Security access systems - Security beat
Close collaboration with customers has been a hallmark of the physical security industry for decades. And yet, less ability to collaborate face-to-face to discuss customer needs has been a consequence of the COVID-19 pandemic. “True innovation, which comes from close collaboration with customers, is more difficult to achieve remotely,” said Howard Johnson, President and COO, AMAG Technology, adding “Not being able to visit in person has not been helpful. Kurt John, Chief Cybe...
Can a smart card be used securely for multiple applications (and among multiple manufacturers )? End users are demanding such interoperability, and they also want openness to switching out components of their access control systems in the future without being “locked in” to one vendor. Those are the goals of the LEAF Identity consortium, a collection of companies that share and support end user-owned encryption keys stored securely in smart cards with MIFARE DESFire EV2 chips and ar...
As a cloud-based platform for service providers in the security, smart home and smart business markets, Alarm.com has adapted quickly to changing conditions during the coronavirus pandemic. In the recent dynamic environment, Alarm.com has kept focus on supporting their service provider partners so they can keep local communities protected. “We moved quickly to establish work-from-home protocols to protect our employees and minimise impact on our partners,” says Anne Ferguson, VP of...
Spread of the novel coronavirus has jolted awareness of hygiene as it relates to touching surfaces such as keypads. No longer in favour are contact-based modalities including use of personal identification numbers (PINs) and keypads, and the shift has been sudden and long-term. Both customers and manufacturers were taken by surprise by this aspect of the virus’s impact and are therefore scrambling for solutions. Immediate impact of the change includes suspension of time and attendance sys...
HID Global is introducing a new “flagship” line of access control readers as successors to the iCLASS line. The new HID Signo readers will support 15 different credentialing formats and communicate using the latest NFC (near field communication), BLE (Bluetooth Low Energy) and OSDP (Open Supervised Device Protocol) standards. HID Global says the new readers will simplify integration to more secure and mobile credentials. HID Global has invested in a “future-proof”...
Security’s intersection with consumer electronics is on view at CES 2020, the world’s largest technology event, Jan. 7-10 in Las Vegas. The giant show features more than 170,000 attendees, 4,500 exhibitors and 1,100 industry thought-leaders featured on the CES stage. A range of technologies will be on display, from artificial intelligence (AI) to 5G, vehicle technology to AR/VR (augmented and virtual reality), robotics to home automation. Security plays a prominent role, too.The imp...
Across the security industry, power supplies are too often an afterthought and the first item in an access control system to be value-engineered. However, when the power supply fails on a high-end access control device, the system becomes a very expensive paperweight. Fortunately, there are now power supply units available that can enhance system reliability by providing remote diagnostics and real-time reporting and analytics. There is also a mistaken perception that all power supplies are th...
Gallagher Security, a division of Gallagher Group, a privately-owned New Zealand company, is a global presence in integrated access control, intruder alarm and perimeter security solutions. Gallagher entered the global security industry in the 1990s with the purchase of security access control business Cardax. In the last several decades, the company has leveraged its experience in electric fence technology to develop a variety of innovative solutions used to protect some of the world's most h...
The success of smart homes began with professional security providers offering bundled packages, focused mostly on security monitoring. However, due to the cost of professional contracts, consumers began to embrace the do-it-yourself (DIY) approach. Despite the challenges and opportunities that come with professional and DIY approaches, the momentum of smart home growth depends on these two approaches working symbiotically. Smart home systems In 2017, there were about 122 million smart home de...
Qumulex is a new startup with a mission to provide physical security integrators a transition path to embrace the technology of the cloud and a subscription-based business model. Qumulex’s products seek to provide capabilities to embrace the cloud without an integrator having to turn their back completely on the ‘transactional revenue’ of installing new systems. As the transition happens, Qumulex offers a product line that supports any mix of systems from on-premises to the cl...
Video, access control and visitor management are among the technologies that are enabling greater safety and security at hospitals and other healthcare facilities. Video surveillance systems enable hospital management and security professionals to know what goes on in and around a medical facility. Recording images in high resolutions (megapixels and gigapixels) is becoming more and more important in healthcare, says Jason Ouellette, Product Line Director – Access Control, Tyco Security P...
A larger proportion of cyberattacks in the first half of 2019 can be attributed to electronic criminals (eCrime adversaries) compared to state-sponsored or unidentified attacks. CrowdStrike, a cybersecurity company that provides the CrowdStrike Falcon endpoint protection platform, observes that 61% of targeted cybersecurity campaigns in the first half of 2019 were sourced from eCrime adversaries, compared to 39% from other sources. Technology was the top vertical market targeted by cyber-attack...
Private video systems are offering new sources of evidence for police investigations. Growing popularity of private camera registration schemes are facilitating police department access to video captured by cameras in homes and businesses for use in their investigations. Camera registration programmes are organised locally by individual police departments but have common features and operation. By registering their camera systems, citizens and business people provide information to a confidenti...
The healthcare market is rife with opportunity for security systems integrators. Hospitals have a continuous need for security, to update their systems, to make repairs, says David Alessandrini, Vice President, Pasek Corp., a systems integrator. “It’s cyclical. Funding for large projects might span one to two years, and then they go into a maintenance mode. Departments are changing constantly, and they need us to maintain the equipment to make sure it’s operating to its full po...
When violence or a life-threatening incident occurs, hospitals and other healthcare institutions are often in the crosshairs. Hospitals increasingly face a reality of workplace violence, attacks on patients, and threats to doctors and other support staff. And even if violence happens outside a hospital – such as an active shooter at a public place – the local hospital must be prepared to respond to an influx of injured victims. When conflicts arise inside a hospital, there is an urg...
As the deal/no deal prospects of Brexit are tossed in a whirlwind of UK and EU politics, the uncertainty of the back-and-forth has broadly impacted general economic trends, and by extension, the physical security market. The new deadline for a Brexit agreement is October 31, already postponed six months from the scheduled April 12 departure date. Numbers show that Britain’s GDP shrank in the second quarter, possibly reflecting fewer exports because of Brexit uncertainty. And beyond the cu...
Ethics is a particularly important subject in an industry such as fire and security because the result of unethical actions might make the difference in life and death. For example, if an employee acts unethically when servicing a fire extinguisher, the result could be to burn down the building. Although ethics is not a common topic of discussion in the fire and security industry, perhaps it should be. Chubb Fire and Security is a company that provides an example of how an emphasis on ethics ca...
For the security market, the ‘fine ranging’ capabilities of ultra-wideband (UWB) technology opens up a range of new uses based on the ability to determine the relative position and distance of two UWB-equipped devices with pinpoint accuracy – within centimetres. UWB is more accurate and secure, even in challenging environments full of interference, compared to narrow band wireless technologies. UWB technology transmits a large amount of data over short distances using a small...
A week of mass shootings this summer has again spotlighted the horror of gun violence in public spaces. A 19-year-old gunman opened fire at the Gilroy Garlic Festival in California on July 28, injuring 13 and killing four (including the gunman). In El Paso, Texas, less than a week later, a lone gunman killed 22 people and injured 24 others. In Dayton, Ohio, a day later, a gunman shot 26 people during a 30-second attack, killing 9 and injuring 17. Rising active shooting incidents Beyond the gri...
Gunshot detection today is part of more physical security systems than ever before, and many manufacturers are developing interfaces to the latest gunshot detection technologies. Genetec has integrated ShotSpotter gunshot detection technology into its unified IP security platform, Security Center. Thanks to this integration, police departments and security professionals will be able to receive more actionable information, gain rapid access and detailed location insights when a gunshot situatio...
The devil is in the details. The broader implications of the U.S. Government ban on Chinese video surveillance manufacturers are being clarified in the federal rule-making process, and a public hearing in July gave the industry a chance to speak up about the impact of the law. Ban on equipment The hearing centered on Section 889 of Title VII of the National Defense Authorisation Act (NDAA) for FY 2019, specifically paragraph (a)(1)(B). The paragraph "prohibits agencies from entering into a con...
Critical infrastructure facilities are vulnerable to many security challenges, from terrorism to natural disasters. Challenges also include vandalism, theft, employee identification and verification, access control, regulations, and the increasing infiltration of connectivity and the Internet of Things. In addition, many critical infrastructure facilities are housed in harsh and hazardous environments, which adds to the challenges to keep employees and facilities secure. The security risks faci...
Physical security has been stuck in a forensic and siloed mindset for decades, while the rest of the enterprise has evolved and transformed into proactive, connected operations. A new security management platform based on artificial intelligence (AI) seeks to change that status quo by using modern tools for unification, analytics and controls. AI-based security management “Security teams are managing more moving parts than ever,” says Clayton Brown, Co-Founder of ReconaSense....
Video surveillance cannot address all the security challenges in education, but it is a valuable tool and among the least obtrusive options available. And the list of security challenges that video can address grows every day. Video systems can provide real-time monitoring of school premises and facilitate rapid response to incidents. New advances such as video analytics are currently underutilised in the education arena. Historically, video has been used as a forensic tool in the education ma...
After a period of rapid international expansion, the next step for Ajax Systems is to set deeper roots in each market and become more sustainable. The manufacturer of wireless security equipment will continue to extend the range of Ajax products and capabilities by responding to local requests. Smart home management options and automation scenarios will be a significant focus for the next year. Wireless security equipment The systems are resistant to false alarms, regularly update over the air...
All schools and universities need to address three different levels of security when considering access control. The first level is the least vulnerable of the three and concerns the perimeter entry and exit points. Here, incorporating some level of electronic access control should be a consideration, whether that is a combination of electronic and mechanical door hardware, or a complete electronic solution. An electromechanical solution, such as electric strikes, can be beneficial in the effec...
While security salesmen are touting megapixels and anti-passback features, they are missing an opportunity to communicate the role of technology in the broader context of risk management and incident response – and in saving lives. That’s the message of Gerald Wilkins, PSP, Vice President of Active Risk Survival. Incident response is at the core of how an enterprise reacts to risk and is a standardised approach to the command, control, and coordination of emergency response. Effect...
The Physical Security Interoperability Alliance (PSIA) was founded in 2008 with a goal of creating ‘plug-and-play interoperability’ among physical security devices, systems and services. Since then, the organisation’s mission has both expanded to include logical security and focused more narrowly on identity, a critical aspect of security today. In recent years, PSIA has concentrated on its PLAI (Physical Logical Access Interoperability) specification, which provides a means t...
As a security service provider with a rich history in manguarding, Allied Universal is launching a new technology platform to increase productivity and accountability of security officers and to transform guard service operations from an ‘observe and report’ mission to a ‘detect and respond’ function. Mark Mullison, Allied Universal’s Chief Information Officer (CIO), says the new Heliaus platform also uses artificial intelligence (AI) to analyse data, predict outco...
Krowd is an app that connects people together based on geography; that is, if they are at the same place at the same time. Users sign into the app using the local WiFi, identify themselves by username, and are placed immediately in a group chat comprising anyone else at the location who has signed into the app. An enhancement of the Krowd app, known as Krowdsafe, leverages the technology to achieve and promote security and safety. Specifically, Krowdsafe enables users to interact directly with...
One system, one card
DownloadAligning physical and cyber defence for total protection
DownloadUnderstanding AI-powered video analytics
DownloadEnhancing physical access control using a self-service model
DownloadHow to implement a physical security strategy with privacy in mind
Download