Visitor management systems
emaratech, a technology and management consulting company which is part of the Investment Corporation Dubai (ICD), is capitalising on its strong participation in the 2019 edition of Airport Show to showcase its collection of cutting-edge technology products, with the key highlight being the Smart Corridor, a first of its kind in the world product that is helping authorities in effective border control and ensuring seamless passenger experience at airports. As the pressure to effectively handle...
Comelit Group successfully inspired at the industry first, ‘The Security Event,’ presenting new and existing customers with its latest smart solutions in stylish door entry, home automation, fire and CCTV. On stand SE28 at the premiere exhibition, Comelit unveiled its innovative Switch solution, which has been developed solely for installers to enable a simple ‘switch’ upgrade to an audio or video panel option. Also well-received was Comelit’s latest simple to inst...
Matrix, a manufacturer and provider of telecom and security solutions, is conducting Matrix Insight 2019 Jeddah and Riyadh on 18th and 22nd April respectively from 09:00 AM to 12:30 PM. Matrix welcomes everyone in the telecom and security industry from new prospects, strategic partners to existing customers and suppliers. At the event, Matrix will highlight ETERNITY NENX, newly launched unified communication platform for SOHO and SMB. Increasing number of small and medium organisations are migr...
RealNetworks, Inc., global provider of digital media software and services, has announced SAFR for Security, a new solution that integrates SAFR, the world’s premier facial recognition platform for live video, with leading video management systems (VMS) to provide enhanced visibility and situational awareness for security professionals. Announced at ISC West in Las Vegas, SAFR for Security is immediately available for worldwide deployment. SAFR for Security Heads of security at hospitals...
Matrix, global manufacturer and provider of telecom and security solutions, is participating in the Secutech India 2019, to be held at the Bombay Convention & Exhibition Centre (BEC) in Mumbai from the 25th to the 27th of April 2019. Matrix will be showcasing its high-tech range of IP video surveillance and access control solutions at the event. IP cameras with SONY STARVIS series sensors The entire solution focuses on automating processes and enhancing efficiency Matrix will be showcasin...
Identiv, Inc. announces that it will present its recently expanded Internet of Things (IoT) product portfolio at ISC West 2019, encompassing a wide range of physical and logical access control, video and data analytics, door readers, identity cards, visitor management, mobile security, telephone entry, and radio-frequency identification (RFID) and near-field communication (NFC) solutions for physical and IT-secured businesses. Identiv will be showcasing demos of its complete portfolio of high-p...
Maxxess Systems, the innovator in security solutions that empower total situational awareness for security enterprises, is debuting the company’s Maxxess InSite Awareness and Response Coordination System to the American market here at ISC West 2019 (booth #6065). Maxxess InSite uniquely combines security, communications, business intelligence and data integration on a single, easy-to-use platform. “Maxxess InSite empowers total awareness by providing users with unprecedented capabilities far beyond basic system management and incident detection to help prevent incidents from happening,” said Nancy Islas, President of Maxxess Systems.Maxxess InSite enables early incident detection and action, allowing users to correlate data, improve response coordination “A new benchmark for security and business intelligence software platforms by every standard of measure, Maxxess InSite coordinates the activities of first responders and the people they are assisting from the moment a threatening event is detected with unprecedented simplicity of operation.” Early incident detection and action Maxxess InSite Awareness and Response Coordination System combines ‘system intelligence’ and ‘human intelligence’ to detect and respond to unfolding events in real-time – all of which are queued, organised and displayed on a highly-intuitive user interface. Maxxess InSite enables early incident detection and action, allowing users to correlate data, improve response coordination, and deal with issues when they’re small – before they become large and costly. Maxxess Insite harnesses the power of myriad system technologies, effectively expanding their collective capabilities while also making human interaction more intuitive. Combines technologies onto a unified platform It meshes the capabilities of virtually any system and technology onto a unified platformIt meshes the capabilities of virtually any system and technology onto a unified platform including: video surveillance; access control; two-way communications; GPS/IPS location technologies; intrusion detection; fire safety systems; perimeter detection/protection; HVAC/building management; smart phones and tablets; ID/credential badging; guard tour; visitor management; time and attendance; license plate recognition; panic device/hotkey emergency notification; reporting/forensics; wireless sensors; elevator/escalator control and database integration. Over 50 different manufacturers are already integrated with Maxxess InSite, providing more capabilities and functionality than any other cross-platform solution available. New integrations include: Mercury LP and MR62e controllers; OTIS Elevator Compass Overwatch; enhanced Milestone Systems’ MIP and Geutebruck GeViScope integrations; as well as new integrations with Salient Systems, Avigilon, ISS (Intelligent Security Systems), Nedap and RemotePoint.
SilverShield Safety & Information Systems, providers of the industry’s most advanced cloud-based, multi-platform solution, is featuring their new Self-Service Visitor Management Kiosk at ISC West this week. The kiosk is integrated with the SilverShield Visitor and Incident Management System to enable unmanned registration for visitors and guests. “Our Self-Service Kiosk helps organisations secure all of their entry points so they know who is on premises at all times, even those entry points that are unmanned,” said Robin Baker, CTO, SilverShield. “Even a single uncontrolled entrance could otherwise compromise the safety of the facility.” Silent alert notifications Visitors can self-register with the SilverShield Kiosk (SS Kiosk) using a Mac or PC computer, iOS or Android device. The process is fast and easy; users enter their credentials manually, scan their valid IDs, or scan a SilverShield Quick Badge. Once a visitor’s details are entered, SS Kiosk notifies a Kiosk Monitor (e.g., system administrator or security guard) that a visitor has completed check-in; they can then initiate access or deny access if the visitor’s details match any watchlist or sex offender entries. If a visitor’s details are matched with any watchlist or sex offender entry, the Kiosk Monitor may initiate silent alert notifications to any stakeholders the organisation chooses. Also, if the visitor that is denied access becomes a further threat, the Kiosk Monitor can initiate any additional internal or external alarms they feel are needed (e.g., Alert Security, Hard Lockdown, etc.) which produce mass emergency notifications. “The SilverShield Self-Service Kiosk ensures that all visitors are correctly checked-in, screened and badged,” said Baker. “It’s one more way that SilverShield Systems helps keep your facility safe and secure.”
SilverShield Safety & Information Systems, providers of the industry’s most advanced cloud-based multi-platform solution, is demonstrating the capabilities of their visitor management and communication software at ISC West this week. Originally developed for school campus applications, the software incorporates a fully-integrated suite of modules including visitor management, lockdown initiation and much more. “Our desire for a better way to protect the students, staff and visitors at schools was the initial impetus for the development of the SilverShield system,” said Robin Baker, CTO, SilverShield. “Now we are expanding our focus to offer our unique solution to a wider audience, including medical-related facilities and businesses of all types.” Unmanned visitor screening Users can check visitors’ credentials against watchlists, and the national sex offender database, in near-real-time Designed to expedite emergency security procedures, the SilverShield Visitor Management System enables manned or unmanned visitor screening at all types of facilities. Users can check visitors’ credentials against watchlists, and the national sex offender database, in near-real-time. If there is a threat identified at any entrance, the system allows silent alerts to be sent immediately to designated stakeholders. You can also use the SilverShield system to create temporary ID badges, identify any known VIPs upon arrival, notify your staff of VIP or other visitor arrivals, and maintain a database of visitor history. When integrated with the SilverShield ID Badge System, the system can also generate permanent ID badging for staff, students, volunteers and vendors. The SilverShield Virtual Lockdown System alerts designated stakeholders via an audible siren sent to all users’ computers or mobile devices in case of an emergency. Visitor management system This siren, audible even if the users are wearing earbuds or have other applications running on their devices, instantly prompts users to take immediate action to initiate their lockdown procedures. The SilverShield Incident Management System is a near-real-time alarm system that integrates directly with the Visitor Management System or can be used stand-alone. It can alert local police, initiate a virtual lockdown, and produce mass emergency notifications via email, SMS/text, mobile and web push notifications. The siren is audible even if the users are wearing earbuds or have other applications running The SilverShield Event Management System pre-screens guests against watchlists and the national sex offender database, ensuring that unwanted guests are not invited to your events. The system will manage RSVPs and can even issue parking and visitor passes to approved guests via email and SMS/text– letting event administrators increase control over their events. Learning management system SilverShield Virtual Academy can be used for all types of security and other proprietary training. A video-based Learning Management System with lessons and assignments that you can create or purchase from SilverShield ensures that your staff is trained properly. The in-app SilverShield HR & Safety Resource Center connects schools and businesses with local, highly-trained security professionals to develop a security assessment, plan and documentation – ensuring your organisation and staff is prepared and trained in the event of an emergency. The SilverShield Kiosk System empowers visitors to register themselves upon arrival – manually or by scanning a valid ID. Ideal for organisations with unstaffed entrances, the Kiosk System will quickly notify staff of VIPs or unwelcome guests, increasing security at all entrances.
At ISC West 2019, ASSA ABLOY will highlight its commitment to helping security professionals stay ahead of industry trends and innovation for their clients. ASSA ABLOY’s Booth (#8061) will feature cutting-edge solutions that help security professionals across industries navigate what’s next in access control. “At ASSA ABLOY, we’re focused on helping our customers prepare for the future so they can build a safer, smarter and more seamless business,” said Peter Boriskin, Chief Technology Officer at ASSA ABLOY Opening Solutions Americas. “We’re excited to share the products that allow us to help security professionals open what’s next in the industry.” Unattended package delivery At its booth, ASSA ABLOY will display new innovations in access including: Unmanned Critical Infrastructure: ASSA ABLOY will highlight ways to ensure the security of critical infrastructure that is often unmanned or unsecured. One such example is Intelligent Traffic System (ITS) cabinets that are vulnerable to risks ranging from vandalism to malicious physical and cyber-attacks simply because they aren’t adequately secured. Mobile Credentials: Mobile is already a crucial part of people’s everyday lives. With the shift to mobile, ASSA ABLOY is supporting the growing adoption of mobile credentials and making strides in capabilities by integrating with key strategic partners. Unattended Delivery: The security of unattended package delivery has given rise to a new set of challenges and opportunities. Booth visitors can learn more about ASSA ABLOY’s newest addition to the family, Luxer One, a locker technology company, and how smart lockers can be used as a package delivery solution. Intelligent key system “These advances are the result of our continued commitment to developing solutions that improve security, safety and convenience for our customers,” said Mark Duato, Executive Vice President of Aftermarket Solutions at ASSA ABLOY Door Security Solutions. “The innovations on display at ISC West are just the start of what’s coming down the pike as we explore new opportunities in the market.” Various markets and technologies The booth will also showcase new expansions in ASSA ABLOY’s product lines for various markets from education to healthcare, as well as the latest technologies, including: The Securitron M380E Magnalock, which provides a strong hold, an optional integrated REX, sleek design and easy installation with a new strike mounting template. The Adams Rite G100 wireless digital glass lock with Aperio technology, which makes extending access control to all-glass doors easy and affordable while maintaining aesthetics. The latest Attack Resistant Door Solutions, 2019 Secure Campus Award and 2019 Govies Award winning technology designed to delay intruder entry. The Medeco XT Traffic Cabinet Lock, 2019 Govies Award winning technology designed to secure critical infrastructure with 27/4 security and access through an intelligent key system.
At ISC West 2019, ASSA ABLOY will demonstrate what’s next in the rapidly changing security industry with on-the-ground educational and engagement opportunities, including its in-booth (#8061) Technology Center, Systems Integrator Breakfast and training sessions. “As the modern security landscape continues to evolve, it’s critical for industry professionals to stay ahead of emerging trends and challenges,” said Mark Duato, Executive Vice President of Aftermarket Solutions at ASSA ABLOY Door Security Solutions. “With deep expertise and a comprehensive portfolio of solutions, ASSA ABLOY has always been a resource for security professionals navigating this complex industry. We’re excited to return to ISC West this year and give attendees a look at what’s next.” Systems integrator breakfast ASSA ABLOY’s annual press conference will highlight how the company is evolving with new product innovations ASSA ABLOY’s annual press conference will highlight how the company is evolving with new product innovations, new areas of business and new offerings. The press conference will be held in the ASSA ABLOY booth on April 10 from 11–11:30 a.m. PT. The 15th annual ASSA ABLOY Opening Solutions Systems Integrator Breakfast will give attendees a behind-the-scenes look at the innovative approach the City of Atlanta took to create a safer, easier experience for residents and visitors ahead of one of the largest sporting events in the world. The breakfast will take place at The Venetian on April 11 from 8–9:30 a.m. PT. Seating is limited. Technology center In addition to the broad range of products and solutions on display, visitors to ASSA ABLOY’s booth can explore the Technology Center for a demo of the support resources available to them, including: ASSA ABLOY Customer Support App, which provides immediate and intuitive troubleshooting, e-learning and support. BILT app for easy-to-use 3D installation instructions for ASSA ABLOY products. ASSA ABLOY Academy website for training and education resources. ASSA ABLOY Openings Studio which offers users integrative BIM software tools for designing, building and managing openings that can be used throughout the lifecycle of a building. Educational sessions Attendees can add these sessions to their calendar by logging onto the ISC West 2019 website Attendees can also participate in ASSA ABLOY’s annual USO Bag Build by packing supplies for military personnel leaving for or returning from deployment and awaiting the arrival of their personal luggage. ASSA ABLOY will host and participate in two educational sessions: Introduction to Access Control Wiring is an entry-level lab course designed to explain the basic electronic knowledge needed to wire an access control system. The lab will take place on April 9 from 1:30–4:30 p.m. PT in Sands 210. In Between the Lock and Controller: Why Wireless Locks Are Changing the Game in Access Control is a panel session that will address solutions for design and environmental issues impacting physical access control systems. The panel will take place on April 11 from 11 a.m.–12 p.m. PT in Sands 304. Attendees can add these sessions to their calendar by logging onto the ISC West 2019 website. ASSA ABLOY’s sister companies will also be onsite, including HID Global (booth# 11063), Alarm Controls (booth# 4050), Ameristar (booth# 9073), Traka (booth# 6103), and August (booth# 32067).
LenelS2, a provider of advanced access control systems and services, is making access control more convenient with its BlueDiamond mobile readers now supporting widely used iCLASS card technologies. BlueDiamond has also been enhanced to include a Phone as a Badge (PhaaB) feature, enabling hands-free access to building entrances, offices, meeting rooms, or any door with an enabled card reader. LenelS2 is a part of Carrier, a provider of innovative heating, ventilating and air conditioning (HVAC), refrigeration, fire, security and building automation technologies. Cost-effective bridge LenelS2, in its ongoing technology collaborations with 3millID and with LEGIC Identsystems, has enhanced the reach of BlueDiamond multi-factor readers with additional support for iCLASS card application data. The readers now support virtually all major card technologies, from standard 125kHz proximity card technologies to MIFARE, DESFire EV1 and EV2 and now iCLASS card technologies, as well as mobile credentials using iOS, Apple Watch and Android devices. BlueDiamond readers provide a cost-effective bridge for a planned migration from plastic to mobile credentials. Security management system BlueDiamond’s PhaaB feature uses customisable response ranges and the BlueDiamond mobile app to enable approved users to access offices and meeting rooms while leaving their phones in a pocket or bag. The mobile device can also be presented to a BlueDiamond card reader to open a single door. “The BlueDiamond solution with Phone as a Badge makes access control an effortless experience for users – both employees and authorised visitors,” said Jeff Stanek, president, LenelS2. “The simple issuance and management of mobile credentials is tied together by a cloud-based server integrated with LenelS2’s OnGuard security management system.” BlueDiamond PhaaB will be on display April 10-12 at the International Security Conference & Exposition (ISC) West, booth #18019 in the Sands Convention Center, Las Vegas.
As we approach National Safe Schools Week (October 21-27), it is appropriate for a conversation to begin regarding establishing standards for K12 school security. Currently no standards exist for assisting schools navigate the complexity of understanding what they need, how much it will cost and how they will secure their learning environments. Security industry experts The Partner Alliance for Safer Schools (PASS) is one of the organisations at the forefront of establishing security standards for schools. In 2014, the Security Industry Association (SIA) and the National Systems Contractors Association (NSCA) formed PASS, which brought together a cross functional group of members including school officials, safe schools’ consultants, law enforcement and security industry experts to collaborate and develop a coordinated approach to protecting K-12 students and staff. School administrators are often contacted repeatedly by organisations with multiple safety and security products PASS has provided valuable insights regarding an ‘All Hazards’ approach to school safety and security. In fact, PASS suggests that school administrators are challenged with two decisions: Determining what they need to do How to prioritise Safe school environment School administrators are experts in running schools and providing education. However, most are not security experts and do not understand the complexity of implementing a comprehensive physical security and safety program across their districts. Still, they are often contacted repeatedly by organisations with multiple safety and security products. School administrators are experts in running schools and providing education, but most are not security experts Some of these organisations recognise their products are just pieces of a safe school environment puzzle and how they fit in, whereas others focus on specific applications and do not understand how their specific solutions may affect life safety codes and Americans with Disabilities Act law. (Note: Many ‘barricade devices’ fall into this latter category and actually introduce liability concerns with the unintended consequences of their use.)Schools incorporate evacuation drills as part of their emergency preparedness plans and practice on a regular basis Even for experts, the plethora of options and disparate systems required to integrate a safety and security approach at schools is daunting. The ongoing challenge is integrating access control, video, mass notification, and/or visitor management products into a single, effective, and appropriate system the owner can understand, utilise, and afford and that meet local codes and ADA laws. In the absence of standards, schools are likely to amass a collection of devices that do not constitute a comprehensive solution. Lack of consensus In years past, the our industry and commercial buildings adhered to legacy codes – like Building Officials and Code Administrators International Inc. (BOCA), Uniform Building Code (UBC), Southern Building Code Congress International Inc. (SBBCI), and International Conference of Building Officials (ICBO) – which have traditionally been revised every three years, while local jurisdictions decided what versions to adopt and enforce. Currently, however, there is a move toward the International Building Code (IBC), which is published by the International Code Council (ICC) and includes standards and guidance for commercial buildings on doors, windows, and other openings.A risk assessment is the next step toward developing a comprehensive security plan, and begins with developing a trend analysis Still, despite this migration of codes from a patchwork of local decisions to global guidelines, there remains a lack of consensus around school security. The current fragmented approach causes confusion regarding how new schools are designed and how to retrofit existing school buildings, whose average age is 45+ years. Right protection equipment One can point to the fact that there hasn’t been one student lost in a school fire in over 50 years as testament to standards like NFPA 80 and NFPA 101 being referenced in model building codes. Additionally, schools incorporate evacuation drills as part of their emergency preparedness plans and practice on a regular basis. It’s not just having the right protection equipment in the building, it’s also having a procedural layer in place to make sure everyone knows their roles and responsibilities in the event of fire. The stress of the actual event can limit ones’ ability to think clearly. Practice makes perfect. Why would we approach school security any differently? School security is a team effort, and it is important to understand all the areas security impacts and involves School security is a team effort. It is important to understand all the areas security impacts and involves. PASS suggests starting with a basic team consisting of: Security Director Local Law Enforcement School Administrator Integrator Door and Hardware Consultant IT Director Comprehensive security plan Quantifying and mitigating risk are the jobs of security professionals and school administrators A risk assessment is the next step toward developing a comprehensive security plan. This often begins with conducting a trend analysis requiring the collection of data from a variety of public and private sources. The challenge is to pull these pieces into a usable and easily understood format that provides a guide for current and future risk concerns. Risk assessment and mitigation can never eliminate risk. Quantifying and mitigating risk are the jobs of security professionals and school administrators. Data from the following sources can help measure risk: Campus: Review incident report trends for at least the past 36 months. Area and city: Review crime data from local law enforcement for the surrounding neighborhood and city. Screening procedures: How is hiring conducted? Anonymous tip reporting systems: Enabling students, staff members, parents and the community to anonymously alert administrators to perceived and actual threats. Social media monitoring: such monitoring can provide important information that can be used to identify risks. Monitoring social media could help measure risk for school safety Delay adversarial behaviors These assessments can then be incorporated into the best practice approach of Layered Security. Layered security combines best practice components within each layer that effectively deter, detect and delay adversarial behaviors. Layered security works from the outside in. As one layer is bypassed, another layer provides an additional level of protection. The asset being protected is at the center of the layers – students, staff and authorised visitors. PASS defines five layers of Security:As one layer is bypassed, another layer provides an additional level of protection District Wide Property Perimeter Parking Lot Perimeter Building Perimeter Classroom/Interior Perimeter Appropriate Tier target Each layer can be broken down into Tier levels with Tier 1 being basic and Tier 4 being the highest level of security (Figure 1) . It is important to understand that the demographics of individual school buildings varies, even within the same district. Security experts will quickly point out that ‘if you’ve seen one school, you’ve seen one school’. The assessments will determine the appropriate Tier target. Figure 1 Each layer includes essential protective elements, or components, of security. Every layer does not necessarily include all seven of these common components, and a layer may include additional components unique to that particular layer. Safety and security components Policies & Procedures People (roles & training) Architectural Communication Access Control Video Surveillance Detection and Alarms While components are not listed in a priority order, three components included in all layers are policies and procedures, the roles and training of people, and communication. These components often perform a function in every layer and every tier in each layer. Three tools come together in the PASS approach as outlined in the new 4th Edition of the PASS Guidelines (Figure 2) - the Layers are established and defined, a Checklist/Assessment breaks down each layer into tiered best practices which then tie into the guidelines where a narrative explains each best practice in more detail. Figure 2 Schools need not reinvent the wheel when it comes to school security planning. Following the best practices of Risk Assessments and Layered Security will ensure that every school building in a district will have a unique and comprehensive plan that is tailored to their individual needs.
Surveillance systems can track the locations of mobile phone users and spy on their calls, texts and data streams. The Washington Post has reported on such systems that are being turned against travellers around the world, according to security experts and U.S. officials. The summer season highlights the need to take extra precautions when travelling. When travelling anywhere in the world, for business or pleasure, citizens need to be aware of and alert to looming physical and cybersecurity threats. To elaborate on expert security tips, strategies and advice for traveling this summer, we presented several questions to The Chertoff Group, a global security advisory firm that enables clients to navigate changes in security risk, technology and policy. Chris Duvall, Senior Director at The Chertoff Group, offers insights into cybersecurity concerns, physical security precautions, and recommends digital resources/apps for consumers while traveling. Q: How are security risks – physical and digital – changing? Why are threats greater today than five years ago? The exponential number of headlines over the past few years is a strong indication that both physical and digital risks are evolving and increasing Duvall: The exponential number of headlines over the past few years is a strong indication that both physical and digital risks are evolving and increasing. The scope, severity and complexity of physical and cyber risks are increasing and becoming more dangerous and destructive. This is especially true for those travelling outside the U.S. On the physical side, threat actors are actively seeking “soft targets” – public events, social settings, mass audience venues, etc. – to communicate their message, sow chaos and inflict catastrophic harm. On the digital or cyber side, we have seen a shift from “thrill hacking,” to an increase of “hacking as a business” (through credential compromise and ransomware), to an increase in “hacking for harm” - with the rise of “nuke ware” and ransomware without a clear financial motivation. Q. What specific precautions should a traveller take to protect their calls, texts and data streams from being spied on? Duvall: When travelling abroad, we recommend to our clients that their personnel and executives should practice good internet and social media hygiene. Some best practices include: Avoid using public Wi-Fi services—unless you use private VPN service for encryption Increase the privacy setting on your technical devices Disable location identifiers on apps Create a new (unlinked) email for internet correspondence Consider purchasing international MyFi devices to decrease the risk of getting your personal identification information (PII) or protected healthcare information (PHI) stolen Use temporary (i.e. burner) phones to protect your data and your contacts Q. What cybersecurity concerns are likely to impact travellers? Are the threats greater outside the United States or in any specific parts of the world? Significant precautions should be taken to protect personal electronic devices (PEDs) and the data connected to PEDs Duvall: The international cybersecurity landscape has grown increasingly dynamic, with threats posed by government authorities (in some countries), terrorists, insurgents, and criminals, requiring travelers to be proactive and vigilant. U.S. citizens, particularly executives of U.S.-based technology companies, must be aware that they are considered high-value targets for nation-state intelligence services and criminally-motivated bad actors. Many countries will go to great lengths and expense to acquire and exploit proprietary information from U.S.-based companies, and views U.S. executives visiting the country as “soft” targets of opportunity. As such, significant precautions should be taken to protect personal electronic devices (PEDs) and the data connected to PEDs. The tactics, techniques and procedures (TTPs) utilised by bad actors are often covert and nearly undetectable by the affected person. Threat actors routinely access, monitor and utilise Wi-Fi networks at hotels and in public spaces to compromise target devices. Other targeting methods include luggage searches, extensive questioning, and unnecessary inspection and downloading of information from personal electronic devices. There are numerous, high-risk countries for which the U.S. Government warns travellers to be wary of mobile malware, mobile device privacy attacks and hot spots for mobile botnets. The U.S. Department of State has the most recent and up-to-date list. For example, the U.S. Government has investigated numerous incidents in which U.S. travellers’ PEDs (personal and company devices) have been compromised by Russian authorities while transiting Russian airports, left unattended in public spaces and in travellers’ hotel rooms. When travelling to an unfamiliar place, research your destination to understand the local roads and transportation, geography, local roads, culture, etiquette and laws Q: What physical security precautions should a traveller take? Duvall: Here are some useful precautions: When traveling to an unfamiliar place, research your destination to understand the local roads and transportation, geography, local roads, culture, etiquette and laws. Protect your personal information and travel itinerary as much as possible. Limit the amount of jewelry worn, cash, credit cards and electronic devices carried while traveling. Avoid staying on the ground floor of a hotel. Consider choosing a room on the 2nd through 7th floors as these rooms may be more difficult to break into than those on the ground level, but still able to be accessed by fire/emergency response equipment. Never answer your hotel room door for anyone until you’ve determined who they are, why they are at your door, and if it is necessary for you to open the door to interact with them. Carry a rubber door stop/wedge with you to install on the room side of the door before you go to bed. Vary your patterns and routines when venturing out in to a new location, do not become predictable. Politely decline offers of food or drink from strangers (If you do accept beverages, ensure that they are in sealed containers and that there is no evidence of tampering). Never discuss your itinerary, personal, business or other sensitive information where others can hear you. Q: How can companies be proactive in protecting their business travellers? Companies should educate their employees on the importance of maintaining good internet hygiene while travelling abroad Duvall: When travelling on business, companies should provide their employees with clean computers and cell phones before departure. Upon return, the company should immediately wipe the computer clean to prevent any malicious threats from penetrating the company’s internal, cyber-infrastructure. Additionally, companies should educate their employees on the importance of maintaining good internet hygiene and recommend their employees disconnect from social media platforms while travelling abroad. Some general tips to recommend to your employees when travelling abroad include: Register in the Smart Traveler Enrollment Program (https://step.state.gov/step/) Visit Travel.State.Gov to view travel related information specific to the country or countries you’re visiting, including local US Embassy or Consulate contact information, as well as current travel advisories and alerts. Always leave a copy of your transportation and hotel itinerary and driver’s license (or passport if travelling internationally) with a family member or trusted friend. Always use a baggage tag with a protective cover Avoid using public Wi-Fi services Q: What digital resources and/or apps might a traveller benefit from (and how)? Duvall: The Chertoff Group recommends researching the below travel-related apps before departing on a trip: TravWell: This app provides destination-specific vaccine recommendations, a checklist of what you need to do to prepare for travel, and a customisable healthy travel packing list. The app can store travel documents, keep records of medications and immunisations, and set reminders to get vaccine booster doses or take medicines. My TSA: This app provides real-time updates on airport delays. It includes how long security lines are at various airports; information about what you can and cannot bring onto an airplane; and a frequently-asked question list, including new advanced imaging technology. Border Wait Time: The app provides estimated wait times and open-lane status at land ports of entry, which may be particularly helpful when in an area with multiple crossings. Mobile Pass: The Mobile Passport app speeds you through U.S. Customs and Border Protection at (1) cruise port and (24) airports Q: As a security expert, what’s your best advice for travellers? Duvall: At the end of the day, travel security is not rocket science. Simply put, travellers need to: Be aware and situationally alert at all times. Be aware and situationally alert to the location of your luggage and carry-ons at all times. Don’t access unknown, unsecured or public Wi-Fi if at all possible. Turn off “auto connect” features and institute stringent privacy controls as much as possible. Try to “blend in” – you don’t have to try to look like a local but travellers should avoid gaudy and expensive attire wherever possible. Use your common sense – if an offer, invitation or opportunity seems to good to be true... it probably is.
Today’s security professionals are tasked with protecting the entirety of a facility or campus from every possible threat. It’s a big task, given the range of solutions available; from cybersecurity to prevent hacking, to video surveillance to monitor the goings-on within the facility, to the physical security of the building itself. For most businesses and schools, keeping the entrances and exits to a building secure is an extremely high priority—when an individual cannot get into the building they will have a harder time causing trouble for those within it. With quantum leaps happening in security technology, architectural revolving doors may not always be top-of-mind when designing a new security system from scratch. However, with recent technological advances in the last decade, and considering that they occupy less floor space and are extremely good at reducing unwanted air infiltration into an interior, it is definitely time to examine how they can participate in a complete physical security plan as well. A well-known financial company in the Midwest of America was the target of a protest, against their financing of a controversial initiative Restricted access for business continuity The exterior door to a building or premises, often a public entrance during business hours, is typically the first line of defence against unwanted persons or activity making its way into an organisation. If lobby or security staff sense trouble outside (distress, fights, weapons, protests, etc.), they need a quick and effective way to block anyone from entering the building and creating danger for those inside. Should this type of incident make its way into a building, it creates a number of risks, including the expenditure of unnecessary resources, loss of productivity, violence, and liability for the business. For example, recently a well-known financial company in the Midwest was the target of a protest against their financing of a controversial initiative. A large crowd gathered outside on the street, pushed inside the building, and took over the interior lobby. The protesters not only disrupted the retail banking business at the lobby level, but also attempted to block employees from going to work on the upper floors. The protest lasted hours, making it difficult to do business, and was stressful for employees. In addition, the news cycle around the protest created an image problem for upper management and the overall brand. Revolving doors for access control Thanks to technology employing electricity, today’s manual revolving doors can potentially save lives Beyond the immediate risks of theft and violence, crime has numerous intangible effects on employees, residents or students that can have a more profound and lasting impact. These include physical pain and suffering, along with a feeling of anxiety, stress, and uncertainty around future security. According to a survey conducted by Workplace Options in 2015, 53% of American workers have experienced a traumatic event while at work—with workplace violence or criminal activity listed as one of the top four events that cause trauma. Revolving doors can be a reliable solution for providing this necessary security. They are often deployed in buildings where public use is needed during the day, but controlled access is required in the evening—for example, banks, museums, commercial buildings, condominiums, libraries, dorms, recreational centres, and more. Thanks to technology employing electricity, today’s manual revolving doors are more capable than ever before and can potentially save lives or buy the time necessary to alert security staff or notify law enforcement to deal with a dangerous situation in time to prevent harm, stress, or liability. Secure access can be made possible via an access control device mounted on the outside of the door Enhanced security with electronic lock control The following security features are now available for manual revolving doors being deployed in buildings right now: Emergency security lockdown: Facility or reception staff can electronically lock the door in place, regardless of position, at the push of a remotely located button. In the event of an immediate security threat outside the entrance (weapons, protests, drunk and disorderly conduct, etc.), access to a lobby or entrance can be instantly denied, and those within protected. Remote locking: In an earlier time, the manual pushing of a pin was required to lock a revolving door’s wing into the ceiling or the floor. Today, you can lock a manual revolving door by using a remote pushbutton, or, an access control system can lock the door automatically at a specific time of day. If anyone is still in transit during the lock command, the door will allow them to exit before locking. Once the door is locked, staff can easily unlock it with the same remote mechanism if there is an authorised visitor. Access control integration: Integration with access control systems gives manual revolving doors even more capabilities. Secure access can be made possible via an access control device such as a keycard reader, mounted on the outside of the door. Upon valid authorisation, the door will unlock and the user can push to enter the facility. Once all compartments are clear, the door finishes rotating by positioning its door wings at the end posts of the throat opening and relocks. If tailgating is a concern, your revolving doors should be the first of several layers of physical security Efficient incident management Consider the usage of these features for a building such as a downtown high-rise condominium. During the day or night, residents can enter by showing credentials outside the door to the access control system. Any deliveries would have to stand outside, ring the doorbell and wait for reception to unlock the door and let them in. If anything threatening occurs during rotation, reception staff can immediately lock the doors to keep trouble out and call for help. At a high-rise office building, it can work differently. The door can be unlocked during the day for public entry with guards keeping a watchful eye outside, ready to lock the doors instantly if trouble happens outside. The access control system can lock the doors at 5pm until 7am the next morning, requiring employees or cleaning crew to present their credentials to enter. Access control integration It should be noted that standard revolving doors are not equipped to detect or prevent tailgating (an unauthorised person following an authorised person through an entrance). They should not be confused with a security revolving door, which is intended for individuals trained to use these doors at employee-only entrances. With this in mind, consider that with access control integration, a standard revolving door will unlock when presented with an authorised credential, but will continue to rotate as long as anyone is inside the door to prevent entrapment. Tailgating is still a possibility with these entrances, so if this is a concern, your revolving doors should be the first of several layers of physical security including, potentially, additional turnstiles, guard staff, surveillance cameras, additional locking mechanisms for restricted areas, and so on. Ensuring compliance with code requirements To keep building interiors safe, standard revolving doors can be a simple, cost-effective and easy to implement Finally, modern code requirements for revolving doors are defined by a number of different agencies—ANSI, IBC, and NFPA. All require that a revolving door’s wings be able to collapse or ‘book fold’ to create a path of escape during a fire, and that a swinging or sliding door must be present within 10 feet of any revolving door, on the same building plane. To make sure this additional door isn’t a security weak point, the extra sliding or swinging door can be ‘exit only’, or locked to those trying to enter from outside the building, but unlocked to those trying to exit from inside the building. To keep building interiors safe, standard revolving doors can be a simple, cost-effective and easy to implement solution that helps prevent unwanted entry by those looking to do harm and create unwanted liability. Considering revolving doors can be a first step into securing the entrances and exits of your building, and protecting everyone and everything within.
Attendance has been growing steadily year-over-year for ISC West, and the 2018 show exceeded 30,000 total industry visitors for the first time. So it’s safe to expect ISC West 2019, April 10-12 at the Sands Expo in Las Vegas, will be bigger than ever. Preregistration for the 2019 show is on track to bring even more visitors than last year. “This is a show for everyone, for converged security,” says Mary Beth Shaughnessy, Event Director for Reed Exhibitions. “We bring a lot of different verticals together with IT and network security, physical security and robots and drones. It’s one-stop shopping and the number one security show in North America.” Identifying buying influencers The event organisers of ISC West make a concerted effort to bring the industry’s top buyers to the show The event organisers of ISC West make a concerted effort to bring the industry’s top buyers to the show. The ISC West Executive’s Club is a ‘top buyer program’ created to welcome high-level buying influencers who have current projects in the pipeline. The program works throughout the year, networking, researching and identifying buying influencers among end users, integrators, dealers/installers and consultants who are working on current projects. Approximately 1,300 attendees are participating in the program this year. An Executive’s Club member might be an integrator working with several large projects or represent a school system that is building a new campus or retrofitting their systems. During the trade show, these guests get the VIP treatment with a variety of benefits, including a lounge, cocktail receptions, and continental breakfasts. Personalised matchmaking programs ISC West also provides personalised matchmaking programs to bring together these buyers with companies that can meet their needs. The Executive Club members are also led on guided exhibit hall tours, based on product interest, that highlight new and innovative solutions. The program also contributes to ISC West’s goal to grow its end user audience. In this case, it is a group of eager buyers with immediate needs. Another growing aspect of ISC West is its role shaping exhibiting companies’ technology roadmaps, in particular the timing of new product releases. Many new products and technologies are announced at ISC West, and attendees are conditioned to attend the show to see what’s new in the marketplace. “Vendors try and work to get whatever solutions they are promoting together in time for ISC West,” says Shaughnessy. “Vendors know that attendees have fresh budgets and new initiatives early in the year.” Network security products ISC West will partner with the Security Industry Association (SIA) to make educational sessions available April 9-11 ISC West showcases the latest products, services, and technology including access control, video surveillance, disaster recovery, IT security products, network security products, wireless security products, and thousands more helping ensure safety by giving attendees the right tools and defenses to protect against security risks. In addition to the exhibition, ISC West will partner with the Security Industry Association (SIA) to make educational sessions available April 9-11. SIA Education@ISC will kick off the day before the start of the exhibition. The comprehensive program includes 85+ accredited sessions covering a range of industry topics aimed at providing the critical knowledge attendees need to protect and defend against developing threats in today's security landscape.
How’s this for a simple access control scenario? You walk up to a door, wave your hand in front of a button, the button lights up, and the door opens. That’s the simplified user experience that startup Openpath is promoting as it enters the crowded and mature market for physical access control. Openpath says a simple user experience provides the extra boost needed for mobile credentialing to gain momentum. In this case, it’s even simpler than using a card credential (no searching in a bag or purse for the card). And there’s no personal identification number (PIN) code to remember; no “intrusive” biometric element that can concern some users. James Segil, President and Co-Founder of Openpath, says the simplified process “uses fewer thought cycles.” Reliability of the system comes from Openpath’s SurePath triple-connect technology “We wanted to make mobile access control that people want to use and can use safely and with ease,” he says. “We wanted to make using a smart phone for access control easier and more reliable than using a keycard.” Simplified user operation In the simplified scenario, the mobile credential resides on a smart phone that can remain tucked away in the user’s purse or pocket. The credential remains active without the user needing to open an app. The wave of the hand signals intent, which causes the button to light up, activate and the door is ready to open. Segil says the simplicity of operation has contributed to the system seeing an unheard-of 94% adoption rate among users. Reliability of the system comes from Openpath’s SurePath triple-connect technology. The smart phone credential is delivered using Bluetooth, WiFi or LTE (cellular) – whichever signal reaches the reader first enables the door to be opened. So even if a company’s WiFi is down or Bluetooth proves unreliable, there is still a third option. Openpath deploys “seamless” cloud integration and makes it easy for landlords and tenants to integrate Openpath with other systems Seamless cloud integration Segil is a serial entrepreneur who has had experiences as a frustrated user, dealing with many different offices, people and access control deployments over the years – subletting office space, changing PIN codes, dealing with 10 different offices using 10 different cards. Based on that experience, Openpath’s founders saw a need for a more user-centric approach to access control, and a chance to improve the office experience to be more aligned with employees’ experiences in their smart homes. Segil says he also saw “significant lethargy” among incumbent players in the access control space, and a market in which mobile and cloud technologies had still not taken hold. In addition to a simplified user experience built around mobile credentialing, Openpath deploys “seamless” cloud integration and makes it easy for landlords and tenants to integrate Openpath with other systems. The “elegant” readers, including a flush-mounted version, fit in well with high-end office environments. The company launched in May 2018. Openpath has been signing up national and regional channel partners all across the U.S. Openpath is focused on the commercial real estate market, where they have already seen significant adoptions, especially among mid-sized companies. Larger deployments as part of new construction are in the pipeline. National system integration In the past six months since its launch, Openpath has been signing up national and regional channel partners all across the U.S. and now has a nationwide footprint and is able to service customers all over the U.S. They are not yet disclosing any specifics about the number of partners they have signed up and who they are. “I can share that we have a number of large national system integration and security brands on board as channel partners and many more regional and local system integrators,” says Segil. They are looking for additional integrator partners. “There is a cohort of folks out there who say ‘I get it,’ and I want to offer it to my customers,” says Segil. The cloud element of the system can provide recurring monthly revenue (RMR). Openpath’s system offers flexibility in terms of meeting each customer’s security needs. In addition to the “super convenient” scenario described above, the system can also be configured to be “super secure,” using two-factor authentication and other measures, says Segil. There are multiple “flavors” between the two extremes. It can also be integrated with elevators to enable the buttons on allowed floors. Integration with existing systems Cloud software simplifies operation for both tenants and landlords. The system is backwards-compatible to existing systems and can be used to retrofit and mobile-enable a legacy system, providing the benefits of mobile features and cloud operation to multiple sites. The software can interface with enterprise applications such as Active Directory, and an application programming interface (API) facilitates integration with other systems and building components. It operates with marketing automation platforms such as Flack and visitor management systems such as Envoy. The system is backwards-compatible, providing the benefits of mobile features and cloud operation to multiple sites Open standards make the system easy to install in new or existing buildings using RS485, or Cat 5 or Cat 6 wiring, whatever is in place. Retrofit installations can use existing panels, servers, software, etc., or they can be replaced. The Openpath panel is installed right next to an existing panel in a retrofit and preserves all legacy integrations of the previous system. Access credentials compatibility In its simplest configuration, the Openpath system consists of single or four-door panels wired using standard ports, Wiegand ports and REX ports, each connected to software in the cloud. Each panel works offline if the internet connection is down. Various key fobs, cards and other credentials are available in addition to mobile credentials. Openpath was one of the new exhibitors at last fall’s GSX show in Las Vegas, occupying a large-sized booth for a startup company. The “beautiful” hardware drew a lot of attention, says Segil. “The channel loves us, and we signed a lot of people,” he adds. “We were excited by the response.”
ADT Inc.’s acquisition of Red Hawk Fire & Security, Boca Raton, Fla., is the latest move in ADT Commercial’s strategy to buy up security integrator firms around the country and grow their footprint. In addition to the Red Hawk acquisition, announced in mid-October, ADT has acquired more than a half-dozen security system integration firms in the last year or so. Here’s a quick rundown of integrator companies acquired by ADT: Protec, a Pacific Northwest commercial integrator (Aug. 2017); MSE Security, the USA’s 27th largest commercial integrator (Sept 2017); Gaston Security, founded in 1994 as a video surveillance integration company and whose services have since expanded to include intrusion, access control, and perimeter protection (Oct. 2017); Aronson Security Group (ASG), which delivers risk and security program consultants and offers advanced integration services, consulting and design engineers and a National Program Management team (March 2018); Acme Security Systems, among the largest privately held security systems integrators in the Bay Area, focusing on electronic security systems, access control, video networks and more (March 2018); Access Security Integration, a regional systems integrator specialising in design, delivery, installation and servicing of electronic security systems including enterprise-level access control, video and visitor management solutions, perimeter security and security operation command centers (Aug. 2018); In addition to their moves in the commercial integrator space, ADT has also sought to expand their presence in cybersecurity with the following two acquisitions: Datashield, specialising in Managed Detection and Response Services (Nov 2017); Secure Designs, Inc., specialising in design, implementation, monitoring, and managing network defense systems, including firewall services and intrusion prevention, to protect small business networks from a diverse and challenging set of global cyber threats (Aug. 2018). ADT has acquired more than a half-dozen security system integration firms in the last year or so For additional insights into ADT’s game plan and the strategy behind these acquisitions, we presented the following questions to Chris BenVau, ADT’s Senior Vice President of Enterprise Solutions. Q: ADT has been actively acquiring regional integrators this year – more than a half a dozen to date. Please describe the history of how ADT came to embrace a strategy of acquiring regional integrators as a route to growth? ADT's acquisition of Red Hawk is set to close in December, and brings premiere fire and life/safety solutions BenVau: Our acquisition strategy started at Protection 1 when we embarked on our journey to build out our commercial and national account business and add enhanced integration capabilities to our portfolio. The merger of Protection 1 and ADT brought that foundation to ADT which up to that point was primarily a residentially and SMB-focused company. After the merger, we set out to identify and acquire additional regional integrators that would continue to build on that foundation and deliver enhanced technical solutions, advanced technologies and an expanded service, install and support footprint. Through our acquisitions we now operate two Network Operations Centers and three Centers of Excellence. We are also unique in the industry with the number and variety of certifications, like Cisco and Meraki, our engineers hold which ultimately allows us to offer Managed Security as a Service. They have also enhanced our operational capabilities. Q: What criteria do you use to evaluate whether an integrator is a good “fit” for ADT? BenVau: First and foremost, we look at the culture of the companies. The companies that we target for acquisition must be metrics- and customer service-driven. Secondly, we look at the leadership teams. ADT view their acquisitions more like mergers and take a patient approach to integrating them into their business We have been fortunate in the fact the leadership of the companies we acquired remain with us today in key management and executive positions helping to drive continued growth within their organisations. We also evaluate their current customer base, unique solutions and their ability to complement and enhance our portfolio with the goal of becoming a leading full-service, enterprise commercial provider. Our acquisitions have bolstered our network capabilities, brought enterprise risk management services, and a broader solution set in high-end video and access control solutions. Our most recent acquisition – Red Hawk, set to close in December – brings us premiere fire and life/safety solutions. Q: What changes are typically needed after an integrator is acquired in order to adapt it to the ADT corporate model? BenVau: We view our acquisitions more like mergers and take a patient approach to integrating them into ADT while taking into account their culture. We want to ensure that we find the right positions for their people, embrace the right messaging and put the right processes in place. We acquire these companies because they are the best in their respective businesses and geographies and bring their knowledge and experience in markets or with solutions that we may not have had previous access to. ADT can support clients with their own in-house technicians which helps to ensure a consistent security program Q: How can regional integrators benefit from the ADT brand? Have your newly acquired integrators realised additional growth? BenVau: The companies we have acquired, generally, have exceeded expectations and surpassed initial goals. ADT brings expanded opportunities for these companies as well with our national footprint. Our National Account Sales Team has seen impressive growth over the years and are only limited by our ability to deliver. These integrators help to deliver on that. In the past, the regional players may have had to rely on sub-contractors to service their larger clients. With ADT, we can now support those clients with our own in-house technicians which helps to ensure a consistent security program across multiple locations.Our National Account Sales Team has seen impressive growth over the years and are only limited by our ability to deliver" Q: Are additional integrator acquisitions planned this year and into 2019? How much is enough and when will it end (or slow down significantly)? BenVau: We expect to close on our latest acquisition, Red Hawk, before the end of 2018. Red Hawk brings a national footprint focused on fire/life safety and security to ADT. While ADT already had a robust security offering, Red Hawk will contribute significantly to the fire side of the business. In addition, we will continue to evaluate the companies in the industry to determine if additional acquisitions make sense. Q: Do you expect greater consolidation of the integrator channel in the industry as a whole? Why is this a good time for consolidation? Is it a good M&A market for buyers like ADT? BenVau: We will continue to evaluate companies in the industry to determine if further acquisitions make sense. As for the industry, we can only speak for ourselves. Our focus is on investing in our field organisation, in particular our service technicians, engineers and project management teams" Q: What other trend(s) do you see in the industry that will impact ADT (on the commercial side) in the next year or so, and how? BenVau: In addition to their moves in the commercial integrator space, ADT has also sought to expand their presence in cybersecurity Networking is a big one. As we continue to drive integration of devices and services, from AI, “the cloud,” machine learning and even analytics, there will be more focus on the network they ride on. A deeper knowledge of network design, bandwidth impact, and system integration will be critical. As part of our acquisition strategy, we focused on talent to add to the team and have been able to add to our bench strength in this area. Q: Any other comments/insights you wish to share about ADT’s strategy, future, and role in the larger physical security marketplace? BenVau: Our focus is on investing in our field organisation, in particular our service technicians, engineers and project management teams. The cornerstone of our success lies in our ability to deliver outstanding customer support and service. It starts with sales and the ability to deliver security and life safety technologies, but it ends with a delighted customer who partners with us to help secure the things that matter most to them. Our recent acquisitions have more than doubled our commercial field operations teams and are key to establishing the ADT Commercial brand as a leading full-service provider of enterprise solutions to the marketplace.
Apstec Systems (Apstec) announces that its Human Security Radar (HSR) system will be deployed at the Palexpo Exhibition and Congress Centre in Geneva to improve safety and security for the International Motor Show 2019. Asptec’s HSR system is the world’s first fully automatic real-time mass people screening solution. Held over a period of ten days, the Geneva International Motor Show is one of the automotive industry’s flagship events and attracts large numbers of visitors every year. The organisers are anticipating up to three-quarters of a million visitors over the duration of this year’s event, with capacity reaching 150,000 attendees a day during peak times. Largest conference centres The Palexpo is one of the largest conference centres in Europe, and as such has a duty of care to its visitors HSR is uniquely well suited to managing this level of throughput and providing a high level of security without causing disruption to the flow of visitors into the venue, or negatively impacting their experience. Two HSR systems will be deployed for the show, each capable of screening up to 10,000 people per hour. The Palexpo is one of the largest conference centres in Europe, and as such has a duty of care to its visitors. Traditional security checkpoints or manual searches, which scan one individual at a time, are not suited to large venues and public places, leading to queues and delays. Although security is still paramount, attention has moved towards the need to add a critical level of defence that doesn’t impede visitor experience. Cost-effective solution HSR was designed to address this challenge, and offers a practical and cost-effective solution to security screening in high footfall scenarios. The first fully automated, real-time mass screening solution, HSR provides seamless security to protect public places from terrorist attacks. Developed by specialists in the fields of radio physics, electronics and software engineering, the walkthrough system has been built in conjunction with authorities and ‘end users’ in security and counter-terrorism. HSR screens for mass casualty threats including improvised explosive devices concealed on the body or in body-worn bags, and firearms wherever they are carried, without the need for an operator to inspect suspect materials. It leverages centimeter wave technology, meaning it can discriminate explosives from benign materials, with a high degree of accuracy. Security screening The Palexpo’s deployment of HSR is the latest major implementation of this new technology Gregory Labzovsky, CEO, Apstec, explained: “Until recently, it’s been almost impossible to secure public spaces in a simple and cost-effective way, with existing approaches to security screening proving to be impractical, inconvenient and expensive to operate. HSR enables venue owners to close a critical security capability gap without impacting the experience of their patrons. We’re delighted to be working with The Geneva International Motor Show to enhance safety for thousands of motoring exhibitors and enthusiasts.” The Palexpo’s deployment of HSR is the latest major implementation of this new technology. The system has been installed in some of the world’s busiest airports, as well as in sports stadiums, entertainment venues, mass transport hubs and networks.
Boon Edam Inc., a global provider of security entrances and architectural revolving doors, announced that a recently renovated office space in Glasgow, Scotland, 191 West George Street, has installed Lifeline Speedlane Swing optical turnstiles for increased physical security and uncompromising aesthetics. A rising trend in the United Kingdom is the renovation of older office spaces. With a continuously growing workforce, cities across the country are transforming corporate offices into multi-level spaces with increased aesthetics. In keeping with this trend, the office space at 191 West George Street recently underwent a renovation. Revamped with space and simplicity in mind, the building’s atrium stands out due to its high-quality materials, including the sleek, Lifeline Speedlane Swing optical turnstiles used to control access to all occupants and visitors. Optical turnstiles integrated with access control The requirements were for an optical turnstile solution that could integrate with access control and had the versatility to control a large number of visitorsThe lead architect renovating 191 West George Street was Michael Laird Associates – a firm that flourishes in adaptable yet luxurious designs. Working directly with the architects, owners of the office space underwent a simple product selection process regarding security. The requirements were for an optical turnstile solution that could integrate with access control and had the versatility to control a large number of visitors. 191 West George Street is the home of a 6-level building with 87,000 sq. ft. of usable office space. The architects wanted to keep the look and feel of the entire building, open and clean, without any columns or other impeding structures. The designers chose a stainless-steel finish for the modern and sleek cabinets of the Speedlane Swing optical turnstiles to provide a perfect accent for the neutral white and mushroom colours of the lobby. Their minimal footprint allows them to integrate seamlessly into any location without being obtrusive to user access or aesthetic design. Lobby security solution All lanes can be controlled remotely via a device called BoonTouch that gives reception control to open or close lanes at any time191 was designed to be a bustling, flexible workspace for hundreds of daily users, and as space is rented and the building starts to experience higher traffic, the four lanes of optical turnstiles will be able to handle the load. Working in collaboration with Boon Edam’s sales and specification managers, the architect had a clear idea of what they were looking for in a lobby security solution. By reviewing a number of key elements related to security, throughput, aesthetics, safety, and technology, Boon Edam was able to map out all aspects of the entry requirements prior to selection and installation. The four-lane array of Speedlane Swing optical turnstiles includes a single, wide lane at the end. Wide lanes allow large groups to pass through as well as wheelchairs, dollies and luggage. All lanes can be controlled remotely via a device called BoonTouch that gives reception control to open or close lanes at any time.
Genetec Inc., a technology provider of unified security, public safety, operations, and business intelligence solutions announces that the South Grand Community Improvement District (CID) in St. Louis, Missouri is using the Genetec Stratocast cloud-based video monitoring system to deter license plate theft in its parking lot and provide video access to the local police department to help reinforce security. License plate theft One of the services offered by the South Grand CID is free parking. At any time of the day, drivers can park in a central parking lot to visit businesses or residents. While this lot has always been convenient and safe, license plate theft was troubling nearby areas. Video recordings are sent over a wireless network which connects to the South Grand CID main office To deter license plate theft in their own community, the South Grand CID board decided to add video surveillance to the lot. Currently, three cameras monitor the entire 90-space parking lot. Video recordings are sent over a wireless network which connects to the South Grand CID main office, just a few blocks away from the lot. With this cloud-based video monitoring system, Rachel Witt, Executive Director at South Grand CID, can quickly and easily view video from anywhere, at any time. Cloud video system “Using the cloud video system, I am able to find and view the video in seconds. I can narrow down my search based on dates and time and watch the event unfold with all camera feeds up on the monitor. It’s really that simple,” commented Witt. Only two weeks after installing the Stratocast video monitoring system, a visitor reported that their license plates had been stolen. “The visitor provided a description of the car, and a timeframe in which the incident likely happened. Using the Stratocast system, I was able to find and view the video in seconds. I could clearly see the suspect enter the lot, remove the plates and leave in his own car. Since the police are very busy here, I was able to bookmark the video recording and then notify them that the video was ready,” said Witt. View video recordings Stratocast has made it easy for the South Grand CID to give video access to local police so that when a crime is reported in the district, officers can immediately begin to conduct investigations without leaving their desks. While the South Grand CID manages and owns the Stratocast solution, officers can log into the system and view video recordings when required While the South Grand CID manages and owns the Stratocast solution, officers can log into the system and view video recordings when required. This is enabled by the Genetec Federation feature, which gives an organisation access to manage multiple independent Genetec systems as one. A memorandum of understanding was signed so each parties’ responsibilities are clear. Better sense of safety “Instead of driving over and picking up a DVD, officers can directly access video from our cameras to see what happened. Not only does it help speed up investigations, it saves officers’ valuable time,” continued Witt. The installation of Stratocast is not only helping to reduce license plate theft but it is also helping residents and visitors feel safer than ever. “Business owners, residents, and visitors have a better sense of safety when they know cameras are up. But they also need to know that we’re equipped to respond quickly to any disturbance. And that’s what Stratocast helps us achieve. With the addition of Stratocast, we’re able to show everyone that we have strengthened the security in our community,” concluded Witt.
HID Global, globally renowned trusted identity solutions provider, and Phunware, Inc., a fully integrated enterprise cloud platform for mobile that provides products, solutions, data and services for brands worldwide, has announced their collaboration to improve the experience for hospital patients and visitors to find their way within medical facilities, using wayfinding on their mobile phones. Wayfinding is indoor navigation to guide a person step-by-step on the way to a desired destination. Wayfinding and HID Location Services Phunware and HID are addressing the need of healthcare institutions to deploy standardised technology “The combination of Phunware’s market-leading wayfinding and mobile engagement capabilities with innovative HID Location Services will ultimately revolutionise wayfinding within healthcare institutions,” said Phunware co-founder and CEO Alan S. Knitowski. “It’s easy for visitors and patients to get lost in hospitals, and every time they do it puts appointment times and patient satisfaction at risk. With our location-aware app on a mobile device, we equip the visitor to get instant, turn-by-turn navigation that creates a better experience than that which is currently available on the market.” Phunware and HID are addressing the need of healthcare institutions to deploy standardised technology to provide a better wayfinding and visitor engagement experience inside the hospital, across campus and even in parking lots. Unified Healthcare IoT solutions Healthcare organisations can easily lay out the foundation for IoT applications, such as wayfinding" “Wayfinding is one more application that we are integrating into HID’s unified healthcare IoT solution to make it easier for healthcare systems to manage a growing demand for automated and streamlined experiences,” said Rom Eizenberg, Vice President of Sales, Bluvision, part of HID Global. “With HID technologies, we have changed the location-aware landscape, delivering location as a service. Now, healthcare organisations can easily lay out the foundation for IoT applications, such as wayfinding.” Healthcare IoT-enabled platform HID’s healthcare IoT solution-enablement platform simplifies the delivery of real-time location of clinicians, patients and devices. The platform is enabled by Bluvision (part of HID Global). Multiscreen-as-a-Service (MaaS) platform Phunware’s Multiscreen-as-a-Service (MaaS) platform also provides enterprise-level mobile wayfinding, engagement, data and more for other vertical markets, including retail, residential, hospitality, media and entertainment and more.
Comprising a large tertiary and secondary hospital, along with three rural hospitals, Waikato DHB is a substantial healthcare operator which employs approximately 6,000 staff throughout the region. With security needs that include protecting staff from verbal and physical abuse, safely securing high-dependency patients in dementia wards, restricting unauthorised access to medication and medical equipment, and protecting high-risk facilities such as newborn intensive care units, Waikato DHB required security systems that could be applied to both high and low security areas and found the solution in Gallagher’s range of innovative security products. Serving a large geographical area of the North Island of New Zealand, the Waikato District Health Board (Waikato DHB) provides hospital and community-based health services to a population of nearly 400,000 people. Controlling access areas within hospital Gallagher’s system enables us to make changes quickly and push that information out to the card readers instantly"Gallagher’s access control system and Command Centre central management platform provide Waikato DHB with control over access in and out of areas within the hospital. With access profiles that change on a daily basis, as medical staff – predominantly nurses – move between different departments on different days, it’s vital that the system can be updated simply and efficiently. “Gallagher’s system enables us to make changes quickly and push that information out to the card readers instantly, ensuring that staff can approach doors with the confidence that they can enter or leave areas as necessary,” said David Wilson, Manager of Security and Parking for Waikato DHB. The safe and secure storage of medication and medical equipment, ranging from syringes and surgical tools, to large expensive machinery, is a legal requirement of all hospitals in New Zealand. Single access card system Gallagher’s access control solution forms a part of the security system that delivers this for Waikato DHB facilities. Utilising a single access card system where permissions can be set to allow different access ensures the efficient movement of staff, reduces the risks associated with handling keys, and provides a comprehensive audit trail that identifies access movements by employee. Utilising a single access card system where permissions can be set to allow different access ensures the efficient movement of staff Waikato DHB is proud to put people at the centre of what they do, and strives to ensure staff and patient safety at all times. A number of Waikato DHB’s wards require high-level security either for the protection of the patients – as in the case of dementia facilities – or staff. Duress buttons located throughout the hospital and its high-risk areas automatically notify security staff of the exact location where a duress alarm has been activated. Lock-down system Gallagher’s Command Centre Mobile application delivers these duress notifications directly to a guard’s mobile device – speeding up the delivery of urgent information directly to security personnel. The ability to lock-down areas of the hospital for safety reasons is paramount. “Command Centre gives us the ability to isolate areas and restrict access. This is a critical requirement for us and the reliability of that lock-down system is hugely important,” said Wilson. With so many visitors and staff coming and going from the hospital, carpark management is an important aspect of facilities administration for Waikato DHB. In choosing a solution, the DHB selected Gallagher’s Carkpark Management system - an optional licence feature. Streamlined parking processes Through an integration with Gallagher’s Command Centre security management software, staff are able to badge their access card at one of the many staff and public carparks on site, and have their parking fee deducted from their pre-paid account. The programme has in-built intelligence including the ability for staff to exit and re-enter during a set period without being recharged The programme has in-built intelligence including the ability for staff to exit and re-enter during a set period without being recharged. This system has streamlined parking processes, particularly for part-time and shift-work staff who have irregular parking requirements. According to Wilson, “One of the real strengths of this system is the reporting. By managing the pre-paid carpark system through Command Centre and linking it to staff access cards, we are able to effortlessly extract detailed reports.” Electronic Tag Boards Waikato DHB’s facilities are continually expanding and this means a large number of contractors may be present on site within a 24 hour period. By utilising another Gallagher licence feature - electronic Tag Boards - contractors can easily sign on and off of the site. A key driver for this was health and safety, “It’s really important for us to know who is on site in case of an emergency,” said Wilson. “Making this process as simple as possible for contractors is the best way to ensure it is used.” A number of other system integrations appear across the site, including CCTV. Waikato DHB’s largest hospital facility, Waikato Hospital, has over 250 CCTV cameras connected to Gallagher’s Command Centre platform. As Waikato DHB’s requirements continue to evolve, Gallagher’s systems expand alongside them. Security Ward Standard The Security Ward Standard details the minimum security equipment required for new buildings, including access control, duress alarms, and camerasTo remain at the forefront of technology, Waikato DHB has a software maintenance agreement with Gallagher, to ensure they operate the very latest software available. “Any advancement in technology will make life easier, that’s a straightforward investment for us,” said Wilson. Through Waikato DHB’s experience with Gallagher products, the team developed a ‘Security Ward Standard’. This standard details the minimum security equipment required for new buildings, including access control, duress alarms, and cameras. The Security Ward Standard has greatly reduced the time involved by Waikato DHB staff in producing specification documents and gathering approvals. “Gallagher gives us a complete and total security package that is expandable and easy to manage,” said Wilson. “We are confident that a high-standard of security is being consistently applied across our sites for the safety of our staff, patients, and visitors.”
Wilson James has appointed SmartTask as preferred technology partner and awarded it a deal for the supply of a mobile patrol and electronic smart form solution for a new security contract with National Museums. Under the agreement, the company will now roll out the SmartTask workforce management software to 10 sites including the Natural History Museum, V&A and Science & Industry Museum. This follows a successful trial that achieved significant time savings by removing paperwork and streamlining operational processes. The new partnership between Wilson James and SmartTask will replace an incumbent supplier agreement that no longer met the business and operational requirements of the security, construction logistics and business services provider. Identify potential benefits In particular, the retender process for the security contract with National Museums required a single provider of a highly-configurable mobile patrol and electronic smart form solution. An initial trial at the Natural History Museum focused on use of electronic forms via SmartTask-enabled smartphones to reduce administration and increase productivity of operational staff. The trial highlighted the clear benefits of using the SmartForms, most notably around confiscated items and vehicle forms It was designed to identify potential benefits based on the precise requirements of the customer as well as create a suite of seven SmartForms and reports that could deliver standardised data capture and analysis. This included confiscated items and vehicle check SmartForms, scenario testing and incident reporting. The trial highlighted the clear benefits of using the SmartForms, most notably around confiscated items and vehicle forms. Required monthly reports Confiscated items, following bag searches carried out at point of entry, historically required between 10-15 minutes to complete and during that time the security officer was away from the floor resulting in lost productivity. Following the adoption of SmartTask, reports can now be created automatically using highly-accurate data, while paper usage and printing requirements have been dramatically reduced. The time savings achieved at the Natural History Museum by the Wilson James team have led to higher productivity, greater capacity to carry out bag searches and increased visibility of security staff. Management time saving have also been realised in production of required monthly reports, as well as administration savings of 12-hours per week for the Security Duty Managers. Ease of deployment Don McCann, Technology Systems Consultant at Wilson James commented: “SmartTask provided significant support throughout the contract bid and contributed to the successful re-signing for a further five years.” SmartTask has also handled a separate project for Bradford Science Festival, which further demonstrated the flexibility of the system" “The solution is now fully operational at five locations – Natural History Museum, National Science & Media Museum, National Railway Museum, Science & Industry Museum and a Wandsworth storage site – with the Science Museum and V&A to follow shortly. SmartTask has also handled a separate project for Bradford Science Festival, which further demonstrated the flexibility of the system, ease of deployment and its suitability for the security sector.” Enhance customer satisfaction Paul Ridden, CEO of SmartTask said: “This latest agreement demonstrates our ability to work closely with our customers to develop advanced workforce management solutions that support business development, customer retention and quality service delivery. We are now partner of choice for a growing number of security organisations based on our proven track record helping to tackle some of the most common and difficult operational challenges they face.” SmartTask is an advanced and simple-to-use employee scheduling and mobile workforce management solution that enables security companies to better plan and manage their workers, so they are at the right place, at the right time. The cloud-based software solution combines intelligent rostering, live monitoring and integrated proof of attendance across both static and mobile teams, making it the ideal tool to improve operational control, enhance customer satisfaction, and support duty of care to staff.
Round table discussion
Using a smart phone as an access control credential is an idea whose time has come – or has it? The flexible uses of smart phones are transforming our lives in multiple ways, and the devices are replacing everything from our alarm clocks to our wallets to our televisions. However, the transformation from using a card to using a mobile credential for access control is far from a no-brainer for many organisations, which obstacles to a fast or easy transition. We asked this week’s Expert Panel Roundtable: When will mobile credentials dominate access control, and what are the obstacles to greater adoption?
Hospitality businesses work to provide a safe and pleasant customer experience for their guests. Hotels offer a “home away from home” for millions of guests every day around the world. These are businesses of many sizes and types, providing services ranging from luxury accommodations to simple lodging for business travelers to family vacation experiences. Hospitality businesses also include restaurants, bars, movie theaters and other venues. Security needs are varied and require technologies that span a wide spectrum. We asked this week’s Expert Panel Roundtable: What are the security challenges of the hospitality market?
Enterprise customers provide a large, and very lucrative, business opportunity for the physical security market. These customers include big global companies with plenty of revenue to spend and employees and facilities to protect. As a group, enterprise customers also tend to be a demanding lot, requiring systems that are large, scalable, that can operate across a wide geographic area, and that provide top-notch system performance. Enterprise customers set the standards of performance for the entire market, and they challenge manufacturers to up their game. We asked this week’s Expert Panel Roundtable to reflect on the industry’s biggest customers: What are the security challenges of the enterprise market?