helps the channel’s abilities. We need to find ways to train our partners to both install and support these more complex solutions. At the same time, we need to find ways to provide both our channel partners and the customers with solutions that are easily integrated, moving away from proprietary closed systems to open and cohesive solutions. This will ensure that the users get the best, and most complete solutions. Q: What does the industry as a whole misunderstand about AMAG -- time to set the record straight! Sullivan: Well, I am not ready to openly share where we are heading. We are in the process of putting together some advanced approaches to how we will do business with our partners. We are focused on providing tools that will enhance their services to their customers, and with products that are leading edge. I can only state that all should keep their eyes on AMAG, because over the next few years, we are going to surprise some people, and more importantly make our loyal partners quite powerful.
Case studies
With approximately 29,000 employees worldwide, Amdocs is a pioneering global software company providing services and solutions to communications and media companies. When building a new campus in Ra’anana, Israel, their large site with four office buildings and three underground floors required a door closer solution tailored to every door, considering their different size, type, and usage. Finding a single supplier to meet all their needs was a challenge, but they succeeded. Site requirements This new site required reliable, flexible door-closing solutions tailored for use at several hundred doors of multiple types: fire doors, public entrances, high and low traffic, and many more. For such a complex project, they also sought trustworthy specification support from an established, experienced manufacturer with a proven track record and a team with local knowledge. Door solutions across campus Requirements included full support for choosing, supplying, and installing solutions for doors across the campus “ASSA ABLOY has many access solutions related to openings in the building, including door closers. I am pleased that our project specification team was able to provide the right solutions for our customer’s requirements,” says Avi Kimhazi, Managing Director at ASSA ABLOY Israel. This included full support for choosing, supplying, and installing solutions for doors across the campus. ASSA ABLOY’s expertise and advice were always available. Product portfolio to meet the individual needs The vast range of available ASSA ABLOY Door Closers, Electric Strikes, Locks, Panic Exit Devices, and other products ensured every opening at the Amdocs Park campus was equipped with its ideal solution, without compromises. Certifications including fire compliance across the full range help to remove regulatory worries for specifiers and facilities managers. Cam-Motion technology Models supplied include ASSA ABLOY Cam-Motion® Door Closers for several applications Models supplied include ASSA ABLOY Cam-Motion® Door Closers for several applications. With innovative Cam-Motion technology, the push-force required to open a door falls rapidly, providing barrier-free access for all plus secure closing to keep premises safe. DC700, DC840 and DC200 ASSA ABLOY’s Cam-Motion DC700 model creates comfortable, secure access to high-traffic public doors in the building. The DC840 model conceals the same technology within the door leaf itself and is deployed where minimal aesthetic impact is required. For smaller door sizes, choosing the cost-efficient DC200 rack and pinion door closer helped the project hit its budget targets. Hitting project deadlines with specification support Designers could visualise door solutions accurately and the right solution was specified for each opening The project was managed using BIM principles from the outset. ASSA ABLOY’s local specification team became a hub for coordinating and disseminating up-to-date information for every door solution as part of the BIM process. Alongside providing timely specifications, the team made sure supply and installation hit the timelines that construction managers required. Detailed specifications were supplied and updated digitally, so designers could visualise door solutions accurately and the right solution was specified for each opening. Openings Studio® software Openings Studio® software was a key tool for everyone involved in the project. This user-friendly software ensures accurate specification data is logged and, when approved, transmitted to the live Revit® design. With detailed specifications supplied and updated digitally, designers visualise door solutions accurately as soon as possible and ensure the right solution is specified for each opening. And because every stakeholder can have appropriate Openings Studio access, they work transparently and with accurate, up-to-date specifications.
HID, the worldwide pioneer in trusted identity solutions, announces that Royal Jersey Laundry has introduced a new tracking feature of HID’s linen management platform at each of its 5-star hotel customer sites to guarantee that drivers drop off and collect precise linen stock and that costly errors are avoided. Linen tracking This new feature replaces a paper-based system used by drivers for the management of cages filled with clean/soiled linen delivered/collected at customer sites. It provides detailed end-to-end tracking of linen cages across multiple customer locations throughout the whole cycle of washing, packing, delivery, and collection, a complex process given that 550,000 pieces are laundered each week for numerous clients. Royal Jersey Laundry Royal Jersey Laundry works with most five-star hotels in London including The Dorchester, The Carlton Tower Jumerah Founded in 1915, Royal Jersey Laundry is one of the few cleaners servicing the luxury hotel sector. Based in a 25,000 square-foot purpose-built facility in Dagenham, rebuilt in 2021 for £15 million after a fire, it works with most five-star hotels in London including The Dorchester, The Carlton Tower Jumerah, The Peninsula London, and The Ritz. Need for constant communication Supporting the five-star segment is demanding given the constant communication required between the hotel and laundry, exacting standards, and the quantity and range of items to be laundered. This includes duvets, sheets, towels, and bath robes along with smaller items such as foot mats, drink coasters, shaving towels, and dry cleaning for guests themselves. Royal Jersey Laundry operates 24/7, employs 150 staff members, and washes 40 tons of linen per day. Maintaining laundering schedule Five-star hotels prefer to use linen they own with five sets kept of everything, allowing them to maintain a schedule In contrast with budget and mid-level hotels, five-star hotels prefer to use linen they own with five sets kept of everything, allowing them to maintain a rigorous laundering schedule and ensure guests always receive fresh, cleaned linens. “An average 300-bed hotel will have around 30,000 items of linen which will cost around £250,000,” says James Lincoln, Royal Jersey Laundry’s managing director. “The volume of linen is so high and it’s always moving such that accurate inventory control was a major challenge verging on the impossible.” HID cloud-based RFID linen management system Before the HID cloud-based RFID linen management system, everything was done manually. Laundry staff would check items off ironing/folding machines, a wholly error-prone process, and log the quantities on pieces of paper. The operational overhead for the laundry was exacerbated as the various linen items from the different hotels had to be kept separate, too. “Linen is everywhere: on beds, in cupboards, in transit, and at the laundry, yet no one had full insight into stock levels and, when things went missing which often happened, typically we’d get blamed,” says Lincoln. Real-time linen inventory management LinTRAK tags are sewn into linen items by laundry staff or linen manufacturers during the production process To address these problems, Royal Jersey Laundry installed a real-time linen inventory management system from HID combining LinTRAK® RFID tags, a full set of RFID equipment including table-top and conveyor-belt scanners, one RFID portal and one cabin scanning unit, and cloud-based Acuity software. The discrete LinTRAK tags are sewn into linen items by laundry staff or linen manufacturers during the production process. Some hotels also use LinTRAK tags to manage staff uniforms and restaurant linens such as napkins and tablecloths. HID LinTRAK textile tags Around 40% of Royal Jersey Laundry hotel customers have transitioned to the HID linen management solution and connect via Acuity’s web portal. Once cleaned, the linen is packed into cages, and scanned in seconds through HID’s RFID cabin station. Items are automatically counted, with delivery notes generated including billing information. HID’s Acuity software integrates with the laundry’s Sage accounting software to generate invoices. Benefits of textile tags The implementation of HID LinTRAK textile tags, RFID stations, and the Acuity software platform has radically changed how Royal Jersey Laundry operates, delivering a range of benefits: Fast Return on Investment: Since the installation of the HID equipment in 2019, the system has already paid for itself given the efficiency and productivity gains. Better use of people resources: Laundry and housekeeping staff no longer waste time on dull and resource-intensive activities like manually counting linen. They have been redeployed to more productive work, generating 10-20% savings in labor costs. Better visibility of stock levels: As hotels know exactly the location and quantity of linen, they are better able to cater to peak demand, reducing linen expenditures by up to 30%. Improved responsiveness and customer satisfaction: Access to in-depth data generated by the Acuity platform means the laundry can quickly answer customer queries. “We give hotels complete transparency about where their linen is in the cleaning and delivery cycle. There are just no grey areas anymore,” says Lincoln. Increased security of expensive linen assets: While theft of linen at five-star hotels is rare, it does happen. RFID tagging enables better monitoring of expensive bedding and towel investments. Enhanced reliability and productivity: Operations are more efficient as RFID-enabled items can never be lost or misplaced. Furthermore, digital scanning results in faster processing of items. “We’re effectively two businesses: the laundry itself and a logistics operation. We run a mixed fleet of lorries and electric vans which nip in and out of London three times a day picking up and delivering garments for hotel customers using us for guest work,” adds Lincoln.
RecFaces, a facial recognition software company, has announced the successful deployment of its flagship product, Id-Guard at Jorge Chávez International Airport in Lima, Peru. This implementation marks a significant milestone in bolstering security measures at one of South America's busiest airports, underscoring the importance of maintaining a high level of safety at public transportation hubs. Jorge Chávez International Airport Jorge Chávez International Airport serves as a vital gateway for travellers and cargo, welcoming more than 20 million international and national passengers every year. With such a high flow of people, ensuring the safety and security of passengers and airport personnel becomes crucial. Recognising this need, RecFaces collaborated with airport authorities to implement their state-of-the-art Id-Guard solution and help ensure the safety of the facility. Enhanced security measures The solution's features enable airport authorities to prevent suspicious individuals from accessing the site The implementation of Id-Guard has significantly enhanced security measures, allowing for proactive monitoring and rapid response to potential security threats. The solution's features enable airport authorities to prevent suspicious individuals from accessing the site, thereby safeguarding the safety of passengers and staff. Highest level of security “Airport representatives felt the need for facial recognition to strengthen the security structure within the airport as a whole,” notes Maria Kazhuro, Business Development Director for the LATAM region, RecFaces. Maria Kazhuro adds, “Our goal was not only to provide the highest level of security but also to simplify work processes for security guards. We can confidently say that the installation of an ID guard has significantly improved security in the facility. Now both airport visitors and employees can be sure that they are under even greater protection than before.” Id-Guard facial recognition The deployment of Id-Guard at the Peruvian airport demonstrates RecFaces' dedication to excellence and innovation in the field of facial recognition technology. As airports worldwide continue to prioritise security and passenger experience, RecFaces remains at the forefront of delivering advanced biometric solutions tailored to the evolving needs of the aviation industry.
Wetlands, the "kidneys of the Earth", are considered one of the three major ecosystems on Earth, along with forests and oceans. Hosting a diverse range of terrestrial and aquatic plant and animal species, wetlands serve as crucial habitats for numerous bird species. Red-crowned cranes Beautiful Wetlands vs Critically Endangered Cranes The Red-crowned Crane is considered as the "God of Wetlands" and is highly sensitive to environmental changes. It is one of 14 bird species in China classified as critically endangered, with only around 2,000 wild Red-crowned Cranes remaining worldwide. Monitoring these rare bird species not only aids in their effective protection but also reflects changes in the wetland ecosystem to some extent. Red-crowned Cranes migrate between the regions of East China and Northeast China In China, during spring and autumn seasons, Red-crowned Cranes migrate between the regions of East China and Northeast China, requiring wetland management personnel to make all necessary preparations in advance every year. Recording and tracking data (e.g. time of arrival/departure, and total number) play a significant role in monitoring both the Red-crowned Cranes and the wetland ecosystem. Hence, monitoring rare bird species is essential not only for their conservation but also for understanding the changes in wetland ecological environments. Red-crowned crane captured by Dahua camera Vigilant cranes, eager for improved, smarter observation However, Red-crowned Cranes have extremely strong vigilance. Even while foraging or resting, there are often adult birds designated to be on alert, making warning calls and taking flight if any danger is detected. Therefore, it becomes challenging for monitoring personnel to observe them up close, as they need to maintain a distance of several hundred metres using binoculars to avoid disturbing the cranes. Such limitations in observation pose difficulties in monitoring the population distribution and activities of Red-crowned Cranes. To achieve efficient and intelligent monitoring while minimising human interference, many wetlands have enlisted the assistance of an intelligent "avian expert". Dahua: the guardian of cranes with smart technologies In recent years, avian intelligent recognition systems have been increasingly applied in wetland monitoring. Dahua Technology actively explores the integration of technology and wetland conservation to support the monitoring and protection of bird species across multiple wetlands. Rare bird species like the Red-crowned Crane can be automatically identified and counted By employing high-point video footage combined with avian intelligent recognition algorithms, rare bird species like the Red-crowned Crane can be automatically identified and counted. This allows monitoring personnel to discover and observe various bird species clearly and promptly without disturbing them. Additionally, techniques such as background removal and contour deformation processing help reduce the interference caused by lighting conditions and backgrounds, ensuring that the footage presents the identifying characteristics, location, and time for each bird. With this approach, comprehensive and accurate data recording and result analysis can be achieved without disturbing the Red-crowned Cranes up close. A brighter future for biodiversity using intelligent analysis In addition to population counting, vocalisations play a crucial role in bird research. By utilising voiceprint recognition, it becomes possible to track and study the population distribution of rare bird species. Many regions have established and improved databases of avian vocalisations, creating a foundation for biodiversity monitoring and analysis. These databases, combined with visual identification, are being cataloged in order to facilitate more comprehensive research and analysis, optimise timely conservation measures, and enhance dynamic and diverse science communication and education. Dahua Technology continues to empower biodiversity conservation through technology. The Dahua AI platform enables continuous algorithm training that helps reduce the development cycle of recognition algorithms for specific species. At present, Dahua has developed over 800 bird recognition algorithms, with more than 500 focused on waterfowl and migratory birds primarily inhabiting wetland environments. This extensive collection of algorithms greatly supports and contributes to biodiversity conservation efforts around the globe.
Tenant and homeowner expectations in the multi-residential sector are evolving fast. Digital access offers a solution that fits a contemporary ethos blending design, functionality, technology, and sustainability. STAY by Kronos is a fast-growing developer and service provider in Spain’s build-to-rent (BTR) property sector, where business is booming: Investment grew over 17% between 2021 and 2022 alone. Such high-profile success attracts more providers who compete for location, quality, and customer satisfaction in the services they offer. The rental market is tightly regulated, so operational time- and cost-efficiency are essential. New twin-building site They sought convenient, user-friendly, connected control for both homes and common areas STAY already operates properties in cities including Córdoba and Tarragona and so understands the opportunities offered by digital access. For a new twin-building site in Madrid, they sought convenient, user-friendly, connected control for both homes and common areas including a gym and co-working space. The solution needed to be convenient and secure for residents — and make it easy for facilities managers to work efficiently with service providers who often require temporary access to the site. Convenient, secure mobile digital access STAY by Kronos chose ASSA ABLOY’s SMARTair® wireless digital access solution. Building managers now quickly cancel any lost credentials and issue new ones — remotely if necessary — which reduces operating costs, maintains building security, and provides the flexibility they need every day. Main door entrances are unlocked via SMARTair Wall Readers. Residents can conveniently access and move through the building with a regular smart card, RFID keyring or the SMARTair Openow app, which stores secure mobile keys on their personal smartphone. Secure, battery-powered i-max Wireless Escutcheons lock 121 apartments and shared amenities (gym, play area and so on) across both buildings. No cabling or major door modifications were needed during installation. Temporary mobile access SMARTair saves time managing the many providers who offer services to tenants For residents, the convenience advantage over metal keys is a big plus: “They have the key virtually on their mobile phone, so we are sure they won't lose it and they find it very useful,” says Carlos Rodríguez-Bailón Fernández, Managing Director at STAY by Kronos. From a facilities perspective, SMARTair saves time managing the many providers who offer services to tenants. Programming temporary mobile access to common spaces like a dining boutique via TS1000 Web is fast and intuitive. Digital locking with a security deadbolt The SMARTair i-max has inbuilt features designed to enhance security and give residents extra peace of mind. It is easy for them to lock their front door by simply pushing its handle upwards activating the deadbolt projection with a secure 3-bolt lock. Similarly, the i-max anti-panic mechanism guarantees quick emergency exit, even when the door is bolt-secured. Thanks to these security benefits and feedback on resident satisfaction, SMARTair is now the standard solution for all STAY by Kronos projects — in Madrid, Tarragona and beyond. “With ASSA ABLOY there was always that trust in an established company, a longtime pioneer in the market with a quality track record,” said Carlos Rodríguez-Bailón Fernández, adding “They were also our technology ally.”
The university stands out as a highly esteemed institution, particularly renowned among enthusiasts of science and technology. With its effective educational approaches, the institution experienced a surge in enrolment, necessitating an upgrade from outdated communication technology within its premises. Furthermore, with plans for expansion in the upcoming academic year, there's a growing need for modern communication technology to streamline communication across various buildings and offices. To delve into their challenges: Limited Capacity System: The existing system proved to be obsolete and lacked sufficient capacity to handle the communication demands across offices within the same institution and across multiple locations. Communication Among Multi-Located Offices: As the University embarked on an expansion project, including the establishment of a new building at a distant location, there arose a need for seamless connectivity between this new site and the main building in the form of a multi-location communication solution. Need for Upgradation: The absence of modern features such as multi-party Conferencing and Unified Services for Mobility highlighted the necessity to upgrade their outdated communication system. Scalability and Redundancy: They sought a solution capable of effortlessly adapting to future requirements, ensuring smooth scalability for forthcoming applications. Furthermore, incorporating redundancy measures was deemed essential to guarantee uninterrupted operations. Solution Devised a tailored Multi-Location contact solution aimed at enhancing and raising Matrix Comsec, in collaboration with Rutvi System, meticulously examined the challenges faced by the university administration. Through collaborative efforts, they devised a tailored multi-location communication solution aimed at enhancing and expanding the existing infrastructure by leveraging Matrix Telecom Solutions. This involved the implementation of a Hybrid IP PBX and integration of a Media Gateway to streamline communication processes and ensure readiness for future demands. The Matrix solution comprises: At location 1 within the university complex, the Hybrid PBX, ETERNITY LENX, was installed. Alongside digital key phones, multiple analog phones were also connected at this site. An IP connection was established between location 1 and location 2. Utilising the ETERNITY LENX with SARVAM Gateway ENT, a PRI Gateway arrangement from location 1 facilitated an IP connection to the ETERNITY MENX at location 2. Digital key phones and multiple analog phones were integrated into location 2. The Matrix Multi-Location communication solution seamlessly interconnected both locations while incorporating a range of modern communication features. This fosters enhanced adaptability and versatility within the organisation, offering optimal advantages for contemporary communication needs. Results The implemented solution not only provided them with access to modern communication features but also facilitated smooth communication across their expanded infrastructure. The Hybrid PBX Systems, including ETERNITY MENX16SAC and ETERNITY LENX27SDC, offered scalability for up to 2000 IP Users, ensuring future readiness. Moreover, the Hot Swappable Card feature ensured uninterrupted operation and simplified maintenance, while the redundancy feature ensured high availability and continuous communication. With the SARVAM Gateway ENT Licence, they were able to utilise SARVAM as both a Unified Communication Server and Gateway simultaneously, eliminating the need for additional investments. The EON510 - Premium Digital Key phone offered advanced call amenities such as Global Directory Integration and Advanced Call Routeing, enhancing employee productivity and efficiency. The multi-location communication solution provided by Matrix seamlessly connected multiple buildings for the University, while the incorporation of modern communication features made them more efficient and prepared for the future.
Round table discussion
Technology offers a range of tools to bolster security at public events, including before, during, and after. This year, the 2024 Summer Olympics in Paris will draw the attention of the world, requiring the best protection available for the venues, the athletes, and the attendees. Other happenings such as the FIFA World Cup, the Super Bowl, the Tour de France, and the U.S. NBA Finals are momentous events that challenge security and law enforcement personnel to keep them safe. We asked this week’s Expert Panel Roundtable: How is technology contributing to security in the arena of public events?
Technological leaps in the last several decades have revolutionised biometrics. The technologies are constantly evolving, spanning facial recognition to iris scanning to fingerprints, to provide new levels of security and convenience. Biometrics are everywhere, from smartphones to border control, constantly evolving to meet the needs of our increasingly digital world. They are also more accurate and easier to use than ever. We asked this week's Expert Panel Roundtable: What’s new with biometrics?
In the complex world of physical security systems, standards can enable disparate systems to be combined to function together as a cohesive whole. Standards help to ensure that all the “pieces” fit together to create a clear, unified picture. More broadly speaking, standards also play a role in ensuring best practices are deployed in a range of security-related situations. We asked this week’s Expert Panel Roundtable: Which standards have had the greatest positive impact on physical security?
Products
White papers
2024 trends in video surveillance
DownloadBoost efficiency and streamline security with integrated access control
DownloadAI in security solution
DownloadManaging security in the age of boundaryless working
DownloadThe top 4 reasons to upgrade physical security with the Cloud
DownloadAccess control: The enterprise buyer's guide
DownloadEffectively branding a multifamily property
DownloadIntegrating control access and security
DownloadIdentity and access management
DownloadAccess management in higher education
Download6 good reasons to embrace mobile credentialing
DownloadThe welcoming workplace
DownloadA step-by-step checklist for choosing an intercom system
DownloadThe wireless access control report 2023
DownloadMachine Operator Authentication
DownloadVideos
Security access systems: Manufacturers & Suppliers
- Vanderbilt Security access systems
- HID Security access systems
- CyberLock Security access systems
- Alpro Security access systems
- ABLOY Security access systems
- Bosch Security access systems
- Software House Security access systems
- CEM Security access systems
- AMAG Security access systems
- Parabit Security access systems
- Honeywell Security Security access systems
- Delta Scientific Security access systems
- Aritech Security access systems
- TESA Security access systems
- ASSA ABLOY - Aperio® Security access systems
- Hikvision Security access systems
- Nedap AEOS Security access systems
- TDSi Security access systems
- Paxton Access Security access systems
- Dahua Technology Security access systems