Matrix Comsec, a manufacturer of IP based phone systems and voice gateways is participating in GITEX Technology Week 2019, Dubai. During this event Matrix will unveil its server based ANANT UCS and will showcase its complete range of business IP-PBXs, VoIP & GSM gateways and new portfolio of IP communication endpoints. Matrix is going to unveil ANANT UCS at the event. ANANT is an enterprise-grade high capacity, high durability, high scalability and high efficacy software-based communication...
At GSX 2019, SilverShield™ Safety & Information Systems will showcase their award-winning visitor and information management system (Booth #1594). The solution is an easy-to-use, cloud-based SAAS approach to security, with several different modules that provide a complete safety solution. “The SilverShield Visitor and Information Management System is the most effective way for users to vet and manage visitors for any size facility,” said Robin Baker, CTO, SilverShield. &ldq...
macmon secure GmbH, globally renowned technology solutions provider for network security, announced developing its Network Access Control (NAC) solution completely in Germany. The Berlin-based in-house development team has now been able to even extend the best-of-breed solution with further significant features in order to solve major future challenges of Corporate IT-Security. Network access control solution With macmon NAC, enterprise networks will be even more effectively protected against...
Trackforce™, a security workforce management platform, announces its acquisition of Valiant Solutions Inc., a provider of Human Capital Management (HCM) software solutions. The new company, Trackforce Valiant, now delivers all-in-one security workforce management platform: the only comprehensive operations management solution available to the industry. Building on a pedigree and industry knowledge of physical security, Trackforce Valiant is a purpose-built solution that supports the growin...
As Vice President and General Manager of Computer Vision at RealNetworks, Dan Grimm leads the company’s facial recognition platform, SAFR. Prior to joining RealNetworks, Dan served as General Manager of Kindle Enterprise Publishing at Amazon. Dan also served as Associate Partner at Monitor Deloitte, where he led numerous strategy engagements advising C-suite and cabinet-level leaders in the United States, Europe, the Middle East, and Africa on driving top-line corporate growth, n...
ASIS International, the association of security management professionals, released its Enterprise Security Risk Management (ESRM) Guideline, which takes a different approach to traditional security. The new guideline is the first strategic security management tool of its kind, elevating the security function by establishing a partnership between security professionals and business leaders to manage security risks. The objective of ESRM is to identify, evaluate, and mitigate the likelihood and/o...
HID Global®, a pioneer in trusted identity solutions, will exhibit a host of new products, including biometrics at the door and new integrations, at HID booth #1503 during this week’s GSX 2019 in Chicago. As a sponsor member of the recently launched FiRa™ Consortium, HID Global will feature a demonstration of Ultra-Wideband (UWB) technology. The company will also showcase its award-winning HID Mobile Access® solution and Seos® credential technology. Visit the HID booth at McCormick Place from Sept. 10-12 for live demonstrations of the company’s latest solutions for issuing, authenticating, managing and monitoring trusted identities. Multispectral imaging technology HID Global’s new fingerprint reader merges credential excellence with HID’s globally-patented multispectral imaging technology to fuel broad adoption of biometrics at the door. The high-performance iCLASS SE® RB25F fingerprint reader provides an unrivalled experience by dramatically increasing image capture performance and fingerprint matching in under a second. The new integration of HID® SAFE™ Enterprise, a centralised platform for identity management, with the revolutionary cloud-based card issuance solution HID® FARGO® Connect™ takes seamless on-boarding and credential issuance to a new level. HID SAFE’s award-winning physical identity and access management solution allows identity information to be captured from physical access control systems, active directory, HR, and other external systems so that it can be pre-loaded prior to printing a credential. HID FARGO Connect enables organisations to easily design cards, capture data and securely print cards Demonstrations will highlight how the integration of HID FARGO Connect further streamlines the onboarding process. HID FARGO Connect enables organisations to easily design cards, capture data and securely print cards—all with a single click from any device and from anywhere across multiple printers or locations. HID Global will be showcasing its latest physical access control tool, HID® Reader Manager™, which allows security professionals to govern authorisation keys, change reader configurations, update firmware, and inspect the status of enabled readers within Bluetooth proximity through a mobile app. HID Reader Manager complies with the latest industry-standard, Open Supervised Device Protocol (ODSP). The FiRa Consortium kiosk will demonstrate UWB for mobile access control based on IEEE 802.15.4 secured fine ranging technologies. The recently launched consortium endeavours to grow the UWB ecosystem so new use cases for fine ranging capabilities can thrive, setting a new standard in seamless user experiences.
Security industry veteran Daniel Schmelzer has brought to market a much-anticipated new book – Securing Trust: A Guide For Security Technology Sales Professionals Written From The Customer’s Perspective. This easy-to-read guide was written to equip today’s security integrator with the tools and knowledge they need to close more sales and enhance their customer relationships. The pages are packed with useful sales tips, and are based on real life security selling techniques that have helped senior leaders understand the value of investing in sophisticated security technology. IP-centric enterprise security platform Schmelzer holds a Master of Arts in Security Management from the American Military University, has six years of experience as a security sales professional and seven years as a Security Technology Director at a Fortune 20, global company. His work portfolio and expertise includes designing, implementing, and management of a $30 million IP-centric, enterprise security platform that spans five continents. He has also designed and implemented over 1,700 complex integrated security installations. Schmelzer wrote SECURING TRUST to empower other security technology professionals to grow their businesses by taking an informed approach to selling the value of security to an organisation. Key security topics in the book The twelve Chapters cover key topics ranging from Meeting Preparation; Understanding the Fundamental Role of Security in an Organisation; How to Help Customers Identify Risk; How to Discover Sales Opportunities Through Supporting the Customer’s Business Continuity/ Emergency Preparedness Plan; How to Sell the Benefits of System Integration; How to Sell Cross-Functionally and Convergence; The Value of System Design Standards; How to Help The Customer Sell Your Solution Internally; Understanding the Buying Cycle; and, Overcoming Objection.
Building Intelligence, global provider of cloud-based visitor, vehicle and vendor management software, SV3, has announced that they will be exhibiting at the 2019 Global Security Exchange, Sept. 8-12, at McCormick Place in Chicago. They will be showcasing a variety of new features designed to further streamline the visitor check-in process and enhance employee access management. SV3 cloud-based software SV3 now offers a completely new portal to provide access for new employees SV3 now enables employees to replace a lost or forgotten badge directly at a kiosk with the touch of a button, and automatically ensures the security of that credential by immediately deactivating any previously-issued badges. By integrating with clients’ LDAP/AD and access control, SV3 automatically verifies the individual and their access level and can print temporary or permanent badges on the spot. In addition, SV3 now offers a completely new portal to provide access for new employees, alleviating redundant paperwork and the chasing of approvals. When hiring managers enroll new employees, SV3 sends their information to all necessary systems for approvals. The new employee will then receive a temporary badge in their email, enabling immediate access to the building upon arrival where SV3 will automatically create the access control record with the appropriate levels. Visitor management system The new updates also now allow users to schedule visitors through email calendar invites. No need to sign into SV3 Visitor. Previously registered visitors will be automatically sent an invite and new visitors will receive an additional registration page if more information is required for check-in. “SV3’s new feature set provides a secure efficient process for credentialing visitors and employees who have lost or need an access card in a site visit,” said Jeffrey Friedman, CEO, Building Intelligence. SV3’s new feature set provides a secure efficient process for credentialing visitors and employees" “SV3 acts like a cost-effective staff and contractor management solution automatically verifying and deactivating badges, without touching multiple siloed systems; saving time, money and resources. We look forward to further showcasing these features and the expanding scope of visitor management to GSX attendees.” GSX 2019 GSX, formerly the ASIS International Annual Seminar and Exhibits, brings together security professionals from a wide range of vertical markets, providing unique opportunities for networking and learning. Building Intelligence will be showcasing updates to their cloud-based software, SV3, in booth 1889 of the security exhibit.
AlgoSec, the provider of business-driven network security management solutions, has introduced extended support for Cisco ACI SDN deployments, and enhanced application visibility and network auto-discovery features in the new version of its core Network Security Management Suite. The new AlgoSec A30 release delivers new automation capabilities that enable seamless, zero-touch security management across SDN, cloud and on-premise networks. This gives enterprises the most comprehensive visibility and control over security across their entire hybrid environment. AlgoSec security management features Key new features in AlgoSec security management suite version A30 include: Extended support for Cisco ACI AlgoSec security management A30 delivers full end-to-end automation of security change management processes for Cisco ACI environments – from planning, risk and compliance checks, to deployment directly onto the device – with zero touch, in a fully automated and secured workflow. Security and IT teams can create new contracts and filters directly on Cisco APIC. Enhanced business-driven application visibility and network auto-discovery AlgoSec security management A30 features the new AppViz add-on, which enhances application visibility and network auto-discovery to dramatically accelerate identification and mapping of the network attributes and rules that support business-critical applications. This speeds up organisations’ ability to make changes to their applications across any heterogeneous on-premise and cloud platform, and to troubleshoot network and change management issues across the entire enterprise environment – ensuring continuous security and compliance. Automatically push network-wide policy changes with AppChange AlgoSec’s new AppChange add-on is available in A30, which automatically updates network security policy changes on all relevant devices across the entire hybrid enterprise network, realising significant time savings for IT and security teams and eliminating manual errors. Security zone enhancements AlgoSec security management A30 enables teams to easily visualise network security zones, and to select risk profiles for each zone to support decision-making for both application owners and security managers. This makes application provisioning and deployment easier, and accelerates planning and implementing network micro-segmentation strategies to enhance security network-wide. SDN and cloud environment “Organisations need to be able to make changes to their core applications quickly to stay competitive, and security teams have to deliver those changes at the speed of business, without impacting security or compliance. This is especially critical as companies implement digital transformation initiatives and migrate their business applications to SDN and cloud environments,” said Eran Shiff, AlgoSec VP Product. “The new features in AlgoSec A30 version make it even easier for security and IT teams to quickly plan, assess and automatically make changes across their entire environment, to maximise business agility, while ensuring security and compliance is never compromised.” The AlgoSec Security Management Suite version A30 is generally available.
SALTO Systems will release the SALTO NEO Cylinder – a new electronic cylinder that offers more features and better functionality than any other cylinder on the market. The compact SALTO NEO Cylinder is designed for doors where fitting an electronic escutcheon is not possible or required and can be installed on standard doors, server racks, gates, cabinets, electric switches, sliding doors, and more. It’s available in an extensive range of models to suit almost any kind of door – from Europe to ASIA to the Americas. SALTO NEO Cylinder The SALTO NEO Cylinder provides the most efficient and convenient way of securing your building and assets The SALTO NEO Cylinder provides the most efficient and convenient way of securing your building and assets. The re-engineered clutch system design makes efficient use of energy, dropping consumption to impressively low levels resulting in 110,000 cycles with just one set of batteries. System standby power consumption is reduced, which extends the electronic cylinder’s battery life. The IP66-rated SALTO NEO Cylinder is weather resistant, making it especially suitable for the outdoors in even the harshest of environments. Encapsulated safely inside the tough NEO Cylinder exterior is the absolute latest in electronic lock technology. Certified to the highest security standards, and pursuing ever higher quality and reliability, the SALTO NEO Cylinder is designed to provide users the finest in safety and security. Enhanced security The SALTO NEO Cylinder offers value far beyond security, however. Of course, upgrading a mechanical door to electronic access control enhances security, but the SALTO NEO Cylinder provides greater control over the door by offering end users access to audit trails, reports, alerts, and so much more. Using smart keys and mobile technology with the SALTO NEO Cylinder allows users to manage access rights – quickly and keylessly – which is more secure than using mechanical keys. There is also additional value in the flexibility, convenience, and operational efficiency provided by the NEO Cylinder’s wireless technology. Keyless access control SALTO continues to release impressive technological innovations where connectivity between the door, user, and system operations aids the growth of overall access control for any building application or access type. SALTO NEO Cylinder has more functionality and performance capability than any other cylinder on the market" “SALTO’s NEO Cylinder technology allows us to introduce customers, systems operators, and installers to new experiences and to connect keyless access where we couldn’t have justified wiring a door before,” said Marc Handels, Chief Technology Officer, SALTO Systems. “We’ve seen for years that electronic locking technology is an ecosystem that has continuous change and growth and we’ve had to consider how to best anticipate customers’ needs and recommend smart locking solutions that are easy to adopt and install." KS cloud-hosted access management He adds, “The SALTO NEO Cylinder has more functionality and performance capability than any other cylinder on the market, allowing businesses to connect to their on-premises network via advanced SVN technology or the cloud with our SALTO KS cloud-hosted access management platform.” Because the SALTO NEO Cylinder is compatible with SALTO SVN, SALTO BLUEnet Wireless, and the SALTO KS – Keys as a Service cloud-based technology, it can be switched to any of SALTO’s technology platforms at any time without changing the hardware. This allows businesses to decide which technology fits best with their security, operations, and IT needs. SALTO SVN-Flex technology The SALTO NEO Cylinder adds SALTO SVN-Flex technology, which increases the potential, efficiency, and reliability of the SALTO SVN, yielding better security, control, and convenience for users and sites. JustIN mobile app capability complements usage of SALTO’s other management platforms SALTO JustIN mobile technology is on board every cylinder. This gives users and system administrators the capability to send or receive a mobile key to open any door or gate with an installed SALTO NEO Cylinder with their iOS or Android Bluetooth or NFC-enabled smartphone. This adds incredible convenience and efficiency for end users in the field which is where a SALTO NEO Cylinder would most likely be used. JustIN mobile technology JustIN mobile app capability also complements usage of SALTO’s other management platforms: SALTO SPACE on-premise management software or the SALTO KS cloud solution. The SALTO NEO cylinder delivers an easy-to-use electronic locking platform that integrates all physical security needs through smart, wireless, and battery-operated smart cylinders, providing all the latest user access information for virtually all of the doors in a facility. For any building, function, or model, SALTO offers the perfect electronic cylinder to fit any door.
SALTO Systems, globally renowned manufacturer of electronic access control solutions, has appointed David Latreille to the newly created position of United States Business Development Director at the firm. Mr. Latreille has most recently served as SALTO Senior Account Manager for the Eastern United States region. Access control solutions expert Based in Nashville, Tennessee, David oversees all of the SALTO Systems’ Senior Account Managers on the commercial sales team. He is also responsible for growth of existing key accounts and the development of new key accounts. He reports to SALTO Senior Vice President of Commercial Sales, Michael J. Mahon. “David has a great understanding of SALTO’s products and mission and has demonstrated his ability to successfully grow sales and lead a team,” said Michael J. Mahon. “We’re proud to have David in this new position of Business Development Director where he will serve an important leadership role for our Senior Account Managers and encourage continued growth of our brand across the United States.” National sales and security experience SALTO continues to set the standards for the access control industry and I have been asked to help take us to the next level" Prior to serving as SALTO Senior Account Manager for the Eastern United States region, David served as SALTO Senior Account Manager for Hospitality. He has extensive national sales and security experience, having served in various roles with RF Technologies, Agilysys, and MICROS Systems. “SALTO Systems continues to set the standards for the access control industry and I am thrilled to have been asked to help take us to the next level,” said David Latreille. Security solutions expert He adds, “My team and I are committed to making the process of doing business with SALTO Systems an enjoyable and fulfilling experience, thereby constantly raising the bar for customer satisfaction.”
The cyber security threat is constant and real. Entire businesses, large enterprises and even whole cities have been vulnerable to these attacks. Growing threat of cyber attacks The threat is not trivial. Recently, two cities in Florida hit by ransom ware attacks – Rivera Beach and Lake City – opted to capitulate and pay ransom totaling more than $1.1 million to hackers. The attacks had disrupted communications for first responders and crippled online payment and traffic-ticketing systems. It was reminiscent of the $4 billion global WannaCry attacks on financial and healthcare companies. A full two years after the WannaCry attack, many of the hundreds of thousands of computers affected remain infected. And hackers are continuously devising new techniques, adapting the latest technology innovations including machine learning and artificial intelligence to devise more destructive forms of attack. Indeed, AI promises to become the next major weapon in the cyber arms race. For enterprises, there is no choice but to recognise the threat and adopt effective countermeasures Enterprise security For enterprises, there is no choice but to recognise the threat and adopt effective countermeasures. Not surprisingly, as the number, scale and sophistication of cyber-attacks has grown, so has the significance of the Chief Information Security Officer, or CISO, who owns the responsibility of sounding the alarm to the C-suite and the board – and recommending the best defense strategies. Consider it a grim irony of the digital economy. As companies have migrated to the cloud to gain scale and efficiency and integrated new channels and touch points to make it easier for their customers and suppliers to do business with them, they have also created more potential points of entry for cyber-attacks. IoT increases threat of cyber-attacks Amplifying that vulnerability is the trend of allowing employees to bring their own laptops, smartphones and other digital devices to the office or use to work remotely. And thanks to the Internet of Things, as more devices connect to enterprise systems – from thermostats to cars – the threat surface or targets of intrusion are multiplying exponentially. According to the McAfee Labs 2019 Threats Predictions Report, hackers will increasingly turn to AI to help them evade detection and automate their target selection. Companies will have no choice but to begin adopting AI defenses to counter these cybercriminals. Importance of cyber security This escalation in the cyber arms race reflects the sheer volume of data and transactions in modern life. In businesses like financial services and healthcare it is not humanly possible to examine every transaction for anomalies that might signal cyber snooping. Even when oddities are glimpsed, simply flagging potential problems can create so-called threat fatigue from endless false alarms. What’s more, attacks like those from Trickbots are specifically designed to go undetected by end users. The fact is, even if throwing more people at the problem were a solution, there aren’t enough skilled cyber security workers in the world. By some estimates, as many as 10 million cyber security jobs now go unfilled. AI is being used to conduct predictive analysis at a scale beyond human means Deploying AI As a result, AI is being deployed on multiple cyber-defense fronts. So far, it is mainly being used to conduct predictive analysis at a scale beyond human means. AI programs can sift through petabytes of data, identifying anomalies and even helping an organisation recognise and diagnose intrusions before they turn into catastrophic attacks. AI can also be used to continually monitor and allocate levels of access to a network’s multitude of legitimate users – whether employees, customers, partners or suppliers – to ensure that all parties have the access they need, but only the access they need. Countering cyber security threats To harden defenses, some AI programs can be configured to perform simulated war games To harden defenses, some AI programs can be configured to perform simulated war games. Because cyber attackers have stealth on their side, organisations might need dozens of experts to counter only a handful of attackers. AI can help even the odds, scoping out the potential permutations of vulnerabilities. As CISOs – and the CIOs they typically report to – advise C-suites and boards on their growing cybersecurity risk, they can also help those leaders recognize an enduring truth: AI programs cannot replace experienced cybersecurity professionals. But the technology can make staff smarter, more vigilant and more nimbly responsive. AI-based cyber security tools Financial and healthcare companies are leading this charge because of the sheer volume and variety of transactions they handle and because of the value and sensitivity of the data. Organisations like the U.S. Department of Defense and the space agency NASA, as well as governments around the world are also implementing AI-based tools to address the cyber threat. For businesses of all types, the threat stretches from the back office to the supply chain to the store front. That is why recognising and countering that threat must involve everyone from the CISO to the CEO to the Chairman of the Board. The AI arms race is underway in security. To delay joining it is to risk letting your enterprise become one of the grim statistics.
With the recent news headlines about store closures and the collapse of well-known chains, alongside clear adjustments in business strategy amongst established high street favourites, there is no denying that the UK retail industry is under huge pressure. A recent report suggests growing issues are leading some retailers to increase risk-taking in the supply chain. But here, Steve Bumphrey, Traka UK Sales Director, looks at ways to help retailers embrace the storm, including paying attention to security, management processes and efficient customer focus. Challenges plaguing retail industry It’s been an awful year to date for UK retail if you believe the cacophony of negative headlines about the health of the UK economy and the confidence levels of the UK consumer. The sector is facing huge challenges in dealing with the evolution in on-line and smart mobile retailing The sector is undoubtedly facing huge challenges in dealing with the evolution in on-line and smart mobile retailing. Further concerns include an unwillingness of policymakers to address the changing retail environment and how business rates and general business taxation and regulation is making a difficult situation worse. Supply Chain Risk Report According to the latest Global Supply Chain Risk Report, published by Cranfield School of Management and Dan & Badstreet, those under pressure, are now facing increased exposure to risk if they are forced to cut costs in their supply chain. The report cites data for the retail sector that shows increased levels of risk-taking since Q4 2018, with retailers reporting high levels of dependency on suppliers and indicating a propensity to off-shore to low-cost, high-risk countries where suppliers are more likely to be financially unstable. In-store technology revolution The underlying evolution of technology taking hold of the retail industry and consequential changing consumer behaviour is what is really forcing the industry to step up and act. This is not only in the shift to online and smart mobile purchases, but also with the increased use of technology in store. Self-scanning and checkouts In a bid to enhance the physical shop experience, especially in supermarket outlets across the UK, retailers are increasingly giving customers autonomy with self-scanners and checkouts and need to be able to trust them to ensure an honest transaction. And for the shoppers, this dependency on technology and not human interaction to complete a shop means scanners must be instantly available and ready for use. Many different underlying competing challenges impact the retail industry Compensators At the recent British Retail Consortium’s ‘Charting the Future’ conference, looking at retail crime and security, Dr Emmeline Taylor, a criminologist at the City University of London identified in self -service shops, several new types of ‘offenders’ such as so-called ‘compensators’ including the atypical ‘frustrated consumer’ who, “fully intended to pay but were unable to scan an item properly”, adding to the security challenge. There are clearly many different underlying competing challenges impacting the retail industry. Arguably, the increase in technology and autonomous shopping, where less staff are present (or staff cuts planned) throws up more vulnerabilities, such as the opportunity for store theft. Use of body cameras Staff needs emerging technology such as body cameras to act as a deterrent to crime and keep employees safe Furthermore, staff may need greater use of emerging technology such as body cameras to act as a deterrent to crime and help keep employees safe. In essence, prevention is better than cure, and it’s certainly cheaper. Whether combating crime physically or online, or looking to find ways to counter the high street trends, working together, sharing information and taking a more holistic approach will help the development of a shared language between retailers. Retail banking It is also here where common approaches can help to deliver on efficiencies, in time, resource and budget that can serve to operate right through the supply chain, and minimise, or even negate the need to take any risks. It can even serve to enhance the customer experience, increasing confidence in the shopping environment. Of course, when discussing the high street, it is not just the department stores and chains that are feeling the impact. Well known banks are also having to redefine their priorities and role on the high street, with customers (especially younger generations) demanding a more efficient service than ever before. Well known banks are also having to redefine their priorities and role on the high street Asset protection Leading the way is Nationwide, globally renowned building society, which prides itself on being one of the largest savings providers and mortgages provider in the UK, promoting itself as running purely for the benefit of its customers, or ‘members.’ Richard Newland, Director of Branch & Workplace Transformation at Nationwide said, “Even more than getting a good ‘deal’ from a building society, the quality of our welcome, or our renowned level of service, we make sure our members feel safe with us, enough to trust us with their greatest assets. We are doing everything we can to evolve our business and focus our efforts on providing the best and most secure services that people value.” Key management systems Traka has supported Nationwide with the introduction of dedicated key management systems So committed to its branch network, it has pledged to its 15 million members that every town and city with a Nationwide branch, will still have one for at least the next two years. A bold statement in today’s climate. Traka has supported Nationwide with the introduction of dedicated key management systems, moving its branch network into a more digital system. Keys no longer need to leave site and the audit trail capability has helped to remove the manual paper recording, allowing status of keys to be established instantly, at any time. Changes in retail market This example, together with Traka’s portfolio of high street brands and globally renowned department stores that cannot be named for security reasons, demonstrates the need for retailers to embrace the need for change, both from a product offering and operational running perspective to achieve aspirations of resonating with customers. They also prove the opportunities for success, in an unquestionable difficult market environment. If retailers can listen to customers and respond accordingly, taking into consideration staff safety and security, alongside an ability to respond quickly to personalised enquiries and expectations. This way, perhaps, the current environment can be seen as an opportunity to innovate and embrace technology to form the high street of the future.
The healthcare sector is a crucial part of a functioning society as it provides life-saving care and reassurance to the population. A key part of ensuring the professionals in this industry have the best work environment is the ongoing security of the facilities. Overcoming environmental challenges Hospitals are challenging environments for security integrators. There is little room for mistakes because staff, patients and assets cannot be compromised. Medical centres and their facilities can be vast complexes and security teams must be confident in their ability to identify and nullify threats as soon as possible. Chubb provided Queensland Children’s Hospital's security team with a simple and easy-to-use tool Chubb Fire & Security offers a range of intelligent video and access control systems to solve these challenges. The Queensland Children’s Hospital in Australia, formerly named Lady Cilento Children’s Hospital, is the major specialist children’s hospital for families living in Queensland and Northern New South Wales. The facility not only provides care to the local families but also the state’s sickest and most critically injured children who need highly specialised care. This state-of-the-art hospital, coupled with a leading academic and research facility and the high calibre staff, provides a platform to continue to develop as a leader in paediatric health care, education and research. Comprehensive security solution Chubb developed a solution for Queensland Children’s Hospital that included access control, video management, communications and asset tracking. By creating a common infrastructure for all security systems managed through a comprehensive user interface, Chubb provided the hospital’s security team with a simple and easy-to-use tool that enables them to resolve situations as they happen and action events automatically on command. Chubb also developed a 3D model of the building that allows the security team to respond quickly to a wide variety of events. The protection of patients and staff is naturally a hospital's number one priority Also crucial to the implementation of security systems in a hospital is minimal disruption to its everyday operations. Professionals in hospitals are working 24/7 so there is little time when it comes to disabling security systems for maintenance or repairs. Continued maintenance and upgrades are vital elements to Chubb’s work and key to this is a great deal of collaboration with clinical and operational stakeholders. Securing mission-critical environment Hospital facilities are not always state-of-the-art and often face the slow upgrade process that a limited budget imparts. However, through the audit and update of security systems, steps can be taken to ensure continued operations without external disruption. The protection of patients and staff is naturally a hospital's number one priority and Chubb shares the same commitment to making sure the environment is safe and secure. Carrying out a technically demanding project in a large, mission-critical environment like a hospital takes strong teamwork, including expert strategic partners, and collaboration between stakeholders.
Video surveillance cannot address all the security challenges in education, but it is a valuable tool and among the least obtrusive options available. And the list of security challenges that video can address grows every day. Video systems can provide real-time monitoring of school premises and facilitate rapid response to incidents. New advances such as video analytics are currently underutilised in the education arena. Historically, video has been used as a forensic tool in the education market, providing critical information about an incident after the fact. But that generalisation is changing. Today, networking enables video images to be shared throughout a school system, travelling over existing networks, empowering a more centralised security management structure, and making video more valuable. In particular, higher education institutions are more likely to view live video, given the larger campuses, greater number of buildings, and more public areas where staff and students congregate. Challenges for securing a school environment Panoramic cameras are one tool to address challenges, as a single 360-degree camera can replace between 4 and 5 PTZ camerasMultiple challenges in the education market for security goods and services (from a video perspective) include wide open spaces that make securing schools with video surveillance cameras difficult since the vast amount of coverage required can be cost-prohibitive. Second, state and federal regulations must be taken into account and balanced with the need to protect student privacy. Finally, schools and colleges face dwindling budgets, which means security solutions must deliver more coverage and functionality, while also being cost-effective to deploy. Panoramic cameras are one tool to address these challenges, as a single 360-degree camera can replace between four and five traditional pan-tilt-zoom cameras, resulting in fewer cameras and more coverage – all at a lower cost for hardware and licensing. Data capture form to appear here! Intelligent cameras with video analytics Video surveillance with video analytics can be deployed to monitor areas at certain times of day. For example, once school starts, there shouldn’t be a lot of activity in the parking lot or in particular areas around the school. For these situations, intelligent cameras with video analytics can be used to detect activity in those areas of interest to alert school security that something may need their attention. Radar detection is ideal for perimeters, where a device can be set up unobtrusively to alert when someone enters a particular area. ACC 6 video management software with Avigilon Appearance Search technology provides advanced video analytics search The goal in a potentially dangerous situation is to speed up response times. The faster you’re able to detect something using technology, the faster you’re able to respond. Therefore, being able to identify something happening in a parking lot and alert school resource officers could provide 30 seconds or a minute head start for response, which can get the school into a lockdown situation and get first responders on site more quickly. Video cameras with low-light capability There are video cameras available with extreme low-light capability to see in near-dark or complete darknessIt’s been shown that using lighting at night can deter crime. However, it can be expensive to keep a building and grounds illuminated all night, every night. To mitigate these concerns and potential costs, there are video cameras available with extreme low-light capability that allows them to see in near-dark or in some cases complete darkness. This allows a school to save money by turning lights off while achieving a level of surveillance performance similar to daytime deployments. Facing above-average student incident rates and student disciplinary concerns at some schools, a school system in the United States sought to upgrade its video surveillance system to allow better local and remote monitoring in important areas. Avigilon high-definition cameras with self-learning video analytics and access control solutions were installed in 101 schools, and ACC 6 video management software with Avigilon Appearance Search technology provides advanced video analytics search. A deep learning artificial intelligence search engine can sort through hours of footage and allow operators to click on a button and search for all instances of a person or vehicle across all cameras on a site, quickly and efficiently.
Workforce management systems gather and analyse information and anomalies from security officers in the field. The information ranges from direct observations entered via mobile or desktop apps by officers on duty to reports from cleaning staff, the maintenance department, and CCTV operators. Taken together, the information yields business intelligence and data analytics at no additional cost. Trackforce is a provider of workforce management solutions specific to the security industry and its unique operational requirements. From tracking guard tours to managing incidents and officers remotely, the platform improves officer accountability, optimises operations, and delivers actionable insights via a live dashboard to reduce vulnerabilities and enhance efficiencies. The platform is customisable and scales to each client’s business. Platform to control and identify risks “Corporate security teams deal with issues related to operational risk, facility security levels and design basis threats, and must contend with manmade, naturally occurring, and technological events,” says Guirchaume Abitbol, CEO and founder of Trackforce. “We provide them a platform that enables them to control and identify risks, deliver their service, and maintain security best practices.” Trackforce uses live monitoring to ensure quality control and to upgrade situational awareness, delivers real-time incident notifications Trackforce serves large security guard companies and global organisations in diverse vertical market sectors and is expanding in facilities management. More than 200,000 professionals at over 20,000 customer sites in 45 countries use the platform. Trackforce uses live monitoring to ensure quality control and to upgrade situational awareness, delivers real-time incident notifications, and generates data-rich analysis and key performance indicators (KPIs) that enhance monitoring and reporting. Reduces corporate risk Better management of corporate risk is a benefit of security workforce management. The Trackforce platform reduces corporate risk in four areas by: Managing multiple sites, located anywhere, with various threat levels, cultural differences, operating procedures, and regulations. Supporting a security budget and investment in new solutions by providing data necessary for budget approval. Keeping management informed about outsourced security services partners with relevant data, analytics, and transparency. Providing real-time data on risks and incidents so operations can be quickly optimised to ensure top-level security services. Identifying potential threats and risks The platform rapidly and accurately collates data (implied data or trends) based on user-selected parameters. Data- and intelligence-rich reports become available to managers from any location via a dashboard. All necessary information is displayed on a single screen in an uncluttered format.The ability to analyse current and historical data in real time empowers security managers to track patterns Reports can be downloaded and shared with stakeholders. The ability to analyse current and historical data in real time empowers security managers to track patterns, identify potential threats and risks, and implement preventative actions and strategies. Using data intelligence as benchmark Security teams will use data intelligence as a performance benchmark for resources required to accomplish site goals. They will also use this information to pilot and rationalise resource needs for impending contracts based on historical, descriptive (what happened), diagnostic (why did it happen), predictive (what will happen) and/or prescriptive data (how can we can make it happen). “For example, when a large company incurs incremental computer equipment theft, a supervisor can use the platform to review historical reports and identify patterns and anomalies,” says Abitbol. “The supervisor could then identify and proactively implement targeted strategies to mitigate the theft, such as modifying security routes, increasing patrols, or adjusting asset management protocols.” Enhanced control of security resources The Trackforce platform has been designed to serve clients at multiple regional and national locations and is available in many languages. The Command Center allows a security supervisor based at a central location to easily manage officers on multiple sites. The Command Center provides greater oversight and enhanced control of security resources The Command Center provides greater oversight and enhanced control of security resources. Management can compare locations and evaluate security with a customisable reporting dashboard for each site. The uniform platform uses the same reporting templates and processes for each secured and managed location, thus ensuring consistency and accurate benchmarking. Trackforce’s workforce management solution has low cost and presents a low barrier to entry, with systems that can be implemented in a short time.
An area of technology that is shifting how we interact with our cities is the Internet of Things (IoT). The IoT already accounts for swathes of technology and devices operating in the background. However, we’re increasingly seeing these come to the forefront of everyday life, as data becomes critical. The decisions that this critical data is attached to must be made quickly. A living, breathing city must constantly be monitoring, assessing and utilising data in order to ensure it keeps people safe and mobile. Delivering exciting opportunities Much like the arrival of Uber and Airbnb, the Internet of Things will deliver exciting opportunities The search for an answer to the challenges of growing human urbanisation is believed to exist in the smarter application of new technologies. Where once, electricity and the arrival of the elevator gave us vertical cities, today, we have the promise of the Internet of Things, Artificial Intelligence (AI), Big Data, micro-controllers (MEMS) and new materials to help manage a very crowded future. Data capture form to appear here! We are confronted with a perfect storm of risk factors and potential vulnerabilities as each of these connection points is potentially a source for a security breach. Much like the arrival of Uber and Airbnb, the Internet of Things will deliver exciting opportunities and new kinds of services, many of which we have yet to imagine. Priority control solutions However, there will be equally unimagined and unintended consequences, if only because, in highly complex systems with many connected and tightly linked elements, accidents are inevitable. “The journey to a smart city is incremental—you can’t flip a switch or force it. It requires complex integration and relentless innovation,” says Global Traffic Technologies (GTT) product manager Chad Mack. GTT provides priority control solutions that use analytics GTT provides priority control solutions that use analytics, cloud-based computing to link connected devices to improve mobility, public safety and transportation in cities around the world. GTT’s Opticom Priority Control mobility solution allows transit and public safety vehicles to request a green light at intersections, dramatically reducing the potential for intersection crashes and improving travel times and reliability. Increased connectivity “These intelligent priority management systems allow users to oversee and control the movement of vehicles that operate on a city’s streets,” Mack explained. The rise of urban centres and ‘Smart City’ initiatives enabled by big data, network of sensors and the Internet of Things bring a new set of challenges to future policing. There is now a growing consensus that technology transformation must be part of the overall solution While digital technologies have helped compress the reaction time of police all over the world, the increased connectivity can similarly be leveraged by criminals to carry out increasingly sophisticated crimes. There is now a growing consensus that technology transformation must be part of the overall solution. To keep cities and citizens safe, law enforcement must be armed with the right technology, tools, and processes to solve – or even prevent – the toughest crimes at faster rates. Proven criminal theories Many law enforcement agencies such as LAPD, Seattle and Florida Police Departments are using cutting-edge cloud-based crime prediction software to predict drug crime, gang crime, anti-social behaviour and gun violence. Such crime prediction software works by analysing data through a sophisticated algorithm that applies proven criminal theories to predict the top 10 to 20 spots where crime is most likely to occur over the next few hours. To do so, it leverages on a variety of factors, such as historical and recent crime data, real-time activity, weather forecasts, locations and other information. Once these ‘hot spots’ are identified, police officers can adapt their patrol schedule and frequency at these locations, making their presence felt in the area and thereby prevent crime from taking place.
Ensuring safety and security of all who work and experience award-winning cruise facilities, a leisure travel company has secured key management across its fleet with Traka. The integration sees Traka specialist key management systems integrated into a complete fleet, ensuring compliance to the Cruise Vessel Security and Safety Act 2010 (Kerry Bill) in allowing only authorised staff access to dedicated areas on a bespoke curfew management system. Bespoke key management The number of ocean cruises taken last year reached over two million for the first time" Speaking about the integration, a representative from the cruise company said: “Cruise holidays are undeniably growing in popularity, as they give our guests the opportunity to experience being on board a floating city. For the UK and Irish market, the number of ocean cruises taken last year reached over two million for the first time, hitting a record 2,009,000 in 2018." “We have a necessary duty of care to ensure the high level of security and protection of our guests throughout their stay on any one of our luxury ships. Traka designed a bespoke key management solution that was simple to integrate and minimise interference with everyday operations to ensure not only compliance to cruise security but also an ability to capture audit control on every key in operation amongst our staff.” Cruise management platform “Together we believe this is a key step to improve ship safety and provide transparency and consistency, alongside dedicated accountability amongst all our staff. And in partnership, we can create an environment whereby guests can enjoy excellent standards of service throughout their stay on any one of our award-winning fleet.” “Traka worked closely with the technical team to install S-Touch key management systems across its fleets, with bespoke solutions designed per cruise facility. The dedicated curfew management feature integrated into each system can be set on any key, enforcing staff to return keys by a certain time, with an alert created on any asset that is not back in the allocated timeslot.” The result is improved productivity with lower collection and distribution time on staff handover" “The result is improved productivity with lower collection and distribution time on staff handover. And by integrating systems into the cruise management platform, even loggings could be specified on environmental and sustainability credentials in an innovative bid towards showcasing ‘green cruising.” Significant cruise community Ben Farrar, Traka Market Development Manager added: “Cruise ships are undeniably experiencing a booming market, with increased staff and fleets to accommodate demand. But within this, leading corporations have a role to play in highlighting the significance of compliance to the latest cruise regulation and guest safety.” “Traka created a bespoke system, enabling this prestigious fleet to benefit from essential security, including an ability to support authorised staff to control access to different areas, whether it be stock-taking or environmental control. We are looking forward to continuing our relationship to present various technical innovations and ensure even increased customer satisfaction across a significant cruise community.”
Siemens Mobility and globally renowned mission critical communications (MCX or MCC) enabler, Softil have jointly announced an agreement that will see a range of next generation communications solutions come to market for use in Long Term Evolution-Railway (LTE-R) railways as well as Mission-Critical Push-To-Talk (MCPTT) metro applications like underground/tram buses, etc. Siemens Mobility adopts Softil's BEEHD client framework to bring best-of-breed mission critical communications solutions to LTE-R rail networks; solutions will also support the UIC's FRMCS strategy to build a Global Rail Traffic Management System for the entire rail industry MCX solutions The MCX solutions will support the Future Railway Mobile Communications Systems of the UIC The MCX solutions will support the Future Railway Mobile Communications Systems (FRMCS) of the International Union of Railways (UIC) to build a Global Rail Traffic Management System (GRTMS) for the entire rail industry, bringing significant economic and operational benefits and efficiencies to operators in the process. "The rail industry is at the forefront of the mission-critical communication revolution and GSM-R based systems have already been replaced by LTE-R solutions in Asia Pacific (APAC) and the trend is expected to widen across other markets in 2019/20," says Pierre Hagendorf, Softil's CEO. "With Softil's BEEHD client framework at the heart of Siemens Mobility's next generation LTE-R offerings, the rail industry will have a range of supremely reliable solutions packed with rich communication features." The new radio system for the Railway industry has to guarantee the interoperability with GSM-R while delivering on these three main areas: Critical communications - Secure voice communication between driver and signaller, provision for emergency and group calls, real-time video imagery for any occurring incidents and the intelligent bearer for European Train Control System (ETCS) and Automatic Train Operation (ATO) operation; Performance communications - Track condition monitoring, Connected Driver Advisory System (C-DAS), on-train telemetry, maintenance of non-critical infrastructure, non-critical real-time video, wireless communication for on-train-staff; Business communications - passenger information system, passenger entertainment and passenger communication connections. Siemens Mobility will enable existing GSM-R users to develop a migration plan that will enable all of the above. BEEHD client technology LTE-R is the foundation for the railway variant of the 3GPP MCC over LTE/5G (MCPTT) standard "The rail industry is facing unprecedented challenges in handling increasing numbers of passengers and freight traffic loads," says Russell Clarke, General Manager, Mobile Communications at Siemens Mobility. "After careful analysis of market options, Siemens Mobility chose Softil's BEEHD client technology as the outstanding Software Development Kit (SDK) for our developers to build best-of-breed LTE-R communications solutions for the rail industry in the shortest timeframe." LTE-R is the foundation for the railway variant of the 3GPP MCC over LTE/5G (MCPTT) standard. What sets the LTE-R technology apart from the currently used GSM-R is that it brings the full power of broadband networks including voice, video, text, images, location and more and not just simple voice. LTE-R technology The Softil BEEHD framework is LTE-R compatible and will enable Siemens Mobility's solutions to deliver stable voice as well as data communications on trains running at speeds in excess of 400km/h. LTE-R technology makes possible live tracking of a train and transmitting railroad information to engine drivers, and also enables multimedia-based group calling and SMS services on top of voice call services. Additionally, real-time group/individual communication is made possible between train engineers and control centers. BEEHD IP communications solution is a cross-platform framework designed for system integrators BEEHD IP communications Softil's BEEHD IP communications solution is a cross-platform framework (SDK) designed for chipset vendors, device manufacturers, system integrators, application developers and service providers looking to accelerate the development of IP-based voice and video over LTE (VoLTE, ViLTE and MCPTT/MCX) solutions. The quality of the award-winning SDK is unmatched within the communications industry and BEEHD was proven to satisfy all required key performance indicators (KPIs) set by the 3GPP MCX standard, as well as often even stricter KPIs required by global carriers and service providers.
Modern office design needs an advanced access control system that is powerful, flexible and aesthetically in tune with workspace users and their needs. At Plexal, a new £15 million flexible work environment located in the heart of Olympic East London, where the city’s ‘innovation community’ meet to brainstorm and explore new ideas, Aperio achieves all the three virtues wirelessly. At Plexal enterprise and academia work together, with technology companies, start-ups, universities and creatives under one roof. Up to 800 entrepreneurs use the workspace to devise, create and launch products and services. Innovative access control solution Easy, non-disruptive installation of new locking devices was another goal: Plexal preferred a wireless solution Plexal required a tried-and-tested access control solution they could rely on for high-end security to protect this new co-working office against unauthorised intrusion and burglary. Easy, non-disruptive installation of new locking devices was another goal: Plexal preferred a wireless solution. Any chosen solution would need the flexibility to expand access control as Plexal’s site scales over time. Device aesthetics must complement a contemporary, light-filled interior design with lots of glass. Powerful, flexible, wireless connectivity Plexal offices are now fitted with Aperio wireless, access card-based locking technology. Plexal’s battery-powered Aperio locks are integrated with DoorFlow, NetNodes’ online platform for managing and auditing building access. So far, 59 Aperio L100 wireless high-security door locks have been installed and integrated online with DoorFlow. These Aperio locks provide Plexal with a high level of physical protection and transmit door status to DoorFlow in real time. Adaptable locking solution Plexal required an adaptable locking solution for a range of different doors and, with no wiring required" “Plexal required an adaptable locking solution for a range of different doors and, with no wiring required, it was quick and easy to install Aperio with minimal disruption,” says Stewart Johnson, Director at NetNodes. Because Aperio locks are battery- rather than mains-powered, the new wireless solution also keeps Plexal’s maintenance costs and energy consumption low. Aperio wireless locks use no power when idle, only “waking up” to read credentials or maintain a system heartbeat. Annual running cost savings over traditional wired doors are significant. Modern locking device design Aperio aesthetics were a good fit for Plexal’s modern workspace. “We have a futuristic-style, open-plan design here at Plexal — our offices are predominantly glass-fronted, so we needed an effective design which was not only robust but adaptable, too,” says John Herbert, Facilities Manager at Plexal. “What really appealed to me about ASSA ABLOY access control’s products was the aesthetic.” Aperio technology integration And because Aperio technology is built on an open platform for integration with almost any security or building management system, Plexal’s access control solution is fully future-proofed. They have the option to expand to new offices, floors or even buildings easily. Aperio can upgrade mechanically locked doors and wirelessly connect them — online or offline — to new or existing access control systems. This is achieved with minimal modification to doors and premises, offering a simple, cost-effective security upgrade. Aperio can upgrade mechanically locked doors and wirelessly connect them to new or existing access control systems Wireless access control “Should any additional doors need to be added to the system in the future, this can be done easily, without modifying or changing the aesthetics of the environment,” confirms Stewart Johnson. “This also minimises future installation costs, offering a cost-effective and straightforward access control upgrade.” “We foresee change in the not-too-distant future and are delighted at our options to modify,” adds John Herbert. Secure physical and digital access ASSA ABLOY's innovations enable safe, secure and convenient access to physical and digital places, offering efficient door opening solutions, electronic locking devices, trusted identity solutions and entrance automation technologies.
It is one of Moscow’s most ambitious building projects: the VTB Arena Park was built on the site of the old Dynamo Stadium and revitalises the entire surrounding area with a multi-purpose concept. At an estimated cost of US$ 1.5 billion, the modern VTB Arena Park combines sports, entertainment, commercial and residential facilities. A first challenge arises from the sheer size of the project: The football stadium, known as Dynamo Central Stadium and home to FC Dynamo Moscow football club, hosts league matches with a capacity of over 26,000 spectators. The park’s indoor arena holds more than 12,000 guests during ice hockey matches, basketball games and rock concerts, while the 300,000 square-meter park area also offers retail facilities, a five-star hotel and 1,600-car parking garage. Protecting residential areas Considering the wide range of very different purposes served by these various buildings, it was clear from the project’s inception that a multitude of vendors and providers would be needed to cover all security needs. VTB Arena Park was looking for a partner able to tackle that key challenge From the security manager’s perspective, the main challenge was to ensure that these disparate systems would function together and allowed for central management of a wide array of functions such as: access control for tens of thousands of football fans entering the stadium on match days, monitoring the vast perimeter with its park zones, and protecting residential areas against intrusion. VTB Arena Park was looking for a partner able to tackle that key challenge – integration of all parts into one platform – and chose Bosch as its provider of end-to-end video security and access control. Intelligent video analytics Aside from the project’s complex technical ramifications, there was a particular system design challenge: Residents of the Arena Park should feel at home enjoying the highest quality of living, while the area also needs to accommodate for the influx of thousands of visitors within short periods. As the Bosch experts learned, the multi-purpose character of VTB Park leads to an equally wide range of different security needs among its users. Catering to the video security needs, Bosch installed a total of more than 2,000 video cameras, fixed as well as moving cameras, both indoors and outdoors, to safeguard the vast perimeter of the Arena Park premises and secure the homes and offices. One of the camera types installed for perimeter protection is the AUTODOME IP starlight 7000 HD. This high-definition camera offers excellent low-light performance thanks to starlight technology and also features built-in Intelligent video analytics. Access control systems The video analytics function automatically detects deviations from standard moving patterns The video analytics function automatically detects deviations from standard moving patterns, like a person entering a restricted area, and triggers an alarm that is sent to the control rooms where security staff can then zoom into a scene for closer investigation. As required by VTB Arena, all 2,000 cameras and connected video storage on Bosch recording units are managed centrally via the Bosch Video Management System (BVMS). Another particular challenge consisted of aligning the three different access control systems of the stadium running at the same time. The ticketing system is the first layer of access control, managing the turnstiles that permit entry of thousands of visitors during events with paper tickets. This access control system needed to integrate with the employee access control system that relies on proximity cards (the Access Engine provided by Bosch), as well as a third, offline access control system used at specific stadium facilities. Integrated security system As the Bosch experts in Moscow found out, such an integration was without historic precedent. Because no standard solution existed, the team devised a highly customised set-up managed centrally on the Building Integration System (BIS) from Bosch. “We were fully aware that the multifunctional character of the VTB Arena Park would lead to complexity that could hardly be topped. We needed integration power, a partner who knew how to bind all loose ends into one solution that had never existed before. Creating this one integrated security system catering to all the various purposes has made Bosch our main security partner,” said Alexander Kravchenkov, Deputy Head of Security Systems Maintenance Group IT Department at VTB Arena.
Wintec (The Waikato Institute of Technology), established in 1924 is a major New Zealand Government-funded tertiary institution, which has three Hamilton campuses; a city site overlooking the central business district, Avalon campus on the northern outskirts of the city, and a horticultural campus at Hamilton Gardens. In addition, it has regional operations at Te Kuiti and Thames and also an office in Beijing. The Avalon campus, a ten-minute drive from the city, is home to specialist trades training facilities, a state-of the-art sport and exercise complex and custom designed facilities for the School of International Tourism, Hospitality and Events. The third Hamilton campus, the Horticultural Education Centre, is situated amidst the 58 hectares of Hamilton Gardens. On-line distance education Wintec’s programmes and qualifications are nationally and internationally recognised Wintec is one of the largest institutes of technology in New Zealand, and has more than 35,000 full-time and part-time students, more than 500 full and part time staff and eleven schools within its academic faculty. International enrolments exceed 1000 from 47 countries. A range of student services provide its domestic and international students with a high level of support so they enjoy a positive, safe and secure study experience. Wintec’s programmes and qualifications are nationally and internationally recognised and its degrees have equal status to those from universities. The degree programmes include Media Arts, Midwifery, Nursing, Occupational Therapy, Early Childhood Education, Business Studies, Engineering, Technology, Information Technology, and Sport and Exercise Science and a wide range of full and part time courses for those already in the workforce. Wintec is also recognised nationally in the delivery of on-line distance education for those unable to attend regular classes for reasons of geographical access or other constraints. Electronically controlled doors Wintec strives for a balance of unobtrusive yet robust control of site activity, essential for maintaining an open campus environment. Shane Goodall, Security Manager at Wintec, describes the approach to security as highly proactive and collaborative: “by focusing on preventing issues arising, we now have a minimal policing role and the crime resolution rate is high”. This environment is underpinned by Gallagher’s security system, a core access control, intruder alarms and integration platform. Wintec first installed the Gallagher system (formerly Cardax FT) in 1999 and has since migrated this legacy system to Gallagher’s latest security technology platform. Security for the entire organisation, including satellite sites, is managed and monitored centrally from Wintec’s single Gallagher security system. Since initial installation, Wintec’s Gallagher access control system has grown from 7 to 240 electronically controlled doors in 2009, with another 40 planned - testimony to the scalability and flexibility of the system. Network friendly system communications The organisation first installed 6 cameras in 2004 which has increased to 7 DVRs and 85 cameras Wintec has integrated its imaging system to the Gallagher system delivering a visual record which can be matched to the audit trail of events in Gallagher Command Centre software. The organisation first installed 6 cameras in 2004 which has increased to 7 DVRs and 85 cameras (both analogue and IP). Another compelling aspect of the system for Wintec is the scalability and TCP/IP network friendly system communications. As well as monitoring and controlling staff and student access, equipment including computers, TVs, printers, audio visual resources at Wintec are also monitored through the Gallagher system. The ‘Gallagher Hub’, a new computer laboratory offering comprehensive IT resources is open 24 hours. The Hub contains 125 workstations, and there are plans to extend that number. Active monitoring of equipment though the Gallagher system has significantly reduced theft. Students and staff have scheduled access to shared IT resources, classrooms and lecture theatres. Manage cardholder data ‘Cardholder Import’, an XML Interface, supports the importation of cardholder data including course enrolments from their student record system to Gallagher Command Centre. Shane comments, “Student card issuing is an automated process which is enrolment-driven – a student’s access privileges are assigned according to their enrolled courses.” “To implement this, we defined a rules-based allocation of access groups in the Gallagher system using the XML interface. The interface is ‘live’ so that changes in the student enrolments database are immediately reflected in the Gallagher system. The student’s updated access privileges come into effect without delay.” Staff that interact directly with students are now empowered to manage cardholder data enabling the security team to focus on security. Students and staff utilise Mifare SmartCard functionality extensively, embracing them as an integral multiapplication tool in their modern educational environment – SmartCards are used to issue resources from the library and as pre-stored value cards enabling prepaid printing and photocopying. In the near future they will also be used in Wintec’s Pay and Display car-park and potentially as passes onto city council buses. Electronic access control At Wintec, security is not viewed as a discrete functional activity relegated to security staff only Stewart Brougham, Director of Internationalisation at Wintec, says students have given very positive feedback about their ID cards. In particular, the ability to verify the identity of staff members from their ID access cards provides peace of mind for students. The end result is a people-friendly campus. Future enhancements of Wintec’s security may include the utilisation of the CommCard solution from Gallagher to manage and monitor access to student accommodation. CommCard is a unique high level integration between the Gallagher Command Centre software and Salto off-line readers, delivering offline, non-monitored electronic access control for lower security doors. An overriding philosophy of collaboration has seen Wintec take a lateral approach to security, the value of which many organisations have yet to realise. At Wintec, security is not viewed as a discrete functional activity relegated to security staff only. The ongoing management of security is a joint effort between the security services team and the information services team. Increasing operational security The security services team manages the Gallagher system while IT looks after back end functions such as installation on the network and backup. Wintec has leveraged the convergence of security (access control) and other operational business functions recognising the tremendous potential for reducing risk and increasing operational security, safety, performance and efficiency. Looking beyond simply controlling and monitoring who goes where and when on site, Wintec is harnessing the reporting capabilities of Gallagher Command Centre to meet regulatory requirements. The Gallagher system enables the institution to report on actual space utilisation (not just space booking). Decisions are made for best use, and also to substantiate funding, based on these reports. “The key to space utilisation reporting are the frequency of reporting and the integrity and reliability of information,” states Stewart Brougham. It’s a national issue for educational institutes in New Zealand. Extending external partnerships “For Wintec, reporting is about ensuring compliance with regulatory requirements and is also a staff time management issue – reducing the administration load on lecturers, who would otherwise have to track student attendance manually.” Brian Fleming, Director of Gallagher Channel Partner, Concord Technologies, sites this lateral application of a security system as key to maximising the value of Gallagher to Wintec. Wintec has a strong relationship with Gallagher in the ongoing development of its technologies This collaborative philosophy extends to proactive external partnerships with their Gallagher Channel Partner, Concord Technologies, for the installation and maintenance of the Gallagher system, and with system designer and manufacturer, Gallagher. Having signed an agreement to continue in the capacity of a Gallagher field test site, Wintec has a strong relationship with Gallagher in the ongoing development of its technologies. Wintec’s success, in the last 5 years, as a test site reflects the competence of both its IT and security staff and the institute’s commitment to edge student services. Minimal training has been required. Software maintenance agreement There is open communication and information sharing between all internal and external parties involved, which means any issues that arise can be quickly addressed. Wintec has committed to a site maintenance plan with their security partner, Concord Technologies. The plan incorporates both software and hardware maintenance to ensure the system is maintained on the latest operating platforms within a known cost structure. A Software Maintenance Agreement also ensures enhanced ongoing system performance and reliability of the Gallagher system. Acknowledgements Gallagher would like to acknowledge the support of Wintec and security partner, Concord, with the development of this in-site study. Gallagher would also like to particularly acknowledge and thank Shane Goodall for the pivotal role he plays in championing the collaboration of these parties and for his outstanding support of the Northern Region Cardax User Group (NZ) in the capacity of Chairman of the group.
ASSA ABLOY Project Specification Group, a unit of ASSA ABLOY Opening Solutions UK & Ireland, has partnered with ColladoCollins Architects to leverage the benefits of its Openings Studio BIM software to make significant time and cost savings on the former Shredded Wheat factory project. The project, a thriving new commercial and residential development based in Welwyn Garden City in Hertfordshire, will consist of over 643 units and more than 7,100 doorsets. Encompassing a sensitive refurbishment of former Shredded Wheat factory buildings, the project is part of a huge development that includes over 1,200 units in total. Opening Studio BIM software Openings Studio is a BIM software tool that was developed to significantly improve the process of door scheduling Using ASSA ABLOY’s Openings Studio software, ColladoCollins has been able to save weeks of time and manpower when specifying and managing ironmongery schedules for the project. Openings Studio is a BIM software tool that was developed to significantly improve the process of door scheduling, visualisation and more. Users are able to focus on the design, installation and management of door openings – all within an information-rich environment. Easy door installation and management Specifying as many as 7,100 doorsets can be an extremely time-intensive task. Using traditional methods, information would be provided in countless separate schedules and documents, which would require a Revit operator to manually create and update, with someone else to then check for errors. Then, as the project develops, information may become out of date and therefore require individual doors to be flagged up and re-sent for advice. The time and manpower that goes into this process is not only inefficient, but also ineffective, with the prospect of human error still a prominent possibility. Software integration For these reasons, ColladoCollins began to work closely with ASSA ABLOY Project Specification Group to integrate Openings Studio with their own Revit model, allowing the firm to be able find all the relevant information and ironmongery schedules in a single place, delivered in one document. Martin Russell, Project Leader at ColladoCollins, comments: “Moving to BIM was a natural progression for us, and as market leaders, ASSA ABLOY was the obvious choice to assist us.” Integration of door hardware ASSA ABLOY's inputs have vastly improved the integration of door hardware within the former Shredded Wheat Factory project"“Utilising the advice from Eric Spooner, BIM Manager at ASSA ABLOY, as well as the Openings Studio software itself, we have managed to free up our team from tirelessly working through door hardware schedules. This means we can focus on architecture and aesthetics, knowing the specification and integration of the ironmongery is in hand and will seamlessly feedback into the project within the allotted timescales. “The information and advice provided by ASSA ABLOY has vastly improved the integration of door hardware within the former Shredded Wheat Factory project. With a project of this size, sharing information can be quite a task – from large file sizes to sourcing relevant information. The prompts from Openings Studio make transforming information clear, concise and generally easy to follow. BIM software tools “At ColladoCollins, we pride ourselves on designing and delivering high quality buildings with a sensitive, sustainable approach, utilising a strong design ethos with a strong technical background whilst understanding the commercial challenges facing our clients. Openings Studio enhances our ability to provide this service and we would seize the opportunity to work with ASSA ABLOY on similar projects in the future.” Eric Spooner, BIM Manager at ASSA ABLOY, adds: “As Openings Studio flags up any queries and automatically updates in live time, it is easy to see any discrepancies and changes within the schedules. By re-sharing the model information, it then also allows us at ASSA ABLOY to view the changes and feedback to architects – allowing us to work in close collaboration at every stage of a project.”
Round table discussion
An aging employee population and the influx of a new generation of workers and customers is driving change in the physical security industry. Millennials – those born in the 1980s and mid-1990s – are especially impacting how the industry operates, the technologies it produces, and the customers it serves. This tech-savvy generation grew up with the Internet at their fingertips. They embrace innovation in all its glory and expect it to play a seamless role in their lives – and work. We asked this week’s Expert Panel Roundtable: How are millennials changing how security systems are designed, installed and/or operated?
The new school year is a good time to reflect on the role of security in protecting our schools. From video to access control to some newer technologies, our Expert Panel Roundtable found plenty to talk about when we asked this week’s question: How does security technology make our schools safer?
In the digital age, software is a component of almost all systems, including those that drive the physical security market. A trend toward hardware commoditisation is making the role of software even more central to providing value to security solutions. Software developments make more things possible and drive innovation in the market. We asked this week's Expert Panel Roundtable: How do software improvements drive physical security?
Security management: Manufacturers & Suppliers
- Dahua Technology Security management
- Vicon Security management
- Seagate Security management
- Bosch Security management
- CEM Security management
- IFS Security management
- VIVOTEK Security management
- Vanderbilt Security management
- Hikvision Security management
- Parabit Security management
- BCDVideo Security management
- Pelco Security management
- ComNet Security management
- Arecont Vision Security management
- TESA Security management
- Hanwha Techwin America Security management
- DSC Security management
- FLIR Systems Security management
- Messoa Security management
- Optex Security management