Advanced video projects delivered by SECOM, Johnson Controls and ISD Tech have been recognised at IFSEC with a special award event on the IDIS stand. Over the last 12 months, large-scale implementations and high definition IP system upgrades, harnessing the latest IDIS technology, have given enhanced video capability at NHS facilities, fashion chains, coffee shops, variety stores, and market leaders in the eating-out sector. Each year, IDIS invites VIP guests to recognise outstanding achieveme...
Comelit’s Gold Partner, Door Entry Direct, has seen record attendance and received significant on-the-day sales at its most recent installer open day, showcasing the latest app-based door entry and facial recognition technology. The dedicated open day saw over 50 people attend in just four hours. It was an exclusive opportunity for the leading distributor of audio and video door entry systems to display Comelit’s stylish new security systems, including its stylish Visto video doorbe...
Security video wall and visual display solutions experts Ultimate Visual Solutions (UVS) works on projects in 15 countries around the world since its launch nine months ago. UVS changed its name from eyevis UK last September following the acquisition of eyevis GmbH by the Leyard group. Providing turnkey solutions The rebranding has allowed the company to offer an expanded range of products and services The rebranding has allowed the company to offer an expanded range of products and services...
The winning products and services of the 2019 Innovation Awards were revealed at ESX 2019 on June 4 in Indianapolis. Each year, the ESX Innovation Awards programme recognises outstanding products and services that drive the electronic security and life safety industry forward. This year’s winners continue that legacy with novel innovations and improvements. To determine the best of the best, judges selected winners from a pool of applications from manufacturers and service providers serv...
Forescout Technologies, Inc., the pioneer in device visibility and control, announced insights from 75 real healthcare deployments with more than 10,000 virtual local area networks (VLANs) and 1.5 million devices contained within the Forescout Device Cloud, with a specific focus on 1,500 medical VLANs with more than 430,000 devices. Launched in July 2017, the Forescout Device Cloud is one of the world’s largest crowdsourced device repositories and now contains more than eight million devi...
ProdataKey (PDK), an innovator of cloud-based networked and wireless access control products and services, will host the second annual Cloud Access Summit on June 13, 2019 in Salt Lake City, UT. This exclusive event for dealers, integrators and security professionals offers a day packed with educational sessions focusing on the hottest industry trends and topics related to cloud access and its many complementary technologies, presented by executives and thought leaders representing a cross-sect...
Shepherd Lock, a new keyless smart lock for the home, launched on Kickstarter. Shepherd Lock uses the same technology found in the automotive industry and is the first smart lock that detects lock-picking attempts to protect homes against burglaries. Shepherd Lock is equipped with a keyless entry system, making it convenient to enter the home. The lock’s automotive grade touch™ technology allows users to unlock their door with just a touch. Shepherd Lock also transforms existing lock hardware into a smart sensor that uses artificial intelligence to identify and notify the homeowner of any threat. Intelligent authentication zone “My team and I come from the automotive industry, where we designed keyless entry systems for cars,” said Kabir Maiga, the founder of PassiveBolt Inc., the makers of Shepherd Lock. “Shepherd Lock brings the same true and tested automotive touch technology to people’s homes.” Shepherd Lock creates the smartest door on the market with its Intelligent Door Status™ and Intelligent Authentication Zone™. A Wi-Fi bridge enables the homeowner to control and monitor the lock remotely A Wi-Fi bridge enables the homeowner to control and monitor the lock remotely. Once the bridge is plugged into the wall, it can be paired with the lock using the mobile app. On the app, homeowners can use the lock’s Intelligent Door Status™ technology to check whether their door is open, closed or locked with ease. Similar to automotive keyless entry systems, the Shepherd Lock will only unlock if the user has a keyfob or smartphone key within the Intelligent Authentication Zone™. Single cylinder deadbolt The homeowner can also use the mobile app to manage access to their home. Temporary or permanent encrypted keys can be shared with family members or friends, and homeowners can schedule access time windows to allow people to enter the home. Installation of Shepherd Lock is simple as there is no drilling required. Shepherd Lock is compatible with any single cylinder deadbolt. Keeping the exterior hardware in place, remove the thumb-turn, install the mounting bracket, screw in the module and snap on the magnetic cover. Shepard Lock retrofits the existing hardware, so the homeowner will not need a new set of keys. Powered with four AA batteries, homeowners will never have to worry during storms or power outages that their homes are unsecure.
DHF has announced the launch of its Best Practice Guide entitled: How to obtain Key Copy Protection: security and protection advice regarding copying of keys which offers information on minimising the risk of a security breach by preventing the unauthorised copying of keys. To copy a key, it is necessary to obtain a suitable key “blank” onto which the individual key code can be copied. Many generic key blanks are readily available to UK locksmiths and key cutters, making obtaining key copies convenient, but a risk to security. Preventing unauthorised copying of keys An effective way of achieving this is where the lock manufacturer restricts the availability of suitable key blanksFor some installations, that risk is unacceptable, and there is a need to prevent the unauthorised copying of keys. An effective way of achieving this is where the lock manufacturer restricts the availability of suitable key blanks. This, of course, is only possible if the lock manufacturer can prevent anyone else supplying the blanks without his or her permission. The objective of DHF’s Best Practice Guide is to clarify this complicated area of law to enable claims about security and protection against unauthorised copying to be appropriately evaluated. Using patented lock and key mechanism “There is a definite misunderstanding in the marketplace about the most effective way to provide protection for a key,” explains DHF’s CEO, Bob Perry. “It is important to understand that this level of key control cannot be offered through key copyright, or design registration and, in fact, the most effective way manufacturers can restrict the availability of key blanks is by using a lock and key mechanism that is patented (cylinder and lock together). “DHF’s new Best Practice Guide offers concise and comprehensive direction on how to achieve key copy protection,” concludes Bob. “Ultimately, it is the manufacturer who must have control and the ability to restrict the distribution of key blanks to ensure that the possibility of a security breach is properly managed.”
Security 101, one of the nation’s fastest growing security integrators, continues to expand nationally with the addition of a new office in the San Francisco Bay Area. The office will serve San Francisco and the surrounding metropolitan area, and will engineer, install, operate, monitor, manage and maintain integrated security solutions for local small, midmarket and enterprise business customers. Local tech companies Veteran entrepreneur Rob Chamberlin is the latest franchise owner to join the team at Security 101. Over the past 15 years Chamberlin has founded and operated two successful technology companies – starting True Wireless in 2004 and DataXoom in 2012. He helped build True Wireless into one of the nation’s largest value-added wireless resellers in the U.S. Chamberlin has also advised local tech companies on marketing, PR and business development The company appeared on the San Francisco Business Times ‘Top 100 Fastest Growing Private Companies’ list and the Inc. 5000. He continues to serve on the board of directors for DataXoom, a mobile virtual network operator. In addition to operating his businesses, Chamberlin has also advised local tech companies on marketing, PR and business development. Fast-paced market “I believe we are off to an excellent start with a winning combination here in the Bay Area,” said Chamberlin. “I am very familiar with the ins and outs of the local business climate, and Security 101 corporate has shown us that they have the technology know-how and operational support to help make this office a huge success.” Security 101 has been interested in opening an office in the San Francisco Bay Area for some time now, according to Steve Crespo, Security 101 chief executive officer. “It’s undisputedly the tech capital of the world and our corporate skill set fits that fast-paced market perfectly,” he said. “We have been looking for the right person to lead our efforts in the Bay Area, and we believe we have found that person in Rob.”
Synectics commences the roll-out of Synergy 3 2019, the latest release of its command and control platform for demanding surveillance and security environments. Introducing enhanced customisable mapping, camera management, and third-party integration capabilities, the feature-rich platform is the most customer-centric iteration of the software to date and aims to make the Synergy 3 experience more user-friendly. The new release will be available across Synectics’ key markets, spanning transportation, infrastructure, oil and gas, high security, public space, and gaming. Automatic camera plotting Speaking about the latest developments, Martyn Rowe, Head of Product Management at Synectics, said: “We wanted this release of Synergy 3 to offer practical innovations that customers will truly benefit from in terms of how they work and their security challenges.” We wanted this release of Synergy 3 to offer practical innovations that customers will truly benefit from" “For example, to complement existing GIS mapping capabilities, we’ve introduced advanced CAD mapping that enables customers to upload and seamlessly navigate their own maps of property and asset layouts. Functionalities such as automatic camera plotting in Synergy 3 ensure that any layout changes (for example, to gaming tables or slot machines) don’t require lengthy re-programming of cameras. This has a positive impact for the customer’s on-premise resources, particularly where sites have hundreds or even thousands of cameras.” Monitoring live footage Camera-related developments in the 2019 release also enable footage to be viewed in more intuitive ways. The de-warping functionality within Synergy 3 has been enhanced to provide an undistorted view of fisheye cameras, offering the ability to monitor live footage from multiple angles of the same camera for wide-area situational awareness. Furthermore, Synergy 3 now supports H.265 compression for all IP cameras compliant with ONVIF Profile S. Martyn continued: “Synectics has a strong reputation for offering end-to-end solutions tailored to specific needs. We can’t make that claim if we don’t give our customers the freedom to choose and use systems and devices that meet their unique requirements. Developments such as H.265 compression, new third-party system integrations, and a Software Development Kit (SDK) to help technology partners write integrations to Synergy 3, reflect this and our commitment to future-proofing our solutions.” Facilitating situational awareness Other capabilities strongly associated with Synergy 3 since it first launched in 2014 are its incident management and response features. Synergy 3 2019 builds on these proven capabilities, with further improvements to facilitate situational awareness and incident management under pressure. Clip mode ensures that any footage viewed is automatically imported to a clip basket Two notable developments in this respect are the introduction of quad view automation and the new clip mode functionality. The former refers to tailorable alerts that, if specific criteria are met, trigger quad layouts ‒ allowing the simultaneous tracking of live action and investigation of recorded footage. Clip mode ensures that any footage viewed is automatically imported to a clip basket, for quick and easy transfer to the incident locker if verified as pertinent. Intelligently automate processes Martyn added: “At Synectics, we place great importance on being able to intelligently automate processes for those in charge of securing and operating facilities in the demanding sectors we serve. Whether it’s to improve conditions for keeping on top of incidents, help users get the most out of the powerful capabilities at their disposal, or simply save busy surveillance teams precious time, we are always looking at how we can better support our customers.” “While these developments in Synergy 3 2019 differ in function, they share a common thread. They have all been undertaken with an understanding of the pressures our customers face – one fostered through close working partnerships and real-world sector experience.”
Suprema, a provider of biometrics and security technologies, announces that it has integrated its latest BioStar 2 solution into Nedap's access control system, AEOS. This will enable organisations around the world to use Suprema's incredibly accurate fingerprint recognition technology in combination with AEOS. Ruben Brinkman, alliance manager at Nedap explains: “There's a growing global demand for smarter, more secure ways of identifying people. Biometric technology is pushing the limits in this arena, consolidating increased security with unparalleled convenience. We're fully embracing these developments and view the Biostar integration as a valuable extension to our proposition. We're very excited to welcome Suprema to our ecosystem of technology partners and are looking forward to future developments.” Best biometric security Suprema achieved this integration by using Nedap's Bio-API, which was specifically developed to enable biometric manufacturers to integrate their solutions into AEOS. Suprema will provide users with the best biometric security available in the market" “The integration of Suprema BioStar 2 with Nedap's AEOS is an ideal combination of best-of-breed solutions in access control and biometrics. To maximise the benefits of Nedap's access control solution, Suprema will provide users with the best biometric security available in the market,” said Hanchul Kim, global sales director at Suprema. The integration is so seamless that there's no need for operators to switch from screen to screen - they can continue working in AEOS to manage finger enrolment and biometric identities. Provide strong encryption The biometric profiles are stored in BioStar and are constantly synchronised with AEOS; an information exchange safeguarded through SSL certificates, which provide strong encryption. Both Nedap's and Suprema's clients deal with an exceptional variety of security requirements. “This can make project implementation complex in nature,” Ruben Brinkman remarks. He continues: “So the primary goal for this integration has always been to provide a truly flexible and scalable solution that's easy to implement and maintain. It's been well received by the market, with the first projects already in the pipeline.” Both Nedap and Suprema are strongly committed to maintaining this integration, ensuring future backward compatibility and adding new functionalities along the way.
Paxton has trained more than 3,500 installers across the world already this year, enabling more people than ever to use Paxton products. Over 1,300 of those installers were in the United States from more than 700 companies. This is an increase on last year’s numbers and means the company is well on the way to meeting its ambitious target of training 10,000 installers worldwide in 2019. Paxton are confident they will reach this target, which would represent a 14% increase from 2018 - itself a record year which saw over 3,000 dealers trained in the United States alone. Increased sales in the USPaxton’s training numbers and product sales in the United States continue to grow year-on-year Paxton’s training numbers and product sales in the United States continue to grow year on year prompting some recent additions to the U.S. team, particularly in their training and sales departments. Steve Woodbridge, Global Training Manager at Paxton, said: “We’re excited that record numbers of installers in North America are now able to install Paxton products to high standards. Training allows installers and dealers to get to know Paxton’s systems and keep up to date with our latest product releases, which benefits both them and us.” Paxton free dealer training “We know that 9 out of 10 trained installers go on to regularly commission Paxton products*. This validates our belief that trained installers are confident fitting our products and will choose them again and again for their customers. We can also be confident our products are being installed to high standards, which is key to an end-user’s experience.” Paxton has been offering free dealer training in the U.S. since 2017. Workshops are held at Paxton offices, as well as out in the field. With new products released regularly, the program is constantly evolving. Steve said: “We have ambitions to expand our international footprint even further, which is why we’re striving to achieve the 10,000 dealers trained milestone this year. We’re encouraged by such a strong first half of the year and would like to thank those dealers and installers who’ve joined us so far.” Training feedback from US installers: ‘Fun, exciting and presented very well’ ‘Best training in 10 years in the industry’ ‘Good insight into the software and how flexible the system is’ ‘Excellent training. Very hands-on, brilliant course’ Training in numbers – 2018 It was the second year Paxton had a dedicated U.S. training team, resulting in more than 3,300 installers being trained from 1751 companies – an increase of 68% on 2017
The healthcare sector is a crucial part of a functioning society as it provides life-saving care and reassurance to the population. A key part of ensuring the professionals in this industry have the best work environment is the ongoing security of the facilities. Overcoming environmental challenges Hospitals are challenging environments for security integrators. There is little room for mistakes because staff, patients and assets cannot be compromised. Medical centres and their facilities can be vast complexes and security teams must be confident in their ability to identify and nullify threats as soon as possible. Chubb provided Queensland Children’s Hospital's security team with a simple and easy-to-use tool Chubb Fire & Security offers a range of intelligent video and access control systems to solve these challenges. The Queensland Children’s Hospital in Australia, formerly named Lady Cilento Children’s Hospital, is the major specialist children’s hospital for families living in Queensland and Northern New South Wales. The facility not only provides care to the local families but also the state’s sickest and most critically injured children who need highly specialised care. This state-of-the-art hospital, coupled with a leading academic and research facility and the high calibre staff, provides a platform to continue to develop as a leader in paediatric health care, education and research. Comprehensive security solution Chubb developed a solution for Queensland Children’s Hospital that included access control, video management, communications and asset tracking. By creating a common infrastructure for all security systems managed through a comprehensive user interface, Chubb provided the hospital’s security team with a simple and easy-to-use tool that enables them to resolve situations as they happen and action events automatically on command. Chubb also developed a 3D model of the building that allows the security team to respond quickly to a wide variety of events. The protection of patients and staff is naturally a hospital's number one priority Also crucial to the implementation of security systems in a hospital is minimal disruption to its everyday operations. Professionals in hospitals are working 24/7 so there is little time when it comes to disabling security systems for maintenance or repairs. Continued maintenance and upgrades are vital elements to Chubb’s work and key to this is a great deal of collaboration with clinical and operational stakeholders. Securing mission-critical environment Hospital facilities are not always state-of-the-art and often face the slow upgrade process that a limited budget imparts. However, through the audit and update of security systems, steps can be taken to ensure continued operations without external disruption. The protection of patients and staff is naturally a hospital's number one priority and Chubb shares the same commitment to making sure the environment is safe and secure. Carrying out a technically demanding project in a large, mission-critical environment like a hospital takes strong teamwork, including expert strategic partners, and collaboration between stakeholders.
In 2017, IoT-based cyberattacks increased by 600%. As the industry moves towards the mass adoption of interconnected physical security devices, end users have found a plethora of advantages, broadening the scope of traditional video surveillance solutions beyond simple safety measures. Thanks in part to these recent advancements, our physical solutions are at a higher risk than ever before. With today’s ever evolving digital landscape and the increasing complexity of physical and cyber-attacks, it’s imperative to take specific precautions to combat these threats. Video surveillance systems Cybersecurity is not usually the first concern to come to mind When you think of a video surveillance system, cybersecurity is not usually the first concern to come to mind, since digital threats are usually thought of as separate from physical security. Unfortunately, these two are becoming increasingly intertwined as intruders continue to use inventive methods in order to access an organisation's assets. Hacks and data breaches are among the top cyber concerns, but many overlook the fact that weak cybersecurity practices can lead to physical danger as well. Organisations that deploy video surveillance devices paired with advanced analytics programs often leave themselves vulnerable to a breach without even realising it. While they may be intelligent, IoT devices are soft targets that cybercriminals and hackers can easily exploit, crippling a physical security system from the inside out. Physical security manufacturers Whether looking to simply gain access to internal data, or paralyse a system prior to a physical attack, allowing hackers easy access to surveillance systems can only end poorly. In order to stay competitive, manufacturers within the security industry are trading in their traditional analogue technology and moving towards interconnected devices. Due to this, security can no longer be solely focused on the physical elements and end users have taken note. The first step towards more secured solutions starts with physical security manufacturers choosing to make cybersecurity a priority for all products, from endpoint to edge and beyond. Gone are the days of end users underestimating the importance of reliability within their solutions. Manufacturers that choose to invest time and research into the development of cyber-hardening will be ahead of the curve and an asset to all. Wireless communication systems Integrators also become complicit in any issues that may arise in the future Aside from simply making the commitment to improve cyber hygiene, there are solid steps that manufacturers can take. One simple action is incorporating tools and features into devices that allow end users to more easily configure their cyber protection settings. Similarly, working with a third party to perform penetration testing on products can help to ensure the backend security of IoT devices. This gives customers peace of mind and manufacturers a competitive edge. While deficient cybersecurity standards can reflect poorly on manufacturers by installing vulnerable devices on a network, integrators also become complicit in any issues that may arise in the future. Just last year, ADT was forced to settle a $16 million class action lawsuit when the company installed an unencrypted wireless communication system that rendered an organisation open to hacks. Cybersecurity services In addition, we’ve all heard of the bans, taxes and tariffs the U.S. government has recently put on certain manufacturers, depending on their country of origin and cybersecurity practices. Lawsuits aside, employing proper cybersecurity standards can give integrators a competitive advantage. With the proliferation of hacks, malware, and ransomware, integrators that can ease their client's cyber-woes are already a step ahead. By choosing to work with cybersecurity-focused manufacturers who provide clients with vulnerability testing and educate end users on best practices, integrators can not only thrive but find new sources of RMR. Education, collaboration and participation are three pillars when tackling cybersecurity from all angles. For dealers and integrators who have yet to add cybersecurity services to their business portfolios, scouting out a strategic IT partner could be the answer. Unlocking countless opportunities Becoming educated on the topic of cybersecurity and its importance for an organisation is the first step Physical security integrators who feel uncomfortable diving headfirst into the digital realm may find that strategically aligning themselves with an IT or cyber firm will unlock countless opportunities. By opening the door to a partnership with an IT-focused firm, integrators receive the benefit of cybersecurity insight on future projects and a new source of RMR through continued consulting with current customers. In exchange, the IT firm gains a new source of clients in an industry otherwise untapped. This is a win for all those involved. While manufacturers, dealers and integrators play a large part in the cybersecurity of physical systems, end users also play a crucial role. Becoming educated on the topic of cybersecurity and its importance for an organisation is the first step. Commonplace cybersecurity standards Below is a list of commonplace cybersecurity standards that all organisations should work to implement for the protection of their own video surveillance solutions: Always keep camera firmware up to date for the latest cyber protections. Change default passwords, especially those of admins, to keep the system locked to outside users. Create different user groups with separate rights to ensure all users have only the permissions they need. Set an encryption key for surveillance recordings to safeguard footage against intruders and prevent hackers from accessing a system through a backdoor. Enable notifications, whether for error codes or storage failures, to keep up to date with all systems happenings. Create/configure an OpenVPN connection for secured remote access. Check the web server log on a regular basis to see who is accessing the system. Ensure that web crawling is forbidden to prevent images or data found on your device from being made searchable. Avoid exposing devices to the internet unless strictly necessary to reduce the risk of attacks.
There’s no question that the popularity of Do-It-Yourself (DIY) security and home automation products is on the rise. The reasons for the growth in DIY sales are numerous, including increased awareness of home automation products, fast set-up, limited (if any) installation costs, and interoperability with other smart security products. In fact, with the parallel rise of smart home hubs like Alexa and Google Home, many people are opting to attempt the set-up of smart home devices without any professional assistance. According to a 2018 Residential Security Market Report prepared by Parks Associates and Security Sales & Integration magazine, “More than 60% of installing dealers now report that DIY systems are biting into demand for their services.” But the rise in DIY is not entirely bad news for security and home automation installers and dealers. There are a number of ways to view this glass as half-full. Let’s look at a few of them. Increase in revenue for dealers With their lower cost and perceived ease of installation, DIY products have broken down barriers for additional purchaseThere are reasons for dealers and installers to be cheerful about the rise of DIY. For one thing, according to that same Residential Security Market Report from Parks Associates, residential security dealers are doing quite well. The report states, “In 2017, revenues were up an average 7.72% for security dealers.” What about installations? The report goes on to say, “For 2017, the average number of installs per dealer was 22 per month, compared to 17 per month in 2016.” So, revenues are up for security dealers, and at least part of the reason can be attributed to the fact that DIY products can raise overall awareness of and spur interest in other home automation and security products. With their lower cost and perceived ease of installation, DIY products have actually broken down barriers for the additional purchase, and installation, of complete, professionally installed systems. Wireless, connected smart locks For example, the sale of wireless, connected smart locks (viewed by some consumers as DIY) can lead to opportunities for further home automation product sales and professional installations. Connected smart locks can actually act as an extension of a smart hub or controller. They can be used to wirelessly communicate with and control all the devices that make up a home automation system, including lighting, entertainment, thermostats, air, alarms, shades and more. With their lower cost and perceived ease of installation, DIY products have actually broken down barriers for new security installations And they can do all this from a prime, convenient location – the front door, as well as other points of entry like the side or back doors. Plus, smart lock conversion kits like Kwikset Convert let homeowners easily bring home automation capabilities to their door without altering the aesthetics of the entry. Connected smart locks can allow homeowners to set up their home with custom scenarios, right before they step inside. For example, residents can program their lock so that every time they unlock the door, a foyer light goes on, temperatures begin to rise to a set level – even connected coffee makers can begin to make a cup. Portfolio of home automation products One of the best ways to mitigate the ‘threat’ of DIY sales is for dealers and installers to become more versatileSmart locks are just one example of the potential of DIY products to spark a homeowner’s interest in a wide range of other home automation devices, many of which would benefit from professional installation. One of the best ways to mitigate the ‘threat’ of DIY sales is for dealers and installers to become more versatile and offer a complete portfolio of home automation products. The larger the home automation offering, the more devices there are to sell and install, the larger the installation required, the greater the need for professional installation. Many homeowners who feel like they have a certain level of handiness will start by trying to do it themselves with a DIY product. But things don’t always go as planned, especially if they are attempting to set up a robust home automation system. First off, just because a product is DIY doesn’t mean that the old products that are being replaced are going to easily make way for the new. A DIY thermostat or smart lock might require that the old equipment (and possibly wires) get tugged out of the wall. Messy holes might need to be filled. Advantages of professional installation Even after the old system has been removed, homeowners planning on setting up a connected system may soon realise they don’t have the electrical skills or technological know-how to install and connect all devices, get a system programmed correctly, and get everything up and running smoothly. Professional installers have learned from experience; there’s very little that they haven’t seen before. With their years of experience, installers know the best way to automate a home and how to create a custom smart home experience Do-it-yourselfers might be able to solve problems by searching the internet and finding videos. But, then again, they might not. After going the DIY route once, many full-home automation system enthusiasts are beginning to realise that the best way to get things done right the first time is to leave the installation and set-up to a professional. Professional installers can and should bring an extra level of experience and guidance to the process. Their services should go beyond tech installation and also include interface design. With their years of experience, installers know the best way to automate a home – how to create a custom smart home experience that doesn’t make the user feel less than smart. Selling additional home automation products If a problem arises due to installation error, the DIYer does not have any recourse to correct these mistakesResidential security dealers who offer professional installation should be willing to embrace the DIYer who has attempted to do a self-install but has not been able to complete the process successfully. With an open mind to this scenario, they can save the day for the DIYer, as well as create an opportunity to sell additional home automation equipment that the DIYer may not have known to be available. The disparity between DIY and professional installation also brings to light the fact that there are no ‘satisfaction guarantees’ and no ‘installation/labour warranty’ available when a home automation system is installed by a DIYer. If a problem arises with either the equipment connectivity due to installation error, or if a piece of equipment is installed incorrectly, the DIYer does not have any recourse to correct these mistakes. This may not be as critical if a DIYer installs a minor piece of equipment, but with something as critical as securing and protecting their home with a home automation and security system, most people want full peace of mind that everything has been installed correctly. Reduces connection instability According to a 2017 study by the analyst firm, IHS Markit, “The quality of the equipment is usually higher in professionally installed systems, and professional configuration and setup greatly reduces the potential for connection instability…” This is an issue that DIYers may come to realise over time. On the other hand, one issue DIYers may recognise right away, especially if they are attempting to connect multiple devices, is that the connectivity may be inconsistent. Professionally installed devices operating on a wireless protocol might deliver better, consistent, longer-range connectivity IHS Markit explains that, “DIY systems rely on open protocols and Wi-Fi connectivity that can sometimes be unreliable, creating connection issues. Some of the sensors can become unrecognisable to the system, requiring intervention from the user. In contrast, professional wireless systems rely on UL- or EN-certified equipment to operate on the basis of proprietary frequency, enabling them to work with the control panel much more seamlessly.” In other words, professionally installed devices operating on a wireless protocol, even an open-source protocol like Z-Wave, might deliver better, consistent, longer-range connectivity, and fewer headaches. Not everyone is a DIY customer There are customers who want someone to install the devices correctly and help them learn how to use and maintain themThere’s no doubt that there’s a segment of the security and home automation market that loves to spend their free time doing their own home improvement. They are watching videos, reading how-to books and manuals, and enjoying every minute. There’s also a segment of the market whose top goal is to save money up front. For these customers, there’s no getting around the joy of saving money with the lower cost of many DIY products. But there are also a great number of prospective customers out there for whom DIY is of absolutely no interest. These consumers do not want to be their own IT department. They want expert help: they want someone to install the devices correctly and help them learn how to use and maintain them. The IHS Markit study points out what many home automation dealers already know: that the elder and aging-in-place markets are an ideal destination for the security and convenience of home automation products. The study says, “Many senior citizens are not tech savvy enough to install a DIY system by themselves, so they tend to rely on professionally installed systems that are usually maintained by a family member.” Along with the senior citizens market, there are many other market segments out there that still desire worry-free professional installation. Installers should offer a range of products that includes some DIY products, and some leave-it-to-a-pro products Producing complete and custom solutions Perhaps the best way for dealers and installers to stave off that feeling of doom that they might have about DIY is to tackle the problem head on and be creative. Offer a range of products that includes some DIY products, and some leave-it-to-a-pro products – consider the DIY product a great entry point for a more comprehensive system. Play up the peace of mind that comes with professional installations and support that pitch with flexible monitoring contracts and service plans. Share what you do and why; relay your passion for producing complete and custom solutions and communicate how you add value to any and every sale. No one, not even the most tech-savvy consumer, wants to install their own products if the end result is that the product doesn’t work the way it should. That’s where the pros can, should and will always come into play.
Attendees strolling the exhibit hall at IFSEC International, 18-20 June, 2019, at ExCel London, will be hearing a lot about artificial intelligence, convergence and GDPR. These industry hot topics are representative of major trends in the industry, from new technologies to new ways of designing systems to new privacy requirements. The education sessions at IFSEC International will also address these timely subjects – and provide a welcome chance to sit down and consider the ‘bigger picture.’ Here are some sessions to consider: Artificial Intelligence The session will examine the ‘connectionism’ aspect of AI with reference to machine learning and neural networks A session on artificial intelligence asks: ‘Will AI change the face of the Electronic Security Industry?’ The session will examine the ‘connectionism’ aspect of AI with reference to machine learning and neural networks. Connectionism, or neuronlike computing, developed out of our understanding of how the human brain works at the neural level. Each neuron in the brain is akin to a simple digital processor, and the brain as a whole is like a computing machine. Has the time come for artificial intelligence and machine learning for security? That’s the focus of another session that will explore where AI is headed and if it can help move security practice from prevention to real-time threat detection. Is AI a technology looking for a problem to solve? Is it mature enough for mainstream usage in security scenarios? Does AI present a ‘double-edged risk’ (i.e., because enterprises and attackers have access to the same tools)? Convergence A combined security approach – unifying physical security and cybersecurity – is a real and immediate need in today’s high-risk and high-threat environment. By leveraging disparate sources of data, organisations can effectively manage a situation in real-time without having to go to multiple individual subsystems to get the job done. A panel session at IFSEC will discuss the concept, reality, and evolution of both physical and cybersecurity teams collaborating in the same Security Operations Centre. Here are some other sessions related to convergence of physical and cybersecurity: How converged security centres respond in real-time to physical and online threats How converged technologies ease prevention and response to unauthorised physical/logical access to corporate facilities and networks How chief security officers can benefit from data analytics and converged platforms to understand the complex physical and cyber risks posed to transport systems. GDPR Whilst the regulations provide a more comprehensive basis in law for the management of personal data The introduction in 2018 of the EU General Data Protection Regulations (GDPR) and Data Protection Act 2018 have elevated compliance requirements for video surveillance systems. That’s the subject of the session ‘GDPR – Video Surveillance: Balancing Privacy and Security.’ Whilst the regulations provide a more comprehensive basis in law for the management of personal data, they are part of a wider legal consideration for security technologies. Transparency, accountability and impacts on privacy must be actively integrated into security systems from the outset to retain the trust of those they affect. The work of the Information Commissioner (ICO) and the Surveillance Camera Commissioner (SCC) with their respective Codes of Practice provide a bedrock for effective governance. The 2018 Biometrics Strategy for the Home Office and their partners addresses the need for clear and transparent arrangements to ensure risks to privacy are weigh alongside the benefits. The session will examine these complexities and look at what owners and operators of security systems must consider when striving to balance privacy and security.
Managed services provided through the cloud offer multiple advantages for system integrators. These include: Increased recurring monthly revenue: Managed services are a new business model that generates more stable and predictable income streams for integrators. Stickier customers: Managed services foster a more involved relationship between integrators and their customers, which can help boost customer retention. The cloud enables integrators to serve more sites without hiring additional technicians High gross profit margins: Cloud managed services create an opportunity for a service and technology to be purchased together, helping to generate a higher gross profit margin from the beginning of the customer relationship. They are easier to provide: The cloud enables integrators to serve more sites without hiring additional technicians. Problems can be fixed proactively: When a problem occurs on a site that is managed by a cloud-based system, the integrator can receive a real-time notification regarding the issue - possibly before the customer even notices a disruption in service. Increased valuation of business: According to a study by Dell, companies that utilise cloud, mobility, and security technologies are experiencing as much as 53 percent higher revenue growth rates compared to those who do not such technologies. Importance of cloud-based solutions The cloud also challenges integrators to educate customers on the value of the new approach The cloud also challenges integrators to educate customers on the value of the new approach. For example, the cloud changes the expense model of security systems. It allows customers to shift from a capital expenditure (CapEx) model, where large capital funding is required to purchase equipment, to an operational expenditure (OpEx) model, where the costs of the solution become an operating expense. Since the cameras, installation, storage, and software are packaged into the service, you don’t need a large capital outlay up front - you simply pay a predictable expense every month. Leveraging this difference opens new sales opportunities for integrators. The benefits of cloud services on how physical security equipment and software services can be monitored and maintained through a connected service is a particular benefit to integrators. Data monitoring and security “By having data describing the health of the system shared on the cloud, system integrators can observe data on demand and create proactive maintenance plans in coordination with the end user,” says Stuart Rawling, Director of Business Development, Pelco by Schneider Electric, and one of our Expert Panelists. A daily challenge for end users is balancing human resources used in the operation of a system “Such plans should result in increased system reliability and less downtime. If system performance data is aggregated and anonymised, it could also be used by manufacturers to analyse and form conclusions about maintenance schedules and system lifespan.” A benefit is happier customers. “A daily challenge for end users is balancing human resources used in the operation of a system and daily maintenance, with maintenance having shared responsibility with the system integrator,” says Rawling. The cloud software as a service The SaaS model gives companies the resources to improve the deep learning model" The cloud also can help to make cutting edge technologies more affordable. Economies of scale provided by the Cloud (Software as a Service, or SaaS) are making the sophisticated capabilities of deep learning affordable to a wider audience. Meanwhile, deep learning augments cloud systems with capabilities that may not be available (or affordable) in on-premise systems, thus accelerating the broader move to cloud systems. “Having a SaaS model gives companies the resources to improve the deep learning model,” says Shawn Guan, CEO and co-founder of Umbo Computer Vision, a provider of deep learning video analytics. "We can make more accurate systems that scale better and faster. SaaS enables vendors to do something great with deep learning. You don’t have to redo it for everybody. One customer benefit from another customer and all the knowledge is aggregated together.”
Video Surveillance as a Service (VSaaS), simply stated, is a cloud-based video surveillance solution that is packaged and delivered as a service over the internet. The price varies depending on the features of the plan (i.e. number of cameras, amount of storage, software features, etc.), and customers pay a monthly subscription price to use it. Internet Protocol (IP) cameras are installed at site locations, and the video is captured and streamed to a service provider’s data centre via an internet connection. The video management software (VMS) runs on backend infrastructure provided by the service provider’s cloud. All video processing is done in the cloud, and all that is required to view the footage is an internet-connected device and a web browser. Implementation of AI and deep learning The cloud facilitates implementation of artificial intelligence and deep learning in the video surveillance marketThe cloud also facilitates implementation of artificial intelligence (AI) and deep learning in the video surveillance market. One of the major challenges with developing deep learning-based applications is access to real-word data and the ability to train the applications to work in any environment. Companies need access to relevant datasets that need to iterate their solutions quickly. Cloud-based solutions are of significant advantage in this case, as they allow for continuous updates and easy collection of vast amounts of data. “We will see the continued adoption of cloud-based intelligent video solutions that aggregate business data through video and artificial intelligence,” says Andreas Pettersson, CEO of Arcules, one of our Expert Panelists. Leveraging AI and IoT technologies with video data is becoming more common as organisations strive to optimise business operations while also boosting security across their facilities. Actionable intelligence gathering “The possibilities for this level of actionable intelligence gathering is endless, as markets such as hospitality, manufacturing, retail and SMEs that have multiple locations to manage, look to make sense of video in intuitive, streamlined ways,” says Pettersson. “The ability for technology to aggregate and analyse video surveillance and connected sensor data, identify trends in that data, and apply predictive analysis in businesses will have a huge impact in the coming year.” Cloud systems can solve more problems than ever using artificial intelligence and machine learning Cloud systems can solve more problems than ever using artificial intelligence and machine learning, and the capabilities expand way beyond video analytics to include analytics in general, crunching a variety of data provided by Internet of Things (IoT) sensors. Another area of interest related to video in the cloud is the development of ‘smart codecs’ that security camera manufacturers are developing and marketing as a solution that goes beyond H.264 and H.265. Maximising video storage Customers are realising that cloud implementations are more cost-effective, easier to deploy and maintainThe ongoing need to better manage network bandwidth usage and to maximise video storage is further turning the emphasis toward smart codecs, which lend themselves to cloud applications. Extremely high-resolution video can now be moved around in a fraction of the time and solves the issue of transporting many cameras over constrained WAN connections. With the elastic computing power available in the cloud, one can now envision a time where cloud computing costs could be low enough for the masses of video security solution use cases to be solved. Customers are realising that cloud implementations are more cost-effective, easier to deploy and maintain, and in many cases, even more secure than traditional on-premise deployments. In partnership with the leading cloud providers, the security industry can carry this message to the customers and will gradually see a shift in the acceptance of cloud-based solutions in the traditional security markets.
With a large campus comprising historic and modern buildings and significant research facilities and equipment, the University of Otago has assets in excess of $1.4 billion (NZD). In 2006, an internal security review of campus facilities identified that a number of critical areas – including laboratories where medical research is conducted on animals and human cadavers – could attain an increased level of security and achieve greater cost efficiency through the installation of Gallagher systems. A key priority of the security upgrade was to replace the traditional lock and key system in place in facilities across campus with Gallagher’s electronic access control solution. By moving to an entirely electronic system, the University has mitigated the risks associated with lost keys and unauthorised access. Lost and misplaced cards are reported and immediately deactivated ensuring complete control is maintained over facility access. Comprehensive alarm monitoring The team at the University of Otago needed an auditable system, capable of identifying access by people, place, and timeThe electronic system also allows for comprehensive alarm monitoring per door and per freezer, ensuring campus security is immediately notified if a door or freezer has been left open. Gallagher’s Mobile Client, available with the Command Centre v7.30 security management platform, means these alarm notifications can be communicated directly to security personnel’s Apple iPhone devices providing valuable information in real-time, to those outside of the control room. More than simply managing the access permissions across campus, the team at the University of Otago needed an auditable system, capable of identifying access by people, place, and time. Gallagher’s Command Centre application provides this high-level of traceability and enables the University to quickly and easily extract the exact information required both for internal use and for the regulatory audits required of research facilities. Identifying who accessed which areas “Due to the nature and value of our assets, it’s critical not just to control who has access to facilities but to be able to identify exactly when areas were accessed and to know who was there,” said Deputy Proctor at the University of Otago, Andrew Ferguson. Key industry challenges Eliminate the security threat that comes with lost keys Enhance the level of security for critical areas including Medical Research laboratories Procure a solution capable of producing comprehensive audit trails Introduce a secure, automated facilities management system Gallagher security products installed Command Centre Electronic card readers Syllabus Plus integration Syllabus Plus integration Syllabus Plus enables automation in the scheduling and booking of resources and equipment Founded in 1869, the University of Otago is New Zealand’s oldest university. Ranked in the top 200 universities worldwide, the University of Otago is New Zealand’s primary medical tertiary institute and is considered the top research university in New Zealand. The Gallagher system installed at the University of Otago includes a Syllabus Plus integration. Syllabus Plus enables automation in the scheduling and booking of resources and equipment through Command Centre. The University of Otago team were quick to see value in the opportunity to synchronise their access control system with class time-tables, and subsequently manage room resources by automatically unlocking doors. Easily search and book resources A key benefit for the University was a move away from the manual process of entering room bookings into Command Centre. In addition to removing the labour associated with this manual process, the university also found a reduction in the number of booking inaccuracies caused when people changed their plans, as staff can now quickly and independently reschedule their resource and room bookings if their requirements change. “Smart scheduling gives authorised users in our wider team the ability to quickly and easily search and book resources,” said Ferguson. “It’s a genuine time-saver for us and ensures our facilities are managed efficiently.” The university has implemented an ongoing software maintenance agreement with Gallagher To ensure the University of Otago’s security system remains at the forefront of technology, the university has implemented an ongoing software maintenance agreement with Gallagher to ensure they receive the latest system developments as they are released. “We would never go without software maintenance, it’s imperative that our high-end security be the best it can possibly be,” said Ferguson. Training for system operators In addition to ensuring their security products and systems are up-to-date, the University of Otago also ensures their system operators undergo regular training. According to Ferguson, “We arrange annual training with Gallagher for our Campus Watch security team. The training teaches the team valuable tips and tricks on how to utilise the system to its fullest.” During the years since the initial installation of Gallagher security systems, the University of Otago has experienced significant savings associated with not needing to re-key facilities or replace locks when traditional keys have been lost or not returned – maintenance that the University estimates used to cost tens of thousands of dollars each year.
In mid-2009, Melco Resorts & Entertainment Limited opened City of Dreams, Macau – a casino and resort complex that quickly become one of the world’s premier entertainment and leisure destinations. The complex brings together a collection of world-renowned hotel brands, including Crown, Grand Hyatt, and Hard Rock, along with a casino area of approximately 448,000 square-feet and over 20 restaurants and bars. Also comprising an audio-visual multimedia experience, and ‘The House of Dancing Water’ – the world’s largest water-based extravaganza showcased in the purpose-built Dancing Water Theater. These unique and innovative entertainment, shopping, food and beverage offerings realise the company’s vision of bringing world-class integrated resort and entertainment experiences to Macau and Asia. Need of a robust security solution Melco Resorts was looking for a robust security solution capable of protecting high-value assetsHaving thousands of staff moving around the site meant that effective people management needed to be a significant part of the security solution. With a large site encompassing multiple areas and a staff of approximately 13,000, Melco Resorts was looking for a robust security solution capable of protecting high-value assets while providing a reliable and flexible system to support daily operations. In the years leading up to the opening of City of Dreams, Gallagher worked directly alongside Melco Resorts, and security partner Certis Security (Macau) Ltd, during the design and construction phases. The Gallagher team were highly involved in discussions and developments relating to software customisations and the final commissioning of critical security areas. MIFARE Classic card technology Part of the City of Dreams philosophy from day one was to operate a one-card, single service entity per staff member – not only for high-level security but across all system requirements. According to Billups, a lot of decisions around system choice were based on meeting the one-card philosophy. Utilising MIFARE Classic card technology, 1700 access controlled doors were set up across the complex. Utilising MIFARE Classic card technology, 1700 access controlled doors were set up across the complex Gallagher’s ability to encode the cards with data from multiple system providers was crucial in delivering the one-card policy. Along with Gallagher access data, third-party ASCII data encoding was also provided on the card for use by other on-site systems to achieve the objective of a single card philosophy. Latest generation data security The original system, comprising MIFARE Classic card technology, is now being upgraded to the latest MIFARE DESFire EV1 across all Melco Resorts properties. MIFARE DESFire EV1 provides the latest generation data security and encryption ensuring Melco Resorts globally stays at the forefront of technology. To further meet their one-card philosophy, Melco Resorts wanted a single card technology utilised across all three of their Macau complexes – City of Dreams, Altria Macau, and Studio City. In addition to enabling access across multiple properties, there was a requirement for a central monitoring system that could manage alarms escalated from any of the properties and register such alarms centrally in a main command structure. Highly integrated and expansive platform Gallagher’s multi-server technology delivers this, with seamless connection between all systems and across all sitesFuture-proofing was an important consideration of the security solution. “City of Dreams needed a system that catered well to growth, particularly in the areas of people management and access control. Gallagher provided us with the highly integrated and expansive platform we were looking for,” said Kelly Billups, Director of Security Technology & Administration for Melco Resorts. Gallagher’s multi-server technology delivers this, with seamless connection between all systems and across all sites. If communication between the facilities should fail due to a network fault or similar incident, each site’s security system will continue to function independently. According to Billups, the multi-server system has resulted in reduced labour costs due to the consolidation of security administration. Efficient movement of people The Gallagher system provides rapid response times to access requests ensuring the efficient movement of people in and out of areas. The instant dissemination of cardholder access and configuration data also ensures people have appropriate access delivered in real time. If cardholder access needs to be denied, this information is communicated and applied instantly across the site. In addition to door access activity, 5300 detection points are also monitored throughout the complexIn order to provide Melco Resorts with an audit trail of security events, all site activity is logged in a secure database. In addition to door access activity, 5300 detection points are also monitored throughout the complex. Reports are generated using a simple wizard-based system which steers the report generator through a step-by-step process ensuring the relevant data is retrieved. The City of Dreams site required integration with a number of external systems and Gallagher’s Command Centre central management software provided the platform to deliver this. Cameras integrated with Command Centre As surveillance is a key requirement for a casino, City of Dreams has thousands of cameras throughout the complex. A number of these cameras monitor critical back of house operations and are integrated with Command Centre to provide additional layers of security and enable further administrative functionality. A number of lower-level security points throughout the complex – which utilise traditional keys – integrate Command Centre with an electronic key management system. Keys are electronically released to personnel depending on their access permissions. Two high-level interfaces provide communication to all elevators connected to Command Centre There are approximately 80 elevator shafts located throughout the City of Dreams complex. Two high-level interfaces (Schindler and Otis) provide communication to all elevators connected to Command Centre where access control groups manage access to each of the floors. This integration is particularly important for heart-of-house elevators where access can be highly restricted to only authorised personnel. HR system integrated with Command Centre An integration between City of Dreams Human Resources (HR) system and Command Centre was established. The active connection between the two ensures that basic personnel information is automatically communicated from the HR system to Command Centre without the need for manual intervention. Because of this, the process of updating cardholder information and assigning access to cardholders is a quick and simple procedure – a must for a database of this size. The Gallagher system provides rapid response times to access requests ensuring the efficient movement of people in and out of areas. Where high-level (software) interfaces are not available, the Gallagher system connects with other services including: boom gates, motorised vehicle and pedestrian doors, and turnstiles, using what is commonly referred to as a low-level interface. A control relay in Gallagher’s Command Centre platform activates the door or gate, and in turn the status of the door or gate (open, closed) is reported back. Salto integrated guest locking system Melco Resorts requirement is to seamlessly integrate hotel guest-room locks with the Command Centre platformThe delivery of a high-level integration with a hotel guest-room locking solution is currently in development and will be a world first. Melco Resorts requirement is to seamlessly integrate hotel guest-room locks with the Command Centre platform in order to deliver high-level security across the entire complex. To deliver this solution, Gallagher is working with long-term partner Salto. The Salto integrated guest locking system is required to operate in conjunction with Melco Resorts high-security card encryption and encoding, while complimenting the hotel décor. Melco Resorts and Gallagher maintain an ongoing relationship which brings together Melco Resorts evolving requirements and Gallagher’s product development road map. “The relationship is key for us” said Billups, “having a team based in the region who meet with us regularly and having a level of engagement over development is very important.”
One of the fastest growing districts in the upper Midwest of the United States, Harrisburg in South Dakota educates almost 4000 students across eight schools. Gallagher Command Centre was selected as the only solution that could meet the district’s security requirements, and in October 2015, these security measures were put to the test when the local high school was the target of a shooting. The incident resulted in one staff member being injured but was prevented from escalating further due to Gallagher’s central management platform, Command Centre, being activated by staff. Logs from the incident confirm that from the time the emergency button was pressed, it took just four seconds for Command Centre to lock all outside doors, notify district authorities, and limit building access to emergency responders only. Physical barriers for students’ security Gallagher Command Centre was involved with placing physical barriers between an active gunman and high school students"James Straatmeyer, Chief Executive Officer of Integrated Technology & Security, partnered with Gallagher for the installation of Harrisburg districts security solution. James says, “Gallagher Command Centre was directly involved with placing physical barriers between an active gunman and hundreds of high school students filling 37 classrooms. As far as I’m aware, there’s no other product on the market that has the capabilities and integration solutions for protecting students and staff to the extent of Gallagher Command Centre.” This type of security alert is of increasing concern for many educational institutions, prompting renewed focus on daily security protocols. Integrated and scalable security system Essential to providing an optimum learning environment for students is ensuring their safety and security – a responsibility the district of Harrisburg takes extremely seriously. Key to this was partnering with a security solutions provider that understood the specific needs of educational institutions, with the flexibility to employ customised features that could be tailored to Harrisburg’s particular requirements. The system needed to be fully integrated, scalable and expandable, digitally based, user-friendly The system needed to be fully integrated, scalable and expandable, digitally based, user-friendly and crucially, to assist and not replace, existing manual security procedures. Gallagher and South Dakota based Integrated Technology & Security completed the initial installation within three weeks. Since its introduction, the system has been under continual expansion. Features of updated security solution The access control system originally installed in 2013, fulfilled the region’s initial security requirements; however, a period of growth prompted the need for an enhanced system that could protect the increasing number of students. Some of the features of Harrisburg’s upgraded security solution included: Outlook calendar integration, to enable scheduling of access for special events Intercom / phone integration, to control doors from a desktop icon or smartphone Strobe light control to provide lockdown notifications in hearing impaired areas such as deaf education, shops and the gym Intercom integration for lockdown announcements Command Centre provides enterprise level lockdown controls which limit access to buildings, control fire doors, and send notifications, while providing an audit trail and video alerts. Lockdown access to all staff members An understanding of the benefits of an advanced, interactive security network is essential, and in some cases, lifesavingUsability is a highlight of Command Centre, offering access for all levels of personnel. Initially, only office and administrative staff were trained in the use of lockdown systems, but as the Command Centre’s lockdown features have developed, all staff members can now control access in individual school buildings. Once a lockdown has been activated, a notification is automatically issued to district authorities, immediately alerting emergency services if required. The security incident in 2015 strongly supported Harrisburg district’s decision to install a sophisticated access control system to protect its faculty, staff and students. At a time when concern over campus security is rising, an understanding of the benefits of an advanced, interactive security network is essential, and in some cases, lifesaving. Gallagher’s security solution offers educational institutions around the world a combination of enhanced operational efficiency and cost savings. Command Centre’s software provides a powerful and versatile feature set, enabling system operators to configure, monitor and control their unique security system.
CoreRFID supplies the UK's largest outsourcing company Serco with 100,000 RFID access cards for its Caledonian Sleeper railway service. The cards will provide passengers with access to rooms and will improve security on routes between London and Scotland. The cards are completely re-usable and replace paper-based RFID tickets, which were judged to not be as cost effective in the long-term. Specialist locks Serco had specialist locks provided by a Spanish company and needed cards which were compatible" Munzi Ali, technical director of CoreRFID comments: “Our knowledge and experience on similar work in the hotel industry helped us to meet the challenges of this project. Serco had specialist locks provided by a Spanish company and needed cards which were compatible. Consultancy is a big part of the larger projects we undertake and we were able to solve the issue with Serco.” The Caledonian Sleeper service, which is operated by Serco as a standalone franchise, can trace its origins back to 1873. It serves a number of destinations in Scotland - including Inverness, Aberdeen, Fort William, Glasgow and Edinburgh - on route to and from Euston Station. RFID solutions Graham Kelly, guest experience director at Serco Caledonian Sleeper, said: "Our new trains are designed to improve every aspect of the guest experience. We strive to deliver a hotel experience and a major part of that is having keycard entry for rooms. We've only been running our new trains for a few weeks but the feedback from guests on the keycard has been excellent, with CoreRFID's solution proving extremely effective." Ali added: “RFID solutions can provide real benefits in efficiency, costs and in this case significantly cutting down on waste.” CoreRFID's clients include ICL, London Underground and Thomas Cook.
Siklu, the pioneer in 5G mmWave wireless network solutions, announced that its radios have been deployed in the City of Cambridge, located roughly 100km West of Toronto in Ontario, to provide outdoor video security and support potential public Wi-Fi network services. The city has fibre connections connecting several municipal buildings and continues to deploy more where it makes economic sense. Fibre is used to connect fire stations to City Hall, for example. However, this particular application, outdoor video security, was one that needed more flexibility to accommodate the necessary camera locations. Most parking lots, Intersections and pedestrian walkways do not have a fibre POP (‘point of presence’) nearby. This meant the answer would almost certainly have to be a wireless solution. Need of flexible video security solution The wireless network would need to be able to backhaul gigabit per second public Wi-Fi APs with no additional truck rollsThe solution to be chosen had several additional requirements. It needed to be flexible when it came to expanding the video security coverage, it had to be secure and it also had to have enough capacity that it could support additional high bandwidth applications, such as the deployment of Public Wi-Fi. The wireless network would then need to be able to backhaul gigabit per second public Wi-Fi APs (‘access points’) with no additional truck rolls. The successful bidder on the project was Alliance Security Systems. Alliance investigated 5 GHz solutions as well as 60 GHz and determined that only 60 GHz products could meet current and future requirements. The ‘EtherHaul 600’ point-to-point 60 GHz solution from Siklu features plenty of capacity (from 100Mbps up to 1Gbps, software upgradeable), flexible deployment options (up to 1km “link” range), small size (mountable on street light poles) and immunity to radio interference (e.g., 5 GHz systems are subject to the ever increasing Wi-Fi noise floor). Deployment of P3717 multi-lens cameras Phase 1 of the program supported ten multi-lens camera deployments, and the network design had six 1-Gbps Siklu V-Band radios collocated at the city Clock Tower. This dense colocation was a result of the very narrow 60GHz radio beams and the abundant spectrum (14GHz) available. Deployment of the Siklu radios was accomplished within a week and incorporated an Axis Communications P3717 multi-lens cameras managed by a Genetec Security Center unified security platform. Since the installation of the video security network, a car theft ring was apprehended and there has been a reduction in crimeTom Hackett, Alliance Security Systems stated: “By utilising the point to point technology in such a way where we co-locate the head end, we end up approaching a cumulative speed of over 10Gbps per second once Phase 2 is commissioned. That’s just an astounding wireless speed in today’s world. The network has been such a success that beyond expansion plans with Cambridge, we are in discussions with other municipalities.” Reduction in crimes The City also operates the Phase 1 network to provide access to police as requested for specific incidents or investigations. Since the installation of the video security network, a car theft ring was apprehended and there has been a noticeable reduction in crime. Beginning in June 2019 or as soon as light poles become available, Phase 2 will add seven new cameras and will be supported by Siklu’s V-Band ‘EtherHaul 600’ radios. The EtherHaul 600 units feature 1 Gbits of capacity and can accommodate future expansions of the system. “The network was installed and is delivering in all aspects – high up time and excellent video quality,” said Trevor McWilliams, Manager of Business Development for the City of Cambridge Ontario Economic Development. “We are confident that the network deployed will operate for many years and be able to support new applications as needed.”
Zayed University is the newest of three government sponsored higher education institutes in the United Arab Emirates. The campus is located on the mainland of the Emirate of Abu Dhabi, near the Abu Dhabi International Airport and Masdar. The 229,000m campus houses six colleges across 28 separate buildings, including faculty and administration buildings, a childcare facility, residence halls, classrooms, science and computer labs, cafeterias and a sports complex, all equipped with the latest technology. Future development plans will see the student population increase to 7,500 and the campus grow to cover a net area of 269,000m. Access to and from the campus is an important concern for Zayed University and is carefully managed around the clock to keep the 6,000 strong student body safe. Managing gate barriers and doors Banner sends a command directly to the Gallagher Door Controller to open that specific gate if entry or exit is allowedThe university employs Serco to implement and manage their security requirements. Serco partnered with Gallagher, selecting the Command Centre security platform to manage gate barriers and access controlled doors with just under 650 MIFARE readers and 130 controllers across the site. Zayed University implements a policy to provide students with a secure campus environment. This includes managing the entry and exit of the students based on their scheduled classes. To achieve this, Zayed University runs an interface between Command Centre and its Banner system. Banner is a comprehensive computer information system that contains information on courses, students, faculty, staff and alumni, including financial aid, finance and human resource components. Entry and exit requests for students to pass through the campus gates are sent from Command Centre to the Banner system for approval, using the Command Centre OPC Alarms and Events interface. Based on the time of the entry or exit and the student’s schedule, the Banner system decides whether the request is accepted or denied. Banner then sends a command directly to the Gallagher Door Controller to open that specific gate if entry or exit is allowed. Safe and secure environment for students Its intuitive user interface provides flexibility and easy management of operations"Gallagher security solutions provide the assurance and the knowledge that movement throughout campus is managed simply and efficiently to ensure a safe, secure environment. “Keeping students safe is of utmost importance to us,” says Mukesh Karsan, Serco IT Manager at Zayed University. “The Gallagher system helps us honour this commitment. Its intuitive user interface provides flexibility and easy management of operations.” He adds that he’s been “impressed with the reliability and robustness the system offers; it’s powerful, versatile and allows security personnel to carry out their day-to-day responsibilities with efficiency.” Gallagher solutions are trusted by education providers worldwide to: issue student and faculty access cards manage individual access rights control campus and dormitory access secure computer labs, science labs and other high-value assets integrate with scheduling and resource booking systems evacuate or lock down sites in case of an emergency Time and money saving solutions From intelligent integration with building management systems, to people and time efficiencies gained through automation and smart use of resources, Gallagher designs solutions that save time and money. Whether it’s across multiple zones within a single campus, or over multiple campuses, Gallagher solutions offer an intelligent, powerful way to ensure business continuity, protection of assets and keeping people safe.
Round table discussion
Technology advancements often come with new terms and definitions. The language of our marketplace evolves to include new words that describe innovations in the industry. In the skilled hands of marketers, terms intended to be descriptive can also take a new element of ‘buzz,’ often presaging exciting developments that will drive the future. We asked this week’s Expert Panel Roundtable: What new buzzword have you heard, and what does it mean for the industry?
Our Expert Panel is an opinionated group on a wide variety of topics, and we are dedicated to providing a useful and flexible forum to share those opinions. This week, our panelists address a range of opinions about several self-selected topics, culled from the large number of Expert Panelist responses we have collected in the last year. In this Expert Panel Roundtable article, we will share these varied and insightful responses to ensure they are not lost to posterity!
The security industry is full of individuals who call themselves consultants. It’s a term that is thrown around rather loosely, and in some situations the term can be roughly translated as “between jobs.” But “real” consultants provide real value to their clients in a variety of subject matter specialties. We asked this week’s Expert Panel Roundtable: What role should consultants play in the security technology buying decision?