Security integrators are often tasked with a multitude of responsibilities which could include a variety of installation, integration or design tasks made up of sprinkler systems, fire alarms, access control, HVAC, video surveillance systems and networks; and then pile on maintenance, training and analytics. Traditionally, most security integrators have installation backgrounds but are now expected to be IT savvy, too. Even the most proficient IT professionals may not fully grasp the complexity...
Boon Edam Inc., global provider of security entrances and architectural revolving door solutions, has announced the breadth of its 2019 technical training program, including scheduled factory trainings, online webinars and roadshow trainings throughout the United States. Technical training events are free of charge to Boon Edam distributors and integrator partners and include one to three days of intensive product instruction and hands-on exercises. Boon Edam Roadshow In 2016, Boon Edam introd...
People and vehicle access control specialist, Nortech’s technical training courses have been specially designed to make sure that installers/system integrators are equipped with the skills and knowledge needed to install, maintain and troubleshoot Nortech systems. Real-world security issues Led by highly experienced technical experts, Nortech’s courses combine hands-on practice with theoretical sessions covering real-world security issues and take place at the company’s dedic...
Perpetuity Training, part of the Linx International Group, is proud to announce the first graduates from the International Security and Risk Management MSc, developed and delivered by Perpetuity Training in collaboration with the University of South Wales (USW). The ceremony took place in Pontypridd on 17th December 2018. The course addresses the critical issues in security management and combines theoretical knowledge with professional best practice. The MSc can be taken on a part-time (two-ye...
Security expert Abloy UK is highlighting the importance of access control systems that offer dynamic lockdown, following recent reports that retail stores are being advised by counter-terror police launching the Protect and Prepare campaign, to develop emergency contingency plans recommending a 'sixty second' security checklist to avoid panic during reports of terror attacks. High street shops throughout the country hit their busiest period during Christmas. With large numbers of people around,...
ASSA ABLOY is pleased to announce its new Preferred Installer program. Building on decades of experience in the higher education market, ASSA ABLOY has developed a national network of Intertek certified hardware installers who are highly skilled in providing physical installation of its integrated electronic locking devices. Systems integrators, who often face staff shortages, can take advantage of this network of installers to maximise their efficiency. The ability to outsource this skill help...
Boon Edam Inc., global manufacturer of security entrances and architectural revolving doors, is proud to announce the opening of a full-service Technology and Training Center in San Jose, CA. This is the second US-based location for the company outside of its headquarters in Lillington, NC; the first location, opened in 2015, is in mid-town Manhattan at 1140 Broadway Avenue in New York City. The address of the new Silicon Valley center is 2161 O’Toole Ave San Jose, CA. Boon Edam’s Technology & Training Center Opening a Boon Edam showroom on the West Coast enables more security professionals and architects to get hands-on with the company’s wide array of security entrance solutions. The new Center has the following Boon Edam products available for demonstration: Tourlock 180+90 – The top-selling security revolving door in the Americas renowned for preventing tailgating and piggybacking. Circlelock mantrap portals – combining piggybacking prevention with 2-factor authentication for sensitive interior locations. Turnlock 100 - full-height turnstile used as a deterrent at the perimeter fence line. Lifeline Swing and Slide - optical turnstiles with swinging and sliding barriers that combine tailgating detection with sleek design for supervised lobby applications. Each product is integrated with the latest access control and biometric authentication technologies, as well as VMS, IP cameras and visitor management systems. Visitors to the Center can see how different solutions work together to provide various levels of protection from unauthorised entry into facilities as well as witness the ease of authentication, monitoring and traffic flow. A sample of the technology solution partners featured in the Center are: Access Control: Lenel, Software House, AMAG, Honeywell, Hexicurity Secure Communications: Enclave VMS: AMAG, Genetec Card Readers: Essex, HID Biometric Readers: IrisID, Stonelock, MorphoWave The San Jose Technology and Training Center will also host complimentary technical training sessions monthly for local reseller partners IP Cameras: Bosch NVR Servers: BCDVideo Visitor Management: Soloinsight Hardware: LifeSafety Power Technical training on entrance solutions The San Jose Technology and Training Center will also host complimentary technical training sessions monthly for local reseller partners. Each training session will provide intensive, hands-on instruction about installation, service and maintenance for the company’s security entrance products “We’ve experienced tremendous growth in security entrance orders over the past 5 years to large, multinational companies, many of which are based on the West Coast,” said Greg Schreiber, Senior Vice President of Sales, Boon Edam. “Today we’re investing in that success to give these customers the opportunity for hands-on demonstrations and technical training of entry solutions. We’re excited to finally bring this high level of service to the West Coast.”
Security-Net, Inc., a global provider of security system services, is celebrating its 25th Anniversary this year, a testament to the strength of the organisation that today brings together the best independent security systems integrators to collaborate on enterprise-level projects, technology acumen and business practices. Security systems integrators group Since its founding in 1993, Security-Net has been recognised as the top group of security systems integrators within the industry Since its founding in 1993, Security-Net has been recognised as the top group of security systems integrators within the industry. Its members are regularly included in the SDM 100 Top Systems Integrators list, an annual listing of the top security systems integrators in North America, and the Security Systems News 20 Under 40, an annual award that recognises the top up and coming security systems integrators. “The idea for Security-Net originated during a manufacturer’s award trip when several security systems integrators expressed a desire to discuss common problems and business best practices with industry peers,” said Bill Savage, President of Security Control Systems of Houston and one of the four original founders of Security-Net. “A year later we had an organisation formed.” Security-Net project management platform Over the past 25 years, Security-Net has evolved into an organisation that now collaborates on national projects, helps its members stay up to date on the latest technology issues and trends, and provides sales and project management training to its members. The group has also launched its own project management platform. “We’re proud of how Security-Net has grown dynamically over the years,” said J. Matthew Ladd, a member of the Security-Net Board of Directors. “Within the past 10 years we’ve added numerous sub-committees, including Tech-Net, Ops-Net and Sales-Net, and provided member companies with access to programs to strengthen their sales and project management skills.” Global security services Today, Security-Net members regularly collaborate with other member companies on projects that expand beyond their geographic areas of business, providing customers with global security services through its network of security systems integrators. Security-Net’s membership based currently includes 21 members a combined 50 offices in North American, Brazil, the Dominican Republic, the United Kingdom and Europe.
Matrox Graphics Inc. will demonstrate a variety of ground-breaking, IP-based innovations at the 2018 Interservice/Industry Training, Simulation, and Education Conference (I/ITSEC). Featuring the industry’s highest-quality capture and encoding technology at the lowest bitrates, Matrox Maevex enterprise encoders, Extio 3 IP KVM extenders, and Mura IPX video wall and multiviewer cards will stream, extend, record, decode, display, and control multiple 4K video content on advanced modelling, simulation, and training systems—all deployed on a standard one Gigabit Ethernet network. I/ITSEC attendees will get a first-hand look at an uncompromised, high-performance 4K-over-IP ecosystem—from capture all the way to consumption—that is critical for a wide range of virtual and immersive training applications in the government, military, industry, and academic and research sectors. Simultaneous capture, streaming and recording Matrox Extio 3 IP KVM extenders provide seamless control of training and simulation systems from a distanceMatrox Maevex 6120 and Maevex 6150 dual and quad 4K enterprise encoders allow for the simultaneous capture, streaming, and recording of multiple 4K inputs. These powerful all-in-one appliances deliver content to on-premises endpoints, to cloud and internet services, and also record for later editing and viewing, concurrently. Matrox Extio 3 IP KVM extenders provide seamless control of training and simulation systems from a distance. Delivering exceptional 4Kp60 4:4:4 or quad 1080p60 4:4:4 performance over a standard 1 GbE network—at unprecedentedly low bitrates—Extio 3 enables the design of a scalable and cost-effective KVM matrix over IP to securely route any system to any remote location on the network. Monitoring and visualisation of data points Matrox Mura IPX video wall and multiviewer cards offer the highest-density capture, encode, decode, and display capabilities on the smallest footprint. The versatile Mura IPX cards are ideal for the monitoring and visualisation of many data points (baseband, IP, or local applications), as well as for sharing and/or recording—either a region of interest or the entire video wall—for real-time information sharing or review purposes. See Matrox in action at I/ITSEC 2018 (Orlando, USA), booth 627, from November 26-30, 2018.
Linx International Group has revealed that in the past 18 months, PerpetuityARC Training and Tavcom Training has supported more than 350 armed forces personnel in making the transition to ‘civvy street’, through its award-winning security management and security systems courses. The announcement follows an article published by The House magazine on 7th November, in which the Defence Minister, Tobias Ellwood, was asked whether former soldiers’ employment prospects could be affected by current perceptions regarding their wellbeing, to which he is quoted as saying: Preferred supplier “Completely. You could have this attitude where an employer who’s not familiar with the Armed Forces, they may say, ‘two people, one has served in the Armed Forces, are they going to go doolally on me?’” Linx International Group is a preferred supplier to the Career Transition Partnership (CTP) that has, to date, assisted over 235,000 service leavers He added: “We need to kill that attitude because it’s decidedly untrue and unhelpful. We’re doing a lot of work with employers themselves, with businesses and organisations, so they can see the value of that.” Linx International Group is a preferred supplier to the Career Transition Partnership (CTP) that has, to date, assisted over 235,000 service leavers. Exemplary work ethic Ciaran Barry, Group Operations Director at Linx International Group, who himself served in the British Army for ten years, states: “Personnel leaving the armed forces have rich and diverse experience and knowledge coupled with an exemplary work ethic that is invaluable across every aspect of the security sector. Through the provision of our classroom and online training courses we are enabling these service men and women to obtain the skills and associated qualifications that make them highly attractive candidates for employers.” Ciaran adds: “As we commemorate the armistice, it is important to reflect not only on the admirable service to the country both past and present, but also to recognise the immense contribution these people continue to make to society throughout their lives after their military careers have ended.”
With an extensive background in security and manned guarding, Paul Lotter has been appointed as the Regional Operations Director at UK’s renowned security services provider, Corps Security. Lotter will focus on operations within London and the South of England and is responsible for overseeing all aspects of service delivery to the customer. Security services expert Lotter has almost 20 years of experience working in the security industry. He previously worked with other security service providers, looking after high-profile corporate customers in the South West of England and around Greater London, managing the strategic direction of all the operational security requirements as well as also managing various buildings in the south of England. Commenting on joining Corps Security, Lotter said: “I was so impressed by Corps’ rich heritage that when the opportunity arose, I couldn’t turn it down. Being able to work for an organisation that has the ability to use its profits to support charities each year is truly unique. Corps is able to make a real difference in this way and this is something I’m truly proud to be a part of.” IT security “Corps has a clear vision from the top of the business that everyone is able to get behind. We are a dynamic business helped by our innovative IT security offerings.” Mike Bullock, CEO at Corps Security said: “We’re thrilled to welcome Paul to the team, he’s already implemented positive change and shown his expertise in the sector.”
PSA, the world’s largest security and systems integrator consortium, announces the education lineup, conference agenda and a new exhibit showcase date for TEC 2019 to be held March 11-14, 2019 at the Sheraton Downtown in Denver, CO. TEC, presented by PSA, is the premier education and networking event for all professional systems integrators in the security and audio-visual markets. This year’s education conference will feature over 100 education sessions, workshops and certification trainings from industry leading experts and partner organisations. Dedicated learning tracks The event will also leverage a full-day of dedicated exhibit hours on Thursday, March 14, 2019 The event will also leverage a full-day of dedicated exhibit hours on Thursday, March 14, 2019 where more than 125 security and audio-visual vendors will showcase their product and services along with networking events that utilise the offerings of Denver. “We are very excited about the changes coming to TEC this year that will further open the doors of this conference to more systems integration companies across the nation,” said Kim Garcia, director of marketing for PSA. “For many years TEC has been open to all industry professionals to attend regardless of their affiliation with PSA because the training we offer is meant to better the industry as a whole as well as the attendees in their personal disciplines.” Exchanging information The TEC 2019 education program will deliver invaluable sessions to systems integration professionals with a desire to stay relevant and thrive in changing markets through personal and professional development. With dedicated learning tracks focused on job function, attendees will leave TEC with ways to improve operational efficiencies, add additional value to their businesses and their customers’ journeys and support emerging market trends including managed services and cybersecurity from their own vantage points. PSA TEC is all about building relationships and exchanging information with people who share the same challenges you do every day" “TEC is really one of the best kept secrets in our industry for any professional looking for a training and exhibit venue where they don’t get lost in the crowd,” said Garcia. “PSA TEC is all about building relationships and exchanging information with people who share the same challenges you do every day. Whether you are a business owner, technician, project manager, sales and marketing professional or operational support, there is training available to you at TEC that can make you better at your job.” General registration opens on December 12, 2018. PSA Owners/Members will have exclusive registration access starting on December 5, 2018. Discounted early bird pricing is available until January 12, 2019 for all attendees.
There’s only so much a corporation can do to counteract the threat of a major incident. You can ask everyone to be vigilant and to report anything suspicious, but you cannot stop someone intent on deliberately starting a fire, threatening a work colleague with a knife or something much worse. And of course, most businesses recognise that even routine events – such as burst pipes, IT system failures, extreme weather event or power outages – can have significant consequences unless they are quickly brought under control. Training security officers Governments and organisations across the world are increasingly encouraging businesses to re-assess risks and to plan for and conduct drills for major emergencies. This is driving different agencies and companies to invest in new skills, resources and systems, and encouraging businesses to routinely re-evaluate their emergency response strategies. UK police forces are increasingly training security officers in the public and private sectors on how best to react to potential terrorist incidents For example: UK police forces are increasingly training security officers in the public and private sectors on how best to react to potential terrorist incidents, as part of the UK government’s Action Counter Terrorism programme. And organisations including the Association of University Chief Security Officers (AUCSO) and Higher Education Business Continuity Network (HEBCoN) are developing customised training for their members to improve their own response and business continuity plans. Mass notifications systems Whether an organisation is facing a terrorist attack or a severe weather event, follow up reports consistently identify that the same types of challenges are common to all crisis situations, with similar errors often occurring again and again. Typically, these are centred on three key areas: poor communications, fractured command and control structures, and delayed deployment of resources. Communications skills and technologies clearly play a pivotal role in how effective an organisation is in responding to major incidents, particularly when it comes to assessing the situation and its implications, moving people towards safety and providing updates as an incident unfolds. However, when an organisation is considering its technology options, emergency response and mass notification systems (MNS) are often touted as the ideal platform to deliver all the required critical communications and ongoing updates. UK police forces are increasingly training security officers in the public and private sectors on how best to react to potential terrorist incidents Emergency notification system All the incident reporting, command and control, and communications functions have been brought together on a single platform But, if an organisation does not know exactly where all its staff or students are, and it cannot see the location and availability of its first responders and other emergency coordinators relative to them and the incident, then how useful is it to send a top-down alert to everyone? And what about fast moving or multi-centre incidents, where previously agreed evacuation procedures, recommended actions or mustering points may need to change if an incident takes an unexpected turn? Many organisations may have been lulled into believing that an emergency notification system will allow them to confidently handle all the communications aspects of virtually any crisis. In reality, too many businesses are still unaware that there are now much more sophisticated and proven technologies where all the incident reporting, command and control, and communications functions have been brought together on a single platform. Using live map tracking The benefit of using these advanced and more integrated approaches – often categorised as mobile distributed command and control systems – is that they enable faster and better decision making in a crisis using real-time feedback and two-way dialogue with those closest to the emergency. And they avoid the risks of any potential delays, miscommunications or mistakes that can happen when an organisation is under pressure to respond and often switching between multiple systems. Leading universities and multi-national corporations are already using new mobile/web-enabled platforms to improve their incident response These next generation emergency management platforms have been specifically designed to enable real-time mapping of an organisation’s security assets and its users on a single screen and to fully integrate it with a highly targeted geo-fenced notification capability. The mass notification aspect of the system can then be used to advise specific groups on the best actions to take at their location as an incident develops. The use of live map tracking enables real time mapping of an organisation's security assets Segmented messaging Many leading universities and multi-national corporations are already using these new mobile/web-enabled platforms to plan, manage and improve their incident response, leading to 50% faster reactions and more positive outcomes.During a crisis, users can receive push notifications so the security centre can immediately see their exact location and advise them accordingly The systems have been widely adopted within the higher-education sector, but they are equally applicable to any large company with multiple international sites or those situated in research or corporate campuses where the bulk of assets and people are based in one or more key locations. Typically, systems provide users with a smartphone app that they can use to call for immediate emergency or first aid support when at work, or to report something suspicious which could prevent an apparently minor incident from escalating into a full-scale emergency. During a crisis, users can receive push notifications, SMS and E-mails asking them to open the app if they are not already logged in, so the security centre can immediately see their exact location and advise them accordingly. Supporting dispersed mustering Now that communications can be more nimble, responsive and flexible this can support the increasing numbers of planners are recognising the advantages of dispersed mustering. This is a strategy that has been developed to reduce the risk of secondary attacks on unprotected people complying with instructions to evacuate from premises and gather in what are, effectively, exposed locations. It is now acknowledged that evacuees waiting outside for any length of time are more vulnerable to targeted attacks or to injury, from flying glass for example. With dispersed mustering – a strategy made more effective by these new mobile distributed command and control systems - a building’s occupants can be advised not to go outside, but to move to known safe internal locations. People in each specific area can then be kept regularly updated. Many corporations are now using new mobile/web-enabled platforms to improve their incident response Coordination between response agencies The software platforms can be integrated with an organisation’s fixed security infrastructure to take real-time sharing of information First responders are permanently logged in, so the emergency operations centre can see their exact locations in real-time and can advise what actions to take in mustering people or in setting up and protecting security cordons. Bringing everything together on one platform, with real-time feedback and in a fully integrated system also removes what is often seen as the weakest communication link in managing any major incident: the need to rely on conventional two-way radio as the sole means of communication between the command and control centre and its first responders and other team members on the ground. The software platforms can be integrated with an organisation’s fixed security infrastructure to take real-time sharing of information to a new level for improved collaboration, coordination and communications between users, the incident management team and external agencies. Improving emergency response strategies One of the most powerful features of some of these new systems is the ability to record and view all alerts, responses and the detailed conversations between first responders, emergency coordinators and other parties. This allows the systems to be used to simulate major incidents involving inputs from the emergency services and other key agencies and to ensure the organisation’s crisis management plans have been fully tested against a range of possible incident scenarios.
Whether you are a veteran in the access control world or have never installed a card reader before, there are always ways to increase profits in the ever-evolving world of access control. The hope is that by considering a few key focal points, you can find ways to increase market share. Whether we are releasing an electronic lock through a simple intercom button or using biometric and multi-authentication based on a database; the tactics for bringing on more revenue is the same. Learning to focus on a few key items can help open up opportunities. Business access controls Understanding vertical markets is a strong strategy for success in increasing your profits with access controlIf you are new to access control, it’s important to determine the right product offerings for your business model and experience level of your team. Mistakes in estimating or installing can be costly and complex. Take advantage of manufacturer training both online and in the classroom for both your sales team and installation department. It’s important to understand the fire and building codes in your area to make sure you design the proper solution for your customers. Furthermore, understanding the products, components and proper wiring can save you money in labour and materials. Today we will look at four focus points: vertical markets, cloud-based access control, technology upgrades, and preventative maintenance and service agreements. These four focal points are simple to implement and can be easily added to your current operation. Vertical markets Understanding vertical markets is a strong strategy for success in increasing your profits with access control. The concept is that understanding a certain vertical and their security needs can increase your sales team’s marketability. If you spend your time focusing on the healthcare industry, for instance, you will see that HIPA requirements open doors for selling access control. Getting to know the regulatory concerns of different verticals is a great strategy for more effective sales Having logs of who entered your HR files room or patient records storage is a crucial part of addressing privacy concerns. Getting to know the regulatory concerns of different verticals is a great strategy for more effective sales. Another example could be apartment communities or other multifamily dwellings. In this competitive marketplace, these complexes are looking for ways to stand out in their market. Knowing this and being able to offer amenities like secured locks with Bluetooth credentials that tenants can open with their smartphones is a selling point for you and for your customer. Building on each customer you contact within a vertical is like free sales and marketing training. The more you learn from each potential client, the more you increase your conversation starters for the next potential client. Cloud-based access control With the growing cloud-based access control market, integrators can find more opportunities in small businesses and vertical markets that typically wouldn’t be on the radar of your sales team. A typical card access system often makes the move from the traditional lock and key systems to electronic card access cost prohibitive. This is due to the large upfront costs for a server, software and annual licensing. With cloud access, integrators can offer less expensive upfront costs with low monthly subscription fees that cover all software updates, database backups, security patches and more. The real benefit for the integrator is the reoccurring revenue. By helping our clients save money on server, software and IT infrastructure costs, we are securing reoccurring revenue for our companies that increase our profitability. Building reoccurring revenue not only provides cash flow but also keeps your name on the top of the minds of your customer and that leads to additional sales. By helping clients save money on server, software and IT infrastructure costs, we are securing reoccurring revenue for companies that increase profitability Technology upgrades Another often overlooked opportunity is technology upgrades. Training your sales staff and even service technicians to watch out for clients with older technology can reap major benefits. When you bring new technology to your clients, you show another value that you bring to the table. Even if your client isn’t ready to make an upgrade, you can easily plant a seed that will get their minds and budgets rolling. An easy example is a customer with an older intercom door access system An easy example is a customer with an older intercom door access system. This may have met their needs 10 years ago when it was installed, but the office has grown and perhaps an integrated card access intercom system is a great technology upgrade. Bringing this to the customer will once again show that you are the “subject matter expert” and your customer will be more apt to refer you to their friends and colleagues. Another easy way to find technology upgrades is to dig through your ageing client list and build a list of potential targets that you have not visited lately. If you keep records of what was installed previously, it will make it easier to plan ahead and bring solutions to your next visit, saving your sales staff time and again building confidence with your clients. Preventive maintenance and service agreements One thing that sales teams often miss is the opportunity to add service agreements and preventative maintenance agreements. Even if a customer already has an access control system, they may not have a service provider and may be interested in securing a service agreement. Typically, a service agreement can be written to cover all parts and labour or just labour for an annual feeShowing the value of a service agreement is paramount, adding annual or semi-annual preventative maintenance to your service agreement is one way to add value. Inspecting locking mechanisms, request to exit motions and buttons, door status switches, headend equipment, batteries and power supplies, can save your customer from a costly after-hours service call or the inconvenience of a non-functioning access control system during business hours. Additionally, checking computer hardware and software logs for errors can save a customer from a catastrophic failure. Typically, a service agreement can be written to cover all parts and labour or just labour for an annual fee. It is helpful to come up with a percentage of the install value that makes sense so that your sales team can easily quote a service agreement for your customer. Offering several levels of service also opens the table for negotiations. You can offer an “all parts and labour 24/7” or a “parts and labour M-F 8AM-4PM”, as an example. Offering guaranteed response times can also be a marketing strategy. Critical area access management Checking computer hardware and software logs for errors can save a customer from a catastrophic failureA 24-7 facility that has 200 employees moving in and out of critical areas may be a great potential customer for a high-level service agreement with semi-annual preventative maintenance and a guaranteed 4-hour response time. Where a small office that is only open during standard business hours may be better suited for a labour only M-F with annual preventative maintenance inspection. The point is that a creative, intentional, and focused approach to access control can yield the fruit that brings long-term success to your team. Building a plan and learning from each prospect, sale, and installation will develop a process that brings results. Attending a trade specific expo like ESX will give you the opportunity to meet with manufacturers and other integrators that can help you implement a product offering and strategy for success.
Schools today are charged to provide an environment that is both safe and conducive to learning, which can be difficult considering the range of security incidents and challenges they face, including bullying, fights, graffiti, theft and more. In addition to working within often tight budgetary constraints, a main challenge is to provide the highest level of security in an aesthetically pleasing way that doesn’t make students feel as if they are in prison. While these two needs may seem mutually exclusive to some degree, that doesn’t have to be the case. School security can be achieved without building 20-foot walls or putting barbed wire around the perimeter. The key to balancing the security and learning environment can be found in the four pillars of a good school security strategy, namely people, practices, technology and physical environment. A mobile app or text notification system could be used to alert students and staff of potential problems Situational awareness One of the most effective measures to take is to educate staff and even students to learn to be aware about their surroundings and adopt the 'If you see something, say something' mentality. In an emergency, time is of the essence, so the speed of response becomes critical. Educating staff and students to recognise potential problems and report them is a good first step. Augmenting this with mobile apps and/or texting capabilities, for example, that allow someone to send a photo to school security or law enforcement for quick assessment and evaluation, can speed response even more. A mobile app or text notification system could also be used to alert students and staff of potential problems and provide instructions on what steps to take in order to remain safe. By providing real-time situational awareness about potential responses, these types of technologies can reduce the number of armed guards or resource officers needed to patrol a school or campus, which also makes students more comfortable and able to learn in a non-prison-like environment. Security best practices Every school should establish a set of security policies and procedures and ensure that staff and students understand what to do if they suspect a problem or if an incident should unfold at the school. However, too often, schools may not know where to start when seeking out best practices. And once these policies are in place, there may be confusion about how to audit them to ensure people are properly educated. The NFPA has begun work on a school security standard that would address a range of issues schools face on a daily basis A number of organisations are available to aid with this process, such as the Partner Alliance for School Safety a group founded in cooperation with SIA (Security Industry Association), which provides resources and tools to help schools and security professionals evaluate and establish the best security protection for their buildings. These guidelines and best practices are designed to help schools spend their often limited funds on the right security solutions. Safe and Sound Schools provides downloadable school security toolkits, and the National Fire Protection Association (NFPA) has recently released the NFPA 3000 Active shooter response guidelines and has begun work on a school security standard that would address a range of issues schools face on a daily basis. The key takeaway is that the information is out there, and the organisations mentioned above are excellent resources for helping schools create safe, secure and learning-conducive environments. Technology in school security The second thing that needs to be considered is how technology can be brought to bear to contribute to school security. Video surveillance with video analytics can be deployed to monitor areas at certain times of day. For example, once school starts, there shouldn’t be a lot of activity in the parking lot or in particular areas around the school. For these situations, intelligent cameras with video analytics can be used to detect activity in those areas of interest to alert school security that something may need their attention. This might be a vehicle entering a lot or driving against the normal traffic flow, which may simply be a parent arriving to pick their child up early, or it could be something worth following up on. Radar detection is ideal for perimeters, where a device can be set up unobtrusively to alert when someone enters a particular area In any case, this is something that should be brought to the attention of someone who can quickly assess the situation and determine what, if any, response is needed. Because the goal in a potentially dangerous situation is speed response times. The faster you’re able to detect something using technology, the faster you’re able to respond. Therefore, being able to identify something happening in a parking lot and alert school resource officers could provide 30 seconds or a minute head start for response, which can get the school into a lockdown situation and get first responders on site more quickly.Facial recognition systems and providing access through smartphones could help create a more welcoming and secure environment for students, staff and parents After-hour monitoring solutions Monitoring buildings and facilities after hours presents a different set of challenges. For sporting events, the National Center for Spectator Sports and Security (NCS4) at the University of Southern Mississippi provides best practice guidance for sporting facilities and events not only just for universities but even including those at high schools. It’s been shown that using lighting at night can deter crime. However, it can be expensive to keep a building and grounds illuminated all night, every night. To mitigate these concerns and potential costs, there are video cameras available with extreme low-light capability that allows them to see in near-dark or in some cases complete darkness. This allows a school to save money by turning lights off while achieving a level of surveillance performance similar to daytime deployments. Radar detection Another technology for effective school security, both during and after school hours, is radar detection. This is ideal for perimeters, where a device can be set up unobtrusively to alert when someone enters a particular area. Radar can be deployed with a single PTZ camera, which can track whatever has been detected to provide real-time situational awareness for a school resource officer or law enforcement to investigate to determine the potential threat, if any, related to the perimeter breach.Following the four pillars of school security can ease the process while improving the effectiveness and efficiency of securing educational facilities More often than not, schools are faced with issues that are not necessarily the worst-case scenario everyone fears, such as how to identify parents and others who are authorised to pick a child up from school early. In this instance, facial recognition systems and providing access through smartphones could help create a more welcoming and secure environment for students, staff and parents. Lighting and landscaping In addition to technology, one of the things that can contribute to a safer school environment is environmental design. CPTED provides four basic principles, one of which is natural surveillance, which follows a 'see and be seen' philosophy. In other words, when people know they can be seen, they are less likely to commit a crime. The main points in this general principle are lighting and landscaping. For example, a school doesn’t want to block potentially vulnerable areas with landscaping, so the height and thickness of any potential landscaping elements should be carefully considered. In general, openness and visibility should be the guiding factors. Securing physical environment Another aspect of the physical environment is maintenance. If a window gets broken but isn’t fixed right away, that tends to invite vandalism. These are just two of the guidelines CPTED offers for creating a more secure environment that doesn’t feel like a prison. In general, finding the right mix between maintaining security and providing a welcoming, aesthetically pleasing and learning-conducive environment can seem like a difficult – if not impossible – task. Following the four pillars of school security can ease the process while improving the effectiveness and efficiency of securing educational facilities.
The last day of Global Security Exchange (GSX) in Las Vegas proved to be the calm after the storm. But a slower third day could not undermine a largely successful 2018 show for exhibitors and attendees. Sometimes the success of a trade show isn’t measured by numbers of attendees (which were reportedly down again this year). Sometimes it’s the individual successes that make an impression. “Just learning about this made the whole trip worthwhile,” said one GSX attendee at the Johnson Controls booth, referring to the company’s new PowerSeries Pro intrusion devices. It’s the kind of feedback that makes the expense of exhibiting at a big trade show worthwhile. The new PowerSeries Pro is an extension of Johnson Controls’ existing line that is expressly designed for the commercial security market. The ‘hybrid’ (wired or wireless) device offers ease of installation and full cybersecurity including 128bit AES encryption with spread spectrum for no jamming or interference. It employs frequency hopping technology first developed for the Israeli defence force. Wireless technology for cybersecurity PowerG eliminates the need for wires by providing ‘invisible wired technology’, a marketing term that emphasises the cybersecurity of the product PowerSeries Pro uses PowerG wireless technology and expands the portfolio of PowerG devices from residential through commercial. For use in a wired solution, the main advantage is ease of installation; terminal blocks ‘pop out’ easily and can be wired and plugged back in. Alternatively, PowerG eliminates the need for wires by providing ‘invisible wired technology’, a marketing term that emphasises the cybersecurity of the product – wireless at the same level of cybersecurity as wired. Johnson Controls addresses three big factors with the product line: cybersecurity, user control, and easy installation and dependability. It’s part of Johnson Controls’ broader approach to provide ‘one-stop shopping’, enabling an end user to control their environments, video and access, and protect their contents, according to the company. Need for more security in K-12 schools In addition to reaching end users, lock company Allegion sees the show as an opportunity to meet with technology partners. “It’s great to bring together a concentration of people in the industry,” said Brad Aikin, Channel Led Business Leader, Integrator Channel. “We have had good conversations with technology companies here at the show in terms of partnering, both physical access control and OEM partners. We have also had good conversations with the integrator channel.” From speaking with education end users at GSX, Aikin sees a large unmet need for security in K-12 schools, more so than in colleges and universities. “K-12 is underserved,” he says. “They need to identify their priority of needs, and now they can serve needs they couldn’t before, both layering levels of security and phasing in implementation over time. Now things can be applied and tried out without disrupting the environment.” An example is the Von Duprin RU RM (Remote Undogging and Remote Monitoring) door exit devices, which are being integrated by access control partners Sielox, IDenticard and Vanderbilt. Intelligence is added to the door exit device to enable inexpensive monitoring of secondary, previously unconnected doors. The doors can be monitored and locked or unlocked at various points in the day. Lock company Allegion sees the show as an opportunity to meet with technology partners Bridging the gap between IT and physical security One exhibitor – ADT – noticed more information technology (IT) professionals accompanying their physical security counterparts at this year’s GSX exhibition. “They come along to kill dreams on the spot,” said Morgan Harris, Senior Director Enterprise Solutions, noting the IT department’s frequent hesitancy to add untrustworthy elements to the network. ADT is looking to transform and expand its 144-year-old brand in the commercial security space and has completed eight acquisitions in the last year to accomplish the goal. Some of the acquisitions build on ADT’s expanding cybersecurity initiative, which is both a fully-functioning stand-alone business and an effort to bridge the divide between IT and physical security. ADT is positioning itself to manage enterprise risk in the broadest sense. Combining IT and cybersecurity The Internet of Things (IoT) is fuelling convergence but are we missing out on how to talk to each other and communicate effectively between IT and security?" “The Internet of Things (IoT) is fuelling convergence but are we missing out on how to talk to each other and communicate effectively between IT and security?” asked Harris. “Projects have failed because information was lost in translation.” ADT seeks to have skillsets, experience and certifications on both sides of the issue. “It enables us to be the in-between,” says Harris. “We can blend the two together and be the translator. It’s great for both sides, advocating for security counterparts and for the network simplifies deployment and processes.” Harris sees a trade-off between cybersecurity and convenience in the industry. For example, if a manufacturer says they have a simplified process and only offers firmware updates once a year, cybersecurity suffers, he said. Lack of third-party testing is another way that manufacturers sometimes trade cybersecurity for convenience, at heightened risk to integrators and end users. Training courses for integrators and partners Milestone Systems is expanding its level of involvement with integrator partners, and now provides Partner Business Reviews (PBR) to assess an integrator’s activities, sales and training, pipeline and marketing initiatives. The partner reviews often uncover issues that can be easily rectified through additional training, says Megan McHugh, Milestone’s Training Marketing Manager, Learning and Performance. Milestone uses a dashboard to track each integrator’s completed training courses and can point out additional courses needed to ensure an integrator partner’s success. Milestone offers a variety of in-person, e-learning and YouTube video courses to train installing partners, systems integrators and self-integrators on best practices Milestone offers a variety of in-person, e-learning and YouTube video courses (in 12 different languages) to train installing partners, systems integrators and self-integrators on best practices. ‘Cloud Labs’ are instructor-led online classes. All courses are linked to a variety of support resources. Sometimes a simple checklist accessed on a smart phone can ensure that every aspect of an install is performed and can instil added confidence in customers. The open platform company’s new agile development cycle – releasing multiple versions of XProtect software throughout the year – creates extra challenges to keep learning initiatives up to date. Along with each new release, various existing courses are updated. The concepts of “training and certification” are being replaced at Milestone with “learning and performance,” says McHugh. Milestone is also looking to hire 170 new R&D staff and open a new centre in Barcelona (in addition to current R&D centres in Copenhagen and Sofia, Bulgaria). Making camera installation easy Hanwha Techwin is another company that is seeing more interest in cybersecurity, as well as concern about whether a product is supported professionally. They have doubled-up production in South Korea and added capacity in Vietnam to avoid manufacturing in China. Thinking about their integrators, Hanwha Techwin is putting more emphasis on making installation easy. Installation costs may be up to 50 percent of a job, so easier installation frees up money to buy more or better cameras. With a new design of their cameras, an electrical contractor can now install the camera base and conduit, and then the integrator can easily plug in the camera later. Camera bases are common across multiple models, so a customer could switch out a 5-megapixel for a 2-megapixel camera later on if they want to (same housing plate). ‘Skins’ allow the colour of cameras to be changed to match surrounding décor. “We are changing the idea of how people approach selling a camera, and it’s a whole new idea of how to install cameras,” said Tom Cook, Senior Vice President, North American Sales, Hanwha Techwin. Hanwha cameras can include a sound classification analytic to detect sounds such as gunshots Cameras with sound detection technology Hanwha offers more flexibility in the field – interchangeable parts are packed together to enable configuration on site. And there is no need to stand on a ladder to position cameras; stepper motors help with remote camera positioning. Multi-sensor cameras have modules (combining lenses and sensors) that can be switched out at installation. Hanwha Techwin cameras can also include a sound classification analytic to detect sounds such as gunshots, screams or glass breaks, especially useful in K-12 education environments. Unification and the customer journey were a key emphasis for Genetec at GSX 2018. Unification for Genetec means combining multiple functions on one platform, from one vendor and using one source code. The company approaches the market by analysing each customer’s journey as it relates to Genetec products. A typical customer journey involves (1) a company looking for standalone systems; (2) the need to centralise systems through integration and unification; (3) increasing automation and workflow; and (4) adding intelligence for more informed decision-making. “Genetec wants to get more in-depth with customers, be more comfortable with their business, and understand their challenges,” said Derek Arcuri, Product Marketing Manager. “We want to get naked with our customers.” Machine learning engine for crime prevention In the city of Chicago, Citigraf detects patterns in crime behaviour and determines where a crime is likely to occur There was a big crowd at the Genetec booth, and not because the comment was applied literally. Genetec has divided itself into multiple parts, each focussed on a vertical market such as retail or transportation. The approach is to operate as a ‘federation of startups’, with each market sector accountable to fill in the gaps in the portfolio to meet the specific needs of each vertical. For example, Genetec’s Citigraf is an unsupervised machine learning engine with an algorithm to detect anomalies and trends from a large pool of data in a municipal environment. In the city of Chicago, Citigraf detects patterns in crime behaviour and determines where a crime is likely to occur. The system alerts operators in a bureau or area that has a higher risk level and should beef up the number of first responders. Chicago has seen a 39 percent decrease in average response time of first responders as a result. In the retail market, Genetec leverages the security infrastructure to analyse shopping trends and provide data for merchandising and operations. “Each customer is getting a portfolio of products tailored to the industry they are in,” says Arcuri. Demonstrating IoT devices Axis Communications displayed its range of products at GSX, demonstrating its almost total transformation from an IP camera company to a supplier of a full range of Internet of Things (IoT) devices. “Axis is broadening its portfolio to include more solutions,” said Scott Dunn, Senior Director, Business Development Systems and Solutions. “Our success is driven by continuing to innovate our portfolio. The market is continuing to grow, and Axis is continuing to expand its market share.” Eight ‘Axis Customer Experience Centers’ around the United States help Axis stay close to their integrators, customers, partners and prospects. IP addressable audio speakers from Axis can provide music as a service, and then can be interrupted for audio messages on behalf of physical security Axis has offered access control IP edge devices since 2013, and now has a new A1601 door controller being sold with partner-only software (no embedded Axis software like previous A1001 devices). In audio products, Axis has a portfolio of speakers, intercoms, and public address systems. Acquisition of IP door intercom company Enhancing the audio line was acquisition in 2016 of 2N, an IP door intercom company headquartered in Prague, Czech Republic. In North America, the 2N team is now fully part of Axis. The line emphasises simple architecture, programmability, and the ability to integrate widely. The products use Session Initiation Protocol (SIP) to integrate through the cloud or peer-to-peer. IP addressable audio speakers from Axis can provide music as a service, and then can be interrupted for audio messages on behalf of physical security. Retail, education and enterprise customers are gravitating to IP audio. An IP bridge can tie existing analogue components into the IP system. For perimeter security, Axis offers a radar device to help eliminate false alarms, as well as thermal cameras.
Security trade fairs can be daunting for attendees. At big shows like IFSEC International and Security Essen, there can be hundreds of physical security manufacturers and dealers vying for your attention. Stands are sometimes spread out across multiple halls, often accompanied by a baffling floor plan. As the scope of physical security expands from video surveillance and access control to include smart building integrations, cyber security and the Internet of Things (IoT), there is an increasing amount of information to take in from education sessions and panels. Here, SourceSecurity.com presents eight hints and tips for visitors to make the most out of trade shows: 1. Outline your objectives. As the famous saying goes, “Failing to plan is planning to fail!” Before you plan anything else, ensure you know what you need to achieve at the show. By clearly noting your objectives, you will be able to divide your time at the show appropriately, and carefully choose who you speak to. If there is a particular project your organisation is working on, search out the products and solutions that address your security challenges. If you are a security professional aiming to keep up with the latest trends and technologies, then networking sessions and seminars may be more appropriate. 2. Bring a standard list of questions Prepare a list of specific questions that will tell you if a product, solution or potential partner will help you meet your objectives. By asking the same questions to each exhibitor you speak to, you will be able to take notes and compare their offerings side by side at the end of the day. This also means you won’t get bogged down in details that are irrelevant to your goals. Most trade fair websites provide the option to filter exhibitors by their product category 3. Do your homework Once you know your objectives, you can start to research who is exhibiting and decide who you want to talk to. Lists of exhibitors can be daunting, and don’t always show you which manufacturers meet your needs. Luckily, most trade fair websites provide the option to filter exhibitors by their product category. Many exhibitions also offer a downloadable floor plan, grouping exhibitors by product category or by relevant vertical market. It may be easier to download the floor plan to your phone/tablet or even print it out, if you don’t want to carry around a weighty map or show-guide. 4. Make a schedule Once you have shortlisted the companies you need to see, you can make a schedule that reflects your priorities. Even if you are not booking fixed meetings, a schedule will allow you to effectively manage your time, ensuring you make time for the exhibitors you can’t afford to miss. If the trade show spans several days, aim to have your most important conversations early on day one. By the time the last afternoon of the show comes around, many companies are already packing up their stand and preparing to head home. When scheduling fixed meetings, keep the floor plan at hand to avoid booking consecutive meetings at opposite ends of the venue. This will ensure you can walk calmly between stands and don’t arrive at an important meeting feeling flustered! Look for panels and seminars which address the specific needs of your project, or which will contribute to your professional growth 5. Make time for learning If you’re on a mission to expand your knowledge in a given area, check the event guide beforehand to note any education sessions you may want to attend. Look for panels and seminars which address the specific needs of your project, or which will contribute to your professional growth. This is one of the best opportunities you will have to learn from industry leaders in the field. Be sure to plan your attendance in advance so you can schedule the rest of your day accordingly. 6. Keep a record Armed with your objectives and list of questions, you will want to make a note of exhibitors’ responses to help you come to an informed decision. If you’re relying on an electronic device such as a smartphone or tablet to take notes, you may like to consider bringing a back-up notepad and pen, so you can continue to take notes if your battery fails. Your record does not have to be confined to written bullet points. Photos and videos are great tools remind you what you saw at the show, and they may pick up details that you weren’t able to describe in your notes. Most mobile devices can take photos – and images don’t need to be high quality if they’re just to refresh your memory. 7. Network – but don’t let small talk rule the day It may be tempting to take advantage of this time away from the office to talk about anything but business! While small talk can be helpful for building strong professional relationships, remember to keep your list of questions at hand so you can always bring conversations back to your key objectives. Keeping these goals in mind will also help you avoid being swayed by any unhelpful marketing-speak. It may seem obvious, but don’t forget to exchange business cards with everyone you speak to, or even take the opportunity to connect via LinkedIn. Even if something doesn’t seem relevant now, these contacts may be useful in future. Have a dedicated section in your bag or briefcase for business cards to avoid rummaging around. With your most important conversations planned carefully, there should be time left to explore the show more freely 8. Schedule time for wandering With your most important conversations planned carefully, there should be time left to explore the show more freely. Allowing dedicated time to wander will give you a welcome break from more pressing conversations, and may throw up a welcome surprise in the form of a smaller company or new technology you weren’t aware of. Security trade fair checklist: Photo identification: As well as your event pass, some events require photo identification for entry. Notebook and pen: By writing as you go, you will be able to compare notes at the end of the day. Mobile device: Photos and videos are great tools to remind you what you saw at the show, and may pick up details you missed in your notes. Paper schedule & floor plan: In case batteries or network service fail. Business cards: Have a dedicated pouch or pocket for these to avoid rummaging at the bottom of a bag. Comfortable shoes: If you’re spending a whole day at an event, and plan on visiting multiple booths, comfortable shoes are a must!
When an active assailant strikes, it’s over fast, and most of the damage happens before help arrives. Responding appropriately can save lives, and it takes training and practice to know what to do as a tragedy unfolds: Where can I hide? Can I get out? Where do I run? If you hear shots or see someone with a knife, your training empowers the best response, and thorough and repetitive training avoids being paralysed by panic. Standards on workplace violence ASIS International is a member of ANSI and an accredited standards developer ASIS International has been working for more than a year on a document to enable security professionals to develop an effective approach for prevention, intervention, response and recovery to an active assailant, whether he or she is acting alone or as part of a group. The Active Assailant Supplement is an annex to the ANSI Standard on Workplace Violence and Intervention; it is being developed as part of the current revision to the standard. ASIS International is a member of ANSI (American National Standards Institute) and an accredited standards developer. Security practitioners use the ANSI standard to develop their own processes, procedures and documentation related to workplace violence. The ANSI standard on workplace violence was created 10 years ago and already has been revised once. In that time, the standard has been quoted extensively and adopted and utilised by many corporations and security practitioners. Leading creation of the Active Assailant Supplement is Michael Crane, Security Consultant and Attorney at Securisks, and chair of the ASIS International Active Assailant Working Group. There are 17 individuals on the drafting committee on active assailants, each with their own specific areas of expertise, from big corporations, to psychologists, to the government. The committee will create a draft, which will be submitted to the technical committee (150 or so people) for review and comment. The ANSI standard on workplace violence has been quoted extensively and adopted and utilised by many corporations and security practitioners Active Assailant Supplement elements Prevention - A key to preventing active assailant incidents is awareness, such as identifying behaviours that suggest a potential for violence. In addition to recognising troubled behaviors, companies should have policies and procedures in place to report concerns to supervisors, and then policies to follow up. Intervention - Training equips companies to react effectively in the case of an active assailant attack. Repetition and practice ensure an appropriate reaction, and inform decisions about where to hide, the nearest exits, etc. Employees might hide in a washroom or a conference room that locks, or they might use furniture to block the door. Response - It also takes training for employees to understand what happens when first responders arrive. Private security and employees have specific roles when first responders show up. Recovery - After the incident, other issues include clean-up, providing a gathering place for employees and family members, and counselling. Addressing school violence The workplace violence prevention plans in the Federal government are right in sync with private industry"Crane was an assistant state’s attorney in Chicago before going into private practice. He has also served as general counsel and vice president for security companies and combines law and security expertise to protect companies from liability. Crane has written and provided training on the topic of workplace violence prevention for many years for ASIS International and was among the first members of the Standards and Guidelines Commission in 2000. Although school violence is not addressed specifically in the Active Assailant Supplement, the protocols covered in the document apply to schools as well as other sites such as governments. “The workplace violence prevention plans in the Federal government are right in sync with private industry,” says Crane. “They are almost identical.” Workplace violence at GSX 2018 Workplace violence, including active assailants, will be among the issues addressed at the upcoming GSX 2018 in Las Vegas. Global Security Exchange (GSX) is the new branding for ASIS International’s annual conference and trade show, attended by more than 22,000 security professionals from 100-plus countries. There will be sessions addressing workplace violence and interest group discussions on a range of topics.
Edesix, a provider of Body Worn Cameras (BWC), announces that it has teamed up with retailer Asda to enhance in-store security. After a successful trial, which began in 2016, there are now over 900 Edesix VideoBadges being utilised in over 250 sites nationwide, with more growth expected in the near future. Edesix collaborated with CBES, Asda's preferred security installer, to design and install a tailored wearable CCTV deployment system perfectly suited to the retail giant's needs. Edesix and CBES worked closely at Asda's national security centre and across four store deployments to provide them with the knowledge and expertise so the cameras could be rolled out in the remaining stores with minimum impact on store efficiency. Improved colleague security Asda has been able to improve colleague security, diffuse aggressive and volatile situations and reduce valued investigation time This system, which is intuitive to use and requires minimum training, has enabled staff to integrate the cameras into their daily working processes with minimal fuss. As a result of this partnering strategy, which relied on both the innovative nature of Edesix's technology and communication between all parties, Asda has been able to improve colleague security, diffuse aggressive and volatile situations and reduce valued investigation time, thus reducing costs. Since the deployment, Asda has proven the viability of these cameras by securing numerous convictions relating to theft and violence against staff. Confrontation preventer Richie McBride, managing director of Edesix, explains: "Asda, along with CBES, identified the need to re-think its key security policy around challenging aggressive behaviour towards staff. In searching for a technology partner, CBES chose Edesix as their BWC provider, to deploy initially to the most affected stores, eventually rolling out to over 250 sites across the UK. The aim was to improve the safety of colleagues in public facing roles and shoppers within the stores, whilst producing compelling evidence when needed." The Body Worn Cameras act as a confrontation preventer, as it is proven that members of the public are far less aggressive to staff members" McBride adds: "The Body Worn Cameras act as a confrontation preventer, as it is proven that members of the public are far less aggressive to staff members if they know they are being filmed." Winning major contracts Edesix, which was recently acquired by US-based security specialists Vigilant Solutions, has enjoyed a great deal of success lately, ranging from winning some major contracts with the likes of UK prisons, Scotrail and South Australian Police, to being named in the Sunday Times Hiscox Tech Track 100 league table. Edesix currently supplies markets across the globe, through direct sales and international partners, to geographies including the UK, Europe, USA, Canada, the Middle East and Australasia.
One of the UK’s top business and management schools, the Bloomsbury Institute, has upgraded its access control capabilities to the award-winning ASSA CLIQ Remote wireless locking technology from ASSA ABLOY, the global leader in door opening solutions. Based in central London and formerly the London School of Business and Management, the Bloomsbury Institute delivers full-time undergraduate and postgraduate courses in business, accounting, finance and law, which are awarded by the University of Northampton. ASSA CLIQ Remote wireless locking technology The Bloomsbury Institute has to contend with a high turnover of students each academic year, as well as any changes to staff. The sheer number of people using the Institute’s buildings meant that its existing mechanical master key system was simply no longer feasible, unable to provide adequate protection for areas that might hold sensitive information, such as exam scripts. As a result, the Bloomsbury Institute needed a flexible access control system that would be easy to maintain, granting secure access to individuals as and when needed, while delivering greater key control too. Electromechanical locking system Providing an easy-to-use electromechanical locking system, the ASSA CLIQ Remote solution uses high-end micro-electronics and programmable keys The answer was ASSA CLIQ Remote, which has been installed throughout the Bloomsbury’s Institute’s 7 Bedford Square teaching site, and selected areas within the institute’s 99 Gower Street building. Providing an easy-to-use electromechanical locking system, the ASSA CLIQ Remote solution uses high-end micro-electronics and programmable keys and cylinders to offer flexible control over access rights. The Bloomsbury Institute can now programme and update each key remotely, removing or granting access privileges for the key holder in real time. This allows only those with the necessary authority to obtain access to private areas without inconveniencing others and removes the security risks associated with lost or stolen keys. Remote Key Access ASSA CLIQ Remote also provides a full audit trail for assured peace of mind and has the functionality to create time-defined user keys, only allowing access to an individual for a specified period. This feature is proving invaluable to the Bloomsbury Institute, which plans to eventually convert all cylinders at its 99 Gower Street site to ASSA CLIQ Remote, as part of its expansion plans. Stephane Middleton, Estates & Facilities Manager at the Bloomsbury Institute, explains: “We are committed to the security and safety of student data, which led us to consider upgrading the mechanical master key system that we previously had in place. Using ASSA CLIQ Remote could not be easier. It is saving us countless hours of key cutting and changing cylinders, while significantly improving our key control.” ASSA CLIQ Remote key for enhanced security When a new employee joins the team, the ASSA CLIQ Remote key is the only one they will need"“When a new employee joins the team, the ASSA CLIQ Remote key is the only one they will need, irrespective of how many rooms they may occupy or how many areas they may need access to during their time with us. In addition, the system provides robust security; if a key is lost or stolen, we can cancel it, safe in the knowledge that we are completely secure.” “The service from ASSA ABLOY has been outstanding. The company really made the effort to understand our business and its requirements. During the implementation phase, ASSA ABLOY provided comprehensive training on how to use the system to all staff that have administration rights, while working with our IT team to ensure the systems’ software is uploaded onto their machines.” High-security physical master key system “The best part of the service has been having a dedicated contact that has been onboard since the start, providing us with new updates, support and guidance. This part of the service is proving to be of great value, filling us with confidence to continue using ASSA ABLOY products in the future. Indeed, as we look to expand the sites we operate in, we envisage that all the cylinders will one day be converted to this system.” Simon Wilson, National Sales Manager for ASSA CLIQ Remote at ASSA ABLOY, said: “Our ASSA CLIQ Remote solution combines all the benefits of access control with a high-security physical master key system. The system was easily retrofitted, meaning there was very little disruption to the university during the installation process, and the institute no longer has to worry about the security concerns that come with a misplaced key. Data security “The fact that ASSA CLIQ Remote also offers the capability to log and provide a record of who has entered and exited an area is helping to ensure rooms that hold confidential papers or sensitive information remain secure.” “We’re delighted to help the Bloomsbury Institute revolutionise its key management systems, delivering greater security, flexibility and key control.”
To succeed in business, one must be brilliant at one thing. In many cases it’s a skill, such as art, coding, engineering or design. Or that one brilliant attribute can also be a personality trait or a business process. No business will be successful unless it is at least adequate, and preferably superb, in product development, sales, and customer engagement - not to mention finance, planning, marketing and recruiting. Too many VMS producers are trying to do all these things themselves when they should be doubling up on what they are best at and leveraging the rest. It is a new mindset. Instead of obsessing about which ‘me-too’ product to supply, software producers could make their first priority finding complementary and compatible partners. Developing a partnership ecosystem One partner might see the opportunity to sell a solution. Another partner might know a better way to distribute a product. A third partner might provide the vertical expertise to get the customer a perfectly tailored solution. By leveraging partners and developing a partner ecosystem, a company will tend to have more unique offerings and the ability to execute faster in an ever-changing world. All this additional partner horsepower is still no guarantee a company will succeed but partnerships will also give a company a feedback channel. Many stand-alone companies plod along, never quite failing, but never getting better either. Partners are less likely to tolerate business limbo. They will be quick to utilise great products, and less wedded to the concept if it doesn’t prove out. Because the partners are in close contact with the market, they are the first responders to changing or developing needs. This is why a company should listen very closely to their partners: They are the feet on the street and the ears to the beat! Open platform matters Producing software takes time, and producing great software takes even longer All of this is not possible, however, if a company produces closed platform software. This is software whose functions can only be changed by the original developers. Producing software takes time, and producing great software takes even longer. This means low agility. The partners might identify great opportunities, but before the closed platform software producer can react, the opportunities might be gone - or worse, be grabbed by competitors. The slow reaction capabilities of closed platform providers will frustrate partners and may lead to the worst of all complications in a partnership: distrust. Add-on modules and intrinsic scripting When the products are based on an open platform, however, they are adaptable. Then the partners have the ability to change the solution through the open software architecture. Not by changing the basic code (that would be open source) but by add-on modules and intrinsic scripting abilities. Total integrated solution Open platform means that the partner can easily extend and enhance the software into a total integrated solution Open platform means that the partner can easily extend and enhance the software into a total integrated solution to fulfill the customer’s needs with the minimum of effort. This gives agility, and agility means fast go-to-market abilities. Just what is needed in this fast-moving world. There are some important things to note here. The ways to extend and enhance the software have to be easy and well documented. The partners must have access to training and knowledge sharing. (It does not help to have a system for extending the capabilities of the software if the partners have to guess at the process and the documentation is rudimentary.) Open access is key It is important that the business philosophy is based on openness, giving the partners full access to all relevant information. And openness is a two-way street: By being open for your partners, you also have to be open about their business. A partner might be able to develop a highly sophisticated solution but be unable to market the solution. By building a catalogue of partner solutions easily accessible to customers, openness extends to ensure open access to the partners. Openness is not something a business can just tack on to their approach. It has to be in the DNA of the business from the start. In a Harvard Business Review article entitled ‘Predators and Prey: A new ecology of competition,’ JF Moore says: “A business ecosystem, like its biological counterpart, gradually moves from a random collection of elements to a more structured community.” Structured business ecosystem Milestone has seen this progression within the company's ecosystem Milestone has seen this progression within the company's ecosystem. They introduced training and certification requirements as part of the partnership success structure, ensuring knowledge is shared and also used in a way that is most mutually beneficial for all involved. Moore also writes: “Every business ecosystem develops in four distinct stages: birth, expansion, leadership and self-renewal.” At present, Milestone and its partners are entering into the ‘leadership’ stage, where video enabling is creating opportunities beyond those offered by a traditional video surveillance system, and into areas that provide additional business benefits to our customers. Video enabling “A leader must emerge in the ecosystem,” Moore says, “to initiate a process of rapid, ongoing improvement that draws the entire community toward a grander future.” This is the role Milestone has played in leading the industry towards the video enabling phase and redefining the industry’s expectations of what a surveillance system is capable of. In the article, Moore underlines that “executives whose horizons are bounded by the traditional industry perspectives will find themselves missing the real challenges and opportunities that face their companies.” Getting connected Connectors are those people with a wide range of contacts across different social circles In his book The Tipping Point, Malcolm Gladwell describes what he calls ‘The Law of the Few,’ which says: "The success of any kind of social epidemic is heavily dependent on the involvement of people with a particular and rare set of social gifts." This is based on the 80/20 principal, “which is the idea that in any situation roughly 80 percent of the 'work' will be done by 20 percent of the participants." He goes on to identify three types of people with these gifts: Salesmen, who are skilled in persuasion and negotiation; Mavens, who collect and disseminate useful information; and Connectors. Connectors are those people with a wide range of contacts across different social circles who can make introductions and create links between otherwise disparate individuals. Milestone, key connector in physical security industry In the wider scheme of things, Milestone effectively acts as a ‘Connector’ in the business ecosystem and in the overall physical security industry. Milestone brings together companies who are brilliant in their respective fields and make it easy for them to work together to create a valuable solution for the customer. The company provides the environment for that to occur and work closely with them to ensure that the end result is useful and effective. At Milestone, partners realised that significant investments in education and training was required to create the demand for the company's products and solutions that the conservative physical security industry required. The value of partnership was learnt and the ‘open’ approach adopted, which was a central part of the thinking behind our software. Adopting the Scandinavian management model Milestone effectively acts as a ‘Connector’ in the business ecosystem and in the overall physical security industry Milestone extended this approach to the entire business model, creating the ecosystem that has been the driving force for success. And while the company embraced the best of the Scandinavian management model, its inclusiveness and encouragement of creativity, they still needed to have the courage to make changes to the business, changes which would ensure the best possible position to take on whatever challenges the future might hold. Milestone partner ecosystem Milestone have always worked in a partner-driven business mode. The company from the start was designed to be open and partner oriented. The Milestone partner ecosystem is a fundamental part of its mindset and daily operations. It is one of the major reasons for getting the company to the position where it is today. To be in a company without the partner component would be like cutting the internet and phone cables while reverting to telex and written paper letters! The company would be developing products in the dark, not knowing the demand. Open business world Today, Milestone's partners are delivering optimal solutions to mutual customers, building a better and open business world with video as a business enhancer. All thanks to the company's open platform and community approach. To have a flourishing partner ecosystem, one must think not as a corporation but in human terms. Because companies don’t think, humans do. In all senses of the word, there is one thing that will contribute more to the success of a partnership than anything else; 'Give before hoping to receive'.
Siemens Rail Automation is a supplier of signalling systems to the rail industry worldwide. The signalling system is fundamental to the safety of a rail network as it maintains safe separation and prevents collisions. Signallers rely on the safety critical signalling features to ensure safe operation in both normal and degraded conditions. Thorough initial training and regular refresher courses in a realistic environment is essential to maintaining the signallers’ competency and knowledge of operating procedures. Siemens collaborated with Matrox to implement a unique, IP-based simulation environment for their European-rail-network client with an innovative use of streaming and recording of multiple video feeds. Simulator for signal monitoring A simulator allows a trainer to vary scenarios—by changing the weather, introducing obstacles on the line, incidents in stations, broken-down trains, or other things that affect the scheduling of movement of rolling stock. Additional screens from other collaborative applications, such as timetabling, are displayed for the trainee The trainer needs to monitor a trainee’s reaction(s) to a particular scenario, as it transpires. To be able to view the entire session later, for analysing, and pinpointing areas of improvement, each individual trainee’s performance needs to be recorded as well. The trainee operator’s signalling desk contains multiple monitors for the signalling application that shows, amongst other things, the state of the signals, dynamic speed limits, state of points on the track, and train positions. Additional screens from other collaborative applications, such as timetabling, are also displayed for the trainee. Trainers too have multiple screens where they define and manage the training scenario. Networked training ecosystem Siemens Rail Automation met their client’s need by leveraging Matrox’s video wall and enterprise encoding portfolio as building blocks to create an end-to-end, IP-based simulation system—all on the client’s 1 Gigabit Ethernet network. At the individual trainee stations, ‘operator’ workstations host a Matrox multi-display graphics card to power an eight-monitor, 4x2 desktop configuration. In the same PC system are two Matrox Maevex 6100 quad 4K enterprise encoder cards. Capable of simultaneously capturing, streaming, and recording up to four 4K inputs, Maevex 6100 in this case captures quad Full HD inputs, composites them as a single 4K signal, and streams them to a collaborative video wall. Doing so ensures that the time correlation between the individual screens is not lost—a cursor moving across a desktop from screen to screen is seen as it happens. One of the training objectives is to support the team working between the signallers and planners Monitoring trainee cursor movements This is important for the trainer to get a realistic picture. A jerky or delayed cursor movement could be construed by the trainer as indecision or hesitation on the part of the trainee. If the cursor movement by the trainee—including between screens—is smooth, it is imperative for it to be seen live and recorded as being smooth. In addition to the above are three dual-monitor timetabling workstations and a quad-monitor trainer workstation, each with a Matrox graphics card and Maevex 6100 encoder card to stream desktop content to the collaborative display wall. The timetabling workstations are used by trainee timetable planners to make on-the-day changes. One of the training objectives is to support the team working between the signallers and planners. Reviewing training sessions On the video wall are 12 monitors in several arrangements that enable the trainer to control the simulation environment and monitor trainee signallers and planners. The video wall can also be used collaboratively to replay and review the training session. This is all from a single, low-footprint Blue Chip Ultima 2M system that hosts a combination of Matrox Mura IPX decoder cards and Matrox Mura MPX input/output video wall cards, which work together to seamlessly decode and display the various incoming streams. The rail network uses Matrox MuraControl for Windows video wall software to manage the incoming IP sources, presenting the information on the wall in a way that looks like the original setup at the trainee’s desk. Matrox provided product and configuration training for Siemens personnel, onsite at Siemens Rail Automation’s headquarters Product and configuration training These ‘video wall copies’ allow trainers and other decision makers to remotely, and instantaneously, see the trainee’s reaction to a given situation. Desktop views are easily switched between trainees. Additionally, Maevex 6100 allows training sessions to be simultaneously recorded to network storage from where the simulations are played back on demand to the individual trainee, or to other interested parties. To complete the offering, Matrox provided product and configuration training for Siemens personnel, onsite at Siemens Rail Automation’s headquarters. Successful implementation Siemens Rail Automation has deployed the IP-based signalling simulator as part of a major project in a leading European-rail-network organisation where it is performing in line with the rail industry’s stringent standards. Similar deployments for other clients are being planned. Using Matrox’s video wall and recording technologies has been instrumental to the successful implementation of this IP-based signalling simulator" Using the standard network to stream the various elements of the simulator in real time has offered many benefits to the client. The video wall displays copies of the trainer’s own screens, as well as a selected trainee’s screens. This IP-based implementation is easily scalable and allows multiple trainees to be participating in the same training session—with the trainer able to select which trainee to be overseeing at a given time. Andy Powell of Siemens Rail Automation says, “Using Matrox’s video wall and streaming and recording technologies has been instrumental to the successful implementation of this pioneering IP-based signalling simulator in our client’s organisation. Without Matrox, this clearly wouldn’t have been achievable.”
Even religious organisations recognise that in today’s world, planning for any large gathering of members now requires more emphasis on security. This is especially true for an event that draws participants from around the world to discuss church doctrine and policies, and hosts numerous activities for hundreds of children. A denomination of 1.5 million worldwide, the Church of the Nazarene gathers its members every four years to ratify resolutions, elect leaders and worship together. In 2005, more than 30,000 met at the Indianapolis Convention Center and RCA Dome, and were joined by another 15,000 via the Internet. For many years, it was enough for security personnel to patrol the convention floor with two-way radios. Convention organizers locked up expensive items at the end of the day and were careful about giving out keys. In 2005, however, a greater awareness of security vulnerabilities compelled them to introduce onsite photo ID badging. The challenge was to facilitate registration for such a large crowd and provide security for the children in attendance. The small footprint of the DTC300 printers made them easy to deploy into the limited counter space and were highly accessible but not at all intrusive" Fargo DTC printers for name tags The denomination selected Daymark Solutions to provide Fargo DTC300 Direct-to-Card Printers/Encoders and supplies. Daymark’s involvement began with the design of ID cards and the integration of nametag production with online registration. To handle registration, the denomination headquarters’ IT department set up 20 computerised, self-registration stations. Most attendees pre-registered on the Church of the Nazarene website, which sped their check in. Others chose to register at the event. In either case, attendees finished checking in by printing out their own plastic nametags on the Fargo printers located at each station. “The small footprint of the DTC300 printers made them easy to deploy into the limited counter space,” said Ken. “They were highly accessible but not at all intrusive.” The small size became important later, as well. “The registration area could not be completely secured each evening, so we felt it necessary to collect all 20 printers at the end of the day, store them in a secured area over night and then redeploy them each morning of the week-long convention,” he said. “The small, lightweight form factor of the DTC300 printers definitely made this job much easier.” Colour-coded identifiers Additional pre-convention services provided by Daymark Solutions included onsite photo ID badging at denomination headquarters for General Assembly workers and pre-printing delegate nametags at Daymark’s ID card service bureau. The General Assembly itself is actually four conventions in one: Nazarene Missions International, Nazarene Youth International, Sunday School Ministries and Children’s Ministries. Colour-coded identifiers were used in the card layouts to signify various levels of access, including after-hours access to the exhibit hall Once the assembly and convention got underway, Daymark acted as an onsite service bureau to produce last-minute and replacement delegate nametags and photo ID cards for all convention staff members. Four Daymark employees were onsite during the entire event. “This is the first time we’ve been involved on this scale,” said Linda Livengood, Daymark President. “The dynamic and temporary nature of the situation didn’t lend itself to deploying special automated card access or video surveillance systems,” said Ken Livengood, Linda’s husband and Vice President of Daymark. Instead, colour-coded identifiers were used in the card layouts to signify various levels of access, including after-hours access to the exhibit hall. Daymark provided printer training and supply management assistance to volunteer registration workers. Creating novelty photo cards In addition to using the Fargo printers for registration, Daymark furnished two DTC300s to the Nazarene Missions International exhibit for producing novelty photo cards. The exhibit featured several five-foot-tall characters with face cut-outs, depicting a person in native dress in front of a landscape typical for that region. Daymark also produced colourful nametags for contestants in the 3rd annual World Bible Quiz, the highest competition level for Nazarene Children’s Quizzing. Part of the church’s Children’s Ministries, this year’s competition had 2,200 participants consisting of children in grades one through six. Each grade had its own color-coded nametag with Quizzing logo graphics. In another event, geared to raise awareness of children’s world missions, seven separate ‘regions’ were created, each with a unique craft. Children received a ‘passport’ ID card, complete with their photo and realistic passport graphics at each region they visited, thus turning them in to ‘world travellers’. By issuing photo ID badges to all individuals who worked directly with children, organisers helped parents feel more confident that only authorised individuals were with their children" Controlling access to restricted areas More than 20,000 nametags were printed during the convention using a database compiled from both online and onsite registrations. “Being able to receive a personalised plastic nametag instantly with attractive printing was extremely appealing to everyone,” Ken said, “not only because the technology to print them was ‘cool,’ but because this type of durable and attractive nametag also provided a meaningful keepsake of the convention.” “In addition, denomination officials recognised that security has become more important than in past years,” Linda said. “Photo ID credentialing definitely helped control access to restricted areas. Also, with so many children’s activities planned for the assembly and conference, child safety was a major concern. By issuing photo ID badges to all individuals who worked directly with children, organisers helped parents feel more confident that only authorised individuals were with their children.” Fargo’s SmartLoad Ribbon Cartridge “The stations were staffed with volunteer assistants, who came and went at all times,” said Ken. “It would have been impossible to provide complete training for everyone on how to load printer supplies. The simplified supply loading of the DTC300s made it easy for trained volunteers to pass along the procedure to their fellow staff members.” He was referring to Fargo’s SmartLoad Ribbon Cartridge, first featured with the DTC300 unit. A SmartClean Roller is also integrated into every cartridge, eliminating separate card-cleaning mechanisms. “Denomination officials responsible for convention arrangements were frankly in awe of how the DTC300 card printers virtually eliminated the hassles associated with nametag issuance they had experienced in the past, while providing a superior end product,” Ken said. They were happy to report that no major incidents occurred during the convention. For an event that carried the message of welcome to all who attended, this was, perhaps, the best outcome of all.
The Wisenet hybrid recording solution has been installed at New Cross Hospital, Wolverhampton by electronic security specialists, JKE Security. “The medium term objective is to provide the hospital with a complete end-to-end Wisenet solution incorporating the very latest video surveillance technology,” said Dan Mather, director of Derby based JKE Security. “However, New Cross Hospital is not alone in having to carefully manage its budgets and with this in mind, the priority has been to install a hybrid recording solution which comprises a combination of HD+ and NVRs. This has enabled the images from all existing analogue and IP cameras installed throughout the hospital to be recorded at the highest possible resolution.” New Cross Hospital, which is run by the Royal Wolverhampton Hospitals NHS Trust was originally built circa 1900 as a workhouse. It now provides 700 beds, employs almost 9500 staff and is the largest teaching hospital in the Black Country. In 2004 the United Kingdom's first purpose built specialist heart centre was opened on its site.AHD technology enables the Wisenet HD+ DVRs to record high-definition images Large storage capacity A total of 17 recording devices have been installed. These include 4 x Wisenet 32 channel XRN -2010 NVRs which each have 21 Terabytes of on-board storage and 13 x Wisenet HD+ 16 channel SRD-1694 DVRs, each with 5 Terabytes of storage. Using AHD technology, the Wisenet HD+ DVRs are able to record high-definition images transmitted over the hospital’s existing coax cabling. “An important aspect of this project is that the Royal Wolverhampton Hospitals NHS Trust wanted a recording solution which would be totally compliant with the new GDPR data protection regulations,” said Dan Mather. “Having taken advice from Midwich, the distribution company which we source our video surveillance products from, and having attended a 3 day training course conducted by Hanwha Techwin, we had the confidence to recommend the Wisenet hybrid recording solution to the Trust both in terms of its compliance with GDPR and the user-friendliness of the recording devices.” For the first time in years we are now able to view our entire system on one platform, which is functional and easy to operate" Effective healthcare security “Having successfully completed the first phase of the upgrade, we are looking forward to installing over 200 x Wisenet cameras throughout the hospital in the near future in order to provide security personnel and the hospital’s managers with a powerful tool to maintain a safe and secure environments for doctors, nurses, administration staff and patients.” Paul Smith, Trust Security Manager and Local Security Management Specialist said “We looked long and hard for a suitable solution of integrating our older systems with newer IP systems on the site. For us the best option came in the form of the Wisenet software and recording units and for the first time in years we are now able to view our entire system on one platform, and a platform that is functional and easy to operate." "All of our pre-existing cameras have been synced with the new software with the assistance of JKE Security Ltd. I look forward now to the next stage which will be to replace end of life cameras for the much more technologically advanced kit, which will enable us to use the smarter functions of the Wisenet software.”