Security education
STANLEY Security, an integrator of comprehensive security solutions, announces it will partner with the Indianapolis Colts to recognise one deserving Indiana security professional with two tickets to the December 22 Indianapolis Colts vs. Carolina Panthers game at Lucas Oil Stadium. “STANLEY Security is for those who make the world safer. We want to recognise those individuals who live by this purpose and champion safety within their workplace,” said Tony Merritt, Director of Market...
Konica Minolta is making the next big advance in intelligent video technology by launching the MOBOTIX 7 smart solution platform and the M73 IoT camera that uses it. The latest generation of MOBOTIX video cameras offers a whole new set of functions plus application solutions based on deep learning, opening up new possibilities far beyond traditional video security. The M73 comes with more than 15 apps integrated into its camera software, which can be used to optimise business processes in pract...
Nigel Waterton recently joined cloud video company Arcules to lead the sales and marketing efforts as Chief Revenue Officer (CRO). He brings to the task the benefit of 22 years of experience building and managing large, high-growth technology organisations. Waterton joins Arcules from Aronson Security Group, an ADT Commercial Company, where he served as Senior Vice President of Corporate Strategy and Development. We caught up with the new CRO to discuss his position and to reflect on how indust...
Protecting against fire and security risks is an essential aspect of life for people and across all sectors. However, there is an increasing expectation and demand on fire and security providers, in areas such as education. The securitisation of our world paired with the rapid speed of communication and news updates means that young people especially have the potential to be more aware of potential dangers and threats to their own safety and the safety of those around them. Education institutio...
Sandra Jones, founder of Sandra Jones and Company (“SJ&Co”), announced her retirement after 45 years in the security industry, including serving on the Board of Directors of the Security Industry Association (SIA) for 39 years. Sandy co-founded and produced the Securing New Ground Executive Conference and created The International Security Conference’s (ISC) New Product Showcase. Sandy has been honoured with many industry accolades including PSA’s Marcus Award, SIA's...
Gallagher Security, a division of Gallagher Group, a privately-owned New Zealand company, is a global presence in integrated access control, intruder alarm and perimeter security solutions. Gallagher entered the global security industry in the 1990s with the purchase of security access control business Cardax. In the last several decades, the company has leveraged its experience in electric fence technology to develop a variety of innovative solutions used to protect some of the world's most h...
News
British businesses should drastically up their game when it comes to being prepared and able to effectively deal with cyberattacks, according to Cyber Security Connect UK (CSC UK), the industry forum for cybersecurity professionals. The call to action comes during European Cyber Security Month, the EU’s annual awareness campaign that takes place each October across Europe and aims to raise awareness of cybersecurity threats, promote cybersecurity among citizens and organisations; and provide resources to educate and share good practices. Identifying cybersecurity breaches or attacks According to the Cyber Security Breaches Survey 2019, more than a third of UK businesses identified cybersecurity breaches or attacks in the last 12 months. Despite this, only 33% admitted having cyber security policies in place. With this in mind, CSC UK is calling for business leaders across Britain to arm themselves with the knowledge and tools required to protect the companies they represent and make adequate plans should the worst happen. Martin Smith MBE, Cyber Security Connect UK Conference Chair and Chairman of the Security Awareness Special Interest Group (SASIG), said: “We have a duty as cybersecurity professionals to set the highest standards and be prepared to tackle cyberattacks. On top of this we must continue to push for a greater sharing of knowledge, benchmarking of best practice and ongoing learning so we can remain in the best position possible when it comes to staying ahead of cyber criminals.” Cyber incident management Aurore Domange, event director for Cyber Security Connect UK 2019, added: “European Cyber Security Month is the ideal time to raise awareness of the issues affecting our cyber resilience and educate businesses on how they can mobilise themselves against these challenges to best protect their company, its employees, partners and customers.” Cyber Security Connect UK, the conference and industry forum for UK CISOs, takes place from 13-15 November, it will bring together more than 300 top-level cyber security professionals to debate strategic cyber security issues including; cyber resilience, identifying cyber criminals, securing the supply chain and cyber incident management.
Confederation of European Security Services, CoESS and Euralarm have published a joint brochure on cyber security. The first copy of the brochure ‘Cyber security - Threat or Opportunity? It’s up to you!’ was launched during the General Assembly of CoESS held on 11 October in Rome. Cyber security breaks up the borders between product development, design, installation, operational continuity and alarm response. The guidelines highlight that when addressing cyber security, it is important to understand that all steps are inter-related in a security supply chain. ‘Cyber security - Threat or Opportunity? It’s up to you!’ CoESS and Euralarm's brochure covers the complete supply chain for the fire and security market With CoESS and Euralarm as publishers of the brochure, it covers the complete supply chain for the fire and security market – from manufacturers of products to private security companies and their customers. The brochure highlights in an understandable language the risks and responsibilities for each stakeholder in the chain and what companies need to do to mitigate these risks – both from a human and technological perspective. Many are not yet aware of the importance of these, sometimes simple, measures for the security and reputation of their business. Importance of cyber security Cyber security is a top priority for businesses and governments. Many large, but also small enterprises already have structures and people in place to enhance resilience against the risks of cyber security. But with a rapidly increasing number of devices connected to a network, the cyber security risks are getting bigger. Taking measures to enhance resilience against cyber-threats is therefore crucial - for business continuity of fire and security companies and their customers; security of data and assets; and both the industry’s and its clients’ reputation. Cyber security rules and regulations The brochure informs the reader about cyber security risks and solutions in the different phases Although most of the products offer tools to provide a level of protection and many companies have internal cyber security rules and procedure in place, the importance of the human factor in achieving and maintaining cyber security is often forgotten. With the joint brochure, CoESS and Euralarm want to create awareness that, with the right security measures, cyber-threats can be mitigated. The brochure looks at the whole supply chain and gives recommendations on the role of companies, their employees and end-users in carrying out security measures to minimise cyber security risks. This requires an awareness that each part of the chain needs to implement its own measures. Cyber security risk mitigation The brochure also highlights what is already being done to mitigate existing risks and what companies can do in order to ensure the integrity of the chain. On a step-by-step basis the brochure informs the reader about cyber security risks and solutions in the different phases.
The cybersecurity industry is being called upon to improve awareness and understanding of mental health by Cyber Security Connect UK (CSCUK), the industry forum for cybersecurity professionals, as part of World Mental Health Day on Thursday 10 October. One in four people in the UK will have a mental health problem at some point and anxiety and depression are the most common mental health problems. They are often a reaction to a difficult life event, such as bereavement, but can also be caused by work-related issues. Greater understanding of mental health Cybersecurity specialists often experience periods of intense pressure when dealing with cyberattacks" Recent surveys suggest that three out of every five employees are experiencing mental health issues because of work. Martin Smith, Cyber Security Connect UK Conference Chair and Chairman and founder of The Security Company and SASIG, said: “Cybersecurity specialists often experience periods of intense pressure when dealing with cyberattacks.” “Employers should have greater understanding of mental health and take steps to eradicate the stigma associated with it. It is so important that CISOs (chief information security officers) recognise the dangers to their own wellbeing and develop strategies to maintain a healthy work/life balance, for themselves and the teams they lead.” Top-level cyber security professionals Wellbeing and mental health will feature at Cyber Security Connect UK (CSCUK), the conference and industry forum for CISOs, which takes place from 13-15 November and will be held in Monaco. More than 300 top-level cyber security professionals are expected to attend the second edition of CSCUK. It is organised by the same team that produces the Les Assises de la Sécurité conference and offers a unique opportunity for delegates who participate in an insightful programme, with expert roundtables and partner workshops.
Steel fencing manufacturer Zaun Limited is increasing its efforts to educate security consultants, specifiers and architects in the latest technologies available to design into buildings, venues and public spaces to protect the public. In just four months, experts from Zaun will be delivering both Royal Institute of British Architects (RIBA) and Security Institute-approved Continual Professional Development (CPD) workshops from London to the North East to half a dozen different audiences, culminating in early December at the International Security Expo at Kensington Olympia. Independent testing and accreditation bodies The security industry requires greater conformity, rigour and collaboration Zaun director and co-founder Alastair Henman has long argued that the security industry requires greater conformity, rigour and collaboration among independent testing and accreditation bodies – and that any penetration tests accurately vet systems in real life scenarios. It favours the Loss Prevention Certification Board (LPCB) Red Book and its SR security ratings to LPS 1175, which many specifiers are rightly now insisting upon. But Zaun also gains product approvals with the likes of Secured by Design (SBD), the Perimeter Security Suppliers’ Association (PSSA), PAS 68 and IWA 14 and, of course, the Centre for the Protection of National Infrastructure (CPNI). Designed for security professionals Henman says: “So we’re now intent on propagating this message to specifiers, designers, security consultants, architects and anyone involved in determining the security that will protect their staff, customers and the public for years to come.” Sessions are designed for security professionals who are determined to keep their learning going The sessions are designed for security professionals who are determined to keep their learning going throughout their careers and upgrading their knowledge with the latest thinking on security – and operate on the classic CPD points system. The topics fit under the general theme of protecting business or organisational assets using technology and span from perimeter protection and detection and information on the SR Security Ratings and SBD and CPNI standards. Hostile Vehicle Mitigation A growing area is education in Hostile Vehicle Mitigation measures in response to the alarming trend for terrorists to use the vehicle as a weapon to target unsuspecting and innocent members of the public. Two years ago, Zaun joined the RIBA CPD Providers Network, which consists of over 500 manufacturers and suppliers who provide RIBA-approved CPD to architects and other specifiers. RIBA-approved CPD material In an Architects Journal survey of the top 120 architectural practices, 84% said they use RIBA-approved CPD and 66% of respondents had attended a face-to-face seminar with a RIBA CPD Providers Network member. The network partners deliver free RIBA-assessed CPD face-to-face in architects’ practices or on factory tours, at RIBA CPD roadshows or online. Zaun must keep the seminar material up-to-date and advise RIBA when it changesCPD is mandatory for RIBA Chartered Architects, and having RIBA approved CPD material available as seminar presentations, articles, videos, factory tours and in other formats is a good way to open doors to start building key relationships. Double points to RIBA Chartered Architects Approved seminars are worth double points to RIBA Chartered Architects. Zaun must keep the seminar material up-to-date and advise RIBA when it changes any content to conform to current legislation, guidelines or user needs. The RIBA promotes the material on their website, through its assessed material list and via monthly CPD Showcase e-marketing campaigns.
UNIONCOMMUNITY, will be launching the latest generation high performance multimodal biometric terminals and cloud-based access control platform at GITEX Technology Week 2019. UNIONCOMMUNITY, the original manufacturer of the VIRDI and NITGEN Biometric Technology Solutions will exhibit the New UBIO Series. UBio comprises of a range of high-performance multimodal biometric terminals. The UBio terminals support face, fingerprint, card, PIN, and mobile key authentication technology alongside our secure yet open cloud-based Security and workforce management platform. High-speed identification and verification The companies first 4G biometric tablet will also be released at GITEX The UBio biometric terminal series addresses essential requirements specific to the Middle East Market, such as; liveness detection, encrypted templates / data transmission, aesthetic design, vandal resistance, resistance to harsh sunlight, high-speed identification and verification. The company's first 4G biometric tablet will also be released at GITEX. UBio Alpeta Security Platform is designed to support small to enterprise-level security and workforce management applications. With key features such as access control, visitor management, time & attendance, and integration tools. Built using the latest development tools and methodology, UBio Alpeta is secure, yet open. The Alpeta X-Builder tool gives system integrators, developers, and power users the ability to create custom functions based on their specific requirements. UNIONCOMMUNITY will be using the GITEX Exhibition to engage with distribution partners, system integrations, technology developers, and educate end-users on the latest technical approaches to the security, safety, and identity industry. Visit the UNIONCOMMUNITY exhibition stand at GITEX, Hall 2, F23.
Door & Hardware Federation (DHF) has announced that its automated gate safety campaign, Gate Safety Week, has become Gate Safety Month. The Tamworth-based trade association launched the initiative in 2014; since then, the campaign has received increasing national attention and the support of some of the most influential organisations in the security, enforcement, inspection, education and safety sectors, such as HSE and The British Safety Council. “Such is the profile of Gate Safety Week, that despite already having a year-round presence, it seemed entirely natural to extend the focused campaign from just one week in October, to the entire month,” explain DHF’s Commercial Manager, Patricia Sowsbery-Stevens. “In support of this, DHF is offering a £35 discount on the one-day Level Two Award in Automated Gate & Traffic Barrier Safety training courses (both accredited and non-accredited), taking place during the safety awareness month. These fall on 17th October in Barnsley, and 22nd October in Tamworth.” Ideal for installers The course is to educate public on the dangers of poorly installed powered gates The courses, ideal for installers and maintenance engineers of automated gates and traffic barriers, will provide delegates with knowledge on the safety standards and legal practices in their industry. DHF’s continuing commitment to tackling the thorny issue of gate safety has shone a much-needed spotlight on unsafe automated gates and raised awareness of what proper installation and maintenance should look like, in addition to how to prevent accidents. In 2019, its objectives remain unchanged: to educate and inform professional installers, industry contacts and the general public on the dangers centred around poorly installed and maintained powered gates, in addition to how to report an unsafe gate and what to look for. Reducing safety risks associated with automated gates “When Gate Safety Week started in 2014, it was estimated that more than 70% of the 500,000 automated gates in service in the UK were deemed unfit for use, but as a result of our efforts, significant progress has been made, such as the launch of the industry code of practice, DHF TS 011:2016.” says Patricia. The code, which was updated in 2019, was created to reduce the safety risks associated with automated gates and traffic barriers to as low as is reasonably practicable and was created after discussions with HSE (Health and Safety Executive). DHF’s Gate Safety Week campaign has continued to gain real traction since 2014 and we’re delighted to extend this to Gate Safety Month; through our training programmes, technical specifications, and collaborative working, we have seen an encouraging improvement in the quality of gate installations as well as the knowledge of installers in the UK," concludes Patricia. "We will continue to work extremely hard to ensure that the risk of injury, or death, caused by automated gates is eliminated.”


Expert commentary
Insider threat programmes started with counter-espionage cases in the government. Today, insider threat programmes have become a more common practice in all industries, as companies understand the risks associated with not having one. To build a programme, you must first understand what an insider threat is. An insider threat is an employee, contractor, visitor or other insider who have been granted physical or logical access to a company that can cause extensive damage. Damage ranges from emotional or physical injury, to personnel, financial and reputational loss to data loss/manipulation or destruction of assets. Financial and confidential information While malicious insiders only make up 22% of the threats, they have the most impact on an organisation Most threats are derived from the accidental insider. For example, it’s the person who is working on a competitive sales pitch on an airplane and is plugging in financial and confidential information. They are working hard, yet their company’s information is exposed to everyone around them. Another type of insider, the compromised insider, is the person who accidentally downloaded malware when clicking on a fake, urgent email, exposing their information. Malicious insiders cause the greatest concerns. These are the rogue employees who may feel threatened. They may turn violent or take action to damage the company. Or you have the criminal actor employees who are truly malicious and have been hired or bribed by another company to gather intel. Their goal is to gather data and assets to cause damage for a specific purpose. While malicious insiders only make up 22% of the threats, they have the most impact on an organisation. They can cause brand and financial damage, along with physical and mental damage. Insider threat programme Once you determine you need an insider threat programme, you need to build a business case and support it with requirements. Depending on your industry, you can start with regulatory requirements such as HIPAA, NERC CIP, PCI, etc. Talk to your regulator and get their input. Everyone needs to be onboard, understand the intricacies of enacting a programme Next, get a top to bottom risk assessment to learn your organisation’s risks. A risk assessment will help you prioritise your risks and provide recommendations about what you need to include in your programme. Begin by meeting with senior leadership, including your CEO to discuss expectations. Creating an insider threat programme will change the company culture, and the CEO must understand the gravity of his/her decision before moving forward. Everyone needs to be onboard, understand the intricacies of enacting a programme and support it before its implemented. Determining the level of monitoring The size and complexity of your company will determine the type of programme needed. One size does not fit all. It will determine what technologies are required and how much personnel is needed to execute the programme. The company must determine what level of monitoring is needed to meet their goals. After the leadership team decides, form a steering committee that includes someone from legal, HR and IT. Other departments can join as necessary. This team sets up the structure, lays out the plan, determines the budget and what type of technologies are needed. For small companies, the best value is education. Educate your employees about the programme, build the culture and promote awareness. Teach employees about the behaviours you are looking for and how to report them. Behavioural analysis software Every company is different and you need to determine what will gain employee support The steering committee will need to decide what is out of scope. Every company is different and you need to determine what will gain employee support. The tools put in place cannot monitor employee productivity (web surfing). That is out of scope and will disrupt the company culture. What technology does your organisation need to detect insider threats? Organisations need software solutions that monitor, aggregate and analyse data to identify potential threats. Behavioural analysis software looks at patterns of behaviour and identifies anomalies. Use business intelligence/data analytics solutions to solve this challenge. This solution learns the normal behaviour of people and notifies security staff when behaviour changes. This is done by setting a set risk score. Once the score crosses a determined threshold, an alert is triggered. Case and incident management tools Predictive analytics technology reviews behaviours and identifies sensitive areas of companies (pharmacies, server rooms) or files (HR, finance, development). If it sees anomalous behaviour, it can predict behaviours. It can determine if someone is going to take data. It helps companies take steps to get ahead of bad behaviour. If an employee sends hostile emails, they are picked up and an alert is triggered User sentiment detection software can work in real time. If an employee sends hostile emails, they are picked up and an alert is triggered. The SOC and HR are notified and security dispatched. Depending on how a company has this process set-up, it could potentially save lives. Now that your organisation has all this data, how do you pull it together? Case and incident management tools can pool data points and create threat dashboards. Cyber detection system with access control An integrated security system is recommended to be successful. It will eliminate bubbles and share data to see real-time patterns. If HR, security and compliance departments are doing investigations, they can consolidate systems into the same tool to have better data aggregation. Companies can link their IT/cyber detection system with access control. Deploying a true, integrated, open system provides a better insider threat programme. Big companies should invest in trained counterintelligence investigators to operate the programme. They can help identify the sensitive areas, identify who the people are that have the most access to them, or are in a position to do the greatest amount of harm to the company and who to put mitigation plans around to protect them. They also run the investigations. Potential risky behaviour Using the right technology along with thorough processes will result in a successful programme You need to detect which individuals are interacting with information systems that pose the greatest potential risk. You need to rapidly and thoroughly understand the user’s potential risky behaviour and the context around it. Context is important. You need to decide what to investigate and make it clear to employees. Otherwise you will create a negative culture at your company. Develop a security-aware culture. Involve the crowd. Get an app so if someone sees something they can say something. IT should not run the insider threat programme. IT is the most privileged department in an organisation. If something goes wrong with an IT person, they have the most ability to do harm and cover their tracks. They need to be an important partner, but don’t let them have ownership and don’t let their administrators have access. Educating your employees and creating a positive culture around an insider threat programme takes time and patience. Using the right technology along with thorough processes will result in a successful programme. It’s okay to start small and build.
Growing up, I was surrounded by the military way of life as my father was a Captain in the Marine Corps during the Vietnam War and my grandfather and uncles all served in the military. Even from a young age, I knew I was going to serve our country. My 22-year career in the military includes serving in the United States Air Force, the California Air National Guard and as a reservist assigned to an active-duty Air Force unit. Training and development operations Over the course of my military career, I held a variety of assignments from starting out as a Gate Guard to becoming a Flight Chief and Non-Commissioned Officer in Charge (NCOIC) of a Security Forces section. I retired from the military as a Master Sergeant. After my deployment to Afghanistan, I joined Allied Universal as a security director. My 17-year career at Allied Universal encompasses roles including Service Manager and General Manager at the West Los Angeles Branch and leading the Training and Development operations and Fire Life Safety Division. In 2008, I was tasked to develop and implement the company’s Healthcare Division. Attaining meaningful employment opportunities Below are just a few reasons why the physical security sector is a natural fit for military veterans: Self-Discipline and Organisation Coveted in Security Sector - I believe that the skills learned in the military, such as self-discipline and organisation, have provided the necessary tools to be successful. I truly enjoy working with other veterans at my company as we all know that we can count on each other to get the job done right. This bond and sense of commitment to each other is always there. Multi-faceted Career Paths Available - The security sector also offers veterans the ability to attain meaningful employment opportunities with multi-faceted career paths. A veteran’s background and experience are highly valued in this sector and there are many positions to match our skill sets and expertise. The responsibility we have for those in our charge is really not any different than what we have learned in the military. Team Players - Teamwork is a lesson all military veterans learn. In the military, you live and work together, and are taught to support your team members and efficiently collaborate with the people around you. This is an invaluable skill in the security sector whether you are seeking an entry level or management position. No Military to Civilian Decoder Needed - Veterans need a ‘military to civilian decoder’ system to help explain the significance of their military skills and how they translate to the general employment landscape. The physical security sector, however, understands the language of the military and don’t generally require that military responsibilities be coded into language that non-military can understand. Securing mid-level appointments The physical security sector features a wide variety of jobs from entry level, middle management to senior positions. A retired veteran with a pension may look to the security sector for part-time or full-time entry level work. Other former military, who are not eligible for retirement benefits, may secure mid-level appointments with the goal of climbing the ladder to the highest rungs. The flexibility and opportunity are unparalleled in the security sector. Veterans generally enter the workforce with identifiable skills that can be transferred to the physical security world and are often skilled in technical trends pertinent to business and industry. And what they don't know, they are eager to learn - making them receptive and ready hires in physical security environments that value ongoing learning and training.
Artificial intelligence (AI) is improving everyday solutions, driving efficiency in ways we never imagined possible. From self-driving cars to intelligent analytics, the far-reaching impacts of Deep Learning-based technology empower human operators to achieve results more effectively while investing fewer resources and less time. By introducing AI, solutions are not merely powered by data, but they also generate valuable intelligence. Systems which were once leveraged for a narrow, dedicated purpose, can suddenly be engaged broadly across an organisation, because the previously under-utilised data can be harnessed for enhancing productivity and performance. Video analytics software The video intelligence software processes and analyses video to detect all the people and objects that appear When it comes to physical security, for instance, video surveillance is a standard solution. Yet, by introducing AI-driven video analytics software, video data can be leveraged as intelligence in previously inaccessible ways. Here are some examples of how diverse organisations are using AI-based video intelligence solutions to enhance security and performance with searchable, actionable and quantifiable insights. Law enforcement relies on video surveillance infrastructure for extracting investigation evidence and monitoring people and spaces. Instead of manual video review and live surveillance – which is prone to human error and distraction – police can harness video content analysis to accelerate video investigations, enhance situational awareness, streamline real-time response, identify suspicious individuals and recognise patterns and anomalies in video. The video intelligence software processes and analyses video to detect all the people and objects that appear; identify, extract and classify them; and then index them as metadata that can be searched and referenced. Maintaining public safety For law enforcement, the ability to dynamically search video based on granular criteria is critical for filtering out irrelevant details and pinpointing objects of interest, such as suspicious persons or vehicles. Beyond accelerating video evidence review and extraction, police can leverage video analysis to configure sophisticated real-time alerts when people, vehicles or behaviours of interest are detected in video. Instead of actively monitoring video feeds, law enforcement can assess triggered alerts and decide how to respond. In this way, officers can also react faster to emergencies, threats and suspicious activity as it develops. Video analysis empowers cities to harness their video surveillance data as operational intelligence Empowering law enforcement to maintain public safety is important beyond the benefit of increasing security: A city with a reputation for effective, reliable law enforcement and enhanced safety is more likely to attract residents, visitors and new businesses, exponentially driving its economic development. Furthermore, in cities where law enforcement can work productively and quickly, time and human resources can be reallocated to fostering growth and building community. Video surveillance data Video analysis empowers cities to harness their video surveillance data as operational intelligence for optimising city management and infrastructure. When video data is aggregated over time, it can be visualised into dashboards, heatmaps and reports, so operators can identify patterns and more seamlessly detect anomalous behaviour. A city could, for instance, analyse the most accident-prone local intersection and assess the traffic patterns to reveal details such as where cars are dwelling and pedestrians are walking; the directional flows of traffic; and the demographic segmentations of the objects detected: Are cars lingering in no-parking zones? Are pedestrians using designated crosswalks – is there a more logical location for the crosswalk or traffic light? Do vehicles tend to make illegal turns – should police proactively deter this behaviour, or should the city plan new infrastructure that enables vehicles to safely perform these turns? Finally, does the rise in bike traffic warrant implementing dedicated biking lanes? With video intelligence, urban planners can answer these and other questions to facilitate local improvements and high quality of life. By leveraging the video insights about citywide traffic, public transit organisations can make data-driven decisions about scheduling and services Enhancing situational awareness Insight into traffic trends is also critical for transport companies, from public transit services to transportation hubs and airports. By leveraging the video insights about citywide traffic, public transit organisations can make data-driven decisions about scheduling and services. Analysing video surveillance around bus stops, for instance, can help these companies understand the specific hours per day people tend to dwell around bus stops. Correlating this information with transactional data for each bus line, bus schedules can be optimised based on demand for individual bus lines, shortening waiting times for the most popular routes. Similarly, the traffic visualisations and activity heatmaps derived from the video of major transit hubs, such as international airports and central stations, can be beneficial for increasing security, enhancing situational awareness, identifying causes of congestion, improving throughput and efficiency and, ultimately, solving these inefficiencies to provide a streamlined customer experience for travellers. Large education campuses Campus law enforcement can leverage video data to increase situational awareness and public safety Much like a city, large education campuses have internal transportation services, residential facilities, businesses and law enforcement, and video content analysis can support the campus in intelligently managing each of those business units, while also providing video intelligence to these individual groups. Campus law enforcement can leverage video data to increase situational awareness and public safety, driving real-time responses with the ability to make informed assessments and accelerating post-event investigations with access to easily extractable video data. When campuses are expanding or developing additional infrastructure, they can plan new crosswalks, traffic lights, roads, buildings and entrances and exits based on comprehensive video intelligence. By understanding where pedestrians and vehicles dwell, walk, cross or even violate traffic laws, the campus can inform construction projects and traffic optimisation. Countless business operations The campus can leverage video business intelligence to justify leasing pricing for different retailers across campus Finally, the campus can leverage video business intelligence to justify leasing pricing for different retailers across campus, demonstrating property values based on traffic trends that can be correlated with retailer point of sale data. Whether its empowering security, productivity or decision-making, the insights generated by AI-based technology can drive significant optimisation – especially when data is fused and cross-referenced across smart sensors and systems for even deeper intelligence. In the case of AI-backed video analytics, diverse organisations can harness video surveillance impactfully and dynamically. Whereas once video technology investments could be justified for their security value – with the introduction of AI capabilities – procurement teams can evaluate these solutions for countless business operations, because they offer broadly valuable intelligence. And video surveillance and analytics is merely one example of AI-driven solutions’ potential to disrupt business as we know it.
Security beat
The next chapter of the Pelco saga began in May when Pelco Inc. was acquired by Transom Capital Group, a private equity firm, from Schneider Electric. Since the acquisition, Transom Capital has been working with Pelco’s management and employees to define and direct that next chapter. “The more time we spend with the company, the more excited we are about the opportunity,” says Brendan Hart, Vice President, Operations, Transom Capital Group. In addition to his position with Transom, Hart has taken on an interim line role at Pelco as Vice President of Product and Strategy. After helping to oversee Pelco’s rebuilding phase, he expects to step away from daily involvement over time. “We have gained an appreciation for nuance [since the acquisition closed],” he said. “The channels, the relations, how people buy in this industry are very nuanced. Who’s gone where and who’s done what? The interplay of hardware and software. We have gained appreciation for the nuance. And we need to be surrounding ourselves with people who know the industry, who know the multi-dimensional areas.” Transition from analog to IP systems We have to focus on who our customers are specifically and understand their needs” It’s a “transformative moment in the industry,” says Hart, given industry changes such as price erosion and the transition from analogue to IP systems. “We are about to go into the world of added intelligence. It’s an interesting time to buy a security company.” Hart says the Pelco brand still has value: “The market is rooting for us.” There is also a strong portfolio of people and products to build from. Pelco maintains its headquarters in Fresno, Calif., and has a presence in Fort Collins, Colo., near Denver, and a sales office in the New York area, not to mention many global employees who work remotely. A new CEO is being recruited; otherwise, “we have a great executive team” in place, including Brian McClain, COO and President, says Hart. “In defining the new company, we have to decide first and foremost what we want to be,” says Hart. “What can we provide customers? We have to focus on who our customers are specifically and understand their needs and use cases.” Part of defining the new company is to become more aligned with a specific set of verticals that fit with Pelco’s capabilities (although they are not saying which verticals those are yet). However, “we can’t ignore what we are today as we make the transition,” says Hart. Innovation in products We want customers to see innovation in products to a point when people will say ‘this is Pelco’" “We have to let the products and experience speak for themselves. We’re focused on getting our ducks in a row and going in a new direction, but actions speak louder than words,” he says. The changes will be “more organic;” don’t expect to see a big announcement. “We want customers to see innovation in products and customer support and get those things to a point when people will say ‘this is Pelco,’” says Hart. Although not exhibiting at GSX, I found Pelco occupying a meeting room near the show floor. The room gave the company a chance to respond to integrators and consultants at GSX who had questions about what was going on with the acquisition. “Everybody is rooting for us, and we wanted the ability to get out and say ‘we’re here, we’re doing things, and we’re excited about the future,’” said Stuart Rawling, Pelco’s Vice President, Market Strategy. “This is a time for people to come and see us who maybe haven’t seen us in a while.” By ISC West in the spring, Pelco expects to have a clear message of who they are and where they’re going, he says. Aligning needs of end user “We are excited about the work we are seeing internally,” which includes “aligning resources in the right way,” says Rawling. “The fruits of the labour are being seen internally now. We will be launching new products in the next eight months, although there will not be a defined moment in time when we say ‘this is it.’ It will just be happening. Next year will be an exciting time industry-wide, and product-wise, and Pelco will have a strong voice. Brendan and team have kept us extremely busy,” says Rawling, who also was part of Pelco in the “glory days” before the acquisition by Schneider Electric. We’re so optimistic, when you combine the people and the brand and what’s happening the market” “The work product has been so transformative mindset-wise for the employees. Everybody has had the opportunity to talk to the [new] owners about what type of company we are. We can set our own vision and get reenergised and get back to the core belief of what Pelco was and what it should be. We are the master of our own destiny, aligning needs of end user with the products we can deliver. We are putting the right processes in place that work for this market. It is an exciting prospect.” In the new era, Rawling expects to target marketing more toward end-users, because they have more influence on product selection than ever before, he says. End users often learn about new products online, so Pelco will be looking to target its marketing toward educating various vertical markets about available technologies and their use cases. “We’re so optimistic, when you combine the people and the brand and what’s happening the market,” says Hart. “We have to do the work. We’re excited about what we are seeing internally.”
Ethics is a particularly important subject in an industry such as fire and security because the result of unethical actions might make the difference in life and death. For example, if an employee acts unethically when servicing a fire extinguisher, the result could be to burn down the building. Although ethics is not a common topic of discussion in the fire and security industry, perhaps it should be. Chubb Fire and Security is a company that provides an example of how an emphasis on ethics can benefit a company, their employees, their customers and the whole world. Fire safety and security risks “The fire and security industry is different than others because lives and people’s safety are on the line,” says Harv Dulay, Director of Ethics and Compliance at Chubb Fire and Security. “Our purpose is to protect clients from fire safety and security risks. This is a business where no one should take short cuts. It is important to do the right thing all the time, every time, and it’s about protecting lives and property.” At Chubb, we have a code of ethics, our ‘bible,’ that is issued to employees when they start" “At Chubb, we have a code of ethics, our ‘bible,’ that is issued to employees when they start,” says Dulay. “Within the bible are core fundamental rules about what’s acceptable and not acceptable. We lay it out for employees very specifically. They understand and embrace the code of ethics, which is based on trust, integrity, respect, innovation and excellence.” “If you get those right, the business moves in the right direction. A key piece of our ethics policy is based on trust. We relate to others with openness, transparency, and empathy. It makes Chubb a better place to work and enables us to provide better service to customers.” Fire audit For Chubb, ethics is not just theoretical, but ethical concepts play out every day in practical ways. An example might be an engineer who goes to a customer’s site and is asked to do a task that is outside his or her duties and/or not allowed under the ethics policy. The pressure might be even greater if the employee is struggling to meet a sales figure. The code of ethics addresses specific situations and outlines the behaviour that is expected. In another example, a customer asked a Chubb technician to forge a certificate saying the customer had previously passed a fire audit in order to validate his previous year’s insurance. Showing ethical integrity, the technician was able to cite the company’s Code of Ethics and refuse to do it. The technician also reported the situation to his Ethics and Compliance Officer. Customers benefit, too. Delivering ethics excellence It’s a message heard from the top down, from everyone in the company" One of Chubb’s sales associates immediately reporting a situation in which all the tenders and competitors’ prices were visible as they prepared a tender for upload to a customer portal. Not only did the sales associate deliver ethics excellence by reporting the issue, he also helped a grateful customer who thereby avoided anti-trust issues, says Dulay. “Ethics is not just a current issue,” says Dulay. “It’s embedded in our values and has been since the beginning. Ethics is making sure people do the right things.” Ethics is integrated into the Chubb business model, and everyone knows what is expected of them. “It’s a message heard from the top down, from everyone in the company.” On-line training modules Ethics discussions begin for employees at Chubb when they join the company; clear instructions about ethics are included as part of employee induction. There are nine modules of ethics training during employee orientation, and a discussion with an Ethics and Compliance Officer is part of the onboarding process. The training program includes information about ethics, company expectations around ethics, where to go for questions about ethical issues, and details of the anonymous ombudsman program. Additionally, field staff are trained by their supervisors via regular face-to-face ethics toolbox talks. Office staff complete a series of on-line ethics training modules regularly. A series of supervisor-led trainings encourage managers to deliver face-to-face ethics training to their team, citing real-life examples. Healthy discussions are encouraged to deal with any ‘gray areas.’ Worldwide implementation of data security Some 14,000 employees globally have multiple options when it comes to reporting an issue Dulay estimates that ethics and compliance officers spend about half their time answering questions and clarifying for employees what’s expected in the code of ethics. Some 14,000 employees globally have multiple options when it comes to reporting an issue, and there are full-time Ethics and Compliances Officers in every country where Chubb does business. A reflection of Chubb’s global approach to compliance is their worldwide implementation of data security requirements of Europe’s General Data Protection Regulation (GDPR); the company saw the benefits of the program for any jurisdiction. Training and education are part of Chubb’s investment in ethics. For example, a recent module on ‘respect in the workplace’ covered the need to create a company culture in which everyone feels respected. “Training and continuous communication are embedded in the organisation,” says Dulay. Managing potential conflicts proactively “We invest in the process,” says Dulay. “We have had employees who left the company and then come back. They realised the importance of ethics and rejoined us. We start with the foundation that we would rather lose business than give up our ethical standards,” says Dulay. Some business is not worth getting if you don’t adhere to your values" “We won’t abandon our policies even if there is money at stake. Some business is not worth getting if you don’t adhere to your values. We manage potential conflicts proactively by creating and instituting methods in which employees have access to tools they can use to be successful and adaptable in times of change,” says Dulay. “Also, we will not tolerate retaliation against any employee who reports wrongdoing – regardless of the outcome of the investigation.” Forming good ethics behaviour And while there is no specific monetary value assigned to good ethical practices, success can be measured. “We measure it by people’s conduct, the number of cases we have, and awareness,” says Dulay. “It’s good for employee morale, and it’s good for customers and our business. It’s not measurable, but it is fundamental for business and customers.” “The work we do as a company can impact people’s lives so it is important that everyone has an understanding of the importance of their role,” says Dulay. A common misconception about ethics is: “If no one is watching, it must be ok.” However, Dulay says it is the things employees do when no one is watching or checking in on them that form good ethics behaviour. During training, Chubb emphasises that ethics is about doing the right thing, all the time even if no one is watching.
For the security market, the ‘fine ranging’ capabilities of ultra-wideband (UWB) technology opens up a range of new uses based on the ability to determine the relative position and distance of two UWB-equipped devices with pinpoint accuracy – within centimetres. UWB is more accurate and secure, even in challenging environments full of interference, compared to narrow band wireless technologies. UWB technology transmits a large amount of data over short distances using a small amount of energy. It will be used in seamless access control, location-based services, and device-to-device services across industries including smart homes, cities, retail services, and healthcare. Increasing the accuracy of ranging measurements UWB technology will support any application that benefits from knowing the precise location of a connected deviceUltra-wideband is a mature radio technology that transmits information spread over a large bandwidth, as described by the IEEE 802.154 standard. A new, enhanced amendment to the standard – IEEE 802.15.4z – focusses on improvements to existing modulations to increase the integrity and accuracy of ranging measurements. Moving forward, UWB technology will support any application that benefits from knowing the precise location or presence of a connected device or object. This reflects a move from data communication to secure sensing. New capabilities of UWB are largely unfamiliar to the market, but a new Consortium – the FiRa Consortium – has a mission to educate the market, provide use cases, and promote UWB technology. Delivering interoperability across devices “With a consortium, we can better deliver interoperability across devices, software, and chipsets,” says Ramesh Songukrishnasamy, Director and Treasurer of the FiRa Consortium, and SVP & CTO of HID Global. “This creates a frictionless experience for the user, which is vitally important with a new technology. People are more likely to adopt emerging technology when it runs smoothly without interruptions or errors.” The FiRa consortium is ensuring new use cases for fine ranging capabilities can thrive" An industry consortium can create a UWB ecosystem of interoperable technologies instead of individual companies launching products that consumers struggle to make work together, says Songukrishnasamy. “Simply, the FiRa consortium is ensuring new use cases for fine ranging capabilities can thrive.” Founding members of the FiRa consortium ASSA ABLOY and HID Global, pioneers in secure access and identity solutions, are founding members of the consortium. Their technology manages access to physical and digital places, things, and identities. Another founding consortium member, NXP Semiconductors, is a pioneer in secure connectivity solutions for embedded applications. Other founding members are Samsung, which creates top-of-the-line TVs, smartphones, wearables, and other connected devices; and the Bosch Group, a global supplier of technology and services that is at the forefront of IoT innovations. Sony Imaging Products & Solutions Inc., LitePoint and the Telecommunications Technology Association (TTA) are the first companies to join the newly formed organisation. Immune to radio frequency interference UWB is also immune to radio frequency interference, so it functions in high traffic settingsUWB introduces higher levels of accuracy in positioning capabilities and increased security for ranging data exchange compared to existing technologies. Fine ranging with UWB technology can localise devices and objects to 10 centimetres of accuracy with or without line of sight. UWB is also immune to radio frequency interference, so it functions in high traffic settings. These capabilities will enable a variety of use cases like secure, hands-free access control in hospitals, location-based services for ride sharing, and targeted marketing for retailers. FiRa will demonstrate UWB technology at upcoming trade shows. The FiRa Consortium aims to build on IEEE’s work with an interoperable high rate physical layer (HRP) standard, including defining an application layer that discovers UWB devices and services and configures them in an interoperable manner. The consortium also plans to develop service-specific protocols for multiple verticals and define necessary parameters for applications including physical access control, location-based services and device-to-device services. Promoting the adoption of UWB solutions As a consortium, FiRa is not just setting standards but actively championing use cases for UWB technology. Creating the consortium addresses the need to develop interoperability and implementation standards; brings key players together to create a rich UWB ecosystem; allows for the sharing of intellectual property; and promotes the adoption of UWB solutions. The FiRa Consortium is committed to educating and promoting new use cases" “Since UWB is a mature technology with new potential uses, there is a general lack of awareness of potential applications that take advantage of the technology,” says Songukrishnasamy. “The FiRa Consortium is committed to educating and promoting new use cases.” The FiRa name comes from Fine Ranging to highlight UWB technology’s use cases and distinction from older UWB technologies and solutions. Enhanced security in challenging environments Fine ranging powered by UWB can outperform other technologies in terms of accuracy, power consumption, robustness in wireless connectivity, and security, especially in challenging, high density environments. UWB previously served as a technology for high data rate communication and as such was in direct competition with Wi-Fi. Since then, UWB has undergone several transformations: UWB has evolved from an OFDM-based data communication to an impulse radio technology specified in IEEE 802.15.4a (2ns pulses with Time of Flight); and A security extension being specified in IEEE 802.15.4z (at PHY/MAC level) makes it a unique secure fine ranging technology. Moving from data communication to secure ranging allows ‘spatial context capability’ to be utilised by a variety of applications: seamless access control, location-based services, and device-to-device (peer-to-peer) services. Information is available at firaconsortium.org.
Case studies
H-Farm has a strong track record supporting innovation and creativity in European start-ups. The company focuses on skills development, new approaches to education and digital transformation. Its most recent transformation project involved an access control system — for its own offices. H-Farm needed a solution to streamline access management for lots of people at a growing portfolio of sites and buildings. H-Farm experiences rapid turnover of users, both because new businesses join regularly and because they organise up to 300 events every year. Battery-powered locks Any new locks would need to extend an existing Axis system, but without adding complexity for day-to-day administration. To meet their needs, H-Farm selected a combination of Aperio® handles, security locks and escutcheons, each easy to retrofit, so day-to-day work at their busy offices would not be disrupted by intrusive installation. So far, 40 Aperio® Online H100 wireless door handles, 6 Aperio® Online L100 wireless locks and 4 Aperio® Online E100 wireless escutcheons have been fitted across multiple H-Farm locations in northern Italy. All Aperio® battery-powered locks are wireless, so no ugly cabling runs to H-Farm’s doors. Because Aperio® offers wide range of battery-powered devices, H-Farm can choose the precise wireless lock for every application: the L100 lock protects doors with high security demands; robust H100 handles suit interior doors with high traffic. Wireless access control Aperio® H100 enables customers to add doors to their access control solution because cost per door is lower H-Farm interior doors are mostly secured with the new Aperio® H100 wireless handle — Intersec’s Access Control Product of the Year in 2018. The Aperio® H100 packs the flexibility and affordability of Aperio® wireless access control into a slim, cleverly designed door handle. Its standard battery slots inside the handle, ensuring a minimal footprint. ASSA ABLOY’s device design team incorporated electronics into the handle lever on the outside of the door, without jeopardising security. Design has become a major feature of the H100’s appeal. H-Farm wanted devices to blend with the contemporary architecture of their new €101m H-Campus development. “Aperio® wireless access control hardware is solid, nice looking and perfectly fits our environment — solving our access problem,” says Alberto Aldrigo at H-Farm. The H100 and other Aperio® devices are easy to install; for the H100, basically two screws complete the job. Going forward, this will enable H-Farm to quickly bring new buildings into the same access system as they expand to fresh locations. The H100 fits around 90% of target doors with two main models: one for left-handled doors, the other right-handed. “The Aperio® H100 also enables customers to add more doors to their access control solution because the cost per door is lower,” says Tania Amico, Aperio® Sales Manager at ASSA ABLOY Italy. Seamless integration H-Farm managers want to control access to site doors, or bring entirely new premises into their access system The open architecture underpinning Aperio® devices enabled easy online integration with their existing Axis system via PRYSM AppControl. Remote operation from a single, central software interface is seamless, which makes administering the system easy. “The PRYSM AppControl software utilizes the integration Axis completed with Aperio®,” says Piergianni Marana, Key Account Manager at Axis. “And the AXIS A1001 Door Controller is based on open hardware, which makes installing and configuring an Aperio® wireless lock easy and seamless.” An Aperio® RS-485 Hub coordinates up to 8 Aperio® locks within a typical range of 15 to 25 meters, communicating with the admin system via the powerful AXIS A1001 IP Network Controller. One AXIS A1001 Door Controller can manage one wired door and one Aperio® hub, up to 9 doors per hub. AES 128-bit encryption ensures communication between lock and system is secure. Online Aperio® integration gives facility managers real-time status information about their premises. Aperio® locks are wireless, so there was no expensive or time-consuming cabling. The AXIS A1001 uses Power over Ethernet (PoE), which eliminates the need for power cables to the controllers, too. If needs change at a facility — perhaps H-Farm managers want to control access to more site doors, or bring entirely new premises into their access system — it’s quick, efficient and easy for an installer to fit Aperio® locks and integrate the doors with the AXIS Entry Manager control panel. To discover whether your existing security system is ready for wireless Aperio® locks, download a free, fast Compatibility Checker at https://campaigns.assaabloyopeningsolutions.eu/aperio-upgrade
Traka has launched a new downloadable white paper to open a discussion on the changing nature of retail banking in the UK, using latest case examples to consider branch management and shifting customer expectations. The white paper, titled ‘Shaping the retail banking industry’ looks at several factors influencing the sector, including the increasing expectations and values of customers demanding a more personalised branch experience. Key and equipment management Incorporating analysis from globally renowned financial services, including PwC, Accenture and Deloitte, the paper highlights the opportunities for innovation, together with collaboration and adoption of new operational processes. This incorporates key and equipment management to enable retail banks to deliver on top quality service. The future for retail banking could arguably also be cited as bleak and in a state of industry disruption" Says Mike Hills, Traka UK Market Development Manager and Author of the white paper: “Against a backdrop of negative press concerning the state of UK high streets, the future for retail banking could arguably also be cited as bleak and in a state of industry disruption, as customers move towards a more mobile-connected lifestyle.” Staff and customer security “However, our research in putting together this white paper tells a different story. That actually, the sector has a real chance to embrace the changes occurring and entice their customers, meeting demands for personal service. We found that brands riding the storm are taking small yet significant steps to tailor their services and make operational differences that are proving key to their success.” The white paper focusses on Traka’s experience with Nationwide Building Society to demonstrate how supporting operational efficiency can benefit banking staff and ensure they can focus on serving their customers, without compromising on security. Retail Banking security Mike concluded, “We have brought this white paper together using the latest research and intrinsic market reports, together with case evidence on the future of the retail banking industry and the issues faced by the sector to ensure long term success.” “Within this, we wish to stimulate debate and encourage views and contributions from as many different voices as possible. We look forward to your opinion, experience or comment on this matter of growing importance so together, we can look to support and shape the future of retail banking.”
PerpetuityARC Training, part of the Linx International Group recently delivers a risk and crisis management workshop for Lafarge Egypt (part of the LafargeHolcim Group) in Cairo. The training provided senior managers from across the organisation with the knowledge and skills needed to manage resources during a crisis and operate within the organisation’s crisis management and compliance framework. The intensive programme was built collaboratively between PerpetuityARC Training and Lafarge Egypt and specifically tailored to its operating environment in the construction materials industry. Achieve successful resolution It was great to see them solving problems in a pressured, but safe environment" In a series of practical and theoretical exercises, Linx International Group Director, Angus Darroch-Warren, assessed and enhanced the ability and confidence of participants to apply their new skills to manage complex and evolving crisis scenarios, each requiring close collaboration between team members, in order to achieve a successful resolution. Security Director at Lafarge, Magdy Khorshid, stated: “The course was amazing, very practical and interesting to all and I received much positive feedback from all learners.” Angus commented: “The Lafarge teams engaged fully with the workshop scenarios. It was great to see them solving problems in a pressured, but safe environment, that allowed them to think through issues and respond using identified resources and procedures.” The workshop is the latest collaboration in a five year relationship between Lafarge Egypt and PerpetuityARC Training. During this time PerpetuityARC Training has delivered its security and risk related courses to employees and stakeholders in Egpyt and the UK.
Wintec (The Waikato Institute of Technology), established in 1924 is a major New Zealand Government-funded tertiary institution, which has three Hamilton campuses; a city site overlooking the central business district, Avalon campus on the northern outskirts of the city, and a horticultural campus at Hamilton Gardens. In addition, it has regional operations at Te Kuiti and Thames and also an office in Beijing. The Avalon campus, a ten-minute drive from the city, is home to specialist trades training facilities, a state-of the-art sport and exercise complex and custom designed facilities for the School of International Tourism, Hospitality and Events. The third Hamilton campus, the Horticultural Education Centre, is situated amidst the 58 hectares of Hamilton Gardens. On-line distance education Wintec’s programmes and qualifications are nationally and internationally recognised Wintec is one of the largest institutes of technology in New Zealand, and has more than 35,000 full-time and part-time students, more than 500 full and part time staff and eleven schools within its academic faculty. International enrolments exceed 1000 from 47 countries. A range of student services provide its domestic and international students with a high level of support so they enjoy a positive, safe and secure study experience. Wintec’s programmes and qualifications are nationally and internationally recognised and its degrees have equal status to those from universities. The degree programmes include Media Arts, Midwifery, Nursing, Occupational Therapy, Early Childhood Education, Business Studies, Engineering, Technology, Information Technology, and Sport and Exercise Science and a wide range of full and part time courses for those already in the workforce. Wintec is also recognised nationally in the delivery of on-line distance education for those unable to attend regular classes for reasons of geographical access or other constraints. Electronically controlled doors Wintec strives for a balance of unobtrusive yet robust control of site activity, essential for maintaining an open campus environment. Shane Goodall, Security Manager at Wintec, describes the approach to security as highly proactive and collaborative: “by focusing on preventing issues arising, we now have a minimal policing role and the crime resolution rate is high”. This environment is underpinned by Gallagher’s security system, a core access control, intruder alarms and integration platform. Wintec first installed the Gallagher system (formerly Cardax FT) in 1999 and has since migrated this legacy system to Gallagher’s latest security technology platform. Security for the entire organisation, including satellite sites, is managed and monitored centrally from Wintec’s single Gallagher security system. Since initial installation, Wintec’s Gallagher access control system has grown from 7 to 240 electronically controlled doors in 2009, with another 40 planned - testimony to the scalability and flexibility of the system. Network friendly system communications The organisation first installed 6 cameras in 2004 which has increased to 7 DVRs and 85 cameras Wintec has integrated its imaging system to the Gallagher system delivering a visual record which can be matched to the audit trail of events in Gallagher Command Centre software. The organisation first installed 6 cameras in 2004 which has increased to 7 DVRs and 85 cameras (both analogue and IP). Another compelling aspect of the system for Wintec is the scalability and TCP/IP network friendly system communications. As well as monitoring and controlling staff and student access, equipment including computers, TVs, printers, audio visual resources at Wintec are also monitored through the Gallagher system. The ‘Gallagher Hub’, a new computer laboratory offering comprehensive IT resources is open 24 hours. The Hub contains 125 workstations, and there are plans to extend that number. Active monitoring of equipment though the Gallagher system has significantly reduced theft. Students and staff have scheduled access to shared IT resources, classrooms and lecture theatres. Manage cardholder data ‘Cardholder Import’, an XML Interface, supports the importation of cardholder data including course enrolments from their student record system to Gallagher Command Centre. Shane comments, “Student card issuing is an automated process which is enrolment-driven – a student’s access privileges are assigned according to their enrolled courses.” “To implement this, we defined a rules-based allocation of access groups in the Gallagher system using the XML interface. The interface is ‘live’ so that changes in the student enrolments database are immediately reflected in the Gallagher system. The student’s updated access privileges come into effect without delay.” Staff that interact directly with students are now empowered to manage cardholder data enabling the security team to focus on security. Students and staff utilise Mifare SmartCard functionality extensively, embracing them as an integral multiapplication tool in their modern educational environment – SmartCards are used to issue resources from the library and as pre-stored value cards enabling prepaid printing and photocopying. In the near future they will also be used in Wintec’s Pay and Display car-park and potentially as passes onto city council buses. Electronic access control At Wintec, security is not viewed as a discrete functional activity relegated to security staff only Stewart Brougham, Director of Internationalisation at Wintec, says students have given very positive feedback about their ID cards. In particular, the ability to verify the identity of staff members from their ID access cards provides peace of mind for students. The end result is a people-friendly campus. Future enhancements of Wintec’s security may include the utilisation of the CommCard solution from Gallagher to manage and monitor access to student accommodation. CommCard is a unique high level integration between the Gallagher Command Centre software and Salto off-line readers, delivering offline, non-monitored electronic access control for lower security doors. An overriding philosophy of collaboration has seen Wintec take a lateral approach to security, the value of which many organisations have yet to realise. At Wintec, security is not viewed as a discrete functional activity relegated to security staff only. The ongoing management of security is a joint effort between the security services team and the information services team. Increasing operational security The security services team manages the Gallagher system while IT looks after back end functions such as installation on the network and backup. Wintec has leveraged the convergence of security (access control) and other operational business functions recognising the tremendous potential for reducing risk and increasing operational security, safety, performance and efficiency. Looking beyond simply controlling and monitoring who goes where and when on site, Wintec is harnessing the reporting capabilities of Gallagher Command Centre to meet regulatory requirements. The Gallagher system enables the institution to report on actual space utilisation (not just space booking). Decisions are made for best use, and also to substantiate funding, based on these reports. “The key to space utilisation reporting are the frequency of reporting and the integrity and reliability of information,” states Stewart Brougham. It’s a national issue for educational institutes in New Zealand. Extending external partnerships “For Wintec, reporting is about ensuring compliance with regulatory requirements and is also a staff time management issue – reducing the administration load on lecturers, who would otherwise have to track student attendance manually.” Brian Fleming, Director of Gallagher Channel Partner, Concord Technologies, sites this lateral application of a security system as key to maximising the value of Gallagher to Wintec. Wintec has a strong relationship with Gallagher in the ongoing development of its technologies This collaborative philosophy extends to proactive external partnerships with their Gallagher Channel Partner, Concord Technologies, for the installation and maintenance of the Gallagher system, and with system designer and manufacturer, Gallagher. Having signed an agreement to continue in the capacity of a Gallagher field test site, Wintec has a strong relationship with Gallagher in the ongoing development of its technologies. Wintec’s success, in the last 5 years, as a test site reflects the competence of both its IT and security staff and the institute’s commitment to edge student services. Minimal training has been required. Software maintenance agreement There is open communication and information sharing between all internal and external parties involved, which means any issues that arise can be quickly addressed. Wintec has committed to a site maintenance plan with their security partner, Concord Technologies. The plan incorporates both software and hardware maintenance to ensure the system is maintained on the latest operating platforms within a known cost structure. A Software Maintenance Agreement also ensures enhanced ongoing system performance and reliability of the Gallagher system. Acknowledgements Gallagher would like to acknowledge the support of Wintec and security partner, Concord, with the development of this in-site study. Gallagher would also like to particularly acknowledge and thank Shane Goodall for the pivotal role he plays in championing the collaboration of these parties and for his outstanding support of the Northern Region Cardax User Group (NZ) in the capacity of Chairman of the group.
Located in the buzzing heart of England’s capital city, University College London is one of the top ranking establishments for higher education in the world. Founded in 1826, London’s first university institution, the College now has an estimated 28,600 enrolled students and 14,600 members of staff. Including agency staff, academic associates, and other visitors, UCL currently has a system of over 48,000 valid cardholders. Based primarily in the Bloomsbury area, UCL’s main campus is situated on Gower Street and includes departments such as biology, chemistry, economics, engineering, geography, history, languages, mathematics, philosophy, politics, physics, architecture and the Slade School of Fine Art, as well as the preclinical facilities of the UCL Medical School and the London Centre for Nanotechnology. Electronic access control UCL has been used as a location for a number of high profile film and television productions While the UCL Cancer Institute and Faculty of Laws are also nearby, notable College buildings include the original Wilkins Building and Gower Street’s Cruciform Building, previously home to University College Hospital. The University has further sites based elsewhere in and around London, such as the UCL Institute of Ophthalmology, the UCL Institute of Orthopaedics and Musculoskeletal Science, The Royal Free Hospital Medical School, and also the UK’s largest university-based space research group, the Mullard Space Science Laboratory, and UCL’s own astronomical observatory at Mill Hill. Due to its position within London and the historical nature of its buildings, UCL has been used as a location for a number of high profile film and television productions, including Gladiator, The Mummy Returns, The Dark Knight and Inception. The sheer scale of the University’s operations, with thousands of occupants fluctuating between its numerous facilities, has dictated the need for a comprehensive electronic access control security system – one which has evolved over many years. Physical locking controls UCL’s Security Systems Manager, Mike Dawe explains that while adhering to the University’s culture of ‘general openness’ on campus, Gallagher systems have been introduced as “a progressive response to the need for more security control on site.” Security throughout the University is managed by the Security Department of the Estates Division, which has responsibility for all the physical locking controls and electronic systems, as well as the provision of the security guarding service. By and large an open campus, a number of university buildings are free to visitors from the general public, while others are controlled by turnstiles accessible by valid cardholders only. Many other research areas are available only to those with specific security passes. Gallagher’s systems have been in place with the University since 1993 and were originally chosen for the Gallagher Commander Hardware’s ability to communicate effectively over long distances between buildings. Key industry challenges Following were the key industry challenges involved: Ensuring appropriate access to students/staff onsite Implementation of lockdown and evacuation procedures Controlling access to key University areas Protecting University property Providing unobtrusive but robust security Control and management of multiple systems Visitor time and access management Central records systems Full data integration was achieved in 2006 when the system was linked to UCL’s central HR Recognised by Mike as the ‘next important direction for the University’, the subsequent introduction of the Gallagher Access Control system (formally Cardax FT) in 2003 enabled Gallagher’s main security system to be integrated with UCL’s other data systems. Additionally, Mike highlights how “Gallagher’s ‘building blocks’ approach to programming the software also provided greater flexibility when using the system, while the network infrastructure enabled us to move away from our own discrete wiring.” Full data integration was achieved in 2006 when the system was linked to UCL’s central HR, student records and visitor records databases. Combining the regular ID card with a single access control card then followed, and validity is kept fully updated by the University’s central records systems. Currently the University has 101 buildings on the Gallagher system, which controls 939 doors, 32 turnstiles and 15 lifts. General perimeter control Typically, Gallagher security is used for the general perimeter control of the buildings, such as those with both turnstile access and a reception at the entrance, as well as additional control within College buildings to divide public and semi-public areas from departmental spaces. Gallagher systems also control UCL’s top security areas such as high risk research space and data centres. Describing UCL’s security operation, Mike explains how the Gallagher solution has been integrated with the inhouse HR, student and visitor records systems and filters duplications to ensure a single identity. This information is then fed through the Gallagher system to update cardholder records using an ‘import/export’ function. The Gallagher technology is also used to automatically send barcode information to the Library systems and update the student records system with student photos. Scheduled email notification reports are also sent regularly which, according to Mike, “has proved very useful for UCL’s high value areas.” Security operations team We routinely use reports and produce these in response to departmental concerns and requests" “We routinely use reports and produce these in response to departmental concerns and requests”, he explains. “Typically this is done by the security operations team, which analyses the information, along with CCTV data to investigate suspected crimes.” UCL is planning to integrate the Gallagher Security system with its existing CCTV system and will use this, in addition to the new Command Centre Premier client, to improve the provision of site information to the Security Control room staff. The University is also currently developing its import/ export process to automatically provide access levels based on person-type information, such as department, course etc. Gallagher would like to thank Mike Dawe, UCL’s Security Systems Manager, for his support with the production of this site profile. We would also like to acknowledge the support of our security partner, Reach Active Limited who has contributed significantly to the successful implementation of the Gallagher system at University College London.
After a period of decline, the number of pupils being expelled from mainstream schools is increasing, placing more pressure on the need for Pupil Referral Units and the security at these premises, which is vital for managing student and staff safety. ASSA ABLOY High Security & Safety Group offers a range of locks and doors suited to the sensitive needs of Pupil Referral Units and pupils in care. Fire resistance integrity All doorsets in the Secure Education range are independently tested and certified The breadth of doorset solutions means the High Security & Safety Group can specify products for every area and need of a secure education environment. From classroom doors and personnel doors to circulation doors and high-performance doors. All doorsets in the Secure Education range are independently tested and certified to achieve 60minute fire resistance integrity and insulation to BS EN 1634 from both sides of the door. In addition, all doors within the offering are tested in line with the Department of Health’s environmental design guide attack test for secure services, as well as meeting with DD171 & BS EN 1192 severe duty performance and strength, and are tested to PAS 24 enhanced security performance requirements. Secure educational facilities This guaranteed and certified level of performance gives building owners and users the peace of mind that all doorsets are fit for purpose, as well as providing the added level of security and safety often needed in secure educational facilities. Mike Dunn, Commercial Director for ASSA ABLOY High Security & Safety Group, said: “A recent report by the think tank IPPR, found the total number of children being taught in ‘alternative provision’ for excluded children is far higher than the total number of reported exclusions. This will inevitably mean increasing pressure on facilities, such as Pupil Referral Units, and the safety of staff and pupils within those buildings.” Added level of security Pupil Referral Units are first and foremost a place of education" “Pupil Referral Units are first and foremost a place of education and therefore doors and locks must allow for this, grant access, as well as restricting permissions. However, an added level of security and safety must be considered and handled sensitively within these premises.” “Our experience and wide product range means we can advise on and supply doors and locks for every aspect of a secure education environment, mitigating any risk and ensuring a smooth specification process.” Doors within the Secure Education range come in a variety of materials and finishes, giving specifiers improved design flexibility.


Products
Round table discussion
Technology advancements often come with new terms and definitions. The language of our marketplace evolves to include new words that describe innovations in the industry. In the skilled hands of marketers, terms intended to be descriptive can also take a new element of ‘buzz,’ often presaging exciting developments that will drive the future. We asked this week’s Expert Panel Roundtable: What new buzzword have you heard, and what does it mean for the industry?
ISC West 2019 is in the industry’s rear-view mirror, and what a show it was! The busy three days in April offered a preview of exciting technologies and industry trends for the coming year. We asked this week’s Expert Panel Roundtable: What was the big news at ISC West 2019?
The new year 2019 is brimming with possibilities for the physical security industry, but will those possibilities prove to be good news or bad news for our market? Inevitably, it will be a combination of good and bad, but how much good and how bad? We wanted to check the temperature of the industry as it relates to expectations for the new year, so we asked this week’s Expert Panel Roundtable: How optimistic is your outlook for the physical security industry in 2019? Why?