FLIR Systems, Inc. announces modified thermal cameras for fast and safe non-contact elevated skin temperature screening. The FLIR EST™ thermal screening solutions provide frontline screening at building entries and in high traffic areas to improve safety and help curb the spread of COVID-19. The FLIR Axxx-EST, FLIR T5xx-EST, and FLIR Exx-EST series cameras are designed to simplify the screening process, reducing the burden on screening operators and adhering to recommended social distanci...
Allied Universal, a renowned security and facility services company in North America, announces the availability of distance screening solutions as companies continue to launch their ‘return to workplace' initiatives. Distance screening solutions Allied Universal Technology Services experts are working with customers to design and implement the screening solutions that best fit their company's environment, requirements and existing security operations. The screening solutions include sta...
Sensor system supplier HENSOLDT has been awarded a contract by Airbus Defence and Space to develop and produce a new AESA (Active Electronic Scanning Array) radar for the German and Spanish Eurofighter fleets. The project is jointly financed by the Eurofighter partner nations Spain and Germany, who will also be the first users of the radar in their fleets. Following budget approval by the Spanish government and most recently by the German Bundestag in mid-June, the contracts worth over 1.5 bill...
The DoorBird app has been awarded the ‘Software Made in Germany’ and ‘Software Hosted in Germany’ quality seals. The German Association of Medium-Sized Enterprises in the IT Industry (Bundesverband IT-Mittelstand e.V.) awards the seals to German companies whose software meets particularly strict data security and quality criteria. The app is the central control tool for DoorBird IP video intercoms developed and manufactured by Bird Home Automation in Berlin. With the Doo...
Videonetics announces that it has joined the Qualcomm® Smart Cities Accelerator Program to provide their AI and Deep Learning powered Unified Video Computing Platform™ (UVCP) to diverse industries such as smart cities, aviation, enterprise and manufacturing to name a few. To exhibit their features and functionalities, Videonetics will be implementing their end-to-end video management system and AI enabled video analytics in conjunction with Qualcomm Technologies enabled smart cameras...
Hundreds of thousands of priceless artifacts in several Iraqi museums have been protected from the threat of theft and looting by marking them with SmartWater’s unique invisible code. Unique invisible code Funded by the British Council, approximately 273,000 artifacts held in Iraqi museums have been protected using this new approach. Priceless objects can be traced back to the site they were stolen from, making it easier for law enforcement agencies to prove theft, thereby creating a pow...
SMART SHOOTER, a designer, developer, and manufacturer of innovative fire control systems that significantly increase the accuracy and lethality of small arms, is honoured to announce that the company has been selected by the U.S. Army and endorsed by the U.S. Department of Defense (DoD) as one of a handful of approved Counter-small Unmanned Aircraft Systems (C-sUAS) solution providers. The designation of SMART SHOOTER as one of only three DoD-approved dismounted/ handheld systems by the Army – the DoD’s Executive Agent for the C-UAS mission area – follows an extended Army-led assessment of more than three dozen competing C-UAS systems. Multi-layer defence solution The Army notes that this assessment identified current systems for future investment based on criteria such as effectiveness, usability, sustainment, and integration. SMART SHOOTER's SMASH family of Fire Control solutions – capable of leveraging targeting data from a wide range of EO, RF and radar sensors – can be integrated onto any assault rifle, as well as combined with other C-UAS systems, to provide an effective multi-layer defence solution suitable for the modern battlefield. SMASH enables the creation of a micro-tactical network between deployed SMASH units Bringing precision-missile targeting algorithms and advanced electro-optical processing capabilities into standard infantry, SMASH enables the creation of a micro-tactical network between deployed SMASH units, allowing the entire platoon to be smart, precise, and connected. With a unique ‘One Shot – One Hit’ capability, SMART SHOOTER's Fire Control technology allows the operator to quickly and effectively neutralise any ground or airborne, manned or unmanned threat through automatic detection, tracking, and effective engagement. Gathering critical tactical intelligence Michal Mor, SMART SHOOTER CEO noted: "In recent years, drones and UAS have become a persistent threat over the battlefield, enabling opposing forces to gather critical tactical intelligence and even make direct attacks. The SMASH family of Fire Control Solutions offers precise, swift, and simple hard-kill elimination of this threat. We are thrilled that the DoD has down-selected and designated SMART SHOOTER's exclusive technology for C-UAS application across the U.S.” “Armed Forces, and see it as validation of the operational value that our solutions provide. The selection is a result of SMART SHOOTER's ongoing work with the Countering Terrorism Tactical Support Office (CTTSO), during which our technology was integrated with radar solutions to provide the warfighter with an unrivalled detection and hit system."
Badger Technologies®, a product division of Jabil, introduces the Badger PatrolBot™ autonomous robot tailored for the security guard industry. The PatrolBot autonomous robot extends security workforce operations by automatically verifying that windows and doors are secured, fire extinguishers and defibrillators are properly stored, and floors are free of debris and potential hazards. The robot also can investigate alarms and areas not supported by surveillance cameras. The Badger PatrolBot autonomous robot empowers security guard management companies and their customers to prioritise personnel deployment while automating manual security checks. Reducing operational costs This is especially relevant now that security guard companies are being called upon to support COVID-19 security requirements, including enforcing social distancing, taking temperatures and performing worker welfare checks. “The PatrolBot autonomous robot is a workforce multiplier, continuously patrolling stores, warehouses and office buildings for 12 hours on a single charge,” said Tim Rowland, CEO of Badger Technologies. “Our robots automate the most mundane inspections and share real-time data, enabling guard services companies to expand their service offerings, extend shift coverage and reduce operational costs.” Workforce management platforms Our strategic partnership will help customers’ realise greater business value from their security investments" As part of a total security solution, Badger Technologies is working with established providers of workforce management platforms to ensure seamless integration with security operations. The first partner in this growing ecosystem is Montreal-based TrackTik Software Inc., an innovator in cloud-based security workforce management focused on maximising operational efficiencies. The companies are developing Application Programming Interfaces (APIs), enabling the PatrolBot autonomous robot to use TrackTik’s cloud-based software to streamline security guard tour scheduling, real-time checkpoint logging, incident reporting, GPS tracking, messaging and alerts. “TrackTik Software is thrilled to partner with Badger Technologies in using robotics to transform security guard operations,” said Simon Ferragne, CEO of TrackTik Software. “Our strategic partnership will help customers’ realise greater business value from their security investments and allow them to take on more non-traditional security roles in a post-pandemic world.” Streaming video cameras Equipped with streaming video cameras, the PatrolBot autonomous robot lets command-centre staff view the robot’s exact location as well as access a live video feed. In addition, fixed-position cameras are programmed to take pictures of doors, windows, fire extinguishers and any blockages during the robot’s patrol tour. If needed, a robot can automatically modify its routes to avoid obstacles while performing inspection duties safely around people. Actionable data and analytics offer vital insights for improving service delivery while lowering costs Actionable data and analytics offer vital insights for improving service delivery while lowering costs. Badger Technologies also is working to accelerate integration of its Software Development Kit (SDK) with other security workforce management software as well as customer-specific security solutions. Floor-scanning robot As the latest Badger Technologies’ offering, the PatrolBot autonomous robot leverages AI and Machine Learning to produce actionable business insights to elevate security guard Service Level Agreements (SLAs) while meeting growing compliance demands. This newest robot joins Badger Technologies’ retail robots, which have travelled more than 500,000 miles safely alongside employees and shoppers at more than 500 grocery stores throughout the U.S. and Australia. The PatrolBot autonomous robot extends the capabilities of this existing line-up, which includes Badger® Retail inSight, a shelf-scanning robot that addresses out-of-stock, planogram compliance and price integrity issues; and Badger® Retail inSpect, a floor-scanning robot that automates hazard detections, such as spilled liquids and other debris.
The fast-paced growth of Milestone Systems has resulted in a new regional headquarters in Dubai Media City. The move means double the office space for employees. The premises include a state-of-the-art Experience Centre equipped with new technology capable of simulating and demonstrating a wide range of innovative solutions. This includes solutions for mitigating the COVID-19 pandemic using physical distancing, heatmapping, people counting, and temperature measurement. Video management technology Milestone Systems has been present in the UAE since 2007. Milestone’s video management technology helps major cities, companies, and people in the region staying safe, efficient, and protected. “We are excited to be settling into the new, spacious office in Dubai Media City,” says Regional Sales Manager Amine Sadi. The company recently released its annual report for 2019, which shows strong, sustainable long-term growth and another record-breaking year for the company. Through collaboration and innovation, Milestone’s software has been added to more than 500,000 installations worldwide. In the past five years, Milestone also nearly doubled its number of employees to more than 900 people internationally. Fast-growing community We are investing in new employees and need more space to enable this growth" The new office site in Dubai will serve as the regional headquarter covering Turkey, North Africa, and the Middle East (MENAT). The office is used by 28 employees, with six additional employees based in Turkey and Lebanon. “We are committed to serving our fast-growing community of partners and customers,” says Sadi. “We are investing in new employees and need more space to enable this growth. Focusing on long-term sustainable expansion requires the best people, who can identify the right opportunities for our company.” The new premises also include fully equipped classrooms for customer and partner training. Essential for protecting businesses Openness and flexibility are two of Milestone’s core values. These values will continue to be essential for protecting businesses and allowing the integration of innovative technology like AI, analytics, and heat-mapping to video systems. These systems play a key role in protecting societies and people worldwide. The Milestone Marketplace, launched in 2019, is an open business platform that connects buyers and sellers, who can work together to co-create innovative solutions using current technology. In 2020, Milestone will launch version 2.0 of the Milestone Marketplace, enabling customers to easily find resellers and integrators who deliver video solutions to their individual needs. “Video surveillance solutions are increasingly being recognised not only for security purposes but also to optimise businesses and tackle societal challenges,” says Sadi. “With our competitive portfolio of products, we are enhancing our joint solution-selling to the benefit of our clients. I look forward to continuing our expansion in the region.”
UK-based Trustonic announces a strategic partnership with the smartphone manufacturer Samsung Electronics Co. Ltd. to better serve their mutual partners and customers. This multi-year deal will lead to the integration of Trustonic’s security platform with Samsung’s device-embedded Knox security platform. This creates a single-cloud solution for mobile operators and distributors to manage and protect their Samsung smartphones and tablets throughout the supply chain. Trustonic’s platform also enables innovative financial services to be deployed by mobile operators to drive new revenue growth. Samsung and Trustonic have both agreed to collaborate on commercial and go-to-market activities globally. Devices crime prevention Mobile operators are facing mounting pressures on revenue and margins, while increasing investment in 5G rollouts as well as balancing a complex regulatory environment. Mobile devices are increasingly valuable, and there is a growing requirement for subsidies and funding; the devices themselves are also a target for theft and fraudulent activity. Critically, this strategic partnership results in a premium solution which allows mobile operators to improve financial performance by preventing fraud across the device portfolio, while increasing revenues through device financing, protecting device subsidies and growing their subscriber base. “This is a critical partnership that meets the demands of our mobile operator customers,” commented Dion Price, CEO Trustonic. “As the choice in smartphones increases, so does the need for secure device financing solutions. Trustonic’s solution provides mobile operators the opportunity to increase adoption of device financing options across Samsung’s smartphones within their Android portfolio.” Single cloud platform Trustonic’s solution provides a single cloud platform that supports multiple use cases from hardware (TEE) backed device lock, securing devices in the supply chain to device financing for mobile operators. The platform puts control and management of the solution into the hands of the mobile operator. It is used by some of the world mobile operators and manages over 70M devices and counting. Samsung Knox provides a combination of a proven security foundation built into Samsung devices and mature suite of solutions leveraging this platform. It is built into Samsung devices, securing them from the moment one unpacks and turn them on. It provides multi-layered hardware and software security features that are always enabled.
As part of Pyronix’ ongoing commitment to support their valued customers, they’re now providing a small hygiene kit with every control panel. Introducing hygiene kit This small hygiene kit includes a mask, gloves and an alcohol wipe, to help their installers return to work safely during this uncertain time, while providing them and their customers with added reassurance. “We’ve introduced the hygiene kit as a free of charge item which installers can find in their control panel kits when purchasing through distribution. We want to help our customers get back to work safely and it will hopefully go some way into aiding our installers to adhere to government guidelines when returning to work,” Laurence Kenny, Pyronix Marketing Manager, said. Adhering to government guidelines As people across the country begin to go back to work, Pyronix has taken the step to help its installers do so as safely as possible. The hygiene kit is included as standard with every control panel to ensure installers are taking the necessary precautions to protect not only themselves, but their customers too. “The current situation around COVID-19 presents new challenges to all businesses. Whilst the hygiene kit we supply is not medical grade and shouldn’t replace installers carrying out proper assessments with regards risk within their business, we want to help our customers as much as possible to adhere to government guidelines when returning to work in people’s homes and businesses,” Laurence said.
Antaira Technologies is a developer and manufacturer of industrial networking devices and communication solutions for harsh environment applications and is proud to announce the expansion of its industrial networking infrastructure family with the introduction of the LMP-0702G-SFP-V2 and LMX-0702G-SFP-V2 series. The new hardware update will be known as ‘V2’. The affected switches are listed below: LMP-0702G-SFP(-T)-V2 LMP-0702G-SFP-24(-T)-V2 LMX-0702G-SFP(-T)-V2 Ethernet ring protection switching The new Version Two (V2) hardware delivers more horsepower under the hood allowing an entirely new operating system to be installed. With the new operating system comes a long list of new features that bring these smaller switches up to the same feature set as the larger port count Antaira Ethernet switches. Using an open standard for the ring allows a customer to not be trapped by a proprietary protocol Two of the newest and important key features are multi-ring Ethernet Ring Protection Switching (ERPS) and access control lists. ERPS is an open standard used for creating redundant link rings. Ring technology helps prevent system outages by creating multiple paths allowing data to make it to its destination even when a link has failed. Using an open standard for the ring allows a customer to not be trapped by a proprietary protocol. Open standard ring technology Allowing a mixture of manufacturers’ products to be used in an application can also create the best solution. Network security has become increasingly important, while no one feature can assure a secure network, layers of features provide the best security. Access control lists make sure data can get to where it needs to go but all other traffic is blocked. Minimising how data traffic flows on a network is an important step to securing any network. The new access control lists available with the new V2 hardware will allow an administrator to control this traffic and begin to secure the network. Antaira Technologies’ LMX-0702G-SFP-V2 Series managed Ethernet switch series is an ideal choice for Ethernet ring solutions with its two fibre optic ports supporting an open standard ring technology (ERPS). Wide temperature-rated device These devices are able to communicate and send critical information back to an enterprise switch With the new LMX-0702G-SFP’s smaller port count now added to the Antaira family of industrial switches, even applications requiring fewer ports have a solution that is the right fit. For example, campuses have networking rings consisting of hardened and industrial switches for outdoor environments that require a wide temperature-rated device. These devices are able to communicate and send critical information back to an enterprise switch at a data centre. Antaira’s LMP-0702G-SFP-V2 Series industrial PoE switch can not only provide PoE ports (30 Watts) for security applications, but also fibre optic interfaces for long-range connectivity (1 meter to 100 KM), that is, from 3 feet to over 60 miles. The SFP port will not only allow connectivity beyond the 100 metre/300-foot limitation of copper cable but also permits connectivity through areas where electromagnetic interference may cause issues found on factory floors. LMP-0702G-SFP-24-V2 series has the same features and specs as the LMP-0702G-SFP-V2 except for the switch power input supports 12~48VDC which is ideal for applications where only 24 volts of DC power is readily available such as automation applications.
Many industries are, to a greater or lesser extent, in the throes of digital transformation. As with any change programme, digital transformation efforts often under-perform against expectations. Yet, the number of digital transformation programmes continue to increase, as commercial pressures intensify. As security professionals we need to embrace our role in digital transformation, as security is everybody’s business. For all those people weary of hearing about digital transformation and believe it’s a business fad, consider your own behaviours. If you use a smartphone to search, find, order, buy, message, watch, learn, play, bank, pay, enter, exit, navigate, communicate and more then you are part of the reason that digital transformation is a commercial necessity. The way we live our lives has changed significantly over the past twenty years and this needs to be reflected into how we rethink the way we do business. Digital transformation is about more than technology, it allows people to solve their traditional problems in new and better ways than before. Better can mean faster, at lower cost, using fewer resources, easier to maintain, more compliant and/or easier to report insights. IoT, criminal activity and security The number of internet connected devices worldwide is increasing at an exponential rate; by the end of 2025 there are expected to be 75.44 billion. Internet of Things (IoT) means digital transformation converges physical and digital for security professionals. Criminals use smarter digital tools such as malware, drones, key cloners, signal readers and more, which impact both physical and cybersecurity. To counter this, digital transformation provides security professionals with access As security professionals we need to embrace our role in digital transformation, as security is everybody’s businessto valuable actionable insights to identify and deter threats to people and assets. All transformation starts with an idea generated by people and ends with people experiencing the output. Therefore, digital transformation starts and ends with people. To ensure a solid foundation to any digital transformation agenda, people need to have a clear purpose to engage. This is where security leaders can inspire their colleagues with a laudable purpose of embracing disruption at the same time as focusing on safeguarding people and assets. Non-security colleagues should understand that security risks are advancing at a faster pace than enterprises can adapt. As a security leader, you are advocating a movement where your colleagues adopt relevant enterprise security risk management practices in their daily thinking and working. The message is clear that digital transformation presents abundant opportunities and these need to be evaluated alongside the proliferating security threats that can become a business continuity failure. Security professionals and digital influence The number of internet connected devices worldwide is increasing at an exponential rate; by the end of 2025 there are expected to be 75.44 billionSecurity professionals can influence digital transformation success by translating an enterprise’s strategy into secure operational reality. The security narrative should emphasise the people side of digital transformation and how technology can act as an enabler of a safe and secure experience, both for employees and customers. Operationally, digital transformation is about agility, adaptability and navigating uncertainty. Old ways of thinking and working will be blockers to transformation, so security leaders ought to identify the rapid enablers of a ‘secure’ digital transformation. Better people, processes and overall technology People generally don’t want more in their lives, they want better. Better people. Better data. Better technology. Better processes. Digital transformation creates significant ‘better’ benefits for security: For example, connected (IoT) sensors, video analytics at the edge and machine learning identify threats faster; workflow technologies and automation detect, investigate and remediate routine responses; cloud provides many benefits such as agility, scale and mobility; and, smartphones/digital devices provide real-time communication and collaboration. Tackling all the ‘better’ needs within a security approach is necessary – focusing on the prioritised commercial needs first. Think about how to drive radical simplification into digital transformation agendas to ensure complexity doesn’t create too many unmanageable risks. Designing enterprise security risk management into the business operating model will facilitate colleagues to be empowered for safe and secure change. Communicating security successes and breaches with commercial impact insights in a timely and concise manner across the enterprise will prove the value of active security engagement throughout digital transformation programmes. Transforming the world Digital technology is transforming the world around us, in a way that impacts every area of security. Security professionals are now businesspeople and technologists, in addition to their traditional security remits. Embracing this impacts security recruitment, training and employee engagement, within the security team and with non-security colleagues. Without a doubt, security professionals are integral to digital transformation programmes.
As we surpass 2019, it’s high time we realise that by merging the digital and physical realm, IoT is destined to change the way we live and work. I have always been interested in the intersection between business and technology, and today it seems that the brave new technological world we have been dreaming over centuries has arrived. With everything from home appliances to smart vehicles, portable devices are connected to the internet and exchange crucial data. According to the statistics, there are 26.66 billion IoT connected devices around the globe. Which statistically leaves every citizen of the world with at least 3 devices. IoT in every day life I must say the numbers are quite mind-boggling! And this leaves a lot of room for improvement by incorporating the Internet of Things in software development; whether it’s a mobile app or web. According to the statistics, there are 26.66 billion IoT connected devices around the globe. Which statistically leaves every citizen of the world with at least 3 devicesIt may interest you to know that the Internet of Things has the potential to touch every domain and nearly every aspect of human life. According to sources, impact on IoT leads to: By 2020, 50 billion devices are expected to connect to the internet In 2015, 3.5 connected devices per person have now reached almost 7 8 billion mobile broadband access points by 2019 5 million IoT jobs by 202070 percent a year growth through 2018 in total sales of clothing and accessories incorporating computer technology, rising from $3 billion today to $42.5 billion $3.3 trillion market for ‘Smart City’ applications and services by 2025 The impact of smart homes Instead of saying the home is where our heart is; a home is where a bot is. However, IoT hasn’t entirely arrived in our homes. I mean, we are still required to order groceries the minute we run out of eggs and Greek yogurt. Slowly and steadily we are getting there; it seems the latest advancements in artificial intelligence and big data analytics will definitely work wonders for us. Smart homes are no longer a dream project; we can soon expect everything to be governed by the “brain” or a central platform. Moreover, bots will be seen tackling a certain set of functions related to more difficult tasks, and lastly niche bots, in charge of single tasks such as vacuuming the house or addressing more complex duties like accounting, coaching or household managing. Tech giants, or should I call them current development frontrunners like Amazon, Google, Samsung and Apple are expected to come up with something nerve-cracking. The benefits of IoT Other than this, with IoT, you will be able to work smarter and not harder. Artificial intelligence and advanced analytics can help create a more intelligent work environment. For example, the right AC temperature in shared office spaces help us book the most convenient meeting room, and moreover, take into account the room preference by setting the right temperature, lighting, and can automatically restock office supplies. This simply leads to: More efficient office operations Energy savings Comfortable work environments Consequently increased employee productivity The dark side of the Internet of Things The potential risks Every technology indeed comes as a boom, but that doesn’t mean the grass will be greener on the other side. Furthermore, we will uncover how even after offering so much convenience why IoT poses so much risk. Like I said before, IoT can be integrated into anything from coffee machines to fitness watches leading to make our lives more convenient. But what happens if they turn bad? When being unwillingly infected or hacked, these blessings can certainly turn into huge threats. IoT can be integrated into anything, leading to make our lives more convenient Devices, systems and the lack of security It may interest you to know that IoT devices can become bots that blindly follow commands to commit crimes as part of a botnet. What is a botnet, you may ask? Well, it is a network of infected devices that are mainly abused by the attacker to perform tasks such as carrying out DDoS attacks, Bitcoin mining and spreading spam emails. Mainly being used to carry out DDoS attacks and to mine for cryptocurrencies, these botnets have the potential to have a larger impact by making IoT devices do much more, such as send spam messages featuring dangerous malware. Botnets can also carry out click-jacking campaigns, distribute fake advertisements, and even worse, infect other IoT devices. Botnets can also carry out click-jacking campaigns, distribute fake advertisements, and even worse, infect other IoT devices Much like most malware, botnets can be found on dark marketplaces. The source code can be purchased and leaked, depending on the type of service. In case, an IoT device is already infected, another bot can attempt to replace the infection with its code and in some cases also "repair" the security vulnerability. But most of the time it fails! No matter how innocent these proof-of-concept attacks may seem, one cannot deny the fact that IoT devices and systems aren’t properly secured. Hackers can easily gain control of them and cause complete chaos like never before. Collecting information at a cost But how much information can an IoT device collect? What I mean is that by hacking a webcam, one can see what they are pointed at without you even knowing it, smart TVs and personal assistants can pick up sound, and smart cars can give clues to whether or not someone is home. Honestly, the amount of information collected on these IoT devices cannot be determined at any cost. And with everything in the cloud, such information can be intercepted or rerouted to a malicious server and be abused if not properly secured. The more we surround ourselves with IoT devices, the more motivation cybercriminals receive to target us! With the time passing by, let’s simply hope that connected device security will dramatically improve.
One of the responsibilities of construction project managers is to account for risks during the initial planning for a project and mitigate them. With all the tools, construction materials, and heavy machinery during the initial stages of a project, the construction site is a dangerous place to be at. However, this is not the only risk that project managers need to protect a site from. With plenty of valuables both physical and virtual within a construction site, it is also a prime target for theft and arson. Improving the security of construction sites It is important now more than ever that construction business owners and project managers invest in improving the security of construction sites. After all, security on construction sites is for the protection not only of valuable assets but also of workers and members of the public. Investing in adequate resources for construction site security can prevent several issues, including: Theft of expensive tools and construction equipment Cybersecurity breaches leading to loss of sensitive information such as invoice data Arson resulting in loss of life and property Vandalism of construction site property Trespassing by unauthorised parties and exposure to construction site dangers Risks of injuries that can result in litigation and legal claims Identifying security issues Having a dedicated security team in place is a good first step in bolstering a construction site’s security. They will be able to prevent theft, vandalism, and deter unauthorised personnel from entering the site. They can also identify security issues that can potentially arise and even respond quickly to accidents and other calamities should they occur. Having a dedicated security team in place is a good first step in bolstering a construction site’s security For a better implementation of construction site security measures, it is critical that business owners and managers assess an assessment of the site itself. This will help identify both internal and external risks that can affect the site’s security and guide project managers in putting systems in place to address them. Construction site security checklist To guide you, here is a sample template that you can use to form your own construction site security checklist. SECURITY COORDINATION YES NO 1. Does the site have designated security coordinators? 2. Are the security coordinators available for contact during non-business hours? 3. Does the construction site provide a means to contact the police, fire department, and other relevant authorities in case of emergencies? 4. Does the construction site have a written security plan, including procedures for specific scenarios? 5. If so, are construction site employees aware of the security plan? GENERAL MACHINERY YES NO 1. Are all machinery adequately marked? (Identification number, corporate logo, tags, etc.) 2. Have all the machinery been inventoried? (Serial number, brand, model, value, etc.) 3. Does the project have a list of the names of operators handling the machinery? 4. Are all the machinery fitted with immobilisers and tracking devices when appropriate? 5. Are all the machinery stored in a secure area with a proper surveillance system? 6. Are the keys to the machinery stored in a separate, secure area? TOOLS AND OTHER EQUIPMENT YES NO 1. Are all power tools and hand equipment marked? (Identification number, corporate logo, tags, etc.) 2. Have all power tools and hand equipment been inventoried? (Serial number, brand, model, value, etc.) 3. Are tools and equipment fitted with tags and tracking devices when appropriate? 4. Are tools and equipment stored in a secure place? INVENTORY CONTROL YES NO 1. Is there a system in place to check material inventory to ensure they are not misplaced or stolen? 2. Are there procedures in place for checking materials that go in and out of the construction site? 3. Is there a set schedule for checking materials and equipment? 4. If so, do the records show that the schedule is followed strictly? 5. Are all material suppliers arriving for delivery properly identified? (e.g license plates, driver’s license, etc) CONSTRUCTION SITE PERIMETER YES NO 1. Is there a physical barrier in place to secure the site? 2. Is the number of gates kept to a minimum? 3. Are there uniformed guards at every gate to check personnel and vehicles entering and leaving the site? 4. Are security warnings displayed prominently at all entry points? 5. Are entry points adequately secured? (With industry-grade padlocks, steel chains, etc.) 6. Is there an alarm system? 7. Is the locking system integrated with the alarm? 8. Is the site perimeter regularly inspected? 9. Are “NO TRESPASSING” signs displayed prominently along the perimeter? LIGHTING AND SURVEILLANCE YES NO 1. Is there sufficient lighting on the construction site? 2. Is there a dedicated staff member assigned to check if the lighting is working properly? 3. Is the site protected by CCTV cameras? 4. Are there signs posted on site indicating the presence of security cameras? 5. Are there motion detection lights installed on-site? INTERNAL CONTROLS YES NO 1. Is there a policy on employee theft? 2. Are employees aware of the policy? 3. Are employees required to check in and check out company properties when using them? 4. Are staff members encouraged to report suspicious activity? 5. Is there a hotline employees can call to report security lapses and breaches? SITE VISITORS YES NO 1. Are visitors checking in and out? 2. Are vehicles entering and exiting the site recorded? CYBERSECURITY YES NO 1. Are the construction site’s documents and other sensitive data stored in the cloud securely? 2. Does the company have a strong password policy? 3. Are asset-tracking data accessible online? 4. Are confidential documents and data regularly backed up? 5. Are employees well-informed about current cyberattack methods such as phishing? Security is a serious business in construction. Because of the dangers already present on your construction site, a lapse in security can have devastating effects on your business’s operations. Not only do you risk losing money in a security breach, but more importantly, you also risk endangering the lives of your site’s personnel and third parties. Business owners and project managers need to make a concerted effort to educate employees about security and double down on their best practices for protecting their sites.
Across the security industry, power supplies are too often an afterthought and the first item in an access control system to be value-engineered. However, when the power supply fails on a high-end access control device, the system becomes a very expensive paperweight. Fortunately, there are now power supply units available that can enhance system reliability by providing remote diagnostics and real-time reporting and analytics. There is also a mistaken perception that all power supplies are the same, says David Corbin, Director of ASSA ABLOY’S Power Management Strategic Business Unit. Access control and security applications Power supplies today are more important than ever for access control and security applications The fact is, a properly designed unit for today’s market must have a wide input range, a myriad of features, interface to network, have adequate transient protection, good surge capability and a demonstrated quality level for mission critical reliability, he says. “Power supplies today are more important than ever for access control and security applications,” says Corbin. “From heavy snowstorms in the Midwest and East Coast to the two million Californians that experienced unprecedented power outages, extreme weather conditions have created chaos for millions over the past few months. These events have resulted in students being locked out of schools, hospitals darkening and electronic keypads or card readers shutting down. With events like these on the rise, and an increased reliance on the technology we use to get in and out of the spaces we occupy, power supplies are critical for keeping systems up and running and people safe and secure.” ASSA ABLOY's LifeSafety Power’s FPO Intelligent Power Supplies and Helix Redundant Power Systems Installing right power supplies ASSA ABLOY has a range of products within the power supplies category, including LifeSafety Power’s FPO Intelligent Power Supplies and Helix Redundant Power Systems. ASSA ABLOY’s acquisition of LifeSafety Power in September expanded the company’s offering of smart integrated access control power solutions for OEMs, integrators and end-users. Other ASSA ABLOY power supply products include Securitron AQ Series Switching Power Supplies, and eco-friendly, linear, plug-in and solar power supplies, as well as Power over Ethernet (PoE). Access control is crucial to security and life safety, says Corbin. And without power, any protective system is useless. When the right power supplies are installed correctly, the system will have built-in backup power that will be triggered during an outage. Dependable power supplies, with regularly replaced and appropriately sized backup batteries, are critical to keeping occupants safe in an emergency event. Other ASSA ABLOY power supply products include Securitron AQ Series Switching Power Supplies Periodic testing of the battery When it comes to extreme weather conditions, the result of a power outage can lead to hazardous situations for employees, patients, residents and students, he says. Buildings that require power to gain access can leave people stranded outside or locked inside. “When access controls are disabled, intruders can easily enter buildings without notice, affording the opportunity for interruptions to power distribution, water supplies and other necessary public utilities,” says Corbin. Preparation for the next big power outage should include the sizing of power supplies to the system requirement with a reasonable safety factor for foreseeable system expansion and a battery set that is sized for operating the system for a period of time greater than the planned requirement, he says. Using a ‘smart’ power supply provides early warning of an impending failure; and consistent, periodic testing of the battery set keeps the system in peak operating condition. Predictive maintenance of access control Predictive analytics and data harvesting can help with predictive maintenance of access control Redundancy ensures that power remains available in the event of a failure, regardless of whether it is a blackout situation or a failure of the power supply itself, says Corbin. “In critical power installations where redundancy is vital, the system must have a properly sized and maintained backup battery,” says Corbin. “Additionally, further redundancy can be achieved via products like our Helix systems that provide for seamless switching between two different power supplies in the event of an electrical failure of one of the power supplies.” Corbin also notes there is a growing want and need for more data and analytics in the access control field. End users increasingly expect access control systems to be able to integrate with building information systems. Predictive analytics and data harvesting can help with predictive maintenance of access control and building systems. For example, intelligent power supplies can identify problems before they happen – such as performing periodic, automated battery tests and then notifying a central monitoring location and/or a facility manager of a battery that needs replacement. Lock operation can also be monitored on a real-time basis for failure or impending failure of a secured door opening, he says.
Qumulex is a new startup with a mission to provide physical security integrators a transition path to embrace the technology of the cloud and a subscription-based business model. Qumulex’s products seek to provide capabilities to embrace the cloud without an integrator having to turn their back completely on the ‘transactional revenue’ of installing new systems. As the transition happens, Qumulex offers a product line that supports any mix of systems from on-premises to the cloud. The flexible deployment model – enabling a cloud installation, an on-premise installation or any combination – is one of the ways Qumulex seeks to differentiate itself in the market. Installing fully on-premise system The Qumulex cloud-based platform uses a gateway device located on-premises to which local cameras are connected The system is designed so that an integrator can install a fully on-premise system and then later ‘flip a switch’ and transition to a cloud model, says Tom Buckley, VP Sales and Marketing. The Qumulex initial 1.0 system launch is currently entering its final beta test. Full commercial availability is expected in the first quarter of 2020, which the company will highlight in a bigger 20x20 booth at ISC West next year. The Qumulex cloud-based platform uses a gateway device located on-premises to which local cameras are connected. Ensuring cybersecurity, the gateway provides a ‘firewall’ of sorts to avoid any cybersecurity threat from entering an enterprise through a vulnerable IP camera. The system is designed to be ‘cloud-agnostic’ and to work with any public or private cloud, using Docker software and ‘containers,’ a standard unit of software that packages code and all its dependencies so an application runs quickly and reliably from one computing environment to another. At launch, the Qumulex system will use the Google cloud. Greater situational awareness The open platform approach will enable users to assemble best-of-breed solutions Another point of differentiation for the new platform is a unified access control and video surveillance environment – both are part of the same program. Access control can drive video events and vice versa for greater situational awareness. A unified system avoids having to integrate separate systems. A big emphasis for Qumulex is ease of use. They have designed the user interface to be as simple and intuitive as possible, using consumer-oriented systems such as Nest and the Ring Doorbell as a model of simplicity. Finally, the open platform approach will enable users to assemble best-of-breed solutions. Keeping it simple, the system offers native integration with only the major camera manufacturers that represent most of the market: Axis, Hanwha, Arecont, Panasonic, Vivotek and Sony. Longer-term storage Other cameras can be included using the ONVIF interface. On the access control side, the system will initially be compatible with Axis door controllers, Allegion wireless door locks and ASSA ABLOY Aperio wireless door locks. Future versions of the software will seek to integrate HID Edge and Vertx and eventually Mercury panels. The gateway device may incorporate only a solid-state drive (SSD) for buffering Qumulex is taking a ‘mobile-first’ approach. The software is designed as a ‘progressive web app,’ which means is it is adaptable to – and fully functioning in – any smart phone, mobile device, laptop, or on a desktop computer with multiple monitors. The gateway device may incorporate only a solid-state drive (SSD) for buffering, or as many hard drives as the customer wants for storage. Short-term storage is available in the cloud, but local hard drives may be used for longer-term storage which can get expensive given the monthly fees of cloud storage. Using third-party server To manage the variety of scenarios, Qumulex will offer a line of gateways and recorders, or a customer can use a third-party server along with Qumulex, which is an open system. Qumulex will use a manufacturer’s representative sales model and has already signed up 11 rep firms covering the United States (the initial target of the launch). The company has been spreading the word among integrators, too, first at the ISC West show last spring, when 98 integrators saw demonstrations of the system at a suite in the Palazzo. Another 48 integrators saw the system at ESX in Indianapolis in June. At the recent GSX show in Chicago, Qumulex had a booth on the show floor, where they scanned 450 badges that yielded 176 unique integrators. Entering the physical security market Qumulex just closed a second round of funding, which does not include any ‘institutional’ money Buckley estimates there are around 10,000 total security integrators in the United States that sell products similar to theirs at their price point. They are working to build their database to reach out to those integrators. (Exacq had more than 4,500 dealer/integrators before it was sold to Tyco/Johnson Controls.) Qumulex is the third company to enter the physical security market by the same team that launched two other successful startups in the last 20 years: Exacq Technologies (sold to Tyco in 2013) and Integral Technologies (sold to Andover Controls in 2000). Both previous companies were built around a need to help the integrator community transition to newer technologies. Qumulex just closed a second round of funding, which does not include any ‘institutional’ money. The first round of investment involved only the founders, and the second round added some ‘angel’ investors to the mix. The funding allows more flexibility and control over the company’s timeline and the evolution of the product’s feature set, free of outside mandates, says Buckley.
Video, access control and visitor management are among the technologies that are enabling greater safety and security at hospitals and other healthcare facilities. Video surveillance systems enable hospital management and security professionals to know what goes on in and around a medical facility. Recording images in high resolutions (megapixels and gigapixels) is becoming more and more important in healthcare, says Jason Ouellette, Product Line Director – Access Control, Tyco Security Products. Video event management software Video analytics are now being leveraged for patient tracking, asset tracking, and operational purposes If an incident occurs in a medical facility, the security staff has to be able to identify faces easily and accurately. Storage and costs have to be considered, of course. With technology improving and prices decreasing, video solutions can even be used for purposes beyond traditional security. For example, video analytics are now being leveraged for patient tracking, asset tracking, and operational purposes, and captured video can be used to defend against liability claims. What’s next? Video analytics will continue to be a valuable addition to any surveillance infrastructure due to its ability to address patient needs, operational efficiencies and early risk detection, says Brandon Reich, Senior Director of Surveillance Solutions, Pivot3. Through video event management software (VEMS), hospitals can customise the statistics that are relevant to their individual buildings or campuses without having to spend extra time or money on rigorous employee training. Data capture form to appear here! Real-time access control security updates Furthermore, once healthcare facilities are able to digitise all of their patient records, secure any of their ingress and egress points with real-time access control security updates, and fully transition from analogue to IP video surveillance cameras, VEMS systems that house analytical software will be able to multiply the benefits offered to hospitals, not just in real time, but in planning ahead for future risk, expansion and safety protocols. It is vital to implement integrated and innovative access control solutions With large, complex facilities, directors of security at hospitals struggle with controlling access to various levels of the facility, according to Eric Widlitz of Vanderbilt Industries. To manage the risks that hospitals face and ensure a comprehensively protected atmosphere for patients and staff, it is vital to implement integrated and innovative access control solutions. For example, ease of access with controlled entrances is vital to medical crash teams, as is the need for a zonal access control lockdown in the event of a contagious disease outbreak. Strict access limitations Different hallways, rooms, floors and waiting areas within a hospital require different amounts of restriction, and sensitive materials, such as medical files, controlled substances and sterile environments (such as operating and procedure rooms) all necessitate an additional layer of protection. Access control in particular has advanced significantly to offer healthcare facilities the ability to control access remotely, through mobile applications, confirm identity quickly and easily and program varying levels of access for visitors, patients, doctors and staff. One area that is recently experiencing rapid growth – and drastic change – is the securing of narcotics within healthcare facilities, says Robert Laughlin, CEO and Chairman, Galaxy Control Systems. In the past, all medicine was controlled in a central pharmacy located somewhere in the hospital or health facility. These pharmacies were highly secured areas, with strict access limitations; only authorised staff could get near the medicine stocks. Fiber optic communication lines For vehicle access control, medical centers and hospitals prefer beam barricades and shallow foundation barriers To improve the speed of delivery, and to have the necessary medicines ready at hand for in-patients without retaining a large delivery staff, the current trend is to have distributed pharmaceutical closets or carts that hold medicines much closer to the intended patients. For vehicle access control, medical centers and hospitals prefer beam barricades and shallow foundation barriers, according to Gregg Hamm of Delta Scientific. Manual beam barricades are installed at the Fort Bragg Veterans Administration Hospital in North Carolina to shut down certain areas of the facility when a higher alert is sounded. They will stop a 15,000-pound vehicle traveling 50 mph. The Navy Hospital in San Diego uses high speed, high security and very shallow foundation barricades to control all vehicles going in and out of the facility. With their extremely shallow foundation, they obviate the concerns of interference with buried pipes, power lines and fiber optic communication lines. They will stop a 15,000-pound vehicle traveling 50 mph. At the National Institute of Health in Bethesda, Maryland, even stronger shallow foundation barriers are used for traffic control and protection. These barriers will destroy a 65,000-pound (5.4 million foot-pounds) dump truck traveling 50 mph and continue to stand. Physical access control systems Controlling visitors to hospitals and healthcare facilities can directly impact security Controlling visitors to hospitals and healthcare facilities can directly impact security. Traditional methods of visitor management, such as paper visitor logs and handwritten badges are insufficient given today’s variety of security challenges. A hospital using paper-based systems cannot easily cross-check information, confirm patient information, check visitor names against up-to-date watch lists, or visually confirm identity. An increasingly popular and important application is secure and simplified visitor management, integrated with the physical access control systems (PACS). Today’s visitor management systems enable the screening, badging and tracking all visitors or, at a minimum, those visiting critical areas or during ‘after hours’ periods, Quickly identify inappropriate visitors One other growing technology is the ability to link to internal or governmental watch lists, to quickly identify inappropriate visitors before they gain access to the facilities. For example, Visitor Management systems can be configured to perform a Sex Offender search in both Children’s Hospitals and Pediatric areas, further decreasing the likelihood that someone of the list could gain access. Wayfinding is indoor navigation to guide a person step-by-step on the way to a desired destination HID Global and Phunware Inc. are addressing the need of healthcare institutions to deploy standardised technology to provide a better wayfinding and visitor engagement experience inside the hospital, across campus and even in parking lots. The companies are collaborating to improve the experience for hospital patients and visitors to find their way within medical facilities, using wayfinding on their mobile phones. Wayfinding is indoor navigation to guide a person step-by-step on the way to a desired destination. Enterprise-level mobile wayfinding “It’s easy for visitors and patients to get lost in hospitals, and every time they do it puts appointment times and patient satisfaction at risk,” says Rom Eizenberg, Vice President of Sales, Bluvision, part of HID Global “With our location-aware app on a mobile device, we equip the visitor to get instant, turn-by-turn navigation that creates a better experience than that which is currently available on the market.” HID’s healthcare IoT solution-enablement platform simplifies the delivery of real-time location of clinicians, patients and devices. The platform is enabled by Bluvision (part of HID Global). Phunware’s Multiscreen-as-a-Service (MaaS) platform also provides enterprise-level mobile wayfinding, engagement, data and more for other vertical markets, including retail, residential, hospitality, media and entertainment and more. Missed the rest our healthcare mini series? Read part one here and part two here.
Multiple Construction sites in the Albuquerque area are managed by Shumate Constructors, Inc., an Albuquerque, New Mexico-based construction contractor, that is also renowned for building educational facilities. In addition to building schools from the ground up, Shumate Constructors completes school additions and remodels. Construction site thefts Three years ago, the company began having problems keeping thieves out of its construction sites during non-working hours. Unwatched construction sites are hot beds for a variety of thefts - from copper pipes and wire to hand tools to heavy-duty machinery. The loss of machinery, such as front-end loaders, would cost hundreds-of-thousands of dollars. Sometimes workers will arrive to a site in the morning only to find materials, such as copper pipe, gone along with their tools. Enhancing construction site security The sites also presented a challenge due to changing construction conditions The result is the loss of a whole day and sometimes multiple days of work. On top of the lost time, the contractor has to cover the cost of replacing materials, file an insurance claim for each theft and complete additional administrative paperwork that they weren’t planning to invest time in. The sites also presented a challenge due to changing construction conditions. Equipment or storage containers are delivered and removed, the sites are graded/re-graded and as sections of build were completed, tools, materials and supplies were moved to different areas. Flexible, reliable wireless solution At a contractor trade show a few years ago, Mark Shumate, President of Shumate Constructors met Dave Meurer, President of Albuquerque’s Armed Response Team. Meurer introduced Shumate to the idea of a flexible, reliable wireless solution that could continually monitor the entire site without the need to trench around the perimeter. “Mark [Shumate] was fed up with theft at his construction sites so we started to discuss some prevention ideas,” said Meurer, adding “I knew this was a great fit for the combined Inovonics transmitter and Optex sensor solution.” Optex sensors installed He further said, “At the Armed Response Team, we refer to this solution as the never sleeping, non-blinking eye. Shumate was not aware of any reliable solutions that could provide this type of theft prevention, but we explained that we were very confident in this application and he was definitely interested.” To install each combined sensor, the Armed Response Team attached the Optex sensors to a freestanding steel post with a base plate on it and deployed them throughout the site. This allowed the flexibility to be easily moved to accommodate site changes. Once installed, a signal was easily achieved. iSeries Optex/Inovonics sensors The amount of iSeries Optex/Inovonics sensors needed at Shumate’s sites vary The sensors in the combined solution often need to communicate as far as an entire city block and the perimeters can be several thousands of feet. The iSeries Inovonics/Optex solution was able to easily accomplish this feat. The amount of iSeries Optex/Inovonics sensors needed at Shumate’s sites vary. For some sites, it can be as few as a dozen, and others it can be as many as 30 or more. “Together, the products offer a great solution,” noted Meurer, adding “The Optex sensors can handle varying weather conditions and Inovonics’ wireless connectivity offers less signal drop and more consistent reporting signal than any of the other transmitters we’ve tried.” Efficient perimeter security solution “Between the perimeter technology by Inovonics and Optex, and the Armed Response Team’s follow-up, we have seen zero thefts for all projects since installation. With the integrated wireless solution, the construction sites are monitored on a real-time basis and immediately notify the Armed Response Team upon unauthorised access,” said Mark Shumate, President of Shumate Constructors. He adds, “We look at the perimeter security solution as a great investment. Annually, the cost of manpower, replacement of lost or stolen items and damage repairs could easily cost three times more than we spend on Armed Response Teams’ services with the Optex and Inovonics solution.”
For more than a century, SwedishAmerican Health System, its hospital and medical facilities, have been serving the community of Rockford, Illinois. As a division of the University of Wisconsin Health, the medical staff has been delivering high-quality healthcare and strategies to keep patients and families healthy. What families and patients don’t see is the security systems that have been put in place at all Swedish American medical facilities and outlying satellite healthcare clinics. “In an ongoing effort to provide security at the highest level, SwedishAmerican is upgrading all their servers to include Windows 10,” said Randy Lapp, a regional business development manager at Salient Systems. Reliable security solution “The security team has nearly completed the replacement of old DVRs with new enterprise network servers. This offers a much more reliable security solution tying all the medical facilities together. Each clinic will have a single server, while there will be multiple servers in the hospital. Server types and camera counts will depend upon the needs of each wing of the facility.” In keeping with SwedishAmerican’s mission to deliver excellence in healthcare, they also maintain the highest level of care when it comes to keeping their patients, medical staff, and facilities safe. One such effort is the migration from Windows 7 platform to Windows 10 and maintaining compliance in their OS. Utilising Salient’s CompleteView VMS with Dynamic Resolution Scaling, the security team has more than adequate bandwidth to record and store video for 90 days at each facility. Video surveillance systems The servers replace an obsolete system and have been engineered by Salient System network engineers Because the medical centre offers a daycare facility, recording is ongoing, and is stored for 90 days; however, some recordings are held for as long as six months. In locations where there are privacy issues, such as patient treatment areas, no video recordings are made. Still, in spaces such as parking lots and common areas, video recording is essential. The servers replace an obsolete system and have been engineered by Salient System network engineers to accept upgrades in security solutions as technology, and various solutions evolve. Even more important is the fact that the servers are tailormade to fit the specific needs of the various hospital departments and separate clinics. The servers, just like the hospital, have evolved over the years. The PowerProtect platforms extend the limits of operational capabilities for video surveillance systems engineered for continuous access and durability. Various requirements for storage “The reason for the custom build is to fulfill several missions of the hospital system,” Lapp said. “There are various requirements for storage and differing requirements for recording frames per second. The customised nature of these security solutions fulfils the unique needs of the customer.” SwedishAmerican Hospital has video recording requirements that weren’t necessary a few years ago. This is an inner-city hospital system, where there are different and sometimes difficult challenges" Terry W. Gagliano, security manager at the hospital system, said the investment in this server solution would not only help with the upgrade to Windows 10, but it will allow greater recording capacity. “This is an inner-city hospital system, where there are different and sometimes difficult challenges,” Gagliano said. “The clinics also are within the inner city, and we wanted to ensure that we had enough bandwidth to not only record, but to store the images that we are getting. We wanted to be able to effectively record and store video for 90 days.” Mission-critical video surveillance Recording and storage specifications vary at the hospital. For instance, at the child daycare centre at the hospital, recording is active only during hours of operation, and storage of those images last from three to six months. Parking lots also are under constant surveillance, and storage on the servers is ongoing. “We’re thrilled to have these server platforms in place and working,” Gagliano said. “What we had been using is obsolete. The PowerProtect solutions are engineered to accept upgrades as they are needed and as they become available. We expect these servers to last beyond five years before we have to consider replacement.” The servers or hybrid NVRs are a value oriented digital video surveillance system, offering continuous operation with advanced components. They are rack-mounted, and as any end-user would expect, delivers reliability and a processing power required by mission-critical video surveillance. High performance in a flexible platform Because the storage of video images is important, SwedishAmerican sought a single Intel Xeon processor with 16 GB of memory, which also offered the hospital system up to 48 TB of video storage. “We were looking for new servers at our existing buildings, so that meant we were in the market for 40 to 45 servers,” Gagliano said. Our clinics have varied and different missions, so demand for security services are different" “Our clinics have varied and different missions, so demand for security services are different. When we sought customised solutions, we found exactly what we needed.” PowerPlus is a two-unit NVR rack mount used for the installation because SwedishAmerican sought a balance between processing power, storage capacity, and redundancy for high performance in a flexible platform for its existing video surveillance applications. A hospital setting is a 24/7/365 environment, requiring a system that can withstand the rigors of continuous operation. That’s where the enhanced performance of CompleteView 20/20 comes in. Considering performance first and foremost “When we started the process of replacing our servers and NVRs, we considered performance first and foremost,” Gagliano said. “It was mission-critical to have flexibility, and it was important to honour the standard of excellence already offered by SwedishAmerican Hospital.” In recent years, SwedishAmerican has been honoured in the medical professional for its commitment to quality, and it has become a gold standard for medical care of any other healthcare system in northern Illinois. The hospital has received a Top 100 Hospital Quality Award, 150 Top Places to Work in Healthcare, and a Distinguished Hospital Award by J.D. Power and Associates, among many other accolades. While there may not be an award or designation for security in the workplace, SwedishAmerican has done its best to ensure that patients are afforded the highest level of safety and security.
The new Student Centre at Columbia College Chicago, located at 754 South Wabash Avenue in Chicago, opened its doors in the fall of 2019. This brand-new building offers five spectacular stories of spaces for students including music and film-screening rooms, dining options, a fitness centre, a reflection room for meditation and prayer, and event spaces for meetings, performances, and receptions. According to Andy Dutil, Director of the Columbia College Chicago Student Centre, the school has taken the initiative to improve overall security, with the intention of keeping an open feel to the campus. Speedlane open turnstiles To help meet that objective at the new Centre, the architects designed the building with Speedlane Open turnstiles and a TQM manual revolving door from Boon Edam. Columbia College Chicago has a closed campus. In order to enter any building on campus students and staff must have a Columbia ID or visitors must have a valid appointment. The main entrance at the Student Centre is the TQM revolving door that leads to a public foyer that includes a coffee shop and lounge. Guards watch as people pass through them to ensure that everyone is scanning their IDs Since the turnstiles are just past the security desk at the boundary of this area, they serve as a visual and physical indicator of where the public area terminates. Next to the Speedlane Open turnstiles, which are notable because they do not have any closing barriers, guards watch as people pass through them to ensure that everyone is scanning their IDs and that the IDs are valid, in which case the turnstile shows a green light. Controlling access without being obtrusive In a situation where a red light shows and the turnstile alarms, the guard will check the person’s credentials and can try to troubleshoot the ID card. “The decision was really about what creates the least barrier to those entering and exiting the building,” said Dutil. “We don't really want our students to feel like they are overly policed or that our buildings are not accessible to them. So the design of the Open turnstiles provided the best solution in terms of controlling access without being obtrusive.” Before the Student Centre was built, students entering any campus building would just show their ID to the security officer as they walked past. The administration realised that while this does provide some level of security, it is not foolproof – particularly when many people are entering at the same time for a class. Brief learning curve The College’s head of security made the suggestion to install a system that would allow for swift passage of authorised people while maintaining accountability around who enters and exits the building. As anticipated, there was a brief learning curve for the students using the new system As anticipated, there was a brief learning curve for the students using the new system. “This was the first system like this on our campus,” said Dutil. “And the first few days that the new Centre was open were also the first few days of school. There were a lot of people new to the campus who required a bit of coaching from guards and our student staff in terms of where to place your card, and to not walk through before you place your card.” Dutil confirms that the access systems placed at Boon Edam turnstiles are actually outperforming those placed at swing doors across the campus for convenience and adoption. Benefits beyond campus security “Across the campus, there is a card reader at every swing door entrance of a building where you present your card and a light turns red or green. But oftentimes the card reader is missed, or depending on the placement of the lights and placement of the guard, it can be kind of hit or miss with students walking right by it.” “But with the Open turnstiles, they're very visible and although they're not a total barrier to entry, they are something that's right in front of you. Because it's very noticeable and not easily overlooked, the students have learned pretty quickly to get their ID out. In fact, this was meant to be a test run for the campus to ensure it would be viable and worthwhile for other buildings as well.” The turnstiles have delivered additional benefits beyond basic campus security, according to Dutil. Convenient touch panel “One of the nice things about a system like this is that we can count visitors to the Student Centre because we get the data of everybody that scans in. So on a busy day for us it's about 2500 people throughout the day. That can range depending on what's going on and what time of year it is. On weekends we're very slow, since there are no classes – maybe 900 to 1200.” There's a really convenient touch panel right at the security desk called the BoonTouch" “We are a rental venue as well, so we have times where the building is open to non-Columbia College Chicago people for events or other functions. There's a really convenient touch panel right at the security desk called the BoonTouch, where the officer can turn off the turnstiles during those times and then attendees can move through freely without any alarms going off at all.” Keeping the building warm Finally, the TQM revolving door delivers one additional benefit to the Student Centre, located in a city known for harsh weather. “Revolving doors are always preferred at a building like this that gets a lot of traffic going in and out. We have cold, drafty weather that blows right into our main space at that first floor entry. The revolving door helps to keep the building warm and saves energy and utility costs as well,” said Dutil. “Students feel safe and comfortable entering the building at night,” he concludes. “Our building has a lot of nooks and crannies, and someone can end up alone in a space. And so I think knowing that the only people that are in that building are the ones that are supposed to be there is helpful. Overall, our students appreciate the effort to try to keep them safer.”
Iris ID, a provider of iris recognition technology, announces it will provide its biometric recognition technology to the County of Los Angeles to make its prisoner release process safer, more accurate and efficient. Iris ID’s OU7S-AK camera module will be part of 163 Livescan stations in 114 law enforcement locations throughout the county. The new criminal booking solution will bring iris-based identity authentication capabilities to a system that previously relied on fingerprints and photos to enrol and identify individuals arrested in the nation’s most populous county. Identification of all criminals arrested The Los Angeles County Sheriff’s Department is one of 64 law enforcement agencies in the county that are part of the Los Angeles County Regional Identification System (LACRIS), which is the entity responsible for the identification of all criminals arrested in the county. Tim Meyerhoff, director, Iris ID, said the company’s contactless iris-based technology was part of an FBI-funded pilot project began in 2015. “The Iris ID system will allow for a more accurate release of individuals as a person’s iris is much less susceptible to damage than their fingerprints,” he said. Automated fingerprint identification system “With more than 300,000 bookings annually, the Los Angeles County Sheriff’s Department is always interested in eliminating the improper release of any individual.” The iris capture technology is part of a larger contract to be overseen by South Carolina-based DataWorks Plus which will also supply central servers, supporting software and implementation and support services. The contract will be paid for using funds from the state Automated Fingerprint Identification System. Program implementation will begin after July 1, the start of the county’s 2020-2021 fiscal year. Full deployment is expected to be completed within six months.
From simple thefts of copper wire from light fixtures, to substantial damage to rooftop HVAC systems, copper continues to be stolen from everywhere that it is readily available. When a church in Georgia began feeling the effects of copper theft, the integrator associated with the property's interior security once again turned to OPTEX for help. The church utilised both rooftop and ground level HVAC systems, with easy access to each. Changing security needs Because of labour and cost associated with wiring, along with the difficulty bringing power to the rooftops, the Regional Sales Director for OPTEX recommended the iSeries line of battery-powered, wireless PIR's. The iSeries detectors offered spot and curtain protection for all HVAC units while also securing all access points to each. For future consideration, the addition of the wireless feature also allows the integrator to relocate and easily adjust the detectors based on changing security needs. With the system in place, copper and other related thefts have been eliminated and the end user can now respond quickly before any damage is done. All of the battery-powered, wireless detectors from OPTEX come with an empty backbox and work with most manufacturers wireless transmitters. Narrow detection areas OPTEX will pre-install the batteries and an Inovonics EN1941 wireless transmitter When one selects the iSeries version, OPTEX will pre-install the batteries and an Inovonics EN1941 wireless transmitter. One less time consuming step to do for the installer! The iSeries HX-80NRAMi is an 80' x 6' high mount, battery-powered, outdoor passive infrared detector with Anti-Masking. The iSeries version comes with an Inovonics EN1941 transmitter and batteries pre-installed. The iSeries BX-80NRi is a 3' x 80' low mount, battery-powered, outdoor passive infrared detector with Pet Tolerance. The iSeries version comes with an Inovonics EN1941 transmitter and batteries pre-installed. With it's long, narrow detection areas that extend from both sides, the battery-powered BX-80NRi is specifically designed to be wall-mounted centrally on a building or HVAC unit. Passive infrared detector The iSeries VX-402Ri is a 40' x 40' low mount, battery-powered, outdoor passive infrared detector with Pet Tolerance. The iSeries version comes with an Inovonics EN1941 transmitter and batteries pre-installed, and the dual PIR's create two detection areas (upper and lower) that must be compromised simultaneously in order to go into alarm. OPTEX has addressed and met the need for a line of easy to install, stable outdoor detectors that will deter and ultimately prevent copper theft.
As one starts to adapt to the ‘new normal’ it has been announced that schools in Wales will reopen from June 29th with a phased return. With this in mind, Oprema has donated an Olix OBTM-FS1, Intelligent Free Standing BTM Terminal to Greenhill School in Cardiff. Greenhill School helps young people to thrive in a caring and supportive community whilst ensuring that children are equipped with the skills required to help them achieve to the best of their abilities. Their vision and purpose means that every child has a right to educational excellence through high quality teaching. Non-contact temperature measurement As the school prepares to reopen its doors Oprema wanted to ensure that the children returning remain as safe as possible, along with the hard-working staff that work there. The Olix OBTM-FS1 takes a non-contact temperature measurement on the wrist and is accurate to +/- 0.3°C. The person’s temperature reading is displayed on an LCD screen. If the unit detects a raised temperature the alarm will sound to notify the user. The unit has been placed in the reception area of the school so that all students, staff members and visitors can be temperature checked before entering the building. High temperature is one of the key symptoms associated with the Coronavirus. Temperature monitoring system If a high temperature is identified, then government guidelines for testing and self-isolating must be followed. The Olix OBTM-FS1 helps minimise the risk of spreading the virus and the non-contact technology allows for no personal contact with potentially infected individuals. Shane Mock, Headteacher of Greenhill School has said “This temperature monitoring system will be a great help in ensuring all at the school are well and kept safe during this pandemic. It’s an impressive piece of technology which will give us further confidence in ensuring the health and safety of all members of the Greenhill community. We want to thank Oprema for their kind donation and generosity.” Oprema are delighted to have been able to assist the school in being able to open their doors once again in a safe way.
Round table discussion
Video analytics are undergoing a fundamental change in the market as machine learning enhances their accuracy while expanding their capabilities. But what are those expanded capabilities and how are they impacting the operation of security and video systems? We asked this week’s Expert Panel Roundtable: What new video analytics are having an impact in the market and how?
There will be more artificial intelligence, more machine learning, video systems with more capabilities, and all of it will add greater value to our solutions. Those are among the expectations of our Expert Panel Roundtable as they collectively look ahead to the remainder of 2019. One unexpected prediction is that AI will not prove to be a game changer – at least not yet. We asked this week’s Expert Panel Roundtable: What will be the biggest surprise for security in the second half of 2019?
The ability to treat patients in a secure environment is a base requirement of hospitals and other healthcare facilities. Whether facilities are large or small, security challenges abound, including perimeter security, access control of sensitive areas, video surveillance, and even a long list of cyber-risks. We asked this week’s Expert Panel Roundtable: What are the security challenges of hospitals and the healthcare industry?
Security devices: Manufacturers & Suppliers
- Dahua Technology Security devices
- Vicon Security devices
- Bolide Security devices
- Vanderbilt Security devices
- Seagate Security devices
- Bosch Security devices
- Aritech Security devices
- Hanwha Techwin Security devices
- Parabit Security devices
- LILIN Security devices
- VIVOTEK Security devices
- BCDVideo Security devices
- Hikvision Security devices
- Sony Security devices
- ComNet Security devices
- Videotec Security devices
- CEM Security devices
- Pelco Security devices
- Arecont Vision Security devices
- HID Security devices
Automatic vehicle identification: State of the industry 2020Download
How analytics engines mitigate risk, ensure compliance and reduce costDownload
11 considerations for embedded system RFID readersDownload