Visitor management systems
AMAG Technology announces the release of Symmetry Control Room. Control Room provides a single operational window for situational awareness and managing video, alarms and events. It will integrate with AMAG’s entire Symmetry portfolio, which includes video, visitor, identity, incident management, intrusion and access control, as well as best-of-breed manufacturers that are part of the Symmetry Preferred Partner Program. Monitoring Symmetry’s platforms through Control Room delivers r...
Using a smart phone as an access control credential is an idea whose time has come – or has it? The flexible uses of smart phones are transforming our lives in multiple ways, and the devices are replacing everything from our alarm clocks to our wallets to our televisions. However, the transformation from using a card to using a mobile credential for access control is far from a no-brainer for many organisations, which obstacles to a fast or easy transition. We asked this week’s Exper...
Lenel, a provider in advanced security systems, offers an extensive set of new features and utilities with the introduction of OnGuard version 7.5. The enhanced OnGuard 7.5 access control solution deepens Lenel’s focus on unification, mobility, cybersecurity and cloud compatibility with platform updates, including enriched browser clients and a next-generation visitor management suite - all adding to its already substantial capabilities. Lenel is part of UTC Climate, Controls & Securit...
Business doesn’t stand still, but security feels static. Whether mechanical keys or wired door locks, access control doesn’t always have the flexibility a changing environment needs. When is the right time to expand an access control system? And what’s the best way to do it? Extending coverage for traditional access control is expensive and intrusive, but there is an alternative. If one wants to forget about keys and the hassles of key management, wireless locks are the fast a...
Matrix, manufacturer and believer of ‘Made in India’ Telecom and Security solutions, has been a host of a number of its maiden event Insight. This event has been conducted and used as a platform to spread the company’s reach in different markets, getting in touch with partners and prospective system integrators. Matrix Insight Indonesia 2018 Matrix is all set for yet another Insight event in Indonesia. The event will be hosted at the Shangri-La Hotel, Kota BNI, Jln. Jend. Sud...
Sequr, a cloud-based mobile access control trusted by customers such as UPS, announced Sequr Access Sync to automate perimeter security for modern buildings and offices. Sequr Access Sync intelligently connects organisations’ physical and cyber security systems to provide highly granular access management while easing administrators’ work. Physical and cyber security have historically been handled separately using different tools. In the cyber arena, everything from the CEO’s...
Security expert Abloy UK is inviting healthcare professionals to stand 239 at the Health & Care Innovation Expo 2018, to discuss innovative technologies that improve key management and security across all areas of hospital estates. Held at Manchester Central, the Health & Care Innovation Expo is the biggest NHS-led event in the calendar, running for two days on 5 and 6 September 2018. The healthcare environment can be extremely demanding, with pressure to fulfil compliance, improve security, increase efficiency, meet CQC standards and achieve maximum value from any investment. Effective healthcare security With this in mind, Abloy offers bespoke cost-effective solutions to the security problems faced on healthcare estates, from compliant security doors to drug security and patient lockers, with particular success helping to improve key management and security of controlled drugs. The range and requirements of areas that need to be secured across healthcare estates is extensive and includes IT and data centres, plant rooms, hazardous materials storage and waste, HR and Executive offices, drug cabinets, lockers, theatres and labs, central pharmacy, mortuary, treatment rooms and wards, and outbuildings. The system is proven to save nurses up to 40 minutes per shift searching for keys and improve security of controlled drugs Improved security access Bespoke solutions can be created using PROTEC2 CLIQ technology, which incorporates microelectronics that enable auditing and time scheduling of access rights, recording who used which key and when. The system is proven to save nurses up to 40 minutes per shift searching for keys and improve security of controlled drugs. What’s more, PROTEC2 CLIQ is government approved and complies with the Controlled Drugs Regulations offering an ideal solution for drugs cabinets, POD lockers and mobile drugs trolleys, to help you pass your CQC audit. eCLIQ master key locking system Other solutions include the eCLIQ master key locking system and TRAKA 21 key management system, as well as an extensive range of Emergency and Panic Escape Doors and door furniture compliant with BS EN 179 and BS EN 1125. Shaun Powell, General Sales Manager at Abloy UK, said: “This is the first time we have exhibited at the Health & Care Innovation Expo, and we’re really keen to meet visitors to discuss how we can help with key management and security for healthcare estates.” “Our innovative solutions are installed in over 25 key healthcare institutions across the UK, including Queen Elizabeth Hospital Birmingham, Spire Hospital Manchester and North Lincolnshire and Goole NHS Trust, so please visit us on stand 239 to discuss how we can help you.”
In real life people usually don’t want to get into the drama of being seen as someone other than themselves. The misrecognition problem is not only time consuming, dignity compromising but also, in lots of cases, life threatening, if certain dangerous people are not correctly identified in time. This mistake is no longer affordable in today’s context, whether for an individual, a group or society as a whole. Fortunately, the facial recognition technology has matured, and the security solution based on the said technology is being widely used across the world. Dahua Technology, a premier solution provider in the global surveillance industry, is especially good in this realm as has been proved by multiple championship and new records in major international challenges, including Multiple Object Tracking Challenge, the KITTI 2D Object Detection Evaluation 2012, KITTI Flow Benchmark, Task [Word Recognition] of Incidental Scene Text Challenge and Born-Digital Image Challenge. A Smart AI algorithm optimises the image captured in multiple angles or blurred in motion and translates the face feature into a digital model Dahua facial recognition It is necessary to explain some basic rules concerning how facial recognition works before the tour to see how Dahua Technology’s products & solutions are applied in various daily scenes. Simply put, big data is useless if the accuracy and efficiency of facial recognition has not been improved to a certain level. The face detection, whether from a snapshot or from a stream of video, requires not only a high-quality camera but more importantly, a smart AI algorithm that optimises the image captured in multiple angles or blurred in motion and translates the face feature into a digital model which can be crosschecked in the database. The whole process, from taking the picture to comparison, takes as short as 300ms. Suppose there's Tom, a middle level manager in his mid-30s. Let’s follow Tom for a day and see how Dahua Technology’s facial recognition solution plays its role in his perfectly ordinary life. Building security system Tom hurried to his company on the 30th floor of a class A office building, the kind with additional barriers in the lobby between the front gate and elevators. There were long lines in front of the access control machines. Tom reached into his pocket and found unfortunately his access card wasn't there. But Tom should worry no more because the building had just updated the security system with Dahua’s facial recognition solution, which overcame various shortcomings of traditional ways of card or fingerprint scanning, including low efficiency and inadequate security. Compared to a card, apparently it is much less likely for one to lose/replicate/borrow a face. And the access control was no longer a gamble if one's fingerprint works. The powerful cameras with deep learning AI, detect the faces and digitalise the features and compare them purely through numbers Deep learning AI detection Here’s exactly how Dahua’s facial recognition solution works in this scene. The powerful cameras blessed with deep learning AI, detect the faces and digitalise the features and compare them purely through numbers with the ones in the database which takes less than 1 second. The beauty of the solution goes both ways since the company no longer needs to make a card or import finger prints for the newly employed but simply upload their photos into the database that contains up to 10,000 faces. Besides offices, this solution can also be applied to any place that has a high standard for access control, like customs, schools, residential communities, etc. Smart access solution Tom stepped into a bank. On behalf of his company, Tom had some serious business to discuss with the bank, which, at this hour, was full of people. And before Tom started to worry about the time to be spent waiting and if he could make it to the next meeting on time, he heard his last name called and was led into the VIP room. Now how did the bank manage do that? Not by human efforts for sure. No clerk could remember each and every face and match it with a particular name and particular business without making any mistake. That’s why a facial recognition solution is essential to the business. The immediate detection of a VIP face could be easily matched with the white list in the database. No delay or misidentification and all VIP treatment. This goes not only for banks. Hotels, hospitals and casinos alike will also benefit from this solution that secures the proper respect those exceptional customers deserve. Preventing unauthorised access Tom went to the vault of the bank for the first time in his life. He was happy that now he was trusted by the company with such important mission. He walked fast and went in front of the escort. But before he could raise his hand to touch the door of the vault, a warning siren was triggered. The escort, with a reassuring smile, caught up and patted on Tom's shoulder and explained the whole situation to him. No unauthorised personnel could intrude the sensitive areas blessed with Dahua’s facial recognition solution No unauthorised personnel, be it Tom or Jerry, could intrude the sensitive areas blessed with Dahua’s facial recognition solution. The face captured and automatically optimised by the camera would be put into real time comparison with the authorised faces in the data base and the low percentage of similarity, from a pure mathematical point of view, would immediately trigger the alarm. Other limited access areas like labs and archives will also enjoy better protection with this facial recognition solution. Security identification management After a long day’s work, Tom went to see a football game with a friend. The show began even before they entered the stadium because they saw an infamous football hooligan got rejected and taken away outside the entrance gate. Tom, who had been through plenty of adventures during the day, kind of figured out what happened. And Tom’s friend, who happened to be an employee of Dahua Technology, took the chance to explain how Dahua’s facial recognition solution informed the security force to deal with any persona non grata on the black list as soon as they showed their faces. Of course, this solution could be widely applied to other areas like airports, train stations, or in other words, city management. So, this was a day in Tom’s life, which was endowed with some dramatic coincidence but totally realistic in every scene. These examples were far from exhaustion of all the possible applications of Dahua facial recognition solution that fully activates big data gathered and thus spawns a great many creative applications in terms of security and business, resulting indeed into a Safer Society and Smarter Living, as has always been envisioned by Dahua Technology.
VisitorPoint from Maxxess is a smart visitor management solution that offers an easy but powerful upgrade for a wide range of users. For those needing to replace a basic signing-in book for the first time, VisitorPoint is an attractive, user-friendly solution with a choice of useful features. And for larger organisations looking for a multi-site visitor management solution, it provides control and audit features that are future proof, flexible, and designed to complement security, fire and building management operations. It can be integrated with Maxxess software and eFusion range of modules, or adapted with a customised integration, plus it allows users to manage everything from visitor pre-registration, to SMS notification, identity verification and car park occupancy. Easy & efficient visitor management Putting more control in the hands of front-of-house teams, VisitorPoint allows pre-registered visitors to be viewed any time in advance. Visitor badges can be pre-printed for a smoother and more efficient welcome, and sign-in for large groups can be managed in seconds. Visitors check themselves in easily and efficiently using either an iPad or the VisitorPoint free standing touch-screen kiosk. The pre-registered visitor’s details are confirmed when they enter a reference code, passport number, QR code or any specified ID. A photo can be taken with the iPad or kiosk, printed onto the badge and/or saved to the record. Visitors can also be asked to read and sign any non-disclosure agreement (NDA), health and safety or safeguarding instructions on screen, The allocation and control of visitor car parking also becomes much more efficient as specific spaces can be easily assigned to specific vehicles in advance. Automatic email notifications and/or SMS messaging reduce the burden on front-of-house staff, with employees automatically alerted when their visitors arrive. The system can be set up so that both hosts and visitors receive a friendly reminder text ahead of the visit, at check in and check out. Useful information such as directions and meeting details can be added. Hosts can also check out a visitor, helping front-of-house staff to maintain up-to-date site occupancy records. For enhanced security, alerts can be sent when a visitor forgets to check out, or when a pre-specified visit is due VisitorPoint security enhancement For enhanced security, alerts can be sent when a visitor forgets to check out, or when a pre-specified visit is due. For senior security managers real time reports can be generated to show who is currently on site, where they are authorised to visit, as well as who been on site during any given timeframe. The smart VisitorPoint badge printer allows individual badge customisation so that details can be easily changed and added – for example with Wi-Fi codes, meeting room details and specific courtesy messages. This feature also makes it ideal for multiple tenancy sites, with individual badge branding and messaging, available to each tenant. “VisitorPoint is a highly flexible solution that can be used for both single and multiple sites,” says Lee Copland, Managing Director, Maxxess EMEA. “It allows a practical, easily managed upgrade from more basic solutions and it can be easily adapted to the organisation’s changing requirements in future years.”
Surveillance systems can track the locations of mobile phone users and spy on their calls, texts and data streams. The Washington Post has reported on such systems that are being turned against travellers around the world, according to security experts and U.S. officials. The summer season highlights the need to take extra precautions when travelling. When travelling anywhere in the world, for business or pleasure, citizens need to be aware of and alert to looming physical and cybersecurity threats. To elaborate on expert security tips, strategies and advice for traveling this summer, we presented several questions to The Chertoff Group, a global security advisory firm that enables clients to navigate changes in security risk, technology and policy. Chris Duvall, Senior Director at The Chertoff Group, offers insights into cybersecurity concerns, physical security precautions, and recommends digital resources/apps for consumers while traveling. Q: How are security risks – physical and digital – changing? Why are threats greater today than five years ago? The exponential number of headlines over the past few years is a strong indication that both physical and digital risks are evolving and increasing Duvall: The exponential number of headlines over the past few years is a strong indication that both physical and digital risks are evolving and increasing. The scope, severity and complexity of physical and cyber risks are increasing and becoming more dangerous and destructive. This is especially true for those travelling outside the U.S. On the physical side, threat actors are actively seeking “soft targets” – public events, social settings, mass audience venues, etc. – to communicate their message, sow chaos and inflict catastrophic harm. On the digital or cyber side, we have seen a shift from “thrill hacking,” to an increase of “hacking as a business” (through credential compromise and ransomware), to an increase in “hacking for harm” - with the rise of “nuke ware” and ransomware without a clear financial motivation. Q. What specific precautions should a traveller take to protect their calls, texts and data streams from being spied on? Duvall: When travelling abroad, we recommend to our clients that their personnel and executives should practice good internet and social media hygiene. Some best practices include: Avoid using public Wi-Fi services—unless you use private VPN service for encryption Increase the privacy setting on your technical devices Disable location identifiers on apps Create a new (unlinked) email for internet correspondence Consider purchasing international MyFi devices to decrease the risk of getting your personal identification information (PII) or protected healthcare information (PHI) stolen Use temporary (i.e. burner) phones to protect your data and your contacts Q. What cybersecurity concerns are likely to impact travellers? Are the threats greater outside the United States or in any specific parts of the world? Significant precautions should be taken to protect personal electronic devices (PEDs) and the data connected to PEDs Duvall: The international cybersecurity landscape has grown increasingly dynamic, with threats posed by government authorities (in some countries), terrorists, insurgents, and criminals, requiring travelers to be proactive and vigilant. U.S. citizens, particularly executives of U.S.-based technology companies, must be aware that they are considered high-value targets for nation-state intelligence services and criminally-motivated bad actors. Many countries will go to great lengths and expense to acquire and exploit proprietary information from U.S.-based companies, and views U.S. executives visiting the country as “soft” targets of opportunity. As such, significant precautions should be taken to protect personal electronic devices (PEDs) and the data connected to PEDs. The tactics, techniques and procedures (TTPs) utilised by bad actors are often covert and nearly undetectable by the affected person. Threat actors routinely access, monitor and utilise Wi-Fi networks at hotels and in public spaces to compromise target devices. Other targeting methods include luggage searches, extensive questioning, and unnecessary inspection and downloading of information from personal electronic devices. There are numerous, high-risk countries for which the U.S. Government warns travellers to be wary of mobile malware, mobile device privacy attacks and hot spots for mobile botnets. The U.S. Department of State has the most recent and up-to-date list. For example, the U.S. Government has investigated numerous incidents in which U.S. travellers’ PEDs (personal and company devices) have been compromised by Russian authorities while transiting Russian airports, left unattended in public spaces and in travellers’ hotel rooms. When travelling to an unfamiliar place, research your destination to understand the local roads and transportation, geography, local roads, culture, etiquette and laws Q: What physical security precautions should a traveller take? Duvall: Here are some useful precautions: When traveling to an unfamiliar place, research your destination to understand the local roads and transportation, geography, local roads, culture, etiquette and laws. Protect your personal information and travel itinerary as much as possible. Limit the amount of jewelry worn, cash, credit cards and electronic devices carried while traveling. Avoid staying on the ground floor of a hotel. Consider choosing a room on the 2nd through 7th floors as these rooms may be more difficult to break into than those on the ground level, but still able to be accessed by fire/emergency response equipment. Never answer your hotel room door for anyone until you’ve determined who they are, why they are at your door, and if it is necessary for you to open the door to interact with them. Carry a rubber door stop/wedge with you to install on the room side of the door before you go to bed. Vary your patterns and routines when venturing out in to a new location, do not become predictable. Politely decline offers of food or drink from strangers (If you do accept beverages, ensure that they are in sealed containers and that there is no evidence of tampering). Never discuss your itinerary, personal, business or other sensitive information where others can hear you. Q: How can companies be proactive in protecting their business travellers? Companies should educate their employees on the importance of maintaining good internet hygiene while travelling abroad Duvall: When travelling on business, companies should provide their employees with clean computers and cell phones before departure. Upon return, the company should immediately wipe the computer clean to prevent any malicious threats from penetrating the company’s internal, cyber-infrastructure. Additionally, companies should educate their employees on the importance of maintaining good internet hygiene and recommend their employees disconnect from social media platforms while travelling abroad. Some general tips to recommend to your employees when travelling abroad include: Register in the Smart Traveler Enrollment Program (https://step.state.gov/step/) Visit Travel.State.Gov to view travel related information specific to the country or countries you’re visiting, including local US Embassy or Consulate contact information, as well as current travel advisories and alerts. Always leave a copy of your transportation and hotel itinerary and driver’s license (or passport if travelling internationally) with a family member or trusted friend. Always use a baggage tag with a protective cover Avoid using public Wi-Fi services Q: What digital resources and/or apps might a traveller benefit from (and how)? Duvall: The Chertoff Group recommends researching the below travel-related apps before departing on a trip: TravWell: This app provides destination-specific vaccine recommendations, a checklist of what you need to do to prepare for travel, and a customisable healthy travel packing list. The app can store travel documents, keep records of medications and immunisations, and set reminders to get vaccine booster doses or take medicines. My TSA: This app provides real-time updates on airport delays. It includes how long security lines are at various airports; information about what you can and cannot bring onto an airplane; and a frequently-asked question list, including new advanced imaging technology. Border Wait Time: The app provides estimated wait times and open-lane status at land ports of entry, which may be particularly helpful when in an area with multiple crossings. Mobile Pass: The Mobile Passport app speeds you through U.S. Customs and Border Protection at (1) cruise port and (24) airports Q: As a security expert, what’s your best advice for travellers? Duvall: At the end of the day, travel security is not rocket science. Simply put, travellers need to: Be aware and situationally alert at all times. Be aware and situationally alert to the location of your luggage and carry-ons at all times. Don’t access unknown, unsecured or public Wi-Fi if at all possible. Turn off “auto connect” features and institute stringent privacy controls as much as possible. Try to “blend in” – you don’t have to try to look like a local but travellers should avoid gaudy and expensive attire wherever possible. Use your common sense – if an offer, invitation or opportunity seems to good to be true... it probably is.
Hospitality businesses work to provide a safe and pleasant customer experience for their guests. Hotels offer a “home away from home” for millions of guests every day around the world. These are businesses of many sizes and types, providing services ranging from luxury accommodations to simple lodging for business travelers to family vacation experiences. Hospitality businesses also include restaurants, bars, movie theaters and other venues. Security needs are varied and require technologies that span a wide spectrum. We asked this week’s Expert Panel Roundtable: What are the security challenges of the hospitality market?
The advent of cloud technology and the move toward a digitally connected world is leading towards massive growth in the way data gets generated, stored and managed. The demand for cloud based solutions is rising and the market is growing rapidly. COSEC VYOM is a People Mobility Management solution, based on cloud technology that allows users to use application, hardware and infrastructure as a service. Cloud based time and attendance system addresses solutions to the outlined issues of productivity, security and efficiency by providing ubiquitous, cost-effective, and secure and on demand network access. Key features: Access from anywhere, anytime On demand scalability in sync with organisation size No capex, maintenance and upgrades for IT Pay per usage Easy access through any internet enabled device Multi-level data encryption and protection Email and SMS notifications Backup, archival, retrieval and migration
Fastlane turnstiles have been installed at the Head Office of Allianz Insurance Plc., a leading and highly regarded general insurer in the UK market, to improve overall security and prevent unauthorised pedestrian access via tailgating and collusion. Part of the project involved the installation of six, DDA compliant lanes of Fastlane Glassgate 150 turnstiles, with an integrated Avigilon access control system and Third Millennium multi technology card readers. Access control system The main objective of the turnstiles is to ensure that staff use their access control cards correctly – preventing them from allowing access to colleagues who may have forgotten their own card, for example – whilst at the same time heightening security by preventing people outside of the organisation simply walking in off the street to gain access to the office. Charlie Salamone, Director at AVANZA Intelligent IT & Security, commented: “The Glassgate 150 was chosen as it’s one of Fastlane’s medium security turnstiles, with pedestal-height glass barriers providing a visual deterrent to anyone considering an unauthorised access attempt, whilst maintaining an open feel enclosure making the units visually appealing.”
It began with a desire to help students fit in. Officials in Maine School Administrative District (MSAD) 58 introduced uniform bar-coded plastic ID cards to replace their existing colour-coded punch cards so that students eligible for free lunches would not easily be identified by their friends. “In the past, students used punch cards to buy their lunches,” said Angel Allen, Technology Director for both MSAD 58 and neighboring district, MSAD 9. “The different colors identified their economic status for other students to see. It was not a good thing.” Some students chose not to eat rather than be embarrassed by the color of their card. The issue is a significant one. Between 40 and 60 percent of students in MSAD 58 qualify for a reduced lunch program, according to Allen. The district, which sits in a rural area of Franklin County, Maine, covers 500 square miles and serves 1,000 students through five schools. Using ID cards was not new to the Maine school administrators. Sister district, MSAD 9, had been using ID cards as visual identity for its staff for a long time, according to Allen, but “the old system was a beast.” Direct-to-Card Printer/Encoder MSAD 58 began using ID cards printed on a new Fargo DTC300 Direct-to-Card Printer/Encoder for the hot lunch program in the fall of 2005, with the lunch director printing the cards. A second printer was purchased in 2006 and is operating out of the superintendent’s office to create staff ID and lunch cards. MSAD 58 continues to expand its use of ID cards: It created a debit system in which parents can apply money to the card so their children can charge against it rather than carrying money to school. ID cards without photos are used for substitute teachers, volunteers and parents who enter the schools. Students and faculty can check out library materials using their ID cards. Students without drivers’ licenses have even used their school ID cards for identification on school trips. In 2006, thanks to her experience in MSAD 58, Allen added a Fargo DTC400 printer to MSAD 9 Building access solutions “We also use the ID cards as medical emergency cards,” said Allen. “They are particularly useful on field trips to identify students with allergies, diabetes or asthma and to provide emergency contact numbers.” In 2006, thanks to her experience in MSAD 58, Allen added a Fargo DTC400 printer to MSAD 9. The district is printing RFID cards for staff ID and building access. There is also a DTC300 for the student lunch program. “My experience in MSAD 58 introduced me to Fargo,” said Allen. MSAD 9 includes nine schools and serves 2,500 students. Here, the ability to print on two sides of a card was important, as administrators wanted a bar code on the back to work with the district’s time card system and door access program. In addition, the district is initiating a new lunch program, and a library program is in the works. Software integration “In MSAD 58, we began printing small, key chain ID cards from perforated card stock,” said Allen. “Each includes the student’s name and a bar code. Being able to carry their ID card on a key chain helps prevent students from losing their cards.” Nevertheless, a $1 replacement fee is charged each lost card, although the fee was never meant to build revenue. “It’s just enough to aggravate the students,” Allen said. TAll students carry the same plastic ID card. Information on their lunch status is contained in a bar code on the back of the card. “Now, everyone has the same card,” said Allen. “The bar code number is scanned into the cafeteria software, and only the computer can distinguish who is eligible for a reduced lunch from those who are not.” Fargo printers are well known for their ability to print bar codes with the level of clarity to be read by scanners Student ID cards “The big thing with schools is technology,” said Jennifer Clancy, ID Wholesaler Marketing Manager (www.idwholesaler.com), who sold Allen the printers. “In Angel’s case, she is creating a system where the student ID is a stored-value card for the lunch program using a bar code. Fargo printers are well known for their ability to print bar codes with the level of clarity to be read by scanners. Schools nationwide are instituting policies where a visible ID is required of students, faculty and staff at all times. With a visible ID, there is no excuse for a person to be somewhere he or she is not supposed to be. Individuals can be better identified and dealt with by the existing school protocols.” Requirements for the ID cards differ between high school and elementary school students. High school students are required to carry their ID cards at all times. In the elementary schools, students grab their ID cards from a rack on the wall outside the lunch room each day before lunch. Cards are scanned by the cashier and put back in a basket, so someone can replace them in the rack after lunch. “Younger kids can’t be responsible for remembering to bring their card every day,” Allen said. School security system Employees, especially those with multi-school assignments, such as administrators, supervisors, plant operations, maintenance, food service and transportation personnel are required to display their identification card at all times when performing duties for the school system. “Schools that have a student photo ID program in place are starting to expand the use of the cards to applications such as library checkout, lunch program management, equipment checkout, access to computers, student activity passes and bus access,” said Clancy. “More advanced schools are moving to cashless vending, lunchroom use or activity attendance.” Allen, who is responsible for the technology in both MSAD 58 and MSAD 9, envisions expansion of the ID card program, especially the RFID technology component for access control. “We try things in one place and then take them beyond,” she said. “That’s the cooperative nature of our districts.” But for now, simply using ID cards to help students fit in during lunch is a huge step forward.
Derwent London, a FTSE 250 Index British-based property development and investment firm with a property portfolio worth £4.9 billion, acquired the White Chapel Building in central London in December 2015. The firm is renowned for using design-led approaches to create inspiring office space and began a two-phase project to regenerate the eight-storey commercial building. The White Chapel Building Derwent London’s complete refurbishment of the building meant they required a new security system Situated on an acre of land opposite Aldgate East Tube station, the White Chapel Building is valued between £100million and £200million and is home to various well-known brands including international mobile call company, Lebara, and global architecture and design firm, Perkins+Will. The lower floors, which are still being completed, are due to become home to a major new photography museum, Fotografiska. Derwent London’s complete refurbishment of the building meant they required a new security system that delivered solutions for all their own and potential tenants’ needs. These included: Intelligent IP-based access control system. Tenant access to assigned floor/s and approved areas only. Efficient system to manage visitors. Ability to restrict unapproved visitors to lobby area. Installation of 35 CCTV cameras with remote monitoring facilities. Panic button and lock-down facilities in case of emergency. Latest industry standards Antron Security is an installer of bespoke security solutions and provides security installations for past 28 years Antron Security project managed the design and installation of the access control and security system for the White Chapel Building and acted as the ‘go to’ contact for client, Derwent London. Antron Security is an installer of bespoke security solutions and has been providing security installations to organisations for the past 28 years. Taking care of the supply, design, installation and maintenance of security systems, Antron Security is NSI approved - meaning all staff and systems installed need to comply with the latest industry standards and are regularly inspected. Inner Range provided the core access control and intruder detection system that enabled Antron Security and Derwent London to build the bespoke solutions they needed. Inner Range is a pioneer of integrated access control and intruder detection systems. It’s been a world leader in the design and manufacture of intelligent security solutions since it was established in 1988. More than 130,000 Inner Range systems have been installed in over 30 countries. Inner Range’s award winning integrated security systems offer smart building management at local, national and global levels. “The flexibility of the Integriti system makes it future-proof as we can continue to meet the ever-changing requirements of the landlord and tenants via Inner Range’s ability to integrate with third party systems and devices such as lifts, intercoms, lighting and building management devices.” Jamie Crane, Commercial Director at Antron Security Provides core security Integriti allows around 2,000 people troublefree access to their approved parts of the building Inner Range’s award-winning access control system, Integriti, provides the core security solution for the White Chapel Building. The intelligent system integrates with a host of thirdparty products to become a PSIM system, managing not only security and building automation but also people and business continuity processes. In this instance, Integriti allows around 2,000 people troublefree access to their approved parts of the building, as well as managing visitors efficiently and allowing security managers to monitor events easily and remotely. Key integrations 35 CCTV cameras to allow security managers to view live and recorded events across the site. This includes remote monitoring, if security managers are off site. Access via four IDL Fastlane lobby turnstiles to ensure only permitted persons can access areas beyond the reception and lobby area. Lift integration – Tenants and visitors can only access approved floors using security credentials on their access card or smartphone. Central security team Smartphone access - Tenants and staff were set up to use their smartphones to open doors and other smart devices with the HID Mobile Access ‘Twist and Go’ mobile app. The Integriti system can read and check security credentials from users’ mobile phones to determine whether they are allowed access. BluePoint passes can be read by Integriti at entrance turnstiles and lifts to ensure visitors can access areas agreed by the ‘host’A BluePoint visitor pass system was installed and integrated with Integriti to ensure a secure, reliable and trusted method of managing visitors. It allows ‘hosts’, such as tenants, to issue temporary passes for their visitors without needing to pass every request through a central security team. The passes can be issued on paper or via email. They can also be issued as Apple Wallet or Google Pass credentials. These appear on the visitor’s smartphone with a QR code without the visitor having to search their phone for them. Location and time-based information included in the pass ensure it appears when and where it is needed. The BluePoint passes can be read by Integriti at entrance turnstiles and lifts to ensure visitors can access areas agreed by the ‘host’. Integriti features Easy to use Smartcard entry system integrated for access via doors, lifts and entrance turnstiles. Cards issued to 500 users initially. Panic button and lock down procedures for emergency situations. Gigabytes of on-board memory at controller hardware level to ensure the system maintains complete functionality even if offline. Seamless IP-based multi-controller system architecture options. Easy plug-and-play in UniBus, an innovative in-cabinet bus which allows the connection of expansion modules, communications modules, and door and reader modules to extend the range and scope of the Integriti system. Productive and efficient staff Trouble-free tenant access to their approved parts of the building. The improvements in access and security means reception staff are more productive and efficient. Security managers are able to monitor events easily and remotely. More accurate reporting on who is where in the building helps with health and safety as well as security activities. The Integriti system allows the landlord to manage operational costs more effectively while providing tenants with a more secure working environment.
The Mall of Switzerland, located in Ebikon in Lucerne Canton, has a total floor space of 65,000 square meters. It is the second largest shopping centre of Switzerland. Visitors to this ultramodern building complex can take advantage of about 90 stores, 18 restaurants, a multiplex cinema with 12 auditoriums, a large indoor playground and multiple exercise facilities. The Mall of Switzerland is expected to receive up to five million visitors a year. This poses considerable challenges for building security, for which it is relying on Bosch’s experience and expertise. “These days, trends and customer needs change faster than ever before. Buildings have to be able to adapt easily – although this of course also poses new challenges, for instance with regard to security,” explains Jan Wengeler, who manages the mall. “But with Bosch as our partner, we know that we can handle whatever comes up.” Enhanced guest safety For the Mall of Switzerland, Bosch’s building experts implemented a tailored security solution for controlling access to restricted areas. At its core is the MATRIX access control system, which features a combination of electronic cylinders and door fittings plus readers, terminals, controllers and software. A management system with a customised user interface visualises the states of more than 100 doors to let staff very quickly and easily monitor and control them. This significantly enhances the safety and security of guests and personnel, also in complex situations with large crowds. The operators are now facing the future with confidence, since additional parts of the Mall of Switzerland can be quickly and flexibly integrated in the overall system as required.
Vicon Industries, Inc., designer and manufacturer of video surveillance and access control software, hardware and components has announced that The Cathedral of Saint John the Divine, the largest Cathedral and fifth largest church building in the world, recently completed installation of the Vicon Valerus video management system to secure the Cathedral and surrounding 11.3-acre complex in Manhattan, New York City. As the seat of the Episcopal Diocese of New York, the Cathedral is the site of daily religious services, community programing and social outreach. It also plays host to a busy schedule of art exhibitions, concerts, receptions, public and private events and visiting dignitaries, who have included Nelson Mandela, The Most Reverend Desmond Tutu and President Bill Clinton. The new Valerus system combines over 70 Vicon high-resolution IP cameras, a Valerus application server and multiple recording servers Vicon Valerus VMS The new Valerus system, installed by the Long Island office of ITsavvy, an IT products and technology solutions provider, combines over 70 Vicon high-resolution IP cameras, a Valerus application server and multiple recording servers. The system’s wide range of cameras include models with powerful zoom that provide detailed coverage of surrounding city streets, and others chosen for their ability to perform well in the low and challenging light inside the Cathedral. Cameras also provide coverage of the Cathedral’s’ exterior, administrative and residential buildings that support the Bishop, clergy and Diocese, a world-class textile conservation laboratory, visitor center, information booths and surrounding grounds and gardens. The Valerus system is vital for providing safety for all visitors, staff, residents and students, as well as protecting the property and its many valuable artifacts. Vicon high-resolution IP cameras Cameras are particularly helpful in protecting the Cathedral from liability in slip-and-fall incidents. They also document, for the police, any incidents that arise from the Cathedral’s service to the mentally ill and indigent. Live and recorded video from the Valerus system is frequently shared with NYPD and local security forces from Columbia University and other neighboring institutions. The searching feature is so much easier on Valerus, and we can see up to 99 cameras on one screen" Keith Hinkson, Director of Security at The Cathedral of Saint John the Divine, says, “The searching feature is so much easier on Valerus, and we can see up to 99 cameras on one screen. This is huge for an institution like ours. I can go from one camera to the next with no trouble whatsoever.” “Vicon is incredibly proud that a world-class institution as prestigious as The Cathedral of Saint John the Divine has entrusted its security to an end-to-end Vicon solution, including our latest Valerus software. Our participation in this project illustrates that Valerus can deliver security effectively to the most high-profile of installations,” said Bret McGowan, Vicon’s Senior V.P. of Sales and Marketing.
Liberty University, a private university in Central Virginia, provides a comprehensive curriculum with a Christian background for more than 110,000 students enrolled across the University’s 17 colleges, schools, and online programs. The safety and security of students and faculty is a priority and has resulted in the implementation of state-of-the-art physical security measures. The LaHaye Fitness and Recreation Center located on Liberty University’s Lynchburg campus is a prime example. The large facility, which occupies approximately 165,000 square feet, houses five basketball courts, an indoor track, a weight room, group exercise classrooms, raquetball and volleyball courts, soccer fields, and a rock wall in addition to a lounge and cafe. More than just an athletics facility, the LaHaye Fitness and Recreation Center is a hub for social interaction that opens at 5am and closes at 11:30pm every day. The access control solution allows students to use one universal card throughout the campus, including LaHaye Fitness and Recreation Center ID badge with access control credentials Every student enrolled at Liberty University is provided with an identification badge with embedded access control credentials to gain access to various Liberty facilities. The access control solution, provided by RS2, allows students to use one universal card throughout the campus, including LaHaye Fitness and Recreation Center, which is outfitted with four lanes of Speedlane 300 optical turnstiles from Boon Edam to control and document the approximately 30,000 users who enter the facility every week. Previously, Liberty students would simply hand their badge to a staff worker, who would swipe it for verification, and then allow the student into the facility. The old process presented numerous challenges including the inability to adequately deny entry, expedite entry to the gym during busy hours and more. The new array of Speedlane 300 turnstiles alleviates all of those issues and more by providing three dedicated lanes for entry and one lane for egress. Monitoring recreation centre visitors “We can lock the turnstile gates, disable them, hold them open, grant access along with numerous other operational options, to keep traffic flowing while providing security,” said Samuel Seaborn, Associate Director, Operations, at Liberty University. “The turnstiles integrate with Liberty’s access control system to monitor who is coming into the rec centre and when, and helps ensure that only students and people with proper access are allowed into the facility.” With 30,000 average weekly users entering and exiting the facility, Liberty is already looking to expand the LaHaye Fitness and Recreation Center with satellite facilities located around the campus. To maintain the level of safety throughout their campus, protect the university from liability issues, and integrate with their current access control systems, Liberty hopes to outfit any new installations with Boon Edam turnstiles, which have been well received by students and staff. In today’s environment, we’re even more concerned with properly protecting our students, and Boon Edam turnstiles help us do that" Easy to use turnstiles “When they were installed, the students remarked on the futuristic design of the turnstiles,” continued Seaborn. “Everyone adapted to them quickly, because they’re so easy to use.” Liberty has also been happy with the service Boon Edam provides for maintenance and other issues. If there are any issues with the badge reader or if an internal component was malfunctioning, the integrator for Boon Edam products, Jamie Dalton at Mech-Elect, of Wake Forest, NC, has responded quickly. “The Boon Edam turnstiles are so simple to use, and they really help with traffic flow. In today’s environment, we’re even more concerned with properly protecting our students, and Boon Edam turnstiles help us do that,” concludes Seaborn. “When we expand our recreational facilities, as well as other facilities, we’re definitely looking to Boon Edam for our entrances and exits.”